VIRTUAL DESKTOP TOOLS
prnewswire | March 31, 2023
Login VSI, the industry-leading software provider of 360° proactive visibility for virtual workspaces, announced the release of Login Enterprise 5.0, the latest version of its flagship product.
This release comes with highly anticipated new features – dashboards for cost and capacity tracking that offer predictive insights to help IT organizations control cost and optimize their virtualized desktop and application environments more effectively.
As the market for cloud-based desktops and hosted applications changes, concerns regarding cost management, now and in the future, have shifted to the top of the priority list for many organizations. For years, more visibility has been needed into the capacity and, more importantly, the cost of these environments as they change over time. The dashboards included in Login Enterprise 5.0 help fill this gap by enabling IT teams to track, trend, and monitor production deployments' cost, capacity, and performance over time as environments evolve.
"Understanding the costs associated with desktop and app virtualization, both on-premises and in the cloud, has always been challenging. Login VSI's benchmarking and proactive monitoring capabilities will help customers get accurate estimates–using data from their workloads–of their costs before deploying anything. This will allow them to make data-driven decisions based on cost and price-to-performance ratios while weighing out the benefits of cloud versus on-premises workloads," says Gabe Knuth, Senior Analyst at TechTarget's Enterprise Strategy Group.
Login VSI's mission is to enhance and extend visibility into virtual desktops and applications so IT teams can make wiser, more agile, and cost-effective decisions. The real-time insight provided by the new dashboards supports cost optimization and improves performance by enabling quick issue detection and offering optics into resource utilization.
According to John Vigeant, CEO of Login VSI, "With this major release of Login Enterprise 5.0, Login VSI is the only solution in the market that brings together proactive monitoring, cost optimization, and capacity planning for virtual desktops and apps. This is the very first time in the end-user computing space that VDI and DaaS teams can identify the optimal environment to run their virtual desktop workloads from a cost and performance perspective and measure end-user experience (EUX) to price, whether on-premises or in the cloud. Early customer deployments have already resulted in more than 40% realized savings in a single month of cloud PC spend."
As an established and respected industry leader, Login VSI partners with the world's top hardware and software vendors to ensure their joint customers have the best technology available.
"I am excited to see where Login Enterprise is going. This latest release will provide data-driven metrics for dashboards that fuel the key decision-makers and enable the EUC leaders to provide reporting and justification for their technology plans for the next 1 to 3 yrs. I am glad to be a part of something that will tremendously impact the market and how decisions are driven," says Jason Willis, Practice Principal Experience at Alchemy Technology Group.
This latest release of Login Enterprise will enable partners to strengthen their business cases, improve customer satisfaction, and maximize the value delivered.
About Login VSI
Login VSI helps organizations proactively manage the performance, cost, and capacity of their virtual desktops and applications wherever they reside – traditional, hybrid, or in the cloud. Our Login Enterprise platform is 100% agentless and can be used in all major VDI and DaaS environments, including Citrix, VMware, and Microsoft. With 360° proactive visibility, IT teams can plan and maintain successful digital workplaces with less cost, fewer disruptions, and lower risk.
VIRTUAL DESKTOP STRATEGIES, SERVER VIRTUALIZATION
NordVPN | March 16, 2023
NordVPN's current product update features Meshnet file-sharing, easy file-sharing functionality, and an open-source Linux application which provides free meshnet to everyone.
Meshnet's benefits no longer require a NordVPN subscription. Computers and mobile devices are now connected via a peer-to-peer VPN tunnel. Users can bypass restrictions by routing their internet traffic through any NordVPN-enabled remote device. Windows, mac, and linux devices can be personal VPN servers. This implies consumers can now enjoy perks at home regardless of their location.
Meshnet allows instant unlimited file sharing and sharing unlimited-size photos and videos without quality loss. In addition, it is a safe approach to share files through an end-to-end encrypted peer-to-peer VPN tunnel. Users can share and receive files from their own devices and from NordVPN-installed relatives, friends, and co-workers. Two-way permission ensures privacy with the new functionality.
Meshnet lets users avoid internet restrictions by routing their traffic through any remote NordVPN-installed device. Windows, Mac, and Linux devices can serve as personal VPN servers. This means consumers can enjoy all advantages at home regardless of their location.
NordVPN has rolled out three of its products under an open-source license:
The entire NordVPN Linux application,
Libtelio, which is a networking library used throughout NordVPN apps, and
Libdrop, a Meshnet file-sharing library.
Developers can now audit, review, and contribute to these products' source code, which is publicly available. NordVPN, an opensource shows transparency, community engagement, and product trust by making these products open source. Android, iOS, macOS, Windows, Linux, and Android TV support Meshnet.
NordVPN updated its Meshnet documentation page on its website, which states:
Internet traffic routing: With Meshnet, travelers can use a laptop left at home to browse the internet with their own IP address. Meshnet lets you establish your own VPN server through your own or your friends' devices, no matter their whereabouts.
Secure Remote Device Access: To view shared folders remotely, Meshnet doesn't require public sharing. It secures your home network using a peer-to-peer VPN tunnel, so you're the only one connecting to your home network.
Gaming: Meshnet acts as a virtual local area network (LAN), allowing users to play multiplayer games with others without LAN wires. In short, users can connect to the same server from different places.
NordVPN Product Strategist, Vykintas Maknickas, remarked, "We are continuously expanding the capabilities of NordVPN. This release marks a significant change in openness by both making part of the service free as well as open-sourcing a substantial part of our client software.”
(Source – iTWire)
NordVPN, founded in 2012, is a company that protects against ISPs, advertising, and other third-party snoopers. It makes connecting to public Wi-Fi hotspots easy and secure. Meshnet, a recent product, allows instant unlimited file sharing and sharing unlimited-size photos and videos without quality loss. It allows usage of personal VPN using windows, mac, and linux devices. It provides 5600+ servers in 60 countries to browse freely.
VIRTUAL DESKTOP TOOLS, SERVER VIRTUALIZATION
Delinea | March 15, 2023
On March 14, 2023, Delinea Platform, a cloud-native platform for Delinea's well-known PAM solutions, enabled dynamic permission controls, end-to-end visibility, and adaptive security.
Delinea Platform supports the latest version of Secret Server, its winning vault solution. It also supports a secure remote access service for suppliers and remote workers that doesn't require a VPN, as well as a rich environment for integration across the Delinea marketplace.
According to the Identity Defined Security Alliance study, 84% of firms had an identity-related breach last year. Gartner predicts that enterprises that deploy cybersecurity mesh architectures will cut security incident costs by 90% by 2024. By implementing a privileged access management platform as part of their cybersecurity mesh strategy, enterprises are able to move away from multiple-point solutions. This results in improved visibility, security, and efficiency across the organization. Delinea Platform enables streamlined authorization for all identities, restricting access to an organization's critical hybrid cloud infrastructure and sensitive data. This simplified security approach helps minimize risk and ensure compliance with industry regulations.
The growing number of siloed security products and the exponential expansion of human and machine identities with privileges make the management of privileged access difficult. As Delinea Platform adds more features, businesses will be able to manage authorization for all types of identities from a single location, which will improve efficiency and security. With analytics-based access controls and adaptive privilege automation in IT infrastructure, future updates to Delinea Platform will make sure that security stays consistent. This will ensure that identities get the right access at the right time with the authorized permissions.
Phil Calvin, Chief Product Officer at Delinea, stated, "The Delinea Platform will revolutionize the market by unifying and extending Privileged Access Management, dramatically reducing risk from the most common thread across all cyberattacks – compromised identities."
He added, "We are excited to take this first step by unifying the critical and core PAM capabilities on the Delinea Platform to provide world-class usability, seamless security, and simplified pricing that will accelerate adoption for our customers."
(Source – CISION PR Newswire)
Delinea, an upcoming enterprise, is a significant provider of privileged access management (PAM) solutions for modern and hybrid organizations. Delinea Platform effortlessly extends PAM by authorizing all identities, limiting access to an organization's most crucial hybrid cloud infrastructure and sensitive data, reducing risk, ensuring compliance, and making security easier. The company simplifies and limits access for thousands of clients globally. Its customer base includes small enterprises as well as large-scale financial institutions, intelligence agencies, and companies involved in constructing and maintaining critical infrastructure.