Kurt Roemer

  1. Synergy Security Sessions Recap

    Thanks to those of you who attended the security-focused sessions at Citrix Synergy 2014!   Whether you're looking for the key takeaways, the links to see something you wanted to see again from the session, or are viewing this content for the first time, here's a recap:   SYN262 Configuring policies and products to meet today's privacy challenges Watch on: SynergyTV   YouTube     Presenters: Joseph Nord, Kurt Roemer Key takeaways: Show mutual respect ...

    Read More

  2. Controlling enterprise Android security is the question. Is MDM the answer?

    Google’s Android operating system powers the world’s most prolific mobile devices.   While Android is popular for many great reasons, its enterprise security and management functions are often called into question. From rogue app stores to version fragmentation, carrier-mediated OS updates and overly-permissive apps, there are many policies and settings to manage. Some would go so far as to say there’s no managing Android in the ...

    Read More

  3. Does the datacenter even matter anymore?

    Everybody’s talking "cloud" these days. From marketing literature to the boardroom, cloud computing is one of the hottest topics, as the cloud promises to dynamically extend services and lower costs. Who wouldn’t want that? The discussions are prompting many to ask whether onsite datacenters are still needed to best serve the needs of the modern business. It’s an intriguing question. While onsite datacenters used to be ...

    Read More

  4. Privacy is in the eye of the beholder

    Why does privacy mean something different to everyone? To lawyers and IT, privacy involves policies and posters.  When working with banks and hospitals, privacy is seemingly all about the release forms.  At the grocery store, signing away privacy rights on your purchase history gets you discounts.  Likewise, auto insurance companies offer substantial incentives if they can closely monitor your driving behavior via a tracking device attached ...

    Read More

  5. SiteMinder moves in with NetScaler

    The need for strong identity and access management (IAM) is essential to the secured operation of complex web properties and services. Integration of multi-factor authentication, single sign on (SSO) and strong access governance are an absolute requirement for operating in today's compliance and threat environment.. All too often - in the haste to get an application online or updated - security is lost to convenience. Reality ...

    Read More

  6. Where’s a next-gen firewall when you need one? Anywhere you want!

    Protecting today's dynamic applications and data demands agile security measures that span from networks to web properties and into the cloud.  Next Generation Firewall (NGFW) technologies are required protect the integrity of network and web protocols and services, as well as thwarting constantly-evolving advanced threats and malware.  Application Delivery Controllers (ADC's) are required to assure availability by preventing Denial of Service (DoS) and Distributed Denial of ...

    Read More

  7. Road to Synergy: Securing Android, iOS and Windows Phone devices in the enterprise

    The choice of mobile OS determines everything from hardware, apps, support, jailbreak capability, expandabilty and accessories - while discretely impacting enterprise management, support, privacy and security. Security features are either inherent in the mobile OS or enforced through measures and policy controlled by the mobile OS.  This means that the proper configuration and maintainence of mobile OS security features is imperitive to protecting both the ...

    Read More

  8. Mobile Security starts with Citrix Receiver, CloudGateway and ShareFile

    It’s time to take action to advance enterprise mobility management and security.  Enterprises must allow workers to bring the latest devices into the workplace to remain competitive.  Compliance and the protection of sensitive enterprise data must be assured.  These two missions are seemingly at odds with each other, but must be brought into balance for workplace harmony.  Where to start? The need to support BYO users ...

    Read More

  9. Citrix Joins Forces With the Cloud Security Alliance to Help Promote Cloud Best Practices

    It seems like everywhere you go, people are talking about the cloud and rightly so. Cloud is changing how IT manages and delivers IT services as well as how people consume information in their business and personal lives. But despite all the interest and momentum, many people still have concerns about the cloud. In fact, in a new national survey by Wakefield Research, commissioned by ...

    Read More

  10. Design for your fears!

    Nothing strikes fear into the heart of an IT professional like losing control over security.  Yet, two of the most popular trends in IT – Bring Your Own (BYO) and Cloud computing – threaten to obliterate security as we know it. BYO computing allows workers to use their own devices, networks and applications in the enterprise.  After spending decades trying to prevent any “non-standard”, personally-owned and ...

    Read More