Feed aggregator

Parallels Desktop 17, hands-on: Improved performance, plus Windows 11 and MacOS Monterey compatibility

zdnet news - Tue, 08/10/2021 - 16:24
The 2021 update to Parallels Desktop has plenty to offer, despite upcoming competition from Microsoft's Windows 365 cloud PC service.

Logitech Scribe review: AI camera brings analogue whiteboards into video meetings

zdnet news - Tue, 08/10/2021 - 12:50
Hybrid working and teaching, with a mixture of in-room and remote participants, is here to stay, and Logitech's Scribe provides a usable way of bringing analogue whiteboards into the digital fold. It's not inexpensive, but Scribe is a quality product that works well.

Best cable internet provider 2021: Top picks compared

zdnet news - Tue, 08/10/2021 - 10:00
We consider criteria such as customer service, fastest speeds, data caps, and pricing, although in most cases, prices will be based on where you live and current deals.

Rockspace mesh Wi-Fi system review: Connect over 5GHz

zdnet news - Mon, 08/09/2021 - 22:56
Rockspace's mesh Wi-Fi system is certainly worth trying if you have areas of poor connection throughout your home.

AT&T vs. Xfinity Internet: Two ISPs compared

zdnet news - Mon, 08/09/2021 - 22:35
If both providers are available to you, you'll need to consider the speeds you want, your budget, whether to bundle services or not, and how much you value customer service.

Best internet provider in Charlotte 2021: Top ISPs

zdnet news - Mon, 08/09/2021 - 20:31
In Charlotte, North Carolina, there are plenty of providers offering everything from DSL to cable broadband to high-speed fiber-optic service. How will you know which one is best for you?

iPhone 13: Release date, features, specs, and rumors

zdnet all blogs - Mon, 08/09/2021 - 18:44
We're about a month away from a formal announcement, and that means even more frequent leaks and rumors. Here's what we know.
Categories: Blogs

Amazfit PowerBuds Pro review: $150 ANC-enabled earbuds with unique health options

zdnet news - Mon, 08/09/2021 - 18:21
Active noise cancellation is becoming a standard for wireless earbuds today and Amazfit's latest entry adds this capability, along with a couple unique health and wellness features.

Lenovo ThinkPad X1 Titanium Yoga, Dell Latitude laptops, Sony Xperia 1 III, and more: ZDNet's reviews roundup

zdnet news - Mon, 08/09/2021 - 15:06
From the latest loptops, to a slew of handheld devices and onto an IoT starter kit, here's the hardware we tested in July.

Apple child abuse material scanning in iOS 15 draws fire

zdnet all blogs - Mon, 08/09/2021 - 05:49
Features to detect child abuse material stored on iCloud coming in updates to US users iOS 15, iPadOS 15, watchOS 8, and macOS Monterey.
Categories: Blogs

OnePlus Watch review: Low price and long battery life can't overcome its many shortcomings

zdnet news - Mon, 08/09/2021 - 02:36
OnePlus is known for its elegant smartphone designs and the OnePlus Watch delivers with a stainless steel body and brilliant display. However, it fails in too many other areas.

A Microsoft researcher has harsh words for, oh, Microsoft technology

zdnet all blogs - Sun, 08/08/2021 - 17:00
How can someone employed by Microsoft openly suggest some of the company's technology is deeply flawed? Quite easily, it seems.
Categories: Blogs

Verizon Fios vs. Spectrum: Comparing ISPs

zdnet news - Sun, 08/08/2021 - 07:00
Check out our head-to-head comparison of Verizon Fios and Spectrum internet. We compare vital characteristics to help you decide which ISP is right for you.

SafeSleeve Detachable case for Apple iPhone 12 Pro Max: Anti-radiation case with RFID wallet

zdnet news - Fri, 08/06/2021 - 18:22
Our mobile phones have become the central computing device for daily life, but that also means we have them in our hands and pockets all of the time. SafeSleeve's latest case provides protection from radiation while also securing your credit cards carried in the wallet.

Huawei MateBook D 15 (2021) review: Still stylish and solid, but issues remain

zdnet news - Fri, 08/06/2021 - 15:04
Huawei has updated its 15.6-inch MateBook D 15 for 2021, but its shortcomings from last year -- notably, webcam placement and battery life -- have not been addressed.

WOW! cable internet review: How to get the best rates

zdnet news - Fri, 08/06/2021 - 10:00
This internet provider provides internet service throughout the Southern and Midwestern U.S internet with no data caps, offers download speeds up to 1,000Mbps and have a 30-day money-back guarantee.

Fitbit Luxe review: A nearly perfect fitness band

zdnet news - Fri, 08/06/2021 - 00:28
The Luxe looks great, even luxurious at times, but at the cost of a small display that's almost too small.

Let’s Talk Virtual Desktop Security

DigiumBlogs - Thu, 08/05/2021 - 19:46

You’ve heard the term DaaS or Desktop-as-a-Service before but didn’t really buy into it. But since the release of Microsoft’s Virtualized Desktop service, it seems to have grown into an actual discussion for many businesses now. You may be starting to understand the benefits businesses can achieve by virtualizing their desktop machines and moving them to the cloud, creating a central management point, with a significant reduction in IT hardware costs on workstations, and delivering high performing desktops to users from any device. Also how it eases IT management burdens and a total cost of ownership (TCO) from servers, storage, and network connectivity to desktop applications.

However, one of the major topics of concern regarding DaaS is security. Since customers’ corporate infrastructure is moved from on-premise into the cloud, there is a tendency to worry about losing control of private data. Let’s demystify these security concerns so that you can rest assured your customers are safe and protected.

In-House IT vs. DaaS Service Provider IT

While a business may have trusted and reliable in-house IT staff for their local infrastructure, it doesn’t compare to the far greater security resources of a cloud service provider. With a DaaS service provider, businesses can leverage their expertise to improve their security policies and compliance. Security is not a one time ‘set it and forget it’ process and requires constant attention with frequent software updates at all entry points to the network. All it takes is one exposed area, such as a security patch not installed on a device, to allow hackers in. Businesses tend to forget all this when things are going well, so making sure there are resources always dedicated to these types of things is a must. And, allowing the DaaS provider to take over enables in-house IT to focus on company strategy and forward thinking.

Remote Working

With the onset of the pandemic, remote working has risen and become of significant importance for IT departments to secure and manage. Users need to be able to access corporate and confidential information while outside the corporate network, from any remote location, which can be complex. Local routers, firewalls, or environmental factors can restrict a remote user’s PC from connecting with services at headquarters. It becomes a balance of flexibility vs. security; the easier you allow users to connect to the corporate network, the more businesses put themselves at risk of threats.

A virtual private network (VPN) connection has been a typical way to address this need, however, it is not the best answer! While connected to VPN, any threats that are exposed to the user’s PC can travel through the connection and infect the entire corporate network, spreading viruses, malware, ransomware, and so on. If a user checks their personal email, for example, and downloads a file, which is unknowingly ransomware, it will now travel to headquarters. Malware and anti-virus protection on each user’s PC can help, but is not perfect and ends up being a burden for IT to manage. Furthermore, the requirement to maintain VPN servers, software updates, and the huge cost associated with intrusion detection and protection (IDS/IPS) services becomes problematic because the cost may go overlooked and creates another hole in the security protocols of the business.

DaaS platforms take care of all this without requiring VPNs or worrying about user PC malware protection and allow users the flexibility to connect to the corporate network over any internet connection, from anywhere.

User Credential Protection

While it is true that businesses are more exposed to hackers being out in the cloud, they are at less risk of credential-based attacks when using a decent DaaS platform, than with in-house infrastructure. DaaS services will typically have one secured entry point for access to all of a business’ tools and applications, with single single on (SSO) from a web portal, whereas on-premise infrastructures have many. So hackers can attempt to steal user credentials for possibly many unsecured areas in a network. A DaaS platform should have at least two-factor authentication, but one with multi-factor authentication (MFA) is best as it makes it impossible for hackers to steal credentials.

BYOD

DaaS enables users to access all their tools and apps from any device, anywhere, using any internet connection, which is one of its major benefits. The security aspect is handled between the users’ connection to their DaaS account, not the hardware they are using. This isolation also prevents users from copy and pasting, downloading, or drag and dropping from, and to, their virtual desktop to the local machine. In other words, what happens in the cloud stays in the cloud. And if a user loses their device, there is no risk since no data is stored on the device and the user’s account can be remotely disabled, immediately.

Malware, Ransomware & Viruses

We hear about these threats happening every day, and growing in scale too. In fact, check out this report of the world’s largest ransomware attack, which includes businesses in the USA. Hackers are taking advantage of infrastructure not properly protected and with out-of-date security policies and procedures. They are skilled in getting into networks via exposed servers with weak credentials and via end user activity.

All it takes is a user to open an email and download an unsuspecting malicious file for a hacker to begin developing a ransomware attack. This can also happen in a DaaS environment that isn’t properly secured. In fact, in a recent event, one particular title company in Grand Rapids, Michigan, which will remain nameless for confidential reasons, was one of many in the area hit with ransomware, being locked out of all their DaaS user accounts, crippling them for days. On a positive note, Star2Star ended up saving this business by migrating them over to our Connected Workspace DaaS platform. This is why checking the built-in protocols for mitigating risk is critical when choosing a DaaS platform; you need to know the work-arounds and restoration procedures in the unfortunate event of a successful attack.

Connected Workspace by Star2Star, A Sangoma Company

Connected Workspace is a DaaS service by Star2Star, A Sangoma Company. The service is bundled with voice and video collaboration tools, enabling businesses with the complete ‘office’ experience, wherever they are, from any device.

Security protection is a key aspect of Connected Workspace, from multi-factor authentication (MFA) for our SSO web portal, to our fully dedicated platform engineers taking care of migration, monitoring, and maintaining of your customer’s service.

To help mitigate the risk of malware, such as ransomware and viruses, all files opened on each users’ virtual desktops are scanned and virus definitions are updated and automatically applied if necessary every two hours. Email threat protection is also applied to all Star2Star Managed Office 365 accounts. We have proprietary policies, procedures, and processes in place that alert us upon user access attempts to unauthorized files. Additionally, we do not allow access to the platform outside of the Citrix Workspace connection (part of the Connected Workspace infrastructure) for any third party, as well as no tunnelling, direct connection, etc. allowed to our multi-tenant environment. All of these solutions are in place to ensure that all connections route through a single fabric ensuring that the platform is monitored for any potential anomalies that represent a threat allowing us to respond in kind to mitigate said threat.

In the unfortunate event of a data breach or a ransomware attack, all files in your customer’s Connected Workspace storage, should they become compromised, are isolated in order to remove the threat of further corruption. A restoration to known safe media is performed in an isolated environment. All virtual delivery agents (VDAs) are shut down and forced to restart from Gold Image. The isolation environment is then migrated back, only after file remediation is completed in the isolation environment. We work diligently at all this and can get customers back online quickly, thanks to our dedicated platform engineers. For instance, based on standard data size of 1 terabyte, the mean time to recover is estimated at 4 hours. This is something to consider when customers choose a DaaS provider: is there support available when it’s needed the most? This is one such reason why the previously mentioned title company moved away from their previous DaaS provider to Star2Star’s Connected Workspace.

Can I bundle my security services with Connected Workspace?

You sure can! As a channel partner, you can implement a third party email security solution and for our private cloud offering (single-tenant service for customers looking for a more isolated set up) you can offer your existing ransomware, malware, and/or endpoint monitoring additions.

Now that we’ve secured your understanding, connect with us to learn more about Connected Workspace and how it can help you communicate securely in the cloud!

The post Let’s Talk Virtual Desktop Security appeared first on Sangoma.

Categories: , Blogs, Open Source Voip

Doogee S97 Pro review: A sturdy and rugged Android phone

zdnet news - Thu, 08/05/2021 - 18:00
The Doogee S97 Pro is an affordable, sturdy, rugged phone with an inbuilt laser range finder.

Google says it has created a time crystal in a quantum computer, and it's weirder than you can imagine

zdnet all blogs - Thu, 08/05/2021 - 16:30
In what could be the first useful application of quantum computing, Google's scientists have demonstrated the existence of a new phase of matter.
Categories: Blogs

Pages