Zero Trust

Displaying 25 of 154 results

Why URL filtering isn’t enough for a zero-trust deployment

In our two previous blog posts, we talked about zero trust the Citrix way and a key use case, why…

Citrix Secure Private Access delivers ZTNA in hybrid mode

IT organizations seeking to implement zero trust network access (ZTNA) often encounter operational challenges that prevent adoption and successful rollouts…

Announcing the general availability of new enhancements for Citrix Secure Private Access on-premises

Customers implementing Zero Trust Network Access (ZTNA) solutions for secure access to enterprise apps demand greater choice and flexibility with…

3 ways Citrix supported on-premises deployments in 2023

If you joined our What’s New and Next Webinar, you know that we’ve released tons of new features for on-premises…

5 reasons to use Citrix Security solutions for your healthcare organization

Cyber attacks are on the rise across the healthcare industry. Citrix has the technology to secure your whole IT environment. Learn five ways that Citrix can secure your healthcare organization.

Enable secure web, SaaS app delivery and safe browsing with Citrix browsers

The browser is where significant work gets done. However, consumer browsers offer little protection or IT control to manage corporate…

Citrix Secure Private Access On-Premises — Announcing General Availability

We are pleased to announce the General Availability of Citrix Secure Private Access On-Premises solution – a major milestone in our journey to deliver ZTNA as a full customer-managed on-premises solution, providing you the flexibility of a hybrid strategy with the choice to use a mix of SaaS-based and/or customer-managed solutions to best suit your needs.

What’s new with Citrix — March 2023

This year has already been big for Citrix! With a renewed focus on hybrid deployments and meeting organizations where they…

Diving deep into Citrix zero trust architecture

In my previous”Overcoming observed challenges when adopting a zero trust architecture” blog post, I discussed some of the observed challenges…

Establish device trust with Citrix’s device posture service

In our mobile-first world, where hybrid work is the norm for many organizations, employees need access to corporate applications and…

Overcoming observed challenges when adopting a zero trust architecture

Zero trust has become a crucial component in the cybersecurity strategy of organizations everywhere. More and more enterprises are finding…

How banks can meet expectations for the evolving future of work

When the U.K. government lifted its work-from-home guidance, large banks and insurers were among the first to announce plans to…

The role of IT architecture in a transformed banking experience

The banking industry has seen unrivaled transformation over the last decade — from significant regulatory reform to the establishment of…

Citrix Endpoint Management is back by popular demand!

Citrix Endpoint Management is back as part of the Citrix portfolio. Learn more about what's ahead for our endpoint management solution.

Engineer a secure future in Industry 4.0

Today’s manufacturer isn’t short of challenges. Supply chain disruptions and labor shortages are just some of the obstacles it must…

How channel partners are architecting a seamless zero trust framework

Modern threats require a modern approach to security. Plus, our recent survey found that 95 percent of businesses are taking…

How banks can build better customer relationships with digital technology

Learn how Citrix can help banks leverage technology to manage relationships better, both with employees and customers.

Remote Access Without VPN: Is It Secure?

VPNs have long been a security standard for secure access to corporate applications. Organizations began using VPN services at a…

What is Authentication vs. Authorization? The Main Differences

Authentication and authorization are essential processes of identity and access management. While the terms are often used interchangeably, authentication and…

BYOD is still a thing, now more than ever!

BYOD has been around for a long time in practice, although the acronym was not popularized until 2011, when Citrix…

Hybrid cloud security with zero trust solutions from Citrix

The growth in hybrid work creates challenges for IT admins everywhere. How do you keep remote workers safe? How do…

Delivering enterprise web apps with Citrix Enterprise Browser

When consumerization of IT was the next big thing, enterprises spent a lot of time and money modernizing apps and…

What to know about zero trust architectures

Zero trust architectures have gained rapid adoption by cybersecurity teams recently with the rise of knowledge workers moving to remote…

How to implement zero trust security for your network

“Never trust, always verify” and “just enough” access. These are the key philosophies behind zero trust approaches to cybersecurity. Although…

It’s time to stop using consumer browsers for work

It has been 32 years since the world’s first browser — the “WorldWideWeb browser” — was created by Tim Berners-Lee…

Show More Loading