Extending the value of your TMG infrastructure
Celestix is committed to supporting Microsoft TMG migration 2010 until 2023, and can help you to make an orderly and strategic transition by providing TMG migration options when you are…
Celestix is committed to supporting Microsoft TMG migration 2010 until 2023, and can help you to make an orderly and strategic transition by providing TMG migration options when you are…
Web Application Proxy is one of the features in Celestix E Series Appliance. For more information on Web Application Proxy deployment contact us at [email protected]. The Web Application Proxy Overview…
As the number of cloud applications grow and continue to gain popularity within the business community by giving both mobile and static workforces a consistent experience when interacting with corporate…
Introducing Windows Server 2012 R2 Unified Remote Access As with all things, development and progress must happen. The same is true with Microsoft® and Windows Server® 2012 R2. Microsoft has…
Since the discovery of the ‘Heartbleed’ vulnerability in the open-source cryptography library OpenSSL (Which is used by approximately 17% of the world’s Secure HTTPS websites), it has meant there is…
With the emergence of public hosted clouds and their related technologies such as infrastructure as a Service (IaaS) and Platform as a Service (PaaS), organizations now have choices and freedom…
The Heartbleed security vulnerability in the commonly used OpenSSL that was detected last week, has left millions of accounts and passwords exposed. This attack exposes user data through malicious use…
If you’ve been reading up on the options for two factor authentication chances are you’ve come across the term “OATH-compliant” or “Based on the OATH standards”. In this blog post…
HOTPin v3.7 received an excellent review in Computing Security Magazine this month. The review is based on a product test carried out by an independent testing firm which was designed…
Organizations who are concerned about the security of their information in the cloud are able to prevent anyone from accessing their email, documents, contacts and calendars from virtually anywhere, on…