Enhance End User Experience with VDI and Profile Containers

As self-service and on-demand access of business applications continues to grow within the enterprise, the task of managing the infrastructure, networks and systems, needed to support the delivery of these applications is complex, time-consuming and often leaves IT teams overwhelmed and end users frustrated.

Slow login times, load times and latency definitely have a negative impact on your business. These are some of the leading complaints from end users leveraging VDI. Read more

10 Website Security Best Practices You Can Implement Today

According to a recent Global Security Study from Citrix conducted by the Ponemon Institute, 69 percent of respondents believe some of their organization’s existing security solutions are outdated and inadequate. This is particularly problematic when looking at the state of cybersecurity where many vulnerabilities could be fairly easily eliminated. In order to help businesses strengthen their security profile and reduce vulnerabilities, here are 10 website security best practices that can be implemented today. Read more

It’s Your Cloud: On Privacy and Security

There has been a lot in the news lately about privacy and hacking. Everyone has read about whether Apple should help the FBI gain access to a locked iPhone that was used by terrorists.  We also learned about the ransomware attack on a Hollywood hospital that paid $17000 to get back control of their computer systems.


Regardless of whether Apple provides a backdoor to gain access to an iPhone or if another company’s network gets hacked, one thing is certain: Read more

Integrate the Cloud into Your Business – The Next Web

Don’t miss this great post from San Francisco based blogger Ritika Puri, published last month on TheNextWeb.com.

The benefits of the cloud are clear: these technologies help companies scale efficiently, reduce costs, reinforce security and provide faster services to customers. With many new players entering the cloud market, businesses have a range of options to build their ideal configurations. You can implement the cloud in full or in part. You can even stage your transition to the cloud over a number of years. You’re in control.

Even still, the decision-making process can be challenging. How do you manage initial costs? How do you ensure the same security levels as your on-premise systems. How do you know whether you’re choosing the right provider? Your due diligence process should start with the following questions.

Click here to read the rest of the article: Full Article 

Protect Your Hospital’s Critical Patient Information: 7 Best Practices

Great healthcare security article from our technology partner Citrix, make sure that your organization is ready to tackle the challenges that are in store.

Screen Shot 2015-11-30 at 2.13.31 PM


A breach of patient data can be catastrophic, not only from a PR and public image standpoint, but to a hospital’s bottom line, as well. The AMA estimates–conservatively–that the cost of breaches such as these could be in the millions. Today’s attackers have proved to be more creative than ever when it comes to obtaining sensitive patient data and it is up to the organization’s IT security team to ensure that data doesn’t fall into the wrong hands. 89% of IT decision-makers say that security technologies are critical or important to creating a business advantage.

Click here to read on and discover the 7 best practices from Citrix. 

PVS vs. MCS in a VDI deployment

There’s a lot of debate in the engineering community on whether to use Provisioning Services (PVS) or Machine Creation Services (MCS) when deploying a VDI solution. There are clear differences between the two technologies, and depending on the type of deployment, important factors to consider when choosing which one to use.

Read more

Methods to Better Secure Your Environment

It seems like every day brings a new possible data threat. The news is filled with reports of breaches, new vulnerabilities, and the organizations making reparations to those affected.

In today’s threat-filled landscape, how can you protect your organization? Fortunately, there ARE steps you can take. To illustrate this point, I’ve outlined three methods we have used to better secure our customer’s environments.

Read more

What’s Your Company’s Work From Home Policy?

Snow has hit Atlanta for the last two years in a row, with a single inch putting the city on shutdown. So far this year we have had to deal with almost a week of shutdown time due to these icy conditions. To combat this, many companies have started to implement Work From Home policies – not only in Atlanta, but nation-wide. With these policies going into effect certain questions arise, namely: Can an employee be as productive from home as they are in the office?

Yes, with a solid Work From Home policy we know you can maintain that same level of productivity. However, you must ensure your policy is developed with the following three factors in mind:

  1. Communication – How effective is the communication method that has been built into your Work From Home policy? With today’s technology high speed internet is a necessity for most households. With the standardization of a 4G LTE network, people are now carrying mobile devices that are comparable to cable modems. This makes working from home and maintaining a high quality user experience a reality. Additionally, most cell phone carriers have adopted the unlimited calling plan, which make communication truly “free”. And, employees now have the ability to email and text from their personal devices (computers, tablets, and smartphones). With these advances we can now be anywhere, anytime, maintaining a high level of business productivity.
  2. Accessing data and applications – How employees access their corporate data and applications is critical to a successful Work From Home policy. In today’s technological environment most of us expect to have the same user experience whether in the office, at home, in a coffee shop, or on the beach. A good Work From Home policy must allow employees access to a quality user experience from any environment.
  3. Security – Security is the number one concern for the majority of business decision makers. Protecting a business’s intellectual property, preventing data breaches, and ensuring user flexibility while keeping everything under control can be a challenging proposition. This is something many businesses face, but unfortunately few are able to successfully tackle.

Here at Centrinet we’ve been providing successful Work From Home policies for our enterprise clients since 2005 – from a wide range of sectors and industries. We make sure to always provide the best user experience, whether you are working from the office, or remotely. In the age of the cloud we have datacenters from the East to the West Coasts, ensuring our clients always have the best user experience, and secure 24/7 access to all data and applications.

We’d love to help you take the unplanned network downtime, data security risks, and high overhead costs out of storing and accessing your critical business information. Please contact us for more information.

A Review of Dell’s vWorkspace

Last week Centrinet attended a vWorkspace training session at the Dell Concourse Parkway site in Atlanta, GA. The session was held to introduce the partners to the new product, along with a demonstration of its capabilities.

We were very impressed and found the product to have some great new features. The administration console was very user-friendly with an intuitive layout; now one can access all of the configurations from a single pane of glass. Additionally, vWorkspace supports most of the major hypervisors in the market today, so it’s positioned to be a competitive low-cost solution for VDI and Terminal Server deployments.

When building out vWorkspace with a Hyper-V hypervisor, you can leverage a new feature in vWorkspace 8.x called HyperCache. From Dell’s internal documentation:

HyperCache provides read Input/Output Operations Per Second (IOPS) savings and improves virtual desktop performance through selective RAM caching of parent VHDs. This is achieved through the following:

Reads requests to the parent VHD are directed to the parent VHD cache.

Requests data that is not in cache is obtained from disk and then copied into the parent VHD cache.

Provides a faster virtual desktop experience as child VMs requesting the same data find it in the parent VHD cache.

Requests are processed until the parent VHD cache is full.

The default size is 800 MB, but can be changed through the Hyper-V virtualization host property.

This is a very nice feature and greatly improves the performance and user experience of the desktops.

The way that disk usage and workloads are managed makes vWorkspace highly efficient. During bake-off tests, Dell found that the desktop density of vWorkspace deployments was much higher (as much as 25% in some cases) than other solutions in the market.

By offering compatibility with a variety of low-cost storage solutions, and support for multiple desktop deployment technologies, vWorkspace makes a very attractive option for companies looking to deploy new desktop solutions.

Notable Citrix Updates

A couple of weeks back I was able to attend the 2015 Citrix Summit in Las Vegas. The event was a great resource – with sales education, technical deep dives, and an array of new programs. One great bonus was the fact that it was held in January, so I didn’t have to suffer the 110°+ heat of a Las Vegas summer.

There are three releases I want to make special note of – these are releases we have had success with, along with great client feedback. So without further ado, here are my top three notable Citrix updates from the Summit:

  1. XenApp and XenDesktop 7.6 updates: There have been changes in graphic engines, with H.264 becoming the new industry standard. With the release of the 7.6 updates, Citrix is moving in that direction as well.
  1. PVS Cache in RAM, with overflow to Hard Disk (HD): This is a great new feature on PVS, because you can eliminate the need for expansive storage. We have clients currently using this feature, and they can’t tell the difference between 3PAR SATA Hard Drives and Whiptail SSD.
  1. GPU into XA/XD: We have successfully deployed AutoCAD for some of our clients via XenApp, and so far the feedback has been great. One client said, “The performance is as good as if it were locally installed”.