Conflicting Applications in a Secure Healthcare Environment
It’s an all too familiar situation for healthcare IT departments. Two primary applications have to be loaded on all PCs in the environment, but they require different versions of the same prerequisite software. Often times Java and Internet Explorer are the culprits but there are many others. How can two conflicting application environments be setup to coexist on the same PC? Application Virtualization.
Application virtualization allows you the flexibility of maintaining application specific environments isolated from each other on separate backend servers. Applications that share the same software prerequisites or applications that need to be able to interact with each other can be grouped together on the same backend servers. The application then runs on the server its hosted on with the visible application window streamed to the end client. The clients keystrokes and mouse movements and clicks are then sent back to the server for processing. As illustrated above, this means that two applications that normally can’t coexist on the same PC, can now run seamlessly side by side on the same workstation.
A more secure environment is a benefit of application virtualization as well. Since all of the application processing is taking place on the backend server, usually installed in the data center, instead of the end PC, no Protected Health Information (PHI) is stored on the end device. If a laptop on one of your wireless computer carts goes missing, there is no need to worry about having to report a possible release of information. You can also easily configure the virtual environment to disallow the use of USB storage devices to keep users from copying and removing PHI from the workstation. Malware or viruses on an end device also can’t interact directly with the application, keeping your data safe.
Application virtualization also allows an easy transition to mobile environment. Once again, since the application processing is taking place on the backend server, the client device doesn’t have to be Windows PC. The end device can be any device with the proper virtualization client installed. This includes but is not limited to iPads, Android tablets, smartphones, Macs, Windows PCs, and thin clients. Not only does the form factor of the end device no longer matter, neither does the location. Secure remote access to the applications can be easily setup once application virtualization is in place. Any device with a connection to the Internet can then be used to access your organizations internal applications.
Now, how do you get started with application virtualization? Centrinet Corporation specializes in virtualization, including application virtualization. Engineers at Centrinet are available to meet with you to discuss your specific business needs and develop a virtualization strategy that makes sense for you. If you are ready to make your environment more flexible, secure and mobile, contact Centrinet today.
[contact-form][contact-field label=’Name’ type=’name’ required=’1’/][contact-field label=’Email’ type=’email’ required=’1’/][contact-field label=’Phone’ type=’text’ required=’1’/][contact-field label=’Comment’ type=’textarea’ required=’1’/][/contact-form]