Automated Secure Desktop Solution

posted

TAI RATCLIFF Senior Solutions Architect Many security breaches occur in the desktop environments. In some cases, admins and users make unauthorized changes in order to “get their jobs done”. It is easy enough to lock down a desktop so that end-users only have minimal access rights but the more you lock down the desktop the Read more...

Configuring Identity Manager in a DMZ with Internal Connector

posted

JEFFREY DAVIDSON Consulting Architect In this blog post we will walk through the process of setting up VMware Identity Manager (Workspace One) in a DMZ and use a connector appliance on the internal (trusted) network for secure active directory sync and authentication. This blog is going to make some assumptions. We’re assuming you have already Read more...

VMware Verify setup with Workspace

posted

        JEFFREY DAVIDSON Consulting Architect In this blog post we will walk through the process of setting up VMware Verify and enabling it on your mobile device. VMware Verify was introduced earlier this year as a free multi-factor authentication solution provided by VMware. Verify is built into VMware Identity Manager (Workspace One) Read more...

VMware Horizon Blast Extreme on Dell-Wyse ThinOS 8.4

posted

MARK MA Senior Consultant Dell/EMC has been the engine driving today’s digital workspace transformation, providing robust end-to-end solutions, from end point to the datacenter, that people can rely on. Dell-Wyse has one of the best cloud managed Thin Clients on the market. Dell-Wyse released the ThinOS 8.4 in June 2017. It is the first Thin Read more...