Select a Webcast

June 19, 2018
11:00AM - 1:00PM ET


Computer Science

Course Description

A growing number of employees want to be able to work from anywhere, anytime, and on any device. This is one of the marketing messages of public cloud hosting providers, but internal networks can provide the same style of remote access by using Citrix, virtual desktop infrastructure, or remote desktop services. In this session, you'll learn the techniques that will give your users the best experience utilizing technology you currently have and find out what you should consider for future upgrades.


K2 Enterprises (Randolph P. (Randy) Johnston, MCS)

Randy Johnston is a nationally recognized educator, consultant, and writer with over 30 years’ experience in strategic technology planning, accounting software selection, paperless systems, systems and network integration, business continuity and disaster recovery planning, business development and management, process engineering and outsourced managed services. A consultant for high profile technology vendors, Randy delivers national seminars to CPAs, business groups, and IT leaders on technologies in accounting, healthcare, and banking. He also creates articles on over 30 technology topics including CPA firm technology, cloud technology, business continuity, accounting software, and business strategies leveraging technology. Accounting Today listed Randy as one of its Top 100 Most Influential People from 2004–2015. In 2011, CPA Practice Advisor acknowledged Randy in the Accounting Hall of Fame and as a Top 25 Thought Leader from 2011–2016. For the past 29 years, Randy has been a featured speaker at the AICPA Technology Conference. In addition to these recognitions, Who’s Who in Business & Industry has acknowledged Randy as a leading business and computing professional.

Course Specifics

Computer Science
Feb 2, 2016

Compliance Information

Qualifies for CA Fraud: No

Learning Objectives

Upon successful completion of this course, participants will be able to:

  • List key considerations when configuring Citrix, VDI, or RDS
  • Identify how to implement procedures to secure mobile devices
  • Identify how to secure your network edge from potential threats associated with remote access

Back to top