Making virtual desktops work with Azure AD and Intune
There has been a massive growth in demand for DaaS solutions due to COVID-19 and the sudden move to remote working, but there are still some major areas of improvement in the coverage of current solutions. One of the main gaps in VDI/DaaS solutions is native support for Azure AD ... Read More
Evaluating My 2020 VDI and DaaS Predictions
Last year, I made a series of predictions about what virtualization in 2020 would look like. Like everyone else reviewing their ‘2020 forecast’, I do have the ‘excuse’ that none of us could have seen COVID-19 coming. But like in so many industries, when it comes to the world of ... Read More
Extending Zero Trust to the Endpoint
What is Zero Trust? Zero trust is a security model based on maintaining strict access control. It has risen in popularity since Forrester coined the term in 2010. Initially, Zero trust referred to an enterprise security architecture that relied on a trusted internal network protected by firewalls that enforce perimeter ... Read More
Extending Zero Trust to the Endpoint
What is Zero Trust? Zero trust is a security model based on maintaining strict access control. It has risen in popularity since Forrester coined the term in 2010. Initially, Zero trust referred to an enterprise security architecture that relied on a trusted internal network protected by firewalls that enforce perimeter ... Read More
Is it time for Work 2.0 ?
If you’re reading this post, you’ve probably already heard about “unified endpoint management”, “enterprise mobility management”, the “digital workplace”, and other related buzzwords. However, the way we provide a work space to employees hasn’t significantly changed in the last decade. It still mainly consists of some mix of the following ... Read More
Is it time for Work 2.0 ?
If you’re reading this post, you’ve probably already heard about “unified endpoint management”, “enterprise mobility management”, the “digital workplace”, and other related buzzwords. However, the way we provide a work space to employees hasn’t significantly changed in the last decade. It still mainly consists of some mix of the following ... Read More
Can container/docker benefits apply to client apps too?
You’ve probably heard about containers before. In the unlikely case that you missed the hype, but here’s a quick recap: containers are bundles of applications and their dependencies. With containers, it’s possible to reliably/predictably/consistently run apps regardless of the underlying computing infrastructure they run on. Containers run in the same ... Read More
Can container/docker benefits apply to client apps too?
You’ve probably heard about containers before. In the unlikely case that you missed the hype, but here’s a quick recap: containers are bundles of applications and their dependencies. With containers, it’s possible to reliably/predictably/consistently run apps regardless of the underlying computing infrastructure they run on. Containers run in the same ... Read More
Enter the Matrix: Cyber Security Risk Assessments Demystified
Cyber security professionals are, by definition, in the risk management business. Your job is all about making sure information systems and sensitive data are protected against cyber attacks. And now with COVID 19 pushing more workers — and work — online than ever before, getting a handle on your evolving ... Read More
Working from the Home Front Securely
It is said that home is where the heart is, but with the coronavirus (COVID-19) forcing a large part of the workforce to work from home to help contain its spread, home could be where the headache is. Increasingly, companies are employing work-from-home policies, with travel restrictions, quarantining, “social distancing” ... Read More