Virtual Desktop Strategies, Virtual Server Infrastructure

Zero Trust Maturity Model

June 13, 2023

zero-trust-maturity-model
The Cybersecurity and Infrastructure Security Agency (CISA) leads the nation’s effort to understand, manage, and reduce cybersecurity risk, including by supporting Federal Civilian Executive Branch agencies in evolving and operationalizing cybersecurity programs and capabilities. CISA’s Zero Trust Maturity Model (ZTMM) provides an approach to achieve continued modernization efforts related to zero trust within a rapidly evolving environment and technology landscape. This ZTMM is one of many paths that an organization can take in designing and implementing their transition plan to zero trust architectures in accordance with Executive Order (EO) 14028 “Improving the Nation’s Cybersecurity” § (3)(b)(ii),1 which requires that agencies develop a plan to implement a Zero Trust Architecture (ZTA). While the ZTMM is specifically tailored for federal agencies as required by EO 14028, all organizations should review and consider adoption of the approaches outlined in this document.

Spotlight

CBTS

CBTS is a leading technology provider to enterprises in all industries, including dozens of Fortune 500 and Global 2000 companies. What sets us apart is the agility, flexible delivery models, and client focus of a smaller company coupled with the ability to deliver the resources, scale, and capabilities required by large organizations. With over 800 certified engineers and locations across North America and the UK, CBTS offers outstanding expertise in transforming business operations.

OTHER WHITEPAPERS
news image

The definitive guide to secure remote access

whitePaper | December 22, 2021

Enterprises are migrating their private applications to public clouds, and users are consuming more applications, connecting to them from everywhere and from any device. This has created a proliferation of perimeters around users, devices, and applications. Although many organizations have already taken steps to embrace digitalization and enable a zero-trust network, their connectivity is still operating on incumbent network-centric approaches. Teams struggle to retrofit network-centric VPN technology to meet the needs of the modern user and the transforming business, but retrofitted approaches can prevent digitalization. It’s time to redefine secure remote access.

Read More
news image

How to meet the IoT security requirements of today and tomorrow

whitePaper | March 28, 2023

Governments around the world are creating Internet of Things (IoT) security legislation and regulations designed to keep users safe in an increasingly connected world. Connectivity is good and, in fact, great but bad things can happen to people with unprotected or poorly protected IoT devices. Failing to meet government regulations or guidelines may lead to the inability to sell products in a region and thus to lost revenue. However, the regulations are constantly in a state of flux. This white paper provides updated background on what governments are suggesting or requiring as well as specific details on how to implement security defenses and obtain security certifications that can satisfy current and even future government requirements

Read More
news image

VMware Horizon Cloud Service on Microsoft Azure Security Considerations

whitePaper | January 29, 2020

Horizon Cloud Service on Microsoft Azure is a software service from VMware that enables the delivery and management of virtual desktops and applications on Azure. Horizon Cloud on Microsoft Azure allows you to bring your own existing Azure infrastructure capacity and pair it with the Horizon Cloud Service. Built from the ground up as a cloud-native, multi-tenant solution, Horizon Cloud on Microsoft Azure combines the benefit of consuming desktop and application virtualization as an always up-to-date, software-as-a-service from VMware with the consumption-based infrastructure pricing and extensive global footprint of Azure.

Read More
news image

HP Print and Scan Devices Supported in Citrix Virtual Apps and Virtual Desktops Environments

whitePaper | May 3, 2022

These tests were run to determine how HP printers and their associated printer drivers performed using the standard printer and printer-related features tests that Citrix uses to test its Virtual Apps server and client software.

Read More
news image

Software-Defined Data Center – infrastructure for enterprise digital transformation

whitePaper | November 14, 2022

Over the years the trend toward virtualization revolutionized data centers, but it did not change the hardwarecentric architecture that still serves as the basis for most data centers today. This could radically change in light of the latest software-defined approaches. Strategy, organization, technology: This white paper serves as a source of orientation for IT managers confronted with software-defined data center concepts.

Read More
news image

Virtualization is the Present and Future of Mobile Networks

whitePaper | June 15, 2022

The future of mobile networks will be software-centric, and Samsung is leading the way to transforming how wireless networks are designed and implemented using virtualization. The hardware-centric approach for network development, using vendor-specific hardware designs, has remained static for decades. That model is unable to keep up with the fast-changing world of today’s telecommunication services.

Read More

Spotlight

CBTS

CBTS is a leading technology provider to enterprises in all industries, including dozens of Fortune 500 and Global 2000 companies. What sets us apart is the agility, flexible delivery models, and client focus of a smaller company coupled with the ability to deliver the resources, scale, and capabilities required by large organizations. With over 800 certified engineers and locations across North America and the UK, CBTS offers outstanding expertise in transforming business operations.

Events