This Week in Technology

This Week in Technology

By Eric Corcoran
Posted in Technology Week in Review
On October 18, 2019

Monday 10/14

Cloud Guidepost: The benefits of Citrix Access Control

Citrix Access Control enables IT admins to publish and secure access to SaaS applications. There are additional security features that can be enforced without the complexity of creating a GPO or policy in Citrix Studio.

http://bit.ly/2q5s7V8

Threat Extraction – A Preventive Method for Document-Based Malware

Threat Extraction is unique because it doesn’t rely on detection like most security solutions. Instead, it facilitates true zero-day prevention, while delivering files to users quickly.

http://bit.ly/2qd7NBs

Tuesday 10/15

Veeam Named a Leader in the Gartner 2019 Magic Quadrant for Data Center Backup and Recovery Solutions For Third Successive Time

This recognition validates Veeam’s investment in delivering a complete Cloud Data Management portfolio to its customers and partners, fused with robust support that ensures data protection across physical, virtual and cloud environments.

https://bwnews.pr/2nSxVRm

F5 and Intel: Accelerating Applications Anywhere

Intel has named F5 as a 2019 Leaders Board partner in the Intel® Network Builders program. Our strategic partnership with Intel has, for more than 15 years, enabled F5 to use Intel technology to deliver optimized, highly performant application services for both enterprises and service providers.

http://bit.ly/2BcW8F5

Wednesday 10/16

Symantec Introduces Symantec Endpoint Security – A Single Solution That Eliminates Complexity and Stops Even the Most Stealthy Attacks

Symantec Endpoint Security is uniquely equipped to actively reduce the attack surface, eliminating the threat of serious attacks like targeted ransomware. And SES gives customers complete visibility into attacker activity on the device, leveraging cloud analytics that can spot the most hidden targeted activity.

https://bwnews.pr/2MNUsXM

Threat Actor Profile: TA407, the Silent Librarian

Like many educational phishing attacks, campaigns associated with TA407 are typically not geographically targeted, but rather tied to specific universities, with phishing landing pages developed for library and student or faculty access portals.

http://bit.ly/2Mk4ssL

Cisco Closes CloudCherry Buyout, Boosts Customer Experience

The companies will work together to create a cognitive collaboration approach for customers operating contact centers in order to enhance customer experiences in real-time via cloud data analytics.

https://yhoo.it/2IWdw5f

Thursday 10/17

Troubleshooting tips from the field for Machine Creation Services in AWS

When deploying apps and desktops in AWS, Machine Creation Services (MCS) for image and power management is what positions Citrix ahead of the curve! Being able to manage desktops and apps in AWS from a central location and to join machines to the domain is key to a successful deployment.

http://bit.ly/2oP65G1

Friday 10/18

Proofpoint Named a National Cybersecurity Awareness Month Champion, Launches Free Security Training Kit for Organizations

Proofpoint has been named a National Cybersecurity Awareness Month Champion by the National Cyber Security Alliance. The company is continuing to support the growing global effort to promote the awareness of online safety and privacy. As part of its commitment, Proofpoint has also launched a free Cybersecurity Awareness Month kit to help organizations with their security education initiatives.

http://bit.ly/2MrPAsr

Check Point and VMware Partner to Secure Branch Office SD-WAN Connections to the Cloud

Check Point and VMware ® SD-WAN by VeloCloud™ have partnered to jointly assure the performance and security of enterprise and cloud applications over the Internet and  hybrid-WAN while dramatically simplifying deployments and reducing costs.

http://bit.ly/35Jlubv