Request a Demo

TheRes Tech Blog

A blog for digital workspace automation & security

Blog Menu



Tag: Security

RES ONE Workspace SR2 Now Available – Supports Security, Cloud Readiness and Workforce Productivity

May 19, 2016

Today, we’re very proud to announce the availability of RES ONE Workspace 2015, Service Release 2 (SR2). At RES, we’re always combining customer feedback with looking ahead to the challenges that we know our customers will be facing. We’re constantly adding functionality to our products based on this knowledge, and RES ONE « Read More

The New Hacking Frontier: Medical Device Vulnerabilities

January 6, 2016

Last month I spoke about ransomware in my blog regarding patient data security. Ransomware is a particularly nasty malware variant where malicious code gets launched into a network and encrypts critical data. Then someone, somewhere requests ransom in return for the decryption key. For healthcare IT, this is an increasingly « Read More

Who Really Owns Employee Onboarding & Offboarding? Show Me The Ownership!

December 10, 2015

All too often, the complex and critical process of onboarding and offboarding is carved up into pieces, with little real holistic ownership. If no one truly owns the process, who ensures employees have the tools they need to be productive from day one? Or that company access is revoked immediately when employees depart, protecting the company from potentially serious security risks? « Read More

Driving Digital Business Through Influence, Not Control

November 17, 2015

Last week I had the honor of traveling to Barcelona for the Gartner EMEA Symposium 2015 where there were a number of impactful statements being shared by Gartner, attendees and other industry experts. The theme could not be missed – IT must shift their focus from controlling how technology is deployed « Read More

4 More Reasons For Workspace Virtualization in Healthcare: As If You Needed Them

October 29, 2015

I’ve been working at the intersection of healthcare and technology for years now – and I can tell you from experience that healthcare was an early and enthusiastic adopter of workspace virtualization. This had a lot to do with circumstances inherent to healthcare – such as roaming clinicians, relentless cost « Read More

To Wear or Not to Wear? That’s the Wearable Tech Question

October 28, 2015

Part 4 of the Desktop Disruptions Series This is the last post in our Desktop Disruptions blog series, highlighting the major disruptive technologies that IT will likely face in the near future. Our latest disruption – wearable technology. Wearables are certainly different than the changing landscape of OS systems, cloud-based « Read More

RES ONE Automation Security Modules

October 6, 2015

By: Rene van der Linden www.renevdlinden.nl When configuring a security role in RES Automation Manager (RES AM) it is posible to deny access to the content of the modules. When editing the permisions of the Module node in a RES AM security Role, a select box is shown. With the option “Limit « Read More

How User Abstraction Creates Better Business Efficiency and Security

September 22, 2015

Guest Blog By: Bill Kleyman, Vice President of Strategy and Innovation at MTM Technologies http://www.mtm.com Because of cloud computing and IT consumerization, there is now a distinct focus on the end-user. And, not just the end-user – the entire business. The reality within the modern business organization is that more « Read More

Lessons from VMworld 2015: Speed Trumps Size

September 15, 2015

VMworld 2015 took over San Francisco, and, as expected, the event was full of energy. It seems like the Solutions Exchange keeps growing larger and larger each year, meaning that VMware customers have an increasing number of partners and solutions at their fingertips to complement their VMware investments. On the « Read More

Windows 10: Softening the Sting

September 9, 2015

Part 1 of the Desktop Disruptions Blog Series For IT teams, it seems there is always an imminent project or time sensitive initiative creeping up that is threatening to derail both business-as-usual functions and hopes for focusing on strategic contributions to the business. This blog is the first of the « Read More