Top White Papers and Webcasts

  • The ultimate goal of any attack on a computer system is to gain access to a target host and perform an unauthorized action, which results in the compromise of an asset or data. Intruders may use several techniques to circumvent these levels of protection, such as targeting vulnerable services, invoking backdoor privilege escalation, or replacing key operating system files. This research report details the capacity of an advanced endpoint protection (AEP) solution to detect, prevent, and continuously log …

  • OnDemand Citrix XenApp solution for application and desktop delivery provides Windows apps and server–based desktops to workers on any device, anywhere. In this lab you will deploy a Citrix XenApp infrastructure in Azure, then publish an application to an endpoint. You will also create a Windows 10–based VDI implementation and login to this virtual desktop using Citrix Receiver. Our Cloud Expert trainer will show you how to: Deploy a multi–server Citrix XenApp/XenDesktop infrastructure …