Major vulnerability found in bash

Major vulnerability found in bash

A major vulnerability has been discovered that targets bash, the Unix system (including OSX) and Linux commands interpreter. Apparently, this security flaw is also affecting other interpreters, such as ksh, tcsh, zsh and csh. Nevertheless, other shells aren’t being affected.

UDS Enterprise servers aren’t vulnerable to this fail, so the security of the virrual machines which provide UDS Enterprise remains unaltered.

This vulnerability has been registed as CVE-2014-6271 and it allows to execute certain commands due to the wrong process of the environment variables. Besides, it may be exploited remotely.

What will come out of new Citrix acquisition?

What will come out of new Citrix acquisition?

Citrix has acquired Virtual, a company specialized in ARM-based hypervisors to check and develop mobile applications. This recent purchase has brought to light the new interests of this company, that could be planning to take new steps in the market, like the release of a new virtual mobile infrastructure.

The fact that Virtual employees are experts in hardware, security and jailbreaking prompts other speculations, such as the possibility of developing a mobile hypervisor for smartphones which may allow running operating systems on incompatible devices, improving the security of its existing products or integrating both Citrix and Virtual tecnologies.

Ensure a successful adoption of VDI (Second Part)

Ensure a successful adoption of VDI (Second Part)

At the very beginning of this week we provided some advices you should keep in mind before adopting a desktop virtualization platform. Today, we conclude those recommendations with the next steps you should take after analyzing the business and users’ needs and the existing environment.

All VDI projects that end successfully get started with a pilot test before undergoing production. This pilot allows the IT department to design, test and optimize a prototype of the environment. Before carrying out the pilot we recommend clearly identifying the solution use case, the desired functionality and the advantages and key milestones during implementation. For a pilot to be successful, collaboration between the team involved and the end user is vital.

BYOID adoption and the new security risks

BYOID adoption and the new security risks

A new technological trend has arisen after the massive adoption of BYOD (Bring Your Own Device) by most users, who use their own mobile devices for both personal and proffesional purposes. This new trend is called BYOID, Bring Your Own Identity, and it is based on the use of the same digital identities used in the social media profiles to access corporative applications.

The employees welcome this option, as they don’t need to create different accounts for the different web sites they access everyday but the IT departments face new necurity risks. Companies must catch up on this trend and make the adoption easier for the staff without threatening the security of corporate data.

Ensure a successful adoption of VDI (First Part)

Ensure a successful adoption of VDI (First Part)

The adoption of a VDI platform without taking some previous steps will surely lead the project to direct failure. In order to avoid this outcome, the UDS Enterprise Team describes below the most important elements you should bear in mind before implementing a virtual desktops platform into production.

Analyzing the current situation

Before implementing a VDI platform, we advise you to evaluate the requirements of the end user station environment and their states, and determine what the needs and advantages that desktop virtualization could provide to the organization. This is vital to carrying out these projects successfully. The work done during this initial phase will allow you to accurately define the most suitable parameters so that you can shape the solution that you need.

Skip to content