Hit enter to search

Author Avatar

The VDI compromise: satisfied users or adequate security?

Working anytime and anywhere, that’s what end users want. But, you as an IT security professional, want to be certain your employers are protected in the Virtual Desktop Infrastructure (VDI)...

Read More
Author Avatar

Step 3: The Journey to a Secure Environment

Step 3: Protect your Virtual Machines from the Hyper-Visor. In legacy server environments, we install anti-virus agents on the servers. These anti-virus agents need to be upgraded on a regular...

Read More

Current job openings

Get our top stories in your inbox every month

Follow us


Share this article