Based on Xen virtualization technology, XenClient delivers true bare-metal performance with the highest levels of security and isolation to run multiple local virtual desktops simultaneously.
High-definition user experience
The first Type-1 virtualization solution designed for Intel Virtualization Technology for Directed I/O (Intel VT-d). XenClient XT provides direct access to the full capabilities of underlying graphics hardware and full Windows Aero, OpenGL and DirectX support for rich, high fidelity video and graphics in a 3D-enabled virtual desktop.
A familiar user experience
IT can transparently hide the client hypervisor. This enables users to stay productive with a desktop experience that feels just like a native PC.
Policy-based, automatic backup and recovery
Corporate and user data can be backed up over a secure connection (HTTPS) whenever the user is connected to the Internet. Lost or stolen laptops can be disabled remotely or remotely wiped, ensuring that valuable data is backed up in the datacenter and doesn't fall into the wrong hands.
XenClient Enterprise Synchronizer provides a scalable centralized platform to configure and deploy multiple local virtual desktops, including those in complex Active Directory trust environments. Enhanced policies and role-based administrative control deliver the granularity IT needs to manage XenClient effectively. IT administrators can define policies to restrict the movement of corporate data or remotely wipe lost or stolen devices. Automatic connection throttling and USB/DVD pre-caching ensure speedy delivery of virtual desktops. User profile virtualization and layering technologies conserve resources by enabling the elective backup of user level data, settings and profiles.
Data and user protection
Each VM image can be fully encrypted with AES-XTS (256-bit encryption) and runs in complete isolation, ensuring that malware or cyber-attacks cannot pass between environments. IT admins can also require two-factor user authentication, enforce time-based VM lease periods for contingent staff such as contractors and interns, and set limits on data movement (USB, optical, networking) for corporate policy enforcement. With role-based administrative control, IT can protect users even further by limiting the number of IT employees who have full access to their data.