Skip to Content

We didn't find the posts for that URL.

Latest Posts

M365 SharePoint, OneDrive, Teams and Groups are managed in different consoles and often times by different administrators and in some cases even by the power user.  Without centralized visibility into these permissions and reporting enterprises may be left with governance issues that expose enterprise data to the wrong internal and external teams. Being able to …

Read More about Understanding the challenges with M365 permissions and how to remediate

Recently I spent some time reviewing the ESI Benchmark Report from Hornet security and found some valuable insights.  Also, as a long-time practitioner deploying email infrastructure and including deploying methods of phishing prevention, my interest in this topic and its evolution is still top of mind.  The other pinnacle consideration here for your enterprises is that phishing attacks …

Read More about Review of the Top 5 Findings in the ESI Benchmark Report

Virtual Desktop Infrastructure (VDI) is a popular solution for organizations seeking to provide their employees with secure and flexible access to their corporate desktops and applications. VMware Horizon is one of the most popular VDI products on the market, used by many different types of organizations, especially in the healthcare area.  Like with any technology, issues …

Read More about Streamlining VDI Troubleshooting for a Better End User Experience

Monitoring your enterprise end-user computing infrastructure is critical to ensuring systems are online and for proactive troubleshooting. Having the unique ability to engage in on-demand remediation of identified problems from within your monitoring solutions, gain insights into the user experience through a scorecard, intelligent sorting by active directory OU, and monitoring of both Citrix and …

Read More about The Latest Product Highlights in Goliath 12.1

Cyberattacks are a daily challenge and it’s critical to make sure that our users are responding to email related attacks appropriately.  Having a service that will not only train the user on what email messages look like that host enterprise threats the ability to test them is important as well.  While we may have email …

Read More about Hornetsecurity Security Awareness Service Reviewed

If you work in a technology role, then it won’t be any surprise to you when I say organizations have pivoted from specialist IT job functions, such as Citrix only roles, to making sure the infrastructure team can support many workloads.  The adoption of cloud technologies has also created support for this approach because our …

Read More about Doing more with less in IT, yes this impacts Citrix teams too!