Articles In Technology Week in Review

By Eric Corcoran, Posted in Technology Week in Review

Monday 3/1 NSA Releases Guidance on Zero Trust Security Model CISA encourages administrators and organizations review NSA’s guidance on Embracing a Zero Trust Security Model to help secure sensitive data, systems, and services. http://bit.ly/3sxsOS0 Cloud Kickoff Guide: Starting your cloud journey on the right foot (Citrix) We saw an opportunity to condense the basic, foundational information all our Citrix Cloud customers need into a single resource — almost like a pre-planning guide &mdas... read more.

  • March 05, 2021

By Eric Corcoran, Posted in Technology Week in Review

Monday 2/22 Cisco Completes Acquisition of IMImobile PLC By combining IMImobile's solution with Webex Contact Center, Cisco will be able to provide a robust Customer Experience as a Service (CXaaS) offer. http://prn.to/3upfctR Citrix Endpoint Management named a 2021 Gartner Peer Insights Customers’ Choice Citrix Endpoint Management receive an overall rating of 4.5/5.0 stars based on 101 reviews within the Peer Insights category for Unified Endpoint Management, again based on feedback from you, ou... read more.

  • February 26, 2021

By Eric Corcoran, Posted in Technology Week in Review

Monday 2/15 Press #1 to Play: A Look Into eCrime Menu-style Toolkits (Crowdstrike) The increasing availability of eCrime “syndication” models proliferating Ransomware as a Service (RaaS) programs grew in popularity as a threat vector and is one of the reasons behind the increasing volume of activity, allowing more novice threat actors to capitalize on the advanced skills of criminal malware developers and move from opportunistic breaches to targeted BGH ransomware campaigns. http://bit.ly/37g... read more.

  • February 19, 2021

By Eric Corcoran, Posted in Technology Week in Review

Monday 2/1 Prisma Access Is the Leading Cloud Service to Secure Remote Users (Palo Alto Networks) We are excited that Prisma Access by Palo Alto Networks was the leading cloud-delivered security app by monthly active users, as well as by number of organizations. http://bit.ly/3tAQmH7 How a successful phishing attack can hurt your organization A successful phishing campaign can damage an organization in more ways than one. A report released Sunday by security provider Proofpoint looks at the impact of a... read more.

  • February 12, 2021

By Eric Corcoran, Posted in Technology Week in Review

Tuesday 2/2 What’s new with Citrix Workspace – January 2021 We expect to see continued growth in secure, flexible work with a emphasis on maximizing employee experience against a growing number of work variables such as location, device type, device profile, line-of-business (LOB) technology requirements, and more. http://bit.ly/39FWUMN IoT Firmware Security: Zero-Day Exploitation & Prevention (Check Point) Understanding IoT firmware security will help protect against device attacks tha... read more.

  • February 05, 2021

By Eric Corcoran, Posted in Technology Week in Review

Monday 1/25 Pure Storage Recognized as a Leader in Enterprise Flash Array Storage Category Pure is consistently recognized by its customers as this also marks the sixth consecutive year the company has maintained its market-leading NPS score in the top one-percent of Medallia-benchmarked B2B scores while scaling the business. http://prn.to/2YcfGER FireEye releases tool for auditing networks for techniques used by SolarWinds hackers Together with the report, FireEye researchers have also released a free... read more.

  • January 29, 2021

By Eric Corcoran, Posted in Technology Week in Review

Monday 1/18 Using Citrix ADM to speed up Citrix ADC pooled capacity configuration (Citrix) Configurations jobs can be created in Citrix ADM to automate the configuration of selected individual (or groups of) Citrix ADC instances. http://bit.ly/3bQv7uA Ransomware reveals the hidden weakness of our big tech world A group of tech companies including Microsoft, Citrix and FireEye are working on a three-month project to come up with options that they promise will "significantly mitigate" the ransomware thre... read more.

  • January 22, 2021

By Eric Corcoran, Posted in Technology Week in Review

Monday 1/11 F5 to Acquire Volterra to Create the First Edge 2.0 Platform for Enterprises and Service Providers Volterra enables a new Edge 2.0 open edge platform that will transform F5’s leadership position in enterprise application security and delivery, addressing the challenges inherent with first-generation edge solutions. http://bit.ly/3ozVNDk Meet Challenges with an Agile Infrastructure (Pure Storage) With the expedited pace of operations, it’s critical to maintain the performance of... read more.

  • January 15, 2021

By Eric Corcoran, Posted in Technology Week in Review

Monday 1/4 Combatting BEC and EAC: How Security Awareness Can Help You Tackle Business Email Compromise (Proofpoint) 86% of organizations reported experiencing business email compromise, with most organizations reporting multiple attacks. These attacks are getting more sophisticated each year—so how can you prepare your users for the potential attack that slips by perimeter defenses? http://bit.ly/358i57s 2020 – A Paradigm Shift for VDI and the Edge (IGEL) WFH dominated the end user computi... read more.

  • January 08, 2021

By Eric Corcoran, Posted in Technology Week in Review

Monday 12/14 Citrix joins the Modern Computing Alliance We are excited to work with our fellow members of the Modern Computing Alliance to influence how the future of work gets done and reinforce our commitment to customer success with more integrated and innovative solutions across the silicon-to-cloud stack. https://bit.ly/388mzvI Best-in-Class Storage for Modern Unstructured Data (Pure Storage) FlashBlade’s modern architecture has the innovation lead, with more to come. Companies need modern s... read more.

  • December 18, 2020