Citrix Netscaler SSL Rating

Is Your Netscaler Leaving Your Network Open To DDoS Attacks Or Other Security Breaches? Centrinet Is Now Offering A Free SSL Grade Rating For Your Citrix Netscaler Appliance

As the threat of distributed denial of service (DDoS) attacks becomes more and more prevalent,, it’s critical that information security professionals make the time to review the security of their infrastructure top to bottom; from cloud applications to on-site appliances.

There’s one cybersecurity protocol in particular that can drastically reduce the risk of a breach – SSL, and its newest evolution, TLS – but these protocols require that network equipment like servers or application delivery controllers (ADCs) must be properly configured to satisfy the security standards that enable this protocol to effectively mitigate the risk of a breach or attack.

A real life example: while assisting a Centrinet client (Financial Institution) with an unrelated project, one of our technicians uncovered a serious security threat. The client had incorrectly configured their Netscaler Gateway ciphers.  The result was the company scored an ‘F’ grade on a third party security audit. The misconfigured protocol meant that the client’s company security was at risk as well as their customers.

After our Engineer reconfigured the Netscaler’s settings in a short time, we then retested the Netscaler’s security rating.

By correctly configuring the appliance’s settings, the diagnostic now resulted in a solid ‘A’ grade, effectively showing that the risk of breach through the Netscaler had been mitigated. Our technician’s simple and quick optimization of their appliance’s settings was all it took to ensure the massive security risk had been eliminated.

Centrinet, a cloud virtualization and managed services provider, uses the SSLLabs service platform to perform a deep analysis of our clients Citrix Netscaler Appliances. Our proven outcomes identify the vulnerabilities and risk to their businesses as well as awareness with a grade rating from A+ to F and an action plan, required resource and skill sets, and best practices mitigating
such threats. The threats are real and can be reviewed here. Centrinet’s best practices and methodology to mitigate risk and vulnerabilities to achieve an A+ rating within our clients


The SSL, TLS, and Ciphers Security Diagnostic

There are four steps in the security diagnostic for rating the security risks associated with your Netscaler appliance. Here’s a quick overview of how the SSL testing works and how your SSL grading is determined.

  1. Verification of the SSL certificate
  2. Inspection of the server configuration
    1. Protocol support
    2. Key exchange support
    3. Cipher support
  3. Scoring based on the categories above
  4. Testing of the server configuration against a series of rules that score the configuration’s features and rules.

Centrinet is offering a complimentary security diagnostic for your SSL configuration. Please contact us with your external live site today to get your first SSL grade free

Enhance End User Experience with VDI and Profile Containers

As self-service and on-demand access of business applications continues to grow within the enterprise, the task of managing the infrastructure, networks and systems, needed to support the delivery of these applications is complex, time-consuming and often leaves IT teams overwhelmed and end users frustrated.

Slow login times, load times and latency definitely have a negative impact on your business. These are some of the leading complaints from end users leveraging VDI. Read more

Authentication Bypass Vulnerability in Citrix NetScaler

Please contact our Operations Center if we can assist you with addressing this critical Citrix Netscaler security issue requiring updates.

Read more

5 Key Benefits of Leveraging Hyper-converged Infrastructure

Today the business world is fast paced, data-driven and digital. The demands we place on IT and the underlying infrastructure to support the ever-evolving advancement of technology are often unattainable with the legacy systems that have been in place for years. The world as we know it is more mobile, distributed and application centered and our data center needs to reflect that. You don’t want to be in a situation where you can’t meet a business need due to the technology limitations in your data center.

Read more

IT Security Best Practices: Securing Cloud Access Control

Did you know that phishing attacks targeting cloud storage services make up nearly 23 percent of all security attacks, an increase of 125 percent over the past four years? It’s a strategy fraudsters are using as they try to gain access to valuable login credentials for business cloud storage accounts.

And the problem isn’t limited to unauthorized access of vital accounts. Phishing schemes are also the most common way to deliver ransomware to systems belonging to businesses, government agencies, schools, and other critical infrastructure.

It’s an IT security challenge that will become more difficult in the next few years. That means that you, as a cybersecurity leader, must plan and implement best practices to keep your company (and individual employees) from falling victim to these schemes.

Read more

5 Essential Cybersecurity Training Courses and Certifications

Maintaining the highest level of info security for your organization and your customers depends heavily on your workforce. You need skilled employees who can prepare for, recognize, and handle cybersecurity threats.

But keeping up with the latest training courses and certifications for cybersecurity pros can be a challenge. There’s no centralized organization or one specific path to follow. You must be prepared to sift through the options and prioritize based on your business needs.

That’s why we’ve put together a list of essential cybersecurity training and certification programs. It will serve as a guide in making sure new hires have the right background and qualifications and in directing your ongoing education efforts.

Read more

What You Must Do to Ensure Enterprise-Level HIPAA IT Compliance

For enterprises that handle consumer healthcare information, the Health Insurance Portability and Accountability Act of 1996 (HIPAA) has become one of the most important regulations around data security. A lack of understanding of or commitment to HIPAA requirements has proven to be costly for a variety of organizations. For example, CardioNet, a provider of remote mobile care for patients at risk for cardiac arrhythmias, was recently ordered to pay $2.5 million in noncompliance fees for not fully implementing safeguards for electronic protected health information (ePHI).

Read more

Welcome to the Centrinet Team!

Screen Shot 01-26-16 at 09.49 AM

Mindy Sullivan, Director of Operations


Please welcome the newest member to our team, Mindy Sullivan. Mindy has over eight years of experience in the software and technology industry, with a strong foundation in healthcare and SaaS.

In her free time Mindy enjoys going on adventures with her family, especially adventures in the great outdoors like traveling and camping.

Mindy is experienced in leading highly diverse teams, and will be bringing that skill and background to her role as our new Director of Operations

Welcome to the team Mindy!


Work From Anywhere – Literally.

I wake up to a city very different than Atlanta, to the sound of roosters crowing and the sight of guards changing shifts.  My new home is Kampala Uganda, where my husband has accepted a position with a non-profit organization for the next two years. Last year, if someone had asked me if I’d be living in Uganda and still working for a U.S. based company – I would’ve thought they were crazy.

Although my life is very different now, one thing that offers stability and helps me feel at home is my remote desktop. Each morning I log in and connect with my coworkers on the other side of the planet. I’m able to easily stay on top of everything – from collaborating with colleagues, to client and vendor meetings. I was surprised to find such ease of use and strong connectivity, despite the (sometimes) weakened Internet signal.

Of course issues do arise, but as they do our Centrinet support team quickly finds a solution and I’m up and running again within the hour. I’ve witnessed this hustle first-hand back when I operated out of the Atlanta office, true teamwork and collaboration to provide client solutions. Every day I’m astounded by their knowledge, especially when they reach a solution based off of my descriptions. To be honest I am not a technical person, I wouldn’t even call myself an amateur. I excel at planning and operational tasks, but the technical language is completely foreign to me. So it’s a real testament to their skill that I can call our team, give them a crazy description, and they’re able to come up with a solution to the issue!

Seamless access to Centrinet data and applications is critical to my daily operations. In today’s technological environment, most of us expect to have the same user experience, in and out of the office. A good Work From Home policy must allow employees access to a quality user experience from any environment.

Here at Centrinet we’ve been providing successful Work From Home policies for our enterprise clients since 2005 – from a wide range of sectors and industries. We make sure to always provide the best user experience, whether you are working from the office, or from Kampala Uganda!

To learn more please contact us today.

Liquidware Labs Partner Solutions Brief

Our valued partner – Liquidware Labs – recently released a solutions brief on The Vital Role of  Robust Metrics in VDI Maintenance. The brief highlights the importance of their Stratusphere UX to support the delivery of managed VDI services. As only one of three Liquidware Lab Acceler8 partners to have achieved the Center of Excellence designation (COE), we have a deep understanding of deploying successful and effective desktop virtualization projects utilizing Liquidware Labs solutions.

From the beginning we recognized the need to find innovative and purpose-built VDI tools in order to maintain our standards of customer service. This search initially led us to Liquidware Labs Stratusphere, which provided the full range of desktop visibility across physical, virtual and RDSH desktops. New trends, and changing VDI environments, brought us to adopt Stratusphere UX for health checks and performance monitoring.

“With Stratusphere UX, we are sure we are doing the right thing by our customers. We are 100% positive that we are deploying products that don’t introduce problems, headaches, etc. That way we save time and effort for both our consultants, and especially for our clients, as we fast-track them to the right path.” – Dario Ferreira, Executive Vice President of Centrinet

Read the full solutions brief here.

About Liquidware Labs

Liquidware Labs is the leader in User Experience Management for next generation desktops. Analysts have described Liquidware Labs Stratsuphere and ProfileUnity solutions as the industry’s first “On-Ramp to VDI”. Liquidware Labs enables organizations to cost-effectively plan, migrate, and manage their next generation desktop infrastructure using the industry’s best practices.

Centrinet is one of only three partners worldwide to have achieved the Center of Excellence (COE) designation from Liquidware Labs. As a designated COE we demonstrate the highest level of knowledge in desktop virtualization, and have integrated Liquidware Labs technologies into our delivery to ensure superior service to our clients.