Visit Our Sponsors
To meet the corporate compliance requirements, users are required to access a ‘Business Application’ within Amazon WorkSpaces from corporate endpoints only. This video is from the fine folks at deviceTRUST.
To meet the corporate compliance requirements, users are required to access the ‘Business Application’ within Amazon WorkSpaces if the endpoint uses a validated network connection. This video is from the fine folks at deviceTRUST.
To meet the corporate security requirements, users are required to access Amazon WorkSpaces if the endpoint uses a secure WPA2 or WPA3 encrypted Wi-Fi connection. This video is from the fine folks at deviceTRUST.
To meet the corporate compliance requirements, users are required to access Amazon WorkSpaces if the endpoint uses a validated network connection. This video is from the fine folks at deviceTRUST.
Have you ever wondered what Citrix does to ensure the released versions of XenApp and XenDesktop remain compatible with various third-party software updates from vendors like Microsoft, VMWare, or Adobe? As you may know, our technology leverages, relies upon, inter-operates with, and supports software; such as Microsoft Windows operating systems, Microsoft Office, Microsoft SQL, Microsoft […]
The recently reported hack of LabCorp – one of the largest blood testing labs in the U.S. – has raised some legitimate questions about the defense strategies of corporations in an era when cyber attacks can happen at any time. While there are probably many factors that led to the attack, it’s worth focusing on […]
dinCloud, a digital transformation platform that offers hosted workspaces and cloud infrastructure, has been announced as the first CSP to join the Citrix Ready Program. dinCloud is a Cloud Services Provider (CSP) that helps organizations rapidly migrate to the cloud through a strong network of Value Added Resellers (VARs) and Managed Service Providers (MSPs). Each customer’s […]
This should delight all of the wordsmiths and Jeopardy! fans out there: the word “hack” dates back to the 12th century, and derives from the Old English word “tohaccian”, which means “to hack to pieces”. Riveting, huh? OK…maybe not. But these days, there is another usage of the word “hack” that is very captivating and attention-grabbing, […]
With the release of Remote Desktop modern infrastructure (RDmi) around the corner and Microsoft Inspire just having finished, there’s a lot of discussion around migrating to RDmi environments. RDmi is a new PaaS offering that’s viewed as a redesign of the familiar RDS. This new offering has many new features and security settings including a […]
The concept of hybrid is very, very misunderstood. Hybrid is not the compromise of “avoiding the cloud” vs. “going all-in on cloud”. Hybrid is not the curse of carrying legacy baggage into modern service delivery architectures. Hybrid is also so much more than just a choice of resource location. Most surprisingly, hybrid is not just for clouds. Whether hybrid […]
Once called the virtualization king, VMware is now known as a cloud king. How did that shift happen, and what is the tech giant’s strategy? Chris Wolf, VMware vice president and CTO of global field and industry, sheds light on the evolution of VMware into a global leader in cloud infrastructure and services. Read his […]
Devolutions Password Server (DPS) is a secure password management solution designed for you and your entire team. System administrators will love how easy it is to set up layers of security, reporting tools, and privileged access management, and end-users will find the web interface simple and intuitive. Now teams can have the power of one […]