Move your Citrix Workspace to the express lane with Citrix SD-WAN

Move your Citrix Workspace to the express lane with Citrix SD-WAN

Did you know that the secret to unleashing the ultimate workspace experience is the network? How you connect and the quality of your network connection matter. Users may be far away from the apps they’re connecting to, resulting in latency. … The post Move your Citrix Workspace to the express lane with Citrix SD-WAN first…

Single resource group support available for Citrix MCS on Azure

Single resource group support available for Citrix MCS on Azure

This blog post was co-authored by Paul Carley, Sr. Product Marketing Manager at Citrix. With the continued maturation and adoption of cloud services, Citrix is always looking to improve the management experience for admins. Previously, with Microsoft Azure, there was … The post Single resource group support available for Citrix MCS on Azure first appeared…

Horizon Cloud Connector Know-How Series: Troubleshooting Horizon Universal License Status
| | |

Horizon Cloud Connector Know-How Series: Troubleshooting Horizon Universal License Status

With the earlier posts in the Cloud Connector Know-How series, we learned the importance of the Horizon Cloud Connector for hybrid-cloud Horizon deployments, and how it is deployed, onboarded and upgraded. Today, we want to tell you a little more about monitoring the status of Horizon universal license across all your Horizon Pods, and walk…

Azure Sentinel achieves a Leader placement in Forrester Wave, with top ranking in Strategy

Azure Sentinel achieves a Leader placement in Forrester Wave, with top ranking in Strategy

I’m thrilled to announce Forrester Research has named Microsoft Azure Sentinel as a “Leader” in The Forrester Wave: Security Analytics Platform Providers, Q4 2020. When we released Azure Sentinel almost a year ago—the industry’s first cloud-native SIEM on a major public cloud—our goal was to provide a new, innovative approach to help organizations modernize security…

Threat actor leverages coin miner techniques to stay under the radar – here’s how to spot them

Threat actor leverages coin miner techniques to stay under the radar – here’s how to spot them

Cryptocurrency miners are typically associated with cybercriminal operations, not sophisticated nation state actor activity. They are not the most sophisticated type of threats, which also means that they are not among the most critical security issues that defenders address with urgency. Recent campaigns from the nation-state actor BISMUTH take advantage of the low-priority alerts coin…