Archive

Posts Tagged ‘personal’

#Citrix #XenDesktop 7 on #vSphere Validated Design Guide is available now!

Really good design guide by Citrix and blog post by Carisa Powell:

We are pleased to announce the availability of the Citrix Solutions Lab 5000-user XenDesktop 7 on vSphere Validated Design Guide.

Yes, you read that right, XenDesktop on vSphere.  XenDesktop is also known to many vSphere customers as the best VDI solution for vSphere, and this design guide showcases the latest release of XenDesktop features and functionality all being hosted on a vSphere hypervisor.  XenDesktop is the best of both virtual apps and desktops from a single platform, so XenDesktop is VDI, XenDesktop is app virtualization, XenDesktop is server-hosted apps and desktops, XenDesktop is secure remote access, XenDesktop is mobility…and with XenDesktop 7 you get all of this functionality from a single platform.

This design guide combines everything that is XenDesktop 7 and delivers it from vSphere to showcase how you can provide an app, desktop, remote access, and more solution for any type of user:

  • VDI – XenDesktop offers a variety of VDI use cases, whether the user needs a standardized, corporate desktop that remains consistent and routine, or the user needs a personalized virtual desktop that he or she can customize to meet their business needs.  This design guide validates XenDesktop Provisioning Services central image management technology for Pooled VDI on vSphere and XenDesktop Personal vDisk technology for delivering Personal VDI on vSphere.
  • Server-hosted Apps and Desktops – XenDesktop also offers server-hosted apps and desktops by leveraging Microsoft Remote Desktop Shared Hosted (RDSH) technology to enable multiple users to connect and share resources from a single server.  This design guide showcases XenDesktop server-hosted resources from Windows Servers on vSphere.
  • Remote Access – XenDesktop leverages Citrix NetScaler appliances to provide secure, remote access from any location.  NetScaler can be a virtual or physical appliance, and this design guide highlights the implementation and configurations of NetScaler Gateway virtual appliances on vSphere.

So why showcase all the features and functionality of XenDesktop 7 on vSphere?  Staying true to the Citrix vision, XenDesktop continues to remain the only hypervisor agnostic app and desktop virtualization solution – including VDI, virtual apps and more.  This means XenDesktop 7 seamlessly integrates with any hypervisor including Microsoft Hyper-V, Citrix…

Continue reading here!

//Richard

Enable Enterprise #Mobility and Secure Android, iOS and Windows Devices – #BYOD

This is a good blog post from Christopher Campbell that also has links to Citrix BYOD Solutions and Citrix BYOD Starter Kit

Lots of devices with many different operating systems. Lots of users bringing Android, iOS and Windows mobile devices into the workplace. Securing all these devices and the apps and data they’re accessing can make enabling Enterprise Mobility an intimidating task. Is it going to be BYOD, COPE, MDM, MAM, MIM or a combination? One size doesn’t fit all and addressing these challenges can be painful if you’re deploying a multiple vendor solution stack.

Some of the top mobile threats now include but are not limited to:

  1. Data loss from lost and stolen devices
  2. Information stealing mobile malware
  3. Vulnerabilities from device, OS and 3rd party apps
  4. Insecure Wi-Fi, network access and rogue access points
  5. Insufficient management tools and capabilities

Join Citrix Chief Security Strategist Kurt Roemer to find out how IT can maintain control and protect business information accessed from Android, iOS and Windows tablets and smartphones.

Watch Now and you will learn:

  • Security considerations and risk mitigation options when supporting BYOD
  • The architecture required to support tablets and smartphones accessing sensitive business information
  • How Citrix BYOD solutions enable secure access to enterprise desktops, apps and files from any device
  • Best practices for IT to maintain control over Android, Apple iOS and Windows tablets and smartphones used in the workplace

WATCH ON-DEMAND TODAY and learn how to make a complete end-to-end, fully integrated Enterprise Mobility solution work for the business, user and IT…

Continue reading here

//Richard

Report: Android malware doubled in 2012, infecting 33M devices

Malware attacks on devices running Google’s (NASDAQ:GOOG) open-source Android mobile operating system more than doubled in 2012, security solutions firm NQ Mobile reports.

NQ Mobile - Malware by Year
NQ Mobile saw a year-over-year increase of malware of 163 percent.

NQ Mobile discovered 65,227 new pieces of mobile malware in 2012 compared to 24,794 in 2011, a year-over-year increase of 163 percent. Among all new malware discovered last year, 94.8 percent of threats were designed to attack Android, compared to just 4 percent targeting rival open-source platform Symbian. In all, more than 32.8 million Android devices were infected in 2012, up from 10.8 million in 2011, representing an increase of more than 200 percent.

Chinese devices accounted for 25.5 percent of infected Android devices, followed by India (19.4 percent), Russia (17.9 percent), the United States (9.8 percent) and Saudi Arabia (9.6 percent). Fifty-three percent of U.S. Android owners have installed a mobile security app on their device, NQ Mobile adds.

Sixty-five percent of mobile malware discovered in 2012 falls into the category of Potentially Unwanted Programs–e.g., root exploits, spyware, pervasive adware and Trojans (surveillance hacks). Twenty-eight percent was designed to collect and profit from a user’s personal data, and 7 percent was built to prevent the user’s device from functioning properly.

The primary methods for delivering malware in 2012 included App Repackaging (adding lines of malicious code into a legitimate app and reloading it onto a third-party marketplace), Smishing (asking consumers to click on a fraudulent link, triggering a malicious app download or directing their browser to a rogue website) and Malicious URLs (redirecting the browser from genuine websites to clone sites intended to collect personal data).

Critics maintain Google has failed to sufficiently police its Google Play digital storefront, making it easy for attackers to distribute malware via Android applications. Google has made strides to reduce Android threats, however: In early 2012, it unveiled Bouncer, which scans Google Play for malicious apps, and its Android 4.2 OS update, a.k.a. Jelly Bean, bakes in application verification tools.

The NQ Mobile report…

Continue reading here!

//Richard

%d bloggers like this: