Security news and support resources, featuring the hottest solutions, technologies and vendors in the Security world. Use the powerful checkbox-driven menu to fine-tune the results to exactly what you are looking for in seconds!

Home Security

Security

Amazon WorkSpaces – Conditional application access from a validated network Video

deviceTRUST
To meet the corporate compliance requirements, users are required to access the ‘Business Application’ within Amazon WorkSpaces if the endpoint uses a validated network connection. This video is from the fine folks at deviceTRUST.

Amazon WorkSpaces – Conditional access from a secure WPA2 or WPA3 encrypted Wi-Fi connection Video

deviceTRUST
To meet the corporate security requirements, users are required to access Amazon WorkSpaces if the endpoint uses a secure WPA2 or WPA3 encrypted Wi-Fi connection. This video is from the fine folks at deviceTRUST.

Amazon WorkSpaces – Conditional access from endpoints that are not virtualized Video

deviceTRUST
To meet the corporate compliance requirements, users must not access Amazon WorkSpaces from an endpoint that is virtualized. This video is from the fine folks at deviceTRUST.

Amazon WorkSpaces – Conditional access from a validated network Video

deviceTRUST
To meet the corporate compliance requirements, users are required to access Amazon WorkSpaces if the endpoint uses a validated network connection. This video is from the fine folks at deviceTRUST.

Citrix: XenApp & XenDesktop and Third-Party Software in Harmony!

Citrix Systems
Have you ever wondered what Citrix does to ensure the released versions of XenApp and XenDesktop remain compatible with various third-party software updates from vendors like Microsoft, VMWare, or Adobe? As you may know, our technology leverages, relies upon, inter-operates with, and supports software; such as Microsoft Windows operating systems, Microsoft Office, Microsoft SQL, Microsoft […]

Understanding Remote Desktop Protocol Threats (vlog)

Devolutions
The recently reported hack of LabCorp – one of the largest blood testing labs in the U.S. – has raised some legitimate questions about the defense strategies of corporations in an era when cyber attacks can happen at any time. While there are probably many factors that led to the attack, it’s worth focusing on […]

Amazon WorkSpaces – Conditional access from a secure endpoint Video

deviceTRUST
To meet the corporate compliance requirements, users are required to access Amazon WorkSpaces from secure endpoints only. This video is from the fine folks at deviceTRUST.

Citrix: dinCloud, first to join the Citrix Ready CSP Program

Citrix Systems
dinCloud, a digital transformation platform that offers hosted workspaces and cloud infrastructure, has been announced as the first CSP to join the Citrix Ready Program. dinCloud is a Cloud Services Provider (CSP) that helps organizations rapidly migrate to the cloud through a strong network of Value Added Resellers (VARs) and Managed Service Providers (MSPs). Each customer’s […]

Are You Being Hacked? 10 Signs to Watch For

Devolutions
This should delight all of the wordsmiths and Jeopardy! fans out there: the word “hack” dates back to the 12th century, and derives from the Old English word “tohaccian”, which means “to hack to pieces”. Riveting, huh? OK…maybe not. But these days, there is another usage of the word “hack” that is very captivating and attention-grabbing, […]

RDmi Is Coming. Here’s How Personas Can Help You Prepare

Lakeside Software
With the release of Remote Desktop modern infrastructure (RDmi) around the corner and Microsoft Inspire just having finished, there’s a lot of discussion around migrating to RDmi environments. RDmi is a new PaaS offering that’s viewed as a redesign of the familiar RDS. This new offering has many new features and security settings including a […]

Citrix: Is Hybrid a Compromise, a Curse – or a Competitive Advantage?

Citrix Systems
The concept of hybrid is very, very misunderstood. Hybrid is not the compromise of “avoiding the cloud” vs. “going all-in on cloud”.  Hybrid is not the curse of carrying legacy baggage into modern service delivery architectures. Hybrid is also so much more than just a choice of resource location. Most surprisingly, hybrid is not just for clouds. Whether hybrid […]

VMware CTO Talks Innovations in Cloud Tech – Hints What’s Next

VMware
Once called the virtualization king, VMware is now known as a cloud king. How did that shift happen, and what is the tech giant’s strategy? Chris Wolf, VMware vice president and CTO of global field and industry, sheds light on the evolution of VMware into a global leader in cloud infrastructure and services. Read his […]

Introduction to Devolutions Password Server

Devolutions
Devolutions Password Server (DPS) is a secure password management solution designed for you and your entire team. System administrators will love how easy it is to set up layers of security, reporting tools, and privileged access management, and end-users will find the web interface simple and intuitive. Now teams can have the power of one […]

Understanding Remote Desktop Protocol Threats

Devolutions
The recently reported hack of LabCorp – one of the largest blood testing labs in the U.S. – has raised some legitimate questions about the defense strategies of corporations in an era when cyber attacks can happen at any time. While there are probably many factors that led to the attack, it’s worth focusing on […]

Visit Our Sponsors

Close