Tag: security

  1. 7 best practices to protect your company’s critical business information

    lock

    Is your organization ready for today’s security challenges? As 2013 came to an end, the headlines of security breaches showcased that no organization, large or small, was immune to data breaches. A data breach is not only detrimental to a company’s public image, but also their bottom line. Today’s attackers prove to be more creative than ever when it comes to obtaining sensitive business data and ...

    Read More

  2. SiteMinder moves in with NetScaler

    The need for strong identity and access management (IAM) is essential to the secured operation of complex web properties and services. Integration of multi-factor authentication, single sign on (SSO) and strong access governance are an absolute requirement for operating in today's compliance and threat environment.. All too often - in the haste to get an application online or updated - security is lost to convenience. Reality ...

    Read More

  3. 5 steps for embracing mobility in healthcare

    Docscreen2

    If you’re attending HIMSS14, you are already aware of the latest technology trends in healthcare, specifically enabling clinician mobility. Mobility is transforming healthcare as clinicians embrace new devices and ways of working to deliver better care, more quickly, to patients anywhere. Now, clinicians of every generation want to access their apps and information on any device—even those purchased personally—over any network. The principles for successful mobility ...

    Read More

  4. EVENT: Join Citrix at HIMSS14 to Experience the Power of Seamless, Secure Clinician Mobility

    HIMSS14 is right around the corner! Experience the power of clinician mobility in a hands-on demo and through real-world stories from top healthcare executives! Join Citrix at HIMSS14 to learn how leading providers are transforming the delivery of care by empowering clinicians with seamless, secure access to all of the data and apps they rely on – from EMRs to mobile imaging viewers and remote care ...

    Read More

  5. Where’s a next-gen firewall when you need one? Anywhere you want!

    Protecting today's dynamic applications and data demands agile security measures that span from networks to web properties and into the cloud.  Next Generation Firewall (NGFW) technologies are required protect the integrity of network and web protocols and services, as well as thwarting constantly-evolving advanced threats and malware.  Application Delivery Controllers (ADC's) are required to assure availability by preventing Denial of Service (DoS) and Distributed Denial of ...

    Read More

  6. From My Virtual Desktop: iDRAC/iLO/KVM and Java Exceptions

    Good Saturday to everyone!   I hope each of you started off the weekend well: virtualization working running so you don't have to!   Based on an non-XenServer issue encountered with a Client (you know who you are!) I wanted to remind all of us that there now Java Security Exceptions to manage.  This comes into play from version/update 7u51 (and beyond, for now).  This is actually a good ...

    Read More

  7. Delivering Mobile and Cloud Services now gets End-to-End Network Control with unique Citrix integrations for the Cisco Open Network Environment

    From the Data Center across the WAN to the User .. In the long history of the Cisco and Citrix partnership, the two companies have worked together to deliver great solutions to many of the largest corporations in the world.  About 16 months ago, we enthusiastically agreed to expand the solution sets we jointly deliver beyond Desktop Virtualization to also address the Mobility, Cloud Services and ...

    Read More

  8. The Expanding Role of the ADC in IT Security

    padlock

      IT security cannot be accurately addressed through a single product or solution. Instead, security must be built into the fabric of IT – up and down the Open Systems Interconnection (OSI model), between on-premises and cloud datacenters, and across interconnected networks. This complex, distributed nature of IT security is exactly why the application delivery controller (ADC) is taking an ever-expanding role in securing mobile devices, web ...

    Read More

  9. What is means when all the gadgets are Internet connected?

    gadget

      Last quarter, I had a very passionate and uplifting customer at Citrix Executive Briefing Center (EBC) and was talking about how he wants his company to provide advanced openings for houses where customer can remotely open and close depending on temperature, etc.  And how he needed Citrix to help him reach the company objectives with all the Citrix technologies we provide.  In addition, I read ...

    Read More

  10. Start the count down to rockin’ networking sessions at Citrix Summit 2014!

    countdown pic-bought from freeDigitalPhotos-214981-20131231

      What a way to start the New Year with a rolling list of networking sessions that Citrix partners and sales should definitely partake in. Citrix partners and sales should walk away from Citrix Summit 2014 with the following networking summary: For every mobile deployment, NetScaler is the only solution that can provide the best scalability, simplified manageability and best customer user experience For every XenApp/XenDesktop deployment, NetScaler can ...

    Read More