Articles by 'Eric Corcoran'

Blog Author - Eric Corcoran

By Eric Corcoran, Posted in Technology Week in Review

Monday 12/23 Cloud Mobility using Nutanix Move (via Nutanix) Available to all Nutanix customers, Move 3.4 will support moving VMs back and forth between Nutanix AHV and AWS. With this capability, you can move your running applications across completely different infrastructure stacks/clouds with very minimal downtime and zero manual efforts. http://bit.ly/2Q8wXdK Announcing the Citrix Virtual Apps and Desktops 1912 LTSR (via Citrix) The Citrix Virtual Apps and Desktops 7 1912 Long-Term Service Release... read more.

  • January 10, 2020

By Eric Corcoran, Posted in Technology Week in Review

Monday 12/16 The Urgent Need for Network Security It’s clear that state-of-the-art firewall technology has reached new pinnacles of real-time threat intelligence and security, working to protect entire enterprises including data center, mobile, endpoint, cloud and IoT. http://bit.ly/2LZHczD Rubrik Intelligent Data Tiering Helps Customers Optimize Microsoft Azure Storage Consumption The intelligence and logic that is built into Rubrik’s Instant Tiering and Smart Tiering technologies will hel... read more.

  • December 20, 2019

By Eric Corcoran, Posted in Technology Week in Review

Monday 12/2 Build an Enterprise-grade Hybrid Cloud with Pure on AWS Pure and AWS got together to help provide enterprises with a consistent data layer across their on-premises and cloud environments. This consistent data layer with consistent data services and APIs is now possible with Pure Storage Cloud Data Services. http://bit.ly/2Y6TZVO SOC Efficiency Improving Thanks to SOAR SOAR solutions help security analysts with the complete visibility of the cyber campaign delivered as a unified dashboard. R... read more.

  • December 13, 2019

By Eric Corcoran, Posted in Technology Week in Review

Monday 11/18 Citrix named a Leader in Unified Endpoint Management Citrix has been named a Leader in The Forrester Wave™: Unified Endpoint Management, Q4 2019 report. Over the past couple of years, we have specifically focused on improving employee experience by working directly with customers to develop a deep understanding of the challenges employees face. http://bit.ly/2CUvxgK The Future of Load Balancing Rests on Data Those requests are not always equal in terms of execution because data. That... read more.

  • November 22, 2019

By Eric Corcoran, Posted in Technology Week in Review

Monday 11/11 Proofpoint Q3 2019 Threat Report — Emotet’s return, RATs reign supreme, and more 15% of malicious payloads were remote access Trojans and 45% were banking Trojans, up from 6% and 23% in Q2 2019, respectively. http://bit.ly/2rqZ5js US Govt Asks Users to Be Wary of Holiday Scams and Malware "As this holiday season approaches, the Cybersecurity and Infrastructure Security Agency (CISA) encourages users to be aware of potential holiday scams and malicious cyber campaigns, particula... read more.

  • November 15, 2019

By Eric Corcoran, Posted in Technology Week in Review

Monday 11/4 Proofpoint acquires insider threat intelligence firm ObserveIT in $225 million deal ObserveIT provides solutions for real-time enterprise network management, alerts when suspicious behavior is detected, and also assists firms in cybersecurity-related legal compliance. https://zd.net/2WDejO2 Coming Soon: New NetApp integrations Veeam Availability Orchestrator v2 brings brand new DR possibilities – including the ability to achieve real DR from backups – with extreme operational ef... read more.

  • November 08, 2019

By Eric Corcoran, Posted in Technology Week in Review

Monday 10/28 Cisco Research Shows IT Eager to Adopt Artificial Intelligence, Intent-based Networking IT leaders expect new wireless technologies, IoT and AI-enabled operations, threat detection and remediation to have the biggest impact on their network strategy and design over the next five years. http://bit.ly/2qRrAXp PCI DSS Updates The PCI DSS Council recently announced that a new standard for commercial off the shelf (COTS) mobile devices, PCI Contactless Payments on COTS (CPoC™) mobile devi... read more.

  • November 01, 2019

By Eric Corcoran, Posted in Technology Week in Review

Monday 10/21 Cloud Guidepost: Take control of user access with Citrix Cloud Access control helps prevent confidential information like customer data, personally identifiable information (PII), and intellectual property from falling into the wrong hands. It’s particularly important if your organization has a hybrid-cloud environment, where apps and data reside both on premises and in the cloud http://bit.ly/2qx5n0E How to Adopt a Threat Prevention Approach to Cybersecurity Organizations need to ad... read more.

  • October 25, 2019

By Eric Corcoran, Posted in Technology Week in Review

Monday 10/14 Cloud Guidepost: The benefits of Citrix Access Control Citrix Access Control enables IT admins to publish and secure access to SaaS applications. There are additional security features that can be enforced without the complexity of creating a GPO or policy in Citrix Studio. http://bit.ly/2q5s7V8 Threat Extraction – A Preventive Method for Document-Based Malware Threat Extraction is unique because it doesn’t rely on detection like most security solutions. Instead, it facilitates... read more.

  • October 18, 2019

By Eric Corcoran, Posted in Technology Week in Review

Tuesday 10/8 Citrix’s Chief Security Architect on how to avoid misconfiguration Misconfiguration risk can be efficiently managed by planning security before deployment, not as an afterthought. Planning ahead can greatly reduce misconfiguration risk at low cost and with moderate effort — a vital activity for such an important threat. http://bit.ly/2OvI8y2 McAfee To Debut New Partner Program Synced With Technology Vision The new training program will be tightly aligned with McAfee's corporate... read more.

  • October 11, 2019