Blog

By Hank Smith, Posted in Infrastructure

That question came up recently for a customer when all of their vSphere hosts (8 in total) were pegged at 100% CPU. Customer Environment The environment consists of eight Nutanix nodes (servers) within a cluster running VMware vSphere 6.7 U3. The Nutanix clusters host core services (AD, SQL, File & Print, etc.) along with a Citrix Virtual Apps and Desktops 7.15 LTSR environment. Users access the environment via a pair of Citrix ADC VPX 200s. The user load is split between Virtual App sessions and Wind... read more.

  • January 25, 2021

By Nancy Rand, Posted in Security

The Cloud Security Alliance released their latest version of the Cloud Control Matrix (CCM) on 1/20/21. It is available from their website after answering a few questions. The mappings to Scope Applicability, Architectural Relevance, Corporate Governance Relevance, Cloud Service Delivery Model Applicability, Supplier Relationship, are not yet available, but the CSA has released the matrix to assist organizations to prepare to upgrade to version 4. https://cloudsecurityalliance.org/research/cloud-controls-m... read more.

  • January 22, 2021

By Eric Corcoran, Posted in Technology Week in Review

Monday 1/18 Using Citrix ADM to speed up Citrix ADC pooled capacity configuration (Citrix) Configurations jobs can be created in Citrix ADM to automate the configuration of selected individual (or groups of) Citrix ADC instances. http://bit.ly/3bQv7uA Ransomware reveals the hidden weakness of our big tech world A group of tech companies including Microsoft, Citrix and FireEye are working on a three-month project to come up with options that they promise will "significantly mitigate" the ransomware thre... read more.

  • January 22, 2021

By Eric Corcoran, Posted in Technology Week in Review

Monday 1/11 F5 to Acquire Volterra to Create the First Edge 2.0 Platform for Enterprises and Service Providers Volterra enables a new Edge 2.0 open edge platform that will transform F5’s leadership position in enterprise application security and delivery, addressing the challenges inherent with first-generation edge solutions. http://bit.ly/3ozVNDk Meet Challenges with an Agile Infrastructure (Pure Storage) With the expedited pace of operations, it’s critical to maintain the performance of... read more.

  • January 15, 2021

By Eric Corcoran, Posted in Technology Week in Review

Monday 1/4 Combatting BEC and EAC: How Security Awareness Can Help You Tackle Business Email Compromise (Proofpoint) 86% of organizations reported experiencing business email compromise, with most organizations reporting multiple attacks. These attacks are getting more sophisticated each year—so how can you prepare your users for the potential attack that slips by perimeter defenses? http://bit.ly/358i57s 2020 – A Paradigm Shift for VDI and the Edge (IGEL) WFH dominated the end user computi... read more.

  • January 08, 2021

By Kaysel Adrover, Posted in

I like to create blog posts that easily and quickly help others with roadblocks that I’ve encountered while working on projects. I was not able to find a specific article that could show, step-by-step, how to publish a preconfigured Citrix Studio 7.x. Scenario: In a large company, you could have multiple Citrix Sites of different versions and spanning the globe. There are also different groups of administrators that would need access to manage the Citrix Sites. In this post, we will go through the... read more.

  • December 22, 2020

By Eric Corcoran, Posted in Technology Week in Review

Monday 12/14 Citrix joins the Modern Computing Alliance We are excited to work with our fellow members of the Modern Computing Alliance to influence how the future of work gets done and reinforce our commitment to customer success with more integrated and innovative solutions across the silicon-to-cloud stack. https://bit.ly/388mzvI Best-in-Class Storage for Modern Unstructured Data (Pure Storage) FlashBlade’s modern architecture has the innovation lead, with more to come. Companies need modern s... read more.

  • December 18, 2020

By Eric Corcoran, Posted in Technology Week in Review

Monday 12/7 Fortinet SD-WAN: Now Extended to Rugged, Remote Locations Platform security vendor Fortinet has introduced two new ruggedized products to its FortiGate 60 next-generation firewall for SD-WAN series to bring security and Fortinet SD-WAN to harsh IT environments. https://bit.ly/33TlPJn 40% of the World’s Mobile Devices are Inherently Vulnerable. Is your Corporate Data at Risk? (Check Point) In research dubbed “Achilles,” the Check Point Research team has found over 400 vulne... read more.

  • December 11, 2020

By Eric Corcoran, Posted in Technology Week in Review

Monday 11/23 FireEye Announces Acquisition of Respond Software The acquisition of Respond Software enables Mandiant Solutions to further productize and scale its expertise and front-line intelligence as part of the Mandiant Advantage platform. https://bit.ly/2J4HDKo Three Things to Know About Insider Threats in the Gig Economy (Proofpoint) Many companies don’t apply the same security principles to third parties as they do to internal employees. This increases exposure to organizations – par... read more.

  • December 04, 2020

By Eric Corcoran, Posted in Technology Week in Review

Monday 11/16 Get Backup Data Out of Neutral to Accelerate Innovation (Pure Storage) If you’ve mostly thought of backups as a backup plan, it may be time to start thinking of these idle resources as an onward and upward plan—especially in terms of accelerating your modernization. https://bit.ly/3kA7g2Q Zero Trust: How to Secure Your Network in the Age of Cloud and Worker Mobility (Proofpoint) With people and computing resources scattered about, unknown devices connecting from near and far, a... read more.

  • November 20, 2020