Increase the security of your systems and your data with UDS VDI

Increase the security of your systems and your data with UDS VDI

Today is the European Data Protection Day. A date established by the European Commission, the Council of Europe and the Data Protection authorities of the member states of the European Union to raise awareness about the importance of privacy and user data protection. At a time when technology has become an indispensable engine to guarantee the continuity of most businesses, it is worth reflecting on the suitability of the solutions we are using to work remotely from the security perspective. Desktop virtualization has emerged as the best bet for keeping computer systems, sensitive information and user data properly shielded.

Top 5: We compile the best posts on VDI technology of 2020

Top 5: We compile the best posts on VDI technology of 2020

When there are only a few days left to say goodbye to this unusual year, we have compiled the Top 5 of the most read articles in our blog in 2020. As you may know, we strive to keep our readers up-to-date with the most outstanding news about virtualization in general, desktop and application virtualization in particular, Open Source technologies, and announcements, news, and case studies with UDS Enterprise, our software for VDI, vApp and remote access to physical and virtual machines.

PLATYPUS: a new threat affecting Intel and AMD CPUs

PLATYPUS: a new threat affecting Intel and AMD CPUs

A new side channel attack threatens Intel and AMD CPUs. It has been discovered by a group of Austrian researchers from the Graz University of Technology. They have called it PLATYPUS and it allows exploiting variations in processor power consumption to access confidential data. One of the characteristics that differentiate this attack from other similar ones is that it does not require physical access to the server, desktop or laptop.

Open Source tools to protect enterprise networks

Open Source tools to protect enterprise networks

The protection of computer networks against unauthorized access is one of the main handicaps of cybersecurity. It is essential for both system administrators of large corporations and IT managers of small and medium-sized companies, even to protect home networks. In any of these cases personal data and sensitive information are at stake, whose value is priceless.

In this article we are going to talk about two Open Source tools with all the necessary ingredients to become your best allies to protect your networks from both external attacks and possible human errors: Apache Syncope and Apache Metron.

Kali Linux: how to install and use the distro for ethical hacking

Kali Linux: how to install and use the distro for ethical hacking

Kali Linux is a distribution based on Debian and specially designed for computer security audits. Developed by Offensive Security, it incorporates a wide catalog of tools to carry out computer forensics, penetration and reverse engineering testing… It can be truly useful for professionals in charge of IT security in an organization, administrators and network architects, security auditors, or anyone interested in learning about how to discover and even exploit vulnerabilities.

Skip to content