850 posts found for "security"

Handling BYOD Risks!

Handling BYOD Risks!

The Bring Your Own Device (BYOD) movement has been well adopted by enterprises all around the world, hoping for increased productivity and reduced enterprise costs. With the variety of devices available in the market today security challenges have grown. BYOD can turn into...
What is an RDP Brute Force Attack?

What is an RDP Brute Force Attack?

Remote desktop protocol (RDP) is a secure proprietary communication protocol initially built by Microsoft. It allows two PCs to share a graphical user interface (GUI) over a standardized transmission control protocol (TCP)/internet protocol (IP)...

2X Applicationserver Version 10.6 Released

DALLAS, TX, July 17th, 2013 — 2X Software, a global leader in virtual desktop and application delivery solutions, is pleased to announce that an updated version of 2X Remote Application Server has been released. The 10.6 release is a major service pack update which provides stability for all...

How to Remotely Manage Wi-Fi Networks

In the previous post we covered how difficult it is to manage Wi-Fi networks, the nightmare of deploying and updating multiple devices with the new Wi-Fi credentials and of course those little blighters who give out Wi-Fi passwords to whoever they come across. Managing Wi-Fi networks can be an...