• Guest
HabraHabr
  • Main
  • Users

  • Development
    • Programming
    • Information Security
    • Website development
    • JavaScript
    • Game development
    • Open source
    • Developed for Android
    • Machine learning
    • Abnormal programming
    • Java
    • Python
    • Development of mobile applications
    • Analysis and design of systems
    • .NET
    • Mathematics
    • Algorithms
    • C#
    • System Programming
    • C++
    • C
    • Go
    • PHP
    • Reverse engineering
    • Assembler
    • Development under Linux
    • Big Data
    • Rust
    • Cryptography
    • Entertaining problems
    • Testing of IT systems
    • Testing Web Services
    • HTML
    • Programming microcontrollers
    • API
    • High performance
    • Developed for iOS
    • CSS
    • Industrial Programming
    • Development under Windows
    • Image processing
    • Compilers
    • FPGA
    • Professional literature
    • OpenStreetMap
    • Google Chrome
    • Data Mining
    • PostgreSQL
    • Development of robotics
    • Visualization of data
    • Angular
    • ReactJS
    • Search technologies
    • Debugging
    • Test mobile applications
    • Browsers
    • Designing and refactoring
    • IT Standards
    • Solidity
    • Node.JS
    • Git
    • LaTeX
    • SQL
    • Haskell
    • Unreal Engine
    • Unity3D
    • Development for the Internet of things
    • Functional Programming
    • Amazon Web Services
    • Google Cloud Platform
    • Development under AR and VR
    • Assembly systems
    • Version control systems
    • Kotlin
    • R
    • CAD/CAM
    • Customer Optimization
    • Development of communication systems
    • Microsoft Azure
    • Perfect code
    • Atlassian
    • Visual Studio
    • NoSQL
    • Yii
    • Mono и Moonlight
    • Parallel Programming
    • Asterisk
    • Yandex API
    • WordPress
    • Sports programming
    • Lua
    • Microsoft SQL Server
    • Payment systems
    • TypeScript
    • Scala
    • Google API
    • Development of data transmission systems
    • XML
    • Regular expressions
    • Development under Tizen
    • Swift
    • MySQL
    • Geoinformation services
    • Global Positioning Systems
    • Qt
    • Dart
    • Django
    • Development for Office 365
    • Erlang/OTP
    • GPGPU
    • Eclipse
    • Maps API
    • Testing games
    • Browser Extensions
    • 1C-Bitrix
    • Development under e-commerce
    • Xamarin
    • Xcode
    • Development under Windows Phone
    • Semantics
    • CMS
    • VueJS
    • GitHub
    • Open data
    • Sphinx
    • Ruby on Rails
    • Ruby
    • Symfony
    • Drupal
    • Messaging Systems
    • CTF
    • SaaS / S+S
    • SharePoint
    • jQuery
    • Puppet
    • Firefox
    • Elm
    • MODX
    • Billing systems
    • Graphical shells
    • Kodobred
    • MongoDB
    • SCADA
    • Hadoop
    • Gradle
    • Clojure
    • F#
    • CoffeeScript
    • Matlab
    • Phalcon
    • Development under Sailfish OS
    • Magento
    • Elixir/Phoenix
    • Microsoft Edge
    • Layout of letters
    • Development for OS X
    • Forth
    • Smalltalk
    • Julia
    • Laravel
    • WebGL
    • Meteor.JS
    • Firebird/Interbase
    • SQLite
    • D
    • Mesh-networks
    • I2P
    • Derby.js
    • Emacs
    • Development under Bada
    • Mercurial
    • UML Design
    • Objective C
    • Fortran
    • Cocoa
    • Cobol
    • Apache Flex
    • Action Script
    • Joomla
    • IIS
    • Twitter API
    • Vkontakte API
    • Facebook API
    • Microsoft Access
    • PDF
    • Prolog
    • GTK+
    • LabVIEW
    • Brainfuck
    • Cubrid
    • Canvas
    • Doctrine ORM
    • Google App Engine
    • Twisted
    • XSLT
    • TDD
    • Small Basic
    • Kohana
    • Development for Java ME
    • LiveStreet
    • MooTools
    • Adobe Flash
    • GreaseMonkey
    • INFOLUST
    • Groovy & Grails
    • Lisp
    • Delphi
    • Zend Framework
    • ExtJS / Sencha Library
    • Internet Explorer
    • CodeIgniter
    • Silverlight
    • Google Web Toolkit
    • CakePHP
    • Safari
    • Opera
    • Microformats
    • Ajax
    • VIM
  • Administration
    • System administration
    • IT Infrastructure
    • *nix
    • Network technologies
    • DevOps
    • Server Administration
    • Cloud computing
    • Configuring Linux
    • Wireless technologies
    • Virtualization
    • Hosting
    • Data storage
    • Decentralized networks
    • Database Administration
    • Data Warehousing
    • Communication standards
    • PowerShell
    • Backup
    • Cisco
    • Nginx
    • Antivirus protection
    • DNS
    • Server Optimization
    • Data recovery
    • Apache
    • Spam and antispam
    • Data Compression
    • SAN
    • IPv6
    • Fidonet
    • IPTV
    • Shells
    • Administering domain names
  • Design
    • Interfaces
    • Web design
    • Working with sound
    • Usability
    • Graphic design
    • Design Games
    • Mobile App Design
    • Working with 3D-graphics
    • Typography
    • Working with video
    • Work with vector graphics
    • Accessibility
    • Prototyping
    • CGI (graphics)
    • Computer Animation
    • Working with icons
  • Control
    • Careers in the IT industry
    • Project management
    • Development Management
    • Personnel Management
    • Product Management
    • Start-up development
    • Managing the community
    • Service Desk
    • GTD
    • IT Terminology
    • Agile
    • Business Models
    • Legislation and IT-business
    • Sales management
    • CRM-systems
    • Product localization
    • ECM / EDS
    • Freelance
    • Venture investments
    • ERP-systems
    • Help Desk Software
    • Media management
    • Patenting
    • E-commerce management
    • Creative Commons
  • Marketing
    • Conferences
    • Promotion of games
    • Internet Marketing
    • Search Engine Optimization
    • Web Analytics
    • Monetize Web services
    • Content marketing
    • Monetization of IT systems
    • Monetize mobile apps
    • Mobile App Analytics
    • Growth Hacking
    • Branding
    • Monetize Games
    • Display ads
    • Contextual advertising
    • Increase Conversion Rate
  • Sundry
    • Reading room
    • Educational process in IT
    • Research and forecasts in IT
    • Finance in IT
    • Hakatonas
    • IT emigration
    • Education abroad
    • Lumber room
    • I'm on my way

Using DeviceLock DLP and Citrix Xen to control email on mobile devices

 3r3105. 3r3-31.
The professional community is seriously concerned about the risks of leaking restricted access information through corporate and personal mail from BYOD mobile devices. Practically at every data leakage conference, the question of controlling corporate mail on mobile devices running the most common Android and iOS platforms arises for most participants.
 3r3105.
Using DeviceLock DLP and Citrix Xen to control email on mobile devices
 3r3105.
Let's try to deal with this issue.
 3r3105.
DeviceLock Virtual DLP technology. allows you to intercept e-mail messages directly from an e-mail client application published to Citrix XenApp, which the user gains access to through the terminal session, and in real-time check the context of the message (presence of attachments, check e-mail identifiers) and content (content of content) of messages and attachments their compliance with the DLP policies set for this user. If a violation is detected, the restricted access data transmission is blocked in order to prevent their leakage, a corresponding log entry and a shadow copy of the transmitted message with attachments are created, and an alarm alert is generated for processing as part of the IS incident management procedure.
 3r3105.

 3r3105.
Virtual DLP differs from the solutions described above for c task redirection of traffic to the VPN tunnel and analysis of mail communications at the DLP server level primarily because the user does not have access to the data in the mail clients as such, but to their graphical representation in the terminal session. In addition, Virtual DLP uses an agent-based control option for network communications, when control functions are performed directly at the point of origin of the traffic. Only in such an architecture is it possible to intercept data before encrypting it with proprietary protocols both in mail, such as MAPI and messengers (for example, Private Conversations in Skype). In addition, real-time verification of the contents of the data transmitted via the clipboard and removable drives redirected from a personal device to a terminal session of the desktop or application is ensured, which is equally important for protecting from corporate data leakage from BYOD devices than controlling mail .
 3r3105.

 3r3105.
It is worth noting that DeviceLock DLP allows you to control all common mail protocols - SMTP /SMTP over SSL, MAPI and IBM /Lotus Notes, and users need to install and configure only the application for terminal access on their mobile device. Moreover, due to the use of DeviceLock Virtual DLP technology, full control of various options for using personal mobile devices in various models of using virtualization solutions (BYOD, “home office”, thin clients), built on virtualization platforms and terminal access from Microsoft, Citrix, VMware and other manufacturers - companies can fully control not only email communications, but also corporate virtualization environments in general, transmitted to any personal devices udnikov, including mobile, as well as any other remote device on all operating systems.
 3r3105.
Nota bene:
Of course, it should be borne in mind that working with a full-fledged email client on a smartphone with a tiny screen will be completely impossible, and talking seriously about using Outlook, especially older versions, on 4-inch screens at 800x480 resolution is not serious. But if we take as a virtualized email client a more “compact” application in terms of saturation with different interface elements, equip a device with a quality screen of a larger diagonal - the situation changes dramatically. Again, you shouldn’t forget the organizational and technical aspect - if an employee needs mobile access to email communications by occupation, why not provide him with a tablet or a light ultrabook?
 3r3105.
On the tablet screen, even a full-fledged Outlook becomes really usable, as can be seen in this figure.
 3r3105.
3r388.
 3r3105.
In the next article, we plan to describe in more detail how the control of data flows in terminal sessions in Virtual DLP technology is arranged. Stay in touch!
3r3105. 3r3105. 3r3105.
3r3105.
3r3105. 3r3105. 3r3105. 3r3105.

It may be interesting

  • Comments
  • About article
  • Similar news
This publication has no comments.

weber

Author

10-12-2018, 14:13

Publication Date

Virtualization / Information Security

Category
  • Comments: 0
  • Views: 417
Saving data from a Linux partition
In the US, the largest bot is not
Palm Phone tested: the verdict - the
Unreal Engine ??? release
The famous American economist called
Download JivoSite dialogs via API
Write a comment
Name:*
E-Mail:


Comments
this is really nice to read..informative post is very good to read..thanks a lot! How is the cost of house cleaning calculated?
Yesterday, 17:14

Legend SEO

It’s very informative and you are obviously very knowledgeable in this area. You have opened my eyes to varying views on this topic with interesting and solid content.

entegrasyon programları
Yesterday, 17:09

taxiseo2

I am really enjoying reading your well written articles. It looks like you spend a lot of effort and time on your blog. I have bookmarked it and I am looking forward to reading new articles. Keep up the good work.

entegrasyon programları
Yesterday, 17:02

taxiseo2

I found so many interesting stuff in your blog especially its discussion. From the tons of comments on your articles, I guess I am not the only one having all the enjoyment here! keep up the good work...먹튀

Yesterday, 16:50

raymond weber

Lose Weight Market provides the best fitness tips, workout guides, keto recipes and diet plans, yoga workout routine and plans, healthy recipes, and more! Check Out: Lose Weight Market


Corvus Health provides medical training services as well as recruiting high quality health workers for you or placing our own best team in your facility. Check Out: Health Workforce Recruitment




I.T HATCH offers a wide range of IT services including remote access setup, small business servers, data storage solutions, IT strategy services, and more. Check Out: IT strategy services
Yesterday, 22:33

noorseo

Adv
Website for web developers. New scripts, best ideas, programming tips. How to write a script for you here, we have a lot of information about various programming languages. You are a webmaster or a beginner programmer, it does not matter, useful articles will help to make your favorite business faster.

Login

Registration Forgot password