Request an Assessment

Whitehat Virtual Blog

Discover best practices, product information, and IT tips that you can use to help your business.

The Threat Landscape is Changing. Are you Prepared?

Distributed denial of service (DDoS) attacks are back, and attackers have a new target in their sights: your business.

Read More

Start the Journey to Improving Your End User Experience

Are you ready to pull back the curtains and "see" work through your end users' eyes? What you learn may change more...

Read More

How to Implement LDAPS or SSL for Netscaler Authentications to AD

As a Citrix Consultant implementing AGEE, I am often asked how to secure the connection from Netscaler/AGEE to LDAP....

Read More

Difference between Citrix Presentation Server 4.5 & Citrix XenApp 5.0

Here at Whitehat Virtual Technologies we occasionally get questions related to Citrix. The answers to those questions...

Read More

Should You Allow Wearable Devices in Your IT Environment?

Dell Mobility Enterprise Solutions Specialist Jason Moody spoke at Whitehat Virtual Technologies annual...

Read More

4 Benefits of Mobile Device Management

Mobile Device Management, or MDM, is the process of using a software program to secure, manage, monitor and support...

Read More

Subscribe Our Blog

Most Popular

Post By Topic

See all