NetScaler is a feature-rich application delivery controller that comes in various forms, including hardware (MPX), virtual (VPX), and containerized (CPX).…
November has started with the announcement of a high security OpenSSL vulnerability. OpenSSL has released a blog post that provides…
システムの耐障害性を検討する上でネットワーク機器の高可用性は必要不可欠です。このブログでは、AWS環境におけるNetScalerの冗長性を考えます。
The browser is where significant work gets done. However, consumer browsers offer little protection or IT control to manage corporate…
Cambium Networks has issued upgrade packages for their on-premises cnMaestro product for fixing a vulnerability which allowed a pre-auth data…
Today we released builds to fix CVE-2022-27518, which affects the following Citrix ADC and Citrix Gateway versions: 12.1 (including FIPS…
Sometimes you need a general-purpose policy engine that unifies policy enforcement across the stack. That policy engine can give you…
Learn how Citrix can help banks leverage technology to manage relationships better, both with employees and customers.
VPNs have long been a security standard for secure access to corporate applications. Organizations began using VPN services at a…
On September 29 two new Microsoft Exchange Server (on-prem) zero day attacks were reported. An adversary who has access to…
BYOD has been around for a long time in practice, although the acronym was not popularized until 2011, when Citrix…
The growth in hybrid work creates challenges for IT admins everywhere. How do you keep remote workers safe? How do…
When consumerization of IT was the next big thing, enterprises spent a lot of time and money modernizing apps and…
Citrix has crafted new signatures and has updated its Citrix Web App Firewall signature file to help customers mitigate the…
Last November, Citrix introduced a paradigm-shifting advancement in application delivery with the first intent-based app delivery and security service. Citrix…
Zero trust architectures have gained rapid adoption by cybersecurity teams recently with the rise of knowledge workers moving to remote…
“Never trust, always verify” and “just enough” access. These are the key philosophies behind zero trust approaches to cybersecurity. Although…
It has been 32 years since the world’s first browser — the “WorldWideWeb browser” — was created by Tim Berners-Lee…
Looking to achieve zero trust security for your business? You’re not alone. The White House recently released an edict declaring…
In a perfect world, you could turn a blind eye to your company network and safely trust that anyone trying…
The biggest threat to your organization is coming from inside. From careless mistakes to lost devices to malicious insiders, a…
The reality of today’s fast-paced, increasingly remote work environment positions your business as vulnerable to security breaches. Your employees increasingly…
As organizations embrace digital transformation, the need to protect data and control who accesses it increases. Distributed workforces and online…
In the first blog post in our series, we covered Citrix App Delivery and Security service’s advanced GSLB capabilities and…
The browser has become the universal endpoint for devices and the user interface for applications. It is now a primary…