Thursday, March 28, 2024

Intel, Citrix Team on Virtualization

Datamation content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

Powered by the twin enterprise needs to cut costs during this recession and to improve security in the light of repeated data breaches, Intel and Citrix have teamed up to create a hypervisor that will let IT centrally manage and administer end user devices.

Citrix (NASDAQ: CTXS) will optimize its Xen hypervisor (define) for Intel (NASDAQ: INTC) Core 2 desktop and Centrino 2 laptop chips using Intel’s vPro technology.

The collaboration between Citrix and Intel is expected to let PC manufacturers include “built-in” client-side virtualization with new desktop and laptop computing systems. Dell (NASDAQ: DELL) said it’s providing engineering support to aid in the design and testing of the new technology and plans to certify it for its computing platforms when its available for commercial release.

The new technology will go beyond the virtual desktop interface (VDI) currently being offered by VMware (NYSE: VMW) and Microsoft (NASDAQ: MSFT).

The first products with this new technology, being built under the Project Umbrella codename, are scheduled for delivery in the second half of the year, Raj Dhingra, group vice president and general manager of Citrix’s desktop delivery group, told InternetNews.com.

Enterprises will be able to keep one virtual image for the corporate desktop and patch and maintain only that image, cutting maintenance costs and improving security.

Security will be enhanced because IT can install the most up to date patches on the master image at the back end, also known as the golden image, and not have to wait for users to update their own patches. Many viruses, including the Downadup virus, which could be bigger than the Storm worm, spread because users fail to update their patches.

“Your desktop will always be up to date, with its management, patching, imaging, maintenance and security always done centrally,” Dhingra said. More importantly, enterprises can apply policies to the virtual machines so users will not be able to, for instance, download corporate data in virtual machines on their devices onto USB sticks.

This article was first published on InternetNews.com. To read the full article, click here.

Subscribe to Data Insider

Learn the latest news and best practices about data science, big data analytics, artificial intelligence, data security, and more.

Similar articles

Get the Free Newsletter!

Subscribe to Data Insider for top news, trends & analysis

Latest Articles