Microsoft provides two different architectures for deploying Remote Desktop Services: the traditional method and the highly available method. Let’s take a look at each one and compare the security features to the TruGrid advantage:
This year, TruGrid is excited to sponsor and partner with Sales-A-Palooza to introduce our workspace tools for Service Providers and IT Professionals . Come and meet the TruGrid Team, and learn how we are able to help MSP's secure Microsoft MDS in 15 minutes or less. You can click here to start your free trial of TruGrid now.
Security Features That Protect Your Workers, No Matter Where They're Working
The number of off-site employees is on the rise, with 63% of all companies declaring they have remote workers at least part of the time. That number is expected to continue to increase in coming years as employees continue the push for better work-from-home policies and flexible work options.
TruGrid is excited to be a key sponsor and part of the vendor lineup at the exclusive ASCII IT Success Summit in Chicago, May 16-17. The event's dynamic agenda is designed for managed service providers to discover the tools and services they need to help customers transition to cloud-based services, a recurring revenue model, and scaling their business for future growth.
A Michigan manufacturing company lost $5.2 million after the CEO’s computer became infected by malware.
An escrow company in California shuttered after a controller’s computer became infected and the company lost $1.5 million. A fuel distributor in North Carolina experienced multiple fraudulent transactions and lost $800,000 in just five days.
There are different ways to secure a Windows system running RDS when accessed over the internet, each with significant drawbacks. We have pioneered a simpler and more secure solution that takes just minutes to install.
Let's take a closer look at methods for securing RDS. To start with, it is strongly recommended that any computer system that is accessible over the internet be protected. Negligence from completely protecting internet-accessible computers running RDS will certainly expose them to compromise and data theft and / or destruction.
Methods for Securing RDS and Their Drawbacks
When RDS is enabled on a Windows system, it opens TCP port 3389, which is required to accept incoming login from remote users. Although this port can be changed, it is never recommended to directly expose a computer running RDS to the internet. Since there are a variety of ways to attempt to secure RDS, I have used a table below to show common methods and their drawbacks.
Your business is going to grow, and we are a solution that can grow with you. Let’s explore the fastest way to make Microsoft RDS scalable and redundant in minutes. To understand how simple our solution truly is, let’s look at how IT professionals traditionally tackle the RDS scaling challenge.