Blog

By Eric Corcoran, Posted in Technology Week in Review

Monday 10/14 Cloud Guidepost: The benefits of Citrix Access Control Citrix Access Control enables IT admins to publish and secure access to SaaS applications. There are additional security features that can be enforced without the complexity of creating a GPO or policy in Citrix Studio. http://bit.ly/2q5s7V8 Threat Extraction – A Preventive Method for Document-Based Malware Threat Extraction is unique because it doesn’t rely on detection like most security solutions. Instead, it facilitates... read more.

  • October 18, 2019

By Eric Corcoran, Posted in Technology Week in Review

Tuesday 10/8 Citrix’s Chief Security Architect on how to avoid misconfiguration Misconfiguration risk can be efficiently managed by planning security before deployment, not as an afterthought. Planning ahead can greatly reduce misconfiguration risk at low cost and with moderate effort — a vital activity for such an important threat. http://bit.ly/2OvI8y2 McAfee To Debut New Partner Program Synced With Technology Vision The new training program will be tightly aligned with McAfee's corporate... read more.

  • October 11, 2019

By Eric Corcoran, Posted in Technology Week in Review

Monday 9/30 Most malspam contains a malicious URL these days, not file attachments If the majority of malspam content sent out these days leverages malicious links, this means operators are getting higher clickthroughs and infections when compared to the classic technique of attaching files to emails. https://zd.net/2mVWoVv IGEL’s new hardware design is on track for the EUC revolution The IGEL UD2 features a quad-core processor providing robust performance for use cases ranging from office applic... read more.

  • October 04, 2019

By Brian Wagner, Posted in Infrastructure, Virtualization

Microsoft has officially released their Desktop as a Service (DaaS) offering, dubbed Windows Virtual Desktop (WVD). There are some standout features of WVD, and as someone who’s been helping customers deliver Windows desktops and applications for 20 years, I feel a strong market momentum behind this offering. Microsoft is making WVD very attractive, starting with a unique multi-session version of Windows 10 which is only available in Azure through this offering and continuing with extended support for... read more.

  • October 01, 2019

By Eric Corcoran, Posted in Technology Week in Review

Monday 9/23 Now Available – EC2 Instances (G4) with NVIDIA T4 Tensor Core GPUs The instances are equipped with up to four NVIDIA T4 Tensor Core GPUs, each with 320 Turing Tensor cores, 2,560 CUDA cores, and 16 GB of memory. The T4 GPUs are ideal for machine learning inferencing, computer vision, video processing, and real-time speech & natural language processing. https://amzn.to/2l12uCP Pure Storage Named as a Leader in New Gartner Magic Quadrant for Primary Storage Pure Storage is deliverin... read more.

  • September 27, 2019

By Eric Corcoran, Posted in Technology Week in Review

Monday 9/16 F5 Networks: Application Lifecycle Focus Is Giving Partners A 'Bigger Piece Of The Pie’ Customers are constantly cycling through developing, deploying, operating and governing code, often across multiple cloud environments. It's a difficult process and the vast majority of customers doing it fast and at scale need help, said F5 Networks President and CEO François Locoh-Donou. http://bit.ly/2lST2l0 Mobile Security Flaw Leaves Android Smartphones Vulnerable to SMS Phishing Attacks... read more.

  • September 20, 2019

By Eric Corcoran, Posted in Technology Week in Review

Monday 9/9 Ransomware Protection and Containment Strategies: Practical Guidance for Endpoint Protection, Hardening, and Containment Ransomware is a global threat targeting organizations in all industries. The impact of a successful ransomware event can be material to an organization - including the loss of access to data, systems, and operational outages. http://bit.ly/2lEhh6y Malicious Android apps containing Joker malware set up shop on Google Play In total, the applications -- made available through... read more.

  • September 13, 2019

By Timothy Karl, Posted in Infrastructure, Support

A common issue I see in Citrix Virtual Apps and Desktops deployments is users who are unable to print to their local printers from Mac and Linux clients when using Citrix Universal Printer Driver (UPD ). The good news is, it is a very simple fix! Citrix UPD relies on a series of printer drivers to be installed on the VDA machine. When a client printer is mapped into a session, it is automatically mapped to one of these three drivers: The Citrix Universal Printer and Citrix XPS Universal Printer drivers... read more.

  • September 06, 2019

By Eric Corcoran, Posted in Technology Week in Review

Tuesday 9/3 Check Point Announces Enterprise Branch Office Security Powered by a Cloud Service With CloudGuard Connect and CloudGuard Edge, Check Point protects branch office connections to the cloud from sophisticated threats with dynamic scalability, intelligent provisioning and consistent control. http://bit.ly/2jX293D Citrix ADC: Always ready for public clouds Citrix ADC enables flexibility and control, helping businesses deploy applications on premises and on public clouds such as Amazon Web Servi... read more.

  • September 06, 2019

By Eric Corcoran, Posted in Technology Week in Review

Monday 8/26 Nvidia, VMware partner to offer virtualized GPUs The companies say it's the first hybrid cloud offering that lets enterprises use GPUs to accelerate AI, machine learning or deep learning workloads.  https://zd.net/2Hph6nm IRS Warns Taxpayers of New Scam Campaign Distributing Malware The emails contain a 'temporary password' or 'one-time password' to 'access' the files to submit the refund. But when taxpayers try to access these, it turns out to be a malicious file. http://bit.ly/2zqnC... read more.

  • August 30, 2019