SlideShare une entreprise Scribd logo
1  sur  35
Télécharger pour lire hors ligne
HOB GmbH & Co. KG
21.08.2012
HOBLink JWT - the Diamond
among the RDP-Clients
Remote Access
Remote Access to Windows Remote Desktop Servers
in a new Dimension!
Secure Business Connectivity
2
HOBLink JWT																04
Overview						 											06
Benefits in a Nutshell															 07
HOBLink JWT is Special														08
HOBLink JWT Scores in Terms of Security											09
	Management of Rights with a Local Parameter-Cache									10
	Partial Local Drive Mapping (LDM)													11
	Virus Scan with Local Drive Mapping												11
	SOCKS-Proxy Tunneling														12
	A Single Password for All Systems with Single Sign-On										12
	Trust in Modern Java-Technology													14
	Controlling the RDP Security Mode													15
	 Configuration of Individual Client Names												15
HOBLink JWT Exceeds in Terms of Adaptability										 16
	 Integration into your own Website													 18
	 Branding: Look & Feel According to Your own Corporate Identity								 19
	 Individual Configuration of Keypads and Hot Keys										 19
	 Configuration possible for any Printer and Printer Name										 20
Secure Business Connectivity
3
	 It can be Done without a Server Component		 									21
	Universally Employable with all Platforms												22
	Add-on: Access to Mac														22
HOBLink JWT: Great Comfort for Users and Administrators								 23
	 Event Handling can be Implemented in Java-Script										 24
	 Use Virtual Channel APIs with Java													 25
	 Remotely Boot your PC with Wake-on-LAN											 26
	Client-oriented Keyboard Mapping													27
	 No Matter if Righty or Lefty: Comfortable Working possible									 28
	 HOB Load Balancing for Perfect Performance and Optimal Load-Balancing							 29
	Optimized Data Stream														30
	Assessable Audio Quality														30
	Reliable Connection Management													31
	 Easy Installation and Configuration													 32
Picture sources																 33
At a Glance																 34
Interested?																 35
Secure Business Connectivity
4
HOBLink JWT
HOBLink JWT is an HOB-developed
RDP client for flexible remote access to
Windows Remote Desktop Servers (for-
merly known as Windows Terminal Ser-
vers). This makes HOBLink JWT a dia-
mond among the RDP clients. Why?
Well, HOBLink JWT has the greatest and
largest amount of options and features
that are available for RDP clients. From
the RDP rough diamond, HOB has de-
veloped the most polished RDP client
in the world. Sounds unbelievable? Not
at all – learn what is so special about
HOBLink JWT and why this RDP cli-
ent is the jewel among the RDP clients
on the following pages. HOBLink JWT
offers you various additional functions
that other RDP clients simply can-not.
It presents highly precise configuration
options for an exact adaption to indivi-
dual needs that greatly exceed what is
usually available. Furthermore, for years,
HOBLink JWT has been constantly
further developed for improved perfor-
mance. In close consulta-tion with our
customers, we develop extraordinary
and excellent solutions to suit your needs
and solve your problems. Therefore, you
Secure Business Connectivity
5
receive a perfected, hardened and opti-
mally functioning RDP client that is de-
veloped with attention to the smallest
detail and is tailored to the needs of our
customers. There is a reason why large
companies trust us and have successfully
deployed HOBLink JWT for many years
with thousands of licenses. Especially for
companies that have to work with high-
ly sensitive data, such as banks and in-
surance companies, HOBLink JWT has
proven itself to be easy to use, custom-
configurable and nonetheless highly se-
cure and extremely performant. Illustration: What you can access with HOBLink JWT
Secure Business Connectivity
6
Overview
HOBLink JWT is an extraordinary soluti-
on for web-based RDP access to Win-
dows servers, VDI and desktop systems.
With it, you can access centrally ins-
talled Windows-, UNIX-, Linux- and Mac
OS- applications from any Java-capable
platform. As a result, embrace all the
benefits of a web-based, server-based
computing solution. HOBLink JWT offers
multiple additional benefits that impro-
ve the installation, usability and security.
HOBLink JWT is easy to integrate into
preexisting infrastructures. It can also be
integrated into third-party environments,
such as thin clients, appliances and cloud
portals. Use HOBLink JWT, combined
with modern security mechanisms, to ac-
cess your applications in a local network
or worldwide. Full support of modern au-
thentication and encryption technologies
allows customers and users to stay on
the safe side.
Secure Business Connectivity
7
Benefits in a Nutshell
•	 Maximum amount of possibilities 	
	 to configure and personalize for 	
	 greater flexibility
•	 No software-installation and 	
	 administration rights needed on 	
	 the clientside
•	 Individual solution, independent of	
	 the operating system being used
•	 Desktop systems can also
	 be accessed
•	 Optimal utilization of the existing 	
	 network infrastructure
•	 Scalable in any desired way, be-	
	 cause it is solely software-based
Secure Business Connectivity
8
HOBLink JWT is
Special
Comparing HOBLink JWT to other, simi-
lar products, one thing becomes clear
very easily:
HOBLink JWT offers you more than “just”
RDP. Convince yourself – on the fol-
lowing pages or with the help of a free
test-installation!
As is notable in the scenario areas abo-
ve – security, adaptability and comfort –
HOBLink JWT presents itself as the jewel
among the RDP-clients. Neither user nor
IT controllers could turn this down.
“HOBLink JWT
offers you more
than“just”RDP“
Secure Business Connectivity
9
HOBLink JWT Scores
in Terms of Security
Secure Business Connectivity
10
employee has in a remote session can
be decided according to the functions
they have in the company and the level
of trust they have acquired. Implemen-
tation of highly granular security policies
is thus ensured. Every parameter of the
HOBLink JWT settings can be opened,
blocked or provided with a certain selec-
tion. Likewise, local drive mapping (local
drives are also available in the remote
session) can be made highly flexible in
HOBLink JWT.
HOBLink JWT contains various out-
standing security features which cannot
be found in the solutions of other provi-
ders. If HOBLink JWT is combined with
HOB RD VPN or HOB RD ES, an even
greater number of security features
are available.
Management of Rights with a
Local Parameter Cache
HOBLink JWT allows individual user-rights
settings for remote access and while wor-
king in a remote session. The rights an
“Precise definition
and management
of rules - full con-
trol for the IT-
administratior“
Secure Business Connectivity
11
Partial Local Drive
Mapping (LDM)
While “standard products” can only map
whole drives, HOBLink JWT allows for
precise settings as to which drives, direc-
tories or sub-directories can be mapped.
Access rights can therefore be mapped
with greater individuality according to the
security guidelines of a company. Unau-
thorized access to critical data can hence
be eliminated.
Virus Scan with Local
Drive Mapping
If HOBLink JWT is used in combination
with HOB Remote Desktop Enhanced
Services (HOB RD ES) or HOB Remote
Desktop VPN (HOB RD VPN), it is also
possible to scan data for viruses before
they even find their way to the company
server. This, as a matter of fact, increases
security and protects the company net-
work from viruses, Trojans and the like.
“You decide, if and
which local drives
are available in the
remote session!“
Secure Business Connectivity
12
SOCKS-Proxy Tunneling
This feature allows you to easily decide
which way the client takes to leave the
network, for example via SOCKS or HTTP.
With HOBLink JWT this is quite easy; with
other manufacturers, additional products
would need to be purchased.
.
A Single Password for All
Systems with Single Sign-On
HOBLink JWT is completely compatible
with the RDP Single Sign-On solution.
Thus the IT administrator is able to kill
two birds with one stone: on one hand
the security level is increased significantly
and on the other hand the administrative
effort is greatly reduced. Even though the
topic “Single Sign-On“ is often discussed
controversially, experts agree: executed
correctly, SSO-solutions yield a big plus
in security for companies.
“Single Sign-On
for safer pass-
words and less ad-
ministrative effort“
Secure Business Connectivity
13
Single Sign-On solutions allow access to
all services and applications with just one
log-in (one-time user log-in), as long as
the user has the general authorization for
the access. After this one-time authenti-
cation, the SSO solution takes over the
task of authenticating the user at other
services or applications. A separate user-
name or password is therefore not nee-
ded. Hence, the user only has to remem-
ber one password, which can then be a
more complex one.
In addition to this, help desks costs are
decreased because users would rarely
forget their password anymore and would
have fewer problems when going through
the authentication process.
You can find detailed information with
a description of the benefits and risks
about this topic in our blog article “Single
Sign-On”:
Secure Business Connectivity
14
Trust in Modern
Java-Technology
While other RDP-clients, for example the
Microsoft Client, use Active X Techno-
logy, HOBLink JWT employs Java. On
one hand, you will achieve greater secu-
rity, since Java runs – contrary to Active
X – on all operating systems; Active X is
only available for Windows interfaces at
the moment. Another benefit is that Java
is considered to be more secure than
Active X – and not only because of its
sandbox characteristics.
“Long-time tested
and universally
usable Java tech-
nology - secure
and flexible“
Secure Business Connectivity
15
Configuration of Individual
Client Names
You can define an individual name for
each client, so that the client can be iden-
tified on the server with absolute certainty.
Should security offences or conspicuous
behavior occur, you will know for sure
which user might have disregarded the
policies – without having to search in the
dark. It is especially important to know
immediately when an extreme security-
critical incident has occurred in order to
react immediately.
Controlling the RDP
Security Mode
With HOBLink JWT, you decide which
RDP security modes are to be used.
This means, you can even define an in-
dividual sequence, so that unsuccessful
connection attempts due to unsuppor-
ted RDP security modes on the server
side can be prevented. All in all, an in-
dividual definition of the security modes
and their order leads to highly improved
time management.
Secure Business Connectivity
16
HOBLink JWT
Exceeds in Terms
of Adaptability
Secure Business Connectivity
17
HOBLink JWT can easily be integrated
into existing IT structures and, therefo-
re, can be employed on a long-term ba-
sis – even if processes or conditions in
the company are changing. Moreover,
HOBLink JWT can be adapted to your
particular needs. Just see for yourself in
the following chapter.
“High adaptability
due to numerous
parameters“
Secure Business Connectivity
18
Integration into Your
Own Website
You have the option to incorporate
HOBLink JWT into your company web-
site, customer portals or your very own
intranet page. Sounds kind of banal, but
this offers the benefit that employees are
provided with a central point of entry and
do not have to start HOBLink JWT over
a dedicated web address. Also, integra-
tion helps in-house acceptance, because
intranet content is often perceived as res-
pectable and “true” (an inspection of this
content by colleagues and by the editorial
staff is assumed).
“Integration into your
own website - central
point of entry for all
users“
Secure Business Connectivity
19
Branding: Look & Feel
According to Your Own
Corporate Identity
Many elements of HOBLink JWT, for ex-
ample, the starting dialogue, the window
title text or even banners can be adapted
to your corporate identity. The look and
feel of HOBLink JWT therefore even de-
picts your company graphically. The ad-
vantage: users are less distracted and are
able to find their way around more easily.
Especially with larger numbers of users or
user groups, this is a big plus. Moreover,
you can individually deter-mine the size of
your window – full screen, just a certain
percentage of the desktop, or a fixed size
(flexible windows mode).
Individual Configuration of
Keypads and Hot Keys
So called “hot keys,” meaning defined
key combinations, for example <ALT>
+ <TAB> can be reconfigured (for spe-
cial functions), offering extreme flexibi-
lity in accordance to your needs. With
other clients, these are universally pre-
set and cannot be changed. In cont-
rast: with HOBLink JWT you can easi-
ly manage cascading sessions – with
other products, this often becomes an
insurmountable hurdle!
“Configuration of
environment vari-
ables according to
your wishes “
Secure Business Connectivity
20
Configuration Possible for Any
Printer and Printer Name
HOBLink JWT allows you to configure
every printer individually; such a granular
selection cannot be found within other
products. The following statement says it
best: “all or nothing.” However, you can
map, for example, only the standard prin-
ter or virtual printers only, just as you like,
with the help of HOBLink JWT. Due to the
integrated Easy-Print function, emplo-
yees are able to get their print job done
right away, no matter which drivers are in-
stalled on the server. Fast printing or ma-
naging complex print jobs therefore po-
ses no problem to the users any longer.
“Configure printers
individually for fast
and easy printing “
Secure Business Connectivity
21
Moreover, the printer name within the
session can be generated per pattern.
Meaning: you can define any random text
for the printer, so that the user is more
easily able to identify exactly the different
printers (for example printer accounting
instead of HP2012ON).
It Can Be Done Without
a Server Component
HOBLink JWT can also be used without
the server component of HOB, if the
functions of the HOB server component
HOB RD ES are not needed – a simp-
le web browser is enough for the use of
HOBLink JWT. You are even more flexible
in terms of your process design.
.
“HOBLink JWT
even runs without
the HOB server
component“
Secure Business Connectivity
22
Universally Employable with
all Platforms
A crucial advantage of HOBLink JWT:
regardless from which operating system
you would like to access another, whe-
ther you have Windows, Mac or even
Unix/Linux operating systems in use –
HOBLink JWT is compatible with all of
them. While other products can only be
used with either one or the other opera-
ting system, with HOBLink JWT you recei-
ve a completely universal RDP client that
is able to support all popular operating
systems. This proves to be particularly
valuable in heterogeneous environments
where many diverse operating systems
are used in parallel at the same time.
Add-on: Access to Mac
If access to Macs is also needed, the
perfect add-on for you would be, for ex-
ample, HOB MacGate: the perfect com-
plement to HOBLink JWT. The user then
can comfortably start a HOBLink JWT
session and access all applications and
data on their Mac.
“Compatible to all
common operating
systems for greater
freedom to design“
Secure Business Connectivity
23
HOBLink JWT: Great
Comfort for Users and
Administrators
Secure Business Connectivity
24
Event Handling Can Be
Implemented in Java-Script
Certainly you know the following scenario:
Your colleague calls, because some ran-
dom cryptic message popped up on his
screen. This will now cost you time – you
will have to find out what kind of message
this is, to only afterward tell your colleague
to just ignore it. You could have used your
time for more important things. This is
the reason why HOBLink JWT allows you
to precisely configure how to handle er-
ror reports (can be implemented in Java
script). Therefore, it is possible that error
reports are ignored, errors are hidden or
managed differently. If you have to mana-
ge big installations with many users, this
comes quite in handy. And even the user
is happy: no irritation due to cryptic mes-
sages any longer! Additionally, this allows
you to adapt HOBLink JWT to your per-
sonal requirements one step further.
“Easier handling
for administrators
and users“
Secure Business Connectivity
25
in advance is unnecessary. The benefit:
even local devices, for example, dictating
machines or microphones, can be used
over the Windows Terminal Server sessi-
on. Environment variables can be used to
configure the virtual channel modules as
needed.
Use Virtual Channel APIs
with Java
With HOBLink JWT, virtual channel APIs
can even be used from the client side via
Java. To be more precise, the needed
program libraries (.dll) do not have to be
installed on every client, but can be cen-
trally deposited on the server, once. Not
only is the principle of “zero touch” clients
therefore supported, but it also increases
security and helps with central manage-
ment. You will see: it will reduce a great
deal of your workload if not every client
has to be physically touched!
And also the download of the program
libraries for virtual channels is done by
HOBLink JWT for the user; an installation
Secure Business Connectivity
26
Remotely Boot Your PC with
Wake-on-LAN
Users and administrators can easily
switch on the shut down desktop PC re-
motely, whenever it is required. This not
only decreases costs, but also ensures
that everything is ready to hand at all
times and whenever it is needed. There-
fore, Wake-on-LAN also works within
the company network (LAN). Moreover,
it is also possible to remotely wake up
your PC via IPsec (not only SSL), if the
Wake-on-LAN relay is installed in the net-
work of the target PC. Various products
comparable to HOBLink JWT cannot do
this. Whether you enjoy this for your own
comfort, the reduced costs or are happy
about the approach to Green IT – it is a
great tool from every side! You and your
users certainly will not want to miss out
on this function any more!
“Access possible
at any time due to
the possibility of
remotely booting
your target PC“
Secure Business Connectivity
27
Client-oriented
Keyboard Mapping
As generally known, Windows and Mac
keyboards differ in some ways: here
the Apple key, there the Windows but-
ton; even the configuration of various
other keys can be different. Due to the
client-oriented keyboard mapping of
HOBLink JWT, the user has a decisive
advantage: the user does not have to re-
member the Windows keyboard setting
when he tries to access the Windows
Terminal Server via a Mac. HOBLink JWT
recognizes which keyboard is present on
the client and maps the corresponding
keyboard. It is therefore possible to work
easily and productively.
“Work with any
desired operating
system“
Secure Business Connectivity
28
No Matter if Righty or Lefty:
Comfortable Working Possible
Working without a mouse – clearly not
imaginable in today’s world! But what if a
left-handed person has to torture them-
selves with a mouse created for righties
or the other way around? No problem
with HOBLink JWT, since the mouse but-
tons can easily be switched!
“Comfortable
working for righ-
ties and lefties “
Secure Business Connectivity
29
HOB Load Balancing for Perfect
Performance and Optimal
Load Balancing
HOBLink JWT even brings along the
load balancing function. This is a Termi-
nal Server load balancing that does not
use a round robin selection. Due to many
variable parameters, it is granularly defi-
ned which server should be connected to
based on its workload. No other product
offers you this kind of variety when it co-
mes to parameters for load balancing that
allow for an optimal use of a server farm.
When server requests are optimally dis-
tributed to the servers, users and IT ad-
ministrators profit. The user has an ext-
remely performant and stable connection
to the server that lets them work produc-
tively. The IT Administrator profits in terms
of servers that run reliably and do fail due
to work overload. Additionally, fewer ser-
vers in conjunction are needed and costs
are effectively reduced.
Secure Business Connectivity
30
Optimized Data Stream
If HOBLink JWT is used together with
an HOB RDP server (HOB MacGate,
VNC-Bridge within the scope of
HOB RD VPN), an optimized data stream
leads to a lower data volume transmissi-
on and data is communicated in an even
faster manner. One of the reasons why
many users rate HOBLink JWT as very
performant and fast! It helps them to get
their workload done quickly.
Assessable Audio Quality
With HOBLink JWT you can deliberately
manage the audio quality to prevent qua-
lity loss if a short malfunction occurs. Au-
dio files are therefore played at a constant
sound quality.
“Audio settings are
manageable for
constant quality“
Secure Business Connectivity
31
Reliable Connection
Management
Thanks to unique features, RDP connec-
tions with HOBLink JWT can be mana-
ged reliably: keepalive on the client side
ensures that connection failures due to
time outs are prevented to the greatest
possible extent. And even if the connec-
tion is disrupted, an automatic reconnect
can take place. Sometimes an automatic
reconnect is inconvenient – for example,
when a long-term server problem is the
cause – in such a case, it is possible to
chose in which way this situation should
be handled (reconnect or cancel). Then
the client will not continually try to re-
connect when it is currently not possible
to do. Moreover, you can choose if the
session directory / session broker should
be activated or deactivated. This feature
serves the purpose, for example, to redi-
rect the client to the old session (session
broker is active) or not (session broker is
deactivated) when reconnecting. Depen-
ding on your objectives, you may want to
use one or the other of these alternatives.
With HOBLink JWT you the freedom of
choice to design your remote access ac-
cording to your needs.
“Reliable connec-
tions without the
risk of data loss in
case of termination“
Secure Business Connectivity
32
Easy Installation
and Configuration
To install and configure HOBLink JWT is
extremely comfortable. Due to its extre-
mely high grade of maturation and the
manifold experiences deriving from lar-
ge installations, the standard configura-
tion of our RDP client HOBLink JWT is
so universal that it covers most scenari-
os successfully right from the beginning.
Only if you have extremely special wishes,
is an intervention in the configuration of
HOBLink JWT needed. And even then
you will realize how much added value a
fully developed system offers you, since
HOBLink JWT will be able to fulfill nearly
every single one of your wishes.
“Easy installation
due to preset stan-
dard configuration“
Secure Business Connectivity
33
At a Glance
Next to functions that you would expect
from an RDP client, HOBLink JWT also
offers you a great variety of additional
functions – for greater security, high ad-
aptability and more comfort. The benefits
of HOBLink JWT range from the perfect
integration into your existing IT infra-
structures to a flexible adaptability for ful-
filling your personal needs. No other RDP
client offers such a huge variety of fine tu-
ning options. Additionally, HOBLink JWT
can be expanded easily and flexibly, due
to its numerous development interfaces
and, it supports the principle of “lean
administration,” since it can be installed
centrally – without having to physically
touch anything on the client side. Another
advantage of HOBLink JWT is the various
printing options that make remote prin-
ting a piece of cake.
Check it out for yourself – with a test
installation free of charge!
You have got nothing to lose, but so
much to gain!
Secure Business Connectivity
34
Picture Sources	
	
•	 Page 6 - Oleksiy Mark
•	 Page 7 - Thinkstock
•	 Page 9 - Thinkstock, Arkadi Bojar
•	 Page 11 - Svitlana Niedielska
•	 Page 12 - Natalia Silych
•	 Page 13 - zhev
•	 Page 14 - pressureUA
•	 Page 15 - Dzianis Kazlouski
•	 Page 16 Thinkstock
•	 Page 17 - Dimitry Ruhklenko
•	 Page 18 - Ingram Publishing
•	 Page 20 - John Takai
•	 Page 21 - Ryan McVay
•	 Page 23 - Stuckey, Jupiterimages
•	 Page 24 - Arkadi Bojar
•	 Page 25 - Thinkstock
•	 Page 26 - Spectral-Design
•	 Page 27 - Apostolos Diamantis
•	 Page 28 - Umberto Pantalone
•	 Page 29 - Yuliyan Velchev
•	 Page 31 - Carlos Gomez
Secure Business Connectivity
35
Interested?
Would you like to check out the numerous
benefits of HOBLink JWT?
Just call us or send us a quick mail!
You are welcome to contact us:
HOB GmbH & Co. KG
Schwadermühlstraße 3
90556 Cadolzburg
Tel: +49 9103 715 0
E-Mail: marketing@hob.de
Webseite: www.hob.de
For more information visit our website
http://hob.de/produkte/connect/jwt.jsp
Information in this document is subject to change without notice
HOB is not liable for any omissions or errors which may be contained in this document.
Product information contained herein is from December 2012.
Any trademarks in this document are the property of their owners.
Text: Sabrina Sturm
Layout: Maximilian Göppner

Contenu connexe

Tendances

PCI and Remote Vendors
PCI and Remote VendorsPCI and Remote Vendors
PCI and Remote VendorsObserveIT
 
Hotpin datasheet
Hotpin datasheetHotpin datasheet
Hotpin datasheetHai Nguyen
 
Sarah CV 2016 External
Sarah CV 2016 ExternalSarah CV 2016 External
Sarah CV 2016 ExternalSarah Thomas
 
Webinar: Extend The Power of The ForgeRock Identity Platform Through Scripting
Webinar: Extend The Power of The ForgeRock Identity Platform Through ScriptingWebinar: Extend The Power of The ForgeRock Identity Platform Through Scripting
Webinar: Extend The Power of The ForgeRock Identity Platform Through ScriptingForgeRock
 
Pg 2 fa_tech_brief
Pg 2 fa_tech_briefPg 2 fa_tech_brief
Pg 2 fa_tech_briefHai Nguyen
 
Oberthur's 2009 CTST presentation on Generic ID-Card Command Set (GICS)
Oberthur's 2009 CTST presentation on Generic ID-Card Command Set (GICS)Oberthur's 2009 CTST presentation on Generic ID-Card Command Set (GICS)
Oberthur's 2009 CTST presentation on Generic ID-Card Command Set (GICS)TrustBearer
 
VMworld 2013: What’s New and Next for VMware Horizon View
VMworld 2013: What’s New and Next for VMware Horizon View VMworld 2013: What’s New and Next for VMware Horizon View
VMworld 2013: What’s New and Next for VMware Horizon View VMworld
 
Hitachi ID Password Manager: Enrollment, password reset and password synchron...
Hitachi ID Password Manager: Enrollment, password reset and password synchron...Hitachi ID Password Manager: Enrollment, password reset and password synchron...
Hitachi ID Password Manager: Enrollment, password reset and password synchron...Hitachi ID Systems, Inc.
 
Incredible Edible Identity
Incredible Edible IdentityIncredible Edible Identity
Incredible Edible IdentityForgeRock
 
2FA OTP Token
2FA OTP Token2FA OTP Token
2FA OTP Token2FA, Inc.
 
Ebc collab portfolio_master
Ebc collab portfolio_masterEbc collab portfolio_master
Ebc collab portfolio_masterdakins090174
 
10 Things You Can Do With CogniDox
10 Things You Can Do With CogniDox10 Things You Can Do With CogniDox
10 Things You Can Do With CogniDoxPaul Walsh
 
Webinar: ForgeRock Identity Platform Preview (Dec 2015)
Webinar: ForgeRock Identity Platform Preview (Dec 2015)Webinar: ForgeRock Identity Platform Preview (Dec 2015)
Webinar: ForgeRock Identity Platform Preview (Dec 2015)ForgeRock
 
OpenID Connect: The new standard for connecting to your Customers, Partners, ...
OpenID Connect: The new standard for connecting to your Customers, Partners, ...OpenID Connect: The new standard for connecting to your Customers, Partners, ...
OpenID Connect: The new standard for connecting to your Customers, Partners, ...Salesforce Developers
 
Cloud Foundry Networking with VMware NSX
Cloud Foundry Networking with VMware NSXCloud Foundry Networking with VMware NSX
Cloud Foundry Networking with VMware NSXVMware Tanzu
 
Declarative security-oes
Declarative security-oesDeclarative security-oes
Declarative security-oesOracleIDM
 
Company Profile Id Sec
Company Profile   Id SecCompany Profile   Id Sec
Company Profile Id SecDedi Ben-Natan
 
Hitachi ID Password Manager (formerly P-Synch): Lower cost, improve service a...
Hitachi ID Password Manager (formerly P-Synch): Lower cost, improve service a...Hitachi ID Password Manager (formerly P-Synch): Lower cost, improve service a...
Hitachi ID Password Manager (formerly P-Synch): Lower cost, improve service a...Hitachi ID Systems, Inc.
 

Tendances (19)

PCI and Remote Vendors
PCI and Remote VendorsPCI and Remote Vendors
PCI and Remote Vendors
 
Hotpin datasheet
Hotpin datasheetHotpin datasheet
Hotpin datasheet
 
Sarah CV 2016 External
Sarah CV 2016 ExternalSarah CV 2016 External
Sarah CV 2016 External
 
Webinar: Extend The Power of The ForgeRock Identity Platform Through Scripting
Webinar: Extend The Power of The ForgeRock Identity Platform Through ScriptingWebinar: Extend The Power of The ForgeRock Identity Platform Through Scripting
Webinar: Extend The Power of The ForgeRock Identity Platform Through Scripting
 
Pg 2 fa_tech_brief
Pg 2 fa_tech_briefPg 2 fa_tech_brief
Pg 2 fa_tech_brief
 
Oberthur's 2009 CTST presentation on Generic ID-Card Command Set (GICS)
Oberthur's 2009 CTST presentation on Generic ID-Card Command Set (GICS)Oberthur's 2009 CTST presentation on Generic ID-Card Command Set (GICS)
Oberthur's 2009 CTST presentation on Generic ID-Card Command Set (GICS)
 
VMworld 2013: What’s New and Next for VMware Horizon View
VMworld 2013: What’s New and Next for VMware Horizon View VMworld 2013: What’s New and Next for VMware Horizon View
VMworld 2013: What’s New and Next for VMware Horizon View
 
Hitachi ID Password Manager: Enrollment, password reset and password synchron...
Hitachi ID Password Manager: Enrollment, password reset and password synchron...Hitachi ID Password Manager: Enrollment, password reset and password synchron...
Hitachi ID Password Manager: Enrollment, password reset and password synchron...
 
Incredible Edible Identity
Incredible Edible IdentityIncredible Edible Identity
Incredible Edible Identity
 
2FA OTP Token
2FA OTP Token2FA OTP Token
2FA OTP Token
 
Ebc collab portfolio_master
Ebc collab portfolio_masterEbc collab portfolio_master
Ebc collab portfolio_master
 
10 Things You Can Do With CogniDox
10 Things You Can Do With CogniDox10 Things You Can Do With CogniDox
10 Things You Can Do With CogniDox
 
Webinar: ForgeRock Identity Platform Preview (Dec 2015)
Webinar: ForgeRock Identity Platform Preview (Dec 2015)Webinar: ForgeRock Identity Platform Preview (Dec 2015)
Webinar: ForgeRock Identity Platform Preview (Dec 2015)
 
Elevator Up Software Licensing Issues Checklist
Elevator Up Software Licensing Issues ChecklistElevator Up Software Licensing Issues Checklist
Elevator Up Software Licensing Issues Checklist
 
OpenID Connect: The new standard for connecting to your Customers, Partners, ...
OpenID Connect: The new standard for connecting to your Customers, Partners, ...OpenID Connect: The new standard for connecting to your Customers, Partners, ...
OpenID Connect: The new standard for connecting to your Customers, Partners, ...
 
Cloud Foundry Networking with VMware NSX
Cloud Foundry Networking with VMware NSXCloud Foundry Networking with VMware NSX
Cloud Foundry Networking with VMware NSX
 
Declarative security-oes
Declarative security-oesDeclarative security-oes
Declarative security-oes
 
Company Profile Id Sec
Company Profile   Id SecCompany Profile   Id Sec
Company Profile Id Sec
 
Hitachi ID Password Manager (formerly P-Synch): Lower cost, improve service a...
Hitachi ID Password Manager (formerly P-Synch): Lower cost, improve service a...Hitachi ID Password Manager (formerly P-Synch): Lower cost, improve service a...
Hitachi ID Password Manager (formerly P-Synch): Lower cost, improve service a...
 

En vedette

Como ganar dinero escribiendo 60 ideas
Como ganar dinero escribiendo   60 ideasComo ganar dinero escribiendo   60 ideas
Como ganar dinero escribiendo 60 ideasBenjamín Román Abram
 
Catalog INNOMOUNT Blaser | Optics Trade
Catalog INNOMOUNT Blaser | Optics TradeCatalog INNOMOUNT Blaser | Optics Trade
Catalog INNOMOUNT Blaser | Optics TradeOptics-Trade
 
Globalization, creative destruction, and labor share change: Evidence on the ...
Globalization, creative destruction, and labor share change: Evidence on the ...Globalization, creative destruction, and labor share change: Evidence on the ...
Globalization, creative destruction, and labor share change: Evidence on the ...Palkansaajien tutkimuslaitos
 
iBeacon Präsentation
iBeacon PräsentationiBeacon Präsentation
iBeacon Präsentationaebischers
 
Tdah en la infancia
Tdah en la infanciaTdah en la infancia
Tdah en la infanciavhdr76
 
Unrelated Cord Blood Transplantation In Adults with Hematological Malignancie...
Unrelated Cord Blood Transplantation In Adults with Hematological Malignancie...Unrelated Cord Blood Transplantation In Adults with Hematological Malignancie...
Unrelated Cord Blood Transplantation In Adults with Hematological Malignancie...cordbloodsymposium
 
Dossier de Prensa Ecuextre y Toro 2014
Dossier de Prensa Ecuextre y Toro 2014Dossier de Prensa Ecuextre y Toro 2014
Dossier de Prensa Ecuextre y Toro 2014FERIA BADAJOZ IFEBA
 
Improvement Kata Flowchart
Improvement Kata FlowchartImprovement Kata Flowchart
Improvement Kata FlowchartMike Rother
 
Planificacion por proyecto
Planificacion por proyectoPlanificacion por proyecto
Planificacion por proyectoaarbaje
 
SecrecióN Ductal
SecrecióN DuctalSecrecióN Ductal
SecrecióN Ductaldidi7
 
K. Eggenstein - El Profeta Lorber anuncia las catástrofes venideras y la aute...
K. Eggenstein - El Profeta Lorber anuncia las catástrofes venideras y la aute...K. Eggenstein - El Profeta Lorber anuncia las catástrofes venideras y la aute...
K. Eggenstein - El Profeta Lorber anuncia las catástrofes venideras y la aute...Simona P
 
Semiotica del comic (the walking dead)
Semiotica del comic (the walking dead)Semiotica del comic (the walking dead)
Semiotica del comic (the walking dead)valentina9222
 
Simplified technical english may, 2014 final
Simplified technical english may, 2014 finalSimplified technical english may, 2014 final
Simplified technical english may, 2014 finalbb2koontz
 
Developing competencies for occupational therapy education and practice
Developing competencies for occupational therapy education and practiceDeveloping competencies for occupational therapy education and practice
Developing competencies for occupational therapy education and practiceErganen
 
Business intelligence uoc alumni
Business intelligence uoc alumniBusiness intelligence uoc alumni
Business intelligence uoc alumniUOC Alumni
 
4 Ways to Build a Metric-Based Sales Coaching Culture
4 Ways to Build a Metric-Based Sales Coaching Culture4 Ways to Build a Metric-Based Sales Coaching Culture
4 Ways to Build a Metric-Based Sales Coaching CultureSales Hacker
 
Reactive Design Patterns: a talk by Typesafe's Dr. Roland Kuhn
Reactive Design Patterns: a talk by Typesafe's Dr. Roland KuhnReactive Design Patterns: a talk by Typesafe's Dr. Roland Kuhn
Reactive Design Patterns: a talk by Typesafe's Dr. Roland KuhnZalando Technology
 

En vedette (20)

Descripción general Detector LR-115
Descripción general Detector LR-115Descripción general Detector LR-115
Descripción general Detector LR-115
 
Digital design 2015 neue und alte entwicklungen - vortrag tourismuscamp 2015
Digital design 2015   neue und alte entwicklungen - vortrag tourismuscamp 2015Digital design 2015   neue und alte entwicklungen - vortrag tourismuscamp 2015
Digital design 2015 neue und alte entwicklungen - vortrag tourismuscamp 2015
 
Analytic case studies: initiatives to increase the use of health services by ...
Analytic case studies: initiatives to increase the use of health services by ...Analytic case studies: initiatives to increase the use of health services by ...
Analytic case studies: initiatives to increase the use of health services by ...
 
Como ganar dinero escribiendo 60 ideas
Como ganar dinero escribiendo   60 ideasComo ganar dinero escribiendo   60 ideas
Como ganar dinero escribiendo 60 ideas
 
Catalog INNOMOUNT Blaser | Optics Trade
Catalog INNOMOUNT Blaser | Optics TradeCatalog INNOMOUNT Blaser | Optics Trade
Catalog INNOMOUNT Blaser | Optics Trade
 
Globalization, creative destruction, and labor share change: Evidence on the ...
Globalization, creative destruction, and labor share change: Evidence on the ...Globalization, creative destruction, and labor share change: Evidence on the ...
Globalization, creative destruction, and labor share change: Evidence on the ...
 
iBeacon Präsentation
iBeacon PräsentationiBeacon Präsentation
iBeacon Präsentation
 
Tdah en la infancia
Tdah en la infanciaTdah en la infancia
Tdah en la infancia
 
Unrelated Cord Blood Transplantation In Adults with Hematological Malignancie...
Unrelated Cord Blood Transplantation In Adults with Hematological Malignancie...Unrelated Cord Blood Transplantation In Adults with Hematological Malignancie...
Unrelated Cord Blood Transplantation In Adults with Hematological Malignancie...
 
Dossier de Prensa Ecuextre y Toro 2014
Dossier de Prensa Ecuextre y Toro 2014Dossier de Prensa Ecuextre y Toro 2014
Dossier de Prensa Ecuextre y Toro 2014
 
Improvement Kata Flowchart
Improvement Kata FlowchartImprovement Kata Flowchart
Improvement Kata Flowchart
 
Planificacion por proyecto
Planificacion por proyectoPlanificacion por proyecto
Planificacion por proyecto
 
SecrecióN Ductal
SecrecióN DuctalSecrecióN Ductal
SecrecióN Ductal
 
K. Eggenstein - El Profeta Lorber anuncia las catástrofes venideras y la aute...
K. Eggenstein - El Profeta Lorber anuncia las catástrofes venideras y la aute...K. Eggenstein - El Profeta Lorber anuncia las catástrofes venideras y la aute...
K. Eggenstein - El Profeta Lorber anuncia las catástrofes venideras y la aute...
 
Semiotica del comic (the walking dead)
Semiotica del comic (the walking dead)Semiotica del comic (the walking dead)
Semiotica del comic (the walking dead)
 
Simplified technical english may, 2014 final
Simplified technical english may, 2014 finalSimplified technical english may, 2014 final
Simplified technical english may, 2014 final
 
Developing competencies for occupational therapy education and practice
Developing competencies for occupational therapy education and practiceDeveloping competencies for occupational therapy education and practice
Developing competencies for occupational therapy education and practice
 
Business intelligence uoc alumni
Business intelligence uoc alumniBusiness intelligence uoc alumni
Business intelligence uoc alumni
 
4 Ways to Build a Metric-Based Sales Coaching Culture
4 Ways to Build a Metric-Based Sales Coaching Culture4 Ways to Build a Metric-Based Sales Coaching Culture
4 Ways to Build a Metric-Based Sales Coaching Culture
 
Reactive Design Patterns: a talk by Typesafe's Dr. Roland Kuhn
Reactive Design Patterns: a talk by Typesafe's Dr. Roland KuhnReactive Design Patterns: a talk by Typesafe's Dr. Roland Kuhn
Reactive Design Patterns: a talk by Typesafe's Dr. Roland Kuhn
 

Similaire à Remote Access to Windows Remote Desktop Servers in a new Dimension

Get a mobile thin client that delivers great unified communications experiences
Get a mobile thin client that delivers great unified communications experiencesGet a mobile thin client that delivers great unified communications experiences
Get a mobile thin client that delivers great unified communications experiencesPrincipled Technologies
 
Hybrid Cloud with IBM Bluemix, Docker and Open Stack
Hybrid Cloud with IBM Bluemix, Docker and Open StackHybrid Cloud with IBM Bluemix, Docker and Open Stack
Hybrid Cloud with IBM Bluemix, Docker and Open Stackgjuljo
 
Accel klantenevent 2016: Awingu
Accel klantenevent 2016: AwinguAccel klantenevent 2016: Awingu
Accel klantenevent 2016: AwinguAccel
 
Virtual Desktop Infrastructure (VDI) Printing
Virtual Desktop Infrastructure (VDI) PrintingVirtual Desktop Infrastructure (VDI) Printing
Virtual Desktop Infrastructure (VDI) PrintingPlus Technologies
 
Bluemix overview - UK WebSphere Integration User Group
Bluemix overview - UK WebSphere Integration User GroupBluemix overview - UK WebSphere Integration User Group
Bluemix overview - UK WebSphere Integration User GroupJon Marshall
 
Rocket BlueZone Datasheet
Rocket BlueZone DatasheetRocket BlueZone Datasheet
Rocket BlueZone DatasheetPM square
 
Presentation v mware horizon vision
Presentation   v mware horizon visionPresentation   v mware horizon vision
Presentation v mware horizon visionsolarisyougood
 
OPEN SOURCE TECHNOLOGY: Docker Containers on IBM Bluemix
OPEN SOURCE TECHNOLOGY: Docker Containers on IBM BluemixOPEN SOURCE TECHNOLOGY: Docker Containers on IBM Bluemix
OPEN SOURCE TECHNOLOGY: Docker Containers on IBM BluemixDA SILVA, MBA
 
Firewall friendly pipeline for secure data access
Firewall friendly pipeline for secure data accessFirewall friendly pipeline for secure data access
Firewall friendly pipeline for secure data accessSumit Sarkar
 
Con8836 leveraging the cloud to simplify your identity management implement...
Con8836   leveraging the cloud to simplify your identity management implement...Con8836   leveraging the cloud to simplify your identity management implement...
Con8836 leveraging the cloud to simplify your identity management implement...OracleIDM
 
Hosted Virtual Desktops and Streamed Applications
Hosted Virtual Desktops and Streamed ApplicationsHosted Virtual Desktops and Streamed Applications
Hosted Virtual Desktops and Streamed ApplicationsPete Valentine
 
Ibm sametime 9 for social communications
Ibm sametime 9 for social communicationsIbm sametime 9 for social communications
Ibm sametime 9 for social communicationsa8us
 
We4IT lcty 2013 - captain mobility - mobile domino applications offline capab...
We4IT lcty 2013 - captain mobility - mobile domino applications offline capab...We4IT lcty 2013 - captain mobility - mobile domino applications offline capab...
We4IT lcty 2013 - captain mobility - mobile domino applications offline capab...We4IT Group
 
Headquartered at home community publication nx n pakistan
Headquartered at home   community publication nx n pakistanHeadquartered at home   community publication nx n pakistan
Headquartered at home community publication nx n pakistanTariq Mustafa
 
Standing apart in the cloud
Standing apart in the cloudStanding apart in the cloud
Standing apart in the cloudLeah Shergold
 
Soa12c launch 1 overview cr
Soa12c launch 1 overview crSoa12c launch 1 overview cr
Soa12c launch 1 overview crVasily Demin
 
Bus Tour Windows 7 Deck (Full)
Bus Tour   Windows 7 Deck (Full)Bus Tour   Windows 7 Deck (Full)
Bus Tour Windows 7 Deck (Full)Stephen L Rose
 

Similaire à Remote Access to Windows Remote Desktop Servers in a new Dimension (20)

Get a mobile thin client that delivers great unified communications experiences
Get a mobile thin client that delivers great unified communications experiencesGet a mobile thin client that delivers great unified communications experiences
Get a mobile thin client that delivers great unified communications experiences
 
Single Sign On 101
Single Sign On 101Single Sign On 101
Single Sign On 101
 
Hybrid Cloud with IBM Bluemix, Docker and Open Stack
Hybrid Cloud with IBM Bluemix, Docker and Open StackHybrid Cloud with IBM Bluemix, Docker and Open Stack
Hybrid Cloud with IBM Bluemix, Docker and Open Stack
 
Accel klantenevent 2016: Awingu
Accel klantenevent 2016: AwinguAccel klantenevent 2016: Awingu
Accel klantenevent 2016: Awingu
 
Virtual Desktop Infrastructure (VDI) Printing
Virtual Desktop Infrastructure (VDI) PrintingVirtual Desktop Infrastructure (VDI) Printing
Virtual Desktop Infrastructure (VDI) Printing
 
Bluemix overview - UK WebSphere Integration User Group
Bluemix overview - UK WebSphere Integration User GroupBluemix overview - UK WebSphere Integration User Group
Bluemix overview - UK WebSphere Integration User Group
 
Rocket BlueZone Datasheet
Rocket BlueZone DatasheetRocket BlueZone Datasheet
Rocket BlueZone Datasheet
 
Presentation v mware horizon vision
Presentation   v mware horizon visionPresentation   v mware horizon vision
Presentation v mware horizon vision
 
OPEN SOURCE TECHNOLOGY: Docker Containers on IBM Bluemix
OPEN SOURCE TECHNOLOGY: Docker Containers on IBM BluemixOPEN SOURCE TECHNOLOGY: Docker Containers on IBM Bluemix
OPEN SOURCE TECHNOLOGY: Docker Containers on IBM Bluemix
 
Firewall friendly pipeline for secure data access
Firewall friendly pipeline for secure data accessFirewall friendly pipeline for secure data access
Firewall friendly pipeline for secure data access
 
Con8836 leveraging the cloud to simplify your identity management implement...
Con8836   leveraging the cloud to simplify your identity management implement...Con8836   leveraging the cloud to simplify your identity management implement...
Con8836 leveraging the cloud to simplify your identity management implement...
 
Hosted Virtual Desktops and Streamed Applications
Hosted Virtual Desktops and Streamed ApplicationsHosted Virtual Desktops and Streamed Applications
Hosted Virtual Desktops and Streamed Applications
 
Ibm sametime 9 for social communications
Ibm sametime 9 for social communicationsIbm sametime 9 for social communications
Ibm sametime 9 for social communications
 
We4IT lcty 2013 - captain mobility - mobile domino applications offline capab...
We4IT lcty 2013 - captain mobility - mobile domino applications offline capab...We4IT lcty 2013 - captain mobility - mobile domino applications offline capab...
We4IT lcty 2013 - captain mobility - mobile domino applications offline capab...
 
Headquartered at home community publication nx n pakistan
Headquartered at home   community publication nx n pakistanHeadquartered at home   community publication nx n pakistan
Headquartered at home community publication nx n pakistan
 
Standing apart in the cloud
Standing apart in the cloudStanding apart in the cloud
Standing apart in the cloud
 
Standing apart in the cloud
Standing apart in the cloudStanding apart in the cloud
Standing apart in the cloud
 
Soa12c launch 1 overview cr
Soa12c launch 1 overview crSoa12c launch 1 overview cr
Soa12c launch 1 overview cr
 
Bsm mw10
Bsm mw10Bsm mw10
Bsm mw10
 
Bus Tour Windows 7 Deck (Full)
Bus Tour   Windows 7 Deck (Full)Bus Tour   Windows 7 Deck (Full)
Bus Tour Windows 7 Deck (Full)
 

Dernier

Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DaySri Ambati
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 

Dernier (20)

E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 

Remote Access to Windows Remote Desktop Servers in a new Dimension

  • 1. HOB GmbH & Co. KG 21.08.2012 HOBLink JWT - the Diamond among the RDP-Clients Remote Access Remote Access to Windows Remote Desktop Servers in a new Dimension!
  • 2. Secure Business Connectivity 2 HOBLink JWT 04 Overview   06 Benefits in a Nutshell 07 HOBLink JWT is Special 08 HOBLink JWT Scores in Terms of Security 09 Management of Rights with a Local Parameter-Cache 10 Partial Local Drive Mapping (LDM) 11 Virus Scan with Local Drive Mapping 11 SOCKS-Proxy Tunneling 12 A Single Password for All Systems with Single Sign-On 12 Trust in Modern Java-Technology 14 Controlling the RDP Security Mode 15 Configuration of Individual Client Names 15 HOBLink JWT Exceeds in Terms of Adaptability 16 Integration into your own Website 18 Branding: Look & Feel According to Your own Corporate Identity 19 Individual Configuration of Keypads and Hot Keys 19 Configuration possible for any Printer and Printer Name 20
  • 3. Secure Business Connectivity 3 It can be Done without a Server Component 21 Universally Employable with all Platforms 22 Add-on: Access to Mac 22 HOBLink JWT: Great Comfort for Users and Administrators 23 Event Handling can be Implemented in Java-Script 24 Use Virtual Channel APIs with Java 25 Remotely Boot your PC with Wake-on-LAN 26 Client-oriented Keyboard Mapping 27 No Matter if Righty or Lefty: Comfortable Working possible 28 HOB Load Balancing for Perfect Performance and Optimal Load-Balancing 29 Optimized Data Stream 30 Assessable Audio Quality 30 Reliable Connection Management 31 Easy Installation and Configuration 32 Picture sources 33 At a Glance 34 Interested? 35
  • 4. Secure Business Connectivity 4 HOBLink JWT HOBLink JWT is an HOB-developed RDP client for flexible remote access to Windows Remote Desktop Servers (for- merly known as Windows Terminal Ser- vers). This makes HOBLink JWT a dia- mond among the RDP clients. Why? Well, HOBLink JWT has the greatest and largest amount of options and features that are available for RDP clients. From the RDP rough diamond, HOB has de- veloped the most polished RDP client in the world. Sounds unbelievable? Not at all – learn what is so special about HOBLink JWT and why this RDP cli- ent is the jewel among the RDP clients on the following pages. HOBLink JWT offers you various additional functions that other RDP clients simply can-not. It presents highly precise configuration options for an exact adaption to indivi- dual needs that greatly exceed what is usually available. Furthermore, for years, HOBLink JWT has been constantly further developed for improved perfor- mance. In close consulta-tion with our customers, we develop extraordinary and excellent solutions to suit your needs and solve your problems. Therefore, you
  • 5. Secure Business Connectivity 5 receive a perfected, hardened and opti- mally functioning RDP client that is de- veloped with attention to the smallest detail and is tailored to the needs of our customers. There is a reason why large companies trust us and have successfully deployed HOBLink JWT for many years with thousands of licenses. Especially for companies that have to work with high- ly sensitive data, such as banks and in- surance companies, HOBLink JWT has proven itself to be easy to use, custom- configurable and nonetheless highly se- cure and extremely performant. Illustration: What you can access with HOBLink JWT
  • 6. Secure Business Connectivity 6 Overview HOBLink JWT is an extraordinary soluti- on for web-based RDP access to Win- dows servers, VDI and desktop systems. With it, you can access centrally ins- talled Windows-, UNIX-, Linux- and Mac OS- applications from any Java-capable platform. As a result, embrace all the benefits of a web-based, server-based computing solution. HOBLink JWT offers multiple additional benefits that impro- ve the installation, usability and security. HOBLink JWT is easy to integrate into preexisting infrastructures. It can also be integrated into third-party environments, such as thin clients, appliances and cloud portals. Use HOBLink JWT, combined with modern security mechanisms, to ac- cess your applications in a local network or worldwide. Full support of modern au- thentication and encryption technologies allows customers and users to stay on the safe side.
  • 7. Secure Business Connectivity 7 Benefits in a Nutshell • Maximum amount of possibilities to configure and personalize for greater flexibility • No software-installation and administration rights needed on the clientside • Individual solution, independent of the operating system being used • Desktop systems can also be accessed • Optimal utilization of the existing network infrastructure • Scalable in any desired way, be- cause it is solely software-based
  • 8. Secure Business Connectivity 8 HOBLink JWT is Special Comparing HOBLink JWT to other, simi- lar products, one thing becomes clear very easily: HOBLink JWT offers you more than “just” RDP. Convince yourself – on the fol- lowing pages or with the help of a free test-installation! As is notable in the scenario areas abo- ve – security, adaptability and comfort – HOBLink JWT presents itself as the jewel among the RDP-clients. Neither user nor IT controllers could turn this down. “HOBLink JWT offers you more than“just”RDP“
  • 9. Secure Business Connectivity 9 HOBLink JWT Scores in Terms of Security
  • 10. Secure Business Connectivity 10 employee has in a remote session can be decided according to the functions they have in the company and the level of trust they have acquired. Implemen- tation of highly granular security policies is thus ensured. Every parameter of the HOBLink JWT settings can be opened, blocked or provided with a certain selec- tion. Likewise, local drive mapping (local drives are also available in the remote session) can be made highly flexible in HOBLink JWT. HOBLink JWT contains various out- standing security features which cannot be found in the solutions of other provi- ders. If HOBLink JWT is combined with HOB RD VPN or HOB RD ES, an even greater number of security features are available. Management of Rights with a Local Parameter Cache HOBLink JWT allows individual user-rights settings for remote access and while wor- king in a remote session. The rights an “Precise definition and management of rules - full con- trol for the IT- administratior“
  • 11. Secure Business Connectivity 11 Partial Local Drive Mapping (LDM) While “standard products” can only map whole drives, HOBLink JWT allows for precise settings as to which drives, direc- tories or sub-directories can be mapped. Access rights can therefore be mapped with greater individuality according to the security guidelines of a company. Unau- thorized access to critical data can hence be eliminated. Virus Scan with Local Drive Mapping If HOBLink JWT is used in combination with HOB Remote Desktop Enhanced Services (HOB RD ES) or HOB Remote Desktop VPN (HOB RD VPN), it is also possible to scan data for viruses before they even find their way to the company server. This, as a matter of fact, increases security and protects the company net- work from viruses, Trojans and the like. “You decide, if and which local drives are available in the remote session!“
  • 12. Secure Business Connectivity 12 SOCKS-Proxy Tunneling This feature allows you to easily decide which way the client takes to leave the network, for example via SOCKS or HTTP. With HOBLink JWT this is quite easy; with other manufacturers, additional products would need to be purchased. . A Single Password for All Systems with Single Sign-On HOBLink JWT is completely compatible with the RDP Single Sign-On solution. Thus the IT administrator is able to kill two birds with one stone: on one hand the security level is increased significantly and on the other hand the administrative effort is greatly reduced. Even though the topic “Single Sign-On“ is often discussed controversially, experts agree: executed correctly, SSO-solutions yield a big plus in security for companies. “Single Sign-On for safer pass- words and less ad- ministrative effort“
  • 13. Secure Business Connectivity 13 Single Sign-On solutions allow access to all services and applications with just one log-in (one-time user log-in), as long as the user has the general authorization for the access. After this one-time authenti- cation, the SSO solution takes over the task of authenticating the user at other services or applications. A separate user- name or password is therefore not nee- ded. Hence, the user only has to remem- ber one password, which can then be a more complex one. In addition to this, help desks costs are decreased because users would rarely forget their password anymore and would have fewer problems when going through the authentication process. You can find detailed information with a description of the benefits and risks about this topic in our blog article “Single Sign-On”:
  • 14. Secure Business Connectivity 14 Trust in Modern Java-Technology While other RDP-clients, for example the Microsoft Client, use Active X Techno- logy, HOBLink JWT employs Java. On one hand, you will achieve greater secu- rity, since Java runs – contrary to Active X – on all operating systems; Active X is only available for Windows interfaces at the moment. Another benefit is that Java is considered to be more secure than Active X – and not only because of its sandbox characteristics. “Long-time tested and universally usable Java tech- nology - secure and flexible“
  • 15. Secure Business Connectivity 15 Configuration of Individual Client Names You can define an individual name for each client, so that the client can be iden- tified on the server with absolute certainty. Should security offences or conspicuous behavior occur, you will know for sure which user might have disregarded the policies – without having to search in the dark. It is especially important to know immediately when an extreme security- critical incident has occurred in order to react immediately. Controlling the RDP Security Mode With HOBLink JWT, you decide which RDP security modes are to be used. This means, you can even define an in- dividual sequence, so that unsuccessful connection attempts due to unsuppor- ted RDP security modes on the server side can be prevented. All in all, an in- dividual definition of the security modes and their order leads to highly improved time management.
  • 16. Secure Business Connectivity 16 HOBLink JWT Exceeds in Terms of Adaptability
  • 17. Secure Business Connectivity 17 HOBLink JWT can easily be integrated into existing IT structures and, therefo- re, can be employed on a long-term ba- sis – even if processes or conditions in the company are changing. Moreover, HOBLink JWT can be adapted to your particular needs. Just see for yourself in the following chapter. “High adaptability due to numerous parameters“
  • 18. Secure Business Connectivity 18 Integration into Your Own Website You have the option to incorporate HOBLink JWT into your company web- site, customer portals or your very own intranet page. Sounds kind of banal, but this offers the benefit that employees are provided with a central point of entry and do not have to start HOBLink JWT over a dedicated web address. Also, integra- tion helps in-house acceptance, because intranet content is often perceived as res- pectable and “true” (an inspection of this content by colleagues and by the editorial staff is assumed). “Integration into your own website - central point of entry for all users“
  • 19. Secure Business Connectivity 19 Branding: Look & Feel According to Your Own Corporate Identity Many elements of HOBLink JWT, for ex- ample, the starting dialogue, the window title text or even banners can be adapted to your corporate identity. The look and feel of HOBLink JWT therefore even de- picts your company graphically. The ad- vantage: users are less distracted and are able to find their way around more easily. Especially with larger numbers of users or user groups, this is a big plus. Moreover, you can individually deter-mine the size of your window – full screen, just a certain percentage of the desktop, or a fixed size (flexible windows mode). Individual Configuration of Keypads and Hot Keys So called “hot keys,” meaning defined key combinations, for example <ALT> + <TAB> can be reconfigured (for spe- cial functions), offering extreme flexibi- lity in accordance to your needs. With other clients, these are universally pre- set and cannot be changed. In cont- rast: with HOBLink JWT you can easi- ly manage cascading sessions – with other products, this often becomes an insurmountable hurdle! “Configuration of environment vari- ables according to your wishes “
  • 20. Secure Business Connectivity 20 Configuration Possible for Any Printer and Printer Name HOBLink JWT allows you to configure every printer individually; such a granular selection cannot be found within other products. The following statement says it best: “all or nothing.” However, you can map, for example, only the standard prin- ter or virtual printers only, just as you like, with the help of HOBLink JWT. Due to the integrated Easy-Print function, emplo- yees are able to get their print job done right away, no matter which drivers are in- stalled on the server. Fast printing or ma- naging complex print jobs therefore po- ses no problem to the users any longer. “Configure printers individually for fast and easy printing “
  • 21. Secure Business Connectivity 21 Moreover, the printer name within the session can be generated per pattern. Meaning: you can define any random text for the printer, so that the user is more easily able to identify exactly the different printers (for example printer accounting instead of HP2012ON). It Can Be Done Without a Server Component HOBLink JWT can also be used without the server component of HOB, if the functions of the HOB server component HOB RD ES are not needed – a simp- le web browser is enough for the use of HOBLink JWT. You are even more flexible in terms of your process design. . “HOBLink JWT even runs without the HOB server component“
  • 22. Secure Business Connectivity 22 Universally Employable with all Platforms A crucial advantage of HOBLink JWT: regardless from which operating system you would like to access another, whe- ther you have Windows, Mac or even Unix/Linux operating systems in use – HOBLink JWT is compatible with all of them. While other products can only be used with either one or the other opera- ting system, with HOBLink JWT you recei- ve a completely universal RDP client that is able to support all popular operating systems. This proves to be particularly valuable in heterogeneous environments where many diverse operating systems are used in parallel at the same time. Add-on: Access to Mac If access to Macs is also needed, the perfect add-on for you would be, for ex- ample, HOB MacGate: the perfect com- plement to HOBLink JWT. The user then can comfortably start a HOBLink JWT session and access all applications and data on their Mac. “Compatible to all common operating systems for greater freedom to design“
  • 23. Secure Business Connectivity 23 HOBLink JWT: Great Comfort for Users and Administrators
  • 24. Secure Business Connectivity 24 Event Handling Can Be Implemented in Java-Script Certainly you know the following scenario: Your colleague calls, because some ran- dom cryptic message popped up on his screen. This will now cost you time – you will have to find out what kind of message this is, to only afterward tell your colleague to just ignore it. You could have used your time for more important things. This is the reason why HOBLink JWT allows you to precisely configure how to handle er- ror reports (can be implemented in Java script). Therefore, it is possible that error reports are ignored, errors are hidden or managed differently. If you have to mana- ge big installations with many users, this comes quite in handy. And even the user is happy: no irritation due to cryptic mes- sages any longer! Additionally, this allows you to adapt HOBLink JWT to your per- sonal requirements one step further. “Easier handling for administrators and users“
  • 25. Secure Business Connectivity 25 in advance is unnecessary. The benefit: even local devices, for example, dictating machines or microphones, can be used over the Windows Terminal Server sessi- on. Environment variables can be used to configure the virtual channel modules as needed. Use Virtual Channel APIs with Java With HOBLink JWT, virtual channel APIs can even be used from the client side via Java. To be more precise, the needed program libraries (.dll) do not have to be installed on every client, but can be cen- trally deposited on the server, once. Not only is the principle of “zero touch” clients therefore supported, but it also increases security and helps with central manage- ment. You will see: it will reduce a great deal of your workload if not every client has to be physically touched! And also the download of the program libraries for virtual channels is done by HOBLink JWT for the user; an installation
  • 26. Secure Business Connectivity 26 Remotely Boot Your PC with Wake-on-LAN Users and administrators can easily switch on the shut down desktop PC re- motely, whenever it is required. This not only decreases costs, but also ensures that everything is ready to hand at all times and whenever it is needed. There- fore, Wake-on-LAN also works within the company network (LAN). Moreover, it is also possible to remotely wake up your PC via IPsec (not only SSL), if the Wake-on-LAN relay is installed in the net- work of the target PC. Various products comparable to HOBLink JWT cannot do this. Whether you enjoy this for your own comfort, the reduced costs or are happy about the approach to Green IT – it is a great tool from every side! You and your users certainly will not want to miss out on this function any more! “Access possible at any time due to the possibility of remotely booting your target PC“
  • 27. Secure Business Connectivity 27 Client-oriented Keyboard Mapping As generally known, Windows and Mac keyboards differ in some ways: here the Apple key, there the Windows but- ton; even the configuration of various other keys can be different. Due to the client-oriented keyboard mapping of HOBLink JWT, the user has a decisive advantage: the user does not have to re- member the Windows keyboard setting when he tries to access the Windows Terminal Server via a Mac. HOBLink JWT recognizes which keyboard is present on the client and maps the corresponding keyboard. It is therefore possible to work easily and productively. “Work with any desired operating system“
  • 28. Secure Business Connectivity 28 No Matter if Righty or Lefty: Comfortable Working Possible Working without a mouse – clearly not imaginable in today’s world! But what if a left-handed person has to torture them- selves with a mouse created for righties or the other way around? No problem with HOBLink JWT, since the mouse but- tons can easily be switched! “Comfortable working for righ- ties and lefties “
  • 29. Secure Business Connectivity 29 HOB Load Balancing for Perfect Performance and Optimal Load Balancing HOBLink JWT even brings along the load balancing function. This is a Termi- nal Server load balancing that does not use a round robin selection. Due to many variable parameters, it is granularly defi- ned which server should be connected to based on its workload. No other product offers you this kind of variety when it co- mes to parameters for load balancing that allow for an optimal use of a server farm. When server requests are optimally dis- tributed to the servers, users and IT ad- ministrators profit. The user has an ext- remely performant and stable connection to the server that lets them work produc- tively. The IT Administrator profits in terms of servers that run reliably and do fail due to work overload. Additionally, fewer ser- vers in conjunction are needed and costs are effectively reduced.
  • 30. Secure Business Connectivity 30 Optimized Data Stream If HOBLink JWT is used together with an HOB RDP server (HOB MacGate, VNC-Bridge within the scope of HOB RD VPN), an optimized data stream leads to a lower data volume transmissi- on and data is communicated in an even faster manner. One of the reasons why many users rate HOBLink JWT as very performant and fast! It helps them to get their workload done quickly. Assessable Audio Quality With HOBLink JWT you can deliberately manage the audio quality to prevent qua- lity loss if a short malfunction occurs. Au- dio files are therefore played at a constant sound quality. “Audio settings are manageable for constant quality“
  • 31. Secure Business Connectivity 31 Reliable Connection Management Thanks to unique features, RDP connec- tions with HOBLink JWT can be mana- ged reliably: keepalive on the client side ensures that connection failures due to time outs are prevented to the greatest possible extent. And even if the connec- tion is disrupted, an automatic reconnect can take place. Sometimes an automatic reconnect is inconvenient – for example, when a long-term server problem is the cause – in such a case, it is possible to chose in which way this situation should be handled (reconnect or cancel). Then the client will not continually try to re- connect when it is currently not possible to do. Moreover, you can choose if the session directory / session broker should be activated or deactivated. This feature serves the purpose, for example, to redi- rect the client to the old session (session broker is active) or not (session broker is deactivated) when reconnecting. Depen- ding on your objectives, you may want to use one or the other of these alternatives. With HOBLink JWT you the freedom of choice to design your remote access ac- cording to your needs. “Reliable connec- tions without the risk of data loss in case of termination“
  • 32. Secure Business Connectivity 32 Easy Installation and Configuration To install and configure HOBLink JWT is extremely comfortable. Due to its extre- mely high grade of maturation and the manifold experiences deriving from lar- ge installations, the standard configura- tion of our RDP client HOBLink JWT is so universal that it covers most scenari- os successfully right from the beginning. Only if you have extremely special wishes, is an intervention in the configuration of HOBLink JWT needed. And even then you will realize how much added value a fully developed system offers you, since HOBLink JWT will be able to fulfill nearly every single one of your wishes. “Easy installation due to preset stan- dard configuration“
  • 33. Secure Business Connectivity 33 At a Glance Next to functions that you would expect from an RDP client, HOBLink JWT also offers you a great variety of additional functions – for greater security, high ad- aptability and more comfort. The benefits of HOBLink JWT range from the perfect integration into your existing IT infra- structures to a flexible adaptability for ful- filling your personal needs. No other RDP client offers such a huge variety of fine tu- ning options. Additionally, HOBLink JWT can be expanded easily and flexibly, due to its numerous development interfaces and, it supports the principle of “lean administration,” since it can be installed centrally – without having to physically touch anything on the client side. Another advantage of HOBLink JWT is the various printing options that make remote prin- ting a piece of cake. Check it out for yourself – with a test installation free of charge! You have got nothing to lose, but so much to gain!
  • 34. Secure Business Connectivity 34 Picture Sources • Page 6 - Oleksiy Mark • Page 7 - Thinkstock • Page 9 - Thinkstock, Arkadi Bojar • Page 11 - Svitlana Niedielska • Page 12 - Natalia Silych • Page 13 - zhev • Page 14 - pressureUA • Page 15 - Dzianis Kazlouski • Page 16 Thinkstock • Page 17 - Dimitry Ruhklenko • Page 18 - Ingram Publishing • Page 20 - John Takai • Page 21 - Ryan McVay • Page 23 - Stuckey, Jupiterimages • Page 24 - Arkadi Bojar • Page 25 - Thinkstock • Page 26 - Spectral-Design • Page 27 - Apostolos Diamantis • Page 28 - Umberto Pantalone • Page 29 - Yuliyan Velchev • Page 31 - Carlos Gomez
  • 35. Secure Business Connectivity 35 Interested? Would you like to check out the numerous benefits of HOBLink JWT? Just call us or send us a quick mail! You are welcome to contact us: HOB GmbH & Co. KG Schwadermühlstraße 3 90556 Cadolzburg Tel: +49 9103 715 0 E-Mail: marketing@hob.de Webseite: www.hob.de For more information visit our website http://hob.de/produkte/connect/jwt.jsp Information in this document is subject to change without notice HOB is not liable for any omissions or errors which may be contained in this document. Product information contained herein is from December 2012. Any trademarks in this document are the property of their owners. Text: Sabrina Sturm Layout: Maximilian Göppner