Blog

By Eric Corcoran, Posted in Technology Week in Review

Monday 6/20 ICYMI: Ken Phelan, was joined by Gotham’s EUC & Cloud Practice Director, Brian Wagner, and Rubrik, Inc.’s Christopher Culver and Drew Russell for a discussion surrounding Modern Resiliency. https://www.youtube.com/watch?v=XO9-Z3J_5_8 Make device management simpler with Citrix Provisioning Services (Citrix) Citrix has made many optimizations and tweaks throughout the years to ensure that PVS performs at its best from the perspective of device check-ins, failover times, and sca... read more.

  • June 24, 2022

By Timothy Karl, Posted in Virtualization

Citrix Virtual Apps and Desktops 7.15 LTSR will reach End of Life (EOL) on August 15, 2022. Customers using this version who wish to remain on the LTSR track must upgrade to 1912 or 2203 LTSR before then or risk being on an unsupported platform. Besides supportability, there are additional benefits for upgrading to 1912 and 2203 LTSR. Additional OS Support for Infrastructure components and VDAs 7.15 LTSR supports up to Windows 10 for Desktop OS and Windows 2016 Server OS. Both 1912 and 2203 LTSR allow you... read more.

  • June 22, 2022

By Eric Corcoran, Posted in Technology Week in Review

Monday 6/13 A True Converged Platform Starts with a Powerful Network Firewall (Fortinet) In these new hybrid network environments, security cannot function as a standalone solution. Instead, security must be seamlessly converged with the underlying network, enabling protections to dynamically adapt to a constantly shifting network. https://bit.ly/3Hi8A7r Paying Ransomware Paints Bigger Bullseye on Target’s Back Paying ransomware attackers doesn’t pay off and often paints a bigger target on... read more.

  • June 17, 2022

By Eric Corcoran, Posted in Technology Week in Review

Monday 6/6 Brute-Force Attacks: How to Defend Against Them (Arctic Wolf) When you hear the words “brute force," subtlety is probably not the first thing that comes to mind. Indeed, classic brute-force cyber attacks use the most straightforward tactics—trial and error—to gain entry into a protected system. https://bit.ly/39aAENA State of Application Strategy 2022: Security Shifts to Identity (F5) But it’s not just that identity and access have risen to become the most deployed te... read more.

  • June 10, 2022

By Eric Corcoran, Posted in Technology Week in Review

Monday 5/23 2022 Cloud Security Report (Fortinet) The 2022 Cloud Security Report reveals how security executives and practitioners are using the cloud, how their organizations are responding to security threats in the cloud, and the challenges they are facing. Let’s look at some of the highlights from this year’s report. https://bit.ly/3LIp9tU ABAC vs. RBAC: What’s the Difference? (Citrix) These types of access control models determine authorization based on who the user is and what r... read more.

  • June 03, 2022

By Eric Corcoran, Posted in Technology Week in Review

Monday 5/16 The Move to Modernize Ops Will Increase the Need for Software Supply Chain Security (F5) The one thing we’ve learned from DevOps that you cannot ignore as you modernize ops is that SRE practices will incur much of the same technical debt and security challenges. https://bit.ly/3MqMx0o Cybersecurity 101: Basic Terminology You Need to Know (Arctic Wolf) The constantly changing world of cybersecurity can leave you longing for an understanding of today's modern threats. A solid foundation... read more.

  • May 23, 2022

By Eric Corcoran, Posted in Technology Week in Review

Monday 5/9 We would like to welcome Mark Taylor to Gotham Technology Group. Working with our highly accomplished Outside Sales team, Mark will help us meet the increased market demand for IT security and infrastructure services. We are excited to have you join us! https://www.linkedin.com/in/mark-taylor/ Improved Phishing Reporting and Remediation with Email Warning Tags “Report Suspicious” (Proofpoint) Our HTML-based email warning tags have been in use for some time now. And we’re hap... read more.

  • May 13, 2022

By Eric Corcoran, Posted in Technology Week in Review

Monday 5/2 What’s new and next with Citrix Virtual Apps and Desktops: Q&A (Citrix) With our updates on the Long-Term Service Release (LTSR), optimizing unified communications platforms, security enhancements, and more, there are a number of enhancements we want to dive deep into. https://bit.ly/39wOhXg Cracks forming in the ransomware ecosystem (Check Point) Thanks to the efforts of white hat researchers and security specialists, as well as governments around the world now strengthening their... read more.

  • May 06, 2022

By Eric Corcoran, Posted in Technology Week in Review

Monday 4/25 Get more out of your native Azure Virtual Desktop with the Citrix Optimization Pack (Citrix) The Citrix Optimization Pack for Azure Virtual Desktop is a new Citrix offering for optimizing native Azure Virtual Desktop workloads. It includes Workspace Environment Management (WEM) service within Citrix Cloud as the primary offering, which you can use to better manage, optimize, and secure your native Azure Virtual Desktop environments. https://bit.ly/3xMTVi1 Not All Firewalls Can Do Zero Trust... read more.

  • April 29, 2022

By Eric Corcoran, Posted in Technology Week in Review

Monday 4/18 ICYMI: Gotham’s CTO, Ken Phelan, was joined by Palo Alto Networks’ Field CTO, Jason Georgi, where they discussed Secure Access Service Edge (SASE) and if the technology is ready for primetime. See the link below for the full video. https://bit.ly/3xvtm0G Wide Open Outbound Firewall Policy – Part 1 Although the open policy allows for ease of use (for systems administrators), it also introduces significant risks attached to users operating applications that are in the range f... read more.

  • April 22, 2022