NetScaler

Displaying 25 of 441 results

How NetScaler CPX License Aggregator simplifies CPX licensing in Kubernetes

NetScaler is a feature-rich application delivery controller that comes in various forms, including hardware (MPX), virtual (VPX), and containerized (CPX).…

Worried about the latest OpenSSL vulnerability? NetScaler can help.

November has started with the announcement of a high security OpenSSL vulnerability. OpenSSL has released a blog post that provides…

AWS環境でのNetScalerを考える

システムの耐障害性を検討する上でネットワーク機器の高可用性は必要不可欠です。このブログでは、AWS環境におけるNetScalerの冗長性を考えます。

Enable secure web, SaaS app delivery and safe browsing with Citrix browsers

The browser is where significant work gets done. However, consumer browsers offer little protection or IT control to manage corporate…

Mitigating risk from Cambium Networks cnMaestro SQL injection vulnerability

Cambium Networks has issued upgrade packages for their on-premises cnMaestro product for fixing a vulnerability which allowed a pre-auth data…

Critical security update now available for Citrix ADC, Citrix Gateway

Today we released builds to fix CVE-2022-27518, which affects the following Citrix ADC and Citrix Gateway versions: 12.1 (including FIPS…

Open Policy Agent support for Kubernetes using Citrix Ingress Controller

Sometimes you need a general-purpose policy engine that unifies policy enforcement across the stack. That policy engine can give you…

How banks can build better customer relationships with digital technology

Learn how Citrix can help banks leverage technology to manage relationships better, both with employees and customers.

Remote Access Without VPN: Is It Secure?

VPNs have long been a security standard for secure access to corporate applications. Organizations began using VPN services at a…

Reducing zero-day vulnerability in Microsoft Exchange Server with Citrix Web App Firewall

On September 29 two new Microsoft Exchange Server (on-prem) zero day attacks were reported. An adversary who has access to…

BYOD is still a thing, now more than ever!

BYOD has been around for a long time in practice, although the acronym was not popularized until 2011, when Citrix…

Hybrid cloud security with zero trust solutions from Citrix

The growth in hybrid work creates challenges for IT admins everywhere. How do you keep remote workers safe? How do…

Delivering enterprise web apps with Citrix Enterprise Browser

When consumerization of IT was the next big thing, enterprises spent a lot of time and money modernizing apps and…

How Citrix Web App Firewall can help mitigate risk of authentication bypass vulnerability

Citrix has crafted new signatures and has updated its Citrix Web App Firewall signature file to help customers mitigate the…

Get highly flexible, SaaS-based app delivery and security with Citrix

Last November, Citrix introduced a paradigm-shifting advancement in application delivery with the first intent-based app delivery and security service. Citrix…

What to know about zero trust architectures

Zero trust architectures have gained rapid adoption by cybersecurity teams recently with the rise of knowledge workers moving to remote…

How to implement zero trust security for your network

“Never trust, always verify” and “just enough” access. These are the key philosophies behind zero trust approaches to cybersecurity. Although…

It’s time to stop using consumer browsers for work

It has been 32 years since the world’s first browser — the “WorldWideWeb browser” — was created by Tim Berners-Lee…

How to create a zero trust network

Looking to achieve zero trust security for your business? You’re not alone. The White House recently released an edict declaring…

Zero trust architecture benefits for your business

In a perfect world, you could turn a blind eye to your company network and safely trust that anyone trying…

Citrix Features Explained: Improving end-user security with Citrix Secure Private Access

The biggest threat to your organization is coming from inside. From careless mistakes to lost devices to malicious insiders, a…

Seven principles of the zero trust security model

The reality of today’s fast-paced, increasingly remote work environment positions your business as vulnerable to security breaches. Your employees increasingly…

Why should you evolve your multi-factor authentication to adaptive authentication?

As organizations embrace digital transformation, the need to protect data and control who accesses it increases. Distributed workforces and online…

Advanced global traffic management with Citrix App Delivery and Security Service – Part 2

In the first blog post in our series, we covered Citrix App Delivery and Security service’s advanced GSLB capabilities and…

The case for an enterprise browser

The browser has become the universal endpoint for devices and the user interface for applications. It is now a primary…

Show More Loading