Visit Our Sponsors
We show how the status of the security components on the endpoint (firewall, anti-spyware, anti-virus, Windows updates, etc.) can be used to control access to the virtual session. This video is from the fine folks at deviceTRUST.
Andy Spencer, Solution Architect, DataCore Software, considers how RAID adoption in Flash doesn’t necessarily fit all. While it is undeniable that prudent organisations should take every possible step to protect their data, it’s worth questioning at what level and at what associated overhead should that protection take? Do the traditional ways of thinking about resilience […]
Prioritize security around common customer pain points with targeted use case deployment Run native Chrome on the host for low-risk browsing while safely isolating web file downloads Transform raw data into actionable security insights with interactive dashboards and reports Virtualization-based security has changed the way organizations approach the idea of protecting their intellectual property from […]
Analyzing and Monitoring the Citrix Digital Workspace: What are My Built-in Options? Why Do I Need Third-Party Monitoring Tools?
From an IT perspective – you always want to gather statistics to get better insights into what happens in your Workspace environment. Administrators are responsible for the performance and need to track faults proactively. Next, to performance monitoring tools, analytics comes in place – which is a new approach to analyzing the end-user behavior on […]
As a newer market player that implements a game-changing architecture that accelerates applications, simplifies infrastructure management, and combine data protection in a single solution I am frequently asked what precisely Datrium does, and if Datrium is HCI or not. Is Datrium HCI or Not? A duality dilemma. If you view HCI as being the physical […]
Privileged Access Management (PAM) helps organizations achieve two key objectives: restricting access to privileged accounts and maintaining compliance. PAM is especially vital these days because, in many organizations, the number of user accounts with administrative access to critical systems is greater than the total number of employees. What’s more, 8 out of 10 breaches are […]
Since launching Wayk Now, we’ve received several inquiries about how it compares to other popular remote access solutions, such as TeamViewer, Bomgar and LogMeIn. Ask and ye shall receive, my wonderful friends! Today, I’ll start by looking at Wayk Now vs. TeamViewer, and then in future articles I’ll cover Bomgar and LogMeIn. As Michael Buffer […]
We show how the screen saver settings on the remote device can be used to dynamically define a secure screen saver within the virtual session. This video is from the fine folks at deviceTRUST.
This morning I went to a party my daughter had organised the day before. Lot’s of youngsters, teenagers and students, around with their mobiles. Party went on all night long and when I arrived to were cleaning up. A few of the young guys were wandering around looking and asked for a computer. As I […]
This is based upon a session that I presented at Citrix User Group Ireland and you can view the SlideShare presentation here –> https://www.slideshare.net/mariussandbu/citrix-with-microsoft-ems but the session was about, how can we leverage Citrix with EMS ( Enterprise Mobility and Security) and also shows the configuration for Citrix FAS together with Azure AD. Now the focus […]
Technology Enables Unique Capabilities in DataCore’s Software-Defined Storage Solutions, including Continuous Data Protection and Random Write Accelerator DataCore Software announced today that it has been awarded a patent for stream architecture for data representation. The patent covers DataCore’s general data representation architecture that enables unique capabilities in its software-defined storage solutions, including continuous data protection […]
Hi everyone. By the time you read this, I’ll be on holiday! And this year, I’ll be even more prepared than ever thanks to your great responses to our June poll question, where we asked for your advice on how you get ready to go on vacation. Your Tips & Tricks There were many great […]
This post is also based on a session I had at Citrix User Group about Citrix Analytics. Now even though that Citrix Analytics is still not released and I did a lot of research about the product in advance. So in this post, I will go into a bit of depth about the product and […]