VMware Horizon 8 offers strong network security to protect sensitive corporate data. For added security, you can integrate VMware Horizon 8 with certain third-party user-authentication solutions and implement the restricted entitlements feature.
Important:
VMware Horizon 8 can perform cryptographic operations using FIPS (Federal Information Processing Standard) 140-2 compliant algorithms. You can enable the use of these algorithms by installing
VMware Horizon 8 in FIPS mode. Not all features are supported in FIPS mode. For more information, see the
Horizon 8 Installation and Upgrade document.