Citrix Secure Private Access provides users with secure access to applications and data regardless of location or device. Operating on a Zero Trust security model, it's designed to address modern challenges related to remote work, cloud adoption, and securing access to corporate resources. It helps organizations maintain a strong security posture while enabling secure, flexible access to corporate resources. This page lists articles related to Citrix Secure Private Access and its components.
Tech Briefs
Tech Briefs are short overview documents that explain a technology, feature, or function in addition to a technical diagram.
Secure Private Access - With Secure Private Access, organizations go beyond access and aggregation to provide IT with policy controls that provide conditional access to cloud apps and internet browsing, enhancing the organization’s overall security and compliance posture.
Secure Private Access - Use Cases - Learn about Citrix Secure Private Access use cases, how to grant access on a Zero Trust approach, using Citrix Enterprise Browser or Remote Browser Isolation, and more.
App protection - App protection policies protect application data from attacks based on keyloggers and screen capture tools. These policies allow companies to embrace BYOD and extend resources to remote workers, contractors, and gig economy workers.
Zero Trust—Zero Trust is the most important End-User Computing movement since Mobile and Cloud. The Citrix Zero Trust Architecture enables the "any-any-any" vision that Citrix has been espousing for years and is secured by access policies contextualizing trust.
Citrix Enterprise Browser - Explores Enterprise Browsers, detailing their purpose in an enterprise environment and providing an overview of the Citrix Enterprise Browser and its core features.
PoC Guides
PoC guides provide step-by-step instructions to learn about the solution's functionality by following these guides in a test environment.
Secure Access to Azure-managed SaaS Applications and Citrix Secure Private Access - Learn how to set up a Citrix Secure Private Access environment that provides enhanced security to Microsoft Azure SaaS Apps.
Secure Access to Internal Web Applications with Citrix Secure Private Access - Learn how to set up VPN-less access to an internal web application with Citrix Secure Private Access, utilizing Citrix-provided SSO.
Secure Access to Office 365 with Citrix Secure Private Access - Learn how to set up a Citrix Secure Private Access environment that provides single sign-on and enhanced security to Office 365.
Secure Access to SaaS Applications with Citrix Secure Private Access - Learn how to set up a Citrix Secure Private Access environment that uses Citrix as the single sign-on provider for SaaS applications.
Secure Access to SaaS Applications with Okta and Citrix Secure Private Access - Learn how to set up a Citrix Secure Private Access environment using Okta as the single sign-on provider for SaaS applications.
Reference Architectures
Reference architectures are comprehensive guides that assist organizations in planning their Citrix implementations, complete with use cases, recommendations, and more.
Reference Architecture - Protect apps and data on bring-your-own devices - Learn how to design an environment to support bring-your-own-devices without compromising IT security. The reference architecture incorporates Secure Private Access, Web App Firewall, and Virtual Apps and Desktops
Secure Private Access - Gain knowledge about the Citrix Secure Private Access solution, including key concepts, use cases, and strategies for implementing this comprehensive security solution for an organization’s apps and data.
Zero Trust Network Access for Contractors and Temp Workers - This reference architecture explains CompanyA’s Zero Trust Network Access plan to protect contractor and temp worker access to its data and apps.
Deployment Guides
Citrix Secure Private Access On-Premises - Learn how to deploy Citrix Secure Private Access On-Premises with StoreFront and NetScaler Gateway.
Tech Papers
Communication Ports Used by Citrix Technologies - Overview of ports used by Citrix components and must be considered part of networking architecture.
There are no comments to display.