

2.55 Business Liaisons, Operations, and IT Service Desk Training.2.54 Internal Branding and Marketing Campaigns.2.53 Capturing User Feedback In-Session.2.52 Naming Convention for VDI Admins and End Users.2.48 SOAR – Security Orchestration, Automation, and Response.2.44 SIEM – Security Incident Event Management.2.42 File Share and Data Security Protection.2.41 RAT – Remote Access Trojan Protection.2.40 Vulnerability Scanning & Penetration Testing.2.38 Release management & deployment strategy.2.33 Network Segmentation and Micro-segmentation.


2.22 Application Process Control & Elevation.2.17 Windows OS Optimization – Forget what you THINK you know about Windows.2.15 Application Delivery Strategy – Masking, Layering, Streaming, Hosting, Containerizing, Just in Time.2.9 Active Directory – the silent killer of VDI environments.2.6 Profiles & Personalization – The user’s “stuff”.2.1 IAM – Identity and Access Management.2 Identifying and building Foundational VDI by targetting the dependency layers….
