VIRTUAL DESKTOP STRATEGIES

Sangfor Releases Extended Detection, Defense and Response (XDDR) Application Containment

Sangfor Technologies | September 17, 2021

Sangfor Technologies announced the release of their long-awaited extended protection solution, XDDR Application Containment. Based on Sangfor's XDDR security framework, Application Containment allows the network and endpoints (both on-premise or in-cloud) to work together to identify, control, and report on all applications running on endpoints, or using the network to communicate. Sangfor's XDDR provides an integrated solution that protects against ransomware, malware, APTs, phishing websites and email, and potentially malicious applications.

Controlling and enforcing internet access policies in the workplace has not been easy. Employees want access to the internet for personal use as well as their work, making overly restrictive security solutions difficult to implement and maintain. Organizations deploy proxy servers to control access to the internet and external applications. This access control is necessary to maintain productivity, ensure users do not access malicious sites and unknowingly download malware, and to maximize bandwidth utilization for critical business applications.  Many users employ VPN (virtual private network) technology, anonymous browsers, and other proxy avoidance applications to bypass organizational security and content filtering policies enforced by the proxy servers. Sangfor XDDR Application Containment solutions enable the organization to quickly create Proxy Avoidance Protection policies for blocking usage of proxy avoidance tools and applications on the endpoint.

Sangfor's NGAF (Next Generation Application Firewall), IAG (Internet Access Gateway) and Endpoint Secure products work cohesively to provide real-time visualization of all application communication throughout the entire network, quickly identifying proxy avoidance traffic. Proxy Avoidance Protection policies can quickly be built on the NGAF or IAG from Sangfor's extensive library of anti-proxy and proxy avoidance applications. These policies are then deployed by Endpoint Secure to block or monitor anti-proxy applications.

Organizations can also create whitelists and blacklists of applications in Application Containment. This gives administrators granular control of applications running on PCs, laptops, and servers to prevent installation of malware and ransomware, especially with users working from home, to prevent infection of corporate, enterprise, or organizational networks, resources, and critical assets. Peripheral Control manages access to connected USB devices to prevent data leakage.

Traditional extended detection and response (XDR) is network security technology designed to provide increased visibility, analysis functions and response to cyber-threats in the network, cloud, applications, and endpoints. XDR is positioned as the most sophisticated technology available but tends to be more marketing hype than reality, having been developed as the progression of EDR, or endpoint detection and response, to work with non-integrated network security products. Unlike XDR products, Sangfor XDDR Application Containment is the only true solution where network and endpoint work together to identify, control, and report on both allowed and malicious applications running on endpoints and communicating across the network. Sangfor NGAF, IAG and Endpoint Secure coordinate responses so Application Containment can provide real-time blocking and monitoring of unapproved or malicious applications.

Control can be regained from rogue applications delivered by ransomware, malware and APTs that users bring into networks. Sangfor Application Containment blocks the bypassing of internet access controls and prevents users from bringing them in again.

About Sangfor Technologies
Sangfor Technologies is a leading global vendor of IT infrastructure and security solutions, specializing in Cloud Computing & Network Security with a wide range of products & services including Hyper-Converged Infrastructure, Virtual Desktop Infrastructure, Next-Generation Firewall, Internet Access Gateway, Endpoint Protection, Ransomware Protection, Managed Detection and Response, WAN Optimization, SD-WAN, and many others.

Spotlight

In this video we demonstrate how to enable copy and paste operations between the VMware vSphere C# client console and a Windows virtual machine. http://virtualg.uk/enabling-copy-and-First install VMware tools on the Virtual Machine Once the VM has rebooted, power down the VMWe need to add two advanced configuration options to the VM's configuration file Right click the VM - Edit Settings - Options Tab - General - Configuration Parameters

Spotlight

In this video we demonstrate how to enable copy and paste operations between the VMware vSphere C# client console and a Windows virtual machine. http://virtualg.uk/enabling-copy-and-First install VMware tools on the Virtual Machine Once the VM has rebooted, power down the VMWe need to add two advanced configuration options to the VM's configuration file Right click the VM - Edit Settings - Options Tab - General - Configuration Parameters

Related News

VPN

Infotecs virtualizes ViPNet VPN via Docker Container for PLCnext Control by Phoenix Contact

Infotecs Internet Security Software GmbH, Phoenix Contact | September 15, 2021

Infotecs, the leading international vendor of IT security products from Berlin, provides its encryption solution for PLCnext Control by Phoenix Contact. With it, Infotecs virtualizes its encryption module via a docker container directly on the controller. Operators of distributed industrial manufacturing systems are increasingly integrating machines and systems into their IT infrastructure. This is necessary to control and continuously monitor the production flows and to register relevant statistics. Connecting production systems to IP-based networks is a technical challenge. In the industrial area, these systems are increasingly becoming a target of cyber attacks. Distributed production is a serious problem requiring a proven security solution. Phoenix Contact with its PLCnext Technology has created a prerequisite for the safe operation of machines and systems. This is possible, among other things, due to a VPN (virtual private network) solution by Infotecs GmbH. The software vendor deploys it directly on the controller and thus creates secure end-to-end encryption. As a result, confidential machine data transferred from the systems and connected network into a SCADA control system is protected against unauthorized access. PLCnext Technology enables an easy integration into an existing OT infrastructure. "ViPNet VPN solution by Infotecs, virtualized via a docker container, is now available for PLCnext Control by Phoenix Contact. Deployment of ViPNet VPN on these devices protects data transfer within production environments to the endpoint and thus creates a prerequisite for secure remote maintenance access to sensitive industrial systems and applications. ViPNet VPN is available as an on-premise or as a cloud solution," says Josef Waclaw, CEO at Infotecs. PLCnext Control AXC F 2152 is a part of the PLCnext ecosystem by Phoenix Contact. The control combines robustness and security of a classic SPS with openness and flexibility of the world of smart devices. With PLCnext Technology, Phoenix Contact responds to the challenges of the IIoT world and simplifies existing control solutions. This solution transforms automation as boundaries disappear and new possibilities for industrial automation emerge. AboutInfotecs A leading international security solutions provider and pioneer of software-based VPN solutions since 1991, Infotecs developed our Peer-to-Peer ViPNet technology to deliver greater security, flexibility, and performance. We strive to continuously deliver value to our customers through developing the most advanced, innovative security solutions that are also cost-effective and easy to deploy and maintain. The Infotecs ViPNet Security and Threat Intelligence Platform provides complete multi-layer security in one cost-effective solution that supports true endpoint-to-endpoint security and seamlessly integrates into existing networks.

Read More

VPN

Google Fi Expanding VPN to iPhone

Google | February 10, 2021

Google Project Fi's VPN administration has simply been accessible to Android clients in beta up until this point, however that is going to change. "We're extending admittance to the VPN to iPhone, with the goal that it will be accessible for all clients on Fi," the organization reported in a public statement. "We intend to reveal the VPN to iPhone clients beginning this spring." What's more, the VPN administration is formally going to all Android clients, subsequent to being in beta for the most recent few years. "In the wake of tuning in to your input and making execution enhancements, we're removing the Fi VPN from beta for Android telephone clients. This implies you can get the advantages of the VPN while likewise getting a quicker, more grounded association across your applications and administrations," Google composed. As an update, Project Fi's cell phone administration guarantees limitless homegrown talk and text, alongside worldwide informing, tying and that's just the beginning. The core of it is a versatile lattice that joins T-Mobile's inclusion zones with 1,000,000 or so WiFi areas of interest. Not long after dispatch, Google revealed a consistently on VPN that encodes and conceals your online movement, even from Google itself. The solitary proviso is that your information utilization could bounce by up to 10% while utilizing it. As a feature of Safer Internet Day (TIL) Google Fi additionally dispatched a protection and security center point in the Fi application on Android telephones. That will allow you to find out about and deal with your Fi protection and security highlights in a single spot. The organization additionally reminded clients that Fi blocks presumed spam calls, while shielding your telephone number from dangers like SIM trades. As referenced, the VPN is going to emerge from beta on Android, however Google didn't say precisely when — and it will show up to iPhone clients this spring.

Read More

SERVER VIRTUALIZATION

Lynx Software Technologies' MOSA.ic for Industrial Product is Now Available in the Microsoft Azure Marketplace

Lynx Software Technologies | April 22, 2021

Lynx Software Technologies (Lynx), a spearheading pioneer in Mission Critical Edge Computing, today declared that its MOSA.ic for Industrial items is accessible in the Microsoft Azure Marketplace. LYNX MOSA.ic for Industrial sends Azure administrations tense processing workers/entryways to safely oversee continuous gear in modern settings, for example, producing plant floors, coordination stockrooms, and brilliant urban areas across the U.S. Lynx perceived that numerous mechanical organizations need to expand distributed computing innovation as near endpoints as conceivable to profit by experiences from information being gathered in operational innovation (OT) organizations, less expensive process, admittance to applications, and then some. However, blending IT and OT networks in requesting mechanical conditions – where robots frequently work intently close by people – has recently brought difficulties of ensuring constant (under 1 millisecond) execution and fulfilling security needs. The LYNX MOSA.ic for the Industrial stage empowers an assorted arrangement of investigation, man-made reasoning, and update abilities to be stretched out into these strategic, deterministic conditions by giving consistent availability to the wired and remote organizations that are utilized in mechanical conditions, conveying ongoing reactions to occasions and guaranteeing those basic applications run dependably and securely regardless of whatever other applications that could be working on the worker/passage equipment. End client benefits include: • A capacity to move certain capacities from equipment executions to programming, expanding plant the executives and backing of new usefulness • Sensational equipment cost, force, and impression reserve funds through a union of usefulness onto single figure stages • Expanded resistance to cyberattack from the decrease of the assault surface and interesting confinement design • This most recent coordinated effort expands upon Lynx's developing innovation accomplice biological system to speed up the acknowledgment of Mission Critical Edge for modern applications. Other ongoing news incorporates an organization with Eurotech. About Lynx Software Technologies Lynx Software Technologies is a chief Mission Critical Edge organization that empowers protected, secure, and superior conditions for worldwide clients in the aviation and car, undertaking, and modern business sectors. Since 1988, organizations have confided in Lynx's constant working framework, virtualization, and framework certificate insight, which extraordinarily empowers blended criticality frameworks to be tackled and convey deterministic continuous execution and astute dynamic. Along with a developing arrangement of innovation accomplices, Lynx is understanding another class of Mission Critical Edge frameworks that keep individuals and important information secured, at each second.

Read More