Kurt Roemer

  1. Does the datacenter even matter anymore?

    Everybody’s talking "cloud" these days. From marketing literature to the boardroom, cloud computing is one of the hottest topics, as the cloud promises to dynamically extend services and lower costs. Who wouldn’t want that? The discussions are prompting many to ask whether onsite datacenters are still needed to best serve the needs of the modern business. It’s an intriguing question. While onsite datacenters used to be ...

    Read More

  2. Privacy is in the eye of the beholder

    Why does privacy mean something different to everyone? To lawyers and IT, privacy involves policies and posters.  When working with banks and hospitals, privacy is seemingly all about the release forms.  At the grocery store, signing away privacy rights on your purchase history gets you discounts.  Likewise, auto insurance companies offer substantial incentives if they can closely monitor your driving behavior via a tracking device attached ...

    Read More

  3. SiteMinder moves in with NetScaler

    The need for strong identity and access management (IAM) is essential to the secured operation of complex web properties and services. Integration of multi-factor authentication, single sign on (SSO) and strong access governance are an absolute requirement for operating in today's compliance and threat environment.. All too often - in the haste to get an application online or updated - security is lost to convenience. Reality ...

    Read More

  4. Where’s a next-gen firewall when you need one? Anywhere you want!

    Protecting today's dynamic applications and data demands agile security measures that span from networks to web properties and into the cloud.  Next Generation Firewall (NGFW) technologies are required protect the integrity of network and web protocols and services, as well as thwarting constantly-evolving advanced threats and malware.  Application Delivery Controllers (ADC's) are required to assure availability by preventing Denial of Service (DoS) and Distributed Denial of ...

    Read More

  5. Road to Synergy: Securing Android, iOS and Windows Phone devices in the enterprise

    The choice of mobile OS determines everything from hardware, apps, support, jailbreak capability, expandabilty and accessories - while discretely impacting enterprise management, support, privacy and security. Security features are either inherent in the mobile OS or enforced through measures and policy controlled by the mobile OS.  This means that the proper configuration and maintainence of mobile OS security features is imperitive to protecting both the ...

    Read More

  6. Mobile Security starts with Citrix Receiver, CloudGateway and ShareFile

    It’s time to take action to advance enterprise mobility management and security.  Enterprises must allow workers to bring the latest devices into the workplace to remain competitive.  Compliance and the protection of sensitive enterprise data must be assured.  These two missions are seemingly at odds with each other, but must be brought into balance for workplace harmony.  Where to start? The need to support BYO users ...

    Read More

  7. Citrix Joins Forces With the Cloud Security Alliance to Help Promote Cloud Best Practices

    It seems like everywhere you go, people are talking about the cloud and rightly so. Cloud is changing how IT manages and delivers IT services as well as how people consume information in their business and personal lives. But despite all the interest and momentum, many people still have concerns about the cloud. In fact, in a new national survey by Wakefield Research, commissioned by ...

    Read More

  8. Design for your fears!

    Nothing strikes fear into the heart of an IT professional like losing control over security.  Yet, two of the most popular trends in IT – Bring Your Own (BYO) and Cloud computing – threaten to obliterate security as we know it. BYO computing allows workers to use their own devices, networks and applications in the enterprise.  After spending decades trying to prevent any “non-standard”, personally-owned and ...

    Read More

  9. The End of One-Size-Fits-All Computing

    One-size-fits-all.  It might work for Snuggies, but it doesn't work for enterprise computing. For years, IT departments have carefully controlled the use of all technology from applications to devices.  "Users" (notice that it doesn't matter who they are or what work they do) were given what IT decided on.  And that decision process was a long and painful one, carefully standardizing on a generic set of ...

    Read More

  10. Change brings Security?

    The workplace of today is changing. Against the background of unpredictability in the current economic climate, organizations are striving to be both agile and flexible -  while adhering to increasingly strict governance demands. Unsurprisingly, many organizations are struggling to adjust. Yet realize that being able to grow, change direction, manage risk and rapidly adapt to market trends has never been more important. Many are creating more ...

    Read More