By Eric Corcoran, Posted in Technology Week in Review

Monday 3/1 NSA Releases Guidance on Zero Trust Security Model CISA encourages administrators and organizations review NSA’s guidance on Embracing a Zero Trust Security Model to help secure sensitive data, systems, and services. Cloud Kickoff Guide: Starting your cloud journey on the right foot (Citrix) We saw an opportunity to condense the basic, foundational information all our Citrix Cloud customers need into a single resource — almost like a pre-planning guide &mdas... read more.

  • March 05, 2021

By Monica Jimenez, Posted in Infrastructure, Security

The combinations of authentication apps and thin clients are endless nowadays. With the many different types of technologies out there though, not every combination has been documented. At a recent customer engagement, there was a combination of products that isn’t very common, at least not yet, being implemented in an IGEL environment.  Customer Environment: IGEL devices on firmware using the built-in default Citrix Workspace client are deployed within an environment configured fo... read more.

  • March 02, 2021

By Eric Corcoran, Posted in Technology Week in Review

Monday 2/22 Cisco Completes Acquisition of IMImobile PLC By combining IMImobile's solution with Webex Contact Center, Cisco will be able to provide a robust Customer Experience as a Service (CXaaS) offer. Citrix Endpoint Management named a 2021 Gartner Peer Insights Customers’ Choice Citrix Endpoint Management receive an overall rating of 4.5/5.0 stars based on 101 reviews within the Peer Insights category for Unified Endpoint Management, again based on feedback from you, ou... read more.

  • February 26, 2021

By Eric Corcoran, Posted in Technology Week in Review

Monday 2/15 Press #1 to Play: A Look Into eCrime Menu-style Toolkits (Crowdstrike) The increasing availability of eCrime “syndication” models proliferating Ransomware as a Service (RaaS) programs grew in popularity as a threat vector and is one of the reasons behind the increasing volume of activity, allowing more novice threat actors to capitalize on the advanced skills of criminal malware developers and move from opportunistic breaches to targeted BGH ransomware campaigns. read more.

  • February 19, 2021

By Eric Corcoran, Posted in Technology Week in Review

Monday 2/1 Prisma Access Is the Leading Cloud Service to Secure Remote Users (Palo Alto Networks) We are excited that Prisma Access by Palo Alto Networks was the leading cloud-delivered security app by monthly active users, as well as by number of organizations. How a successful phishing attack can hurt your organization A successful phishing campaign can damage an organization in more ways than one. A report released Sunday by security provider Proofpoint looks at the impact of a... read more.

  • February 12, 2021

By Eric Corcoran, Posted in Technology Week in Review

Tuesday 2/2 What’s new with Citrix Workspace – January 2021 We expect to see continued growth in secure, flexible work with a emphasis on maximizing employee experience against a growing number of work variables such as location, device type, device profile, line-of-business (LOB) technology requirements, and more. IoT Firmware Security: Zero-Day Exploitation & Prevention (Check Point) Understanding IoT firmware security will help protect against device attacks tha... read more.

  • February 05, 2021

By Eric Corcoran, Posted in Technology Week in Review

Monday 1/25 Pure Storage Recognized as a Leader in Enterprise Flash Array Storage Category Pure is consistently recognized by its customers as this also marks the sixth consecutive year the company has maintained its market-leading NPS score in the top one-percent of Medallia-benchmarked B2B scores while scaling the business. FireEye releases tool for auditing networks for techniques used by SolarWinds hackers Together with the report, FireEye researchers have also released a free... read more.

  • January 29, 2021

By Hank Smith, Posted in Infrastructure

That question came up recently for a customer when all of their vSphere hosts (8 in total) were pegged at 100% CPU. Customer Environment The environment consists of eight Nutanix nodes (servers) within a cluster running VMware vSphere 6.7 U3. The Nutanix clusters host core services (AD, SQL, File & Print, etc.) along with a Citrix Virtual Apps and Desktops 7.15 LTSR environment. Users access the environment via a pair of Citrix ADC VPX 200s. The user load is split between Virtual App sessions and Wind... read more.

  • January 25, 2021

By Nancy Rand, Posted in Security

The Cloud Security Alliance released their latest version of the Cloud Control Matrix (CCM) on 1/20/21. It is available from their website after answering a few questions. The mappings to Scope Applicability, Architectural Relevance, Corporate Governance Relevance, Cloud Service Delivery Model Applicability, Supplier Relationship, are not yet available, but the CSA has released the matrix to assist organizations to prepare to upgrade to version 4. read more.

  • January 22, 2021

By Eric Corcoran, Posted in Technology Week in Review

Monday 1/18 Using Citrix ADM to speed up Citrix ADC pooled capacity configuration (Citrix) Configurations jobs can be created in Citrix ADM to automate the configuration of selected individual (or groups of) Citrix ADC instances. Ransomware reveals the hidden weakness of our big tech world A group of tech companies including Microsoft, Citrix and FireEye are working on a three-month project to come up with options that they promise will "significantly mitigate" the ransomware thre... read more.

  • January 22, 2021