Our Blog

Featured Article

Keeping Your Business Secure, Made Simple

Recent events mean that companies have had to, in many cases, ‘fast-track’ a move to remote working. This was easier for some businesses than others, however for almost every company, this is not
Learn More

Featured Article

Increase security and simplify support with Citrix Session Recording

Full disclosure, this isn’t new – however this is possibly one of the most frequently overlooked and misunderstood features of Citrix Virtual Apps and Desktops. Hopefully this whistle-stop tour will
Learn More

Featured Article

Taking cyber security back to basics - the simple things we forget

To make a focused security strategy your organisation’s reality, you need a strong security framework.
Learn More

Featured Article

Our Work For Beazley Wins Citrix Approval

Our work with customer Beazley, the UK’s A-rated specialist insurer, has been nominated for a Citrix Global Customer Innovation Award. Beazley is one of only three companies in the world to be put
Learn More

Featured Article

Citrix & Microsoft: Enabling user-centric security

The Citrix Software Defined Perimeter model means treating the user to the centre of your security world: The user is the new edge of your environment. 
Learn More

Featured Article

Cyber Threats: National Cyber Security Centre Issues Guidance

Following the news and warnings of a Russian cyber threat, the National Cyber Security Centre (NCSC) has issued guidance for all organisations to ensure technical security controls have been
Learn More

Featured Article

UPDATE: Security announcement, CPU vulnerability

Ultima is aware of two major security flaws that have surfaced and are thought to affect all Intel and some AMD & ARM processors.  
Learn More

Featured Article

Don't Let The Naughty Elf Into Your Room of Doom!

Do you have a store room overflowing with old IT kit? Do you need help to recycle or decommission it securely and compliantly? Don't let the 'Naughty Elf' get hold of your data - we have the solution.
Learn More

Featured Article

Security Weakness Evident In The WPA2 Secure Wi-Fi Protocol

On Monday the 16th of October security researcher Mathy Vanhoef of the imec-DistriNet Research Group released a security whitepaper detailing a serious security weakness evident in the WPA2 secure
Learn More

Security

Keeping Your Business Secure, Made Simple

Recent events mean that companies have had to, in many cases, ‘fast-track’ a move to remote working. This was easier for some businesses than others, however for almost every company, this is not ...

Citrix, Security

Increase security and simplify support with Citrix Session Recording

Full disclosure, this isn’t new – however this is possibly one of the most frequently overlooked and misunderstood features of Citrix Virtual Apps and Desktops. Hopefully this whistle-stop tour will ...

Security, Ivanti, Patch as a Service

Taking cyber security back to basics - the simple things we forget

To make a focused security strategy your organisation’s reality, you need a strong security framework.

Citrix, Security, Cloud, Transformation, Innovation

Our Work For Beazley Wins Citrix Approval

Our work with customer Beazley, the UK’s A-rated specialist insurer, has been nominated for a Citrix Global Customer Innovation Award. Beazley is one of only three companies in the world to be put ...

Citrix, Security, Cloud

Citrix & Microsoft: Enabling user-centric security

The Citrix Software Defined Perimeter model means treating the user to the centre of your security world: The user is the new edge of your environment. 

GDPR, Cyber Security, Cyber Attack, Security

Cyber Threats: National Cyber Security Centre Issues Guidance

Following the news and warnings of a Russian cyber threat, the National Cyber Security Centre (NCSC) has issued guidance for all organisations to ensure technical security controls have been ...

Cyber Security, Security

UPDATE: Security announcement, CPU vulnerability

Ultima is aware of two major security flaws that have surfaced and are thought to affect all Intel and some AMD & ARM processors.  

GDPR, Security

Don't Let The Naughty Elf Into Your Room of Doom!

Do you have a store room overflowing with old IT kit? Do you need help to recycle or decommission it securely and compliantly? Don't let the 'Naughty Elf' get hold of your data - we have the solution.

Technology Updates, Cyber Security, Security

Security Weakness Evident In The WPA2 Secure Wi-Fi Protocol

On Monday the 16th of October security researcher Mathy Vanhoef of the imec-DistriNet Research Group released a security whitepaper detailing a serious security weakness evident in the WPA2 secure ...
1