Just like large enterprises, other organisations also need to be flexible, fast, mobile and modern. The advantage the cloud brings are well known now. Forbes says that 83% of enterprise workloads will be in the cloud by 2020 of which almost half will be in the public cloud and almost a quarter in a hybrid platform.
In a world of predators, you need to master your survival skills. No one implementing cutting-edge cloud technology can afford to ignore security. It is the main barrier to cloud adoption. Already, 27% of IT security budgets are allocated to cloud security and this is estimated to reach 37% in the next 12 months.
What is Privileged Access Management and why it’s growing at 32% CAGR
Privileged Access Management refers to a class of solutions that help secure, control, manage and monitor privileged access to critical systems. A privileged user has administrative access to these critical assets.
Zinopy is sponsoring this year’s HEAnet conference being held from 7 - 9 November in the Galmont Hotel in Galway (you might know it as the Radisson). With 26 exhibitors (sold out) and around 500 attendees, HEAnet attracts delegates from across the Education and Research Sector, as well as industry leaders and technology experts.
One year ago this past weekend the world was rocked by WannaCry, the biggest ever ransomware of its kind, which spread like wildfire around the world infecting hundreds of thousands of computers in over 150 countries within hours, encrypting data and demanding ransom to be paid via bitcoin. It essentially took Ireland’s Health Service Executive computer systems off the internet for nearly a week, as they worked to patch unpatched systems.
In my previous blog I spoke about migrating from XenApp 6.5 to XenApp 7.15 LTSR. But moving to 7.15 LTSR is not simply an upgrade, it’s a full migration because you are moving from an IMA (Independent Management Architecture) Architecture to a FMA (Flexible Management Architecture) Architecture so now it is the perfect time to examine your cloud strategy and look at what Citrix Cloud has to offer.
The vast majority of IT security budgets are allocated to preventing security breaches. However, Gartner predicts that by 2020, 60% of enterprises' information security budgets will be allocated for rapid detection and response approaches, up from less than 10% in 2014.
2017 has given us a lot to reflect on in the world of Cyber Security. What Cyber-attacks broke out last year? Were your company or any of your customers affected? How did you prevent the attacks and how can you prevent those attacks in the future? Or how can you better protect your organisation and your customers from new threats in 2018?
Cyber-attacks are evolving at an alarming rate and affect everyone and anyone. With the current threat landscape at its highest, how can we aim to keep ourselves and our customers cyber secure?
Knowledge is power and understanding your organisation’s security posture, although no trivial task, is a crucial starting point for any business serious about protecting from cyber attacks and potential security breaches.
As you may be aware XenApp 6.5 is coming to the end of its life on June 30, 2018 and if you have yet to upgrade no need to panic but now is the time to start planning your migration.
I know a lot of customers have hesitated in upgrading because of a lack of feature parity in XenApp 7.x but with the release of 7.15 I believe we have now reached that stage.