the VPN. You only need one compromised user device to destabilise the data center to which it is connected. There is a better technology at hand – the Virtual Desktop Infrastructure (VDI).