Recommended connectivity for virtual apps and desktops in the cloud (via Citrix)
Reliable, secure, high-performance network connectivity with QoS is critical to providing a great user experience with virtual apps and desktops, and Citrix SD-WAN offers unique integration with Citrix Virtual Apps and Desktops to deliver exactly that and more.
IGEL Trends 2020: All Signs Point to Desktop-as-a-Service (via IGEL)
The cloud is no longer a trend, it’s there, and we must now use it to meet the demands for greater security, lower costs, greater flexibility and better sustainability.
Busting Top Myths About Privileged Access Management (via CyberArk)
Privileged access management (PAM) programs that secure pathways to critical business information are foundational to an effective corporate cybersecurity program. Why? Attackers view privileged accounts as one of the best ways to gain a foothold within an organization’s infrastructure.
Retailers Look to Hybrid Cloud as They Search for Flexibility (via Nutanix)
Retailers recognize that seamless customer experience is no longer a “nice-to-have” — it’s a critical factor in winning new customers and retaining existing ones — and flexible cloud infrastructure is critical to delivering it.
CISA Releases Test Tool for Citrix ADC CVE-2019-19781 Vulnerability
DHS CISA released a public domain tool designed to help security staff to test if their organizations are vulnerable to ongoing attacks that might target the CVE-2019-19781 security flaw impacting the Citrix Application Delivery Controller (NetScaler ADC) and Citrix Gateway (NetScaler Gateway) products.
U.S. Government Issues Critical Windows 10 ‘Update Now’ Alert
The vulnerability allows malicious software to masquerade as legitimate software that has been authenticated and signed by a trusted source; malware detection could be negatively impacted as a result.
NetScaler ADC / Gateway Vulnerability Fix Coming; In The Meantime Do This
On December 17, 2019, Citrix released a critical advisory regarding a vulnerability that allows for remote code execution: CVE-2019-19781 - Vulnerability in Citrix Application Delivery Controller and Citrix Gateway The vulnerability exploits a directory traversal attack on the /vpn directory on the NetScaler. It allows for remote execution of code under the user nobody.
How to protect service accounts without losing your mind: Automated tools! (via Thycotic)
Industry analysts estimate that up to 80% of all security breaches involve the compromise of privileged accounts. Virtually all organizations have some unknown or unmanaged privileged accounts. Some may have thousands. These accounts increase an organization’s vulnerability and present an opportunity for an intrusion.
Zero-RPO: Continuous Data Protection with Cohesity (via Cohesity)
Cohesity’s architecture uniquely allows enterprises to recover hundreds of VMs instantly, something we refer to as instant mass restore. This capability empowers enterprises globally to meet their recovery SLAs. Now, with the introduction of Continuous Data Protection (CDP), enterprises will be able to recover all their mission-critical VMs from any point in time, seconds before the disaster struck.
Citrix Launches Next-Generation Performance Analytics Service for Apps and Desktops (via Citrix)
With Citrix Analytics for Performance, IT can gain a clear view into the end-user’s experience and the health of the apps they rely on within Citrix Virtual Apps and Desktops to provide a consistent, reliable experience that drives increased satisfaction and improved productivity.
Windows 7 and Windows Server 2008 Have Reached End of Life. What To Do Next.
Microsoft will no longer be releasing free security patches, updates, or support when something goes wrong. Although these operating systems won’t instantly stop working or become security risks overnight, there are risks with staying on these operating systems for an extended period of time.
Lost and Found: A Simple Solution to a Difficult Problem (via F5 Networks)
Driven by an application-centric approach, F5 Beacon empowers leaders to understand their applications better and, as a result, obtain powerful insights to improve user experience, increase business value and returns, or simply just to sleep better at night.