What the IT world needs now: fast access to any app, anywhere, securely!

I’m writing this article in the midst of the COVID-19 crisis, a year after we first left our offices and moved to remote work. While it has immediate implications on all of our lives – both physically and virtually – it also gives us a glimpse into the… Continue reading What the IT world needs now: fast access to any app, anywhere, securely!

Employee Monitoring Software Secures Remote Teams

Many organizations only embrace cybersecurity as a bottom-line business priority after years of unprecedented, expensive and significant data breaches and cybersecurity incidents. More than 80% of small and medium-sized businesses (SMBs) view IT secur… Continue reading Employee Monitoring Software Secures Remote Teams

Managing Your Security Product in the Cloud, Like a Spartan

The famous movie “300” tells the story of king Leonidas and his 300 Spartan warriors – who withstood a monumental attack by the Persian empire during the battle of Thermopylae, even though they were significantly outnumbered. Despite the fact king Leon… Continue reading Managing Your Security Product in the Cloud, Like a Spartan

Non-Persistent VMs with a Persistent User Experience – Make Your IT Admin’s Life Easier

Desktop virtualization solutions and use cases Desktop virtualization for end users in organizations is not a new concept. Since the 90’s, Citrix has been offering end users remote access to corporate software running in the datacenter. While man… Continue reading Non-Persistent VMs with a Persistent User Experience – Make Your IT Admin’s Life Easier

Thinking Beyond Cybersecurity Vulnerability Assessments: What’s Next?

Having vulnerabilities isn’t always a bad thing. In personal interactions, for instance, being vulnerable can lead to deeper, more meaningful relationships.   But we’re not talking psychology today. We’re talking cybersecuri… Continue reading Thinking Beyond Cybersecurity Vulnerability Assessments: What’s Next?