• All
  • Cloud
    • Solutions
    • Virtualization
  • Data
    • Analytics
    • Big Data
    • Customer Data Platform
  • Digital
    • Digital Marketing
    • Social Media Marketing
  • Finance
    • Cost Management
    • Risk & Compliance
  • Human Resources
    • HR Solutions
    • Talent Management
  • IT Infra
    • App Management Solutions
    • Best Practices
    • Datacenter Solutions
    • Infra Solutions
    • Networking
    • Storage
    • Unified Communication
  • Mobility
  • Sales & Marketing
    • Customer Relationship Management
    • Sales Enablement
  • Security
  • Tech
    • Artificial Intelligence
    • Augmented Reality
    • Blockchain
    • Chatbots
    • Internet of Things
    • Machine Learning
    • Virtual Reality
IDC Analyst Brief: Using Lightweight OS and Desktop as a Service to Overcome Hybrid Work Constraints

IDC Analyst Brief: Using Lightweight OS and Desktop as a Service to Overcome Hybrid Work Constraints

Citrix
Published by: Research Desk Released: Aug 18, 2022

Some 98 percent of organizations will have a hybrid work model in 2022. However, this move has created new pressures on technology teams. IT must provide the devices and tools employees need to be successful, ensure their access to public cloud applications and data, and secure complex IT environments from growing threats.

In a new Citrix-sponsored analyst brief, IDC shares how organizations are adopting a thin-client model for end-user computing, which keeps the end-user’s workspace and endpoint device separate. The workspace can be hosted via on-premises virtual desktop infrastructure (VDI) and Desktop as a Service (DaaS), while the endpoint device can be managed and secured using a zero trust model.

What you can expect to learn:

  • How IT is evolving the user and support experience and device profile to meet the demands of hybrid work
  • The user, operational, and cost benefits of separating the workspace and endpoint device
  • Key considerations for using a lightweight OS, DaaS, and low-cost or older devices How to mitigate security risks using this model