logo
#

Latest news with #Citrix

IGEL and Vasion Enhance Secure Printing for IGEL OS with App Portal Release
IGEL and Vasion Enhance Secure Printing for IGEL OS with App Portal Release

Business Upturn

time30-07-2025

  • Business
  • Business Upturn

IGEL and Vasion Enhance Secure Printing for IGEL OS with App Portal Release

FORT LAUDERDALE, Fla., July 30, 2025 (GLOBE NEWSWIRE) — IGEL, the secure endpoint OS platform for now & next, and Vasion, a print automation and AI-powered digital transformation company, today announced the launch of the Vasion Print App on the IGEL App Portal. This collaboration delivers secure, serverless print enablement to IGEL's immutable endpoint OS, reducing attack surfaces and simplifying IT operations. 'Together, IGEL and Vasion are delivering a seamless and secure printing experience for IGEL OS users,' said Jim Airdo, Senior Vice President, Strategic Alliances, IGEL. 'By making Vasion Print available via the IGEL App Portal, we are giving our mutual customers access to simplified, secure, and scalable print management that leverages IGEL's Preventative Security Model™ with cloud-native app delivery.' 'As a leader in SaaS print management, Vasion Print empowers organizations to eliminate print servers while maintaining a secure and efficient printing infrastructure,' said Chee Tan, Vice President, Ecosystem & Alliances, Vasion. 'With this integration, IGEL OS users can now experience hassle-free printing, reducing IT complexity and enhancing security, all while ensuring a seamless experience across virtual desktop and cloud environments.' The Vasion Print App for IGEL's immutable endpoint OS enables secure, direct IP printing—removing print servers as an attack vector. Integrated with IGEL endpoints, it delivers consistent, reliable printing across VDI, DaaS, and cloud environments, improving IT efficiency and user experience. Key benefits of Vasion Print for IGEL OS include: Time Savings: Automates and centralizes print management to reduce IT workload and boost user productivity. Automates and centralizes print management to reduce IT workload and boost user productivity. Seamless Integration: Works with Microsoft Azure Virtual Desktop, Windows 365 Cloud PC, Citrix, and Omnissa solutions. Works with Microsoft Azure Virtual Desktop, Windows 365 Cloud PC, Citrix, and Omnissa solutions. Cost Reduction: Eliminates resource-intensive print servers and automates administrative tasks to lower IT costs. Eliminates resource-intensive print servers and automates administrative tasks to lower IT costs. Enhanced Security: End-to-end encryption, Secure Release Printing, and removal of print servers as attack vectors—all fully aligned with IGEL's Preventative Security Model and Zero Trust principles. Vasion Print is validated as part of the IGEL Ready ecosystem—the industry's fastest-growing endpoint technology community. Explore the Vasion Print App and more at the IGEL App Portal . Established in July 2020, IGEL Ready is a growing ecosystem of more than 100 technology partners delivering validated, secure solutions for the modern enterprise.. For media inquiries or more information, contact IGEL Corporate Communications . About IGEL IGEL is the secure endpoint OS platform for now & next. Purpose-built for VDI, DaaS, SaaS, and secure browsing, IGEL OS delivers a high-performance user experience while dramatically simplifying endpoint management. Through its Preventative Security Model™, IGEL enforces Zero Trust principles by design — using a modular, read-only OS with no local data to eliminate common attack surfaces. By extending device lifespans and reducing software overhead, IGEL helps organizations cut total cost of ownership and achieve sustainability goals. Trusted globally across healthcare, financial services, retail, manufacturing, and government sectors, IGEL enables secure, sustainable, and centrally managed digital workspaces. Founded in 2001, IGEL is backed by a global IGEL Ready partner ecosystem of more than 100 integrated technology vendors, supporting customers in over 50 countries. For more information on what IGEL can do for you, visit . About Vasion Vasion empowers technical leaders to modernize IT infrastructure by eliminating print servers and digitizing business processes, all from a secure, cloud-native platform. With AI-powered automation, Vasion streamlines print and document workflows across any device or location, removing GPOs, scripts, and helpdesk overhead. Our solutions offer centralized control, granular access management, and seamless integration with systems like Epic, SAP, and Oracle—giving IT a single platform to easily automate print, delivery, tracking, critical document management, maintain compliance—and drive immediate impact and scalable growth. Media Contacts An image accompanying this announcement is available at Disclaimer: The above press release comes to you under an arrangement with GlobeNewswire. Business Upturn takes no editorial responsibility for the same. Ahmedabad Plane Crash

CISA confirms hackers are actively exploiting critical ‘Citrix Bleed 2' bug
CISA confirms hackers are actively exploiting critical ‘Citrix Bleed 2' bug

Yahoo

time11-07-2025

  • Business
  • Yahoo

CISA confirms hackers are actively exploiting critical ‘Citrix Bleed 2' bug

U.S. cybersecurity agency CISA says hackers are actively exploiting a critical-rated security flaw in a widely used Citrix product, and has given other federal government departments just one day to patch their systems. Security researchers have dubbed the bug 'Citrix Bleed 2' for its similarity to a 2023 security flaw in Citrix NetScaler, a networking product that large companies and governments rely on for allowing their staff to remotely access apps and other resources on their internal networks. Much like the earlier bug, Citrix Bleed 2 can be remotely exploited to extract sensitive credentials from an affected NetScaler device, allowing the hackers broader access to a company's wider network. In an alert on Thursday, CISA said it had evidence that the bug was being actively used in hacking campaigns, adding to the raft of research and findings pointing to widespread exploitation, with some reporting hacks dating back as far as mid-June. Akamai said it saw a 'drastic increase' in efforts to scan the internet for affected devices after details of the NetScaler exploit were published earlier this week. CISA said the NetScaler bug poses a 'significant risk' to the federal government's systems, and ordered federal government agencies to patch any Citrix device affected by the bug by Friday. For its part, Citrix has not yet acknowledged that the vulnerability is being exploited. The company's security advisory urges customers to update affected devices as soon as possible. Citrix representatives did not respond to TechCrunch's request for comment. Sign in to access your portfolio

CISA confirms hackers are actively exploiting critical ‘Citrix Bleed 2' bug
CISA confirms hackers are actively exploiting critical ‘Citrix Bleed 2' bug

TechCrunch

time11-07-2025

  • Business
  • TechCrunch

CISA confirms hackers are actively exploiting critical ‘Citrix Bleed 2' bug

U.S. cybersecurity agency CISA says hackers are actively exploiting a critical-rated security flaw in a widely used Citrix product, and has given other federal government departments just one day to patch their systems. Security researchers have dubbed the bug 'Citrix Bleed 2' for its similarity to a 2023 security flaw in Citrix NetScaler, a networking product that large companies and governments rely on for allowing their staff to remotely access apps and other resources on their internal networks. Much like the earlier bug, Citrix Bleed 2 can be remotely exploited to extract sensitive credentials from an affected NetScaler device, allowing the hackers broader access to a company's wider network. In an alert on Thursday, CISA said it had evidence that the bug was being actively used in hacking campaigns, adding to the raft of research and findings pointing to widespread exploitation, with some reporting hacks dating back as far as mid-June. Akamai said it saw a 'drastic increase' in efforts to scan the internet for affected devices after details of the NetScaler exploit were published earlier this week. CISA said the NetScaler bug poses a 'significant risk' to the federal government's systems, and ordered federal government agencies to patch any Citrix device affected by the bug by Friday. For its part, Citrix has not yet acknowledged that the vulnerability is being exploited. The company's security advisory urges customers to update affected devices as soon as possible. Citrix representatives did not respond to TechCrunch's request for comment.

SOCRadar debuts MCP Server for secure AI threat intel access
SOCRadar debuts MCP Server for secure AI threat intel access

Techday NZ

time03-07-2025

  • Business
  • Techday NZ

SOCRadar debuts MCP Server for secure AI threat intel access

SOCRadar has launched its MCP Server to enable secure integration between artificial intelligence models and its threat intelligence platform for cybersecurity professionals. The MCP Server introduces the Model Context Protocol, a standard interface designed to facilitate secure connections between AI language models and external data sources. Through this server, AI assistants can access real-time threat intelligence information, interact with databases and APIs, and utilise various services while ensuring security boundaries are preserved. Facilitating human–AI collaboration According to SOCRadar, cybersecurity teams are increasingly adopting AI agents in their workflows, particularly for threat analysis and incident response. In response, the company developed the MCP Server to offer standardised, controlled access to its threat intelligence databases and security tools. "Microsoft CEO Satya Nadella said it best: 'Human language is the new UI layer.' That's exactly why we launched our MCP server. We believe the future of cybersecurity lies in seamless human–AI collaboration. Security threats are evolving too fast for traditional, manual processes to keep up. By allowing AI assistants to access our threat intelligence in real time through natural language, we're giving security teams the ability to respond faster, with more context, and far less friction," said Huzeyfe Onal, CEO of SOCRadar. Simplifying operational workflow The MCP Server allows security teams to interact with SOCRadar's threat intelligence services through conversational requests, bypassing the need to navigate the existing user interface or memorise workflows. Designated commands, such as "Show me my critical assets exposed to the latest Citrix vulnerability" or "Give me the top CVEs affecting my attack surface today," can be issued directly to the MCP Server, which interprets, executes, and provides actionable results on demand. SOCRadar stated this process eliminates interface overload, helping teams focus on managing vulnerabilities and threat responses rather than administrative tasks. Reporting and integration capabilities Security professionals can use the MCP Server to generate reports quickly, including daily threat updates, geo-targeted actor profiles, or environment-specific vulnerability snapshots. Sample requests include: "SOCRadar, create a report on threat actors targeting energy companies in the US over the past week." The company reports that such reports are generated dynamically in seconds, removing the need for templates or filter adjustments. In addition to these features, the MCP Server supports integration with AI-driven SOC platforms and internal AI agents. The server functions as a gateway for systems to enrich indicators of compromise (IOCs), retrieve CVE intelligence, automate response actions, and trigger custom playbooks, all without the need for additional API development. SOCRadar explained that this allows existing AI agents to access the company's platform by simply sending requests, with the server managing the interpretation and fulfilment of tasks. "With SOCRadar's MCP server, there's no need to build brittle APIs. The agent just asks, and SOCRadar answers," the company explained. Platform reach SOCRadar provides threat intelligence services to over 800 customers in 70 countries. Its Extended Threat Intelligence Platform incorporates artificial intelligence and machine learning to deliver threat detection and actionable intelligence for proactive cybersecurity efforts. Product offerings include cyber threat intelligence, external attack surface management, brand protection, dark web monitoring, and supply chain threat intelligence.

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into a world of global content with local flavor? Download Daily8 app today from your preferred app store and start exploring.
app-storeplay-store