Archives

Security

Scaling And Securing IoT Data Streams

The Internet of Things (IoT) is big and upcoming; we see more connected devices around us each day. When typical devices are “connected,” there’s an opportunity to make them smart and introduce new services, insights, and more. As a result, …


  

Related Stories

Continue reading..

DSGVO-Konformität in parallelen Wolkenwelten

Die neue europäische Datenschutz-Grundverordnung (DSGVO), die am 25. Mai 2018 in Kraft tritt, legt die Messlatte für den Nachweis des Datenschutzes deutlich höher - und dies in einer Zeit, in der deutsche Unternehmen zunehmend auf Cloud-Services bauen, meist


  

Related Stories

Continue reading..

Citrix Optimizer

What does it do?

I’ve always found the way operating systems evolve and adapt to be fascinating. They have more functionality with every release, their inner workings are more intelligent, they can automatically adapt to different situations, and are generally …


  

Related Stories

Continue reading..

Citrix Optimizer

What does it do?

I’ve always found the way operating systems evolve and adapt to be fascinating. They have more functionality with every release, their inner workings are more intelligent, they can automatically adapt to different situations, and are generally …


  

Related Stories

Continue reading..

A New Option to Protect Your Workspace: In-session Watermark

We enforce security from the enterprise boundaries to every individual end point device. We design layered secure zones to prevent information leakage. We are armed to the teeth, protecting every bit of our information. But is that enough?

Even a …


  

Related Stories

Continue reading..

Pass the Bitcoins and Gravy, Please

Last week, at Thanksgiving dinners across the US, there were heated debates - about politics, the economy, and my favorite topic - Bitcoin! Is it a pyramid scheme? Is it a Ponzi? Is it a Bubble? Well - I don’t …


  

Related Stories

Continue reading..

XenApp and XenDesktop における Azure Role Based Access Control の利用

このブログは、2016年11月に Citrix 米国本社マイクロソフトソリューションエンジニアリング部門 Ole Larsen が執筆したブログ「Azure Role Based Access Control in XenApp and XenDesktop」を日本語訳し、一部修正/加筆したものです。

Azure Role Based Access Control in XenApp & XenDesktop

■サマリー

XenApp および XenDesktop の Azure Resource Manager のサポートにより、Azure クラウドの仮想マシンのカタログを作成および管理できます。このブログ記事では、Azure サービスプリンシパルへロール権限やスコープを定義する方法、およびカスタムロールを定義したサービスプリンシパルを利用して XenAppおよびXenDesktop からAzure への接続を許可する方法について用例を交えながらお伝えしていきます。

■以下本文

Azure サービスプリンシパル


  

Related Stories

Continue reading..

Bring Your Windows 32 Bit Apps to Windows 10 S with Citrix Receiver!

A few months ago, Microsoft unveiled Windows 10 S, offering significant simplicity, security, and cost benefits for Windows 10 users while opening up possibilities for businesses, as well. At the same time, Citrix launched a new Citrix Receiver based …


  

Related Stories

Continue reading..

A Great Time to Take XenServer for a Spin

Hello, Citrix community!

As we make our way through the last quarter of the year, I wanted to remind the Citrix community of the significant progress the XenServer team has achieved over the last 18 months to make XenServer the …


  

Related Stories

Continue reading..

Helping Barnardo’s Support Vulnerable Children

At Citrix, we believe that the future of work is mobile and secure. Every day, we see organisations building competitive advantage by freeing workers from their desks, by making information and applications available, securely, from any device, anywhere.

That approach …


  

Related Stories

Continue reading..

Go Que Newsroom

Categories