Unified Endpoint Management Market by 2019-2026

globalmarketresearch.com | July 05, 2019

Unified Endpoint Management Market research report is the new statistical data source added by Research N Reports. It uses several approaches for analyzing the data of target market such as primary and secondary research methodologies. It includes investigations based on historical records, current statistics, and futuristic developments. Global Unified Endpoint Management Market is predicted to grow at a significant CAGR in the forecast period.For a stronger and more stable business outlook, the report on the Global Unified Endpoint Management Market carries key projections that can be practically studied. The report highlights major technological developments and changing trends adopted by key companies over a period of time. To achieve this, the research segments and sub-segments the global market by using many criteria. The growth predictions for each of these segments are included in the report.

Spotlight

This document specifies the versions of firmware, and software that are recommended for use with VMware vSphere 5.x OS releases in conjunction with the HP Service Pack for ProLiant (SPP) 2014.09.0 and Maintenance Supplement Bundle (MSB) 2014.10. The firmware versions and software versions listed in this document have been tested as a solution set using this SPP as a baseline, and are fully supported by HP. Review the SPP Support Statement document on www.hp.com/go/spp/documentation to understand the support policy for SPP releases. When posted, the SPP will contain the firmware and drivers specified in this document. The specified drivers are also included in the VMware base image or HP Custom image, available from VMware.com or available on HP’s vibsdepot (5.0/5.1 and 5.5 and 6.0) for this release. The specified system management software is included in the HP Custom Image, available from hp.com or available on HP’s vibsdepot (5.0/5.1 and 5.5 and 6.0) for this release.


Other News
VPN

Banyan Security Research Uncovers Primary Considerations Influencing Zero Trust Network Access (ZTNA) Adoption

Banyan Security | June 28, 2022

Banyan Security, a leading provider of Zero Trust Network Access (ZTNA) solutions, today revealed new research highlighting organizations’ preferences and hesitations for adopting modern remote access solutions. The independent survey was conducted by Sapio Research and engaged over 400 senior decision makers from mid- to large-sized companies in the U.S. and Canada, who are responsible for IT security and are aware of both virtual private networks (VPN) and ZTNA. The key findings from this study include: Over half (54%) of VPN owners stated that secure remote access is a priority at this time. VPN usage is still prevalent among a majority (90%) of security teams who have highlighted cost, time, and difficulty as reasons to not move forward with ZTNA adoption. Almost all organizations (97%) say that adopting a zero trust model is a priority, with 93% of organizations having committed a budget to enhance their VPN or move toward ZTNA within the next year or two. More than half (53%) of respondents have already started rolling out zero trust solutions. Personal Devices and VPNs Do Not Mix The last two years have shifted how we work, producing a new remote workforce that was essentially created overnight. As highlighted in this study, this has resulted in most workers – in this case 51% of respondents – using a combination of corporate and personal devices to connect to business applications and resources. Personal devices often used by less security-conscious family members. This creates a very risky environment as personal devices are easy targets for threat actors especially since IT teams cannot fully monitor activity on these devices. Additionally, personal devices are often used by other family members – particularly children – which make them even more susceptible to malware and other viruses. Despite known security issues, VPN usage continues to thrive, with 90% of respondents currently using a VPN in some capacity for secure remote access. When access is permitted on a personal device, it creates a risky situation for not only the user, but the entire organization. VPNs lack many of the application-level access controls and integrated security that are common in ZTNA solutions. As a result, cybercriminals will often target VPNs because a single set of compromised credentials can provide all of the access needed to carry out a data breach, ransomware incident, or other attacks. “As this study shows, VPN usage continues to be prevalent, often viewed as ‘good enough’ for remote access among organizations simply because that is what they have always used, What this doesn’t account for is the poor administrative and end user experience, not to mention that on-premises access must be handled with separate, siloed tools. We have plenty of evidence to show that legacy VPNs no longer adequately protect nor provide consistent and easy access to corporate resources for today’s ‘work from anywhere’ workforce.” Jayanth Gummaraju, CEO & Co-Founder of Banyan Security Key Drivers for ZTNA A majority of the respondents (97%) stated that adopting a zero trust model is a priority for their organization, where 44% said they have plans to roll out zero trust but are in the early stages, while 53% said they have already begun to roll out zero trust solutions. For organizations who have begun to roll out ZTNA solutions, the survey revealed that secure remote access (48%), improving the end user experience (34%) and eliminating exposure to VPN vulnerabilities (34%) were the top three drivers in their decision to choose ZTNA. Unlike VPNs, ZTNA provides access on a case-by-case basis, which is decided based on user, device, and application-level access and security controls. What’s Holding VPN Users Back from Making the Switch? Over two thirds of organizations (69%) believe implementing a ZTNA strategy would require a large undertaking. Aside from the general familiarity and comfortable usage of their traditional VPN solution, organizations stated that cost/budget constraints are the biggest barriers (62%) for VPN users to adopt ZTNA. Thirty percent of VPN owners said that it would be difficult to implement ZTNA infrastructure in their current security environment; however, 82% of respondents stated they would likely implement ZTNA if there was an easily deployable, inexpensive option. Apathy also appears to be one of the biggest barriers preventing VPN owners from adopting ZTNA solutions with 46% of respondents stating that modern, secure remote access is not a priority at this time. “While it is good to see that awareness of ZTNA solutions amongst IT security professionals continues to grow, the actual implementation of a ZTNA architecture is still considerably low, with just over 17% of respondents having truly begun to roll out a ZTNA strategy,” continued Gummaraju. “As we look toward a future where remote and hybrid work are the standard for most organizations, it’s encouraging to see that IT teams are looking beyond VPNs at more comprehensive zero trust network access solutions.” Research Methodology The survey was conducted among 410 Senior Decision Makers from mid- to large-sized companies in the U.S. and Canada, who are responsible for IT security and are aware of both VPN and ZTNA. The interviews were conducted online by Sapio Research in April 2022 using an email invitation and an online survey, with results accurate to ± 4.8% at 95% confidence limits. About Banyan Security Banyan Security provides secure, zero trust “work from anywhere” access to infrastructure and applications for employees, developers, and third parties without relying on network-centric legacy VPNs. Deep visibility provides actionable insight while continuous authorization with device trust scoring and least privilege access deliver the highest level of protection with a great end user experience. Banyan Security protects tens of thousands of employees across multiple industries, including finance, healthcare, manufacturing, and technology.

Read More

VIRTUAL DESKTOP TOOLS

Opera ships its new VPN Pro service to Windows and Mac to give you an extra level of security as you travel

Opera | August 08, 2022

Opera (NASDAQ: OPRA), the company behind the eponymous web browser, recently announced the expansion of its security features with the new VPN Pro subscription service, a premium device-wide VPN that can be used without the installation of a separate app. The VPN Pro service, previously available on Android, is now coming to Opera users on Windows and Mac. Travelling with no limits Opera VPN Pro is now multi-platform Opera VPN Pro is now multi-platform Opera ships its new VPN Pro service to Windows and Mac to give you an extra level of security as you travel Opera ships its new VPN Pro service to Windows and Mac to give you an extra level of security as you travel Opera ships its new VPN Pro service to Windows and Mac to give you an extra level of security as you travel Opera ships its new VPN Pro service to Windows and Mac to give you an extra level of security as you travel The summer is a time of travel, with people once again changing their location: for leisure or to attend industry events. The pleasures of travel, however, also come with the cybersecurity risks of using public Wi-Fi. The Opera browser, which is known for its free browser VPN, which is still available to all of our users, is providing its users with a device-wide solution that protects their laptops no matter where they go and what connections they use – from subway hotspots to hotel Wi-Fi. Opera VPN Pro users can enjoy safe and seamless connections wherever their vacation or business trip takes them. The subscription-based service will cover up to six devices connected to one account. Opera is offering a free month with an unlimited secure VPN connection to those who subscribe to VPN Pro via desktop before August 31st, with an opportunity to cancel the subscription at any time. Working from the beach, airport, or a cafe, as well as just browsing the web for fun, is now safer thanks to the VPN Pro solution. To use the new Opera VPN Pro, users need to install Opera Browser on Windows, or Mac on their computer, then sign into their Opera Account and try it for free. From that point, whenever the VPN is switched on, all the data that users send to the internet will be encrypted and sent to one of thousands of VPN servers around the world. This not only protects them while using unencrypted Wi-Fi at airports, restaurants and city centers, but also makes it harder for advertisers to track them. With a simple click on the Opera VPN Badge in the Opera browser address bar, or via the tray icon, users can enable full protection at any moment. Opera VPN Pro is available in English, German, French, Spanish, Polish, and Brazilian Portuguese. Available on Android, Windows and Mac Back in March, Opera released VPN Pro, a full-featured VPN solution that encrypts all traffic going out of the user's Android device. Today, it's boosting users' privacy on desktop. "VPN services are becoming an essential part of browsing, regardless of the device being used. Therefore, we decided to expand our offering so that users can connect up to six Android and desktop devices to their VPN subscription at once and stay safe online," said Krystian Kolondra, EVP PC & Gaming at Opera. VPN Pro satisfies the needs of those users who are looking for increased protection. It provides security to the entire device and protects up to 6 different Android and Win or Mac devices within one subscription. User data stays safe behind a wall of next-generation encryption, no matter what application is used. Just like Opera's Free VPN, VPN Pro is a no-log service. It offers access to 3,000+ private network servers in over 30 locations around the world, allowing users to download files and browse the web securely with a speedy VPN connection and unlimited bandwidth for all supported devices. There is no need to sacrifice speed for better security since VPN Pro gives access to high-speed servers, so users can browse faster than ever. Additionally, users can run data-saving mode alongside VPN Pro to ensure they never go overboard on their data. How to get started VPN Pro can be used on Windows and Mac by installing Opera Browser for desktop. To enhance device security and safety, users can subscribe to Opera VPN Pro directly inside the Opera Browser by following 5 simple steps: download the latest version of Opera Browser; log into Opera Account and select desired subscription period; follow the payment steps; enjoy a seamless and protected connection to the web! To use the same subscription on your Android device, simply download the Opera Browser for Android from the playstore, sign in to the same Opera account you have on your desktop and start using your VPN Pro on your phone! With Opera VPN Pro, existing Opera users can easily subscribe using their Opera account without the need to download another app or create another account. The pricing options vary from $1.99 to $5.99 per month (depending on the duration of the subscription) of VPN protection, making Opera VPN Pro one of the safest and most economical solutions on the market. If a user ever needs any help with the service, Opera's team of industry-leading experts are always available to assist. Support can be easily reached through the Help Center or by Chat & Email support, both available here. VPN Pro is currently available for users in the majority of markets around the globe. There is a 7-day free trial period and a 30-day money-back guarantee. Before the 31st of August, new users of VPN Pro on desktop can get one month of subscription for free. The release has a pricing offer of $5.99 for one month, $2.99 per month with a 6-month subscription, and $1.99 per month with a 12-month subscription for VPN protection. To discover all the benefits, visit the dedicated VPN Pro page. About Opera Opera is a global web innovator with an active base of hundreds of millions of monthly active users who have sought a better internet experience. Building on over 25 years of innovation that started with browser products, Opera is now leveraging its brand and highly engaged user base in order to expand its business into new segments. Today, Opera offers users around the world a range of products and services that include PC and mobile browsers, the newsreader Opera News, and apps dedicated to gaming, Web3 and e-commerce. Opera is headquartered in Oslo, Norway and listed on the NASDAQ stock exchange (OPRA).

Read More

VIRTUAL DESKTOP STRATEGIES

Citrix a Leader in Zero-Trust Network Access

Citrix | June 22, 2022

When it comes to protecting apps and data in the world of hybrid work, zero-trust network access (ZTNA) is the name of the game. And according to the GigaOm Radar for Zero-Trust Network Access, Citrix Systems, Inc.is a Leader and Fast Mover in delivering solutions companies can use to win it. “Virtual private networks (VPNs) have long been the default method of securing remote access, However, VPNs are limited with respect to the level of control they can provide, as they are unable to take into consideration the context in which legitimate users are accessing resources.” Chris Ray, Security Researcher, GigaOm Designed to assist IT organizations in identifying more modern ZTNA solutions that provide greater control, the GigaOm Radar for Zero-Trust Network Access evaluated 12 vendors on the following criteria: AM & MFA Vendor Integrations Cloud & SaaS Integrations UEBA-Like Capabilities Unmanaged Device Support Legacy Application Support Session Monitoring Capabilities Citrix was ranked as a Leader and Fast Mover in all categories, and noted for the extensibility, integration maturity and technical innovation of its ZTNA solutions. Citrix provides a unified stack of cloud-delivered secure access solutions that give employees the flexibility and choice to work where and how they prefer and IT the visibility and control to ensure they do so in a secure manner. “When it comes to securing apps and data, there’s more at stake than protecting against threats and vulnerabilities,” said Pankaj Gupta, Senior Director, Product Management, Citrix. “To remain productive and engaged, employees must be able to access the resources they need to get work done in a hassle-free way that is transparent to them.” With Citrix, they can. Citrix secure access solutions leverage the latest ZTNA technology to secure user access to all corporate applications—web, SaaS, client/server, and desktop as a service (DaaS)—whether they're deployed in public clouds or on-premises datacenters. Unlike traditional VPN and SSO which authenticate at login only, Citrix ZTNA solutions continuously evaluate risk factors throughout each session. When suspicious activity is detected, granular security controls automatically kick and work in the background to change how users are authorized to interact with apps to keep things safe without hampering their experience. “Citrix’s strategy to combine holistic security with a great user experience is a key differentiator,” Ray notes. Among the other strengths called out within the report: Completeness of solution Very strong, well-thought-out features Unmanaged device support through a remote browser Robust data loss prevention technologies Simple, mature integrations with other technologies “Network and application security has gotten complicated, and we are pleased to be recognized by GigaOm as a leader in delivering solutions that companies can use to simplify it by enacting a modern approach that supports the future of work,” Gupta said. About GigaOm GigaOm provides technical, operational, and business advice for IT’s strategic digital enterprise and business initiatives. Enterprise business leaders, CIOs, and technology organizations partner with GigaOm for practical, actionable, strategic, and visionary advice for modernizing and transforming their business. GigaOm’s advice empowers enterprises to successfully compete in an increasingly complicated business atmosphere that requires a solid understanding of constantly changing customer demands. GigaOm works directly with enterprises both inside and outside of the IT organization to apply proven research and methodologies designed to avoid pitfalls and roadblocks while balancing risk and innovation. Research methodologies include but are not limited to adoption and benchmarking surveys, use cases, interviews, ROI/TCO, market landscapes, strategic trends, and technical benchmarks. Our analysts possess 20+ years of experience advising a spectrum of clients from early adopters to mainstream enterprises. GigaOm’s perspective is that of the unbiased enterprise practitioner. Through this perspective, GigaOm connects with engaged and loyal subscribers on a deep and meaningful level. About Citrix Citrix builds the secure, unified digital workspace technology that helps organizations unlock human potential and deliver a consistent workspace experience wherever work needs to get done. With Citrix, users get a seamless work experience and IT has a unified platform to secure, manage, and monitor diverse technologies in complex cloud environments. For Citrix Investors: This release contains forward-looking statements which are made pursuant to the safe harbor provisions of Section 27A of the Securities Act of 1933 and of Section 21E of the Securities Exchange Act of 1934. The forward-looking statements in this release do not constitute guarantees of future performance. Those statements involve a number of factors that could cause actual results to differ materially, including risks associated with the impact of the global economy and uncertainty in the IT spending environment, revenue growth and recognition of revenue, products and services, their development and distribution, product demand and pipeline, economic and competitive factors, the Company's key strategic relationships, acquisition and related integration risks as well as other risks detailed in the Company's filings with the Securities and Exchange Commission. Citrix assumes no obligation to update any forward-looking information contained in this press release or with respect to the announcements described herein. The development, release and timing of any features or functionality described for our products remains at our sole discretion and is subject to change without notice or consultation. The information provided is for informational purposes only and is not a commitment, promise or legal obligation to deliver any material, code or functionality and should not be relied upon in making purchasing decisions or incorporated into any contract.

Read More

VMWARE

Broadcom in Talks to Acquire Cloud Company VMware

VMware | May 23, 2022

Broadcom Inc. is in talks to acquire VMware Inc., the cloud-computing company backed by billionaire Michael Dell, according to people familiar with the matter, setting up a blockbuster tech deal that would vault the chipmaker into a highly specialized area of software. The discussions are ongoing and there’s no guarantee they will lead to a purchase, said the people, who asked not to be identified because the matter isn’t public. VMware currently has a market valuation of about $40 billion. Assuming a typical premium, the potential deal price would be higher, though the terms under consideration couldn’t be learned. Shares in VMware rose 15% in premarket trading on Monday, which would give the company a market value of about $46 billion. Broadcom, which has a valuation of about $222 billion, fell 2.4%. The transaction would extend a run of acquisitions for Broadcom Chief Executive Officer Hock Tan, who has built one of the largest and most diversified companies in the chip industry. Software has been a key focus in recent years, with Broadcom buying CA Technologies in 2018 and Symantec Corp.’s enterprise security business in 2019. A representative for VMware declined to comment. A representative for Broadcom wasn’t available for comment. “Investors have been increasingly focused on Broadcom’s appetite for another strategic or platform enterprise software acquisition—especially given the recent compression in software valuation, “ Wells Fargo analysts wrote after Bloomberg News’s report. “An acquisition of VMware would be considered as making strategic sense; consistent with Broadcom’s focus on building out a deepening enterprise infrastructure software strategy.” Broadcom makes a wide range of electronics, with its products going into everything from the iPhone to industrial equipment. But data centers have become a critical source of growth, and bulking up on software gives the company more ways to target that market. Broadcom was previously in talks to acquire SAS Institute Inc., a closely held software company valued at $15 billion to $20 billion. But those discussions ended last year without a deal.

Read More

Spotlight

This document specifies the versions of firmware, and software that are recommended for use with VMware vSphere 5.x OS releases in conjunction with the HP Service Pack for ProLiant (SPP) 2014.09.0 and Maintenance Supplement Bundle (MSB) 2014.10. The firmware versions and software versions listed in this document have been tested as a solution set using this SPP as a baseline, and are fully supported by HP. Review the SPP Support Statement document on www.hp.com/go/spp/documentation to understand the support policy for SPP releases. When posted, the SPP will contain the firmware and drivers specified in this document. The specified drivers are also included in the VMware base image or HP Custom image, available from VMware.com or available on HP’s vibsdepot (5.0/5.1 and 5.5 and 6.0) for this release. The specified system management software is included in the HP Custom Image, available from hp.com or available on HP’s vibsdepot (5.0/5.1 and 5.5 and 6.0) for this release.

Resources