Virtual Desktop Strategies, Server Virtualization

Under the hood of Wslink’s multi layered virtual machine

October 11, 2022

under-the-hood-of-wslinks
ESET researchers recently described Wslink, a unique and previously undocumented malicious loader that runs as a server and that features a virtual-machine-based obfuscator. There are no code, functionality or operational similarities that suggest this is likely to be a tool from a known threat actor; the complete analysis of the malware can be found here.

Spotlight

ThinPrint

Networks are becoming more complex and heterogeneous and end devices more differentiated – whether remote and virtual desktops, PCs, Macs, iOS or Android devices, Chromebooks, thin or zero clients, branch offices, home workstations, whether cloud or on-premises. What remains is the need and wish to print from all these workstations. ThinPrint, an expert in enterprise printing solutions for 20 years, always has the right technology on hand for secure, high-performance printing that seamlessly combines with a perfect user experience. ThinPrint’s solutions support all printing innovations, thereby helping to complete and implement advanced technology that ranges from innovative end devices to printers.

OTHER WHITEPAPERS
news image

Zero Trust Maturity Model

whitePaper | June 13, 2023

The Cybersecurity and Infrastructure Security Agency (CISA) leads the nation’s effort to understand, manage, and reduce cybersecurity risk, including by supporting Federal Civilian Executive Branch agencies in evolving and operationalizing cybersecurity programs and capabilities. CISA’s Zero Trust Maturity Model (ZTMM) provides an approach to achieve continued modernization efforts related to zero trust within a rapidly evolving environment and technology landscape. This ZTMM is one of many paths that an organization can take in designing and implementing their transition plan to zero trust architectures in accordance with Executive Order (EO) 14028 “Improving the Nation’s Cybersecurity” § (3)(b)(ii),1 which requires that agencies develop a plan to implement a Zero Trust Architecture (ZTA). While the ZTMM is specifically tailored for federal agencies as required by EO 14028, all organizations should review and consider adoption of the approaches outlined in this document.

Read More
news image

SD-WAN Foundations for aSuccessful SASE Implementation

whitePaper | October 31, 2022

Secure access service edge (SASE) is a concept initiated by analyst research firm Gartner Inc. in 2019 as part of the technology “hype cycle.” Recently, SASE has been embraced by the customer and vendor community more readily to solve a variety of modern networking and security challenges.

Read More
news image

Virtual Desktop Services (VDS) : NetApp Solutions

whitePaper | August 12, 2022

The NetApp Virtual Desktop Service (VDS) orchestrates Remote Desktop Services (RDS) in major public clouds as well as on private clouds. VDS supports Windows Virtual Desktop (WVD) on Microsoft Azure. VDS automates many tasks that must be performed after deployment of WVD or RDS, including setting up SMB file shares (for user profiles, shared data, and the user home drive), enabling Windows features, application and agent installation, firewall, and policies.

Read More
news image

Capabilities You Need for Rapid Recovery

whitePaper | September 13, 2022

The growth and evolution of ransomware is one of the most destructive trends of the last decade. This explosion has moved ransomware from an economic crime to one with immense global security implications. NATO, the US federal government and military, and the G7 have all recently acknowledged the severity of the ransomware threat and the need for large-scale coordinated response from government and industry.

Read More
news image

Compliance with Internal Revenue Service (IRS) Publication 1075

whitePaper | June 15, 2022

The United States Internal Revenue Service’s (IRS) goal is to promote taxpayer confidence in the integrity of the tax system by ensuring confidentiality of the tax information provided to the federal, state and local agencies. The IRS 1075 publication provides guidance to agencies, agents, contractors and subcontractors on implementing adequate policies, processes, controls and safeguards to protect Federal tax information (FTI).

Read More
news image

THE VIRTUAL CLOUD NETWORK

whitePaper | January 15, 2020

Businesses are evolving faster than ever before. Key technologies such as the cloud, mobility and the Internet of Things (IoT) are enabling organizations to undertake broad and deep digital transformations—changing the way companies operate, creating new business models and lifting employee productivity to new heights. As digital transformation takes root in enterprises, a parallel shift is occurring from massive centralized data centers to the cloud and then to the edge of the network. It is at the edge where customer engagement and rich interactions are now happening; it’s also where customers and enterprises alike generate valuable data and insights. But to make it work—and to extract every bit of value—all of this needs to be connected back to the business.

Read More

Spotlight

ThinPrint

Networks are becoming more complex and heterogeneous and end devices more differentiated – whether remote and virtual desktops, PCs, Macs, iOS or Android devices, Chromebooks, thin or zero clients, branch offices, home workstations, whether cloud or on-premises. What remains is the need and wish to print from all these workstations. ThinPrint, an expert in enterprise printing solutions for 20 years, always has the right technology on hand for secure, high-performance printing that seamlessly combines with a perfect user experience. ThinPrint’s solutions support all printing innovations, thereby helping to complete and implement advanced technology that ranges from innovative end devices to printers.

Events