[To the Qubes team - have there been efforts to support enterprise clients?]

Frafra -

When NxTop was released I did some beta work with them and was sad when Citrix 
acquired them, renamed the product XenClient XT, stopped considering 
non-enterprise use cases and then, finally, killed the product. [See slide #8: 
https://www.slideshare.net/xen_com_mgr/xen-project-15-years-down-the-line ]

Anyway. The open source OpenXT (open source based on the above) is/was designed 
for the use case discussed in this thread and is the underlying platform of 
DoD's SecureView environment.

The enterprise-level admin console can:
- Control access to and disable/wipe clients
- Push out Xen/dom0 updates
- Push out VM and/or template updates
- Delete and/or redeploy enterprise owned VMs
- Delete and/or redeploy local user's personal VM (e.g. after malware incident)

Local-machine limited admin console (dom0):
- Refresh or redeploy user's personal VM.

Not sure about VPN functionality external to the VMs themselves (e.g. does it 
support configurable proxying per VM?). If not, probably best to to segregate 
VMs by VM-hosted VPNs and the local LAN would always be considered hostile.

In any case, might be worth looking into OpenXT for this. It's a quiet project, 
not sure how actively maintained, but there is some movement in github.

Brendan

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/be2dba37-debe-44c0-b5bc-f49d26ad8df7%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.

Reply via email to