What the IT world needs now: fast access to any app, anywhere, securely!

I’m writing this article in the midst of the COVID-19 crisis, a year after we first left our offices and moved to remote work. While it has immediate implications on all of ...
monitoring, observability, process monitoring Barracuda Open XDR monitoring DNS threat

Employee Monitoring Software Secures Remote Teams

Many organizations only embrace cybersecurity as a bottom-line business priority after years of unprecedented, expensive and significant data breaches and cybersecurity incidents. More than 80% of small and medium-sized businesses (SMBs) view ...
Security Boulevard
Managing Your Security Product in the Cloud, Like a Spartan

Managing Your Security Product in the Cloud, Like a Spartan

The famous movie “300” tells the story of king Leonidas and his 300 Spartan warriors – who withstood a monumental attack by the Persian empire during the battle of Thermopylae, even though ...

Extending Zero Trust to the Endpoint

| | cyber security strategies
What is Zero Trust? Zero trust is a security model based on maintaining strict access control. It has risen in popularity since Forrester coined the term in 2010.  Initially, Zero trust referred ...

Extending Zero Trust to the Endpoint

| | cyber security strategies
What is Zero Trust? Zero trust is a security model based on maintaining strict access control. It has risen in popularity since Forrester coined the term in 2010.  Initially, Zero trust referred ...

Non-Persistent VMs with a Persistent User Experience – Make Your IT Admin’s Life Easier

Desktop virtualization solutions and use cases Desktop virtualization for end users in organizations is not a new concept. Since the 90’s, Citrix has been offering end users remote access to corporate software ...

Non-Persistent VMs with a Persistent User Experience – Make Your IT Admin’s Life Easier

Desktop virtualization solutions and use cases Desktop virtualization for end users in organizations is not a new concept. Since the 90’s, Citrix has been offering end users remote access to corporate software ...

Improving Your Vulnerability Remediation Process

As security teams know all too well, data breaches are a fact of life. They’re also a huge thorn in the side of many companies. With the average data security breach costing ...

Improving Your Vulnerability Remediation Process

As security teams know all too well, data breaches are a fact of life. They’re also a huge thorn in the side of many companies. With the average data security breach costing ...

5 Pillars of a Cyber Security Strategy & Plan: a CISO’s Guide

Why is a Cyber Security Strategy Plan Important? A cyber security strategy offers a clear, detailed plan that standardizes security across the organization. It helps CISOs shift from reactive to proactive security, ...