What if your computer was brand new every day? What if your computer and applications were available to you anywhere there was Internet access? What if your computers could change shape on the fly to any device, customized by how, where and when you choose to work? Would that change your experience? Would that change the way you look at “work”?
Much of an IT professionals’ time is spent asking "what now," instead of imagining "what if." Through our expert managed IT solutions we can change that.
After we've analyzed current processes and fully understand the unique business challenges that need to be overcome, we then begin mapping out our benchmarks for success.
To offer peak IT support services, the last step is to evaluate. We analyze the new end user experience and compare it to our originally planned benchmarks, applying any final enhancements.
We could all use a little more time each day but time just seems to get away from us. That stuff is either very slippery or we are just all very bad at...Read more
According to a recent study of 3000 employees, inefficient workplace technology dramatically decreases productivity, and drives 20% of end users to introduce...Read more
In 2005 it was estimated that 75% of all Internet traffic passed through a NetScaler every day, but that has done nothing to help the confusion the...Read more
Are you riding the PC to its inevitable end or looking ahead to the platform change that is in your future? Companies that still run entirely on...Read more
If you are an executive or an employee of a company using Citrix XenApp/XenDesktop technology and find yourself struggling to understand why your company is...Read more
Virtual Desktops (VDI) can be a fantastic business enabler and productivity enhancement, but VDI is not a fit for every business or every...Read more
Ransomware is a dirty, dirty word. It’s the latest cyber crime to sweep the globe and it cost business and industry more than $325M in 2015, according to a...Read more
Whitehat Virtual Security Bulletin - September 2016 Every day is an interesting one in the cyber security world. Here are some highlights from the past...Read more
Beyond being the 10 largest healthcare systems in the United States, collectively representing almost 17% of all of the hospital beds in the United States...Read more
INTRODUCTION: The Citrix login process is arguably one of the most important in that the login process is where end users get their first impression of the...Read more
What IS a virtual desktop? What is VDI? Why does this technology exist? Why do companies buy this stuff? What problems does VDI solve?...Read more
One of the top complaints we hear from prospective customers is “Citrix is slow”. This is often said as if it were a fact, as in the sky is blue, Citrix...Read more
Five years ago very few people were talking about the End User Experience we in IT were delivering to our end users. Today there are a number of...Read more
Two of enterprise businesses’ biggest headaches are addressed by a single solution: Security Assertion Markup Language or SAML. SAML is a single-sign on...Read more
To be honest, this is a difficult topic, but it is so common we have to talk about it. Several hundred thousand companies have bought Citrix XenApp or...Read more
We recently posted a guide to Citrix licensing, which has confounded users since the beginning of time. We also are asked frequently about Microsoft licensing...Read more
At the Citrix Synergy 2016 conference in Las Vegas this week, Whitehat partner FSLogix introduced Office 365 Container for Citrix, the industry’s first drop-in...Read more
Citrix licensing has long been a subject of MUCH confusion to Citrix users around the world. In order to alleviate some of that confusion, we'll condense the...Read more
One of the biggest administrative challenges in a Citrix XenApp or XenDesktop environment is managing the myriad images required to both work around software...Read more
Next week, IT experts from around the world will be heading to Las Vegas to experience the latest in digital business transformation at Citrix Synergy 2016....Read more
Between increasing regulatory pressures, aggressive ransomware menaces, and thefts from disgruntled employees — among other threats — healthcare organizations...Read more
Microsoft’s Skype for Business (formerly known as Lync) has become an indispensable communication tool for smart businesses. In fact, according to Citrix, 90...Read more
Give this some thought: When’s the last time you updated your anti-virus software signatures? Last week? Good. An hour ago? Awesome; we’re...Read more
Implementing a virtual desktop infrastructure is no small undertaking. Thousands of decisions go into building such a system, each more critical than the next....Read more
Whitehat's Citrix team has identified an important issue with web browser Google Chrome and Citrix’s legacy Access Gateway appliance. Citrix’s legacy Access...Read more
In our most recent blog, we described how we often encounter clients where the IT staff has been timidly afraid to “mess” with a new, pristine Citrix...Read more