Archives

Security

Citrix Research Reveals Savvy UK Businesses are Spreading the Risk of Their Cryptocurrency Investments

Despite the meteoric rise of Bitcoin last year — and its continuing reign as the world’s largest cryptocurrency by market cap — a new study commissioned by Citrix makes the discovery that of the 50% of large British businesses that


  

Related Stories

Continue reading..

Citrix Research Reveals Savvy UK Businesses are Spreading the Risk of Their Cryptocurrency Investments

Despite the meteoric rise of Bitcoin last year — and its continuing reign as the world’s largest cryptocurrency by market cap — a new study commissioned by Citrix makes the discovery that of the 50% of large British businesses that


  

Related Stories

Continue reading..

CIOs: Todavía no es tarde para preparar sus New Year Resolutions!

Cada año es inevitable definir objetivos que queremos lograr, ponernos metas. Pero lo sorprendente es que- según un estudio de la Universidad de Scranton- solo el 8% cumple con esas metas definidas. Creo que tener claro lo que queremos lograr …


  

Related Stories

Continue reading..

Citrix Customer Admins Needed from San Francisco & San Jose Bay Area

Do you administer Citrix products? Are you from the Bay Area?

If yes, we’d like you to participate in a 2-hour individual research session to help define and validate features, as well as to influence the product roadmap for Citrix


  

Related Stories

Continue reading..

Citrix 100 Days of Customers: Five Takeaways to Fuel Digital Success in 2018

As we enter the New Year, I have been reflecting upon the immense responsibility Citrix has to deliver the experience, security, and choice people and organizations need to unlock innovation, engage customers, and be productive - anytime, anywhere. I’ve also


  

Related Stories

Continue reading..

Congratulations Citrix Summit 2018 Strategic Partner WINNERS!

Now in their second year, the Global Strategic Partner awards honor the high achieving members of our global partner ecosystem.

The Strategic Partner Awards highlight the real and ongoing innovation in workspace mobility, networking, security and cloud from our partner …


  

Related Stories

Continue reading..

XenMobile 10.6/7 How To Configure a Custom Per-AppVPN XML for WIP-protected Win10 Endpoints

With the current variety of Windows 10 endpoints, such as laptops, hybrids, tablets, and smartphones, you see organizations moving to Unified Endpoint Management (UEM) solutions to provide endpoint security to different types of devices that are not managed by traditional …


  

Related Stories

Continue reading..

Security Design Decisions — Part 5

Security Design Decisions Part 5 — Physical Layer

Welcome back to my blog series on Security Design Decisions where I explore the need for a solid security framework. As more and more companies invest in security automation, I will explain …


  

Related Stories

Continue reading..

Security Design Decisions — Part 5

Security Design Decisions Part 5 — Physical Layer

Welcome back to my blog series on Security Design Decisions where I explore the need for a solid security framework. As more and more companies invest in security automation, I will explain …


  

Related Stories

Continue reading..

Security Design Decisions — Part 4

Welcome back to my blog series on Security Design Decisions exploring the need for a solid security framework. The focus of this series is on how Citrix Consulting uses a layered approach to security as more and more companies invest …


  

Related Stories

Continue reading..

Go Que Newsroom Categories

Fatal error: Allowed memory size of 67108864 bytes exhausted (tried to allocate 40 bytes) in /home/content/36/8658336/html/goquecom/wp-includes/wp-db.php on line 1889