A security analyst has been asked by the Chief Information Security Officer to:
develop a secure method of providing centralized management of infrastructure
reduce the need to constantly replace aging end user machines
provide a consistent user desktop experience
Which of the following BEST meets these requirements?
A. BYOD
B. Mobile device management
C. VDI
D. Containerization
develop a secure method of providing centralized management of infrastructure
reduce the need to constantly replace aging end user machines
provide a consistent user desktop experience
Which of the following BEST meets these requirements?
A. BYOD
B. Mobile device management
C. VDI
D. Containerization