Search Results for “citrix-secure-private-access” – Citrix Blogs https://www.citrix.com/blogs Official Citrix Blogs Thu, 10 Jul 2025 13:49:50 +0000 en-US hourly 1 https://wordpress.org/?v=6.8.1 Citrix と Google Chrome Enterprise Premium であなたのビジネスをセキュアに https://www.citrix.com/blogs/2025/06/17/secure-your-business-with-citrix-and-google-chrome-enterprise-premium-jp/ Tue, 17 Jun 2025 14:23:54 +0000 https://www.citrix.com/blogs/?p=174261944

今日のハイブリッドワーク環境では、ビジネスを支えるアプリケーションへのセキュアかつ柔軟なアクセスが求められます。
今年に入り、Citrix は Google とのパートナーシップをさらに強化し、お客様のビジネス目標達成を支援することを発表しました。
そしてこのたび、Citrix と Google Chrome Enterprise Premium の連携による、拡大されたパートナーシップの第一弾となる統合が実現し、このビジョンが大きく前進したことをお知らせします。

この統合は、プライベート Web アプリケーションのセキュリティにおいて画期的な変化をもたらします。
最も信頼されているエンタープライズブラウザと Citrix Secure Private Access™ を組み合わせることで、IT チームは複雑なセキュリティインフラを必要とせずに、プライベート Web、SaaS、レガシーアプリケーションへのゼロトラストアクセスを実現できます。

組織にもたらす即時のメリット

信頼性の低い VPN などに頼ることなく、すべてのエンタープライズアプリケーションへのセキュアなアクセスの提供と管理を、使い慣れた Chrome ブラウザで実現できます。
さらにこのソリューションには、他社では追加オプションとして提供されるサポートやサービスも含まれています。

以下は、この統合ソリューションの主なメリットです:

コスト効率に優れたセキュリティ

従来の仮想デスクトップインフラ(VDI)にかかるコストや複雑さを軽減しながら、Web アプリケーションに対して包括的でセキュアなアクセスとデータ保護を提供します。
すべてをプラットフォームライセンスでカバーできるため、コスト削減と運用負荷の軽減が可能です。

セキュリティ体制の強化

Chrome

]]>

今日のハイブリッドワーク環境では、ビジネスを支えるアプリケーションへのセキュアかつ柔軟なアクセスが求められます。
今年に入り、Citrix は Google とのパートナーシップをさらに強化し、お客様のビジネス目標達成を支援することを発表しました。
そしてこのたび、Citrix と Google Chrome Enterprise Premium の連携による、拡大されたパートナーシップの第一弾となる統合が実現し、このビジョンが大きく前進したことをお知らせします。

この統合は、プライベート Web アプリケーションのセキュリティにおいて画期的な変化をもたらします。
最も信頼されているエンタープライズブラウザと Citrix Secure Private Access™ を組み合わせることで、IT チームは複雑なセキュリティインフラを必要とせずに、プライベート Web、SaaS、レガシーアプリケーションへのゼロトラストアクセスを実現できます。

組織にもたらす即時のメリット

信頼性の低い VPN などに頼ることなく、すべてのエンタープライズアプリケーションへのセキュアなアクセスの提供と管理を、使い慣れた Chrome ブラウザで実現できます。
さらにこのソリューションには、他社では追加オプションとして提供されるサポートやサービスも含まれています。

以下は、この統合ソリューションの主なメリットです:

コスト効率に優れたセキュリティ

従来の仮想デスクトップインフラ(VDI)にかかるコストや複雑さを軽減しながら、Web アプリケーションに対して包括的でセキュアなアクセスとデータ保護を提供します。
すべてをプラットフォームライセンスでカバーできるため、コスト削減と運用負荷の軽減が可能です。

セキュリティ体制の強化

Chrome

]]>
Secure your business with Citrix and Google Chrome Enterprise Premium https://www.citrix.com/blogs/2025/06/17/secure-your-business-with-citrix-and-google-chrome-enterprise-premium/ Tue, 17 Jun 2025 13:00:36 +0000 https://www.citrix.com/blogs/?p=174261938

In today’s hybrid work environment, your team needs flexible, secure access to the applications that keep your business running. Earlier this year, we announced a deepened partnership with Google to help your business achieve that goal. And now we are

]]>

In today’s hybrid work environment, your team needs flexible, secure access to the applications that keep your business running. Earlier this year, we announced a deepened partnership with Google to help your business achieve that goal. And now we are

]]>
Citrixプラットフォーム 2025 https://www.citrix.com/blogs/2025/05/01/citrix-platform-2025-jp/ Thu, 01 May 2025 15:48:51 +0000 https://www.citrix.com/blogs/?p=174261796

Citrixプラットフォーム宣言から1年、プラットフォームはどう進化したのか?プラットフォームはお客様のビジネスにどのように貢献するのか?2025年のCitrixプラットフォームを解説します。

Citrixプラットフォームの全体像

業務遂行の中核はアプリケーションを使ってデータ(コンテンツ)を生成・処理すること。PCなどのデバイスを操作し、ネットワークを経由して業務アプリケーションとデータを利用するための包括的な環境をワークスペースとして提供するのがCitrixプラットフォームです。

An overview of the Citrix platform components in Japanese

画面転送によるアプリケーション仮想化およびデスクトップ仮想化(Citrix Virtual Apps and DesktopsおよびCitrix DaaS
主にWindowsアプリケーションとデスクトップをユーザーデバイスへ画面転送し、遠隔操作によって利用。シンクライアントシステムとしても絶大な信頼があります。

ZTNA型のセキュアなアクセス(Citrix Secure Private Access
TCP/UDPベースのレガシーな業務アプリケーション、またSaaSを含むWebアプリケーションへのセキュアなアクセス。VPNを代替します。

セキュアなWebブラウザ(Chrome Enterprise Premium*)
SaaS/Webアプリケーションへアクセスする、セキュリティを強化したエンタープライズ向けのブラウザ。

これら3つのセキュアアクセスを軸に、負荷を最適化しセキュアで効率的なアプリケーション配信を行うネットワーク機能、モバイルアプリケーション・デバイスの管理、システムとしてすべてをコンロールする一元管理、システムをオンプレミス・クラウドに展開する仕組み等をまとめて提供します。更に、全社ITの中で他のシステムと連携する必要性にも対応します。

* 2025年3月、Googleとのパートナーシップにより、Citrixプラットフォームに統合。Citrix Platform Licenseに組み込まれ、追加コストなく利用可能。

Citrix =VDIではない

VDI(画面転送によるデスクトップ仮想化)はCitrixのコアテクノロジーですが、CitrixはVDIだけを提供しているのではないのです。
大半の業務アプリケーションがWebベースになっていることを背景に、セキュアブラウザとZTNA型アクセスの重要性が急速に高まっています。Citrixではこのトレンドを踏まえた開発投資を行なっており、VDIでは過剰かもしれない業務、新しいユースケースに、セキュアブラウザやZTNA型アクセスを提供しています。
Citrixは、3つのセキュアアクセスのテクノロジーを軸にこれらを最適化し、セキュリティを強化し、システムとしての適応性も備えているのです。VDI以外の重要なポイントをまとめます。

アプリケーション仮想化 (Citrix

]]>

Citrixプラットフォーム宣言から1年、プラットフォームはどう進化したのか?プラットフォームはお客様のビジネスにどのように貢献するのか?2025年のCitrixプラットフォームを解説します。

Citrixプラットフォームの全体像

業務遂行の中核はアプリケーションを使ってデータ(コンテンツ)を生成・処理すること。PCなどのデバイスを操作し、ネットワークを経由して業務アプリケーションとデータを利用するための包括的な環境をワークスペースとして提供するのがCitrixプラットフォームです。

An overview of the Citrix platform components in Japanese

画面転送によるアプリケーション仮想化およびデスクトップ仮想化(Citrix Virtual Apps and DesktopsおよびCitrix DaaS
主にWindowsアプリケーションとデスクトップをユーザーデバイスへ画面転送し、遠隔操作によって利用。シンクライアントシステムとしても絶大な信頼があります。

ZTNA型のセキュアなアクセス(Citrix Secure Private Access
TCP/UDPベースのレガシーな業務アプリケーション、またSaaSを含むWebアプリケーションへのセキュアなアクセス。VPNを代替します。

セキュアなWebブラウザ(Chrome Enterprise Premium*)
SaaS/Webアプリケーションへアクセスする、セキュリティを強化したエンタープライズ向けのブラウザ。

これら3つのセキュアアクセスを軸に、負荷を最適化しセキュアで効率的なアプリケーション配信を行うネットワーク機能、モバイルアプリケーション・デバイスの管理、システムとしてすべてをコンロールする一元管理、システムをオンプレミス・クラウドに展開する仕組み等をまとめて提供します。更に、全社ITの中で他のシステムと連携する必要性にも対応します。

* 2025年3月、Googleとのパートナーシップにより、Citrixプラットフォームに統合。Citrix Platform Licenseに組み込まれ、追加コストなく利用可能。

Citrix =VDIではない

VDI(画面転送によるデスクトップ仮想化)はCitrixのコアテクノロジーですが、CitrixはVDIだけを提供しているのではないのです。
大半の業務アプリケーションがWebベースになっていることを背景に、セキュアブラウザとZTNA型アクセスの重要性が急速に高まっています。Citrixではこのトレンドを踏まえた開発投資を行なっており、VDIでは過剰かもしれない業務、新しいユースケースに、セキュアブラウザやZTNA型アクセスを提供しています。
Citrixは、3つのセキュアアクセスのテクノロジーを軸にこれらを最適化し、セキュリティを強化し、システムとしての適応性も備えているのです。VDI以外の重要なポイントをまとめます。

アプリケーション仮想化 (Citrix

]]>
Citrix + Windows 365を本気で展開 その付加価値とは? https://www.citrix.com/blogs/2025/04/14/citrix-windows365-value/ Mon, 14 Apr 2025 14:54:19 +0000 https://www.citrix.com/blogs/?p=174261769

2024年前半、CitrixとMicrosoftは両社の協業を深め、クラウドおよびAIソリューションの開発を支援するための8年間の戦略的提携を結びました。

そしてMicrosoft Ignite 2024での発表を受け、CitrixはAzure Virtual DesktopおよびWindows 365の機能を拡張して、お客様の業務環境(= モダンワークプレイス)を更に効率よくセキュアにすべく支援を強化します。特にCitrixとWindows 365の統合運用にフォーカスし、Citrixが新たに提供する付加価値を解説します。

仮想化、ZTNAによるモダンワークプレイス実現

DX推進、生成AIの企業IT適用など優先事項が変化する中で、お客様の現状はより複雑になっています。デバイスの進化、ユーザーロケーションの増加、業務アプリケーションの多様化、入り混じるシステムの境界等に対処し、モダンワークプレイスを確立することは企業戦略を実行するための基盤と言えるでしょう。

Microsoft Azureクラウド、Azure Virtual DesktopおよびWindows 365はこの基盤であり、Citrixは以前からの仮想化テクノロジーに加え、ゼロトラストネットワークアクセス(ZTNA)機能でセキュリティを強化し、優れたエクスペリエンスと統合管理を付加します。

詳細に入る前に、Azure Virtual DesktopとWindows 365の違いを整理します。

A Citrix and Windows 365 chart in Japanese

One size fits all型のWindows 365は、決まったデスクトップイメージを一斉に効率よく展開するDaaSであり、Citrixがユーザーエクスペリエンスとセキュリティを補強することで理想のVDIの展開、運用・管理が実現します。

Citrix + Windows 365ユーザー向けの新しいライセンス

Citrixのお客様で、Windows 365を利用可能なMicrosoftライセンスを取得しているユーザー企業に対して、数量無制限のWindows 365 クラウド PC に Citrix を統合できる新しいライセンスを導入します。追加費用は発生しません。これにより、HDXテクノロジー

]]>

2024年前半、CitrixとMicrosoftは両社の協業を深め、クラウドおよびAIソリューションの開発を支援するための8年間の戦略的提携を結びました。

そしてMicrosoft Ignite 2024での発表を受け、CitrixはAzure Virtual DesktopおよびWindows 365の機能を拡張して、お客様の業務環境(= モダンワークプレイス)を更に効率よくセキュアにすべく支援を強化します。特にCitrixとWindows 365の統合運用にフォーカスし、Citrixが新たに提供する付加価値を解説します。

仮想化、ZTNAによるモダンワークプレイス実現

DX推進、生成AIの企業IT適用など優先事項が変化する中で、お客様の現状はより複雑になっています。デバイスの進化、ユーザーロケーションの増加、業務アプリケーションの多様化、入り混じるシステムの境界等に対処し、モダンワークプレイスを確立することは企業戦略を実行するための基盤と言えるでしょう。

Microsoft Azureクラウド、Azure Virtual DesktopおよびWindows 365はこの基盤であり、Citrixは以前からの仮想化テクノロジーに加え、ゼロトラストネットワークアクセス(ZTNA)機能でセキュリティを強化し、優れたエクスペリエンスと統合管理を付加します。

詳細に入る前に、Azure Virtual DesktopとWindows 365の違いを整理します。

A Citrix and Windows 365 chart in Japanese

One size fits all型のWindows 365は、決まったデスクトップイメージを一斉に効率よく展開するDaaSであり、Citrixがユーザーエクスペリエンスとセキュリティを補強することで理想のVDIの展開、運用・管理が実現します。

Citrix + Windows 365ユーザー向けの新しいライセンス

Citrixのお客様で、Windows 365を利用可能なMicrosoftライセンスを取得しているユーザー企業に対して、数量無制限のWindows 365 クラウド PC に Citrix を統合できる新しいライセンスを導入します。追加費用は発生しません。これにより、HDXテクノロジー

]]>
CitrixとNVIDIAが提携し、AI仮想ワークステーションを提供 https://www.citrix.com/blogs/2025/03/19/citrix-and-nvidia-partner-to-deliver-ai-virtual-workstations-jp/ Wed, 19 Mar 2025 14:00:54 +0000 https://www.citrix.com/blogs/?p=174261934

2025年3月開催のCitrix UNITEで、NVIDIAとの新たなコラボレーションを発表しました。Citrix DaaS™とNVIDIA 仮想GPU(vGPU)をもって構成するAI仮想ワークステーションを提供し、AIアプリケーションをセキュアにコスト効率よく、開発・試作できるよう支援します。


Citrixと共にAI戦略を強化

その黎明期から進化を遂げ、現在ではAIが多くの企業で活用されています。実際、既に50%以上の企業が生成AIや予測AIを導入しています。Citrixの顧客は、Citrix DaaSとともにNVIDIA RTX仮想ワークステーションを導入することで、AIアプリケーションの開発、試作、提供を加速しつつ、セキュリティ、コスト削減、スケーラビリティ、パフォーマンスの面でメリットを実感することができます。


仕組み

多くの企業が現在、複数のAIアプリケーションを試作している段階ですが、概念実証(POC)フェイズでは、データの所在、セキュリティ、コストといった課題が浮上し、実運用への移行やビジネス価値の実現を妨げるケースが多く見られます。AIアプリケーションの開発には多大なコストがかかり、時間もかかる上、セキュリティとコンプライアンス要件も厳格です。医療、金融、政府機関などの高度に規制された業界の顧客は、35年以上にわたりCitrixにこのような課題解決を委ねてきました。NVIDIAとのコラボレーションにより、CitrixはAI分野においても、ビジネスの俊敏性を加速させる主要プラットフォームとして改めて存在感を発揮します。

Citrix DaaSとNVIDIA RTX仮想ワークステーションの組み合わせにより、既存のセキュアインフラ上でAIアプリケーションの開発、POC、配備がセキュアにできるようになります。これにより、機密情報がパブリックな大規模言語モデル(LLM)に漏洩するリスクを最小限に抑えるとともに、GPUを活用して大幅な効率化とコスト削減を実現できます。


CitrixのAI対応ソリューションによる利点:

  • AI関連開発作業のセキュリティ強化:Citrix® プラットフォームが提供するゼロトラスト・ネットワーク・アクセス(ZTNA)などの高度なセキュリティポリシーを活用し、AIモデルを保護し、プラットフォームの可視性を高めてAIシステムを脅威から守ります。
  • AIワークロードの分離:仮想化された分離環境で実行することで、アウトバウンド通信の制御が可能となり、攻撃対象領域を縮小し、悪意あるソフトウェアやマルウェアの拡散を防止します。
  • コストと時間の削減、スケーラビリティの確保:既存GPUリソースの仮想化により、GPUの調達を待つ必要がなくなり、AI開発者に高性能_セキュアなコンピューティング環境を提供します。

Citrix顧客がすぐに実感するメリット

既にNVIDIA GPUを搭載したサーバーでCitrix DaaSを運用している多くの顧客にとって、このコラボレーションは既存の環境を活用し、AIアプリケーションの開発やPOC、導入をよりセキュアでコスト効率良く実現する機会を提供します。

両社のパートナーシップにより、以下のようにAIアプリケーション戦略を進めることが可能となります:

  • かつてない安心感:データや機密情報が外部のLLMに漏洩する心配がなく、安心してAI戦略を展開できます。
  • GPU投資のさらなる価値向上:既存のCitrix環境で稼働しているGPUを活用することで、より効率的にAIアプリケーションの開発・試作・POCを実施可能です。新たなAIプラットフォームの検証に要するIT部門の負担も軽減されます。
  • セキュリティの強化:ユーザーはCitrixプラットフォーム内で、セキュアにAIアプリケーションにアクセスし運用します。
…]]>

2025年3月開催のCitrix UNITEで、NVIDIAとの新たなコラボレーションを発表しました。Citrix DaaS™とNVIDIA 仮想GPU(vGPU)をもって構成するAI仮想ワークステーションを提供し、AIアプリケーションをセキュアにコスト効率よく、開発・試作できるよう支援します。


Citrixと共にAI戦略を強化

その黎明期から進化を遂げ、現在ではAIが多くの企業で活用されています。実際、既に50%以上の企業が生成AIや予測AIを導入しています。Citrixの顧客は、Citrix DaaSとともにNVIDIA RTX仮想ワークステーションを導入することで、AIアプリケーションの開発、試作、提供を加速しつつ、セキュリティ、コスト削減、スケーラビリティ、パフォーマンスの面でメリットを実感することができます。


仕組み

多くの企業が現在、複数のAIアプリケーションを試作している段階ですが、概念実証(POC)フェイズでは、データの所在、セキュリティ、コストといった課題が浮上し、実運用への移行やビジネス価値の実現を妨げるケースが多く見られます。AIアプリケーションの開発には多大なコストがかかり、時間もかかる上、セキュリティとコンプライアンス要件も厳格です。医療、金融、政府機関などの高度に規制された業界の顧客は、35年以上にわたりCitrixにこのような課題解決を委ねてきました。NVIDIAとのコラボレーションにより、CitrixはAI分野においても、ビジネスの俊敏性を加速させる主要プラットフォームとして改めて存在感を発揮します。

Citrix DaaSとNVIDIA RTX仮想ワークステーションの組み合わせにより、既存のセキュアインフラ上でAIアプリケーションの開発、POC、配備がセキュアにできるようになります。これにより、機密情報がパブリックな大規模言語モデル(LLM)に漏洩するリスクを最小限に抑えるとともに、GPUを活用して大幅な効率化とコスト削減を実現できます。


CitrixのAI対応ソリューションによる利点:

  • AI関連開発作業のセキュリティ強化:Citrix® プラットフォームが提供するゼロトラスト・ネットワーク・アクセス(ZTNA)などの高度なセキュリティポリシーを活用し、AIモデルを保護し、プラットフォームの可視性を高めてAIシステムを脅威から守ります。
  • AIワークロードの分離:仮想化された分離環境で実行することで、アウトバウンド通信の制御が可能となり、攻撃対象領域を縮小し、悪意あるソフトウェアやマルウェアの拡散を防止します。
  • コストと時間の削減、スケーラビリティの確保:既存GPUリソースの仮想化により、GPUの調達を待つ必要がなくなり、AI開発者に高性能_セキュアなコンピューティング環境を提供します。

Citrix顧客がすぐに実感するメリット

既にNVIDIA GPUを搭載したサーバーでCitrix DaaSを運用している多くの顧客にとって、このコラボレーションは既存の環境を活用し、AIアプリケーションの開発やPOC、導入をよりセキュアでコスト効率良く実現する機会を提供します。

両社のパートナーシップにより、以下のようにAIアプリケーション戦略を進めることが可能となります:

  • かつてない安心感:データや機密情報が外部のLLMに漏洩する心配がなく、安心してAI戦略を展開できます。
  • GPU投資のさらなる価値向上:既存のCitrix環境で稼働しているGPUを活用することで、より効率的にAIアプリケーションの開発・試作・POCを実施可能です。新たなAIプラットフォームの検証に要するIT部門の負担も軽減されます。
  • セキュリティの強化:ユーザーはCitrixプラットフォーム内で、セキュアにAIアプリケーションにアクセスし運用します。
…]]>
Citrix and NVIDIA partner to deliver AI Virtual Workstations https://www.citrix.com/blogs/2025/03/19/citrix-and-nvidia-partner-to-deliver-ai-virtual-workstations/ Wed, 19 Mar 2025 08:00:01 +0000 https://www.citrix.com/blogs/?p=174261742

As we head into the second half of our week at Citrix UNITE, our annual sales kickoff event happening in New Orleans, LA, the good times keep rolling and so do the exciting announcements. Following yesterday’s news, today we

]]>

As we head into the second half of our week at Citrix UNITE, our annual sales kickoff event happening in New Orleans, LA, the good times keep rolling and so do the exciting announcements. Following yesterday’s news, today we

]]>
Welcoming Google Chrome Enterprise Premium into the Citrix platform https://www.citrix.com/blogs/2025/03/18/welcoming-google-chrome-enterprise-premium-into-the-citrix-platform/ Tue, 18 Mar 2025 15:00:55 +0000 https://www.citrix.com/blogs/?p=174261741

Citrix UNITE, our annual sales kickoff event, is taking place this week in the historic city of New Orleans, LA, and coming out of the event we are excited to be making our own history with our good friends at

]]>

Citrix UNITE, our annual sales kickoff event, is taking place this week in the historic city of New Orleans, LA, and coming out of the event we are excited to be making our own history with our good friends at

]]>
Citrix Secure Private Access delivers ZTNA in hybrid mode https://www.citrix.com/blogs/2024/12/13/citrix-secure-private-access-for-hybrid-deployments/ Fri, 13 Dec 2024 06:30:39 +0000 https://www.citrix.com/blogs/?p=174261642

IT organizations seeking to implement zero trust network access (ZTNA) often encounter operational challenges that prevent adoption and successful rollouts beyond the pilot phase. To achieve success with ZTNA, they require more than just a feature-rich, best-of-breed solution that promises

]]>

IT organizations seeking to implement zero trust network access (ZTNA) often encounter operational challenges that prevent adoption and successful rollouts beyond the pilot phase. To achieve success with ZTNA, they require more than just a feature-rich, best-of-breed solution that promises

]]>
Citrix strengthens zero trust security posture with strategic acquisitions of deviceTRUST and Strong Network https://www.citrix.com/blogs/2024/12/10/citrix-acquires-devicetrust-and-strong-network/ Tue, 10 Dec 2024 14:00:36 +0000 https://www.citrix.com/blogs/?p=174261633

Here at Citrix we understand that the rise of hybrid work models presents new security challenges. Just as you have within your organizations, I too have seen the tides changing over the last several years, and I think we can

]]>

Here at Citrix we understand that the rise of hybrid work models presents new security challenges. Just as you have within your organizations, I too have seen the tides changing over the last several years, and I think we can

]]>
Citrix Secure Private Access now supports multi-session VDI https://www.citrix.com/blogs/2024/11/19/citrix-secure-private-access-now-supports-multi-session-vdi/ Tue, 19 Nov 2024 13:07:26 +0000 https://www.citrix.com/blogs/?p=174261582

Today, we’re excited to announce the launch of Citrix Secure Private Access for multi-session virtual desktop infrastructure (VDI), a comprehensive solution designed to protect user privacy and data while ensuring seamless and secure remote access for all users regardless of

]]>

Today, we’re excited to announce the launch of Citrix Secure Private Access for multi-session virtual desktop infrastructure (VDI), a comprehensive solution designed to protect user privacy and data while ensuring seamless and secure remote access for all users regardless of

]]>
Citrix Secure Private Access for ZTNA now supports Linux https://www.citrix.com/blogs/2024/11/14/citrix-secure-private-access-for-ztna-now-supports-linux/ Thu, 14 Nov 2024 14:25:22 +0000 https://www.citrix.com/blogs/?p=174261590

Citrix Secure Private Access provides zero trust network access (ZTNA) to private applications. It provides stronger security than a VPN, a simpler way to connect to cloud and on-premises data centers, and an easier way to scale access to private

]]>

Citrix Secure Private Access provides zero trust network access (ZTNA) to private applications. It provides stronger security than a VPN, a simpler way to connect to cloud and on-premises data centers, and an easier way to scale access to private

]]>
Financial services CEOs are betting big on M&A: How Citrix can help you stay ahead https://www.citrix.com/blogs/2024/10/23/financial-services-ceos-are-betting-big-on-ma-how-citrix-can-help-you-stay-ahead/ Wed, 23 Oct 2024 13:23:49 +0000 https://www.citrix.com/blogs/?p=174261544

Your financial organization works hard to stay competitive in a rapidly changing marketplace. This might include improving your customer service, integrating generative AI, or offering new products for customers. While you might invest in building some of your own new

]]>

Your financial organization works hard to stay competitive in a rapidly changing marketplace. This might include improving your customer service, integrating generative AI, or offering new products for customers. While you might invest in building some of your own new

]]>
Citrix and IGEL deliver industry’s first ZTNA solution for IGEL OS devices https://www.citrix.com/blogs/2024/09/17/citrix-and-igel-deliver-industrys-first-ztna-solution-for-igel-os-devices/ Tue, 17 Sep 2024 09:36:02 +0000 https://www.citrix.com/blogs/?p=174261443

Organizations attempting to reduce exposure to threats and vulnerabilities need to take a comprehensive approach towards securing application access and protecting corporate data. VPNs are no longer suitable for remote access because of the unrestricted access they provide, the lack

]]>

Organizations attempting to reduce exposure to threats and vulnerabilities need to take a comprehensive approach towards securing application access and protecting corporate data. VPNs are no longer suitable for remote access because of the unrestricted access they provide, the lack

]]>
Citrixプラットフォーム宣言 https://www.citrix.com/blogs/2024/09/06/citrix_platform/ Fri, 06 Sep 2024 11:38:43 +0000 https://www.citrix.com/blogs/?p=174261411

企業ITは、DX推進を基調としながら生成AIを生産性に結びつける取り組みが急速に立ち上がるなど、新たな投資を積極的に行う局面が増えてきました。一方で、毎日の業務を支えるのは、アプリケーション、データ(コンテンツ)にセキュアにアクセスする環境であることは変わりません。新型コロナ期間を経てリモートワークが通常のワークスタイルになり、自分の業務がいつでも、どこにいても、セキュア且つ快適にできること、それが当たり前にできることが、ビジネスを推進する基盤なのだと言えます。

IT課題
デバイスやOSを意識することなくブラウザだけで業務可能になり、そのうえで必要なSaaSを組み合わせ連携して利用できる現在ですが、多くのお客様はまだその世界にいるわけではありません。
アプリケーションやデータを管理する従来のアプローチは複雑です。社内Webアプリケーション、SaaS、オフィススイート、そしてレガシーアプリケーション。さまざまなタイプのアプリケーションに対して、異なるソリューションとセキュリティでアクセスする、モバイルアクセスはまた別の対処では、複雑な状況が改善されることはありません。サイロ化されたシステム、たくさんの検討要素を抱え、セキュリティ対策は脆弱、そして運用コストが膨張します。

Citrixはプラットフォーム
シトリックスは、他の追随を許さないアプリケーションとデスクトップの仮想化をはじめ、ゼロトラストアクセス、包括的なセキュリティを備えた、アプリケーションデリバリのための統合プラットフォームを提供します。セキュアで快適なアプリケーションアクセスはもとより、複雑性を排除し、コスト効果も高いシステムです。

プラットフォームとしての価値を最大限に享受していただくため、細かい機能別の製品パッケージを廃止しました。Citrixのさまざまなエディションやアドオンを検討し、NetScalerについても機能やキャパシティによってたくさんのバリエーションから選択する必要はなくなり、大胆なほどシンプルな製品構成になりました。VDI, DaaSおよびApplication Delivery Controller (ADC)の価値のすべてを柔軟に利用することができます。

シンプルな製品オファー
現在提供する製品パッケージは以下です。

Citrix for Private Cloud*
オンプレミスでのCitrix Virtual Apps and Desktopsの展開、運用に特化した製品パッケージで、最も完成されたアプリケーションおよびデスクトップ仮想化ソリューションです。これまでのPremium Editionで提供するすべての機能に加え、XenServerを無制限に利用可能です。

Citrix Universal Hybrid Multi-Cloud*
これまでのCitrix Universalサブスクリプションが進化し、フル機能のNetScaler、またCitrix Endpoint Managementも含み、エンド・ユーザー・コンピューティング(EUC)分野の中核となるアプリケーションデリバリに必要な全機能が提供されます。具体的には、
Citrix Virtual Apps and Desktops

]]>

企業ITは、DX推進を基調としながら生成AIを生産性に結びつける取り組みが急速に立ち上がるなど、新たな投資を積極的に行う局面が増えてきました。一方で、毎日の業務を支えるのは、アプリケーション、データ(コンテンツ)にセキュアにアクセスする環境であることは変わりません。新型コロナ期間を経てリモートワークが通常のワークスタイルになり、自分の業務がいつでも、どこにいても、セキュア且つ快適にできること、それが当たり前にできることが、ビジネスを推進する基盤なのだと言えます。

IT課題
デバイスやOSを意識することなくブラウザだけで業務可能になり、そのうえで必要なSaaSを組み合わせ連携して利用できる現在ですが、多くのお客様はまだその世界にいるわけではありません。
アプリケーションやデータを管理する従来のアプローチは複雑です。社内Webアプリケーション、SaaS、オフィススイート、そしてレガシーアプリケーション。さまざまなタイプのアプリケーションに対して、異なるソリューションとセキュリティでアクセスする、モバイルアクセスはまた別の対処では、複雑な状況が改善されることはありません。サイロ化されたシステム、たくさんの検討要素を抱え、セキュリティ対策は脆弱、そして運用コストが膨張します。

Citrixはプラットフォーム
シトリックスは、他の追随を許さないアプリケーションとデスクトップの仮想化をはじめ、ゼロトラストアクセス、包括的なセキュリティを備えた、アプリケーションデリバリのための統合プラットフォームを提供します。セキュアで快適なアプリケーションアクセスはもとより、複雑性を排除し、コスト効果も高いシステムです。

プラットフォームとしての価値を最大限に享受していただくため、細かい機能別の製品パッケージを廃止しました。Citrixのさまざまなエディションやアドオンを検討し、NetScalerについても機能やキャパシティによってたくさんのバリエーションから選択する必要はなくなり、大胆なほどシンプルな製品構成になりました。VDI, DaaSおよびApplication Delivery Controller (ADC)の価値のすべてを柔軟に利用することができます。

シンプルな製品オファー
現在提供する製品パッケージは以下です。

Citrix for Private Cloud*
オンプレミスでのCitrix Virtual Apps and Desktopsの展開、運用に特化した製品パッケージで、最も完成されたアプリケーションおよびデスクトップ仮想化ソリューションです。これまでのPremium Editionで提供するすべての機能に加え、XenServerを無制限に利用可能です。

Citrix Universal Hybrid Multi-Cloud*
これまでのCitrix Universalサブスクリプションが進化し、フル機能のNetScaler、またCitrix Endpoint Managementも含み、エンド・ユーザー・コンピューティング(EUC)分野の中核となるアプリケーションデリバリに必要な全機能が提供されます。具体的には、
Citrix Virtual Apps and Desktops

]]>
How to set up BYOD users with cloud-hosted virtual desktops for zero trust network access to private applications https://www.citrix.com/blogs/2024/07/24/how-to-set-up-byod-users-with-cloud-hosted-virtual-desktops-for-zero-trust-network-access-to-private-applications/ Wed, 24 Jul 2024 13:41:25 +0000 https://www.citrix.com/blogs/?p=174261261

IT often faces the challenge of providing access to the company network and private applications to contractors, partners, and employees who use their own devices (BYOD). These devices pose security risks, such as data leakage, insecure usage, and more. They

]]>

IT often faces the challenge of providing access to the company network and private applications to contractors, partners, and employees who use their own devices (BYOD). These devices pose security risks, such as data leakage, insecure usage, and more. They

]]>
Announcing Web App Monitoring in Citrix Enterprise Browser with uberAgent 7.2.1 https://www.citrix.com/blogs/2024/07/17/announcing-web-app-monitoring-in-citrix-enterprise-browser-with-uberagent-7-2-1/ Wed, 17 Jul 2024 15:03:31 +0000 https://www.citrix.com/blogs/?p=174261229

We’re excited to share that Citrix Enterprise Browser is now integrated with uberAgent. This is our first major collaboration with Citrix, and it highlights our dedication to bringing you exceptional value and innovation.

What is Web App Monitoring?

In today’s

]]>

We’re excited to share that Citrix Enterprise Browser is now integrated with uberAgent. This is our first major collaboration with Citrix, and it highlights our dedication to bringing you exceptional value and innovation.

What is Web App Monitoring?

In today’s

]]>
Enhanced Security for Linux Thin Clients with Citrix Enterprise Browser and ZTNA https://www.citrix.com/blogs/2024/05/06/enhanced-security-for-linux-thin-clients-with-citrix-enterprise-browser-and-ztna/ Mon, 06 May 2024 10:53:32 +0000 https://www.citrix.com/blogs/?p=174260723

Building upon the robust security of Linux thin clients, Citrix is thrilled to announce the expansion of its Enterprise Browser offerings to Linux, marking a significant step in our access security platform expansion strategy. This empowers organizations to further secure

]]>

Building upon the robust security of Linux thin clients, Citrix is thrilled to announce the expansion of its Enterprise Browser offerings to Linux, marking a significant step in our access security platform expansion strategy. This empowers organizations to further secure

]]>
Citrix platform offers robust protection against APTs https://www.citrix.com/blogs/2024/04/30/citrix-platform-offer-robust-protection-against-apts/ Tue, 30 Apr 2024 12:48:31 +0000 https://www.citrix.com/blogs/?p=174260719

Advanced Persistent Threats (APTs) represent sophisticated, stealthy attacks that can infiltrate and compromise enterprise infrastructures over extended periods. Research suggests that by 2028, the market for advanced persistent threat protection is projected to surpass $23 billion, up from an anticipated

]]>

Advanced Persistent Threats (APTs) represent sophisticated, stealthy attacks that can infiltrate and compromise enterprise infrastructures over extended periods. Research suggests that by 2028, the market for advanced persistent threat protection is projected to surpass $23 billion, up from an anticipated

]]>
uberAgent 7.2: Optimize Data, Elevate Security! https://www.citrix.com/blogs/2024/04/30/uberagent-7-2-optimize-data-elevate-security/ Tue, 30 Apr 2024 10:39:38 +0000 https://www.citrix.com/blogs/?p=174260716

More than just an incremental upgrade! The release of uberAgent 7.2 represents a comprehensive evolution in cybersecurity defenses and the enhancement of End-user Computing experience (EUCx), as the agent capabilities for macOS endpoints have dramatically increased since the last version.

]]>

More than just an incremental upgrade! The release of uberAgent 7.2 represents a comprehensive evolution in cybersecurity defenses and the enhancement of End-user Computing experience (EUCx), as the agent capabilities for macOS endpoints have dramatically increased since the last version.

]]>
Now Available: Citrix Virtual Apps and Desktops 2402 Long Term Service Release https://www.citrix.com/blogs/2024/04/15/now-available-citrix-virtual-apps-and-desktops-2402-long-term-service-release/ Mon, 15 Apr 2024 13:32:19 +0000 https://www.citrix.com/blogs/?p=174260687

Key Takeaways

  • Availability and Support: The Citrix Virtual Apps and Desktops 7 2402 LTSR is now available, offering up to five years of extended support.
  • Enhanced Features: The 2402 LTSR introduces significant updates, such as improved HDX technologies,
…]]>

Key Takeaways

  • Availability and Support: The Citrix Virtual Apps and Desktops 7 2402 LTSR is now available, offering up to five years of extended support.
  • Enhanced Features: The 2402 LTSR introduces significant updates, such as improved HDX technologies,
…]]>
Mitigating Credential Risks with Citrix Technology: A Comprehensive Approach https://www.citrix.com/blogs/2024/03/11/mitigating-credential-risks-with-citrix-technology-a-comprehensive-approach/ Mon, 11 Mar 2024 15:04:01 +0000 https://www.citrix.com/blogs/?p=174260620

In an era of relentless digitization, where the boundaries between personal and professional realms blur with technological advancements, security stands as an ever-pressing concern. Managing credentials across numerous apps and platforms poses a significant challenge, especially considering the common practice

]]>

In an era of relentless digitization, where the boundaries between personal and professional realms blur with technological advancements, security stands as an ever-pressing concern. Managing credentials across numerous apps and platforms poses a significant challenge, especially considering the common practice

]]>
Introducing Seamless Profile Sync with Remote Browser Isolation https://www.citrix.com/blogs/2024/03/06/introducing-seamless-profile-sync-with-remote-browser-isolation/ Wed, 06 Mar 2024 21:00:02 +0000 https://www.citrix.com/blogs/?p=174260615

This blog post was co-authored by Sangeeta Bora, Lead Product Manager at Cloud Software Group.

Citrix’s Remote Browser Isolation excels at protecting your corporate network by isolating web browsing sessions. It isolates potentially high-risk web browsing traffic by running a

]]>

This blog post was co-authored by Sangeeta Bora, Lead Product Manager at Cloud Software Group.

Citrix’s Remote Browser Isolation excels at protecting your corporate network by isolating web browsing sessions. It isolates potentially high-risk web browsing traffic by running a

]]>
Nutanix + Citrix: Modern infrastructure for a better healthcare IT experience https://www.citrix.com/blogs/2024/02/28/nutanix-citrix-modern-infrastructure-for-a-better-healthcare-it-experience/ Wed, 28 Feb 2024 15:00:42 +0000 https://www.citrix.com/blogs/?p=174260581

Citrix is getting ready for HIMSS 2024 with a guest blog series featuring insights and innovations from some of our key partners. This post is written by Leah Gabbert, Director, Global Industry Solutions Marketing at Nutanix, Inc.

You can visit

]]>

Citrix is getting ready for HIMSS 2024 with a guest blog series featuring insights and innovations from some of our key partners. This post is written by Leah Gabbert, Director, Global Industry Solutions Marketing at Nutanix, Inc.

You can visit

]]>
Top 5 business challenges we heard from customers in 2023 https://www.citrix.com/blogs/2024/01/16/top-5-business-challenges-we-heard-from-customers-in-2023/ Tue, 16 Jan 2024 16:46:50 +0000 https://www.citrix.com/blogs/?p=174260502

This blog was co-authored by Dave Brear, Senior Principal Solution Architect at Citrix.

2023 was a challenging year for many businesses. Geopolitical instability and financial uncertainty have had broad reaching implications. Hybrid work continues to be in a state of

]]>

This blog was co-authored by Dave Brear, Senior Principal Solution Architect at Citrix.

2023 was a challenging year for many businesses. Geopolitical instability and financial uncertainty have had broad reaching implications. Hybrid work continues to be in a state of

]]>
Surfing through 2023: Navigating the features from the Citrix Enterprise Browser’s second birthday release! https://www.citrix.com/blogs/2023/12/22/navigating-the-features-from-the-citrix-enterprise-browsers-second-birthday-release/ Fri, 22 Dec 2023 15:36:22 +0000 https://www.citrix.com/blogs/?p=174260470

As we complete the second year of rapid development and growth for the Citrix Enterprise Browser and its features, it’s joyful to see how our two-year-old toddler doesn’t just walk but sprints at breakneck speed! Keeping in line with our

]]>

As we complete the second year of rapid development and growth for the Citrix Enterprise Browser and its features, it’s joyful to see how our two-year-old toddler doesn’t just walk but sprints at breakneck speed! Keeping in line with our

]]>
What’s new with Citrix – CVAD 2311 and Cloud updates https://www.citrix.com/blogs/2023/12/20/whats-new-with-citrix-cvad-2311-and-cloud-updates/ Wed, 20 Dec 2023 15:15:42 +0000 https://www.citrix.com/blogs/?p=174260452

Is there a better present than new features and a new Citrix release? Citrix continues to deliver on our commitment to hybrid environments quarter after quarter with releases for both Citrix Virtual Apps and Desktops and our Citrix cloud platform.

]]>

Is there a better present than new features and a new Citrix release? Citrix continues to deliver on our commitment to hybrid environments quarter after quarter with releases for both Citrix Virtual Apps and Desktops and our Citrix cloud platform.

]]>
Announcing the general availability of new enhancements for Citrix Secure Private Access on-premises https://www.citrix.com/blogs/2023/12/20/announcing-the-general-availability-of-new-enhancements-for-citrix-secure-private-access-on-premises/ Wed, 20 Dec 2023 15:00:35 +0000 https://www.citrix.com/blogs/?p=174260443

Customers implementing Zero Trust Network Access (ZTNA) solutions for secure access to enterprise apps demand greater choice and flexibility with deployment options while ensuring they meet compliance and regulatory requirements. Citrix is unique in offering this choice and deployment flexibility.

]]>

Customers implementing Zero Trust Network Access (ZTNA) solutions for secure access to enterprise apps demand greater choice and flexibility with deployment options while ensuring they meet compliance and regulatory requirements. Citrix is unique in offering this choice and deployment flexibility.

]]>
What’s new with StoreFront 2311! https://www.citrix.com/blogs/2023/12/07/whats-new-with-storefront-2311/ Thu, 07 Dec 2023 15:00:49 +0000 https://www.citrix.com/blogs/?p=174260419

Citrix’s focus on hybrid deployments means we are making significant investments in StoreFront. As part of this, we’re changing the way we do releases.

StoreFront’s previous major releases were in 2022 and 2019. These were designated as Long Term Service

]]>

Citrix’s focus on hybrid deployments means we are making significant investments in StoreFront. As part of this, we’re changing the way we do releases.

StoreFront’s previous major releases were in 2022 and 2019. These were designated as Long Term Service

]]>
Unveiling the power of Citrix Enterprise Browser’s integration with Citrix Analytics Service for Security https://www.citrix.com/blogs/2023/12/07/unveiling-the-power-of-the-citrix-enterprise-browser-integration-with-citrix-analytics-service-for-security/ Thu, 07 Dec 2023 14:00:58 +0000 https://www.citrix.com/blogs/?p=174260434

In the dynamic landscape of enterprise browsing solutions, ensuring not just security but also comprehensive admin visibility is paramount. At Citrix, we take pride in our Citrix Enterprise Browser — a robust solution that goes beyond “just” enabling secure access

]]>

In the dynamic landscape of enterprise browsing solutions, ensuring not just security but also comprehensive admin visibility is paramount. At Citrix, we take pride in our Citrix Enterprise Browser — a robust solution that goes beyond “just” enabling secure access

]]>
Citrix Device Posture service is now available for IGEL OS! https://www.citrix.com/blogs/2023/12/06/citrix-device-posture-service-is-now-available-for-igel-os/ Wed, 06 Dec 2023 13:00:18 +0000 https://www.citrix.com/blogs/?p=174260334

In the post COVID world where remote work is the norm for many organizations, employees need access to corporate applications and resources from any device — be it a corporate-managed device, a personal device, or a partner/contractor-managed device. The proliferation

]]>

In the post COVID world where remote work is the norm for many organizations, employees need access to corporate applications and resources from any device — be it a corporate-managed device, a personal device, or a partner/contractor-managed device. The proliferation

]]>
Top three reasons VMware Horizon (now Omnissa) customers are moving to Citrix https://www.citrix.com/blogs/2023/12/04/top-three-reasons-vmware-horizon-customers-are-moving-to-citrix/ Mon, 04 Dec 2023 15:00:43 +0000 https://www.citrix.com/blogs/?p=174260428

Key Takeaways

  • Secure and Scalable Solutions: Citrix delivers secure, high-performance virtualization solutions with recent updates enhancing rapid provisioning for disaster recovery and scalability.
  • Flexibility and Cloud Integration: Citrix offers broad support for various cloud providers and hypervisors, providing
…]]>

Key Takeaways

  • Secure and Scalable Solutions: Citrix delivers secure, high-performance virtualization solutions with recent updates enhancing rapid provisioning for disaster recovery and scalability.
  • Flexibility and Cloud Integration: Citrix offers broad support for various cloud providers and hypervisors, providing
…]]>
3 ways Citrix supported on-premises deployments in 2023 https://www.citrix.com/blogs/2023/11/21/3-ways-citrix-supported-on-premises-deployments-in-2023/ Tue, 21 Nov 2023 15:00:56 +0000 https://www.citrix.com/blogs/?p=174260417

If you joined our What’s New and Next Webinar, you know that we’ve released tons of new features for on-premises deployments this year. We also recently announced that the next Citrix Virtual Apps and Desktops Long Term Service Release

]]>

If you joined our What’s New and Next Webinar, you know that we’ve released tons of new features for on-premises deployments this year. We also recently announced that the next Citrix Virtual Apps and Desktops Long Term Service Release

]]>
Citrix Master Class: Secure Private Access and Autoscale On Premises Q&A https://www.citrix.com/blogs/2023/11/15/citrix-master-class-secure-private-access-and-autoscale-on-premises-qa/ Wed, 15 Nov 2023 16:00:43 +0000 https://www.citrix.com/blogs/?p=174260403

The Citrix Master Class dived deeper into the Citrix Secure Private Access and Autoscale on-premises topics covered previously in the What’s New and Next with Citrix webinar.

For those of you who were able to join us live, thank

]]>

The Citrix Master Class dived deeper into the Citrix Secure Private Access and Autoscale on-premises topics covered previously in the What’s New and Next with Citrix webinar.

For those of you who were able to join us live, thank

]]>
Coming Soon: The next Citrix Virtual Apps and Desktops LTSR! https://www.citrix.com/blogs/2023/11/13/coming-soon-the-next-citrix-virtual-apps-and-desktops-ltsr-2/ Mon, 13 Nov 2023 16:25:37 +0000 https://www.citrix.com/blogs/?p=174260391

Here at Citrix, we know that maintaining predictable and updated environments are top priority for organizations. As we continue to meet organizations where they are on their hybrid journeys, we are continuing to bring more on-premises. And with the holidays …

]]>

Here at Citrix, we know that maintaining predictable and updated environments are top priority for organizations. As we continue to meet organizations where they are on their hybrid journeys, we are continuing to bring more on-premises. And with the holidays …

]]>
The secret to delivering a financial Trader Workstation https://www.citrix.com/blogs/2023/10/18/the-secret-to-delivering-a-financial-trader-workstation/ Wed, 18 Oct 2023 13:00:28 +0000 https://www.citrix.com/blogs/?p=174260290

In a business where fractions of a second can have a real financial impact, the financial Trader Workstation use case exemplifies how VDI and DaaS technology deliver powerful solutions for mission critical operations. The key to building successful trader workstations …

]]>

In a business where fractions of a second can have a real financial impact, the financial Trader Workstation use case exemplifies how VDI and DaaS technology deliver powerful solutions for mission critical operations. The key to building successful trader workstations …

]]>
What’s New with Citrix – CVAD 2308 and Cloud updates https://www.citrix.com/blogs/2023/09/20/whats-new-with-citrix-cvad-2308-and-cloud-updates/ Wed, 20 Sep 2023 06:00:47 +0000 https://www.citrix.com/blogs/?p=174260184

Citrix is bringing new features to your apps and desktops quarter after quarter. And we are just getting started as we’re rounding out the second half of the year. These past few months have come with improved security features, enhanced

]]>

Citrix is bringing new features to your apps and desktops quarter after quarter. And we are just getting started as we’re rounding out the second half of the year. These past few months have come with improved security features, enhanced

]]>
5 reasons to use Citrix Security solutions for your healthcare organization https://www.citrix.com/blogs/2023/09/18/5-reasons-to-use-citrix-security-solutions-for-your-healthcare-organization/ Mon, 18 Sep 2023 13:30:44 +0000 https://www.citrix.com/blogs/?p=174260173

Cybersecurity is on everyone’s mind. Especially when the data that you need to protect, like electronic health records (EHRs), contains sensitive patient information. Cyber attacks are on the rise across the healthcare industry so now is the time to strengthen

]]>

Cybersecurity is on everyone’s mind. Especially when the data that you need to protect, like electronic health records (EHRs), contains sensitive patient information. Cyber attacks are on the rise across the healthcare industry so now is the time to strengthen

]]>
Enhance Zero Trust Access to your Citrix Resources with Device Posture and Crowdstrike Integration https://www.citrix.com/blogs/2023/08/01/enhance-zero-trust-access-to-your-citrix-resources-with-device-posture-and-crowdstrike-integration/ Tue, 01 Aug 2023 13:00:51 +0000 https://www.citrix.com/blogs/?p=174260071

In the age of remote work, it is critical for organizations to provide easy and secure access to corporate applications and resources from anywhere, on any device, and on the go. The challenge is that traditional perimeter-based solutions implicitly trust

]]>

In the age of remote work, it is critical for organizations to provide easy and secure access to corporate applications and resources from anywhere, on any device, and on the go. The challenge is that traditional perimeter-based solutions implicitly trust

]]>
Strengthening your Citrix security, one feature at a time https://www.citrix.com/blogs/2023/07/20/strengthening-your-citrix-security-one-feature-at-a-time/ Thu, 20 Jul 2023 14:00:25 +0000 https://citrixblogs.wpengine.com/?p=174259906

We’ve released a variety of Citrix security features over the past few months that improve security in the cloud, on-premises, and in hybrid environments. Working to make Citrix solutions work for you is our number one priority. We listened to …

]]>

We’ve released a variety of Citrix security features over the past few months that improve security in the cloud, on-premises, and in hybrid environments. Working to make Citrix solutions work for you is our number one priority. We listened to …

]]>
Protect Your Data, Protect Your Business with Citrix App Protection https://www.citrix.com/blogs/2023/04/17/protect-your-data-protect-your-business-with-citrix-app-protection/ Mon, 17 Apr 2023 14:00:05 +0000 https://citrixblogs.wpengine.com/?p=174259578

The Citrix Workspace app houses everything you need for work, whether it’s traditional virtual apps and virtual desktops or internal web/SaaS apps with Secure Private access. It is designed to provide a secure and user-friendly environment for employees to …

]]>

The Citrix Workspace app houses everything you need for work, whether it’s traditional virtual apps and virtual desktops or internal web/SaaS apps with Secure Private access. It is designed to provide a secure and user-friendly environment for employees to …

]]>
Citrix Secure Private Access On-Premises — Announcing General Availability https://www.citrix.com/blogs/2023/04/10/citrix-secure-private-access-on-premises-announcing-general-availability/ Mon, 10 Apr 2023 19:50:59 +0000 https://citrixblogs.wpengine.com/?p=174259560

As organizations embark on adopting zero trust network access (ZTNA) solutions, they often desire the flexibility of a hybrid strategy with the choice to use a mix of SaaS-based and / or customer-managed solutions to best suit their needs. Particularly …

]]>

As organizations embark on adopting zero trust network access (ZTNA) solutions, they often desire the flexibility of a hybrid strategy with the choice to use a mix of SaaS-based and / or customer-managed solutions to best suit their needs. Particularly …

]]>
What’s new with Citrix — March 2023 https://www.citrix.com/blogs/2023/03/29/whats-new-with-citrix-march-2023/ Wed, 29 Mar 2023 19:01:47 +0000 https://citrixblogs.wpengine.com/?p=174259356

This year has already been big for Citrix! With a renewed focus on hybrid deployments and meeting organizations where they are in their cloud journeys, we’ve brought you a ton of new innovations and updates already.

First off, we introduced …

]]>

This year has already been big for Citrix! With a renewed focus on hybrid deployments and meeting organizations where they are in their cloud journeys, we’ve brought you a ton of new innovations and updates already.

First off, we introduced …

]]>
Diving deep into Citrix zero trust architecture https://www.citrix.com/blogs/2023/03/27/diving-deep-into-citrix-zero-trust-architecture/ Mon, 27 Mar 2023 14:00:04 +0000 https://citrixblogs.wpengine.com/?p=174259371

In my previous”Overcoming observed challenges when adopting a zero trust architecture” blog post, I discussed some of the observed challenges when implementing a zero trust architecture and how you can use Citrix technology to overcome them. In this …

]]>

In my previous”Overcoming observed challenges when adopting a zero trust architecture” blog post, I discussed some of the observed challenges when implementing a zero trust architecture and how you can use Citrix technology to overcome them. In this …

]]>
Establish device trust with Citrix’s device posture service https://www.citrix.com/blogs/2023/02/27/establish-device-trust-with-citrixs-device-posture-service/ Mon, 27 Feb 2023 14:13:17 +0000 https://citrixblogs.wpengine.com/?p=174259152

In our mobile-first world, where hybrid work is the norm for many organizations, employees need access to corporate applications and resources from anywhere, on any device, on the go. While traditional methods of authentication are still an effective way to …

]]>

In our mobile-first world, where hybrid work is the norm for many organizations, employees need access to corporate applications and resources from anywhere, on any device, on the go. While traditional methods of authentication are still an effective way to …

]]>
Enhance your Cloud PCs with Citrix HDX Plus for Windows 365 https://www.citrix.com/blogs/2023/02/22/now-available-citrix-hdx-plus-for-windows-365/ Wed, 22 Feb 2023 16:00:02 +0000 https://citrixblogs.wpengine.com/?p=174258886

Today we are excited to announce the general availability of Citrix HDX Plus for Windows 365! Citrix DaaS customers can now take advantage of all the benefits of using Citrix HDX Plus for Windows 365 with their Cloud PCs …

]]>

Today we are excited to announce the general availability of Citrix HDX Plus for Windows 365! Citrix DaaS customers can now take advantage of all the benefits of using Citrix HDX Plus for Windows 365 with their Cloud PCs …

]]>
Overcoming observed challenges when adopting a zero trust architecture https://www.citrix.com/blogs/2023/01/25/overcoming-observed-challenges-when-adopting-a-zero-trust-architecture/ Wed, 25 Jan 2023 21:15:31 +0000 https://citrixblogs.wpengine.com/?p=174258872

Zero trust has become a crucial component in the cybersecurity strategy of organizations everywhere. More and more enterprises are finding themselves turning toward zero trust architecture to keep their data, infrastructure, and other assets safe. As a result, this concept …

]]>

Zero trust has become a crucial component in the cybersecurity strategy of organizations everywhere. More and more enterprises are finding themselves turning toward zero trust architecture to keep their data, infrastructure, and other assets safe. As a result, this concept …

]]>
Celebrating one year of the Citrix Enterprise Browser! https://www.citrix.com/blogs/2022/12/22/celebrating-one-year-of-the-citrix-enterprise-browser/ Thu, 22 Dec 2022 20:00:05 +0000 https://citrixblogs.wpengine.com/?p=174258771

On October 5, 2022, the Citrix Enterprise Browser turned 1, and like a proud parent, I’m overjoyed to see how far it has come in just 12 months since the general availability announcement — a true testament to the excellence …

]]>

On October 5, 2022, the Citrix Enterprise Browser turned 1, and like a proud parent, I’m overjoyed to see how far it has come in just 12 months since the general availability announcement — a true testament to the excellence …

]]>
Looking back at the biggest Citrix DaaS and VDI accomplishments of 2022 https://www.citrix.com/blogs/2022/12/19/citrix-daas-vdi-2022-year-in-review/ Mon, 19 Dec 2022 19:00:26 +0000 https://citrixblogs.wpengine.com/?p=174258728

It’s hard to believe that 2022 is already coming to an end. As we reflect on this past year, we see 2022 as a time of development, growth, and innovation. With so much happening with Citrix DaaS and Citrix Virtual …

]]>

It’s hard to believe that 2022 is already coming to an end. As we reflect on this past year, we see 2022 as a time of development, growth, and innovation. With so much happening with Citrix DaaS and Citrix Virtual …

]]>
What’s new and next with Citrix DaaS and Citrix Virtual Apps and Desktops: Webinar Q&A https://www.citrix.com/blogs/2022/12/01/whats-new-next-citrix-daas-and-citrix-virtual-apps-and-desktops-qa/ Thu, 01 Dec 2022 17:30:18 +0000 https://citrixblogs.wpengine.com/?p=174258597

Recently we delivered our “What’s new and next with Citrix DaaS and Citrix Virtual Apps and Desktops” webinar. We covered the latest and greatest features and innovations in our cloud service, as well as in our on-premises 2206 and 2209 …

]]>

Recently we delivered our “What’s new and next with Citrix DaaS and Citrix Virtual Apps and Desktops” webinar. We covered the latest and greatest features and innovations in our cloud service, as well as in our on-premises 2206 and 2209 …

]]>
Citrix Cloud Connectors: How they work and how to get the most from them https://www.citrix.com/blogs/2022/10/27/citrix-cloud-connectors-how-they-work-and-how-to-get-the-most-from-them/ Thu, 27 Oct 2022 14:00:59 +0000 https://citrixblogs.wpengine.com/?p=174258392

Connectors have long fulfilled a key role in providing a simple, secure way to connect on-premises resources to the Citrix Cloud console. They unlock the advantages of cloud management by bridging on-prem and cloud deployments, without requiring complex networking or …

]]>

Connectors have long fulfilled a key role in providing a simple, secure way to connect on-premises resources to the Citrix Cloud console. They unlock the advantages of cloud management by bridging on-prem and cloud deployments, without requiring complex networking or …

]]>
How channel partners are architecting a seamless zero trust framework https://www.citrix.com/blogs/2022/10/19/how-channel-partners-are-architecting-a-seamless-zero-trust-framework/ Wed, 19 Oct 2022 14:00:26 +0000 https://citrixblogs.wpengine.com/?p=174258354

Modern threats require a modern approach to security. Plus, our recent survey found that 95 percent of businesses are taking a hybrid approach to work, so there are no signs of slowing down when it comes to employee use …

]]>

Modern threats require a modern approach to security. Plus, our recent survey found that 95 percent of businesses are taking a hybrid approach to work, so there are no signs of slowing down when it comes to employee use …

]]>
Get quick access to Citrix Workspace from the Mac menu bar https://www.citrix.com/blogs/2022/10/17/get-quick-access-to-citrix-workspace-from-the-mac-menu-bar/ Mon, 17 Oct 2022 14:00:28 +0000 https://citrixblogs.wpengine.com/?p=174258341

Some Citrix Workspace app for Mac users have asked for faster ways to access and open the resources they use the most. For example, rather than having to navigate through several options in Citrix Workspace to open their targeted virtual …

]]>

Some Citrix Workspace app for Mac users have asked for faster ways to access and open the resources they use the most. For example, rather than having to navigate through several options in Citrix Workspace to open their targeted virtual …

]]>
How banks can build better customer relationships with digital technology https://www.citrix.com/blogs/2022/10/13/how-banks-can-build-better-customer-relationships-with-digital-technology/ Thu, 13 Oct 2022 14:00:05 +0000 https://citrixblogs.wpengine.com/?p=174258314

The Beatles sang, “…I don’t care too much for money … Money can’t buy me love.” Ask most of us, though, and we might have a different viewpoint. The relationship between us and our money is pivotal. Some may say …

]]>

The Beatles sang, “…I don’t care too much for money … Money can’t buy me love.” Ask most of us, though, and we might have a different viewpoint. The relationship between us and our money is pivotal. Some may say …

]]>
What is Authentication vs. Authorization? The Main Differences https://www.citrix.com/blogs/2022/10/05/authentication-vs-authorization-main-differences/ Wed, 05 Oct 2022 14:00:21 +0000 https://citrixblogs.wpengine.com/?p=174258225

Authentication and authorization are essential processes of identity and access management. While the terms are often used interchangeably, authentication and authorization fill different functions. For example, while authentication verifies the user’s identity, authorization verifies what permissions the user has to …

]]>

Authentication and authorization are essential processes of identity and access management. While the terms are often used interchangeably, authentication and authorization fill different functions. For example, while authentication verifies the user’s identity, authorization verifies what permissions the user has to …

]]>
BYOD is still a thing, now more than ever! https://www.citrix.com/blogs/2022/09/19/byod-is-still-a-thing-now-more-than-ever/ Mon, 19 Sep 2022 14:00:00 +0000 https://citrixblogs.wpengine.com/?p=174258084

BYOD has been around for a long time in practice, although the acronym was not popularized until 2011, when Citrix started to highlight the benefits. The fundamental desire for flexibility to work from anywhere on any device was true …

]]>

BYOD has been around for a long time in practice, although the acronym was not popularized until 2011, when Citrix started to highlight the benefits. The fundamental desire for flexibility to work from anywhere on any device was true …

]]>
Hybrid cloud security with zero trust solutions from Citrix https://www.citrix.com/blogs/2022/09/14/secure-your-hybrid-environment-zero-trust-citrix/ Wed, 14 Sep 2022 15:00:59 +0000 https://citrixblogs.wpengine.com/?p=174258038

The growth in hybrid work creates challenges for IT admins everywhere. How do you keep remote workers safe? How do you protect endpoints? What do you do about unmanaged devices? How do you secure sensitive corporate data and resources while …

]]>

The growth in hybrid work creates challenges for IT admins everywhere. How do you keep remote workers safe? How do you protect endpoints? What do you do about unmanaged devices? How do you secure sensitive corporate data and resources while …

]]>
Delivering enterprise web apps with Citrix Enterprise Browser https://www.citrix.com/blogs/2022/09/09/delivering-enterprise-web-apps-with-citrix-enterprise-browser/ Fri, 09 Sep 2022 14:30:11 +0000 https://citrixblogs.wpengine.com/?p=174258022

When consumerization of IT was the next big thing, enterprises spent a lot of time and money modernizing apps and working to accommodate the way employees want to work. Many of those changes truly improved the way people work every …

]]>

When consumerization of IT was the next big thing, enterprises spent a lot of time and money modernizing apps and working to accommodate the way employees want to work. Many of those changes truly improved the way people work every …

]]>
What to know about zero trust architectures https://www.citrix.com/blogs/2022/08/30/what-to-know-about-zero-trust-architectures/ Tue, 30 Aug 2022 14:00:30 +0000 https://citrixblogs.wpengine.com/?p=174257883

Zero trust architectures have gained rapid adoption by cybersecurity teams recently with the rise of knowledge workers moving to remote or hybrid work models. The need to secure access for these workers without compromising their productivity, especially in light of …

]]>

Zero trust architectures have gained rapid adoption by cybersecurity teams recently with the rise of knowledge workers moving to remote or hybrid work models. The need to secure access for these workers without compromising their productivity, especially in light of …

]]>
How to implement zero trust security for your network https://www.citrix.com/blogs/2022/08/25/how-to-implement-zero-trust-network/ Thu, 25 Aug 2022 14:00:30 +0000 https://citrixblogs.wpengine.com/?p=174257855

“Never trust, always verify” and “just enough” access.

These are the key philosophies behind zero trust approaches to cybersecurity. Although the name zero trust speaks for itself, cybersecurity architectures based on zero trust approaches ensure that your data, and infrastructure …

]]>

“Never trust, always verify” and “just enough” access.

These are the key philosophies behind zero trust approaches to cybersecurity. Although the name zero trust speaks for itself, cybersecurity architectures based on zero trust approaches ensure that your data, and infrastructure …

]]>
It’s time to stop using consumer browsers for work https://www.citrix.com/blogs/2022/08/23/stop-using-consumer-browsers-for-work/ Tue, 23 Aug 2022 13:00:52 +0000 https://citrixblogs.wpengine.com/?p=174257868

It has been 32 years since the world’s first browser — the “WorldWideWeb browser” — was created by Tim Berners-Lee at CERN, and yet the two most-used browsers have only been around for half that time! The world of browsers …

]]>

It has been 32 years since the world’s first browser — the “WorldWideWeb browser” — was created by Tim Berners-Lee at CERN, and yet the two most-used browsers have only been around for half that time! The world of browsers …

]]>
How to create a zero trust network https://www.citrix.com/blogs/2022/08/18/how-to-create-zero-trust-network/ Thu, 18 Aug 2022 14:00:41 +0000 https://citrixblogs.wpengine.com/?p=174257846

Looking to achieve zero trust security for your business?

You’re not alone.

The White House recently released an edict declaring the implementation of a federal zero-trust architecture (ZTA) requiring all agencies to comply with specific cybersecurity standards and objectives by …

]]>

Looking to achieve zero trust security for your business?

You’re not alone.

The White House recently released an edict declaring the implementation of a federal zero-trust architecture (ZTA) requiring all agencies to comply with specific cybersecurity standards and objectives by …

]]>
Mais segurança, redução de custos e produtividade para os serviços públicos https://www.citrix.com/blogs/2022/08/16/mais-seguranca-reducao-de-custos-e-produtividade-para-os-servicos-publicos/ Tue, 16 Aug 2022 14:00:44 +0000 https://citrixblogs.wpengine.com/?p=174257830

O setor público na América Latina, particularmente no Brasil, vem passando por um momento de transformação e não apenas por conta do COVID-19. Obviamente a adoção em massa do home office e o consequente aumento da demanda por soluções …

]]>

O setor público na América Latina, particularmente no Brasil, vem passando por um momento de transformação e não apenas por conta do COVID-19. Obviamente a adoção em massa do home office e o consequente aumento da demanda por soluções …

]]>
Zero trust architecture benefits for your business https://www.citrix.com/blogs/2022/08/16/zero-trust-architecture-benefits-for-your-business/ Tue, 16 Aug 2022 14:00:03 +0000 https://citrixblogs.wpengine.com/?p=174257798

In a perfect world, you could turn a blind eye to your company network and safely trust that anyone trying to access it had the purest intentions. But in reality, there’s no telling how or when a malicious actor might …

]]>

In a perfect world, you could turn a blind eye to your company network and safely trust that anyone trying to access it had the purest intentions. But in reality, there’s no telling how or when a malicious actor might …

]]>
Citrix Features Explained: Improving end-user security with Citrix Secure Private Access https://www.citrix.com/blogs/2022/08/15/protect-end-users-improve-security-citrix-secure-private-access/ Mon, 15 Aug 2022 14:00:27 +0000 https://citrixblogs.wpengine.com/?p=174257817

The biggest threat to your organization is coming from inside. From careless mistakes to lost devices to malicious insiders, a striking 82 percent of data breaches come from what the 2022 Verizon DBIR calls “the human element.” This suggests the …

]]>

The biggest threat to your organization is coming from inside. From careless mistakes to lost devices to malicious insiders, a striking 82 percent of data breaches come from what the 2022 Verizon DBIR calls “the human element.” This suggests the …

]]>
Seven principles of the zero trust security model https://www.citrix.com/blogs/2022/08/11/seven-principles-of-zero-trust-security-model/ Thu, 11 Aug 2022 15:15:17 +0000 https://citrixblogs.wpengine.com/?p=174257642

The reality of today’s fast-paced, increasingly remote work environment positions your business as vulnerable to security breaches. Your employees increasingly rely on their own unprotected devices for work, leveraging SaaS and web-based apps to access your valuable assets and data.…

]]>

The reality of today’s fast-paced, increasingly remote work environment positions your business as vulnerable to security breaches. Your employees increasingly rely on their own unprotected devices for work, leveraging SaaS and web-based apps to access your valuable assets and data.…

]]>
Why should you evolve your multi-factor authentication to adaptive authentication? https://www.citrix.com/blogs/2022/08/04/multi-factor-authenticaton-vs-adaptive-authentication/ Thu, 04 Aug 2022 14:00:18 +0000 https://citrixblogs.wpengine.com/?p=174257757

As organizations embrace digital transformation, the need to protect data and control who accesses it increases. Distributed workforces and online users compound the challenge since they often need remote access to critical apps and data. Many organizations also have …

]]>

As organizations embrace digital transformation, the need to protect data and control who accesses it increases. Distributed workforces and online users compound the challenge since they often need remote access to critical apps and data. Many organizations also have …

]]>
The case for an enterprise browser https://www.citrix.com/blogs/2022/07/25/the-case-for-an-enterprise-browser/ Mon, 25 Jul 2022 14:00:12 +0000 https://citrixblogs.wpengine.com/?p=174257622

The browser has become the universal endpoint for devices and the user interface for applications. It is now a primary place where hybrid work gets done in an enterprise. Corporate web apps hosted inside the firewall or a cloud service …

]]>

The browser has become the universal endpoint for devices and the user interface for applications. It is now a primary place where hybrid work gets done in an enterprise. Corporate web apps hosted inside the firewall or a cloud service …

]]>
How Citrix can help customers achieve zero trust maturity https://www.citrix.com/blogs/2022/07/21/how-citrix-can-help-customers-achieve-zero-trust-maturity/ Thu, 21 Jul 2022 14:00:08 +0000 https://citrixblogs.wpengine.com/?p=174257605

Information technology has evolved, and so has the way we engage with it for work. With the proliferation of remote work, connected devices, cloud computing systems, and access points — how can we keep users safe without impeding their productivity?…

]]>

Information technology has evolved, and so has the way we engage with it for work. With the proliferation of remote work, connected devices, cloud computing systems, and access points — how can we keep users safe without impeding their productivity?…

]]>
Citrix im Aufbruch – heute und morgen https://www.citrix.com/blogs/2022/07/11/citrix-im-aufbruch-heute-und-morgen/ Mon, 11 Jul 2022 10:58:39 +0000 https://citrixblogs.wpengine.com/?p=174257454

Stillstand ist Rückschritt – in diesem Sinne ruhen wir uns derzeit nicht aus, sondern bieten unseren Kunden auch vor dem Hintergrund der bevorstehenden Übernahme von Citrix durch Investoren weiterhin neue Lösungen und den exzellenten Service, den sie gewohnt sind und …

]]>

Stillstand ist Rückschritt – in diesem Sinne ruhen wir uns derzeit nicht aus, sondern bieten unseren Kunden auch vor dem Hintergrund der bevorstehenden Übernahme von Citrix durch Investoren weiterhin neue Lösungen und den exzellenten Service, den sie gewohnt sind und …

]]>
What’s new with Citrix DaaS and Citrix Virtual Apps and Desktops — June 2022 https://www.citrix.com/blogs/2022/06/28/whats-new-with-citrix-daas-and-citrix-virtual-apps-and-desktops-june-2022/ Tue, 28 Jun 2022 17:45:25 +0000 https://citrixblogs.wpengine.com/?p=174257399

One of the things I love most about being part of Citrix is the excitement around our latest innovations. It is rewarding to see how our customers leverage them to capture new opportunities to create the next frontier in their …

]]>

One of the things I love most about being part of Citrix is the excitement around our latest innovations. It is rewarding to see how our customers leverage them to capture new opportunities to create the next frontier in their …

]]>
Protect your workforce against browser-based attacks with a zero trust network https://www.citrix.com/blogs/2022/06/23/protect-from-browser-attacks-with-zero-trust-network/ Thu, 23 Jun 2022 14:00:00 +0000 https://citrixblogs.wpengine.com/?p=174257341

Which web browsing risks concern you the most?

Businesses are faced with the reality of threat actors attempting to access their networks and infrastructure and getting access to their applications and data. Today’s workforce is increasingly remote-capable, and chances are …

]]>

Which web browsing risks concern you the most?

Businesses are faced with the reality of threat actors attempting to access their networks and infrastructure and getting access to their applications and data. Today’s workforce is increasingly remote-capable, and chances are …

]]>
Citrix Secure Private Access  アダプティブ認証をご紹介します https://www.citrix.com/blogs/2022/06/16/citrix-secure-private-access-adaptive-authentication-jp/ Thu, 16 Jun 2022 10:00:33 +0000 https://citrixblogs.wpengine.com/?p=174257320

この 2 年間で人々の働き方が変化し、オフィスに戻る人も増えていますが、リモート、ハイブリッド、モバイルでの働き方は今後も積極的に続けられるでしょう。そして、このような様々な働き方を行うことにより、場所とデバイスが複雑に絡み合った状況が生まれ、IT部門はどこからでも、どのデバイスからでも、常に業務のデータにアクセスし、業務が可能な状態を維持することが強く求められるようになりました。

同時に、セキュリティ担当者は、会社にとって最も重要な業務データをサイバー犯罪者から保護する必要があります。さらに企業の合併や買収、年間を通して入・退職する従業員も考慮すると、セキュリティ、特に個人の識別とアクセス管理を徹底するのは膨大な作業になりかねません。

その一助として、CitrixCloudのWorkspaceサービスに対して高度な個人・個体識別とアクセス管理を一貫して行えるアダプティブ認証機能を2022年6月1日より提供を開始いたしました。アダプティブ認証はCitrix Secure Private Accessサービスに付属する機能となります。

下記の画面はCitrixCloud管理コンソールの「IDおよびアクセス管理」の設定画面ですが、その最下段にある「アダプティブ認証」が今回新たに追加した機能となります。

アダプティブ認証が実現するもの

アダプティブ認証は、Citrix DaaS(仮想デスクトップ・仮想アプリケーション)およびCitrix Secure Private Access(社内Webや外部のSaaSアプリケーション、さらに仮想化しない物理PC上のアプリケーション)を活用するアプリケーションに対して、ゼロトラストの個人・個体識別と各アプリケーションへのアクセスポリシーを一貫して管理できるようにするものです。

現在、多くのお客様でオンプレミス環境のActive DirectoryやOkta、RADIUS(Symantec VIP、RSA など)、デバイス証明書、さらにCitrix ADCを用いたOTP、SMS認証やSAML認証など、様々な認証ソリューションを組み合わせた強固な認証機能を利用されておられますが、このようなお客様のクラウド移行実現に対し非常に重要な機能となります。アダプティブ認証は、従来ADCで提供してきた様々な認証方式をすべてCitrixCloudのWorkspaceプラットフォームに統合しCitrixCloudのサービスとして提供します。そのため、お客様の導入作業や運用の負担を最小限にし、スムーズなクラウドへの移行を可能とします。

企業の合併や買収、また複数のIdPを利用している場合など、アダプティブ認証は様々な認証フローの管理負担を軽減し、利用者に対しても安全にご利用いただくための労力を大きく削減することができます。AD、AzureAD、Okta、SAML 2.0やOAuthベースの連携認証など、様々なIdPが利用でき、さらに複数の認証を利用することもできます。詳しくは、以下の動画をご覧ください。

また、アダプティブ認証は条件付き認証にも対応しており、接続元デバイスの状態や場所などに応じて、適切な認証方法に切り替えることができます。例えば、外出先では多要素認証、オフィス内ではIDとパスワードだけの認証とするといった自動切換えが可能です。

さらに、アダプティブ認証の重要なアクセス制御機能として、Citrix DaaS と Citrix Secure Private Access それぞれのアプリケーションへのアダプティブアクセス機能があります。これまでオンプレ環境のCitrix ADCとCitrix DaaS向けに提供してきたSmartAccess機能を強化し、特定の利用者が、特定のデバイス、場所、時間帯などの条件で、どの物理・仮想アプリケーションを利用できるのか、仮想デスクトップを利用できるのか、また利用を許容するが強いセキュリティ制限を付与するなどを自動制御します。例えば、会社所有ではないデバイスで認証に来た場合は、重要データを扱うアプリケーションの利用は禁止、その他アプリは透かしを挿入し操作を録画することができます。アダプティブ認証のデバイスポスチャーチェック(旧エンドポイント分析機能)は、会社端末とBYOデバイスを検出し、ファイアウォールが有効か、Updateが行われているか、ウィルス対策ソフトの各種スキャンはどうなっているかなど、様々なコンプライアンスチェックを行うことができます。

以下の画面は、デバイスの種類に応じて利用者に提供するアプリケーションが制限される様子を示します。

また、アダプティブ認証は、クリップボード、物理PC上のプリンタ、透かし、物理PCへのファイル転送といった物理・仮想PC間のデータの制御ができます。

アダプティブ認証の試用

アダプティブ認証は、Citrix DaaS Premium、Citrix DaaS …

]]>

この 2 年間で人々の働き方が変化し、オフィスに戻る人も増えていますが、リモート、ハイブリッド、モバイルでの働き方は今後も積極的に続けられるでしょう。そして、このような様々な働き方を行うことにより、場所とデバイスが複雑に絡み合った状況が生まれ、IT部門はどこからでも、どのデバイスからでも、常に業務のデータにアクセスし、業務が可能な状態を維持することが強く求められるようになりました。

同時に、セキュリティ担当者は、会社にとって最も重要な業務データをサイバー犯罪者から保護する必要があります。さらに企業の合併や買収、年間を通して入・退職する従業員も考慮すると、セキュリティ、特に個人の識別とアクセス管理を徹底するのは膨大な作業になりかねません。

その一助として、CitrixCloudのWorkspaceサービスに対して高度な個人・個体識別とアクセス管理を一貫して行えるアダプティブ認証機能を2022年6月1日より提供を開始いたしました。アダプティブ認証はCitrix Secure Private Accessサービスに付属する機能となります。

下記の画面はCitrixCloud管理コンソールの「IDおよびアクセス管理」の設定画面ですが、その最下段にある「アダプティブ認証」が今回新たに追加した機能となります。

アダプティブ認証が実現するもの

アダプティブ認証は、Citrix DaaS(仮想デスクトップ・仮想アプリケーション)およびCitrix Secure Private Access(社内Webや外部のSaaSアプリケーション、さらに仮想化しない物理PC上のアプリケーション)を活用するアプリケーションに対して、ゼロトラストの個人・個体識別と各アプリケーションへのアクセスポリシーを一貫して管理できるようにするものです。

現在、多くのお客様でオンプレミス環境のActive DirectoryやOkta、RADIUS(Symantec VIP、RSA など)、デバイス証明書、さらにCitrix ADCを用いたOTP、SMS認証やSAML認証など、様々な認証ソリューションを組み合わせた強固な認証機能を利用されておられますが、このようなお客様のクラウド移行実現に対し非常に重要な機能となります。アダプティブ認証は、従来ADCで提供してきた様々な認証方式をすべてCitrixCloudのWorkspaceプラットフォームに統合しCitrixCloudのサービスとして提供します。そのため、お客様の導入作業や運用の負担を最小限にし、スムーズなクラウドへの移行を可能とします。

企業の合併や買収、また複数のIdPを利用している場合など、アダプティブ認証は様々な認証フローの管理負担を軽減し、利用者に対しても安全にご利用いただくための労力を大きく削減することができます。AD、AzureAD、Okta、SAML 2.0やOAuthベースの連携認証など、様々なIdPが利用でき、さらに複数の認証を利用することもできます。詳しくは、以下の動画をご覧ください。

また、アダプティブ認証は条件付き認証にも対応しており、接続元デバイスの状態や場所などに応じて、適切な認証方法に切り替えることができます。例えば、外出先では多要素認証、オフィス内ではIDとパスワードだけの認証とするといった自動切換えが可能です。

さらに、アダプティブ認証の重要なアクセス制御機能として、Citrix DaaS と Citrix Secure Private Access それぞれのアプリケーションへのアダプティブアクセス機能があります。これまでオンプレ環境のCitrix ADCとCitrix DaaS向けに提供してきたSmartAccess機能を強化し、特定の利用者が、特定のデバイス、場所、時間帯などの条件で、どの物理・仮想アプリケーションを利用できるのか、仮想デスクトップを利用できるのか、また利用を許容するが強いセキュリティ制限を付与するなどを自動制御します。例えば、会社所有ではないデバイスで認証に来た場合は、重要データを扱うアプリケーションの利用は禁止、その他アプリは透かしを挿入し操作を録画することができます。アダプティブ認証のデバイスポスチャーチェック(旧エンドポイント分析機能)は、会社端末とBYOデバイスを検出し、ファイアウォールが有効か、Updateが行われているか、ウィルス対策ソフトの各種スキャンはどうなっているかなど、様々なコンプライアンスチェックを行うことができます。

以下の画面は、デバイスの種類に応じて利用者に提供するアプリケーションが制限される様子を示します。

また、アダプティブ認証は、クリップボード、物理PC上のプリンタ、透かし、物理PCへのファイル転送といった物理・仮想PC間のデータの制御ができます。

アダプティブ認証の試用

アダプティブ認証は、Citrix DaaS Premium、Citrix DaaS …

]]>
Reduce remote cybersecurity risks with ZTNA as a service https://www.citrix.com/blogs/2022/06/14/ztna-as-a-service-reduces-cybersecurity-risks/ Tue, 14 Jun 2022 14:30:14 +0000 https://citrixblogs.wpengine.com/?p=174257300

How are you managing the risk presented by your employees using personal devices to access corporate resources outside the office?

The reality of an increasingly remote workforce means your valuable data and information is being requested from devices you may …

]]>

How are you managing the risk presented by your employees using personal devices to access corporate resources outside the office?

The reality of an increasingly remote workforce means your valuable data and information is being requested from devices you may …

]]>
Citrix ZTNA solutions help organizations secure their remote workforces https://www.citrix.com/blogs/2022/06/09/citrix-ztna-solutions-help-organizations-secure-their-remote-workforces/ Thu, 09 Jun 2022 19:45:44 +0000 https://citrixblogs.wpengine.com/?p=174257280

Citrix has been in the business of delivering secure remote work through its digital workspace solutions for more than three decades. And leading companies around the world are using them to provide employees with access to the applications and insights …

]]>

Citrix has been in the business of delivering secure remote work through its digital workspace solutions for more than three decades. And leading companies around the world are using them to provide employees with access to the applications and insights …

]]>
Citrix named a Leader and Fast Mover in ZTNA market https://www.citrix.com/blogs/2022/06/07/citrix-named-a-leader-and-fast-mover-in-ztna-market/ Tue, 07 Jun 2022 18:20:50 +0000 https://citrixblogs.wpengine.com/?p=174257252

With RSA Conference 2022 happening in San Francisco this week, we’re proud to announce that Citrix was named a Leader and Fast Mover in GigaOm’s Radar report for ZTNA.

Citrix offers a complete ZTNA solution with very strong, well-thought-out

]]>

With RSA Conference 2022 happening in San Francisco this week, we’re proud to announce that Citrix was named a Leader and Fast Mover in GigaOm’s Radar report for ZTNA.

Citrix offers a complete ZTNA solution with very strong, well-thought-out

]]>
ZTNA Vendors: What to look for https://www.citrix.com/blogs/2022/06/06/zero-trust-network-access-ztna-vendors/ Mon, 06 Jun 2022 14:00:52 +0000 https://citrixblogs.wpengine.com/?p=174257237

Zero trust network access (ZTNA) has been a watchword in digital security for years. Recently, the technology has reached a tipping point.

Two parallel trends have increased the importance of using ZTNA to connect users with companies’ digital resources. First, …

]]>

Zero trust network access (ZTNA) has been a watchword in digital security for years. Recently, the technology has reached a tipping point.

Two parallel trends have increased the importance of using ZTNA to connect users with companies’ digital resources. First, …

]]>
Introducing Citrix Adaptive Authentication https://www.citrix.com/blogs/2022/06/01/introducing-citrix-adaptive-authentication/ Wed, 01 Jun 2022 10:00:07 +0000 https://citrixblogs.wpengine.com/?p=174257200

The way people work has changed over the last two years, and even as we see more people returning to the office, remote, hybrid, and mobile workstyles are here to stay. This diversity has created a complex landscape of devices …

]]>

The way people work has changed over the last two years, and even as we see more people returning to the office, remote, hybrid, and mobile workstyles are here to stay. This diversity has created a complex landscape of devices …

]]>
Are you protecting your third-party contractors from cyberattacks? https://www.citrix.com/blogs/2022/05/19/are-you-protecting-your-third-party-contractors-from-cyberattacks/ Thu, 19 May 2022 19:40:58 +0000 https://citrixblogs.wpengine.com/?p=174257142

Akshay Kakar, Principal Product Marketing Manager at Citrix, contributed to this blog post.

Cyberattacks should be a concern for everyone — businesses, government organizations, and consumers. Among the targets threat actors focus on as they search for weak links are …

]]>

Akshay Kakar, Principal Product Marketing Manager at Citrix, contributed to this blog post.

Cyberattacks should be a concern for everyone — businesses, government organizations, and consumers. Among the targets threat actors focus on as they search for weak links are …

]]>
Citrix Features Explained: Browser security in Citrix Secure Private Access https://www.citrix.com/blogs/2022/05/19/citrix-features-explained-browser-security-in-citrix-secure-private-access/ Thu, 19 May 2022 14:00:12 +0000 https://citrixblogs.wpengine.com/?p=174257110

Swift and easy access to information is the lifeblood of productive remote work. You want your hybrid workers to be able to easily browse the internet for whatever insights and resources they need to do their best work — but …

]]>

Swift and easy access to information is the lifeblood of productive remote work. You want your hybrid workers to be able to easily browse the internet for whatever insights and resources they need to do their best work — but …

]]>
ABAC vs. RBAC: What’s the difference? https://www.citrix.com/blogs/2022/05/17/abac-vs-rbac-comparison/ Tue, 17 May 2022 14:00:59 +0000 https://citrixblogs.wpengine.com/?p=174257090

Two of the most common methods for securing access to business resources are attribute-based access control (ABAC) and role-based access control (RBAC). These types of access control models determine authorization based on who the user is and what resources they’re …

]]>

Two of the most common methods for securing access to business resources are attribute-based access control (ABAC) and role-based access control (RBAC). These types of access control models determine authorization based on who the user is and what resources they’re …

]]>
Citrix Features Explained: Adaptive authentication and access in Citrix Secure Private Access https://www.citrix.com/blogs/2022/05/09/adaptive-authentication-access-citrix-secure-private-access/ Mon, 09 May 2022 13:00:28 +0000 https://citrixblogs.wpengine.com/?p=174257047

Every employee in your hybrid workforce is unique. They have their own devices and home networks, their own remote work preferences, and their own workflows in how they get their best work done. However, all hybrid employees need reliable and …

]]>

Every employee in your hybrid workforce is unique. They have their own devices and home networks, their own remote work preferences, and their own workflows in how they get their best work done. However, all hybrid employees need reliable and …

]]>
Citrix Features Explained: Improving user experience with Citrix Secure Private Access https://www.citrix.com/blogs/2022/05/04/improving-user-experience-citrix-secure-private-access/ Wed, 04 May 2022 13:00:13 +0000 https://citrixblogs.wpengine.com/?p=174257039

Your workforce has gone hybrid. Your employees demand anywhere access to the SaaS and cloud apps they need to be productive alongside an engaging and secure user experience. But because your critical business apps remain inside the datacenter while employees …

]]>

Your workforce has gone hybrid. Your employees demand anywhere access to the SaaS and cloud apps they need to be productive alongside an engaging and secure user experience. But because your critical business apps remain inside the datacenter while employees …

]]>
Fill the IT gaps in your organization with an enterprise browser https://www.citrix.com/blogs/2022/04/06/fill-the-it-gaps-in-your-organization-with-an-enterprise-browser/ Wed, 06 Apr 2022 14:00:36 +0000 https://citrixblogs.wpengine.com/?p=174256763

Web standards and browsers have been great at providing a common platform for web and SaaS app delivery. The browser has become a primary interface for users to get work done.

However, there are many gaps the modern enterprise needs …

]]>

Web standards and browsers have been great at providing a common platform for web and SaaS app delivery. The browser has become a primary interface for users to get work done.

However, there are many gaps the modern enterprise needs …

]]>
General availability is here for Citrix Secure Private Access https://www.citrix.com/blogs/2022/04/04/citrix-secure-private-access-general-availability/ Mon, 04 Apr 2022 13:00:44 +0000 https://citrixblogs.wpengine.com/?p=174256715

Never Trust, Always Verify — It is not just a tagline, it is a powerful and elegant approach to zero trust security outcomes.

At Citrix, we have been working tirelessly to empower our customers to deliver zero trust security outcomes …

]]>

Never Trust, Always Verify — It is not just a tagline, it is a powerful and elegant approach to zero trust security outcomes.

At Citrix, we have been working tirelessly to empower our customers to deliver zero trust security outcomes …

]]>
Modernizing Citrix digital workspace solutions https://www.citrix.com/blogs/2022/04/01/modernizing-citrix-digital-workspace-solutions/ Fri, 01 Apr 2022 14:51:27 +0000 https://citrixblogs.wpengine.com/?p=174256665

Today, Citrix is announcing a new, streamlined approach for our digital workspace solutions that strengthens the value of our cloud services, align our offerings to distinct business use cases, and empower you — our valued customers — to personalize your …

]]>

Today, Citrix is announcing a new, streamlined approach for our digital workspace solutions that strengthens the value of our cloud services, align our offerings to distinct business use cases, and empower you — our valued customers — to personalize your …

]]>
Top 3 reasons to consider a cloud deployment … with LTSR components https://www.citrix.com/blogs/2022/03/24/top-3-reasons-to-consider-a-cloud-deployment-with-ltsr-components/ Thu, 24 Mar 2022 13:00:46 +0000 https://citrixblogs.wpengine.com/?p=174256630

The great thing about the latest LTSR is that it inherits all the feature updates from the prior Citrix Virtual Apps and Desktops versions. In another post I outlined the Top 5 reasons to move to the latest LTSR. …

]]>

The great thing about the latest LTSR is that it inherits all the feature updates from the prior Citrix Virtual Apps and Desktops versions. In another post I outlined the Top 5 reasons to move to the latest LTSR. …

]]>
Take control of IT security for your organization https://www.citrix.com/blogs/2022/03/17/take-control-of-it-security-for-your-organization/ Thu, 17 Mar 2022 14:00:03 +0000 https://citrixblogs.wpengine.com/?p=174256526

You’re probably familiar with the idea of a computer network resembling a castle with tall walls, a single front gate, and a moat. But as we all know, that’s a poor way to secure modern IT infrastructure. With thousands of …

]]>

You’re probably familiar with the idea of a computer network resembling a castle with tall walls, a single front gate, and a moat. But as we all know, that’s a poor way to secure modern IT infrastructure. With thousands of …

]]>
Could internal apps be your biggest security risk? https://www.citrix.com/blogs/2022/03/15/could-internal-apps-be-your-biggest-security-risk/ Tue, 15 Mar 2022 20:00:48 +0000