Home Search Results for ""

Amazon WorkSpaces – Conditional application access from a validated network Video

deviceTRUST

To meet the corporate compliance requirements, users are required to access the ‘Business Application’ within Amazon WorkSpaces if the endpoint uses a validated network connection. This video is from the fine folks at deviceTRUST.

Amazon WorkSpaces – Conditional access from a secure WPA2 or WPA3 encrypted Wi-Fi connection Video

deviceTRUST

To meet the corporate security requirements, users are required to access Amazon WorkSpaces if the endpoint uses a secure WPA2 or WPA3 encrypted Wi-Fi connection. This video is from the fine folks at deviceTRUST.

5 Reasons Why You Shouldn’t Use Remote Desktop Manager (Vlog)

Devolutions

Pfffftttt – who needs a password management solution? I mean, I can totally remember all my passwords and manage everything myself. And anyway, I will never, ever get hacked! So why use Remote Desktop Manager? I’d just be throwing money away. Instead, I could spend it on more important things this muggy summer, like going […]

Amazon WorkSpaces – Conditional access from endpoints that are not virtualized Video

deviceTRUST

To meet the corporate compliance requirements, users must not access Amazon WorkSpaces from an endpoint that is virtualized. This video is from the fine folks at deviceTRUST.

Configuring Devolutions Web Login with Devolutions Password Server

Devolutions

Devolutions Web Login (DWL) helps you easily create, securely store and auto-fill your login credentials and passwords to any website directly from your web browser. This video will show you how to set up DWL with Devolutions Password Server in just a few steps. Devolutions Web Login is free to use but does require either […]

Amazon WorkSpaces – Conditional access from a validated network Video

deviceTRUST

To meet the corporate compliance requirements, users are required to access Amazon WorkSpaces if the endpoint uses a validated network connection. This video is from the fine folks at deviceTRUST.

Citrix: XenApp & XenDesktop and Third-Party Software in Harmony!

Citrix Systems

Have you ever wondered what Citrix does to ensure the released versions of XenApp and XenDesktop remain compatible with various third-party software updates from vendors like Microsoft, VMWare, or Adobe? As you may know, our technology leverages, relies upon, inter-operates with, and supports software; such as Microsoft Windows operating systems, Microsoft Office, Microsoft SQL, Microsoft […]

Citrix: Reliable, cost-effective Workspace connectivity – Part 3

Citrix Systems

In last week’s installment of my blog series on reliable, cost-effective connectivity with Citrix Workspace, we uncovered a multitude of benefits from using Citrix SD-WAN between office locations and the data center VDA (Virtual Delivery Agent) servers used to deliver Virtual Apps & Desktops. This week, let’s look at how those benefits extend to VDAs […]

Understanding Remote Desktop Protocol Threats (vlog)

Devolutions

The recently reported hack of LabCorp – one of the largest blood testing labs in the U.S. – has raised some legitimate questions about the defense strategies of corporations in an era when cyber attacks can happen at any time. While there are probably many factors that led to the attack, it’s worth focusing on […]

Amazon WorkSpaces – Conditional access from a secure endpoint Video

deviceTRUST

To meet the corporate compliance requirements, users are required to access Amazon WorkSpaces from secure endpoints only. This video is from the fine folks at deviceTRUST.

Citrix: dinCloud, first to join the Citrix Ready CSP Program

Citrix Systems

dinCloud, a digital transformation platform that offers hosted workspaces and cloud infrastructure, has been announced as the first CSP to join the Citrix Ready Program. dinCloud is a Cloud Services Provider (CSP) that helps organizations rapidly migrate to the cloud through a strong network of Value Added Resellers (VARs) and Managed Service Providers (MSPs). Each customer’s […]

Are You Being Hacked? 10 Signs to Watch For

Devolutions

This should delight all of the wordsmiths and Jeopardy! fans out there: the word “hack” dates back to the 12th century, and derives from the Old English word “tohaccian”, which means “to hack to pieces”. Riveting, huh? OK…maybe not. But these days, there is another usage of the word “hack” that is very captivating and attention-grabbing, […]

RDmi Is Coming. Here’s How Personas Can Help You Prepare

Lakeside Software

With the release of Remote Desktop modern infrastructure (RDmi) around the corner and Microsoft Inspire just having finished, there’s a lot of discussion around migrating to RDmi environments. RDmi is a new PaaS offering that’s viewed as a redesign of the familiar RDS. This new offering has many new features and security settings including a […]

Citrix: Is Hybrid a Compromise, a Curse – or a Competitive Advantage?

Citrix Systems

The concept of hybrid is very, very misunderstood. Hybrid is not the compromise of “avoiding the cloud” vs. “going all-in on cloud”.  Hybrid is not the curse of carrying legacy baggage into modern service delivery architectures. Hybrid is also so much more than just a choice of resource location. Most surprisingly, hybrid is not just for clouds. Whether hybrid […]


Visit Our Sponsors

Close
:)