Search Results for “zero-trust” – Citrix Blogs https://www.citrix.com/blogs Official Citrix Blogs Thu, 10 Jul 2025 13:49:50 +0000 en-US hourly 1 https://wordpress.org/?v=6.8.1 Secure your business with Citrix and Google Chrome Enterprise Premium https://www.citrix.com/blogs/2025/06/17/secure-your-business-with-citrix-and-google-chrome-enterprise-premium/ Tue, 17 Jun 2025 13:00:36 +0000 https://www.citrix.com/blogs/?p=174261938

In today’s hybrid work environment, your team needs flexible, secure access to the applications that keep your business running. Earlier this year, we announced a deepened partnership with Google to help your business achieve that goal. And now we are

]]>

In today’s hybrid work environment, your team needs flexible, secure access to the applications that keep your business running. Earlier this year, we announced a deepened partnership with Google to help your business achieve that goal. And now we are

]]>
What if your CEO never sends the AI-first memo? https://www.citrix.com/blogs/2025/05/28/what-if-your-ceo-never-sends-the-ai-first-memo/ Wed, 28 May 2025 13:10:55 +0000 https://www.citrix.com/blogs/?p=174261929

What if the only thing scarier than your CEO sending out the “we’re now an AI-first company” memo is if they don’t?

In recent weeks, we’ve seen a wave of top-down declarations from CEOs saying they’re pivoting to become “AI-first.”

]]>

What if the only thing scarier than your CEO sending out the “we’re now an AI-first company” memo is if they don’t?

In recent weeks, we’ve seen a wave of top-down declarations from CEOs saying they’re pivoting to become “AI-first.”

]]>
Citrix and NVIDIA partner to deliver AI Virtual Workstations https://www.citrix.com/blogs/2025/03/19/citrix-and-nvidia-partner-to-deliver-ai-virtual-workstations/ Wed, 19 Mar 2025 08:00:01 +0000 https://www.citrix.com/blogs/?p=174261742

As we head into the second half of our week at Citrix UNITE, our annual sales kickoff event happening in New Orleans, LA, the good times keep rolling and so do the exciting announcements. Following yesterday’s news, today we

]]>

As we head into the second half of our week at Citrix UNITE, our annual sales kickoff event happening in New Orleans, LA, the good times keep rolling and so do the exciting announcements. Following yesterday’s news, today we

]]>
Join us at Microsoft Ignite – Citrix innovations for the modern workplace https://www.citrix.com/blogs/2024/11/19/join-us-at-microsoft-ignite-citrix-innovations-for-the-modern-workplace/ Wed, 20 Nov 2024 02:59:43 +0000 https://www.citrix.com/blogs/?p=174261563

Join us at Microsoft Ignite in Chicago November 19-21, and meet with experts to understand how we are working towards solving your IT challenges and creating better solutions for your ever-changing workforce.

Citrix and Microsoft have been transforming how people

]]>

Join us at Microsoft Ignite in Chicago November 19-21, and meet with experts to understand how we are working towards solving your IT challenges and creating better solutions for your ever-changing workforce.

Citrix and Microsoft have been transforming how people

]]>
Citrix Secure Private Access now supports multi-session VDI https://www.citrix.com/blogs/2024/11/19/citrix-secure-private-access-now-supports-multi-session-vdi/ Tue, 19 Nov 2024 13:07:26 +0000 https://www.citrix.com/blogs/?p=174261582

Today, we’re excited to announce the launch of Citrix Secure Private Access for multi-session virtual desktop infrastructure (VDI), a comprehensive solution designed to protect user privacy and data while ensuring seamless and secure remote access for all users regardless of

]]>

Today, we’re excited to announce the launch of Citrix Secure Private Access for multi-session virtual desktop infrastructure (VDI), a comprehensive solution designed to protect user privacy and data while ensuring seamless and secure remote access for all users regardless of

]]>
金融機関に対するサイバーセキュリティ https://www.citrix.com/blogs/2024/08/30/cybersecurity-financial-services/ Fri, 30 Aug 2024 11:17:37 +0000 https://www.citrix.com/blogs/?p=174261405

サイバー犯罪はあらゆる業界で増加傾向にあり、企業は新たなセキュリティ対策の導入を迫られています。現在、データ侵害の世界平均コストは約445万ドルであり、当然ながら多くの企業は新たなセキュリティソリューションに投資しています。これは特に金融機関に当てはまります。その理由は、セキュリティ侵害はコストがかかるだけでなく、顧客の信頼を失い、組織の評判にも悪影響を及ぼすからです。

驚くべきことではなく、銀行や投資会社がリスク低減とレジリエンス強化に投資していることは、明らかです。Gartner 2023 CIO and Technology Executive Surveyによると、これらの企業のCIOは2023年に、サイバーセキュリティ、データとアナリティクス、統合テクノロジー、クラウド、に最も多くの新規または追加資金を使うとしていました。しかしながら、セキュリティを強化しても、従業員がそのセキュリティ対策に従わなければ何の意味もありません。別のGartner surveyでは、自分自身やチームのビジネス目標達成を優先すれば、従業員の74%がサイバーセキュリティのガイダンスに従わないと回答しました。金融機関は、強固なセキュリティを備えた柔軟性高いデジタル戦略を採用し、データを侵害から保護すると同時に、重要なシステムへのセキュアでコンプライアンス準拠のリモートアクセスを可能にしなければなりません。これがシステムのサイロ化をなくし、顧客価値の向上につながります。

サイバー脅威の増大

データ侵害のコストは年々増加しているだけでなく、サイバー攻撃の件数も増加傾向にあります。米国国土安全保障省によると、2020年から2022年にかけて米国ではランサムウェア攻撃が47%増加し、2023年上半期にはランサムウェア攻撃の被害額が世界中で4億4,910万ドルに上ったそうです。つまり、ランサムウェア攻撃は順調に拡大し、過去最高の利益を記録することが確実なのです

加えて、大きな組織を狙う手口が目立つようになり大手金融機関は悪意を持った者たちの標的となっています。こうした脅威に先手を打つために、金融機関は脅威検知に向けたAI、生体認証、ブロックチェーンといった高度な防御策を導入する必要があります。技術が進歩するにつれ、サイバー脅威の高度化も進んでおり、銀行は多層的なセキュリティ戦略を採用し、量子コンピューティングのような未来の手法も考慮する必要に迫られています。

シトリックスは幅広い多要素認証製品と連携可能です。最適なIDプロバイダー(IdP)を使用して、お客様のビジネスデータを保護します。さらにNetScalerが、API保護、DDoS保護、ボット攻撃緩和のためのセキュアなアプリケーション配信を強化します。

リスク管理、規制、コンプライアンス 

金融機関はデータを保護するために多大な努力を積み重ねていますが、国や地域の規制に対処しなければなりません。リスク管理と規制コンプライアンスは金融機関にとって常にある課題です。、ユーザー体験とセキュリティを高める可能性がある一方で、厳格な規制遵守に関する機能を持たない新技術の導入には注意が必要です。例えばCapital Oneは、2019年に発生した大規模な顧客データ漏洩に関して、厳重なサイバーセキュリティ対策を実施しなかったとして、1億9,000万ドルの和解金

]]>

サイバー犯罪はあらゆる業界で増加傾向にあり、企業は新たなセキュリティ対策の導入を迫られています。現在、データ侵害の世界平均コストは約445万ドルであり、当然ながら多くの企業は新たなセキュリティソリューションに投資しています。これは特に金融機関に当てはまります。その理由は、セキュリティ侵害はコストがかかるだけでなく、顧客の信頼を失い、組織の評判にも悪影響を及ぼすからです。

驚くべきことではなく、銀行や投資会社がリスク低減とレジリエンス強化に投資していることは、明らかです。Gartner 2023 CIO and Technology Executive Surveyによると、これらの企業のCIOは2023年に、サイバーセキュリティ、データとアナリティクス、統合テクノロジー、クラウド、に最も多くの新規または追加資金を使うとしていました。しかしながら、セキュリティを強化しても、従業員がそのセキュリティ対策に従わなければ何の意味もありません。別のGartner surveyでは、自分自身やチームのビジネス目標達成を優先すれば、従業員の74%がサイバーセキュリティのガイダンスに従わないと回答しました。金融機関は、強固なセキュリティを備えた柔軟性高いデジタル戦略を採用し、データを侵害から保護すると同時に、重要なシステムへのセキュアでコンプライアンス準拠のリモートアクセスを可能にしなければなりません。これがシステムのサイロ化をなくし、顧客価値の向上につながります。

サイバー脅威の増大

データ侵害のコストは年々増加しているだけでなく、サイバー攻撃の件数も増加傾向にあります。米国国土安全保障省によると、2020年から2022年にかけて米国ではランサムウェア攻撃が47%増加し、2023年上半期にはランサムウェア攻撃の被害額が世界中で4億4,910万ドルに上ったそうです。つまり、ランサムウェア攻撃は順調に拡大し、過去最高の利益を記録することが確実なのです

加えて、大きな組織を狙う手口が目立つようになり大手金融機関は悪意を持った者たちの標的となっています。こうした脅威に先手を打つために、金融機関は脅威検知に向けたAI、生体認証、ブロックチェーンといった高度な防御策を導入する必要があります。技術が進歩するにつれ、サイバー脅威の高度化も進んでおり、銀行は多層的なセキュリティ戦略を採用し、量子コンピューティングのような未来の手法も考慮する必要に迫られています。

シトリックスは幅広い多要素認証製品と連携可能です。最適なIDプロバイダー(IdP)を使用して、お客様のビジネスデータを保護します。さらにNetScalerが、API保護、DDoS保護、ボット攻撃緩和のためのセキュアなアプリケーション配信を強化します。

リスク管理、規制、コンプライアンス 

金融機関はデータを保護するために多大な努力を積み重ねていますが、国や地域の規制に対処しなければなりません。リスク管理と規制コンプライアンスは金融機関にとって常にある課題です。、ユーザー体験とセキュリティを高める可能性がある一方で、厳格な規制遵守に関する機能を持たない新技術の導入には注意が必要です。例えばCapital Oneは、2019年に発生した大規模な顧客データ漏洩に関して、厳重なサイバーセキュリティ対策を実施しなかったとして、1億9,000万ドルの和解金

]]>
Implementing the Digital Operational Resilience Act using secure cloud development https://www.citrix.com/blogs/2024/07/26/implementing-the-digital-operational-resilience-act-using-secure-cloud-development/ Fri, 26 Jul 2024 17:22:37 +0000 https://www.citrix.com/blogs/?p=174261900

Cloud Development Environments (CDEs) allow organizations to migrate the application development process online. It also enables them to rethink operational resilience in this context.

In this discussion, I explore how requirements such as the ones laid out by the Digital

]]>

Cloud Development Environments (CDEs) allow organizations to migrate the application development process online. It also enables them to rethink operational resilience in this context.

In this discussion, I explore how requirements such as the ones laid out by the Digital

]]>
Announcing Web App Monitoring in Citrix Enterprise Browser with uberAgent 7.2.1 https://www.citrix.com/blogs/2024/07/17/announcing-web-app-monitoring-in-citrix-enterprise-browser-with-uberagent-7-2-1/ Wed, 17 Jul 2024 15:03:31 +0000 https://www.citrix.com/blogs/?p=174261229

We’re excited to share that Citrix Enterprise Browser is now integrated with uberAgent. This is our first major collaboration with Citrix, and it highlights our dedication to bringing you exceptional value and innovation.

What is Web App Monitoring?

In today’s

]]>

We’re excited to share that Citrix Enterprise Browser is now integrated with uberAgent. This is our first major collaboration with Citrix, and it highlights our dedication to bringing you exceptional value and innovation.

What is Web App Monitoring?

In today’s

]]>
Announcing the inclusion of XenServer 8 in all new Citrix subscriptions! https://www.citrix.com/blogs/2024/06/05/announcing-the-inclusion-of-xenserver-8-in-all-new-citrix-subscriptions/ Wed, 05 Jun 2024 15:54:39 +0000 https://www.citrix.com/blogs/?p=174260798

Earlier this year, Citrix announced our vision for the Citrix platform – a unified platform that gives you zero-trust access, best-in-class app and desktop virtualization, and high-performance application delivery with comprehensive security. As a part of this platform strategy we

]]>

Earlier this year, Citrix announced our vision for the Citrix platform – a unified platform that gives you zero-trust access, best-in-class app and desktop virtualization, and high-performance application delivery with comprehensive security. As a part of this platform strategy we

]]>
Enhanced Security for Linux Thin Clients with Citrix Enterprise Browser and ZTNA https://www.citrix.com/blogs/2024/05/06/enhanced-security-for-linux-thin-clients-with-citrix-enterprise-browser-and-ztna/ Mon, 06 May 2024 10:53:32 +0000 https://www.citrix.com/blogs/?p=174260723

Building upon the robust security of Linux thin clients, Citrix is thrilled to announce the expansion of its Enterprise Browser offerings to Linux, marking a significant step in our access security platform expansion strategy. This empowers organizations to further secure

]]>

Building upon the robust security of Linux thin clients, Citrix is thrilled to announce the expansion of its Enterprise Browser offerings to Linux, marking a significant step in our access security platform expansion strategy. This empowers organizations to further secure

]]>
Cybersecurity for financial services https://www.citrix.com/blogs/2024/03/19/cybersecurity-for-financial-services/ Tue, 19 Mar 2024 13:45:18 +0000 https://www.citrix.com/blogs/?p=174260649

Cybercrime is on the rise across every industry, pushing organizations to adopt new security measures. Now that the global average data breach costs around 4.45 million dollars, it’s no surprise that so many organizations are investing in new security solutions.

]]>

Cybercrime is on the rise across every industry, pushing organizations to adopt new security measures. Now that the global average data breach costs around 4.45 million dollars, it’s no surprise that so many organizations are investing in new security solutions.

]]>
Mitigating Credential Risks with Citrix Technology: A Comprehensive Approach https://www.citrix.com/blogs/2024/03/11/mitigating-credential-risks-with-citrix-technology-a-comprehensive-approach/ Mon, 11 Mar 2024 15:04:01 +0000 https://www.citrix.com/blogs/?p=174260620

In an era of relentless digitization, where the boundaries between personal and professional realms blur with technological advancements, security stands as an ever-pressing concern. Managing credentials across numerous apps and platforms poses a significant challenge, especially considering the common practice

]]>

In an era of relentless digitization, where the boundaries between personal and professional realms blur with technological advancements, security stands as an ever-pressing concern. Managing credentials across numerous apps and platforms poses a significant challenge, especially considering the common practice

]]>
Welcome to the Citrix platform https://www.citrix.com/blogs/2024/03/05/welcome-to-the-citrix-platform/ Tue, 05 Mar 2024 12:55:41 +0000 https://www.citrix.com/blogs/?p=174260558

Enterprises invest a tremendous amount in a variety of solutions to secure and deliver enterprise apps, data, and network access. With different solutions for web, SaaS, and Windows, dependencies on various infrastructure and devices, and additional complexity around internal and

]]>

Enterprises invest a tremendous amount in a variety of solutions to secure and deliver enterprise apps, data, and network access. With different solutions for web, SaaS, and Windows, dependencies on various infrastructure and devices, and additional complexity around internal and

]]>
Experience the power of Stratodesk’s ultra-secure managed OS solution for healthcare endpoints at HIMSS 24 https://www.citrix.com/blogs/2024/02/26/experience-the-power-of-stratodesks-ultra-secure-managed-os-solution-for-healthcare-endpoints-at-himss-24/ Mon, 26 Feb 2024 15:47:56 +0000 https://www.citrix.com/blogs/?p=174260569

Citrix is gearing for HIMSS 2024 with a guest blog series featuring insights and innovations from some of our key partners. This post is written by Nonna Druker, Marketing Manager at Stratodesk.

You can visit Citrix and Stratodesk at HIMSS

]]>

Citrix is gearing for HIMSS 2024 with a guest blog series featuring insights and innovations from some of our key partners. This post is written by Nonna Druker, Marketing Manager at Stratodesk.

You can visit Citrix and Stratodesk at HIMSS

]]>
What’s new with Citrix – CVAD 2311 and Cloud updates https://www.citrix.com/blogs/2023/12/20/whats-new-with-citrix-cvad-2311-and-cloud-updates/ Wed, 20 Dec 2023 15:15:42 +0000 https://www.citrix.com/blogs/?p=174260452

Is there a better present than new features and a new Citrix release? Citrix continues to deliver on our commitment to hybrid environments quarter after quarter with releases for both Citrix Virtual Apps and Desktops and our Citrix cloud platform.

]]>

Is there a better present than new features and a new Citrix release? Citrix continues to deliver on our commitment to hybrid environments quarter after quarter with releases for both Citrix Virtual Apps and Desktops and our Citrix cloud platform.

]]>
What’s New and Next with Citrix: Webinar Q&A https://www.citrix.com/blogs/2023/09/25/whats-new-and-next-with-citrix-webinar-qa/ Mon, 25 Sep 2023 13:00:13 +0000 https://www.citrix.com/blogs/?p=174260200

We announced many new features and improvements to Citrix DaaS and Citrix Virtual Apps and Desktops this year, and we were proud to share those with you during our What’s New and Next with Citrix webinar. For those of

]]>

We announced many new features and improvements to Citrix DaaS and Citrix Virtual Apps and Desktops this year, and we were proud to share those with you during our What’s New and Next with Citrix webinar. For those of

]]>
5 reasons to use Citrix Security solutions for your healthcare organization https://www.citrix.com/blogs/2023/09/18/5-reasons-to-use-citrix-security-solutions-for-your-healthcare-organization/ Mon, 18 Sep 2023 13:30:44 +0000 https://www.citrix.com/blogs/?p=174260173

Cybersecurity is on everyone’s mind. Especially when the data that you need to protect, like electronic health records (EHRs), contains sensitive patient information. Cyber attacks are on the rise across the healthcare industry so now is the time to strengthen

]]>

Cybersecurity is on everyone’s mind. Especially when the data that you need to protect, like electronic health records (EHRs), contains sensitive patient information. Cyber attacks are on the rise across the healthcare industry so now is the time to strengthen

]]>
Citrix’s Growth and Transformation with Cloud Software Group https://www.citrix.com/blogs/2023/09/06/one-year-of-citrix-as-part-of-cloud-software-group/ Wed, 06 Sep 2023 16:00:10 +0000 https://www.citrix.com/blogs/?p=174260158

Looking back on our acquisition and transformation into Cloud Software Group, it’s clear Citrix has undergone significant changes. However, we’ve now firmly established ourselves as a company that delivers mission-critical enterprise software at scale, and that has provided the

]]>

Looking back on our acquisition and transformation into Cloud Software Group, it’s clear Citrix has undergone significant changes. However, we’ve now firmly established ourselves as a company that delivers mission-critical enterprise software at scale, and that has provided the

]]>
What’s new with Citrix — March 2023 https://www.citrix.com/blogs/2023/03/29/whats-new-with-citrix-march-2023/ Wed, 29 Mar 2023 19:01:47 +0000 https://citrixblogs.wpengine.com/?p=174259356

This year has already been big for Citrix! With a renewed focus on hybrid deployments and meeting organizations where they are in their cloud journeys, we’ve brought you a ton of new innovations and updates already.

First off, we introduced …

]]>

This year has already been big for Citrix! With a renewed focus on hybrid deployments and meeting organizations where they are in their cloud journeys, we’ve brought you a ton of new innovations and updates already.

First off, we introduced …

]]>
Diving deep into Citrix zero trust architecture https://www.citrix.com/blogs/2023/03/27/diving-deep-into-citrix-zero-trust-architecture/ Mon, 27 Mar 2023 14:00:04 +0000 https://citrixblogs.wpengine.com/?p=174259371

In my previous”Overcoming observed challenges when adopting a zero trust architecture” blog post, I discussed some of the observed challenges when implementing a zero trust architecture and how you can use Citrix technology to overcome them. In this …

]]>

In my previous”Overcoming observed challenges when adopting a zero trust architecture” blog post, I discussed some of the observed challenges when implementing a zero trust architecture and how you can use Citrix technology to overcome them. In this …

]]>
Establish device trust with Citrix’s device posture service https://www.citrix.com/blogs/2023/02/27/establish-device-trust-with-citrixs-device-posture-service/ Mon, 27 Feb 2023 14:13:17 +0000 https://citrixblogs.wpengine.com/?p=174259152

In our mobile-first world, where hybrid work is the norm for many organizations, employees need access to corporate applications and resources from anywhere, on any device, on the go. While traditional methods of authentication are still an effective way to …

]]>

In our mobile-first world, where hybrid work is the norm for many organizations, employees need access to corporate applications and resources from anywhere, on any device, on the go. While traditional methods of authentication are still an effective way to …

]]>
Overcoming observed challenges when adopting a zero trust architecture https://www.citrix.com/blogs/2023/01/25/overcoming-observed-challenges-when-adopting-a-zero-trust-architecture/ Wed, 25 Jan 2023 21:15:31 +0000 https://citrixblogs.wpengine.com/?p=174258872

Zero trust has become a crucial component in the cybersecurity strategy of organizations everywhere. More and more enterprises are finding themselves turning toward zero trust architecture to keep their data, infrastructure, and other assets safe. As a result, this concept …

]]>

Zero trust has become a crucial component in the cybersecurity strategy of organizations everywhere. More and more enterprises are finding themselves turning toward zero trust architecture to keep their data, infrastructure, and other assets safe. As a result, this concept …

]]>
What’s new with Citrix DaaS and Citrix Virtual Apps and Desktops — December 2022 https://www.citrix.com/blogs/2022/12/20/whats-new-with-citrix-daas-and-citrix-virtual-apps-and-desktops-december-2022/ Tue, 20 Dec 2022 21:45:03 +0000 https://citrixblogs.wpengine.com/?p=174258738

It’s hard to believe that 2022 is already coming to a close. This year has flown by and has been full of new features, innovations, and updates from the Citrix team. In a recent blog post, I looked back …

]]>

It’s hard to believe that 2022 is already coming to a close. This year has flown by and has been full of new features, innovations, and updates from the Citrix team. In a recent blog post, I looked back …

]]>
How channel partners are architecting a seamless zero trust framework https://www.citrix.com/blogs/2022/10/19/how-channel-partners-are-architecting-a-seamless-zero-trust-framework/ Wed, 19 Oct 2022 14:00:26 +0000 https://citrixblogs.wpengine.com/?p=174258354

Modern threats require a modern approach to security. Plus, our recent survey found that 95 percent of businesses are taking a hybrid approach to work, so there are no signs of slowing down when it comes to employee use …

]]>

Modern threats require a modern approach to security. Plus, our recent survey found that 95 percent of businesses are taking a hybrid approach to work, so there are no signs of slowing down when it comes to employee use …

]]>
Remote Access Without VPN: Is It Secure? https://www.citrix.com/blogs/2022/10/11/is-remote-access-secure-without-vpn/ Tue, 11 Oct 2022 16:00:02 +0000 https://citrixblogs.wpengine.com/?p=174258270

VPNs have long been a security standard for secure access to corporate applications. Organizations began using VPN services at a time when the digital world was far less complex, however, and today, VPNs are far from secure. This blog post …

]]>

VPNs have long been a security standard for secure access to corporate applications. Organizations began using VPN services at a time when the digital world was far less complex, however, and today, VPNs are far from secure. This blog post …

]]>
What is Authentication vs. Authorization? The Main Differences https://www.citrix.com/blogs/2022/10/05/authentication-vs-authorization-main-differences/ Wed, 05 Oct 2022 14:00:21 +0000 https://citrixblogs.wpengine.com/?p=174258225

Authentication and authorization are essential processes of identity and access management. While the terms are often used interchangeably, authentication and authorization fill different functions. For example, while authentication verifies the user’s identity, authorization verifies what permissions the user has to …

]]>

Authentication and authorization are essential processes of identity and access management. While the terms are often used interchangeably, authentication and authorization fill different functions. For example, while authentication verifies the user’s identity, authorization verifies what permissions the user has to …

]]>
Five hot topics for the manufacturing supply chain https://www.citrix.com/blogs/2022/09/26/five-hot-topics-for-the-manufacturing-supply-chain/ Mon, 26 Sep 2022 14:00:08 +0000 https://citrixblogs.wpengine.com/?p=174258101

If ever there was a time for the manufacturing industry to futureproof itself and its supply chains, that time is now. Recent global events have created unprecedented change in the industry, forcing companies to look for ways to embed security, …

]]>

If ever there was a time for the manufacturing industry to futureproof itself and its supply chains, that time is now. Recent global events have created unprecedented change in the industry, forcing companies to look for ways to embed security, …

]]>
Hybrid cloud security with zero trust solutions from Citrix https://www.citrix.com/blogs/2022/09/14/secure-your-hybrid-environment-zero-trust-citrix/ Wed, 14 Sep 2022 15:00:59 +0000 https://citrixblogs.wpengine.com/?p=174258038

The growth in hybrid work creates challenges for IT admins everywhere. How do you keep remote workers safe? How do you protect endpoints? What do you do about unmanaged devices? How do you secure sensitive corporate data and resources while …

]]>

The growth in hybrid work creates challenges for IT admins everywhere. How do you keep remote workers safe? How do you protect endpoints? What do you do about unmanaged devices? How do you secure sensitive corporate data and resources while …

]]>
Delivering enterprise web apps with Citrix Enterprise Browser https://www.citrix.com/blogs/2022/09/09/delivering-enterprise-web-apps-with-citrix-enterprise-browser/ Fri, 09 Sep 2022 14:30:11 +0000 https://citrixblogs.wpengine.com/?p=174258022

When consumerization of IT was the next big thing, enterprises spent a lot of time and money modernizing apps and working to accommodate the way employees want to work. Many of those changes truly improved the way people work every …

]]>

When consumerization of IT was the next big thing, enterprises spent a lot of time and money modernizing apps and working to accommodate the way employees want to work. Many of those changes truly improved the way people work every …

]]>
What to know about zero trust architectures https://www.citrix.com/blogs/2022/08/30/what-to-know-about-zero-trust-architectures/ Tue, 30 Aug 2022 14:00:30 +0000 https://citrixblogs.wpengine.com/?p=174257883

Zero trust architectures have gained rapid adoption by cybersecurity teams recently with the rise of knowledge workers moving to remote or hybrid work models. The need to secure access for these workers without compromising their productivity, especially in light of …

]]>

Zero trust architectures have gained rapid adoption by cybersecurity teams recently with the rise of knowledge workers moving to remote or hybrid work models. The need to secure access for these workers without compromising their productivity, especially in light of …

]]>
How to create a zero trust network https://www.citrix.com/blogs/2022/08/18/how-to-create-zero-trust-network/ Thu, 18 Aug 2022 14:00:41 +0000 https://citrixblogs.wpengine.com/?p=174257846

Looking to achieve zero trust security for your business?

You’re not alone.

The White House recently released an edict declaring the implementation of a federal zero-trust architecture (ZTA) requiring all agencies to comply with specific cybersecurity standards and objectives by …

]]>

Looking to achieve zero trust security for your business?

You’re not alone.

The White House recently released an edict declaring the implementation of a federal zero-trust architecture (ZTA) requiring all agencies to comply with specific cybersecurity standards and objectives by …

]]>
Mais segurança, redução de custos e produtividade para os serviços públicos https://www.citrix.com/blogs/2022/08/16/mais-seguranca-reducao-de-custos-e-produtividade-para-os-servicos-publicos/ Tue, 16 Aug 2022 14:00:44 +0000 https://citrixblogs.wpengine.com/?p=174257830

O setor público na América Latina, particularmente no Brasil, vem passando por um momento de transformação e não apenas por conta do COVID-19. Obviamente a adoção em massa do home office e o consequente aumento da demanda por soluções …

]]>

O setor público na América Latina, particularmente no Brasil, vem passando por um momento de transformação e não apenas por conta do COVID-19. Obviamente a adoção em massa do home office e o consequente aumento da demanda por soluções …

]]>
Zero trust architecture benefits for your business https://www.citrix.com/blogs/2022/08/16/zero-trust-architecture-benefits-for-your-business/ Tue, 16 Aug 2022 14:00:03 +0000 https://citrixblogs.wpengine.com/?p=174257798

In a perfect world, you could turn a blind eye to your company network and safely trust that anyone trying to access it had the purest intentions. But in reality, there’s no telling how or when a malicious actor might …

]]>

In a perfect world, you could turn a blind eye to your company network and safely trust that anyone trying to access it had the purest intentions. But in reality, there’s no telling how or when a malicious actor might …

]]>
Seven principles of the zero trust security model https://www.citrix.com/blogs/2022/08/11/seven-principles-of-zero-trust-security-model/ Thu, 11 Aug 2022 15:15:17 +0000 https://citrixblogs.wpengine.com/?p=174257642

The reality of today’s fast-paced, increasingly remote work environment positions your business as vulnerable to security breaches. Your employees increasingly rely on their own unprotected devices for work, leveraging SaaS and web-based apps to access your valuable assets and data.…

]]>

The reality of today’s fast-paced, increasingly remote work environment positions your business as vulnerable to security breaches. Your employees increasingly rely on their own unprotected devices for work, leveraging SaaS and web-based apps to access your valuable assets and data.…

]]>
Why should you evolve your multi-factor authentication to adaptive authentication? https://www.citrix.com/blogs/2022/08/04/multi-factor-authenticaton-vs-adaptive-authentication/ Thu, 04 Aug 2022 14:00:18 +0000 https://citrixblogs.wpengine.com/?p=174257757

As organizations embrace digital transformation, the need to protect data and control who accesses it increases. Distributed workforces and online users compound the challenge since they often need remote access to critical apps and data. Many organizations also have …

]]>

As organizations embrace digital transformation, the need to protect data and control who accesses it increases. Distributed workforces and online users compound the challenge since they often need remote access to critical apps and data. Many organizations also have …

]]>
Microsoft Inspire 2022: Talking cloud, hybrid work, and security https://www.citrix.com/blogs/2022/07/28/microsoft-inspire-2022-talking-cloud-hybrid-work-and-security/ Thu, 28 Jul 2022 14:00:50 +0000 https://citrixblogs.wpengine.com/?p=174257637

In opening Microsoft Inspire, Microsoft CEO Satya Nadella heralded the unarguable role that digital transformation plays in every business, saying companies must continue to “infuse digital tech into every business process to get more out of less.”

That “digital imperative,” …

]]>

In opening Microsoft Inspire, Microsoft CEO Satya Nadella heralded the unarguable role that digital transformation plays in every business, saying companies must continue to “infuse digital tech into every business process to get more out of less.”

That “digital imperative,” …

]]>
How Citrix can help customers achieve zero trust maturity https://www.citrix.com/blogs/2022/07/21/how-citrix-can-help-customers-achieve-zero-trust-maturity/ Thu, 21 Jul 2022 14:00:08 +0000 https://citrixblogs.wpengine.com/?p=174257605

Information technology has evolved, and so has the way we engage with it for work. With the proliferation of remote work, connected devices, cloud computing systems, and access points — how can we keep users safe without impeding their productivity?…

]]>

Information technology has evolved, and so has the way we engage with it for work. With the proliferation of remote work, connected devices, cloud computing systems, and access points — how can we keep users safe without impeding their productivity?…

]]>
Citrix im Aufbruch – heute und morgen https://www.citrix.com/blogs/2022/07/11/citrix-im-aufbruch-heute-und-morgen/ Mon, 11 Jul 2022 10:58:39 +0000 https://citrixblogs.wpengine.com/?p=174257454

Stillstand ist Rückschritt – in diesem Sinne ruhen wir uns derzeit nicht aus, sondern bieten unseren Kunden auch vor dem Hintergrund der bevorstehenden Übernahme von Citrix durch Investoren weiterhin neue Lösungen und den exzellenten Service, den sie gewohnt sind und …

]]>

Stillstand ist Rückschritt – in diesem Sinne ruhen wir uns derzeit nicht aus, sondern bieten unseren Kunden auch vor dem Hintergrund der bevorstehenden Übernahme von Citrix durch Investoren weiterhin neue Lösungen und den exzellenten Service, den sie gewohnt sind und …

]]>
Protect your workforce against browser-based attacks with a zero trust network https://www.citrix.com/blogs/2022/06/23/protect-from-browser-attacks-with-zero-trust-network/ Thu, 23 Jun 2022 14:00:00 +0000 https://citrixblogs.wpengine.com/?p=174257341

Which web browsing risks concern you the most?

Businesses are faced with the reality of threat actors attempting to access their networks and infrastructure and getting access to their applications and data. Today’s workforce is increasingly remote-capable, and chances are …

]]>

Which web browsing risks concern you the most?

Businesses are faced with the reality of threat actors attempting to access their networks and infrastructure and getting access to their applications and data. Today’s workforce is increasingly remote-capable, and chances are …

]]>
Planen für das Supportende von Citrix XenApp und XenDesktop 7.15 https://www.citrix.com/blogs/2022/06/22/planen-fur-das-supportende-von-citrix-xenapp-und-xendesktop-7-15/ Wed, 22 Jun 2022 18:00:59 +0000 https://citrixblogs.wpengine.com/?p=174257875

Kunden auf der ganzen Welt vertrauen auf Citrix, wenn es um Zero-Trust-Sicherheit geht, und darum, ihre unternehmenskritischen Workloads auszuführen. Wir nutzen das Feedback unserer Kunden, um kontinuierlich neue Innovationen für Citrix Workloads in der Cloud und in lokalen oder hybriden …

]]>

Kunden auf der ganzen Welt vertrauen auf Citrix, wenn es um Zero-Trust-Sicherheit geht, und darum, ihre unternehmenskritischen Workloads auszuführen. Wir nutzen das Feedback unserer Kunden, um kontinuierlich neue Innovationen für Citrix Workloads in der Cloud und in lokalen oder hybriden …

]]>
Reduce remote cybersecurity risks with ZTNA as a service https://www.citrix.com/blogs/2022/06/14/ztna-as-a-service-reduces-cybersecurity-risks/ Tue, 14 Jun 2022 14:30:14 +0000 https://citrixblogs.wpengine.com/?p=174257300

How are you managing the risk presented by your employees using personal devices to access corporate resources outside the office?

The reality of an increasingly remote workforce means your valuable data and information is being requested from devices you may …

]]>

How are you managing the risk presented by your employees using personal devices to access corporate resources outside the office?

The reality of an increasingly remote workforce means your valuable data and information is being requested from devices you may …

]]>
Citrix ZTNA solutions help organizations secure their remote workforces https://www.citrix.com/blogs/2022/06/09/citrix-ztna-solutions-help-organizations-secure-their-remote-workforces/ Thu, 09 Jun 2022 19:45:44 +0000 https://citrixblogs.wpengine.com/?p=174257280

Citrix has been in the business of delivering secure remote work through its digital workspace solutions for more than three decades. And leading companies around the world are using them to provide employees with access to the applications and insights …

]]>

Citrix has been in the business of delivering secure remote work through its digital workspace solutions for more than three decades. And leading companies around the world are using them to provide employees with access to the applications and insights …

]]>
Citrix named a Leader and Fast Mover in ZTNA market https://www.citrix.com/blogs/2022/06/07/citrix-named-a-leader-and-fast-mover-in-ztna-market/ Tue, 07 Jun 2022 18:20:50 +0000 https://citrixblogs.wpengine.com/?p=174257252

With RSA Conference 2022 happening in San Francisco this week, we’re proud to announce that Citrix was named a Leader and Fast Mover in GigaOm’s Radar report for ZTNA.

Citrix offers a complete ZTNA solution with very strong, well-thought-out

]]>

With RSA Conference 2022 happening in San Francisco this week, we’re proud to announce that Citrix was named a Leader and Fast Mover in GigaOm’s Radar report for ZTNA.

Citrix offers a complete ZTNA solution with very strong, well-thought-out

]]>
ZTNA Vendors: What to look for https://www.citrix.com/blogs/2022/06/06/zero-trust-network-access-ztna-vendors/ Mon, 06 Jun 2022 14:00:52 +0000 https://citrixblogs.wpengine.com/?p=174257237

Zero trust network access (ZTNA) has been a watchword in digital security for years. Recently, the technology has reached a tipping point.

Two parallel trends have increased the importance of using ZTNA to connect users with companies’ digital resources. First, …

]]>

Zero trust network access (ZTNA) has been a watchword in digital security for years. Recently, the technology has reached a tipping point.

Two parallel trends have increased the importance of using ZTNA to connect users with companies’ digital resources. First, …

]]>
Are you protecting your third-party contractors from cyberattacks? https://www.citrix.com/blogs/2022/05/19/are-you-protecting-your-third-party-contractors-from-cyberattacks/ Thu, 19 May 2022 19:40:58 +0000 https://citrixblogs.wpengine.com/?p=174257142

Akshay Kakar, Principal Product Marketing Manager at Citrix, contributed to this blog post.

Cyberattacks should be a concern for everyone — businesses, government organizations, and consumers. Among the targets threat actors focus on as they search for weak links are …

]]>

Akshay Kakar, Principal Product Marketing Manager at Citrix, contributed to this blog post.

Cyberattacks should be a concern for everyone — businesses, government organizations, and consumers. Among the targets threat actors focus on as they search for weak links are …

]]>
ABAC vs. RBAC: What’s the difference? https://www.citrix.com/blogs/2022/05/17/abac-vs-rbac-comparison/ Tue, 17 May 2022 14:00:59 +0000 https://citrixblogs.wpengine.com/?p=174257090

Two of the most common methods for securing access to business resources are attribute-based access control (ABAC) and role-based access control (RBAC). These types of access control models determine authorization based on who the user is and what resources they’re …

]]>

Two of the most common methods for securing access to business resources are attribute-based access control (ABAC) and role-based access control (RBAC). These types of access control models determine authorization based on who the user is and what resources they’re …

]]>
Citrix Features Explained: Improving user experience with Citrix Secure Private Access https://www.citrix.com/blogs/2022/05/04/improving-user-experience-citrix-secure-private-access/ Wed, 04 May 2022 13:00:13 +0000 https://citrixblogs.wpengine.com/?p=174257039

Your workforce has gone hybrid. Your employees demand anywhere access to the SaaS and cloud apps they need to be productive alongside an engaging and secure user experience. But because your critical business apps remain inside the datacenter while employees …

]]>

Your workforce has gone hybrid. Your employees demand anywhere access to the SaaS and cloud apps they need to be productive alongside an engaging and secure user experience. But because your critical business apps remain inside the datacenter while employees …

]]>
Take control of IT security for your organization https://www.citrix.com/blogs/2022/03/17/take-control-of-it-security-for-your-organization/ Thu, 17 Mar 2022 14:00:03 +0000 https://citrixblogs.wpengine.com/?p=174256526

You’re probably familiar with the idea of a computer network resembling a castle with tall walls, a single front gate, and a moat. But as we all know, that’s a poor way to secure modern IT infrastructure. With thousands of …

]]>

You’re probably familiar with the idea of a computer network resembling a castle with tall walls, a single front gate, and a moat. But as we all know, that’s a poor way to secure modern IT infrastructure. With thousands of …

]]>
Could internal apps be your biggest security risk? https://www.citrix.com/blogs/2022/03/15/could-internal-apps-be-your-biggest-security-risk/ Tue, 15 Mar 2022 20:00:48 +0000 https://citrixblogs.wpengine.com/?p=174256515

Protecting your internal apps — those managed by your internal IT team, such as ERP or HR apps — is critical and just as important as protecting your public-facing apps. Today, bad actors can do just as much, if not …

]]>

Protecting your internal apps — those managed by your internal IT team, such as ERP or HR apps — is critical and just as important as protecting your public-facing apps. Today, bad actors can do just as much, if not …

]]>
Hybrid work is here to stay, and that’s a good thing https://www.citrix.com/blogs/2022/01/27/hybrid-work-is-here-to-stay-and-thats-a-good-thing/ Thu, 27 Jan 2022 20:00:27 +0000 https://citrixblogs.wpengine.com/?p=174256069

Flexible models and workforce strategies have opened the door to greater innovation and business growth, and companies that embrace them can knock it down.

Believe it or not, there is a silver lining in the global crisis we have all …

]]>

Flexible models and workforce strategies have opened the door to greater innovation and business growth, and companies that embrace them can knock it down.

Believe it or not, there is a silver lining in the global crisis we have all …

]]>
IAM vs PAM: How are they different? https://www.citrix.com/blogs/2022/01/10/iam-vs-pam-how-are-they-different/ Mon, 10 Jan 2022 13:00:35 +0000 https://citrixblogs.wpengine.com/?p=174255894

New remote and hybrid working styles have companies thinking deeply about the devices employees use to access company infrastructure. And many are looking into options for privileged access management (PAM) and identity access management (IAM). Both are common methods for …

]]>

New remote and hybrid working styles have companies thinking deeply about the devices employees use to access company infrastructure. And many are looking into options for privileged access management (PAM) and identity access management (IAM). Both are common methods for …

]]>
How to drive innovation and productivity for your distributed workforce https://www.citrix.com/blogs/2021/12/15/how-to-drive-innovation-and-productivity-for-your-distributed-workforce/ Wed, 15 Dec 2021 13:00:23 +0000 https://citrixblogs.wpengine.com/?p=174255621

There is no more important fuel for the future of your organization than innovation. By supporting a culture focused on experimenting, devising, and creating new ideas for how your company can be more agile and productive, you set up your …

]]>

There is no more important fuel for the future of your organization than innovation. By supporting a culture focused on experimenting, devising, and creating new ideas for how your company can be more agile and productive, you set up your …

]]>
DaaS Security: The importance of secure desktops https://www.citrix.com/blogs/2021/12/09/daas-security-the-importance-of-secure-desktops/ Thu, 09 Dec 2021 13:00:27 +0000 https://citrixblogs.wpengine.com/?p=174255578

With hybrid work here to stay and more companies deploying virtual desktops than ever before, IT teams are challenged with securing their network and sensitive data for increasingly distributed employees. This is especially true for organizations that have implemented bring

]]>

With hybrid work here to stay and more companies deploying virtual desktops than ever before, IT teams are challenged with securing their network and sensitive data for increasingly distributed employees. This is especially true for organizations that have implemented bring

]]>
ZTNA vs. VPN: How they differ https://www.citrix.com/blogs/2021/12/02/zero-trust-vs-vpn-comparison/ Thu, 02 Dec 2021 13:00:43 +0000 https://citrixblogs.wpengine.com/?p=174255484

Before 2020, there were signs of a growing — albeit slow — shift to remote work. But during the COVID-19 pandemic, organizations were forced to quickly adopt hybrid or remote work policies to keep operations running and protect their workforce. …

]]>

Before 2020, there were signs of a growing — albeit slow — shift to remote work. But during the COVID-19 pandemic, organizations were forced to quickly adopt hybrid or remote work policies to keep operations running and protect their workforce. …

]]>
Why your hybrid workforce needs a digital workspace https://www.citrix.com/blogs/2021/11/03/why-your-hybrid-workforce-needs-a-digital-workspace/ Wed, 03 Nov 2021 18:00:46 +0000 https://citrixblogs.wpengine.com/?p=174255257

As the millennial and Gen Z generations come to constitute more of the workforce, attitudes about remote and hybrid work are evolving.

In the very recent past, working outside of a traditional office all or most of the time …

]]>

As the millennial and Gen Z generations come to constitute more of the workforce, attitudes about remote and hybrid work are evolving.

In the very recent past, working outside of a traditional office all or most of the time …

]]>
Empowering secure distributed workforces with Citrix innovations https://www.citrix.com/blogs/2021/10/27/empowering-secure-distributed-workforces-with-citrix-innovations/ Wed, 27 Oct 2021 19:30:03 +0000 https://citrixblogs.wpengine.com/?p=174255150

This is a guest blog post by Shira Rubinoff, Cybersecurity Executive, Author and Advisor.

Organizations of all types and sizes, all around the world, are prioritizing secure distributed work models. This shift has been propelled by the growing adoption …

]]>

This is a guest blog post by Shira Rubinoff, Cybersecurity Executive, Author and Advisor.

Organizations of all types and sizes, all around the world, are prioritizing secure distributed work models. This shift has been propelled by the growing adoption …

]]>
Four ways Citrix can support your cloud strategy https://www.citrix.com/blogs/2021/10/26/four-ways-citrix-can-support-your-cloud-strategy/ Tue, 26 Oct 2021 11:59:57 +0000 https://citrixblogs.wpengine.com/?p=174255096

Business continuity means more than dealing with flood or fire. Organizations in every industry have had to stay effective and agile while empowering their people to work from anywhere with access to all the information and applications they used in …

]]>

Business continuity means more than dealing with flood or fire. Organizations in every industry have had to stay effective and agile while empowering their people to work from anywhere with access to all the information and applications they used in …

]]>
Enabling passwordless access with Citrix and HID Global https://www.citrix.com/blogs/2021/10/08/enabling-passwordless-access-with-citrix-and-hid-global/ Fri, 08 Oct 2021 14:00:45 +0000 https://citrixblogs.wpengine.com/?p=174254705

This is a guest blog post by Eric Vila, Product Management Director, HID Global.

The hybrid work model has presented huge opportunities for organizations and their employees alike. But with employees accessing corporate resources from anywhere, at any time, …

]]>

This is a guest blog post by Eric Vila, Product Management Director, HID Global.

The hybrid work model has presented huge opportunities for organizations and their employees alike. But with employees accessing corporate resources from anywhere, at any time, …

]]>
#CitrixLaunchpad: Seguridad mejorada para las necesidades de hoy https://www.citrix.com/blogs/2021/10/07/citrixlaunchpad-seguridad-mejorada-para-las-necesidades-de-hoy/ Thu, 07 Oct 2021 12:00:05 +0000 https://citrixblogs.wpengine.com/?p=174254709

Con tantos cambios en la forma en que se trabaja y la aceleración de la transformación digital en todas las empresas de todos los tamaños, reforzar la seguridad es un punto clave para todos los departamentos de TI. Habiendo concluido …

]]>

Con tantos cambios en la forma en que se trabaja y la aceleración de la transformación digital en todas las empresas de todos los tamaños, reforzar la seguridad es un punto clave para todos los departamentos de TI. Habiendo concluido …

]]>
Forrester recognizes Citrix as a strong performer in New Wave ZTNA evaluation https://www.citrix.com/blogs/2021/10/04/forrester-recognizes-citrix-as-a-strong-performer-in-new-wave-ztna-evaluation/ Mon, 04 Oct 2021 16:00:13 +0000 https://citrixblogs.wpengine.com/?p=174254468

Citrix is a strong performer among the 15 ZTNA vendors Forrester selected in The Forrester New Wave™: Zero Trust Network Access, Q3 2021. Forrester evaluated the vendors based on criteria that included strength of current offering and market presence, …

]]>

Citrix is a strong performer among the 15 ZTNA vendors Forrester selected in The Forrester New Wave™: Zero Trust Network Access, Q3 2021. Forrester evaluated the vendors based on criteria that included strength of current offering and market presence, …

]]>
Previewing Citrix Launchpad: Security https://www.citrix.com/blogs/2021/09/28/previewing-citrix-launchpad-security/ Tue, 28 Sep 2021 20:00:32 +0000 https://citrixblogs.wpengine.com/?p=174254373

The complete Citrix Launchpad: Security event is now available on demand.


The rapid shift to cloud and SaaS, combined with increased mobility and the broad adoption of hybrid and distributed work models have expanded the cyberattack surface. Simultaneously, cyberthreats are …

]]>

The complete Citrix Launchpad: Security event is now available on demand.


The rapid shift to cloud and SaaS, combined with increased mobility and the broad adoption of hybrid and distributed work models have expanded the cyberattack surface. Simultaneously, cyberthreats are …

]]>
Back to Office: Hybrid novelties and new norms https://www.citrix.com/blogs/2021/09/23/back-to-office-hybrid-novelties-and-new-norms/ Thu, 23 Sep 2021 12:00:02 +0000 https://citrixblogs.wpengine.com/?p=174254458

It’s no surprise that the traditional workplace has been turned upside down by COVID-19. Well over a year into large-scale remote work, it’s clear that leaders must prepare now for the long-term changes to business operations catalyzed by the pandemic.…

]]>

It’s no surprise that the traditional workplace has been turned upside down by COVID-19. Well over a year into large-scale remote work, it’s clear that leaders must prepare now for the long-term changes to business operations catalyzed by the pandemic.…

]]>
The Click-Down: Enabling remote and hybrid learning https://www.citrix.com/blogs/2021/09/15/tm-the-click-down-enabling-remote-and-hybrid-learning/ Wed, 15 Sep 2021 13:30:18 +0000 https://citrixblogs.wpengine.com/?p=174254337

Back-to-school season is in full swing. The 2020 school year was especially hard on students and teachers alike. When COVID-19 hit, most schools and universities were not equipped for remote learning. More than 200 million higher-ed students and over 250 …

]]>

Back-to-school season is in full swing. The 2020 school year was especially hard on students and teachers alike. When COVID-19 hit, most schools and universities were not equipped for remote learning. More than 200 million higher-ed students and over 250 …

]]>
The Citrix SD-WAN and Microsoft Azure Virtual WAN advantage https://www.citrix.com/blogs/2021/08/25/the-citrix-sd-wan-and-microsoft-azure-virtual-wan-advantage/ Wed, 25 Aug 2021 16:00:59 +0000 https://citrixblogs.wpengine.com/?p=174254067

You’ve probably heard of Microsoft Azure infrastructure as a service (IaaS), and you might even use it. However, you might not always think of Microsoft as an ISP. Many of their services are designed to “just work,” and it’s easy …

]]>

You’ve probably heard of Microsoft Azure infrastructure as a service (IaaS), and you might even use it. However, you might not always think of Microsoft as an ISP. Many of their services are designed to “just work,” and it’s easy …

]]>
Bringing security up to speed for the work-from-anywhere age https://www.citrix.com/blogs/2021/08/19/bringing-security-up-to-speed-for-the-work-from-anywhere-age/ Thu, 19 Aug 2021 09:00:21 +0000 https://citrixblogs.wpengine.com/?p=174254020
This blog post originally appeared on Help Net Security.

The Internet Age has changed so much of how we live and work. We have become accustomed to buying goods online with a few clicks and having them delivered overnight,

…]]>
This blog post originally appeared on Help Net Security.

The Internet Age has changed so much of how we live and work. We have become accustomed to buying goods online with a few clicks and having them delivered overnight,

…]]>
Take a strategic approach to empowering a secure hybrid workforce with SASE https://www.citrix.com/blogs/2021/07/27/take-a-strategic-approach-to-empowering-a-secure-hybrid-workforce-with-sase/ Tue, 27 Jul 2021 12:00:30 +0000 https://citrixblogs.wpengine.com/?p=174253661

In the first blog post in our series on Secure Access Service Edge (SASE), we looked at the need for a unified approach to securing the hybrid workforce, the complex application landscape, and the rapidly expanding attack surface.

In …

]]>

In the first blog post in our series on Secure Access Service Edge (SASE), we looked at the need for a unified approach to securing the hybrid workforce, the complex application landscape, and the rapidly expanding attack surface.

In …

]]>
Hybrid Work and Hackers: The 2021 zero trust approach to security https://www.citrix.com/blogs/2021/07/13/hybrid-work-zero-trust-security/ Tue, 13 Jul 2021 12:00:49 +0000 https://citrixblogs.wpengine.com/?p=174253517

Picture this: It’s 8:45 a.m. on a Tuesday, and you’ve just fired up your laptop. Within minutes you have 10 different browser tabs and apps open, including one for messaging, another for email, and another for the presentation you’ve been …

]]>

Picture this: It’s 8:45 a.m. on a Tuesday, and you’ve just fired up your laptop. Within minutes you have 10 different browser tabs and apps open, including one for messaging, another for email, and another for the presentation you’ve been …

]]>
Zero Trust for Healthcare — Not If, but When. https://www.citrix.com/blogs/2021/07/07/zero-trust-for-healthcare-not-if-but-when/ Wed, 07 Jul 2021 12:00:27 +0000 https://citrixblogs.wpengine.com/?p=174253442

The healthcare industry has long been overburdened by slow-moving innovation due to the complexity of the medical ecosystem. Healthcare IT will tell you that healthcare is one of the most traditional industries and is averse to change. After all, it’s …

]]>

The healthcare industry has long been overburdened by slow-moving innovation due to the complexity of the medical ecosystem. Healthcare IT will tell you that healthcare is one of the most traditional industries and is averse to change. After all, it’s …

]]>
The Click-Down: Zero trust network access (ZTNA) and Citrix https://www.citrix.com/blogs/2021/06/30/tm-the-click-down-zero-trust-network-access-ztna-and-citrix/ Wed, 30 Jun 2021 14:00:40 +0000 https://citrixblogs.wpengine.com/?p=174253371

Cyber-attacks continue to grow, and some of the most common threats come from within, for example through a hacker using an employee’s compromised credentials. Combine that with more users working remotely from untrusted networks and personal devices becoming the norm, …

]]>

Cyber-attacks continue to grow, and some of the most common threats come from within, for example through a hacker using an employee’s compromised credentials. Combine that with more users working remotely from untrusted networks and personal devices becoming the norm, …

]]>
5 things you should know about zero trust architecture https://www.citrix.com/blogs/2021/06/23/5-things-you-should-know-about-zero-trust-architecture/ Wed, 23 Jun 2021 14:00:39 +0000 https://citrixblogs.wpengine.com/?p=174253281

Citrix defines zero trust as a security model that, by default, trusts no one. Anyone trying to access a network must be continuously verified so organizations can tightly control access to valuable assets and protect against data breaches.

In the …

]]>

Citrix defines zero trust as a security model that, by default, trusts no one. Anyone trying to access a network must be continuously verified so organizations can tightly control access to valuable assets and protect against data breaches.

In the …

]]>
Are you ready for a ransomware attack? https://www.citrix.com/blogs/2021/06/09/are-you-ready-for-a-ransomware-attack/ Wed, 09 Jun 2021 18:15:04 +0000 https://citrixblogs.wpengine.com/?p=174253039

The scourge of ransomware has been wildly escalating, causing mayhem not just for companies, but for society. Witness the high-profile breaches impacting critical infrastructure while damaging trust relationships across healthcare, financial, retail, manufacturing, oil and gas, and other industries we …

]]>

The scourge of ransomware has been wildly escalating, causing mayhem not just for companies, but for society. Witness the high-profile breaches impacting critical infrastructure while damaging trust relationships across healthcare, financial, retail, manufacturing, oil and gas, and other industries we …

]]>
Building a new, better, and more collaborative future of work post-pandemic https://www.citrix.com/blogs/2021/05/27/building-a-new-better-and-more-collaborative-future-of-work-post-pandemic/ Thu, 27 May 2021 12:00:15 +0000 https://citrixblogs.wpengine.com/?p=174252779

This is a guest blog post by Dion Hinchcliffe, VP and Principal Analyst at Constellation Research.

With hindsight, it’s easy to look back and see how our workplaces and cultures could have been better prepared for a year like …

]]>

This is a guest blog post by Dion Hinchcliffe, VP and Principal Analyst at Constellation Research.

With hindsight, it’s easy to look back and see how our workplaces and cultures could have been better prepared for a year like …

]]>
Halvparten av norske ansatte glemmer IT-sikkerheten til tross for advarsel https://www.citrix.com/blogs/2021/05/26/halvparten-av-norske-ansatte-glemmer-it-sikkerheten-til-tross-for-advarsel/ Wed, 26 May 2021 07:00:09 +0000 https://citrixblogs.wpengine.com/?p=174252755

Covid-19-pandemien har gjort at veldig mange har måttet endre arbeidsvaner. Mens hjemmekontor tidligere var noe de fleste hadde unntaksvis – har det nå blitt den nye hverdagen for veldig mange av oss.

For oss som jobber i Citrix er det …

]]>

Covid-19-pandemien har gjort at veldig mange har måttet endre arbeidsvaner. Mens hjemmekontor tidligere var noe de fleste hadde unntaksvis – har det nå blitt den nye hverdagen for veldig mange av oss.

For oss som jobber i Citrix er det …

]]>
Getting security and experience to work together https://www.citrix.com/blogs/2021/05/20/getting-security-and-experience-to-work-together/ Thu, 20 May 2021 19:30:26 +0000 https://citrixblogs.wpengine.com/?p=174252696

Across the Eastern Seaboard, millions of Americans experienced the consequences of compromised cybersecurity. Earlier this month a ransomware attack led to the shutdown of a section of one of the nation’s critical sources of fuel, resulting in gas shortages and …

]]>

Across the Eastern Seaboard, millions of Americans experienced the consequences of compromised cybersecurity. Earlier this month a ransomware attack led to the shutdown of a section of one of the nation’s critical sources of fuel, resulting in gas shortages and …

]]>
How to evaluate security vendors during a security consolidation https://www.citrix.com/blogs/2021/05/19/how-to-evaluate-security-vendors-during-a-security-consolidation/ Wed, 19 May 2021 12:00:17 +0000 https://citrixblogs.wpengine.com/?p=174252661

As you look for ways to support a primarily remote workforce, it’s critical that you modernize your security architecture. Here’s how to choose the optimal security vendors.

As many as 36 million Americans could be working remote by 2025, according …

]]>

As you look for ways to support a primarily remote workforce, it’s critical that you modernize your security architecture. Here’s how to choose the optimal security vendors.

As many as 36 million Americans could be working remote by 2025, according …

]]>
Zero trust, SASE, and what they mean for businesses today https://www.citrix.com/blogs/2021/04/28/zero-trust-sase-and-what-they-mean-for-businesses-today/ Wed, 28 Apr 2021 12:00:05 +0000 https://citrixblogs.wpengine.com/?p=174252343

If you’re in IT, chances are you’ve probably heard the terms zero trust, zero trust network access (ZTNA), and SASE (aka “Sassy”) mentioned recently. For those who haven’t, no doubt you soon will. The question many are asking is …

]]>

If you’re in IT, chances are you’ve probably heard the terms zero trust, zero trust network access (ZTNA), and SASE (aka “Sassy”) mentioned recently. For those who haven’t, no doubt you soon will. The question many are asking is …

]]>
The role of Citrix’s secure access solutions in IT security reskilling https://www.citrix.com/blogs/2021/04/21/the-role-of-citrixs-secure-access-solutions-in-it-security-reskilling/ Wed, 21 Apr 2021 20:15:53 +0000 https://citrixblogs.wpengine.com/?p=174252255

We’ve all heard the alarm bells ringing — organizations around the globe are suffering from a cybersecurity talent gap. While this is a great opportunity for our future leaders, organizations need to cope with the demands of increased cyber threats. …

]]>

We’ve all heard the alarm bells ringing — organizations around the globe are suffering from a cybersecurity talent gap. While this is a great opportunity for our future leaders, organizations need to cope with the demands of increased cyber threats. …

]]>
Help to prevent theft of sensitive data – the easy way https://www.citrix.com/blogs/2021/04/20/help-to-prevent-theft-of-sensitive-data-the-easy-way/ Tue, 20 Apr 2021 12:00:42 +0000 https://citrixblogs.wpengine.com/?p=174252232

In a blog post last November, we looked at the ability of Citrix Secure Workspace Access to provide users with secure access to internal corporate web applications, without relying on VPN servers or open firewall ports, also known as …

]]>

In a blog post last November, we looked at the ability of Citrix Secure Workspace Access to provide users with secure access to internal corporate web applications, without relying on VPN servers or open firewall ports, also known as …

]]>
What’s new with Citrix Workspace – March 2021 https://www.citrix.com/blogs/2021/04/05/whats-new-with-citrix-workspace-march-2021/ Mon, 05 Apr 2021 13:30:14 +0000 https://citrixblogs.wpengine.com/?p=174251906

With each passing month we see an increasing number of Citrix Virtual Apps and Desktops customers transition to Citrix Workspace. Why? The new features and capabilities we’re adding to Citrix Workspace are generating more and more value for our …

]]>

With each passing month we see an increasing number of Citrix Virtual Apps and Desktops customers transition to Citrix Workspace. Why? The new features and capabilities we’re adding to Citrix Workspace are generating more and more value for our …

]]>
How geofencing from Citrix Analytics for Security protects your data https://www.citrix.com/blogs/2021/03/31/how-geofencing-from-citrix-analytics-for-security-protects-your-data/ Wed, 31 Mar 2021 13:00:33 +0000 https://citrixblogs.wpengine.com/?p=174251802

The proliferation of SaaS, web, and cloud-based tools in the workplace has changed how we work. No matter what the job, there seems to be an app or cloud service to make it simpler. While these tools enhance productivity, there …

]]>

The proliferation of SaaS, web, and cloud-based tools in the workplace has changed how we work. No matter what the job, there seems to be an app or cloud service to make it simpler. While these tools enhance productivity, there …

]]>
Citrix + Duo: All cloud, all zero trust https://www.citrix.com/blogs/2021/03/30/citrix-duo-all-cloud-all-zero-trust/ Tue, 30 Mar 2021 13:00:19 +0000 https://citrixblogs.wpengine.com/?p=174251676

This is a guest blog post by Ginger Leishman, Technology Partnerships, at Duo Security.

Every organization today is transforming quickly to support a diversified workforce using a variety of devices to access their network resources, desktops and applications. As organizations …

]]>

This is a guest blog post by Ginger Leishman, Technology Partnerships, at Duo Security.

Every organization today is transforming quickly to support a diversified workforce using a variety of devices to access their network resources, desktops and applications. As organizations …

]]>
The journey to Citrix Workspace and the value along the way https://www.citrix.com/blogs/2021/03/24/the-journey-to-citrix-workspace-and-the-value-along-the-way/ Wed, 24 Mar 2021 16:00:08 +0000 https://citrixblogs.wpengine.com/?p=174251761

Gain value during every step in the journey to Citrix Workspace

A year ago, many of us left our office desks, clutching laptops under one arm and a bag full of desk ornaments and cords under another, thinking we’d be …

]]>

Gain value during every step in the journey to Citrix Workspace

A year ago, many of us left our office desks, clutching laptops under one arm and a bag full of desk ornaments and cords under another, thinking we’d be …

]]>
Enhance Citrix Workspace security, UX with Trusona’s passwordless MFA https://www.citrix.com/blogs/2021/03/11/enhance-citrix-workspace-security-ux-with-trusonas-passwordless-mfa/ Thu, 11 Mar 2021 13:00:54 +0000 https://citrixblogs.wpengine.com/?p=174251426

This is a guest blog post by Simon Berman, Chief Product Officer, Trusona

In today’s enterprise, IT must cater to a remote workforce to provide access to corporate data and applications anytime, anywhere, and from any device over any connection. …

]]>

This is a guest blog post by Simon Berman, Chief Product Officer, Trusona

In today’s enterprise, IT must cater to a remote workforce to provide access to corporate data and applications anytime, anywhere, and from any device over any connection. …

]]>
The tension between effective security and employee experience https://www.citrix.com/blogs/2021/03/11/the-tension-between-effective-security-and-employee-experience/ Thu, 11 Mar 2021 08:30:41 +0000 https://citrixblogs.wpengine.com/?p=174251457

This blog post is based on a webinar, ‘The Tension Between Effective Security and Employee Experience’, which can be viewed in full here. It is the sixth webinar in The New Workspace series. The event featured the insights of

]]>

This blog post is based on a webinar, ‘The Tension Between Effective Security and Employee Experience’, which can be viewed in full here. It is the sixth webinar in The New Workspace series. The event featured the insights of

]]>
TraitWare delivers simple, secure access to Citrix Workspace https://www.citrix.com/blogs/2021/03/10/traitware-delivers-simple-secure-access-to-citrix-workspace/ Wed, 10 Mar 2021 13:00:54 +0000 https://citrixblogs.wpengine.com/?p=174251421

This is a guest blog post by Heath Spencer, CEO of TraitWare.

Citrix continues to empower companies to have better and more secure access to enterprise resources. Now, it has expanded its capabilities and enhanced user experience, efficiency, and …

]]>

This is a guest blog post by Heath Spencer, CEO of TraitWare.

Citrix continues to empower companies to have better and more secure access to enterprise resources. Now, it has expanded its capabilities and enhanced user experience, efficiency, and …

]]>
Citrix ADCs earn accolades for secure hybrid access with Azure identity https://www.citrix.com/blogs/2021/03/02/citrix-adcs-earn-accolades-for-secure-hybrid-access-with-azure-identity/ Tue, 02 Mar 2021 13:00:10 +0000 https://citrixblogs.wpengine.com/?p=174251261

Microsoft has a simple way of gauging which security applications are rising in popularity worldwide. Every year, it tracks which apps were accessed by customers of Azure identity. According to Microsoft’s Active Directory app rankings in 2020, customers chose Citrix

]]>

Microsoft has a simple way of gauging which security applications are rising in popularity worldwide. Every year, it tracks which apps were accessed by customers of Azure identity. According to Microsoft’s Active Directory app rankings in 2020, customers chose Citrix

]]>
The crisis-accelerated digital revolution of work https://www.citrix.com/blogs/2021/02/11/the-crisis-accelerated-digital-revolution-of-work/ Thu, 11 Feb 2021 15:00:41 +0000 https://citrixblogs.wpengine.com/?p=174250912

This is a guest blog post by Dion Hinchcliffe, Vice President and Principal Analyst at Constellation Research. This post originally appeared on the Constellation Research blog.

Over the last year, the world has undergone a true work revolution …

]]>

This is a guest blog post by Dion Hinchcliffe, Vice President and Principal Analyst at Constellation Research. This post originally appeared on the Constellation Research blog.

Over the last year, the world has undergone a true work revolution …

]]>
App Protection is here for Citrix Virtual Apps and Desktops service! https://www.citrix.com/blogs/2021/02/03/app-protection-is-here-for-citrix-virtual-apps-and-desktops-service/ Wed, 03 Feb 2021 14:30:08 +0000 https://citrixblogs.wpengine.com/?p=174250642

This blog post was co-authored by Pratik Shah, Product Management Director.

Last year we introduced App Protection to protect our on-premises Citrix Virtual Apps and Desktops customers. We’re excited to announce that App Protection is now generally available to our …

]]>

This blog post was co-authored by Pratik Shah, Product Management Director.

Last year we introduced App Protection to protect our on-premises Citrix Virtual Apps and Desktops customers. We’re excited to announce that App Protection is now generally available to our …

]]>
The end of zero-day VPN attacks with zero trust https://www.citrix.com/blogs/2021/01/27/the-end-of-zero-day-vpn-attacks-with-zero-trust/ Wed, 27 Jan 2021 20:30:45 +0000 https://citrixblogs.wpengine.com/?p=174250532

Every day hundreds of organizations are breached in an attempt to steal corporate secrets and personally identifiable data. The most prolific attacks end up on the mainstream media. Still, countless data breaches go unnoticed by the media or even by …

]]>

Every day hundreds of organizations are breached in an attempt to steal corporate secrets and personally identifiable data. The most prolific attacks end up on the mainstream media. Still, countless data breaches go unnoticed by the media or even by …

]]>
Simplifying the zero trust security discussion https://www.citrix.com/blogs/2020/12/21/simplifying-the-zero-trust-security-discussion/ Mon, 21 Dec 2020 15:00:03 +0000 https://citrixblogs.wpengine.com/?p=174250081

Zero trust is not a product or a solution. Zero trust is the concept that trust between people and access must be constantly earned.”

That line comes from an insightful series of Citrix blog posts describing zero trust …

]]>

Zero trust is not a product or a solution. Zero trust is the concept that trust between people and access must be constantly earned.”

That line comes from an insightful series of Citrix blog posts describing zero trust …

]]>
What’s new with Citrix Virtual Apps and Desktops – December 2020 https://www.citrix.com/blogs/2020/12/14/whats-new-with-citrix-virtual-apps-and-desktops-december-2020/ Mon, 14 Dec 2020 18:30:59 +0000 https://citrixblogs.wpengine.com/?p=174249937

As we approach the end of this unprecedented year, Citrix continues to work hard to help our customers adapt to business challenges and securely deploy a digital workspace with confidence. We enthusiastically announce the rollout of our latest features and …

]]>

As we approach the end of this unprecedented year, Citrix continues to work hard to help our customers adapt to business challenges and securely deploy a digital workspace with confidence. We enthusiastically announce the rollout of our latest features and …

]]>
El año del cambio, el año de la pandemitalización https://www.citrix.com/blogs/2020/12/09/el-ano-del-cambio-el-ano-de-la-pandemitalizacion/ Wed, 09 Dec 2020 09:00:13 +0000 https://citrixblogs.wpengine.com/?p=174249857

2020, un año que cambiará nuestras vidas. Veníamos diciendo que el mundo había cambiado desde hacía unos años y que la velocidad de cambio era cada vez mayor, reflejándose a través de la trasformación digital de las organizaciones, tanto públicas …

]]>

2020, un año que cambiará nuestras vidas. Veníamos diciendo que el mundo había cambiado desde hacía unos años y que la velocidad de cambio era cada vez mayor, reflejándose a través de la trasformación digital de las organizaciones, tanto públicas …

]]>
Feature Spotlight: Citrix Secure Workspace Access – Part 3 https://www.citrix.com/blogs/2020/11/18/feature-spotlight-citrix-secure-workspace-access-part-3/ Wed, 18 Nov 2020 19:00:21 +0000 https://citrixblogs.wpengine.com/?p=174249459

In Part 2 of our series on Citrix Secure Workspace Access, we looked at how Citrix enables multi-factor authentication (MFA), single sign-on (SSO) with contextual access, and secure unified access web and SaaS apps.

In Part 3, we’ll look …

]]>

In Part 2 of our series on Citrix Secure Workspace Access, we looked at how Citrix enables multi-factor authentication (MFA), single sign-on (SSO) with contextual access, and secure unified access web and SaaS apps.

In Part 3, we’ll look …

]]>
Healthcare leaders provide security insights for 2021 https://www.citrix.com/blogs/2020/11/16/healthcare-leaders-provide-security-insights-for-2021/ Mon, 16 Nov 2020 15:15:07 +0000 https://citrixblogs.wpengine.com/?p=174249380

Under the best of circumstances, information security in healthcare is challenging. With HIPAA requirements guiding an organization’s operational policies and architectural designs, safeguarding protected health information (PHI) is a perpetual priority.

These are not the best of circumstances. With fallout …

]]>

Under the best of circumstances, information security in healthcare is challenging. With HIPAA requirements guiding an organization’s operational policies and architectural designs, safeguarding protected health information (PHI) is a perpetual priority.

These are not the best of circumstances. With fallout …

]]>
ワークスペースの安全を確保し、従業員を守る https://www.citrix.com/blogs/2020/11/12/keep-workplace-safe-protect-employees-jp/ Fri, 13 Nov 2020 03:00:14 +0000 https://citrixblogs.wpengine.com/?p=174249343

10月29日にCitrix Security Summitが開催されました。バーチャルイベントとして開催された今回のサミットでは様々は発表があり、今回のブログではCitrix Security Summitで公開されたCitrixのクラウド戦略について、ご説明します。

Citrixは、従業員が生産性を高めるために必要なアプリケーションを安全かつ一貫して提供するためのパートナーとして、長い間信頼されてきました。しかし、従業員とアプリケーションの両方を保護することは容易ではありません。まず、CitrixのCEO、David Henshallによるセキュリティの概要を説明するセッションでは、お客様の組織に最適な方法で従業員とアプリケーションのセキュリティを確保するために、Citrixがどのようにイノベーションを行っているかを紹介しています。

Citrixのセキュリティ戦略:概要
過去10年の間に、企業がセキュリティを確保したいアプリケーションの種類は、データセンターやデスクトップ上で実行されるものから、モバイルアプリケーション、ウェブアプリケーション、SaaSアプリケーション、その他のサードパーティのサービスにまで広がってきました。

新しいワークモデルは機会を生み出し、攻撃の対象となる可能性を高めています。しかし、個々のアプリやデバイスを保護するために設計されたツールの導入と統合は、一貫性のないセキュリティポリシー、コストと複雑さの増大、ユーザーエクスペリエンスの低下をもたらしています。

Citrixは、ワークスペースを保護することでユーザーを保護し、統合されたアクセスセキュリティとアプリ制御を備えた安全なコンテナを提供することで、データの漏洩を防ぎ、エンドポイントの脅威からユーザーを保護します。ユーザーやアプリケーションにおいて、何も信用しないというゼロトラストの理念に基づき、ユーザーがより多くの有効な検証を提示すればするほど、信頼度が高まり、より多くのアクセスを与えることができる環境を実現しています。

これは、一度侵入すればすべてにアクセスが可能なVPNのアプローチとは異なります。ゼロトラストモデルでは、相応なタイミングでそのアプリケーションに適切なアクセスを提供するために、ユーザーやデバイスの信頼性を継続的にリスクベースで分析し、評価することができます。

しかし、ゼロトラストを単独で行うことはできません。そのためには、包括的なパートナーエコシステムが必要です。たとえば、Citrix Ready Workspace Security Programでは、アプリケーションとネットワークセキュリティ、分析と可視性、データとデバイスのセキュリティなど、さまざまな統合の互換性に対応しています。

Secure Workspace AccessCitrix Endpoint ManagementCitrix Analytics for Securityと統合されたゼロトラスト原則を用いたパートナーソリューションで、このプログラムを拡大することを発表できることを嬉しく思います。これにより、お客様は既存の投資を活用してゼロトラストの成果を実現しながら、セキュリティベンダーの選択を簡易化することができます。

私たちは、CiscoGoogle Cloud、…

]]>

10月29日にCitrix Security Summitが開催されました。バーチャルイベントとして開催された今回のサミットでは様々は発表があり、今回のブログではCitrix Security Summitで公開されたCitrixのクラウド戦略について、ご説明します。

Citrixは、従業員が生産性を高めるために必要なアプリケーションを安全かつ一貫して提供するためのパートナーとして、長い間信頼されてきました。しかし、従業員とアプリケーションの両方を保護することは容易ではありません。まず、CitrixのCEO、David Henshallによるセキュリティの概要を説明するセッションでは、お客様の組織に最適な方法で従業員とアプリケーションのセキュリティを確保するために、Citrixがどのようにイノベーションを行っているかを紹介しています。

Citrixのセキュリティ戦略:概要
過去10年の間に、企業がセキュリティを確保したいアプリケーションの種類は、データセンターやデスクトップ上で実行されるものから、モバイルアプリケーション、ウェブアプリケーション、SaaSアプリケーション、その他のサードパーティのサービスにまで広がってきました。

新しいワークモデルは機会を生み出し、攻撃の対象となる可能性を高めています。しかし、個々のアプリやデバイスを保護するために設計されたツールの導入と統合は、一貫性のないセキュリティポリシー、コストと複雑さの増大、ユーザーエクスペリエンスの低下をもたらしています。

Citrixは、ワークスペースを保護することでユーザーを保護し、統合されたアクセスセキュリティとアプリ制御を備えた安全なコンテナを提供することで、データの漏洩を防ぎ、エンドポイントの脅威からユーザーを保護します。ユーザーやアプリケーションにおいて、何も信用しないというゼロトラストの理念に基づき、ユーザーがより多くの有効な検証を提示すればするほど、信頼度が高まり、より多くのアクセスを与えることができる環境を実現しています。

これは、一度侵入すればすべてにアクセスが可能なVPNのアプローチとは異なります。ゼロトラストモデルでは、相応なタイミングでそのアプリケーションに適切なアクセスを提供するために、ユーザーやデバイスの信頼性を継続的にリスクベースで分析し、評価することができます。

しかし、ゼロトラストを単独で行うことはできません。そのためには、包括的なパートナーエコシステムが必要です。たとえば、Citrix Ready Workspace Security Programでは、アプリケーションとネットワークセキュリティ、分析と可視性、データとデバイスのセキュリティなど、さまざまな統合の互換性に対応しています。

Secure Workspace AccessCitrix Endpoint ManagementCitrix Analytics for Securityと統合されたゼロトラスト原則を用いたパートナーソリューションで、このプログラムを拡大することを発表できることを嬉しく思います。これにより、お客様は既存の投資を活用してゼロトラストの成果を実現しながら、セキュリティベンダーの選択を簡易化することができます。

私たちは、CiscoGoogle Cloud、…

]]>
Feature Spotlight: Citrix Secure Workspace Access – Part 1 https://www.citrix.com/blogs/2020/11/03/feature-spotlight-citrix-secure-workspace-access-part-1/ Tue, 03 Nov 2020 19:00:31 +0000 https://citrixblogs.wpengine.com/?p=174249115

The changes in the way we work have been happening for a while. But now they’ve been accelerated by a global pandemic that has pushed organizations to rapidly move digital transformation forward.

At the same time, the millennials, a digital-savvy …

]]>

The changes in the way we work have been happening for a while. But now they’ve been accelerated by a global pandemic that has pushed organizations to rapidly move digital transformation forward.

At the same time, the millennials, a digital-savvy …

]]>
Secure workspaces anywhere to keep business running as usual https://www.citrix.com/blogs/2020/11/03/secure-workspaces-anywhere-to-keep-business-running-as-usual/ Tue, 03 Nov 2020 13:00:24 +0000 https://citrixblogs.wpengine.com/?p=174249061

This is a guest blog post by Avishag Daniely, Director of Product Marketing, at Guardicore.

Remote working is powering the new normal, and virtual apps and desktops infrastructure is doing a great job of helping to facilitate that shift. …

]]>

This is a guest blog post by Avishag Daniely, Director of Product Marketing, at Guardicore.

Remote working is powering the new normal, and virtual apps and desktops infrastructure is doing a great job of helping to facilitate that shift. …

]]>
Adding zero trust to the Citrix Ready Workspace Security Program https://www.citrix.com/blogs/2020/11/02/adding-zero-trust-to-the-citrix-ready-workspace-security-program/ Mon, 02 Nov 2020 14:00:13 +0000 https://citrixblogs.wpengine.com/?p=174249048

Work today is happening everywhere on everything from corporate issued laptops and mobile devices to personal tablets and even smartwatches. While this new-found freedom has given a major boost to productivity and innovation, it has also raised a new set …

]]>

Work today is happening everywhere on everything from corporate issued laptops and mobile devices to personal tablets and even smartwatches. While this new-found freedom has given a major boost to productivity and innovation, it has also raised a new set …

]]>
A unified approach to SASE that starts with the digital workspace https://www.citrix.com/blogs/2020/10/29/a-unified-approach-to-sase-that-starts-with-the-digital-workspace/ Thu, 29 Oct 2020 12:30:47 +0000 https://citrixblogs.wpengine.com/?p=174248901

With 100 million users in over 100 countries, Citrix has earned a leadership position in digital workspace solutions.

In the evolution of applications, we have enabled IT teams to become more agile by delivering a Citrix Workspace from the …

]]>

With 100 million users in over 100 countries, Citrix has earned a leadership position in digital workspace solutions.

In the evolution of applications, we have enabled IT teams to become more agile by delivering a Citrix Workspace from the …

]]>
Announcing Citrix Secure Workspace Access for zero trust access https://www.citrix.com/blogs/2020/10/29/announcing-citrix-secure-workspace-access-for-zero-trust-access/ Thu, 29 Oct 2020 12:01:16 +0000 https://citrixblogs.wpengine.com/?p=174248923

A new Pulse and Citrix survey revealed that 71 percent of security executives are looking at replacing their traditional VPN technology with a zero trust offering.

Citrix has long been a leader in providing secure remote access to employees working …

]]>

A new Pulse and Citrix survey revealed that 71 percent of security executives are looking at replacing their traditional VPN technology with a zero trust offering.

Citrix has long been a leader in providing secure remote access to employees working …

]]>