Blog

By Eric Corcoran, Posted in Technology Week in Review

Monday 11/18 Citrix named a Leader in Unified Endpoint Management Citrix has been named a Leader in The Forrester Wave™: Unified Endpoint Management, Q4 2019 report. Over the past couple of years, we have specifically focused on improving employee experience by working directly with customers to develop a deep understanding of the challenges employees face. http://bit.ly/2CUvxgK The Future of Load Balancing Rests on Data Those requests are not always equal in terms of execution because data. That... read more.

  • November 22, 2019

By Eric Corcoran, Posted in Technology Week in Review

Monday 11/11 Proofpoint Q3 2019 Threat Report — Emotet’s return, RATs reign supreme, and more 15% of malicious payloads were remote access Trojans and 45% were banking Trojans, up from 6% and 23% in Q2 2019, respectively. http://bit.ly/2rqZ5js US Govt Asks Users to Be Wary of Holiday Scams and Malware "As this holiday season approaches, the Cybersecurity and Infrastructure Security Agency (CISA) encourages users to be aware of potential holiday scams and malicious cyber campaigns, particula... read more.

  • November 15, 2019

By Eric Corcoran, Posted in Technology Week in Review

Monday 11/4 Proofpoint acquires insider threat intelligence firm ObserveIT in $225 million deal ObserveIT provides solutions for real-time enterprise network management, alerts when suspicious behavior is detected, and also assists firms in cybersecurity-related legal compliance. https://zd.net/2WDejO2 Coming Soon: New NetApp integrations Veeam Availability Orchestrator v2 brings brand new DR possibilities – including the ability to achieve real DR from backups – with extreme operational ef... read more.

  • November 08, 2019

By Eric Corcoran, Posted in Technology Week in Review

Monday 10/28 Cisco Research Shows IT Eager to Adopt Artificial Intelligence, Intent-based Networking IT leaders expect new wireless technologies, IoT and AI-enabled operations, threat detection and remediation to have the biggest impact on their network strategy and design over the next five years. http://bit.ly/2qRrAXp PCI DSS Updates The PCI DSS Council recently announced that a new standard for commercial off the shelf (COTS) mobile devices, PCI Contactless Payments on COTS (CPoC™) mobile devi... read more.

  • November 01, 2019

By Nancy Rand, Posted in Security

The PCI DSS Council recently announced that a new standard for commercial off the shelf (COTS) mobile devices, PCI Contactless Payments on COTS (CPoC™) mobile devices, is to be released in December 2019. The current PCI DSS standard covers contactless payment methods, but the new publication provides detail on the mobile payment options. On October 28, the council is releasing an RFC on PCI DSS version 4.0 to assessors to provide feedback on the draft of the new version. New and revised requirements... read more.

  • October 28, 2019

By Eric Corcoran, Posted in Technology Week in Review

Monday 10/21 Cloud Guidepost: Take control of user access with Citrix Cloud Access control helps prevent confidential information like customer data, personally identifiable information (PII), and intellectual property from falling into the wrong hands. It’s particularly important if your organization has a hybrid-cloud environment, where apps and data reside both on premises and in the cloud http://bit.ly/2qx5n0E How to Adopt a Threat Prevention Approach to Cybersecurity Organizations need to ad... read more.

  • October 25, 2019

By Eric Corcoran, Posted in Technology Week in Review

Monday 10/14 Cloud Guidepost: The benefits of Citrix Access Control Citrix Access Control enables IT admins to publish and secure access to SaaS applications. There are additional security features that can be enforced without the complexity of creating a GPO or policy in Citrix Studio. http://bit.ly/2q5s7V8 Threat Extraction – A Preventive Method for Document-Based Malware Threat Extraction is unique because it doesn’t rely on detection like most security solutions. Instead, it facilitates... read more.

  • October 18, 2019

By Eric Corcoran, Posted in Technology Week in Review

Tuesday 10/8 Citrix’s Chief Security Architect on how to avoid misconfiguration Misconfiguration risk can be efficiently managed by planning security before deployment, not as an afterthought. Planning ahead can greatly reduce misconfiguration risk at low cost and with moderate effort — a vital activity for such an important threat. http://bit.ly/2OvI8y2 McAfee To Debut New Partner Program Synced With Technology Vision The new training program will be tightly aligned with McAfee's corporate... read more.

  • October 11, 2019

By Eric Corcoran, Posted in Technology Week in Review

Monday 9/30 Most malspam contains a malicious URL these days, not file attachments If the majority of malspam content sent out these days leverages malicious links, this means operators are getting higher clickthroughs and infections when compared to the classic technique of attaching files to emails. https://zd.net/2mVWoVv IGEL’s new hardware design is on track for the EUC revolution The IGEL UD2 features a quad-core processor providing robust performance for use cases ranging from office applic... read more.

  • October 04, 2019

By Brian Wagner, Posted in Infrastructure, Virtualization

Microsoft has officially released their Desktop as a Service (DaaS) offering, dubbed Windows Virtual Desktop (WVD). There are some standout features of WVD, and as someone who’s been helping customers deliver Windows desktops and applications for 20 years, I feel a strong market momentum behind this offering. Microsoft is making WVD very attractive, starting with a unique multi-session version of Windows 10 which is only available in Azure through this offering and continuing with extended support for... read more.

  • October 01, 2019