Secure Android? UK Consumer Protection Site Which? Offers Smartphone Users Simple Advice
A secure Android smartphone is possible if you take just a few simple precautions. We found some great tips on Which?, a UK consumer protection organization that tests thousands of products and services to help British consumers make informed decisions about their purchases. In addition to its...
2X Software Wins the 2013 European Seal of e-Excellence Award, Strengthens their Credibility in the European Cloud Computing Market
DALLAS, TX, February 5th 2013 — 2X Software, a global leader in virtual desktop and application delivery solutions, today announced that the company has won the 2013 European Seal of e-Excellence Award. This award further strengthens the company’s credibility within the European cloud computing...
Creating Strong Passwords for your Mobile Devices and Enforcing Them
In a 7 November article in The New York Times, Nicole Perlroth, who writes about cyber security interviewed Jeremiah Grossman, CTO at WhiteHat Security, an Internet and network security firm, and Paul Kocher, founder of Cryptography Research, a security firm that specializes in keeping systems...
New Feature in 2X Remote Application Server v10.5 – Server to Client Commands
A new feature introduced in ApplicationServer XG v10.5 is the ability for a process running on the server to instruct the client to deploy an application on the client.
This can be useful in a variety of ways, for example opening a document copied from the server to the client machine (via driver...
Wipe Personal Data from Any Mobile Device with 2X MDM
Over half of UK mobile phone users believe the personal data on their phones would be secure in the event of theft or loss. Are they right? British life assistance company CPP wanted to find out, so last year it decided to conduct an experiment. The company purchased a number of second-hand mobile...
Why Mobile Device Management?
Mobile Device Management (2X MDM), is the ability to secure, monitor, manage and support mobile devices – typically involving remote distribution of applications, data and configuration settings for all types of mobile devices such as smartphones, tablets and notebook computers.
With mobile...
Remote Lock Your iPhone
If you have an iPhone, chances are you have your personal and/or business information stored on it. You probably have contact details of your family, friends, colleagues and clients, SMS and email messages, photos, videos and more. After all, you can fit a lot of data on a device most of us use...
Optimum User Experience, High Performance and Minimum TCO with IGEL Thin Clients and 2X Remote Application Server
As perfectly attuned end user devices for efficient, high performance cloud access, 2X Remote Application Server and IGEL Linux thin clients reduce the cost of IT workstations
Dallas, Texas, August 14, 2012 – 2X Software, a global leader in desktop virtualization and application delivery, today...