A major vulnerability has been discovered that targets bash, the Unix system (including OSX) and Linux commands interpreter. Apparently, this security flaw is also affecting other interpreters, such as ksh, tcsh, zsh and csh. Nevertheless, other shells aren’t being affected.
UDS Enterprise servers aren’t vulnerable to this fail, so the security of the virrual machines which provide UDS Enterprise remains unaltered.
This vulnerability has been registed as CVE-2014-6271 and it allows to execute certain commands due to the wrong process of the environment variables. Besides, it may be exploited remotely.
Citrix has acquired Virtual, a company specialized in ARM-based hypervisors to check and develop mobile applications. This recent purchase has brought to light the new interests of this company, that could be planning to take new steps in the market, like the release of a new virtual mobile infrastructure.
The fact that Virtual employees are experts in hardware, security and jailbreaking prompts other speculations, such as the possibility of developing a mobile hypervisor for smartphones which may allow running operating systems on incompatible devices, improving the security of its existing products or integrating both Citrix and Virtual tecnologies.
At the very beginning of this week we provided some advices you should keep in mind before adopting a desktop virtualization platform. Today, we conclude those recommendations with the next steps you should take after analyzing the business and users’ needs and the existing environment.
All VDI projects that end successfully get started with a pilot test before undergoing production. This pilot allows the IT department to design, test and optimize a prototype of the environment. Before carrying out the pilot we recommend clearly identifying the solution use case, the desired functionality and the advantages and key milestones during implementation. For a pilot to be successful, collaboration between the team involved and the end user is vital.
A new technological trend has arisen after the massive adoption of BYOD (Bring Your Own Device) by most users, who use their own mobile devices for both personal and proffesional purposes. This new trend is called BYOID, Bring Your Own Identity, and it is based on the use of the same digital identities used in the social media profiles to access corporative applications.
The employees welcome this option, as they don’t need to create different accounts for the different web sites they access everyday but the IT departments face new necurity risks. Companies must catch up on this trend and make the adoption easier for the staff without threatening the security of corporate data.
The adoption of a VDI platform without taking some previous steps will surely lead the project to direct failure. In order to avoid this outcome, the UDS Enterprise Team describes below the most important elements you should bear in mind before implementing a virtual desktops platform into production.
Analyzing the current situation
Before implementing a VDI platform, we advise you to evaluate the requirements of the end user station environment and their states, and determine what the needs and advantages that desktop virtualization could provide to the organization. This is vital to carrying out these projects successfully. The work done during this initial phase will allow you to accurately define the most suitable parameters so that you can shape the solution that you need.
Download UDS ENTERPRISE and provide 24x7 secure access to your workspaces from anywhere and any device
Manage cookie consent
To offer the best experiences, we use technologies such as cookies to store and/or access device information. Consent to these technologies will allow us to process data such as browsing behavior or unique identifications on this site. Not consenting or withdrawing consent may negatively affect certain features and functions.
Functional
Always active
The storage or technical access is strictly necessary for the legitimate purpose of allowing the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication through an electronic communications network.
Preferencias
El almacenamiento o acceso técnico es necesario para la finalidad legítima de almacenar preferencias no solicitadas por el abonado o usuario.
Statistics
Storage or technical access that is used exclusively for anonymous statistical purposes.El almacenamiento o acceso técnico que se utiliza exclusivamente con fines estadísticos anónimos. Sin un requerimiento, el cumplimiento voluntario por parte de tu Proveedor de servicios de Internet, o los registros adicionales de un tercero, la información almacenada o recuperada sólo para este propósito no se puede utilizar para identificarte.
Marketing
Storage or technical access is necessary to create user profiles to deliver advertising, or to track the user across one or multiple websites for similar marketing purposes.