VMware Horizon 8 offers strong network security to protect sensitive corporate data. For added security, you can integrate VMware Horizon 8 with certain third-party user-authentication solutions and implement the restricted entitlements feature.
Important: VMware Horizon 8 can perform cryptographic operations using FIPS (Federal Information Processing Standard) 140-2 compliant algorithms. You can enable the use of these algorithms by installing VMware Horizon 8 in FIPS mode. Not all features are supported in FIPS mode. For more information, see the Horizon 8 Installation and Upgrade document.