Thin Clients vs PCs vs BYOD: What’s Best for Shared Workspaces?

Thin Clients vs PCs VS BYOD

Shared workspaces introduce unique challenges that traditional endpoint strategies are not always designed to handle. Devices are used by multiple people, often across shifts or roles, increasing the need for strong security controls, fast user switching, and simplified management. Companies implementing this must ask themselves “What device is best for shared workspaces?” Shared workspaces are … Read more

BYOD Security Without MDM: How to Prevent Data Leakage on Personal Devices

Bring Your Own Device (BYOD) is now a permanent part of modern work. Employees expect to access corporate systems from personal laptops, phones, and tablets, often from unmanaged environments. But traditional Mobile Device Management (MDM) creates friction in BYOD environments: So the question becomes: How do you prevent data leakage on personal devices without using … Read more

Separating Client VDI Environments: Ensure Security and Compliance in Multi-Tenant Deployments

Separating Client VDI Environments

Virtual Desktop Infrastructure (VDI) has become the backbone of secure remote access. But as more organizations (especially BPOs, and MSPs) host multiple clients or business units on shared VDI infrastructure. The need for strict environment separation has become critical. Without proper segmentation, a single misconfiguration can expose one client’s sensitive data to another, compromise compliance, … Read more

The Real Costs of VDI in 2025: What IT Leaders Need to Know

Virtual Desktop Infrastructure (VDI) has been around long enough that most IT leaders can list its selling points in their sleep: centralized management, tighter security, and easier control of endpoints. But in reality, 2025 is proving to be a much more expensive year for VDI than many budgets anticipated. Between changing licensing models, unpredictable cloud … Read more

ThinScale’s Tech Blueprint EP 3: GPOs – What They Can and Can’t Do

GPOs

Group Policy has long been a cornerstone of IT management — used to enforce lockdowns, deploy software, and manage user environments at scale. But as IT environments evolve, so too must our approach to managing Group Policy Objects (GPOs). In Episode 3 of ThinScale’s Tech Blueprint series, CTO David Coombes breaks down the inner workings … Read more

ThinScale’s Tech Blueprint EP 2: Screen Scraping Malware -The Silent Threat to Your VDI

screen scraping malware

In the second episode of Tech Blueprint, ThinScale CTO David Coombes shines a light on one of the most overlooked threats in virtual desktop infrastructure (VDI): screen scraping malware. In under six minutes, David walks through a live malware simulation that demonstrates just how easily malicious actors can capture and exfiltrate sensitive information — even … Read more

ThinScale’s Tech Blueprint EP 1: Keylogging & VDI – Don’t make this mistake!

In our first episode of the Tech Blueprint, we put a critical endpoint security threat under the microscope: keyloggers. These silent and often undetected tools can compromise user credentials, access sensitive data, and expose entire systems, all without triggering a single alarm. Join ThinScale CTO David Coombes as he breaks down: Whether you’re managing remote … Read more