Bring Your Own Device (BYOD)

Displaying 25 of 63 results

BYOD is still a thing, now more than ever!

BYOD has been around for a long time in practice, although the acronym was not popularized until 2011, when Citrix…

What is Authentication vs. Authorization? The Main Differences

Authentication and authorization are essential processes of identity and access management. While the terms are often used interchangeably, authentication and…

How to have a successful digital employee onboarding experience

A successful onboarding process can set your employees on the right track, increase employee retention, and improve productivity. But when…

Delivering enterprise web apps with Citrix Enterprise Browser

When consumerization of IT was the next big thing, enterprises spent a lot of time and money modernizing apps and…

What to know about zero trust architectures

Zero trust architectures have gained rapid adoption by cybersecurity teams recently with the rise of knowledge workers moving to remote…

How to implement zero trust security for your network

“Never trust, always verify” and “just enough” access. These are the key philosophies behind zero trust approaches to cybersecurity. Although…

How to create a zero trust network

Looking to achieve zero trust security for your business? You’re not alone. The White House recently released an edict declaring…

DaaS and VDI vs. VPN: Which is best for your business?

While VPNs have traditionally connected an end-user with the organization’s private network, VDI and DaaS enable users to securely connect…

The case for an enterprise browser

The browser has become the universal endpoint for devices and the user interface for applications. It is now a primary…

Protect your workforce against browser-based attacks with a zero trust network

Which web browsing risks concern you the most? Businesses are faced with the reality of threat actors attempting to access…

Citrix ZTNA solutions help organizations secure their remote workforces

Citrix has been in the business of delivering secure remote work through its digital workspace solutions for more than three…

ZTNA Vendors: What to look for

Zero trust network access (ZTNA) has been a watchword in digital security for years. Recently, the technology has reached a…

VDI best practices and tips to support remote work

Virtual desktop infrastructure (VDI) is a technology that allows organizations to run operating systems on virtual machines, enabling users to…

Are you protecting your third-party contractors from cyberattacks?

Learn how Citrix solutions like Citrix Secure Private Access and app protection can help you to protect your third-party service providers and your organization from bad actors.

Single pane configuration for Citrix Workspace app for Chrome OS

As an admin of Citrix Workspace app on Chrome OS, you have flexibility in how you want to configure your…

Fill the IT gaps in your organization with an enterprise browser

Web standards and browsers have been great at providing a common platform for web and SaaS app delivery. The browser…

General availability is here for Citrix Secure Private Access

Never Trust, Always Verify — It is not just a tagline, it is a powerful and elegant approach to zero…

A secure endpoint OS for your hybrid healthcare deployment

Learn how, together, Citrix and Stratodesk are helping healthcare IT navigate the challenging waters of hybrid work and create smarter workspaces.

How to protect yourself against keyloggers

Conversations about the future of work were propelled forward during the pandemic. The rapid shift to remote work and the…

IAM vs PAM: How are they different?

New remote and hybrid working styles have companies thinking deeply about the devices employees use to access company infrastructure. And…

Chromebook with Citrix Virtual Apps and Desktops – ユースケース別デモビデオ

ChromebookとCitrixの仮想デスクトップ環境を利用することで、FAT-PCの展開時にありがちな煩雑なユーザー作業を省力化しつつ、セキュリティに配慮した安全な仮想デスクトップ環境を迅速に展開できます。

What’s new in Citrix Virtual Apps and Desktops – December 2021

The holiday season has arrived, and we come bearing gifts! Citrix Virtual Apps and Desktops 2112 is here and available…

DaaS Security: The importance of secure desktops

With hybrid work here to stay and more companies deploying virtual desktops than ever before, IT teams are challenged with…

ZTNA vs. VPN: How they differ

Before 2020, there were signs of a growing — albeit slow — shift to remote work. But during the COVID-19…

How to secure access to SaaS and web apps without the overhead

Citrix customers traditionally had to publish a virtual browser on Citrix DaaS or rely on a local browser with minimal…

Show More Loading