ENABLE & SECURE YOUR DIGITAL WORKSPACES

Request a Demo

TheRes Tech Blog

A blog for digital workspace automation & security


Blog Menu

Authors


Archives


Welcome to the RES Technical Blog

The RES Technical Blog offers strategies and industry insights on today’s and tomorrow’s innovation. The RES blog will provide the latest updates on RES solutions and services and tips on how best to maximize your RES investment.

Video: Breaking Down Barriers in Deploying Application Whitelisting with RES ONE Service Store

February 24, 2016

Cyber-security threats are on the rise and if you are not seeing the increased awareness, you might be living in a black hole. From breaking news like the latest this week where a  Los Angeles Hospital paid $17,000 to a hacker to regain control of patient records (a new trend « Read More

RES ONE Workspace 2015 SR1 (9.10.1.0) Available

January 29, 2016

Guest Blog by: Rob Aarts www.robaarts.nl This blog post first appeared on LinkedIn Pulse. Today RES announced an update for RES ONE Workspace 2015, below I will cover some off the new or enhanced features in this release.   Workspace Agent for Linux and Apple OS X RES ONE Workspace 2015 « Read More

RES ONE Workspace 2015 – Service Release 1 Now Available

January 19, 2016

Today, we’re very proud to announce the availability of RES ONE Workspace 2015, Service Release 1 (SR1) which makes your goal of delivering a premier digital workspace experience regardless of device more achievable than ever. This release,  is exciting because it extends the enhanced application security capabilities for the workspace across Windows, Mac « Read More

A Look at Healthcare, Cloud, and Virtualization for 2016 and Beyond

January 13, 2016

Guest blog by: Bill Kleyman, VP of Strategy and Innovation at MTM Technologies @Quadstack We’ve reached a point within the modern healthcare data center where new forms of content delivery, business strategies, and even user enablement have fundamentally changed the way technology is deployed and utilized. A recent Cisco report really « Read More

The New Hacking Frontier: Medical Device Vulnerabilities

January 6, 2016

Last month I spoke about ransomware in my blog regarding patient data security. Ransomware is a particularly nasty malware variant where malicious code gets launched into a network and encrypts critical data. Then someone, somewhere requests ransom in return for the decryption key. For healthcare IT, this is an increasingly « Read More

The Future of Enterprise Technology Is Now: Is IT Ready?

December 23, 2015

Trend articles are dangerous. We can lock ourselves into a cycle of touting the next new trend, hoping for something game-changing to happen. But in reality, we find that everything stays much as it was a year later. As someone who writes “trend” articles every year, I want to raise « Read More

For the Service Desk, Self-Service and Face-to-Face Can Go Hand-in-Hand

December 22, 2015

Traditional service desk models are suffering in many organizations.  The complexity of IT environments combined with rising pressures from the workforce to be more agile often result in service desks falling short on expectations. The challenge goes beyond the service desk, though. Forrester reports that IT organizations are spending up « Read More

Who Really Owns Employee Onboarding & Offboarding? Show Me The Ownership!

December 10, 2015

All too often, the complex and critical process of onboarding and offboarding is carved up into pieces, with little real holistic ownership. If no one truly owns the process, who ensures employees have the tools they need to be productive from day one? Or that company access is revoked immediately when employees depart, protecting the company from potentially serious security risks? « Read More

Bringing the “Happy” Back to “Happy Holidays IT”

November 24, 2015

The weather is getting colder, trees are bare and gift commercials are running full steam ahead – the holidays are among us. In the next few days, wallets will flow freely thanks to all of the deals Black Friday have to offer. While this may be ‘the most wonderful time of the year’ for shoppers like me, it can be torture for my friends in IT due to increased workloads, risk and exposure. To keep them from shriveling at the thought of the holidays, there are some tools to reduce the load. This is extremely important during a time when I can name at least 5 reasons why IT could understandably channel the Grinch. I know I would feel the pressure. Here are some of the things that can turn this time of the year into a nightmare for IT, and some ways we can avoid it: « Read More

Extending the App Volumes Ecosystem with RES

November 23, 2015

In our digital economy every worker’s career journey is increasingly centered around the apps they use each day. What they do with those apps is to a great extent how today’s workers deliver value. Which means the delivery of apps at just the right time, configured for the individual needs of each worker, is a crucial element of business value. And here’s another: with security needs ramping up every year, the ability to revoke access to apps has become just as important and, in its own way, valuable to the business as the use of those apps. « Read More