XenClient Features

image

True bare-metal client hypervisor

Based on Xen virtualization technology, XenClient delivers true bare-metal performance with the highest levels of security and isolation to run multiple local virtual desktops simultaneously.

image

High-definition user experience

The first Type-1 virtualization solution designed for Intel Virtualization Technology for Directed I/O (Intel VT-d). XenClient XT provides direct access to the full capabilities of underlying graphics hardware and full Windows Aero, OpenGL and DirectX support for rich, high fidelity video and graphics in a 3D-enabled virtual desktop.

image

A familiar user experience

IT can transparently hide the client hypervisor. This enables users to stay productive with a desktop experience that feels just like a native PC.

image

Policy-based, automatic backup and recovery

Corporate and user data can be backed up over a secure connection (HTTPS) whenever the user is connected to the Internet. Lost or stolen laptops can be disabled remotely or remotely wiped, ensuring that valuable data is backed up in the datacenter and doesn't fall into the wrong hands.

image

Centralized management

XenClient Enterprise Synchronizer provides a scalable centralized platform to configure and deploy multiple local virtual desktops, including those in complex Active Directory trust environments. Enhanced policies and role-based administrative control deliver the granularity IT needs to manage XenClient effectively. IT administrators can define policies to restrict the movement of corporate data or remotely wipe lost or stolen devices. Automatic connection throttling and USB/DVD pre-caching ensure speedy delivery of virtual desktops. User profile virtualization and layering technologies conserve resources by enabling the elective backup of user level data, settings and profiles.

image

Data and user protection

Each VM image can be fully encrypted with AES-XTS (256-bit encryption) and runs in complete isolation, ensuring that malware or cyber-attacks cannot pass between environments. IT admins can also require two-factor user authentication, enforce time-based VM lease periods for contingent staff such as contractors and interns, and set limits on data movement (USB, optical, networking) for corporate policy enforcement. With role-based administrative control, IT can protect users even further by limiting the number of IT employees who have full access to their data.

Take our short survey and enter to win your choice of an iPad Mini or a Nexus 7.

The survey will open in a new window so you can continue browsing the website.

Take the Survey No Thanks

Sweepstakes Rules