Category Archives: Citrix

  • 0

Download the Citrix Ransomware kit

Category : Citrix

Are you reducing your attack surface so ransomware attacks are minimized?  Can you quickly recover without paying a ransom?  Yes you can.  Learn how.

With this kit you will learn how to:

  • Publish virtualized, sandboxed and hardened browsers and email clients
  • Utilize Hypervisor Introspection (HVI) to detect ransomware techniques
  • Protect mobile devices against attacks with containerization
  • Provide a secure and robust enterprise data sync and sharing service

Complete the form


  • 0

Winning the Business Relay Race with ShareFile Secure Document Workflows

Category : Citrix

As I mentioned in my last few blog posts (links below), watching my kids in elite level sports for many years, I’ve seen what a competitive edge delivers. In track, relay runners must pass a baton between each leg of the run. A missed baton pass or an early/late pass can disqualify the entire team. It’s no different for today’s IT decision makers — they must also delver finely–tuned collaboration tools to optimize effective team communication both internally and externally. In the third post of the series, the focus is on how Citrix ShareFile delivers advanced, secure document workflows with built-in feedback, approval, and collaboration features to deliver that extra edge to internal productivity.

Passing the baton is one of the most challenging components for a relay in track. It requires fine-tuned collaboration, because a dropped baton or a delay in the pass means instant disqualification for the team. Like a well-oiled relay team, ShareFile provides a seamless pass when working with secure document workflows with built-in feedback, approval, and collaboration features.

ShareFile supports advanced, secure document workflows with built-in feedback, approval, and collaboration features

Exchanging files is at the core of how things are done in most organizations today. Sending documents internally and externally for approvals and signatures are common when managing contracts, onboarding employees, approving work orders, doing performance reviews, and many other typical business tasks.

Citrix ShareFile is evolving from a basic sync and share tool to a platform that supports all document-centric tasks and workflows required by the modern enterprise. ShareFile’s simple, secure, and seamless workflows enable anytime, anywhere, and any-device access while meeting the organization’s requirements for security, manageability, and compliance. ShareFile provides real-time secure mobile access to critical business information, enabling instant collaboration and increased productivity across distributed teams. Collaboration is built around defined workspaces to achieve specific tasks and objectives. A single solution supports business requirements for secure file sharing, document collaboration, and activity workflows.

Improve Efficiency with Mobile Forms and Workflows

ShareFile delivers three critical workflows to meet the dynamic needs of today’s mobile work­force:

  1. Feedback & Approval Document Workflows
  2. Custom Workflows
  3. Advanced Custom Workflows

Summary

Today’s increasingly dynamic, distributed, and digitized mobile workforce demands instant access to the critical business information they need to do their jobs effectively and add value. The ability to securely exchange insights and collaborate on work documents is an essential component of productivity. Content collaboration and file sharing are at the core of hundreds of organizational workflows responsible for coordinating the people, processes, and technologies that drive daily business operations, including project plans, work orders, status reports, contract management, invoice processing, employee onboarding, and performance reviews.

More posts in this series:

Read More on ShareFile:

Source: https://www.citrix.com/blogs/2017/10/04/winning-the-business-relay-race-with-sharefile-secure-document-workflows/?utm_content=buffer9f34e&utm_medium=Social%2Bmedia%2B-%2BOrganic&utm_source=linkedin&utm_campaign=corp%2Bsocial%2Bmarketing%2B(organic%2Bposts%2Band%2Bfeeds)

Author: Jane Foreman


  • 0

Moving to the Cloud? Rethink your Security Efficacy

Category : Citrix

How do you protect your hybrid cloud deployments against cybersecurity attacks

Cybersecurity is all about managing and reducing your business risks. Increasing your application and network security efficacy mitigates these business risks. In the new world of hybrid cloud and SaaS apps, the security perimeter no longer exists.

Watch this webinar and learn:

  • Strategies to increase your security efficacy
  • If you are adopting hybrid cloud, how do you maintain your security efficacy?
  • How do you get started today?

Watch now!


  • 0

The Unified Endpoint Gold Standard, Citrix Receiver, XenApp and XenDesktop

Category : Citrix

With all the buzz about unified endpoints, you can be forgiven for thinking that it’s a new concept for simplifying mobility management and protecting sensitive data in a BYO world. But is it really new?

If you really think about it, the core concept behind unified endpoint management and delivery is to simplify app and desktop management and make sure sensitive information remains protected, even while people use any device, anywhere to do their work.

At Citrix, we refer to that value proposition as the secure delivery of apps and data, and we not only invented that market, we continue to introduce new innovations through our XenApp and XenDesktop family of products and servicesAnd we support every device with Citrix Receiver, which has become the gold standard for secure unified endpoint delivery. Name an operating system or device platform, and you’ll find a Citrix Receiver that supports it. Just as important, Citrix delivers a seamless, high-performance virtual app and desktop experience, because the Citrix HDX protocol, which continues to evolve, is the most efficient in the industry, and it’s supported on all devices.

For years, our technology partners have depended on Citrix to make sure their new product offerings seamlessly integrate with Citrix Receiver as soon as they are available. For nearly ten years, Citrix Receiver has supported new devices on day one, from iPads to Chromebooks to the latest devices from Samsung.

Earlier today, Samsung announced the new Samsung Note 8 phone that will provide users a powerful full virtual desktop experience when combined with Citrix Receiver and the Samsung DeX Station – extending full desktop capability to the latest Samsung smartphone. Citrix customers continue to show high interest in testing and deploying new enterprise virtualization use cases with the Samsung DeX while independent reviewers have tested XenApp, XenDesktop and Citrix Receiver with the Samsung Galaxy S8 and the DeX Station to run specialized business applications, with impressive results.

And while partners count on Citrix Receiver to provide Day 1 support for their new devices and platforms, our value comes from the way our customers use it to protect their data, increase productivity, and to even provide better patient care. Chromebooks have been deployed at hundreds of customers across almost every vertical market, including health care. Chapter Health Systems, deployed Chromebook cloud end points with XenApp and Citrix Receiver to help health care professionals focus on seamless, secure and quality patient care.

And Citrix Receiver for Chrome continues to get better with new quarterly releasescontinually bringing more features and capabilities to customers. We long ago passed the double digit market for new releases of Receiver for Chrome updates since 2011 – in case anyone is counting. And we also make it easy for Google customers to accelerate their cloud transformation, and easily access their data with our expanded partnership and integration between ShareFile and G-Suite.

Citrix unified endpoint value extends far beyond our ability to work with any single device. Our customers love the Citrix commitment to support any device on any cloud with any hypervisor on a wide range of IT infrastructures.

While we’ve come a long way, you can depend on Citrix to make sure XenApp, XenDesktop and Citrix Receiver continue to be the gold standard for unified endpoint delivery. Count on Citrix to securely deliver any app to any device, and to provide the best experience, period.


  • 0

Three Things about Networks That Every CIO Should Have on their Agenda

Category : Citrix

We are headed for a future in which everything will be connected to the cloud – not just traditional servers and clients, but any kind of industrial plant, building, vehicle, machinery, and device. Global always-on networking will fundamentally transform all industries. To keep up with the upcoming changes and market requirements there are three topics every CIO, Head of IT, or Network Manager should have on their agenda:

  1. The network is the future business platform. Within the next five to ten years, business will be transformed by digital technology, on a much larger scale than seemingly possible at first glance. Everything will be part of a globally-interconnected IT infrastructure, the Internet of Things (IoT). The IoT provides a flood of sensory data to big data analytics and allows for real-time (or near real-time) interactivity. Whatever industry, the IT network will become the foundation of every business. For example, car manufacturers are preparing for a future when cars are not simply hardware that takes us from A to B, but interconnected software platforms that provide an individualized user experience to drivers. Forklift manufacturers will provide forklifts as a service with cloud-based management and fault monitoring. The list goes on and on.
  1. The network is software-defined. It is a natural mistake to think of the global networking infrastructure as just a gigantic accumulation of hardware: copper wires, fiber cables, switches, and routers. But this hardware is increasingly becoming software-defined. Software-defined networking means that data paths are no longer pre-defined connections; instead, software dynamically determines these data paths, making the network more agile. For example, branch offices used to be connected to headquarters via leased lines, complemented by some narrowband method of emergency failover. In contrast, the modern branch office communicates via multiple IP connections. A device at the branch office site uses software algorithms to decide which connection(s) to use. This way, data paths can be diversified based on economic parameters or technical necessities, such as balancing traffic loads between multiple lines. This makes the network much more powerful and cost-efficient. Ideally the network is part of a trusted security architecture enabling user-centric policies to intelligently control and secure the different types of apps, the devices and the end-to-end networks framework.
  1. Network performance does not equal business performance. With all this talk about the importance of the network and new ways to improve its performance, it seems logical to assume: the faster my network, the more efficient my business processes. Unfortunately, this is not quite right. The network is simply the vehicle for data transportation between applications. It is the applications that contain the business workflows, and sometimes whole business processes. Therefore, it is critical for a successful digital transformation to have full control of how applications are delivered. For this purpose, modern enterprises deploy so-called ‘application delivery controllers’. These allow granular management of application availability and behavior as well as application security and secure digital perimeter security policy enforcement.

Data is the new currency, making the unhindered flow of data an essential prerequisite in the modern enterprise. In a time of ubiquitous cloud services, global interconnectivity due to the rise of the Internet of Things, and digital transformation rapidly progressing across all industries, network infrastructure provides the very foundation of today’s – and, what’s more, future – business operation. In this scenario, solid network connectivity is the bare necessity for business. Software-defined networking is needed to make this infrastructure agile enough to swiftly adapt to changing business needs. And ADCs help to bridge the gap between the network, security, and business applications. This way, intelligent networks provide the groundwork for a successful digital transformation.

Source: https://www.citrix.com/blogs/2017/09/18/three-things-about-networks-that-every-cio-should-have-on-their-agenda/?utm_content=buffer5340f&utm_medium=Social%2Bmedia%2B-%2BOrganic&utm_source=linkedin&utm_campaign=corp%2Bsocial%2Bmarketing%2B(organic%2Bposts%2Band%2Bfeeds)

Author: Sherif Seddik


  • 0

Active Threat Analytics

Category : Citrix

You’ve implemented security technology to block the majority of threats in your environment, but your security team is still struggling with managing and acting on the sheer volume of security incidents. How do you make sure your team is able to detect and investigate threats with greater speed, accuracy and focus?

In this session, we’ll demonstrate how Cisco Active Threat Analytics, a 24-hour continuous-monitoring and advanced-analytics service, combines technology, industry-leading threat intelligence, analytics and expert investigators to help you manage, detect, and respond to advanced threats.


Friday, September 15, 2017
10:00 AM PT / 1:00 PM ET 

Register now


  • 0

The Usual Suspects – The Security Pitfalls of Data At Large

Category : Citrix

citrix_data_security

Data is the crown jewel of an organization – its high value must be protected at all costs. Data fuels the modern-day economy; the work of the present and the work of the future demand that we share it more than ever before.

But while data mobility is reaching new horizons, many of the controls to mitigate the risk of data exposure still rely on traditional protection – a patchwork of complexity that is the enemy of security. In this post, we explore some of the common security pitfalls that organizations face while guarding against data exposure. It is still incredibly easy to lose data by direct attack, simple mistakes, and negligence. Some of these common pitfalls can include:

  • Loss or destruction of endpoints
  • Using consumer-grade collaboration and file sharing tools
  • Transferring files over insecure media including USB drives
  • Emailing sensitive information to personal email accounts
  • Social engineering (i.e. phishing) – the human factor and malware

Let’s start by taking a glimpse at a typical enterprise. As you can imagine, there is technology sprawl – application sprawl, network sprawl, and more recently cloud sprawl. We use services built on multiple cloud infrastructures and leverage many SaaS apps. These are used in conjunction with legacy (yet business critical) and custom applications built on-prem in the last 25 to 30 years. The result is personal and business data sprawled across a matrix of devices and locations. The traditional enterprise perimeter – the castle and moat – where IT is in complete control has almost completely eroded. The industry’s response has been to fill each gap and use case with a slew of security products, each with its own unique policy and capabilities and limitations. Together, this complexity, an increased attack surface, and a loss of IT control equates to a greater security threat.

With new regulations such as the EU General Data Protection Regulation (GDPR), data protection, specifically customer personal information, takes on a new set of requirements as discussed in our recent GDPR whitepaper.

In the global study from Citrix and The Ponemon Institute, we discovered that:

  • 64 percent of respondents say their organization has no way to effectively reduce the inherent risk of unmanaged data (e.g. downloaded onto USB drives, shared with third parties, or files with no expiration date)
  • 79 percent of respondents are worried about security breaches involving high-value information
  • 52 percent of respondents do not feel that their security infrastructure facilitates compliance and regulatory enforcement with a centralized approach to controlling, monitoring and reporting of data

The nightmare scenario may be more sinister than simple data theft for economic gain. The next frontier may very well be the “weaponizing of data”- leaks, extortion, and blackmail.

Bruce Schneier discusses the concept of “Organizational Doxing“:

Organizations are increasingly getting hacked, and not by criminals wanting to steal credit card numbers or account information in order to commit fraud, but by people intent on stealing as much data as they can and publishing it

But more elaborate are potential attacks on data integrity as identified in the Senate Armed Services Committee report on Worldwide Threat Assessment of the US Intelligence Community:

Most of the public discussion regarding cyber threats has focused on the confidentiality and availability of information; cyber espionage undermines confidentiality, whereas denial-of-service operations and data-deletion attacks undermine availability. In the future, however, we might also see more cyber operations that will change or manipulate electronic information in order to compromise its integrity (i.e. accuracy and reliability) instead of deleting it or disrupting access to it. Decision making by senior government officials (civilian and military), corporate executives, investors, or others will be impaired if they cannot trust the information they are receiving.

That requires a purpose-built architecture, one that is designed and hardened for security from the ground up. Integral to this architecture is the inherent security Citrix provides by:

  • Centralizing and keeping data off endpoints
  • Containerizing and encrypting data on mobile devices
  • Controlling access to data contextually
  • Using file level access and control (DLP and IRM) for data in motion
  • Partnering with industry leaders to protect data

At its core, the solution must give back control to IT and deliver the best balance between security and user experience. In the end, people need and want to work efficiently. If data sharing is made onerous, it creates an opportunity for insecure shortcuts, Shadow IT, and liability.

Source: https://www.citrix.com/blogs/2017/08/17/the-usual-suspects-the-security-pitfalls-of-data-at-large/?utm_content=bufferef9f7&utm_medium=social%2Bmedia&utm_source=linkedin.com&utm_campaign=corp%2Bsocial%2Bmarketing%2B(organic%2Bposts%2Band%2Bfeeds)

Author: Florin Lazurca


  • 0

The Unified Endpoint Gold Standard: Citrix Receiver, XenApp and XenDesktop

Category : Citrix

With all the buzz about unified endpoints, you can be forgiven for thinking that it’s a new concept for simplifying mobility management and protecting sensitive data in a BYO world. But is it really new?

If you really think about it, the core concept behind unified endpoint management and delivery is to simplify app and desktop management and make sure sensitive information remains protected, even while people use any device, anywhere to do their work.

At Citrix, we refer to that value proposition as the secure delivery of apps and data, and we not only invented that market, we continue to introduce new innovations through our XenApp and XenDesktop family of products and servicesAnd we support every device with Citrix Receiver, which has become the gold standard for secure unified endpoint delivery. Name an operating system or device platform, and you’ll find a Citrix Receiver that supports it. Just as important, Citrix delivers a seamless, high-performance virtual app and desktop experience, because the Citrix HDX protocol, which continues to evolve, is the most efficient in the industry, and it’s supported on all devices.

For years, our technology partners have depended on Citrix to make sure their new product offerings seamlessly integrate with Citrix Receiver as soon as they are available. For nearly ten years, Citrix Receiver has supported new devices on day one, from iPads to Chromebooks to the latest devices from Samsung.

Earlier today, Samsung announced the new Samsung Note 8 phone that will provide users a powerful full virtual desktop experience when combined with Citrix Receiver and the Samsung DeX Station – extending full desktop capability to the latest Samsung smartphone. Citrix customers continue to show high interest in testing and deploying new enterprise virtualization use cases with the Samsung DeX while independent reviewers have tested XenApp, XenDesktop and Citrix Receiver with the Samsung Galaxy S8 and the DeX Station to run specialized business applications, with impressive results.

And while partners count on Citrix Receiver to provide Day 1 support for their new devices and platforms, our value comes from the way our customers use it to protect their data, increase productivity, and to even provide better patient care. Chromebooks have been deployed at hundreds of customers across almost every vertical market, including health care. Chapter Health Systems, deployed Chromebook cloud end points with XenApp and Citrix Receiver to help health care professionals focus on seamless, secure and quality patient care.

And Citrix Receiver for Chrome continues to get better with new quarterly releasescontinually bringing more features and capabilities to customers. We long ago passed the double digit market for new releases of Receiver for Chrome updates since 2011 – in case anyone is counting. And we also make it easy for Google customers to accelerate their cloud transformation, and easily access their data with our expanded partnership and integration between ShareFile and G-Suite.

Citrix unified endpoint value extends far beyond our ability to work with any single device. Our customers love the Citrix commitment to support any device on any cloud with any hypervisor on a wide range of IT infrastructures.

While we’ve come a long way, you can depend on Citrix to make sure XenApp, XenDesktop and Citrix Receiver continue to be the gold standard for unified endpoint delivery. Count on Citrix to securely deliver any app to any device, and to provide the best experience, period.

Source: https://www.citrix.com/blogs/2017/08/24/the-unified-endpoint-gold-standard-citrix-receiver-xenapp-and-xendesktop/

Author: 


  • 0

Preparing for the Workspace of the Future

Category : Citrix

Future work environments will no longer tether employees to their desks, offices, or even devices. Rather, they will unify all cloud-based and physical resources that people need to do their jobs—and do so in a more secure and contextual manner than anything available today.

As workers continue to consume more cloud services, enterprise IT is evolving toward a secure digital workspace platform. This will give IT administrators:

  • a streamlined insight into and governance over how SaaS, web, and even local apps are secured and presented
    to users.
  • a new way for employees to begin their day, securely accessing apps and data in a more personalized manner.

  • 0

The growing U.S. IT productivity gap

Category : Citrix

Productivity growth has slowed down despite our rising investment in IT. Learn the causes of the slowdown and how to close the gap and increase productivity.

Demo series

See how Citrix Workspace delivers an integrated digital workspace that’s streamlined for IT control and easily accessible for users.

Source: https://www.citrix.com/products/citrix-workspace/resources/productivity-gap-infographic.html?utm_content=bufferd124f&utm_medium=social%2Bmedia&utm_source=linkedin.com&utm_campaign=corp%2Bsocial%2Bmarketing%2B(organic%2Bposts%2Band%2Bfeeds)’

Support