2017 Year in Review: Security Across End-User Computing
Dec29

2017 Year in Review: Security Across End-User Computing

In 2017, there certainly was no shortage of cybersecurity attacks that made news on a monthly, and sometimes even weekly, basis. Most IT or security operations personnel became familiar with the major cybersecurity breaches this year, including WannaCry, Equifax and Petya. As the consumerization of IT becomes more prevalent across more organizations, the risk of security breaches occurring increases. To help mitigate this risk,...

Read More
[Whitepaper] Reviewer’s Guide for VMware Horizon Cloud Service With Hosted Infrastructure
Dec26

[Whitepaper] Reviewer’s Guide for VMware Horizon Cloud Service With Hosted Infrastructure

We just released the new Reviewer’s Guide for VMware Horizon Cloud Service with Hosted Infrastructure to help you try VMware Horizon Cloud Service with Hosted Infrastructure. Whether you are an IT decision-maker, administrator, or architect—or just curious about Horizon Cloud—this guide is a great way to get started on the basics. VMware Horizon Cloud Service is a family of cloud services that delivers virtual desktops and...

Read More
3 Critical Ways That VMware Horizon Bolsters Security
Dec14

3 Critical Ways That VMware Horizon Bolsters Security

With security as a top, C-level concern today, leading organizations look to VMware Horizon to help drive enterprise security. As part of our ongoing blog series on security, let’s take a look at three critical ways Horizon can help: Centralized Data and Delivery Trusted Images Secure, Policy-Based Access 1. Centralized Data & Delivery Virtualizing means centralizing where the desktops live, either on premises or in the cloud, and...

Read More
Mitigating the Risks of Cyberattacks
Nov10

Mitigating the Risks of Cyberattacks

The unfortunate reality today is that cyberattacks have become common. Not a week goes by without dramatic headlines describing the chaos caused by cyberattacks disrupting business and government operations. We all remember the WannaCry cyberattack on the United Kingdom’s National Health Service (NHS) that caused nearly 6,900 appointments—including operations—to be cancelled as a result of ransomware. Then there was the Petya...

Read More
300+ Reasons to Use VMware User Environment Manager
Oct24

300+ Reasons to Use VMware User Environment Manager

Some time ago, with the introduction of VMware User Environment Manager 9.0, I created a blogpost about User Environment Manager configuration templates. We launched a community page where people could post their own configuration templates. Since then, a lot has changed! We launched several versions of User Environment Manager to enhance the product even more. For instance, privilege elevation (a feature we introduced in User...

Read More