I don\u2019t envy corporate IT teams today. For every automation or convergence that\u2019s made your jobs easier, you\u2019ve been handed dozens of difficult cybersecurity concerns upon which the fate of your company rests (no pressure).\nWhen my team at Wyse introduced thin clients 22 years ago, it was a different world. What\u2019s interesting to see is that, while Server-based computing and Digital workspaces (I\u2019ll refer to them as VDI for ease of reading) has fallen in and out of popularity over the past few years, organizations need it today more than ever.\nModern security use cases for VDI\nThere are several use cases for VDI that didn\u2019t exist until the modern era of workforce transformation.\nWorking from home\nIf you have employees who regularly work from home, you face a range of security threats, from employees\u2019 malware-magnet kids to the family\u2019s relatively unsecure home network. If those same employees are accessing data using a thin client through VDI, there\u2019s 1) no temptation for their kids to use the devices (because they can\u2019t access anything fun), and 2) no risk of obtaining malware from a shared network, because VDI environments are isolated from other activity.\nUnsecured WiFi\nNo matter how many policies you set against connecting to unsecured Wi-Fi, there will always be employees who roll the dice and work from the local coffee shop. Again, VDI makes this a non-issue. Workers can enjoy their lattes while securely accessing data through a secure, encrypted connection that\u2019s impenetrable to the hacker at the next table.\nShared or public computers\nMaybe last week, your CEO forgot her laptop when travelling to a conference. Using shared or public computers would normally create security issues, but if the CEO conducts her work using VDI, there will be no trace of her activities on public devices. She can conduct her work from an airport kiosk, or hotel business center securely.\nState-sponsored threats\nWhat if your CEO is flying to a country known to take part in state-sponsored cyberattacks and surveillance? A transit authority forces her to sign in to her laptop so he can \u201cinspect\u201d it. If the CEO uses VDI, there will be nothing of value stored on the device. And even with remote-access Trojans and other covert, malware-based methods, the government won\u2019t be able to eavesdrop on what\u2019s happening in the VDI environment.\nOverseas contractors working with IP\nVDI is offering companies the ability to employ contractors in other countries securely and affordably. Rather than shipping a full workstation loaded with proprietary files to a contractor in Europe or Asia, a company can simply ship a thin client with smart card access. When the contractor has completed the project, access can simply be revoked.\nMethods for deploying VDI\nThe use cases are numerous, and so are the types of thin and zero clients available.\nZero clients are the most secure because they have no OS and no firmware, but have limited use cases. Thin clients are more popular and have a wider range of uses. These clients typically come with a few software options. The most secure option is to use a proprietary firmware technology, like Dell\u2019s Wyse ThinOS, that has an unknown, unpublished API. Other software options include Linux or Windows. Both are inherently secure due to the low attack surface and the nature of VDI itself. Ultimately how you choose between them will depend on the applications and peripherals that you want to use with the devices.\nIf there\u2019s something holding IT teams back from exploring VDI, it\u2019s the perception that it\u2019s a dated solution. But calling VDI a relic of a bygone era is like saying PCs can\u2019t be useful because they came into vogue in the 1980s. Today\u2019s VDI has evolved thanks to massive advancements in the technology powering servers, graphics cards and the endpoints themselves. It\u2019s purpose-built for a new generation and a modern set of security challenges.\nSo, if you find yourself daydreaming about a world where mobile endpoints aren\u2019t a constant threat to your security, VDI may be one way to get what you want without physically chaining your workforce to their desks.