Every break in a routine means stress. The two following options are available: One is to practice emergency plans. They define, for example, how to react to certain incidents: You are familiar with this from the obligatory fire drill or the first aid course. The second option is the possibility of identifying security gaps so that they do not even arise in normal operation.
From 25 May 2018, it’s getting serious. The EU General Data Protection Regulation, or GDPR for short, takes effect. In view of the approaching date, for many companies it is becoming clear that they still have room for improvement in the area of data protection. Possibly quite a bit of room …
A penetration test is a check of your IT for IT security gaps and weak points. Here the system is checked very practically, mainly, on a technical level from the perspective of an attacker. The theory only plays a subordinate role.
External attacks are no longer a horror vision. They happen. Every day. Many automatically and without a conscious goal, but behind some attacks there are concrete interests.
We are part of the European “Digital Skills and Job Coalition” and are committed to training specialists and equipping them with high-quality digital skills. This places us in the list of European SMEs participating in the campaign #digitalSME4skills of the European Digital SME Alliance (DIGITAL SME).
If truth be told: Encryption Trojans are currently the topic that causes IT departments beads of sweat. Because if the data is encrypted, no HA cluster will be of use. In terms of disaster recovery and resilience, Zerto offers a solution that is ready for the future.
Experience with our “VDI in a Flightcase” box in real time how easy virtual desktops can be in daily use, how many security problems are actually no longer present and how login times can improve exponentially.
Do you know about these posters for occupational safety? Wash your hands here, wear a helmet, don’t smoke there? Do you notice these? Exactly!
The well-intentioned advices to not only change passwords at certain intervals, but also to create challenging ones, go unheard and unheeded.
For administrators, this is one of the biggest hurdles when it comes to implementing a VDI environment: What kind of servers do we need? What about graphics acceleration? How many IOPs are required? Which ThinClients are the right ones? And most important: Where can I get the right answers?
We have not been using US products for some time now, especially for firewalls (for known reasons), but instead have been looking for manufacturers where no NSA backdoors or similar unpleasant surprises can be found.
New licensing opportunities and technical improvements can dramatically reduce the cost of deploying virtual desktops. Regardless of whether you want to change an existing VDI implementation, plan a productive environment or do your first rollout, here are some lesser known tips that really help you save money.
We are often asked which remote protocol is “the best” for VDI. But the question “what is best” depends on how the ideal situation should actually look in your particular environment.