Archives

Monthly Archives: March 2017

Connecting Windows 10 Enterprise on Azure Desktops to Your Data Center

Citrix Cloud simplifies the provisioning and management of Windows 10 Enterprise on Azure desktops by using Microsoft Azure and Citrix Cloud XenApp and XenDesktop Service. In the past, public cloud desktop offerings relied on Windows servers to offer Windows applications …


  

Related Stories

Continue reading..

Connecting Windows 10 Enterprise on Azure Desktops to Your Data Center

Citrix Cloud simplifies the provisioning and management of Windows 10 Enterprise on Azure desktops by using Microsoft Azure and Citrix Cloud XenApp and XenDesktop Service. In the past, public cloud desktop offerings relied on Windows servers to offer Windows applications …


  

Related Stories

Continue reading..

vCloud Air Network Partners… Behold vCAN Edge

All Service Providers and Aggregators in the vCloud Air Network (vCAN) should visit and bookmark vCAN Edge today. It’s an easy-to-use website that is dedicated to vCAN solutions, products, and driving the success of your public and hybrid cloud business. It also includes current information such as technical whitepapers, the vCloud architecture toolkit, and customer case studies.

The post vCloud Air Network Partners… Behold vCAN Edge appeared first on Partner News.

Read more..

Facebook Live vSAN TechTalk with John Nicholson

We are excited to host another Facebook Live vSAN TechTalk! Please tune into ourFacebook pageon Thursday, April 6th at 1:30 P.M. PSTto hear John Nicholson (@Lost_Signal), Senior Technical Marketing Architect, talk about How to build, configure and deploy a Storage Only Nodefor vSAN! During the 10 minute live stream, John will address: What are the

The post Facebook Live vSAN TechTalk with John Nicholson appeared first on Virtual Blocks.

Read more..

NetScaler on Azure Gets an Upgrade

Microsoft Azure continues to make inroads with the enterprise as they migrate workloads to the cloud. Similarly, Citrix continues to make it easier for our customers to take their NetScaler deployments with them to the cloud.

Increased performance on Azure


  

Related Stories

Continue reading..

Celebrate World Backup Day by Safeguarding Your Workloads in the Cloud

It&#rsquo;s World Backup Day, a day dedicated to raising awareness of data, the increased value it brings to our lives, and the importance of ensuring that it’s protected should the unexpected happen.

 

Everyday computer users aren&#rsquo;t the only ones who need to be reminded to protect their applications and data. Even savvy IT folks often overlook the need to protect workloads in the cloud in addition to the workloads they run on-premises.

 

But don&#rsquo;t worry, we&#rsquo;ve got your back. You can ensure data protection in your VMware vCloud Air® environment with vCloud Air Data Protection, an optional backup and recovery feature for Dedicated Cloud or Virtual Private Cloud instances – and get the peace of mind protection you deserve.

 

Data Protection is an agentless, self-service, policy-driven backup and recovery service with image-level backups. It helps ensure that all operating system, file system, and application data residing within a virtual machine are captured as a snapshot image before committed to backup media. With this self-service backup feature, you can fully embrace the public cloud and deploy critical applications without worrying about data loss.

 

And, Data Protection is comparable to private enterprise backup and recovery operations environments, with default policy attributes that support a guaranteed service level for backup and recovery objectives without imposing excessive administrative burden on IT Operations staff. Now that&#rsquo;s a reason to celebrate every day.

In addition to Data Protection, VMware offers a portfolio of vCloud Air availability services including vCloud Air Disaster Recovery, and the newly launched vCloud Air Dedicated Disaster Recovery solution, which combines vCloud Air services such as Dedicated Cloud, Hybrid Cloud Manager, and vSphere-based replication to deliver a customized enterprise-centric solution.

 

Learn more about VMware vCloud Air availability services now.

The post Celebrate World Backup Day by Safeguarding Your Workloads in the Cloud appeared first on VMware vCloud.

Read more..

For Your Own Safety, Read This Week’s Top Mobile News

Apple updates galore—and it&#rsquo;s for your own safety. Apple pushed its iOS 10.3, tvOS 10.2 and macOS 10.12.4 operating system (OS) updates this week. Multiple media sources, including Forbes, warn that Apple iPhone users should update to the latest OS ASAP to dam a serious security vulnerability. But great news on the enterprise mobility side: […]]> Apple updates galore—and it&#rsquo;s for your own safety.

Apple pushed its iOS 10.3, tvOS 10.2 and macOS 10.12.4 operating system (OS) updates this week. Multiple media sources, including Forbes, warn that Apple iPhone users should update to the latest OS ASAP to dam a serious security vulnerability.

But great news on the enterprise mobility side: AirWatch announced same-day support and some pretty cool iOS and Apple TV capabilities coming in its 9.1 release. Claire Feeney gives us the details here.

Want to get the top mobile news in your inbox every Friday? Simply enter your email at the top of the page.

In a Galaxy far, far away…

From its Unpacked event in NYC (okay, so maybe not so &#rsquo;far away&#rdquo; …), Samsung launched its new Galaxy S8 device that &#rsquo;breaks through the confines of the smartphone screen.&#rdquo; Check it out here.

For businesses, Samsung also announced its new &#rsquo;desktop experience&#rdquo;—or DeX—technology. When paired with a leading digital workspace solution, like VMware Workspace ONE, end users can experience a full desktop experience on their S8 smartphone. Productivity &#rsquo;Unpacked.&#rdquo; Read more here.

Time to plug that leak.

Security leak, that is. Wandera&#rsquo;s David Renwick effectively scares us half to death with his new blog. He details the security threats that slip through the once-secure IT perimeter, thanks to workers&#rsquo; smartphones and seemingly innocent apps. Read this blog with the lights on.

352 billion mobile app downloads. Say what?!

App Annie projected this week that mobile app store revenue will exceed $139 billion in 2021, thanks to a forecasted 352 billion app downloads. Um, wow. Dive into the numbers on TechCrunch.

It&#rsquo;s so tiny!

For only $55, you can get the world&#rsquo;s smallest smartphone. The Posh Mobile Micro X, also called the &#rsquo;anti-phablet,&#rdquo; is available unlocked on Amazon today.

Father Android gets back in the game.

Android OS creator Andy Rubin hit social this week testing his new smartphone company&#rsquo;s first device.

I’m really excited about how this is shaping up. Eager to get it in more people’s hands… pic.twitter.com/LRzQCFSKTm

— Andy Rubin (@Arubin) March 27, 2017

 

April&#rsquo;s To-Do List

  • Register for aVMware SociaLabin your city
  • Webinar: Achieve Your Digital Workspace Goals: Episode 2
  • Webinar: Explore the Latest AirWatch 9.1 Release
  • VMUG Webcast: Modernizing Windows 10 Management for the Mobile-Cloud Era
  • On Demand: EUC Insights 2017
    • EUC Insights 2017 AMER
    • EUC Insights 2017 APJ
    • EUC Insights 2017 EMEA

     

Read more..

Troubleshooting Videos for vRealize Operations Manager, Workspace ONE, and NSX Now Available in the Learning Zone!

This month the Learning Zone was focused on troubleshooting for vRealize, Workspace ONE, and NSX. The following videos can now be accessed by Standard and Premium subscribers:

  • VMware vRealize Operations Manager 6.x Troubleshooting Tips & Tricks
  • Learn Best Practices and Troubleshooting of Workspace One
  • Advanced Troubleshooting for VMware NSX

In addition to these videos, the following is available for Premium subscribers:

  • VMware Certification Exam Prep: VMware Certified Professional 6 - Network Virtualization (VCP6-NV) Exam v6.2 (2V0-642)

For more information on this course, click here.

To watch these videos, make sure to subscribe to the Learning Zone here. Want to keep up with new releases in the Learning Zone in real time? Follow #NewintheZone on Twitter.

The post Troubleshooting Videos for vRealize Operations Manager, Workspace ONE, and NSX Now Available in the Learning Zone! appeared first on VMware Education & Certification.

Read more..

Customer-Managed Encryption Keys

Enable Customers to use their own encryption Keys on Citrix-managed StorageZone

ShareFile provides customers with flexibility in storing content through our StorageZones architecture. Customers have always had the choice between hosting content entirely in the cloud via a Citrix-Managed StorageZone


  

Related Stories

Continue reading..

Tackling the Top Threats in Cybersecurity with VMware TrustPoint

Searching for the term &#rsquo;cybersecurity&#rdquo; in your favorite search engine yields some interesting and somewhat alarming results. You will see advertisements from security vendors telling you not to become the &#rsquo;next target&#rdquo;. If you search within the U.S., the Department of Homeland Security website will likely show up. You may see yet another organization who just got hacked, maybe even for the second or third time in recent years.

Threats in the cyber world are showing up everywhere and every day. With the rise in bring-your-own (BYO) initiatives and workers using more devices for work, the most dangerous threats often show up on endpoints.

Organizations are struggling to get complete visibility of what is on their network to efficiently secure and manage their endpoints. An effective endpoint security and management strategy starts with a modern approach that can scale and respond quickly to today&#rsquo;s demands.

We introduced VMware TrustPoint to provide security and IT operations teams with complete endpoint visibility and control to secure and manage endpoints at speed and scale. Let us look at how TrustPoint can help tackle some of the most common cybersecurity threats trending in the enterprise today.

Tackling the Top Threats in Cybersecurity: Ransomware Example

Ransomware is a hot topic these days and for good reason. Hackers can essentially infect devices owned by users or organizations with ransomware, usually in the form of malicious code that disables access to files. The malicious actors then hold the user or organization at ransom until they meet demands, usually in the form of payment through bitcoin currency. This type of threat is very popular:

Nearly 50% of organizations had a ransomware attack between 2015 and 2016, per Osterman Research.

Because ransomware authors typically exploit endpoints running outdated software, enterprises can work to protect their network from ransomware by keeping software and patches up to date, something TrustPoint can help with.

Using TrustPoint, security and IT operations teams can simply ask a question, retrieve results in seconds and quickly act. For example, teams can use TrustPoint to query which endpoints are out of date with the latest patches from Microsoft Windows, Internet Explorer or any other application.

Unlike security tools with outdated architectures that rely on databases, TrustPoint is built on a modern communications platform which returns results in seconds from a live environment. Once the query completes, the security or IT team has the information they need to take the appropriate action to remediate the threat in real-time. In this example, IT can remotely distribute a patch across vulnerable endpoints.

Securing Unmanaged & BYO Endpoints

Having complete network visibility also helps security teams combat ransomware and other advanced threats. TrustPoint can quickly discover unmanaged endpoints and take actions to either gain control or prevent them from being a threat.

According to a recent SANS Institute report:

&#rsquo;You can prevent 80-90% of all known attacks by implementing and staying current on basic cyber hygiene.&#rdquo;

If you do not know how many IT assets are on your corporate network, how can you assess the impact of existing threats, like ransomware, and prevent IT assets from future threats? That is where a strong security hygiene strategy begins and what TrustPoint can help answer.

TrustPoint + AirWatch Together

The popularity of the Windows operating system (OS) in the enterprise created security and management challenges over the years, in part due to the traditional systems management approach forced upon IT. The release of Windows 10 signaled a shift from this traditional management approach to a mobile-first management approach called unified endpoint management (UEM).

Already the leader in enterprise mobility management (EMM), VMware AirWatch evolved into a platform that could not only secure and manage mobile device, but also Windows 10 endpoints. With AirWatch, organizations get the full benefit of a UEM platform to manage both mobile devices and desktops. Now with TrustPoint, organizations can extend the security and management of AirWatch-managed desktops.

Security and IT operations teams can find potential threats using TrustPoint, report them back to AirWatch and take action for automated compliance. Customers also benefit from having one vendor in VMware to secure and manage mobile, desktop and server environments.

Let us look at an example of the integration. An organization looks for unsigned applications on any Windows 10 device in its environment. Using TrustPoint, the security or IT operations team can run a query that will quickly find Windows 10 devices running these unsigned applications and tag them as compromised. Using AirWatch, the team defines a compliance policy to block VPN access from any compromised device. Any user using a device with an unsigned application will be blocked from connecting into the corporate network through VPN.

Security teams can take it a step further and set up different actions according to the various threat levels they define. This helps drive even stronger compliance and real-time threat containment across all endpoints in any environment.

The Next Era of Cybersecurity: It Is Time to Get Proactive

Other types of threats security teams need to focus on include rootkits, viruses, worms, trojans, adware and spyware. According to AV-Test:

Over 390,000 new malicious programs are registered every day.

Since viruses, worms, trojans and other types of malware have been around for decades, many organizations are still using tools from the &#lsquo;90s and 2000s to combat and remediate against old and new threats.

Signature-based security alone no longer helps, as 97% of malware is unique to a specific endpoint. Large organizations end up using dozens of point tools that cannot communicate with each other and do not provide a clear picture of overall security posture. TrustPoint can help address these inefficiencies.

Let&#rsquo;s say you identity a process as malicious and spreading through your environment, like a worm. Security teams can use TrustPoint to discover affected endpoints quickly by running a query that looks for a specific MD5 hash tied to the process. The team can then take action, such as quarantining the devices and then reimaging or uninstalling the app to bring the device back into compliance. You can further automate this process, so there is a continuous check for the malicious process.

We highlighted some of the top threats that cyber criminals use to expose enterprise organizations today. TrustPoint helps security and IT operations teams get visibility into their environment, so they can efficiently detect and remediate against these advanced threats and increase their security hygiene. With VMware ecosystem integrations, such as AirWatch, TrustPoint can give organizations a complete end-to-end security approach.

For more information on how TrustPoint can help you, visit vmware.com/products/trustpoint.html.

Because you liked this blog:

  • Mobile Leaks Are On the Rise: Should You Be Concerned?
  • New eBook: The Next 5 Big Things in Mobile Security
  • Bulletproof RDS: 30 Ways to Secure Remote Desktop Services

The post Tackling the Top Threats in Cybersecurity with VMware TrustPoint appeared first on VMware End-User Computing Blog.

Read more..

Go Que Newsroom Categories

Fatal error: Allowed memory size of 67108864 bytes exhausted (tried to allocate 32 bytes) in /home/content/36/8658336/html/goquecom/wp-includes/wp-db.php on line 1889