Tag: Citrix
-
Citrix: “Unsinkable”: The Myth of Foolproof IT Security
Arguably, though, the word most commonly associated with the storied ship is “unsinkable.” The advertisement and marketing campaign …
-
Citrix Video: Restore data after ransomware attack
Ransomware attacks are far more than an inconvenience. They can be costly, and literally bring business operations to a …
-
Citrix Video: Contextual access to apps and data anywhere, any time, on any device
Business desktops and applications, delivered as a service, are available to users anywhere, anytime, on any device. But what about the …
-
Citrix: Measure HDX Session Quality with NetScaler SD-WAN
What ultimately determines the success of a digital workspace initiative? Unquestionably, user …
-
Citrix Video: Upload Protect against zero day threats and malware video
Ransomware, phishing attacks, and zero day exploits are the biggest nightmares facing IT today. You’ve seen it in the headlines, hackers …
-
Citrix: 5 Ways to Avoid Shadow IT
Shadow IT— technology used within an organization without explicit approval — is the modern Trojan horse. It can allow ransomware and …
-
Citrix: Five ways to identify GDPR risks
As a kid, I loved playing hide and seek. You’d close your eyes and count to 50 while everyone scattered and …
-
Citrix: Improve User Experience via Streamlined Centralized Secure Desktop & Performance Management
Leveraging its industry leading alliances and a strong partner eco-system, Citrix Ready ensures a great user experience for the customers …
-
How to configure a Bring-your-Own NetScaler VPX in Azure for XenDesktop Essentials and XenApp and XenDesktop Service from the Citrix Cloud
In addition to my latest blog article – How to configure the Citrix Cloud XenApp and XenDesktop Service using Azure Managed Disks and …
-
Citrix: Linux VDA and Its Ecosystem for a Shared Success
While Citrix support for Microsoft is woven throughout our history, we have a strong commitment to Linux. No doubt, Citrix has made …
-
Citrix: Blueborne: Protect Endpoints from Bluetooth Vulnerabilities with XenMobile
On Sept. 12, Armis labs disclosed that they have identified 8 new vulnerabilities in Bluetooth potentially exposing any Bluetooth-enabled …
-
Citrix: The Future of Work Hinges on Making Cybersecurity Everyone’s Business
Conversations about the future of work have to include security. I’ll take that one step …
●●●