Getting Business Value From Your IT

IT for its own sake is just dumb. Getting business value out of your IT is imperative if you want to prosper. “If IT spends more time supporting legacy IT than building IT capabilities the business needs, there is likely a lot of “technical debt” or a lack of understanding of how IT can productivity, […] View Post

9 Ways To Ensure Citrix/VMware VDI Environments Are Never Slow

Or, how to turn the most ragged, unresponsive Citrix or VMware virtual environment into a slick, responsive system that end-users will love Your Citrix or VMware virtual environment is ragged, slow and unresponsive. Users just hate it. What you want is a slick, responsive system. A system that end-users enjoy working with and that you’re […] View Post

Cloud Security Market to Grow to $13.93 Billion by 2024

Cloud security is one of the fastest growing market segments today. The latest report from Grand View Research Inc further accentuates this trend, as it predicts the cloud security market to grow to $13.93 billion by 2024. View Post

Whitehat Virtual CEO on Mitigating Hospital Data and Information Breaches

 Whitehat Virtual Technologies CEO pens article for Security Technology Executive magazine, Mitigating Hospital Data and Information Breaches discussing cybersecurity in healthcare and how patient safety and patient security can coexist.  View Post

Saving a Healthcare Citrix Build gone Sideways – 6 LESSONS

With 100+ agents working from a local Starbucks or with clients and patients in their homes, a government healthcare organization we met with a few weeks ago relies heavily on Citrix to make their EMR (Electronic Medical Record system) available anytime, anywhere. View Post

CISO and Head of Security and Compliance Practice Bryon K. Miller Quoted in Security Magazine

Security and Compliance Practice Lead Bryon Miller was quoted in “Healthcare Data Compliance: Maintaining Integrity, Privacy and Security,” in Security Magazine. In the article, Miller offers some guidance and discusses records retention and privacy programs as foundational security framework controls. To read the Security Magazine article, click here. View Post

10 Ways Having Whitehat Manage Your Citrix Environment Saves You Time

We could all use a little more time each day but time just seems to get away from us. That stuff is either very slippery or we are just all very bad at remembering where we put it.  View Post

Whitehat CEO Val King Quoted Among 33 Cybersecurity Experts in Digital Guardian Article

Val King, CEO of Whitehat Virtual Technologies was quoted in “Cybersecurity Incident Response Planning: Expert Tips, Steps, Testing & More” at Digital Guardian. Val discusses some of the steps necessary around building out a cybersecurity incident response plan,  The Digital Guardian article is available here. View Post

What is the Real Cost of Inefficient IT?

According to a recent study of 3000 employees, inefficient workplace technology dramatically decreases productivity, and drives 20% of end users to introduce their own IT solutions (and the security threats that go with them) to improve their ability to complete their work. View Post

What does a Citrix NetScaler Actually do?

In 2005 it was estimated that 75% of all Internet traffic passed through a NetScaler every day, but that has done nothing to help the confusion the average person has understanding what NetScaler’s actually do from then until now. View Post