desktop-virtualization-community-VDI-UDS-EnterpriseJOIN OUR
COMMUNITY
desktop-virtualization-software-VDI-UDS-Enterprise

TRY OUR SOFTWARE

Open Virtualization Blog

Security Posts

None

Open Source Security Software Hackathon

On Monday, March 26 Luxembourg will host the third edition of the Open Source Security Software Hackathon. The event, organized by the hack.lu team will bring groups of developers together to work ...
READ MORE 2018-02-22 https://www.udsenterprise.com UDS Enterprise TeamOpen Source Security Software Hackathon
None

Linux distros to clone and copy disks

When our computer stops working, the disk is damaged, we suffer a data loss from the main unit or it becomes infected with a virus, we look for a fast and effective solution. Since prevention is be...
READ MORE 2018-02-02 https://www.udsenterprise.com UDS Enterprise TeamLinux distros to clone and copy disks
None

How to secure your Linux file system

Although Linux is considered the safest operating system, it has recently been proven that it is not always safe from vulnerabilities. Therefore, it is important to adopt security measures that gua...
READ MORE 2018-01-23 https://www.udsenterprise.com UDS Enterprise TeamHow to secure your Linux file system
None

VDI to protect critical data according to EU

In May of this year 2018 the General Data Protection Regulation (GDPR) will enter into force, which will be mandatory in all countries of the European Union. This new regulation will affect all co...
READ MORE 2018-01-18 https://www.udsenterprise.com UDS Enterprise TeamVDI to protect critical data according to EU
None

UDS Enterprise, safe from Meltdown & Spectre

Since the beginning of the year, the alarms about the existence and effects of Meltdown and Spectre have been raised, news related to these attacks do not stop popping out. The latest information s...
READ MORE 2018-01-15 https://www.udsenterprise.com UDS Enterprise TeamUDS Enterprise, safe from Meltdown & Spectre
None

State of Open Source Security 2017

The company Snyk has released a report that analyzes The State of Open Source Security focusing on three main areas: the Open Source panorama, the life cycle of a vulnerability detected in Open Sou...
READ MORE 2017-11-29 https://www.udsenterprise.com UDS Enterprise TeamState of Open Source Security 2017
None

Balance VDI user experience and security

In the world of VDI, balance is also essential when it comes to user experience and security. Unfortunately for VDI administrators, there is no all-powerful chosen one who can swoop in and deliver ...
READ MORE 2017-03-16 https://www.udsenterprise.com UDS Enterprise TeamBalance VDI user experience and security
None

A successful print security plan in 8 steps

Printers and multifunction printers (MFPs) are not immune to the security threat and are vulnerable to the same risks as any device on the network. As IoT devices they are susceptible to the growin...
READ MORE 2017-02-16 https://www.udsenterprise.com UDS Enterprise TeamA successful print security plan in 8 steps
None

If you need privacy you need to run Linux

Millions of IT professionals have been praising desktop Linux for ages for some reasons that privacy is a new one of them. Chrome OS and Android, for example, are Linux distributions, but they perf...
READ MORE 2017-02-09 https://www.udsenterprise.com UDS Enterprise TeamIf you need privacy you need to run Linux
None

What is new with Docker for AWS public Beta

Yesterday, Docker announced that Docker for AWS is graduating to public beta. Docker for AWS is a great way for ops to setup and maintain secure and scalable Docker deployments on AWS. With Docker ...
READ MORE 2016-11-30 https://www.udsenterprise.com UDS Enterprise TeamWhat is new with Docker for AWS public Beta
None

Isolating systems with Linux Namespaces

If you’ve used tools like Docker, you already know that these tools are capable of isolating processes in small “containers”. Running processes in Docker containers is like running them in virtual ...
READ MORE 2016-11-16 https://www.udsenterprise.com UDS Enterprise TeamIsolating systems with Linux Namespaces
None

How to improve the security of Linux containers

Software developers use Linux containers to save time and money, providing a mechanism to build much more manageable applications through development, testing and environments of implementation wit...
READ MORE 2016-11-14 https://www.udsenterprise.com UDS Enterprise TeamHow to improve the security of Linux containers
None

Zero-day vulnerability in LDAP amplifies DDoS attacks

Corero Network Security identified a zero-day vulnerability in LDAP protocol that enables to amplify Distributed Denial of Service attacks (DDoS) 50 times, making them much more effective and much...
READ MORE 2016-10-28 https://www.udsenterprise.com UDS Enterprise TeamZero-day vulnerability in LDAP amplifies DDoS attacks
None

Linux privilege-escalation vulnerablity

Linux security expert Phil Oester discovered a privilege-escalation critical vulnerability affecting the Linux Kernel. This bug is called Dirty COW and identified as CVE-2016-5195 and although it h...
READ MORE 2016-10-21 https://www.udsenterprise.com UDS Enterprise TeamLinux privilege-escalation vulnerablity
None

UDS Enterprise, Tredly & VDI authentication

The different uses of UDS Enterprise connection broker, an interesting Open Source software for containers management in Unix OS and UDS Enterprise authentication system have been the most read top...
READ MORE 2016-05-18 https://www.udsenterprise.com UDS Enterprise TeamUDS Enterprise, Tredly & VDI authentication
None

Securing data in Windows & Linux with Open Source apps

Security is one of the top concerns for many users, companies and organizations, that look for the best solutions to keep sensitive data safe. KeePassX is one of them, an Open Source application b...
READ MORE 2016-05-12 https://www.udsenterprise.com UDS Enterprise TeamSecuring data in Windows & Linux with Open Source apps

UDS Enterprise's sophisticated authentication system

UDS Enterprise, the multiplatform connection broker to deploy and manage virtual and physical desktops, applications and other Windows and Linux services, features a unique authentication system t...
READ MORE 2016-05-11 https://www.udsenterprise.com UDS Enterprise TeamUDS Enterprise's sophisticated authentication system

App virtualization, desktop services & thin clients

As usual, today we collect the most read articles in our blog during the last weeks. We talk about application virtualization, remote desktop services and security regarding thin clients used for d...
READ MORE 2016-03-16 https://www.udsenterprise.com UDS Enterprise TeamApp virtualization, desktop services & thin clients
None

Is antimalware software required on VDI thin clients?

Thin clients are one useful option for VDI access. Some of these devices don't require antimalware software, as they are secure enough by their own. But some others require extra protection in orde...
READ MORE 2016-03-07 https://www.udsenterprise.com UDS Enterprise TeamIs antimalware software required on VDI thin clients?
None

Warning over Linux bug revealed by Google and Red Hat

Google and Red Hat have been working together to release a patch for a bug in GNU C Library or glibc, used by most Linux applications, distros and devices. This vulnerability can be remotely exploi...
READ MORE 2016-02-17 https://www.udsenterprise.com UDS Enterprise TeamWarning over Linux bug revealed by Google and Red Hat

Best VDI solution, app virtualization & firewalls

The choice of UDS Enterprise as best VDI tech and pricing proposal by a commitee comprised of experts from more than 20 Spanish universities, the video showing how application virtualization with U...
READ MORE 2016-02-16 https://www.udsenterprise.com UDS Enterprise TeamBest VDI solution, app virtualization & firewalls