Introduction
The Strategic Shift to Clientless SSL VPNs: A New Paradigm in Endpoint Security and Cost Efficiency
Introduction As organizations increasingly adopt remote work models, the need for secure, efficient, and cost-effective remote access solutions has never been greater. Traditional Virtual Private Networks (VPNs) have been the standard for secure ...
Outperform Traditional VPNs with a ZTNA Approach
Introduction The Zero Trust Network Access (ZTNA) sector is experiencing a swift expansion, with an anticipated growth to $38.6 billion by 2026, marking a CAGR of 18.4% from 2022 to 2024. This expansion is driven by the increasing need for secure ...
Thinfinity Remote Workspace - A Zero Trust Network Access (ZTNA) Solution
Introduction In the era of digital transformation, the need for secure, flexible, and efficient access to internal applications for remote users has never been more critical. As organizations continue to adopt cloud technologies and support remote ...
Zero Trust Network Access (ZTNA) vs. Virtual Private Network (VPN): A Comparative Analysis
Introduction In the realm of network security, two terms often surface in discussions about secure remote access: Virtual Private Network (VPN) and Zero Trust Network Access (ZTNA). Both technologies provide remote access to internal resources, but ...
Recognizing the Security Implications of the New Normal
Recognizing the Security Implications of the New Normal As the landscape of information security constantly evolves, organizations face a range of modern security challenges. These include increasingly sophisticated threats, a rapidly expanding ...
ZTNA vs. Traditional Network Security
In the context of digital security and connectivity, the landscape is continually shifting, driven by technological advancements and the evolving nature of threats. Traditionally, network security revolved around the concept of maintaining a secure ...
ZTNA Core Concepts
Introduction In the rapidly evolving digital landscape, the traditional perimeter-based security model is proving to be insufficient. The rise of remote work, cloud-based services, and mobile technology has blurred the boundaries of the traditional ...
What is ZTNA?
Zero Trust Network Access (ZTNA) is an IT security solution that enables secure remote access to an organization's applications, data, and services. By implementing clearly defined access control policies, ZTNA offers a distinct advantage over ...
Recent Articles
Publish AutoCAD to the web with Thinfinity Workspace
Introduction AutoCAD is one of the most used programs by architects, industrial designers and students in order to design their projects. At the same time, its license costs make it an expensive option for many educational programs. Learn how you can ...
How to customize the ThinDisk name with Thinfinity® Workspace
Overview Welcome to this step-by-step guide, where we will walk you through the essential process of customizing the name displayed for the ThinDisk file system drive in Thinfinity® Workspace. By following these instructions, you’ll be able to easily ...
How to run a .NET application in on a web browser
Overview Note Pre-requisites: To proceed with this tutorial, you may need to register a trial license for the VirtualUI Development Server, Learn how to do it in this article. Now you are ready to get started. Let’s take your program to the cloud! ...
Integrate an MFC application with Thinfinity VirtualUI
Overview Welcome to this step-by-step tutorial on integrating your application with Thinfinity VirtualUI on your development machine. In this guide, we'll cover the fundamental steps to transform your Windows application into a web-accessible ...
How to configure Workspace Mappings
Mappings With Thinfinity Workspace, you are able to configure various authentication methods to login securely to a single platform and to also provide granularity by segregating permissions with users/profiles. In order to associate Authentication ...
Popular Articles
ZTNA Core Concepts
Introduction In the rapidly evolving digital landscape, the traditional perimeter-based security model is proving to be insufficient. The rise of remote work, cloud-based services, and mobile technology has blurred the boundaries of the traditional ...
How to Publish your First RemoteApp Connection to a Jump Server
1. Introduction In this guide, you will learn how to configure your first RemoteApp assuming you have read the Getting Started Guide. This guide has been crafted for administrators like you, responsible for establishing and configuring Thinfinity® ...
What's New on Thinfinity Remote Workspace 7
Introduction Welcome to our comprehensive guide to the Thinfinity® Workspace 7. This article will introduce you to the product's groundbreaking features, new connection protocols, and enhanced user experience. Thinfinity® Workspace 7 is the epitome ...
How To Install a Secondary Broker
Product: Thinfinity Workspace Versions: 7 and later Introduction In this document, we will guide you through the process of installing a Secondary Broker, a crucial component in building a resilient and scalable network infrastructure. Whether you ...
Configure Single Sign-On in using OneLogin with OAuth
Product: Thinfinity Workspace Versions: 7 and later Introduction In this document, we will walk you through the process of configuring Single Sign-On (SSO) in Thinfinity Workspace, with OneLogin serving as the Identity Provider (IDP). SSO simplifies ...