Jump to content

Tech Briefs

  1. Tech Brief: Multifactor Authentication with Citrix nFactor

    Introduction Weak or stolen passwords are a leading cause of breaches in Enterprise networks. They can lead to loss of Intellectual Property, loss of Personally identifiable information (PII) and result in a significant impact on the business. Multifactor Authentication (MFA) is one of the best security measures to guard against identity vulnerabilities. Typically there are three types of authentication used to identify users: 1) Something you know (for example, password) - this t
  2. Tech Brief: Optimizations for Citrix DaaS and Citrix Virtual Apps and Desktops - Cost

    Overview Citrix has enabled and released features allowing IT admins and end-users to reduce costs for your organization. Learn about how to configure these features to allow the right balance between delivering a great end-user experience and optimizing costs. Summary of the components and features available in Citrix DaaS and Citrix Virtual Apps and Desktops: Component Citrix DaaS Citrix Virtual Apps and Desktops LTSR (2203) Citrix Virtual Apps and Desktops CR (2308) Autoscale -
  3. Tech Brief: Seamless Authentication Options on Citrix Workspace app

    Overview Citrix Workspace app (CWA) provides users a personalized interface that enables instant access to virtual applications, desktops, SaaS, and web apps. Users get seamless and secure access to all the apps needed to stay productive, including features like embedded browsing and single sign-on. CWA provides several authentication options administrators can enable in line with the identity provider enabled in your organization across on-premises and cloud environments. Force Login Prompt
  4. Tech Brief: Secure Private Access

    Overview Citrix Secure Private Access is a cloud delivered Zero Trust Network Access (ZTNA) solution that delivers adaptive access to IT sanctioned applications whether they are deployed on-prem or in the cloud. Traditional VPN solutions provide access at the network level and are: Prone to network level attacks Require backhauling of all traffic Often requires device management to capture the state of the end user device Citrix Secure Private Access helps avoid
  5. Tech Brief: Secure Private Access - Use Cases

    Introduction In today's world, facing cyberattacks day by day, it is even more necessary to secure remote access to applications, documents, or whatever in a granular way. A Zero-Trust architecture makes it possible and allows you to narrow down application access based on context. The term "context" here refers to: Users and groups (users and user groups) Devices (desktop or mobile devices) Location (geo-location or network location) Device posture (device
  6. Tech Brief: User Layer Management Utility - Converting VHD to VHDX

    Overview The User Layer Repair Utility is a tool created by Rob Zylowski. It enables administrators to select an OS layer, list all the app layers created with that layer, and match the layers to their associated repair JSON file. VHDX Conversion Feature The new feature to convert VHDs to VHDX and works similarly to the other features of the utility. The user interface is shown in the following image. After opening the utility, you click the Convert tab. Then, if you have not run it alrea
  7. Tech Brief: Workspace app

    As users access their resources -- SaaS apps, web apps, Windows apps, Linux apps, and desktops-- from numerous corporate and personal devices, they need a simple and unified experience that enables them to seamlessly gain access to everything. Organizations also must make it easy for users to onboard new devices while ensuring that centralizing security controls do not negatively impact the users’ experiences. Overview Workspace app gives users a personalized interface enabling instant access
  8. Tech Brief: Workspace Environment Management

    Introduction Workspace Environment Management (WEM) uses intelligent resource management and Profile Management technologies to deliver the best possible performance, desktop logon, and application response times for Citrix Virtual Apps and Desktops(CVAD) deployments. WEM has several security features that bolster the security posture of the deployment. It is a software-only, driver-free solution. Architecture Workspace Environment Management can be installed on-premises or accessed as a ser
  9. Tech Brief: Workspace Identity

    A user’s primary workspace identity authorizes access to all workspace resource feeds including mobile apps, virtual apps, and virtual desktops. Citrix Workspace provides organizations with a choice in selecting the user’s primary identity provider. Identity Provider (IdP) An identity provider is the final authority of the user’s identity. The identity provider is responsible for the policies to protect and secure the user’s identity, which includes password policies, multifactor authenticatio
  10. Tech Brief: Workspace Single Sign-On

    A user’s primary Workspace identity authorizes them to access SaaS, mobile, web, virtual apps, and virtual desktops. Many authorized resources require another authentication, often with an identity different from the user’s primary workspace identity. Citrix Workspace provides users with a seamless experience by providing single sign-on to secondary resources. Primary Identity Understanding the differences between a user’s primary and secondary identities provides a foundation for understandin
  11. Tech Brief: Zero Trust

    Overview Traditional, perimeter-based approaches to protecting information systems and data are inadequate. For many years, the cybersecurity paradigm has emulated a familiar form of physical security from the middle ages: the castle and the moat. It’s an approach many enterprises have adopted and are finding insufficient in the world of cloud. In this classic defense model, multiple layers of protection with tightly secured checkpoints and gateways surround and protect the crown jewels. All
  12. Workspace Environment Management - Security

    Overview This Tech Brief explores the pivotal security features embedded within Citrix Workspace Environment Management (WEM). In today’s rapidly evolving digital landscape, robust application security within WEM is not just a luxury. It is a necessity. By harnessing the power of WEM, organizations can bolster their security posture, seamlessly navigate the complexities of application management, and protect their environment against many threats. This Tech Brief provides an overview of WEM
  • Create New...