Windows 7 RTM review

Windows 7 is ready for the PC manufacturers, but is RTM ready for business?


Data Security

If you're worried about data loss from laptops and USB sticks, then BitLocker is just what the doctor ordered. Much the same as the Vista implementation (and with the same pointless restriction to Enterprise and Ultimate), Windows 7's Bitlocker quickly encrypts laptop hard drives, preventing unauthorised access to data. Group policies control how keys are managed (including just how recovery keys are stored). Good whole disk encryption should be invisible to the end user, and there's very little performance hit with BitLocker.

Windows 7 extends BitLocker beyond the PC with BitLocker To Go. This encrypts USB keys, something that's increasingly important as USB keys can now store as much data as a hard disk. Group policies can force BitLocker USB encryption on any key connected to a PC on your network, and reader software on encrypted drives enables users to read them on XP and Vista PCs.

XP Mode and R2

Advertisement - Article continues below

Microsoft recently delivered the RC for Windows 7's XP Mode. If you're planning to roll out Windows 7 quickly, but are still unsure if applications are compatible with the new operating system, XP Mode is just the ticket. Based on Virtual PC (and only running in the Professional and Enterprise SKUs of Windows 7, along with the enthusiast-focused Ultimate), XP Mode gives you a virtual Windows XP machine, which integrates with the Windows 7 desktop. Applications running in XP Mode look like any other Windows 7 application the only difference is the Windows XP Luna window look-and-feel.

The new version of XP Mode installs quickly, with a quick guide that walks users through installing and using XP applications. Applications install in a full Windows XP desktop, and then appear in the XP Mode section of the Windows 7 start menu. Regularly used applications now appear in a Task Bar jump list, along with tools for using USB devices with XP Mode applications.

Featured Resources

Application security fallacies and realities

Web application attacks are the most common vulnerability, so what is the truth about application security?

Download now

Your first step researching Managed File Transfer

Advice and expertise on researching the right MFT solution for your business

Download now

The KPIs you should be measuring

How MSPs can measure performance and evaluate their relationships with clients

Download now

Life in the digital workspace

A guide to technology and the changing concept of workspace

Download now

Most Popular

operating systems

17 Windows 10 problems - and how to fix them

4 Nov 2019
Domain Name System (DNS)

Microsoft embraces DNS over HTTPS to secure the web

19 Nov 2019
Business strategy

The pros and cons of net neutrality

4 Nov 2019
social media

Can Wikipedia founder's social network really challenge Facebook?

19 Nov 2019