Citrix Cloud – Never Upgrade Your Citrix Infrastructure Again

By | Cloud Computing, Virtualization | No Comments
citrix cloud

Citrix Cloud

If you’re still running XenApp v6.5, you know you need to develop a migration plan. XenApp v6.5 hits “End of Maintenance” – after which there will be no further code maintenance – at the end of calendar year 2017, and End of Life on June 30, 2018. So if you don’t have a migration plan in place, you don’t have a lot of time to develop one. Furthermore, if you’ve been tracking the evolution of the XenApp and XenDesktop products, you’ve probably noticed that new releases are coming more frequently these days as new and enhanced functionality is added to the products. That’s both good news and bad news: good news because the products are getting better and better, bad news because upgrading your Citrix infrastructure can involve a significant work effort. It is not unusual for a XenApp or XenDesktop infrastructure upgrade to take 100 to 120 hours of work effort on the part of your own IT team, if you have the skill set in-house to do it, or on the part of your Citrix consulting partner if you don’t. Read More

Three Questions to Ask about Identity Management

By | Security, SIEM | No Comments

Identity ManagementSome years ago, we knew RSA as the company that made those key fob tokens for dual-factor authentication. Indeed, they were pioneers in the multi-factor authentication space, and to my knowledge, no one has ever found a way to successfully beat their SecurID token-based authentication. But RSA is so much more than that these days. Even the venerable SecurID product has grown into a powerful and flexible Identity Management solution.

Unfortunately, “powerful and flexible” can sometimes translate into “I’m not sure where to start with this.” So here are three questions that may help you get on the right track: Read More

Cylance Just May Be the Tool You’ve Been Waiting For

By | Security, Uncategorized | No Comments
ransomware

The cyberwar over who will control your PC and the data on it has been dragging on for literally decades, with no end in sight. Malware is big business. It isn’t about just wreaking havoc for the heck of it anymore – it’s about monetization: incorporating your system into a botnet that can then be rented out on the Dark Web, stealing your identity and sensitive financial information, or encrypting your data and holding it for ransom. This latter version, so-called “ransomware,” rakes in tens of millions of dollars annually from its victims, and, as we’ve stated previously, has proven to be one of the most challenging forms of malware to protect against. Read More