About Cabling Installation & Maintenance

Our mission: Bringing practical business and technical intelligence to today's structured cabling professionals

For more than 30 years, Cabling Installation & Maintenance has provided useful, practical information to professionals responsible for the specification, design, installation and management of structured cabling systems serving enterprise, data center and other environments. These professionals are challenged to stay informed of constantly evolving standards, system-design and installation approaches, product and system capabilities, technologies, as well as applications that rely on high-performance structured cabling systems. Our editors synthesize these complex issues into multiple information products. This portfolio of information products provides concrete detail that improves the efficiency of day-to-day operations, and equips cabling professionals with the perspective that enables strategic planning for networks’ optimum long-term performance.

Throughout our annual magazine, weekly email newsletters and 24/7/365 website, Cabling Installation & Maintenance digs into the essential topics our audience focuses on.

  • Design, Installation and Testing: We explain the bottom-up design of cabling systems, from case histories of actual projects to solutions for specific problems or aspects of the design process. We also look at specific installations using a case-history approach to highlight challenging problems, solutions and unique features. Additionally, we examine evolving test-and-measurement technologies and techniques designed to address the standards-governed and practical-use performance requirements of cabling systems.
  • Technology: We evaluate product innovations and technology trends as they impact a particular product class through interviews with manufacturers, installers and users, as well as contributed articles from subject-matter experts.
  • Data Center: Cabling Installation & Maintenance takes an in-depth look at design and installation workmanship issues as well as the unique technology being deployed specifically for data centers.
  • Physical Security: Focusing on the areas in which security and IT—and the infrastructure for both—interlock and overlap, we pay specific attention to Internet Protocol’s influence over the development of security applications.
  • Standards: Tracking the activities of North American and international standards-making organizations, we provide updates on specifications that are in-progress, looking forward to how they will affect cabling-system design and installation. We also produce articles explaining the practical aspects of designing and installing cabling systems in accordance with the specifications of established standards.

Cabling Installation & Maintenance is published by Endeavor Business Media, a division of EndeavorB2B.

Contact Cabling Installation & Maintenance

Editorial

Patrick McLaughlin

Serena Aburahma

Advertising and Sponsorship Sales

Peter Fretty - Vice President, Market Leader

Tim Carli - Business Development Manager

Brayden Hudspeth - Sales Development Representative

Subscriptions and Memberships

Subscribe to our newsletters and manage your subscriptions

Feedback/Problems

Send a message to our general in-box

 

Citrix® Research Uncovers New Approach to Security

Global survey finds IT organizations shifting to intelligent, zero trust models to accommodate future of work

Implementing security used to be simple: Build a perimeter and protect the resources inside. But as apps are increasingly moving to the cloud and work is happening anywhere, things have become more complicated, and the traditional architecture of castle and moat no longer works. IT organizations around the world realize this, and according to the results of a Pulse survey conducted by Citrix Systems, Inc. (NASDAQ: CTXS), are abandoning traditional approaches to securing information and devices in favor of modern ones that enable them to overcome these challenges and deliver the future of work.

“In a world where resources can be accessed anywhere, anytime from any device, traditional security models focused on locking systems down won’t cut it,” said Fermin Serna, Chief Information Security Officer, Citrix. “What is needed is an intelligent, people-focused approach that allows organizations to secure all the tools, apps, content, and devices that employees need and prefer to use in a simple experience that can be customized to fit their personal preferences and evolving work styles.”

A Modern Approach…

The Citrix-Pulse survey supports this notion. Of the IT executives and managers in North America, Europe, the Middle East, Africa and the Asia Pacific region who responded to the measure,

  • 64 percent indicated that they are aiming to shift from their current VPN strategy
  • 71 percent said they are looking to a zero trust, cloud-based model as a replacement

…Driven by Experience

And employee experience will figure prominently in their plans.

  • 97 percent of those surveyed cited employee experience as a key influence on their strategy going forward, and
  • 75 percent said they are looking to improve the user experience through their design and execution

“Employee experience is critical to delivering business innovation and growth, and security must support it,” Serna said. “As the Citrix Pulse survey found, savvy organizations recognize this and are evolving their security postures to provide access to applications and information in a contextual and transparent way that empowers employees rather than frustrating them.”

Organizations like Synopsys. “We are moving beyond traditional VPN solutions and now provide our employees and partners with zero trust and secure access to their infrastructure on corporate managed or BYO devices,” said Sriram Sitaraman, Chief Information Officer, Synopsys.

And it is using solutions from Citrix to do it. Citrix provides a powerful set of secure access solutions that combine a full cloud-delivered security stack integrated with identity-aware Zero Trust Network Access (ZTNA) to protect employees without getting in their way, as well as a complete Secure Access Services Edge (SASE) stack of services that includes:

Citrix Secure Internet Access™ - A comprehensive, global cloud security service that addresses the security requirements of modern enterprises. This includes secure web gateway, next-generation firewall, cloud access security broker (CASB), DLP, sandboxing and AI-driven attack detection.

Citrix Secure Workspace Access™A VPN-less solution that delivers zero trust access to corporate web and SaaS applications accessed from managed and BYO devices.

Delivered as part of Citrix Workspace™, Citrix secure access solutions enable companies to:

○ Enhance security and productivity through identity-aware, zero trust access to all cloud and internet-based applications and virtual desktops.

○ Leverage machine learning and artificial intelligence to provide real-time insights into user behavior and automate the process of preventing cybersecurity breaches

○ Identify specific security incidents, atypical activity and policy violations using built-in forensics and detailed search into all traffic and user behavior

○ Protect against all threats, everywhere leveraging more than 100 global points-of-presence, powered by over 10 threat intelligence engines

○ Provide full coverage for all popular Cloud and SaaS properties, devices and operating systems, leaving no gap for access security coverage

○ Manage everything through a single pane of glass

“By unifying access to all our corporate applications, Citrix has not only helped tighten the security posture around our apps, but also improved our overall employee experience,” Sitaraman adds.

To learn more Citrix solutions and the security transformation they can drive, click here.

About Citrix

Citrix (NASDAQ: CTXS) builds the secure, unified digital workspace technology that helps organizations unlock human potential and deliver a consistent workspace experience wherever work needs to get done. With Citrix, users get a seamless work experience, and IT has a unified platform to secure, manage, and monitor diverse technologies in complex cloud environments.

For Citrix Investors:

This release contains forward-looking statements which are made pursuant to the safe harbor provisions of Section 27A of the Securities Act of 1933 and of Section 21E of the Securities Exchange Act of 1934. The forward-looking statements in this release do not constitute guarantees of future performance. Those statements involve a number of factors that could cause actual results to differ materially, including risks associated with the impact of the global economy and uncertainty in the IT spending environment, revenue growth and recognition of revenue, products and services, their development and distribution, product demand and pipeline, economic and competitive factors, the Company's key strategic relationships, acquisition and related integration risks as well as other risks detailed in the Company's filings with the Securities and Exchange Commission. Citrix assumes no obligation to update any forward-looking information contained in this press release or with respect to the announcements described herein. The development, release and timing of any features or functionality described for our products remains at our sole discretion and is subject to change without notice or consultation. The information provided is for informational purposes only and is not a commitment, promise or legal obligation to deliver any material, code or functionality and should not be relied upon in making purchasing decisions or incorporated into any contract.

© 2021 Citrix Systems, Inc. Citrix, the Citrix logo, and other marks appearing herein are the property of Citrix Systems, Inc. and may be registered with the U.S. Patent and Trademark Office and in other countries. All other marks are the property of their respective owners.

Contacts

Stock Quote API & Stock News API supplied by www.cloudquote.io
Quotes delayed at least 20 minutes.
By accessing this page, you agree to the following
Privacy Policy and Terms Of Service.