VirtualizationAdmin.com

Security & lockdown

BufferZone Enterprise Listing updated: April 30, 2007

BufferZone?s virtualization technology complements your existing security suite by creating an isolated zone, which separates the operating system and confidential data from unknown programs, downloads and files on each of your enterprise endpoints. Unlike anti-virus and anti-spyware software, BufferZone Enterprise requires no signature updates at all, while protecting each endpoint on your network against spyware and other types of malware - even threats that are new and not yet known. Moreover, with BufferZone Enterprise, your enterprise?s digital assets are immune from theft or damage by vulnerabilities from all sources, such as external (removable) media, Web browsing, P2P, email, instant messaging, network shares, and much more.
  • Company: TrustWare
  • URL: www.trustware.com
  • Email:
  • Screenshot:
  • Users' Rating: 3 [2 votes] - Vote
  • Comments: 0 comments - Post

Listing updated: September 14, 2005

BrsSuite is a database-based profile and user environment management product, and an application lockdown tool that can be used to restrict what applications users can run. The BrsSuite profile management component lets you configure different permissions for different users and stores the configuration in a centralized SQL database.
  • Company: FC Consult
  • URL:
  • Email:
  • Users' Rating: 3 [2 votes] -
  • Comments: 0 comments -

Blink for Citrix's Secure Gateway Listing updated: July 5, 2006

Blink for Secure Gateway integrates multiple proven security technologies to guard Citrix Access Suite environments against attacks - shielding the application stack (Secure Gateway, IIS and Windows) from previously undetected vulnerabilities, making server assets more resistant to attacks, even when patches aren?t available or installed. Additionally, local firewall and vulnerability assessment technologies ensure gateway environments meet user-defined policy guidelines. As an added benefit, eEye includes a pre-defined policy to ensure your Access Gateway deployments meet best practices for ensuring availability.
  • Company: eEye Digital Security
  • URL: www.eeye.com
  • Email:
  • Price: $2995
  • Users' Rating: 2.8 [5 votes] - Vote
  • Comments: 0 comments - Post

Tunnel2 Secure Terminal Server Gateway Listing updated: October 16, 2007

The Tunnel2 Secure Terminal Server Gateway (STSG) is a secure, single-point-of-access appliance to ensure anytime and anywhere access to your Microsoft Terminal Server.

Employing a variety of protocols it ensures guaranteed access to your Terminal Server applications and offers security advantages to your corporate Terminal Server environment.
  • Company: LM Internet Services AG
  • URL: www.lmis.de
  • Email:
  • Users' Rating: no votes - Vote
  • Comments: 0 comments - Post

SafeWord for Citrix Listing updated: October 16, 2007

SafeWord for Citrix adds strong authentication to your Citrix deployments, positively identifying users who access your Citrix applications. SafeWord for Citrix delivers security through one-time passcode-generating hardware tokens. Only the SafeWord server knows which passcode will allow the user to gain access. This eliminates threats from outsiders stealing, copying, or reusing passwords.

Tight integration with Citrix products and Active Directory allows your users to access Citrix applications and your administrators to manage tokens and users.
  • Company: McAfee
  • URL: www.mcafee.com
  • Email:
  • Users' Rating: no votes - Vote
  • Comments: 0 comments - Post

Citrix Access Gateway Listing updated: October 16, 2007

Citrix Access Gateway is an SSL VPN that securely delivers any application with policy-based SmartAccess control. Users have secure access to the applications and data they need to be productive. Organizations can extend access to datacenter resources from outside the office while maintaining unprecedented control through SmartAccess policies.

Citrix?s SmartAccess technology allows administrators to control both access and actions based on both the user and the endpoint device. For example, a user may have full access (read, save locally, print, etc.) to a set of files when utilizing their office PC ? but may be restricted to ?read-only? access when connecting through an unrecognized ?kiosk? device. Similarly, if an employee tries to log into the corporate network via a home PC that does not have an active anti-virus update service that employee may not be able to access certain mission-critical systems.
  • Company: Citrix Systems
  • URL: www.citrix.com
  • Email:
  • Users' Rating: no votes - Vote
  • Comments: 0 comments - Post

Receive all the latest articles by email!

Receive Real-Time & Monthly MSTerminalServices.org article updates in your mailbox. Enter your email below!
Click for Real-Time sample & Monthly sample

Become an MSTerminalServices.org member!

Discuss your Terminal Services & Citrix issues with thousands of other SBC experts. Click here to join!

Solution Center