Security news and support resources, featuring the hottest solutions, technologies and vendors in the Security world. Use the powerful checkbox-driven menu to fine-tune the results to exactly what you are looking for in seconds!

Home Security

Security

deviceTRUST Contextual Security – Use Case (Conditional Access based on Security State) Video

deviceTRUST
0
We show how the status of the security components on the endpoint (firewall, anti-spyware, anti-virus, Windows updates, etc.) can be used to control access to the virtual session. This video is from the fine folks at deviceTRUST.

What Price Data Protection?

DataCore
0
Andy Spencer, Solution Architect, DataCore Software, considers how RAID adoption in Flash doesn’t necessarily fit all. While it is undeniable that prudent organisations should take every possible step to protect their data, it’s worth questioning at what level and at what associated overhead should that protection take? Do the traditional ways of thinking about resilience […]

Bromium introduces one-click use case deployment in Secure Platform 4.1

Bromium
0
Prioritize security around common customer pain points with targeted use case deployment Run native Chrome on the host for low-risk browsing while safely isolating web file downloads Transform raw data into actionable security insights with interactive dashboards and reports Virtualization-based security has changed the way organizations approach the idea of protecting their intellectual property from […]

deviceTRUST Contextual Security – Use Case (Auto Update) Video

deviceTRUST
0
We show how the deviceTRUST client on the endpoint can be automatically updated to the latest version without any user interaction. This video is from the fine folks at deviceTRUST.

Analyzing and Monitoring the Citrix Digital Workspace: What are My Built-in Options? Why Do I Need Third-Party Monitoring Tools?

Christiaan Brinkhoff
0
From an IT perspective – you always want to gather statistics to get better insights into what happens in your Workspace environment. Administrators are responsible for the performance and need to track faults proactively. Next, to performance monitoring tools, analytics comes in place – which is a new approach to analyzing the end-user behavior on […]

HCI or Not? Understand the Datrium solution in a 3 minutes read

As a newer market player that implements a game-changing architecture that accelerates applications, simplifies infrastructure management, and combine data protection in a single solution I am frequently asked what precisely Datrium does, and if Datrium is HCI or not. Is Datrium HCI or Not? A duality dilemma. If you view HCI as being the physical […]

Is It Time to Rethink Privileged Access Management?

Devolutions
0
Privileged Access Management (PAM) helps organizations achieve two key objectives: restricting access to privileged accounts and maintaining compliance. PAM is especially vital these days because, in many organizations, the number of user accounts with administrative access to critical systems is greater than the total number of employees. What’s more, 8 out of 10 breaches are […]

Wayk Now vs. TeamViewer

Devolutions
0
Since launching Wayk Now, we’ve received several inquiries about how it compares to other popular remote access solutions, such as TeamViewer, Bomgar and LogMeIn. Ask and ye shall receive, my wonderful friends! Today, I’ll start by looking at Wayk Now vs. TeamViewer, and then in future articles I’ll cover Bomgar and LogMeIn. As Michael Buffer […]

deviceTRUST Contextual Security – Use Case (Secure Screen Saver) Video

deviceTRUST
0
We show how the screen saver settings on the remote device can be used to dynamically define a secure screen saver within the virtual session. This video is from the fine folks at deviceTRUST.

Beware of the catch-22 when setting up Google security

This morning I went to a party my daughter had organised the day before. Lot’s of youngsters, teenagers and students, around with their mobiles. Party went on all night long and when I arrived to were cleaning up. A few of the young guys were wandering around looking and asked for a computer. As I […]

Citrix and utilizing it with EMS and Azure AD Joined Devices

IT Blog by Marius Sandbu
0
This is based upon a session that I presented at Citrix User Group Ireland and you can view the SlideShare presentation here –> https://www.slideshare.net/mariussandbu/citrix-with-microsoft-ems but the session was about, how can we leverage Citrix with EMS ( Enterprise Mobility and Security) and also shows the configuration for Citrix FAS together with Azure AD. Now the focus […]

DataCore Awarded Patent for its Data Protection Architecture

DataCore
0
Technology Enables Unique Capabilities in DataCore’s Software-Defined Storage Solutions, including Continuous Data Protection and Random Write Accelerator DataCore Software announced today that it has been awarded a patent for stream architecture for data representation. The patent covers DataCore’s general data representation architecture that enables unique capabilities in its software-defined storage solutions, including continuous data protection […]

June Poll Results: How Do You Get Ready for Your Vacation?

Devolutions
0
Hi everyone. By the time you read this, I’ll be on holiday! And this year, I’ll be even more prepared than ever thanks to your great responses to our June poll question, where we asked for your advice on how you get ready to go on vacation. Your Tips & Tricks There were many great […]

A Review of Citrix Analytics

IT Blog by Marius Sandbu
0
This post is also based on a session I had at Citrix User Group about Citrix Analytics. Now even though that Citrix Analytics is still not released and I did a lot of research about the product in advance. So in this post, I will go into a bit of depth about the product and […]

Visit Our Sponsors

Close