Our Blog

Featured Article

An exploration of VMs, Containers, K8s & Microservices

Technology has seen many advances for developers, from microprocessors to hypervisors and virtual machines. In this blog, we explore the advantages of the latest technological eras - containers and
Learn More

Featured Article

Citrix and Microsoft: Azure Virtual WAN

The Citrix and Microsoft Partnership provides customers with new and outstanding capabilities on a regular basis, the latest of these being Citrix SD-WAN as a launch partner for the Azure Virtual WAN
Learn More

Featured Article

Everything you need to know about Citrix Cloud Access Control

One of the standout capabilities announced at Citrix Synergy 2018 was Citrix Cloud Access Control. The more I think about it, the more of a great feature I think this is.
Learn More

Featured Article

The Cost of Cloud - Revamped 2018 Version

Its been about a year since I last looked at what the cost of cloud vs on-premise compute is, if you are interested you can find the comparison here.
Learn More

Featured Article

Passwords, Secrets, Certificates, Tokens, Keys & Microsoft KeyVault - A Brief Overview

If we use a computer to create, edit or store sensitive information, then we can expect to be able to limit who has access to it and have mechanisms to support this. In this blog we delve into some
Learn More

Featured Article

Citrix Synergy 2018 Round Up

There was tangible energy and collective enthusiasm around Citrix Synergy 2018, with a raft of new capabilities being announced - along with a real sense of direction. The overwhelming feeling from
Learn More

Featured Article

Citrix Cloud Access Layer

When we look at a Cloud deployment – in this instance Citrix Cloud, there are many ways of hosting the access layer components. But how can you make an informed choice about where to deploy your
Learn More

Featured Article

Our Work For Beazley Wins Citrix Approval

Our work with customer Beazley, the UK’s A-rated specialist insurer, has been nominated for a Citrix Global Customer Innovation Award. Beazley is one of only three companies in the world to be put
Learn More

Featured Article

Citrix & Microsoft: Enabling user-centric security

The Citrix Software Defined Perimeter model means treating the user to the centre of your security world: The user is the new edge of your environment.
Learn More

Cloud, WorkSpace

An exploration of VMs, Containers, K8s & Microservices

Technology has seen many advances for developers, from microprocessors to hypervisors and virtual machines. In this blog, we explore the advantages of the latest technological eras - containers and ...

Microsoft, Citrix, Cloud

Citrix and Microsoft: Azure Virtual WAN

The Citrix and Microsoft Partnership provides customers with new and outstanding capabilities on a regular basis, the latest of these being Citrix SD-WAN as a launch partner for the Azure Virtual WAN ...

Citrix, Cloud

Everything you need to know about Citrix Cloud Access Control

One of the standout capabilities announced at Citrix Synergy 2018 was Citrix Cloud Access Control. The more I think about it, the more of a great feature I think this is.

Cloud, Data Centre

The Cost of Cloud - Revamped 2018 Version

Its been about a year since I last looked at what the cost of cloud vs on-premise compute is, if you are interested you can find the comparison here.

Microsoft, Cloud

Passwords, Secrets, Certificates, Tokens, Keys & Microsoft KeyVault - A Brief Overview

If we use a computer to create, edit or store sensitive information, then we can expect to be able to limit who has access to it and have mechanisms to support this. In this blog we delve into some ...

Citrix, Cloud

Citrix Synergy 2018 Round Up

There was tangible energy and collective enthusiasm around Citrix Synergy 2018, with a raft of new capabilities being announced - along with a real sense of direction. The overwhelming feeling from ...

Citrix, Cloud

Citrix Cloud Access Layer

When we look at a Cloud deployment – in this instance Citrix Cloud, there are many ways of hosting the access layer components. But how can you make an informed choice about where to deploy your ...

Citrix, Security, Cloud, Transformation, Innovation

Our Work For Beazley Wins Citrix Approval

Our work with customer Beazley, the UK’s A-rated specialist insurer, has been nominated for a Citrix Global Customer Innovation Award. Beazley is one of only three companies in the world to be put ...

Citrix, Security, Cloud

Citrix & Microsoft: Enabling user-centric security

The Citrix Software Defined Perimeter model means treating the user to the centre of your security world: The user is the new edge of your environment.
1 2