Data security is undoubtedly one of the aspects that most concerns both private users and organizations. If you are a GNU / Linux user, Tomb may be the tool you were looking for. It’s a free and Open Source file encryption software that allows you to encrypt files containing sensitive information.
Security researcher Sergey Zelenyuk has discovered a zero-day vulnerability in VirtualBox, the Open Source virtualization software developed by Oracle. This failure allows malware to leave the virtual machine and execute malicious code on the host OS that runs the VirtualBox process.
The latest release of the VDI and vApp connection broker vApp UDS Enterprise 2.2 introduces a new concept in the configuration of virtual desktops: persistent desktops at user level. This new development allows you to deploy a full persistent desktop, which will remain intact until the administrator of the platform decides to remove it manually.
After the soaring problems with the Meltdown and Specter, Intel is once again experiencing security-related issues. This time it is a vulnerability called Lazy FP State Restore, which affects the Intel processors with X86 architecture from Sandy Bridge.
Making a secure connection to any web page or server is nowadays essential, since there are many illicit practices that pursue the objective of subtracting sensitive information from users. When it comes to corporate information, for any company it is crucial to keep data safe. Therefore, the VDI and vApp connection broker UDS Enterprise allows to install SSL certificates on the system, to guarantee that all connections made by users to their virtual desktops and applications are 100% safe and reliable.
To offer the best experiences, we use technologies such as cookies to store and/or access device information. Consent to these technologies will allow us to process data such as browsing behavior or unique identifications on this site. Not consenting or withdrawing consent may negatively affect certain features and functions.
Functional
Always active
The storage or technical access is strictly necessary for the legitimate purpose of allowing the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication through an electronic communications network.
Preferencias
El almacenamiento o acceso técnico es necesario para la finalidad legítima de almacenar preferencias no solicitadas por el abonado o usuario.
Statistics
Storage or technical access that is used exclusively for anonymous statistical purposes.El almacenamiento o acceso técnico que se utiliza exclusivamente con fines estadísticos anónimos. Sin un requerimiento, el cumplimiento voluntario por parte de tu Proveedor de servicios de Internet, o los registros adicionales de un tercero, la información almacenada o recuperada sólo para este propósito no se puede utilizar para identificarte.
Marketing
Storage or technical access is necessary to create user profiles to deliver advertising, or to track the user across one or multiple websites for similar marketing purposes.