By Michael Hawkins, Posted in Security

The SolarWinds hack provides an interesting insight into how the supply chain can be used as part of a multi-pronged attack. The ingenuity of the bad actors was on full display as they successfully infiltrated, compromised, and manipulated the SolarWinds software update service. With that manipulation in place, the bad actors had the perfect attack vector for bypassing traditional security controls. Inbound firewall rules provided no protection, since the SolarWinds servers reached outward to reach the upda... read more.

  • March 15, 2021

By Ryan Lee, Posted in

As more and more organizations and employees shift to a work-from-home model, secure external access via Citrix Application Delivery Controllers (ADCs) continue to become even more crucial. As a market leader in the application delivery space, Citrix continues to develop, enhance, secure, and optimize its Citrix ADC hardware and software platforms. In order to take advantage of some of the latest and greatest enhancements, as well as maintain support agreements, firmware upgrades are necessary. For the mos... read more.

  • March 12, 2021

By Eric Corcoran, Posted in Technology Week in Review

Monday 3/1 NSA Releases Guidance on Zero Trust Security Model CISA encourages administrators and organizations review NSA’s guidance on Embracing a Zero Trust Security Model to help secure sensitive data, systems, and services. Cloud Kickoff Guide: Starting your cloud journey on the right foot (Citrix) We saw an opportunity to condense the basic, foundational information all our Citrix Cloud customers need into a single resource — almost like a pre-planning guide &mdas... read more.

  • March 05, 2021

By Monica Jimenez, Posted in Infrastructure, Security

The combinations of authentication apps and thin clients are endless nowadays. With the many different types of technologies out there though, not every combination has been documented. At a recent customer engagement, there was a combination of products that isn’t very common, at least not yet, being implemented in an IGEL environment.  Customer Environment: IGEL devices on firmware using the built-in default Citrix Workspace client are deployed within an environment configured fo... read more.

  • March 02, 2021

By Eric Corcoran, Posted in Technology Week in Review

Monday 2/22 Cisco Completes Acquisition of IMImobile PLC By combining IMImobile's solution with Webex Contact Center, Cisco will be able to provide a robust Customer Experience as a Service (CXaaS) offer. Citrix Endpoint Management named a 2021 Gartner Peer Insights Customers’ Choice Citrix Endpoint Management receive an overall rating of 4.5/5.0 stars based on 101 reviews within the Peer Insights category for Unified Endpoint Management, again based on feedback from you, ou... read more.

  • February 26, 2021

By Eric Corcoran, Posted in Technology Week in Review

Monday 2/15 Press #1 to Play: A Look Into eCrime Menu-style Toolkits (Crowdstrike) The increasing availability of eCrime “syndication” models proliferating Ransomware as a Service (RaaS) programs grew in popularity as a threat vector and is one of the reasons behind the increasing volume of activity, allowing more novice threat actors to capitalize on the advanced skills of criminal malware developers and move from opportunistic breaches to targeted BGH ransomware campaigns. read more.

  • February 19, 2021

By Eric Corcoran, Posted in Technology Week in Review

Monday 2/1 Prisma Access Is the Leading Cloud Service to Secure Remote Users (Palo Alto Networks) We are excited that Prisma Access by Palo Alto Networks was the leading cloud-delivered security app by monthly active users, as well as by number of organizations. How a successful phishing attack can hurt your organization A successful phishing campaign can damage an organization in more ways than one. A report released Sunday by security provider Proofpoint looks at the impact of a... read more.

  • February 12, 2021

By Eric Corcoran, Posted in Technology Week in Review

Tuesday 2/2 What’s new with Citrix Workspace – January 2021 We expect to see continued growth in secure, flexible work with a emphasis on maximizing employee experience against a growing number of work variables such as location, device type, device profile, line-of-business (LOB) technology requirements, and more. IoT Firmware Security: Zero-Day Exploitation & Prevention (Check Point) Understanding IoT firmware security will help protect against device attacks tha... read more.

  • February 05, 2021

By Eric Corcoran, Posted in Technology Week in Review

Monday 1/25 Pure Storage Recognized as a Leader in Enterprise Flash Array Storage Category Pure is consistently recognized by its customers as this also marks the sixth consecutive year the company has maintained its market-leading NPS score in the top one-percent of Medallia-benchmarked B2B scores while scaling the business. FireEye releases tool for auditing networks for techniques used by SolarWinds hackers Together with the report, FireEye researchers have also released a free... read more.

  • January 29, 2021

By Hank Smith, Posted in Infrastructure

That question came up recently for a customer when all of their vSphere hosts (8 in total) were pegged at 100% CPU. Customer Environment The environment consists of eight Nutanix nodes (servers) within a cluster running VMware vSphere 6.7 U3. The Nutanix clusters host core services (AD, SQL, File & Print, etc.) along with a Citrix Virtual Apps and Desktops 7.15 LTSR environment. Users access the environment via a pair of Citrix ADC VPX 200s. The user load is split between Virtual App sessions and Wind... read more.

  • January 25, 2021