Our Blog

Featured Article

Increase security and simplify support with Citrix Session Recording

Full disclosure, this isn’t new – however this is possibly one of the most frequently overlooked and misunderstood features of Citrix Virtual Apps and Desktops. Hopefully this whistle-stop tour will
Learn More

Featured Article

Taking cyber security back to basics - the simple things we forget

To make a focused security strategy your organisation’s reality, you need a strong security framework.
Learn More

Featured Article

Our Work For Beazley Wins Citrix Approval

Our work with customer Beazley, the UK’s A-rated specialist insurer, has been nominated for a Citrix Global Customer Innovation Award. Beazley is one of only three companies in the world to be put
Learn More

Featured Article

Citrix & Microsoft: Enabling user-centric security

The Citrix Software Defined Perimeter model means treating the user to the centre of your security world: The user is the new edge of your environment.
Learn More

Featured Article

Cyber Threats: National Cyber Security Centre Issues Guidance

Following the news and warnings of a Russian cyber threat, the National Cyber Security Centre (NCSC) has issued guidance for all organisations to ensure technical security controls have been
Learn More

Featured Article

UPDATE: Security announcement, CPU vulnerability

Ultima is aware of two major security flaws that have surfaced and are thought to affect all Intel and some AMD & ARM processors.
Learn More

Featured Article

Don't Let The Naughty Elf Into Your Room of Doom!

Do you have a store room overflowing with old IT kit? Do you need help to recycle or decommission it securely and compliantly? Don't let the 'Naughty Elf' get hold of your data - we have the solution.
Learn More

Featured Article

Security Weakness Evident In The WPA2 Secure Wi-Fi Protocol

On Monday the 16th of October security researcher Mathy Vanhoef of the imec-DistriNet Research Group released a security whitepaper detailing a serious security weakness evident in the WPA2 secure
Learn More

Citrix, Security

Increase security and simplify support with Citrix Session Recording

Full disclosure, this isn’t new – however this is possibly one of the most frequently overlooked and misunderstood features of Citrix Virtual Apps and Desktops. Hopefully this whistle-stop tour will ...

Security, Ivanti, Patch as a Service

Taking cyber security back to basics - the simple things we forget

To make a focused security strategy your organisation’s reality, you need a strong security framework.

Citrix, Security, Cloud, Transformation, Innovation

Our Work For Beazley Wins Citrix Approval

Our work with customer Beazley, the UK’s A-rated specialist insurer, has been nominated for a Citrix Global Customer Innovation Award. Beazley is one of only three companies in the world to be put ...

Citrix, Security, Cloud

Citrix & Microsoft: Enabling user-centric security

The Citrix Software Defined Perimeter model means treating the user to the centre of your security world: The user is the new edge of your environment.

GDPR, Cyber Security, Cyber Attack, Security

Cyber Threats: National Cyber Security Centre Issues Guidance

Following the news and warnings of a Russian cyber threat, the National Cyber Security Centre (NCSC) has issued guidance for all organisations to ensure technical security controls have been ...

Cyber Security, Security

UPDATE: Security announcement, CPU vulnerability

Ultima is aware of two major security flaws that have surfaced and are thought to affect all Intel and some AMD & ARM processors.

GDPR, Security

Don't Let The Naughty Elf Into Your Room of Doom!

Do you have a store room overflowing with old IT kit? Do you need help to recycle or decommission it securely and compliantly? Don't let the 'Naughty Elf' get hold of your data - we have the solution.

Technology Updates, Cyber Security, Security

Security Weakness Evident In The WPA2 Secure Wi-Fi Protocol

On Monday the 16th of October security researcher Mathy Vanhoef of the imec-DistriNet Research Group released a security whitepaper detailing a serious security weakness evident in the WPA2 secure ...
1