Secure virtual desktop infrastructure with Citrix NetScaler and Palo Alto Networks next-generation firewalls

Size: px
Start display at page:

Download "Secure virtual desktop infrastructure with Citrix NetScaler and Palo Alto Networks next-generation firewalls"

Transcription

1 Virtual desktop infrastructure Secure virtual desktop infrastructure with Citrix NetScaler and Palo Alto Networks next-generation firewalls

2 2 Today s enterprises are rapidly adopting desktop virtualization to reduce operating costs, enable workplace flexibility, increase business agility and bolster their information security and compliance posture. Actually realizing these benefits, however, depends upon ensuring the security and availability of the virtual desktop infrastructure (VDI). The combination of Citrix NetScaler and Palo Alto Networks next-generation firewalls secures virtual desktops and ensures their availability, performance and scalability. This solution not only preserves the benefits promised by VDI, it maximizes them. This joint solution is tested and validated for securing Citrix XenApp and Citrix XenDesktop VDI. The desktop virtualization security situation Migrating from traditional desktop deployment and management approaches to virtual desktop technologies is a top initiative for enterprises of all types and sizes worldwide. Indeed, Gartner expects adoption of hosted virtual desktops (HVDs) alone to reach 76 million users by Driving this growth is a compelling set of benefits. With a full-featured desktop virtualization solution, enterprises can substantially and sustainably reduce desktop ownership and operating costs, enable complete workplace flexibility and increase business agility by providing rapid support for strategic initiatives such as mergers and acquisitions, geographic expansion and dynamic partnership arrangements. Desktop virtualization significantly strengthens information security and compliance by centralizing all data and applications in the corporate datacenter. Because users view and manipulate their desktops remotely, there is no need to distribute or store potentially sensitive material on the local device. VDI enhances desktop security because centralization of desktop applications and operating systems increases the IT administrators control over these crucial resources. Centralized control not only makes it easier to pursue standardization that reduces complexity, cost and an organization s attack surface, but also boosts the ease, speed and thoroughness of implementing updates and security patches. Another advantage of a centralized model is speed and efficiency when granting and revoking access rights and privileges. Moreover, there s no dependence on having users return distributed devices, software or data because, with desktop virtualization, there aren t any devices to return.

3 3 Security is a primary concern Desktop virtualization clearly has a lot to offer today s enterprises. However, fully realizing its benefits is not a given. To preserve potential gains, organizations must, among other tasks, ensure the security of their desktop virtualization implementations. This may sound a bit circular organizations must invest in one set of security measures to gain the full benefits of the second but that s exactly the point. To maximize the desktop and data security benefits of virtual desktops, the VDI must be secured. Remote access: With mobility and telecommuting initiatives on the rise, a substantial percentage of users are likely to require access to their desktops from a remote location, often over an insecure public network. Unlike a standard desktop scenario, where an attacker needs possession of the device to get local access, desktop virtualization attacks require access to the network. Device proliferation: Consumerization of IT is requiring IT to support diverse client devices with widely varying security characteristics and profiles. This task is further complicated by the fact that most of these devices are no longer owned or controlled by the enterprise. Although desktop virtualization can eliminate local retention of sensitive data, a compromised client device still poses a threat. Sensitive data could still be viewed and the rights attributed to the user/device could be exploited to launch a far more damaging attack. Extent of access: With desktop virtualization users have access to an entire desktop. In addition to their immediate applications and data, they can also get to all the downstream network resources accessible from their desktops. This elevates the importance of security in general, and access control in particular. Concentration of resources: A robust defense is important because desktop virtualization places many of an organization s eggs in a single basket. In contrast to the conventional, distributed model of desktop computing, a single, successful attack now has the potential to impact a substantial number of users and desktop systems. There is also the big picture to consider. Today s hackers are highly organized and motivated to cause damage and/or make off with valuable data. As a result, robust defenses are generally necessary, if for no other reason than to provide protection from an increasingly sophisticated and hostile threat landscape. How NetScaler and Palo Alto Networks next-generation firewalls can help NetScaler, an advanced solution for delivering apps and cloud and enterprise services, provides an extensive set of capabilities that make it an ideal choice for front-ending an organization s desktop virtualization infrastructure. Particularly relevant are the numerous security mechanisms and features that NetScaler delivers to help protect VDI.

4 4 Palo Alto Networks next-generation firewalls complement NetScaler capabilities by segmenting the VDI in the datacenter and protecting it from threats. By leveraging user authentication information from the VDI, the firewalls control access to applications and data based on security policies. The combination of NetScaler and Palo Alto Networks next-generation firewall is a best-in-class solution that effectively protects the underlying datacenter and keeps users highly productive from anywhere they happen to be. The solution facilitates security for virtual desktop deployments by enabling real-time orchestration of individual technologies and capabilities. A step-by-step deployment guide to securing Citrix XenApp and XenDesktop infrastructure using this joint solution is available. Secure remote access Citrix NetScaler Gateway is a full-featured SSL VPN and an integral component of NetScaler. It gives administrators granular, application-level control while empowering users with remote access to their virtual desktops from anywhere. With NetScaler Gateway, IT administrators can manage access control and limit actions within sessions based on both user identity and attributes of the endpoint device. The result is better application security, data protection and compliance management. Citrix NetScaler Palo Alto Networks NGFW Secure Access Application Security High-availability Next-gen Firewall Threat Protection High-availability Virtual Desktop Infrastructure Figure 1. Citrix NetScaler and Palo Alto Networks next-generation firewall secures VDI NetScaler Gateway enables secure remote access to virtual desktops by providing an encrypted tunnel and supporting a wide range of user authentication methods. Desktop sessions traversing public networks are protected from eavesdropping. Next up is granular and adaptive access control. With NetScaler Gateway, administrators can tightly control access to virtual desktops using policies comprised of both fixed and dynamic attributes, including user identity and role, strength of authentication, location, time of day, and identity and security status of the client device. In addition, NetScaler Gateway supports existing directory and identity management infrastructure. Supporting this capability is another important security feature: endpoint analysis. Integrated endpoint scanning can continually monitor client devices to determine if client security software such as antivirus, personal firewall or other mandatory programs is active and up-to-date. Devices that fail these checks can be denied access, granted limited access or quarantined by restricting their access to sites that provide the tools necessary to restore them to a compliant configuration.

5 5 Advanced action and data control capabilities provide yet another crucial layer of protection, particularly given the proliferation of client devices and growing tendency toward user ownership and self-management. Related features include: Enhanced split tunneling control, where users can access their desktop and the client s local subnet but are prevented from directly accessing the Internet Adaptive action control, where local printing, copy, paste and save-to-disk functionality can be restricted via adaptive policies Browser cache cleanup, where objects and data stored on the local browser are removed upon completion of the virtual desktop session Authentication, confidentiality and encryption NetScaler provides authentication, confidentiality and encryption for the VDI. NetScaler integrates with Citrix secure ticketing authority (STA) Kerberos-style ticketing to eliminate the possibility of session hijacking with cookie-based authentication schemes. The NetScaler proxy architecture, coupled with HTTP/ URL rewrite and Layer 7 (L7) and NetScaler Application Firewall content filtering capabilities, allows virtual desktop administrators to shield connection brokers and other downstream VDI components from direct TCP and UDP connections initiated by external users, thereby reducing their exposure to malware and other types of attacks. NetScaler provides cloaking and content security to effectively hide server error codes, real URLs and other pieces of information that could give hackers the details they need to formulate custom attacks automatically, and to thwart many types of denial of service (DoS) attacks that exploit gaps in common protocols. NetScaler ICA file encryption and AppExpert templates make it simple to configure a highly secure environment to protect XenApp and XenDesktop environments and StoreFront/AppController SSO authentication-based services. StoreFront enables you to create centralized enterprise stores to deliver desktops, applications and other resources to users on any device, anywhere. AppController enables single sign-on services for mobile applications. Network-layer protection NetScaler provides core, network-layer protection for VDI in several ways. To begin with, administrators can use NetScaler to enforce a basic level of access control using straightforward, Layer 3 and 4 access control lists (ACLs) to selectively permit legal traffic while blocking traffic deemed unsafe. In addition, a couple of key design features automatically protect any infrastructure front-ended by NetScaler. For example, NetScaler incorporates a high-performance, enhanced, standards-compliant TCP/IP stack that: automatically drops malformed traffic that could pose a threat to the entire VDI; prevents disclosure of low-level connection information (e.g., IP addresses, server port numbers) that could prove useful to hackers intent on perpetrating an attack; and automatically thwarts many types of DoS attacks that exploit gaps in common protocols.

6 6 Safe enablement for datacenter applications Users may have access to other applications in the datacenter besides their virtual desktop. Palo Alto Networks next-generation firewalls enable advanced, identitybased, granular application control, threat prevention and content leak protection for resources accessed from virtual desktops. This means virtual desktop users may only access applications allowed by their security policy. One of the key benefits of the Palo Alto Networks integration with XenApp and XenDesktop applications is the ability to integrate user identity information, which allows organizations to set up firewall policies based on an individual or group basis, and provides visibility into user activity via detailed reports and logs. The interaction between the VDI and the Palo Alto Networks next-generation firewall simplifies policy creation and management, allowing the firewall to dynamically identify users and enforce security policies. Using the integration organizations can: Establish segmentation by application, user and content in the datacenter Accurately identify and control the use of more than a thousand applications (including common social networking and cloud-based services), regardless of port, protocol or any evasive techniques used to mask their operation Dynamically identify users and enforce security policies for granular application access based on user or group, and generate logs and reports with user, application and content information for further analysis and forensic investigation Detect and respond to threats and sensitive data contained in employee communications Next-generation threat protection Attackers today have evolved into bona fide cybercriminals, often motivated by significant financial gain and sponsored by criminal organizations, nation-states or radical political groups. These groups have more time, resources and a higher level of motivation, which allows them to mount more-complex, long-term operations against bigger targets. As a result, a wide array of tactics, from targeted malware and spyware to phishing attacks and social engineering, in addition to exploits, are being observed at many organizations. This situation calls for protection against a variety of attacks at scale. Palo Alto Networks next-generation firewalls deliver a comprehensive suite of essential network security for preventing both known and unknown threats. They provide robust defenses designed to thwart app-specific threats, including zeroday attacks targeting app-layer vulnerabilities. In contrast, NetScaler Application Firewall protects against web application-layer attacks, such as SQL injection, cross-site scripting and buffer overflow threats.

7 7 The joint solution offers the following: Granular user and app-focused access control that reduces the scope of attack by controlling applications that may carry threats Complete, integrated threat framework with high-performance, stream-based protection against viruses, spyware and exploits Advanced protection against modern malware and targeted/zero-day attacks Comprehensive web application protection via the industry s highest-capacity firewall Equally important, however, is the ability to provide all of this protection at scale. Both NetScaler and Palo Alto Networks products are designed on purpose-built hardware platforms optimized for performance. Palo Alto Networks also features an innovative Single Pass Parallel Processing architecture that reduces latency by performing security functions only once. This software architecture, coupled with a multi-core hardware processing architecture, ensures delivery of high-performance protection under the most demanding conditions. Additional considerations Although critically important, network security is only one piece of a complete security strategy for VDI Besides network security, enterprises should consider the need for: Client security. Despite desktop virtualization s centralized operating model, accessing a virtual desktop from a compromised client device still poses a threat to the environment. NetScaler endpoint analysis, action control and data cleanup features can help organizations ensure that the client device is secure. Under certain high-risk access scenarios, however, it may also be necessary to implement a comprehensive suite of endpoint security software. Virtual system security. Maintaining good virtual machine hygiene means ensuring virtual desktops use the latest, fully patched versions of embedded apps and operating systems, and retiring virtual machines that are no longer in use. It also entails providing network isolation for all VDI components and potentially implementing encryption for associated storage volumes, given the concentration of resources involved. Beyond security By itself, adequately securing the VDI is not sufficient to fully preserve the benefits of desktop virtualization. Enterprises also need to ensure the availability, performance and scalability of whatever solution they decide to implement. After all, users will not be happy if the environment is not available when needed, or if it suffers from performance issues that make it unusable. NetScaler truly excels as a front-end solution for an organization s desktop virtualization infrastructure, helping ensure that organizations obtain both the performance and scalability they need. In addition to its compelling set of network security features, NetScaler delivers:

8 8 A combination of enterprise-class server load balancing, global server load balancing and health monitoring capabilities to ensure virtual desktop availability and business continuity An extensive collection of mechanisms that not only enhance virtual desktop performance over the network but also streamline the user experience Intelligent load distribution and server offload capabilities that enable seamless scalability of VDI Palo Alto Networks next-generation firewalls support active/passive and active/ active high availability configuration, complete with session and configuration synchronization. To ensure that management is accessible during periods of heavy traffic, the next-generation firewall separates the data plane and the control plane, each with dedicated processing and memory. The data plane houses dedicated processing and memory for networking, security and content inspection, while dedicated management processing and memory reside on the control plane. Conclusion By delivering a robust set of granular application identification and controls, remote access and threat protection capabilities, the combined NetScaler and Palo Alto Networks firewall solution not only preserves but also extends the benefits organizations have come to expect when embracing desktop virtualization. IT managers can substantially improve the availability, performance and scalability of their virtual desktop implementations while ensuring security and compliance for their virtual desktop users. 1 Forecast: Hosted Virtual Desktops, Worldwide, Gartner, June 2012.

9 9 About Palo Alto Networks Palo Alto Networks, Inc. has pioneered the next generation of network security with our innovative platform that allows you to secure your network and safely enable an increasingly complex and rapidly growing number of applications. At the core of this platform is our next-generation firewall, which delivers visibility and control over applications, users, and content within the firewall using a highly optimized hardware and software architecture. Our platform uniquely offers you the ability to identify, control, and safely enable applications while inspecting all of your content for all threats all the time. These capabilities, combined with superior performance, surpass all traditional approaches including UTM and software blade. Our approach allows you to simplify your network security infrastructure and eliminate a variety of stand-alone and bolt-on security devices. Our platform can address a broad range of your network security requirements - from your datacenter to your enterprise perimeter, to the far edges of your network and more - including branch offices and mobile devices. Corporate Headquarters Fort Lauderdale, FL, USA Silicon Valley Headquarters Santa Clara, CA, USA EMEA Headquarters Schaffhausen, Switzerland India Development Center Bangalore, India Online Division Headquarters Santa Barbara, CA, USA Pacific Headquarters Hong Kong, China Latin America Headquarters Coral Gables, FL, USA UK Development Center Chalfont, United Kingdom About Citrix Citrix (NASDAQ:CTXS) is the cloud company that enables mobile workstyles empowering people to work and collaborate from anywhere, easily and securely. With market-leading solutions for mobility, desktop virtualization, cloud networking, cloud platforms, collaboration and data sharing, Citrix helps organizations achieve the speed and agility necessary to succeed in a mobile and dynamic world. Citrix products are in use at more than 260,000 organizations and by over 100 million users globally. Annual revenue in 2012 was $2.59 billion. Learn more at Copyright 2013 Citrix Systems, Inc. All rights reserved. Citrix, NetScaler, XenApp, XenDesktop, ICA and NetScaler Gateway are trademarks of Citrix Systems, Inc. and/or one of its subsidiaries, and may be registered in the U.S. and other countries. Other product and company names mentioned herein may be trademarks of their respective companies. 0813/PDF

Securing virtual desktop infrastructure with Citrix NetScaler

Securing virtual desktop infrastructure with Citrix NetScaler Securing virtual desktop infrastructure with Citrix NetScaler 2 Today s enterprises are rapidly adopting desktop virtualization as a means to reduce operating costs, enable workplace flexibility, increase

More information

Securing virtual desktop infrastructure with Citrix NetScaler

Securing virtual desktop infrastructure with Citrix NetScaler Securing virtual desktop infrastructure with Citrix NetScaler 2 Today s enterprises are rapidly adopting desktop virtualization as a means to reduce operating costs, enable workplace flexibility, increase

More information

Deploying NetScaler Gateway in ICA Proxy Mode

Deploying NetScaler Gateway in ICA Proxy Mode Deploying NetScaler Gateway in ICA Proxy Mode Deployment Guide This deployment guide defines the configuration required for using the NetScaler Gateway in ICA Proxy Mode. Table of Contents Introduction

More information

White Paper. The limitations of these legacy infrastructures are considerable, and include:

White Paper. The limitations of these legacy infrastructures are considerable, and include: Citrix NetScaler and Palo Alto Networks Build a cloud network leveraging best-in-class security and application delivery 2 With the proliferation of enterprise applications, consumer applications and cloud-

More information

NetScaler: A comprehensive replacement for Microsoft Forefront Threat Management Gateway

NetScaler: A comprehensive replacement for Microsoft Forefront Threat Management Gateway NetScaler: A comprehensive replacement for Microsoft Forefront Threat Management Gateway 2 Microsoft s Forefront Threat Management Gateway (TMG) is a network security and protection solution for enterprise

More information

Build a cloud network leveraging best-in-class security and application delivery

Build a cloud network leveraging best-in-class security and application delivery Build a cloud network leveraging best-in-class security and application delivery 2 Introduction With the proliferation of enterprise applications, consumer applications and cloudbased services, IT managers

More information

Trend Micro InterScan Web Security and Citrix NetScaler SDX Platform Overview

Trend Micro InterScan Web Security and Citrix NetScaler SDX Platform Overview Trend Micro InterScan Web Security and Citrix NetScaler SDX Platform Overview 2 Trend Micro and Citrix have a long history of partnership based upon integration between InterScan Web Security and Citrix

More information

Citrix desktop virtualization and Microsoft System Center 2012: better together

Citrix desktop virtualization and Microsoft System Center 2012: better together Citrix desktop virtualization and Microsoft System Center 2012: better together 2 Delivery of applications and data to users is an integral part of IT services today. But delivery can t happen without

More information

Cisco and Citrix: Building Application Centric, ADC-enabled Data Centers

Cisco and Citrix: Building Application Centric, ADC-enabled Data Centers Solutions Brief : Building Application Centric, ADC-enabled Data Centers Cisco Application Centric Infrastructure (ACI) integrates Citrix NetScaler Application Delivery Controller (ADC) appliances to reduce

More information

Provisioning ShareFile on Microsoft Azure Storage

Provisioning ShareFile on Microsoft Azure Storage ShareFile StorageZones Provisioning ShareFile on Microsoft Azure Storage This document provides a technical overview of how ShareFile can be provisioned on customermanaged, Microsoft Azure cloud storage

More information

White Paper. Protecting Mobile Apps with Citrix XenMobile and MDX. citrix.com

White Paper. Protecting Mobile Apps with Citrix XenMobile and MDX. citrix.com Protecting Mobile Apps with Citrix XenMobile and MDX citrix.com Mobility is a top priority for organizations as more employees demand access to the apps and data that will make them productive. Employees

More information

Citrix NetScaler and Microsoft SharePoint 2013 Hybrid Deployment Guide

Citrix NetScaler and Microsoft SharePoint 2013 Hybrid Deployment Guide Citrix NetScaler and Microsoft SharePoint 2013 Hybrid Deployment Guide 2013 Deployment Guide Table of Contents Overview 3 SharePoint Hybrid Deployment Overview 3 Workflow 4 Step by Step Configuration on

More information

Optimizing with Citrix NetScaler. Three keys to building the best front-end network for virtual desktop delivery. www.citrix.com

Optimizing with Citrix NetScaler. Three keys to building the best front-end network for virtual desktop delivery. www.citrix.com Optimizing with Citrix NetScaler White Paper Three keys to building the best front-end network for virtual desktop delivery www.citrix.com Executive summary Motivated by the compelling benefits virtual

More information

The falling cost and rising value of desktop virtualization

The falling cost and rising value of desktop virtualization The falling cost and rising value of desktop virtualization 2 The growing strategic value of desktop virtualization, from a more flexible, productive workforce to lower real estate costs, has made it a

More information

Secure remote access

Secure remote access Secure remote access Technical Solutions Brief Secure remote access Simple, secure access to apps and desktops from anywhere. Secure remote access Technical Solutions Brief 2 Today s fast-paced business

More information

Configuring Citrix NetScaler for IBM WebSphere Application Services

Configuring Citrix NetScaler for IBM WebSphere Application Services White Paper Configuring Citrix NetScaler for IBM WebSphere Application Services A deployment guide for configuring NetScaler load balancing and content switching When deploying IBM WebSphere Application

More information

Top Three Reasons to Deliver Web Apps with App Virtualization

Top Three Reasons to Deliver Web Apps with App Virtualization Top Three Reasons to Deliver Web Apps with App Virtualization Improve manageability, security and performance for browser-based apps. Web browsers can cause many of the same headaches as any other Windows

More information

Guide to Deploying Microsoft Exchange 2013 with Citrix NetScaler

Guide to Deploying Microsoft Exchange 2013 with Citrix NetScaler Deployment Guide Guide to Deploying Microsoft Exchange 2013 with Citrix NetScaler Extensive guide covering details of NetScaler ADC deployment with Microsoft Exchange 2013. Table of Contents Introduction

More information

Design and deliver cloudbased apps and data for flexible, on-demand IT

Design and deliver cloudbased apps and data for flexible, on-demand IT Design and deliver cloudbased apps and data for flexible, on-demand IT Discover the fastest and easiest way for IT to enable business productivity using cloud-based management and delivery of complete

More information

Cisco and Citrix: Building Application Centric, ADC-enabled Data Centers

Cisco and Citrix: Building Application Centric, ADC-enabled Data Centers : Building Application Centric, ADC-enabled Data Centers Cisco Application Centric Infrastructure (ACI) integrates Citrix NetScaler Application Delivery Controller (ADC) appliances to reduce deployment

More information

Advanced Service Desk Security

Advanced Service Desk Security Advanced Service Desk Security Robust end-to-end security measures have been built into the GoToAssist Service Desk architecture to ensure the privacy and integrity of all data. gotoassist.com Many service

More information

Websense Data Security Gateway and Citrix NetScaler SDX Platform Overview

Websense Data Security Gateway and Citrix NetScaler SDX Platform Overview Websense Data Security Gateway and Citrix NetScaler SDX Platform Overview 2 The next generation of SDX platform provides the foundation for further integration. Today, Citrix NetScaler SDX appliances enable

More information

Solutions Guide. Deploying Citrix NetScaler for Global Server Load Balancing of Microsoft Lync 2013. citrix.com

Solutions Guide. Deploying Citrix NetScaler for Global Server Load Balancing of Microsoft Lync 2013. citrix.com Solutions Guide Deploying Citrix NetScaler for Global Server Load Balancing of Microsoft Lync 2013 Table of Contents Introduction 3 Overview of Microsoft Lync 2013 3 Why NetScaler GSLB Solution for Lync

More information

RSA Adaptive Authentication and Citrix NetScaler SDX Platform Overview

RSA Adaptive Authentication and Citrix NetScaler SDX Platform Overview RSA Adaptive Authentication and Citrix NetScaler SDX Platform Overview 2 RSA and Citrix have a long history of partnership based upon integration between RSA Adaptive Authentication and Citrix NetScaler

More information

Effective hosted desktops

Effective hosted desktops Effective hosted desktops HP ConvergedSystem 100 for Hosted Desktops with Citrix XenDesktop 2 Driven by strong adoption of mobility technology, effective desktop and application virtualization, hosted

More information

The Office Reinvented: Mobile Workspaces are the Future of Work

The Office Reinvented: Mobile Workspaces are the Future of Work The Office Reinvented: Mobile Workspaces are the Future of Work How Citrix, Google and Samsung enable secure business mobility. Business mobility empowers people with a convenient and complete work experience

More information

Windows XP Application Migration Checklist

Windows XP Application Migration Checklist Windows XP Application Migration Checklist Accelerate XP migration planning 2 Whether just beginning a Microsoft Windows XP application migration project or moving forward on an existing project, it s

More information

Microsoft SharePoint 2013 with Citrix NetScaler

Microsoft SharePoint 2013 with Citrix NetScaler Deployment Guide Microsoft SharePoint 2013 with Citrix NetScaler Deployment Guide citrix.com Table of contents Introduction 3 NetScaler value-add to SharePoint 4 Product versions and prerequisites 4 Deploying

More information

Citrix Lifecycle Management

Citrix Lifecycle Management Citrix Lifecycle Management Comprehensive cloud-based service lifecycle management solution IT administrators are realizing that application deployments are getting more complex and error-prone than ever

More information

icrosoft TMG Replacement with NetScaler

icrosoft TMG Replacement with NetScaler icrosoft TMG Replacement with NetScaler Replacing Microsoft Forefront TMG with NetScaler for secure VPN access Table of contents Introduction 3 Configuration details 3 NetScaler features to be enabled

More information

Defend hidden mobile web properties

Defend hidden mobile web properties Defend hidden mobile web properties Is your mobile micro app concealing a complex web property? 2 We ve all used mobile micro apps to check the weather, stocks and news or to interact via social media

More information

Trend Micro Cloud Security for Citrix CloudPlatform

Trend Micro Cloud Security for Citrix CloudPlatform Trend Micro Cloud Security for Citrix CloudPlatform Proven Security Solutions for Public, Private and Hybrid Clouds 2 Trend Micro Provides Security for Citrix CloudPlatform Organizations today are embracing

More information

Desktop virtualization for all

Desktop virtualization for all Desktop virtualization for all 2 Desktop virtualization for all Today s organizations encompass a diverse range of users, from road warriors using laptops and mobile devices as well as power users working

More information

Taking Windows Mobile on Any Device

Taking Windows Mobile on Any Device Taking Windows Mobile on Any Device As the adoption of mobile devices continues to expand, IT organizations are challenged to keep up with the mobile demands of today s fast-paced workforce and at the

More information

White Paper. Optimizing the video experience for XenApp and XenDesktop deployments with CloudBridge. citrix.com

White Paper. Optimizing the video experience for XenApp and XenDesktop deployments with CloudBridge. citrix.com Optimizing the video experience for XenApp and XenDesktop deployments with CloudBridge Video content usage within the enterprise is growing significantly. In fact, Gartner forecasted that by 2016, large

More information

Desktop virtualization for all

Desktop virtualization for all Desktop virtualization for all 2 Desktop virtualization for all Today s organizations encompass a diverse range of users, from road warriors using laptops and mobile devices as well as power users working

More information

Secure SSL, Fast SSL

Secure SSL, Fast SSL Citrix NetScaler and Thales nshield work together to protect encryption keys and accelerate SSL traffic With growing use of cloud-based, virtual, and multi-tenant services, customers want to utilize virtual

More information

How To Use Netscaler As An Afs Proxy

How To Use Netscaler As An Afs Proxy Deployment Guide Guide to Deploying NetScaler as an Active Directory Federation Services Proxy Enabling seamless authentication for Office 365 use cases Table of Contents Introduction 3 ADFS proxy deployment

More information

Securing Outlook Web Access (OWA) 2013 with NetScaler AppFirewall

Securing Outlook Web Access (OWA) 2013 with NetScaler AppFirewall Solution Guide Securing Outlook Web Access (OWA) 2013 with NetScaler AppFirewall Solution Guide This solution guide provides guidelines for securing Exchange 2013 Outlook Web Access (OWA) with NetScaler

More information

Maximizing Flexibility and Productivity for Mobile MacBook Users

Maximizing Flexibility and Productivity for Mobile MacBook Users Citrix DesktopPlayer for Mac White Paper Maximizing Flexibility and Productivity for Mobile MacBook Users Windows virtual desktops to go for corporate and BYO Macs 2 Executive Overview The popularity of

More information

Citrix XenServer Industry-leading open source platform for cost-effective cloud, server and desktop virtualization. citrix.com

Citrix XenServer Industry-leading open source platform for cost-effective cloud, server and desktop virtualization. citrix.com Citrix XenServer Industry-leading open source platform for cost-effective cloud, server and desktop virtualization. 2 While the core server virtualization market has matured, virtualization itself is seeing

More information

Data Center Consolidation for Federal Government

Data Center Consolidation for Federal Government Data Center Consolidation for Federal Government Virtual computing transforms IT environments so agencies can cut costs, bolster efficiency and agility, and improve user productivity In a slow economy,

More information

Citrix Ready Solutions Brief. CA Single Sign-On and Citrix NetScaler: Quickly Adapt to Your Dynamic Authentication Demands. citrix.

Citrix Ready Solutions Brief. CA Single Sign-On and Citrix NetScaler: Quickly Adapt to Your Dynamic Authentication Demands. citrix. CA Single Sign-On and Citrix NetScaler: Quickly Adapt to Your Dynamic Authentication Demands citrix.com/ready CA Technologies and Citrix have partnered to integrate their complementary, industry-leading

More information

Microsoft Dynamics CRM 2015 with NetScaler for Global Server Load Balancing

Microsoft Dynamics CRM 2015 with NetScaler for Global Server Load Balancing Microsoft Dynamics CRM 2015 with NetScaler for Global Server Load Balancing Solution Guide This solution guide focuses on defining the deployment process for Microsoft Dynamics CRM with Citrix NetScaler.

More information

Content-ID. Content-ID URLS THREATS DATA

Content-ID. Content-ID URLS THREATS DATA Content-ID DATA CC # SSN Files THREATS Vulnerability Exploits Viruses Spyware Content-ID URLS Web Filtering Content-ID combines a real-time threat prevention engine with a comprehensive URL database and

More information

Bring-Your-Own-Device Freedom

Bring-Your-Own-Device Freedom Bring-Your-Own-Device Freedom Solutions for federal, state, and local governments Increasingly, IT organizations in federal, state, and local agencies are embracing consumerization with the understanding

More information

Solve the application visibility challenge with NetScaler Insight Center

Solve the application visibility challenge with NetScaler Insight Center Citrix NetScaler Solve the application visibility challenge with NetScaler Insight Center 2 Executive Summary The ability to observe, diagnose, and subsequently improve the performance of business-critical

More information

Citrix Workspace Cloud Apps and Desktop Service with an on-premises Resource Reference Architecture

Citrix Workspace Cloud Apps and Desktop Service with an on-premises Resource Reference Architecture Citrix Workspace Cloud Apps and Desktop Service with an on-premises Resource Reference Architecture Produced by Citrix Solutions Lab This guide walks you through an example of how to use Citrix Workspace

More information

Content-ID. Content-ID enables customers to apply policies to inspect and control content traversing the network.

Content-ID. Content-ID enables customers to apply policies to inspect and control content traversing the network. Content-ID Content-ID enables customers to apply policies to inspect and control content traversing the network. Malware & Vulnerability Research 0-day Malware and Exploits from WildFire Industry Collaboration

More information

BlueCat Networks Adonis and Proteus on Citrix NetScaler SDX Platform Overview

BlueCat Networks Adonis and Proteus on Citrix NetScaler SDX Platform Overview BlueCat Networks Adonis and Proteus on Citrix NetScaler SDX Platform Overview 2 The BlueCat Networks and Citrix partnership is based upon integration between BlueCat Networks DNS, DHCP and IP Address Management

More information

Deliver the Next Generation Intelligent Datacenter Fabric with the Cisco Nexus 1000V, Citrix NetScaler Application Delivery Controller and Cisco vpath

Deliver the Next Generation Intelligent Datacenter Fabric with the Cisco Nexus 1000V, Citrix NetScaler Application Delivery Controller and Cisco vpath Citrix NetScaler for Cisco Nexus 1000v White Paper Deliver the Next Generation Intelligent Datacenter Fabric with the Cisco Nexus 1000V, Citrix NetScaler Application Delivery Controller and Cisco vpath

More information

Deployment Guide for Citrix XenDesktop

Deployment Guide for Citrix XenDesktop Deployment Guide for Citrix XenDesktop Securing and Accelerating Citrix XenDesktop with Palo Alto Networks Next-Generation Firewall and Citrix NetScaler Joint Solution Table of Contents 1. Overview...

More information

How To Get Cloud Services To Work For You

How To Get Cloud Services To Work For You Product Overview Citrix CloudPortal Business Manager Unified cloud services delivery and business management platform Enterprises and cloud providers have focused most of their initial cloud strategies

More information

Enabling mobile workstyles with an end-to-end enterprise mobility management solution.

Enabling mobile workstyles with an end-to-end enterprise mobility management solution. Mobile workstyles White Paper Enabling mobile workstyles with an end-to-end enterprise mobility management solution. 2 The evolution of mobile workstyles has made it increasingly important for professionals

More information

Solution Guide for Citrix NetScaler and Cisco APIC EM

Solution Guide for Citrix NetScaler and Cisco APIC EM Solution Guide for Citrix NetScaler and Cisco APIC EM Orchestrating Network QoS policy for delivering enhanced video experience to XenDesktop users Table of contents Solution Overview 3 Executive Summary

More information

Application Security WHY NETWORK FIREWALLS AND INTRUSION PREVENTION SYSTEMS AREN T ENOUGH

Application Security WHY NETWORK FIREWALLS AND INTRUSION PREVENTION SYSTEMS AREN T ENOUGH W H I T E P A P E R Application Security WHY NETWORK FIREWALLS AND INTRUSION PREVENTION SYSTEMS AREN T ENOUGH Table of Contents 2 Network Firewalls: Notable Facts Why that s good Why that s not good enough

More information

Mobility and cloud transform access and delivery of apps, desktops and data

Mobility and cloud transform access and delivery of apps, desktops and data Mobility and cloud transform access and delivery of apps, desktops and data Unified app stores and delivery of all apps (Windows, web, SaaS and mobile) and data to any device, anywhere. 2 The cloud transforms

More information

COORDINATED THREAT CONTROL

COORDINATED THREAT CONTROL APPLICATION NOTE COORDINATED THREAT CONTROL Interoperability of Juniper Networks IDP Series Intrusion Detection and Prevention Appliances and SA Series SSL VPN Appliances Copyright 2010, Juniper Networks,

More information

Modernize your business with Citrix XenApp 7.6

Modernize your business with Citrix XenApp 7.6 Modernize your business with Citrix XenApp 7.6 Avoid non-compliance issues and keep your business running smoothly by upgrading your SAP environment to run on top of the latest Citrix and Microsoft technologies

More information

Remote access to enterprise PCs

Remote access to enterprise PCs Remote access to enterprise PCs About FlexCast Services Design Guides Citrix FlexCast Services Design Guides provide an overview of a validated architecture based on many common scenarios. Each design

More information

Easy and secure application access from anywhere

Easy and secure application access from anywhere Easy and secure application access from anywhere Citrix is the leading secure access solution for applications and desktops HDX SmartAccess Delivers simple and seamless secure access anywhere Data security

More information

BlueCat IPAM, DNS and DHCP Solutions on Citrix NetScaler SDX Platform Overview

BlueCat IPAM, DNS and DHCP Solutions on Citrix NetScaler SDX Platform Overview BlueCat IPAM, DNS and DHCP Solutions on Citrix NetScaler SDX Platform Overview 2 The BlueCat and Citrix partnership is based upon integration between BlueCat s DNS, DHCP and IP Address Management (IPAM)

More information

The top 5 truths behind what the cloud is not

The top 5 truths behind what the cloud is not Citrix Cloud Solutions White Paper The top 5 truths behind what the cloud is not Separating the noise of what cloud is and what it s not 2 It s clear that the cloud represents the biggest technology disruption

More information

NetScaler carriergrade network

NetScaler carriergrade network White Paper NetScaler carriergrade network address translation Preserve IPv4 network investments, consolidate application delivery control in one platform and lower capex and opex Protect your investment

More information

Citrix ShareFile Enterprise technical overview

Citrix ShareFile Enterprise technical overview Citrix ShareFile Enterprise technical overview 2 The role of IT organizations is changing rapidly as the forces of consumerization pose new challenges. IT is transitioning from the sole provider of user

More information

Solution Brief. Deliver Production Grade OpenStack LBaaS with Citrix NetScaler. citrix.com

Solution Brief. Deliver Production Grade OpenStack LBaaS with Citrix NetScaler. citrix.com Solution Brief Deliver Production Grade OpenStack LBaaS with Citrix NetScaler Enterprises are increasingly turning to private cloud architectures for increased agility and greater operational efficiency

More information

Citrix ShareFile Enterprise: a technical overview citrix.com

Citrix ShareFile Enterprise: a technical overview citrix.com Citrix ShareFile Enterprise: a technical overview White Paper Citrix ShareFile Enterprise: a technical overview 2 The role of IT organizations is changing rapidly as the forces of consumerization pose

More information

VDI and Beyond: Addressing Top IT Challenges to Drive Agility and Growth

VDI and Beyond: Addressing Top IT Challenges to Drive Agility and Growth VDI and Beyond: Addressing Top IT Challenges to Drive Agility and Growth Citrix XenDesktop with FlexCast mobilizes the modern workforce App and Desktop virtualization can be a powerful driver of business

More information

Secure Data Sharing in the Enterprise

Secure Data Sharing in the Enterprise Secure Data Sharing in the Enterprise 2 Follow-me data and productivity for users with security and manageability for IT Productivity today depends on the ability of workers to access and share their data

More information

White paper. Microsoft and Citrix VDI: Virtual desktop implementation scenarios

White paper. Microsoft and Citrix VDI: Virtual desktop implementation scenarios White paper Microsoft and Citrix VDI: Virtual desktop implementation scenarios Table of contents Objective Microsoft VDI offering components High definition user experience...3 A very cost-effective and

More information

Optimizing service assurance for XenServer virtual infrastructures with Xangati

Optimizing service assurance for XenServer virtual infrastructures with Xangati Solutions Brief Optimizing service assurance for XenServer virtual infrastructures with Xangati As IT organizations adopt application, desktop and server virtualization solutions as the primary method

More information

Powering Real-Time Mobile Access to Critical Information With Citrix ShareFile

Powering Real-Time Mobile Access to Critical Information With Citrix ShareFile Powering Real-Time Mobile Access to Critical Information With Citrix ShareFile An enterprise file sync and sharing solution built for the needs of the energy, oil and gas industry to provide employee and

More information

Using Palo Alto Networks to Protect the Datacenter

Using Palo Alto Networks to Protect the Datacenter Using Palo Alto Networks to Protect the Datacenter July 2009 Palo Alto Networks 232 East Java Dr. Sunnyvale, CA 94089 Sales 866.207.0077 www.paloaltonetworks.com Table of Contents Introduction... 3 Granular

More information

Deliver Enterprise Mobility with Citrix XenMobile and Citrix NetScaler

Deliver Enterprise Mobility with Citrix XenMobile and Citrix NetScaler Deliver Enterprise Mobility with Citrix XenMobile and Citrix NetScaler 2 Introduction Mobility and the consumerization of IT pose key challenges for IT around scalability, security and application visibility.

More information

White Paper. Optimizing your Microsoft application and infrastructure investments with Citrix CloudBridge. citrix.com

White Paper. Optimizing your Microsoft application and infrastructure investments with Citrix CloudBridge. citrix.com White Paper Optimizing your Microsoft application and infrastructure investments with Citrix CloudBridge Businesses of all types and sizes worldwide rely on a variety of Microsoft solutions, from key productivity

More information

Does your Citrix or Terminal Server environment have an Achilles heel?

Does your Citrix or Terminal Server environment have an Achilles heel? CRYPTZONE WHITE PAPER Does your Citrix or Terminal Server environment have an Achilles heel? Moving away from IP-centric to role-based access controls to secure Citrix and Terminal Server user access cryptzone.com

More information

Deploying XenApp on a Microsoft Azure cloud

Deploying XenApp on a Microsoft Azure cloud Deploying XenApp on a Microsoft Azure cloud The scalability and economics of XenApp services on-demand citrix.com Given business dynamics seasonal peaks, mergers, acquisitions, and changing business priorities

More information

Features of a comprehensive application security solution

Features of a comprehensive application security solution WHITE PAPER Citrix NetScaler Features of a comprehensive application security solution The comprehensive security features of Citrix NetScaler protect against DoS/DDoS, deliver intrusion filtering capabilities

More information

The Always-on Enterprise: Business Continuity Scenarios that Work

The Always-on Enterprise: Business Continuity Scenarios that Work Solutions Brief The Always-on Enterprise: Business Continuity Scenarios that Work How mobility solutions from Citrix, Google and Samsung ensure continuous productivity. Business continuity keeps CIOs up

More information

Building success in the cloud

Building success in the cloud Building success in the cloud Citrix customers are recognized in the Gartner Magic Quadrant for Public Cloud Infrastructure-as-a-Service. 2 Cloud computing is the biggest technology disruption in decades

More information

SolidFire SF3010 All-SSD storage system with Citrix CloudPlatform 3.0.5 Reference Architecture

SolidFire SF3010 All-SSD storage system with Citrix CloudPlatform 3.0.5 Reference Architecture SolidFire SF3010 All-SSD storage system with Citrix CloudPlatform 3.0.5 Reference Architecture 2 This reference architecture is a guideline for deploying Citrix CloudPlatform, powered by Apache CloudStack,

More information

Solutions Guide. Deploying Citrix NetScaler with Microsoft Exchange 2013 for GSLB. citrix.com

Solutions Guide. Deploying Citrix NetScaler with Microsoft Exchange 2013 for GSLB. citrix.com Deploying Citrix NetScaler with Microsoft Exchange 2013 for GSLB Table of Contents Introduction 3 Overview of Microsoft Exchange 2013 3 Why NetScaler GSLB for Exchange 2013? 3 Topology 3 Single Namespace

More information

What is an application delivery controller?

What is an application delivery controller? What is an application delivery controller? ADCs have gained traction within the last decade, largely due to increased demand for legacy load balancing appliances to handle more advanced application delivery

More information

Citrix OpenCloud Access. Accelerate cloud computing adoption and simplify identity management. www.citrix.com

Citrix OpenCloud Access. Accelerate cloud computing adoption and simplify identity management. www.citrix.com Citrix OpenCloud Access White Paper Citrix OpenCloud Access Accelerate cloud computing adoption and simplify identity management www.citrix.com Executive summary Cloud-hosted application delivery models

More information

Run Skype for Business as a Secure Virtual App with a Great User Experience

Run Skype for Business as a Secure Virtual App with a Great User Experience Run Skype for Business as a Secure Virtual App with a Great User Experience Improve security and manageability while avoiding the performance problems of traditional virtual installations. Deliver secure,

More information

Deploying NetScaler with Microsoft Exchange 2016

Deploying NetScaler with Microsoft Exchange 2016 Deployment Guide Deploying NetScaler with Microsoft Exchange 2016 Deployment Guide Load balancing Microsoft Exchange 2016 with NetScaler Table of Contents Introduction 3 Configuration 5 NetScaler features

More information

Citrix XenClient. Extending the benefits of desktop virtualization to mobile laptop users. www.citrix.com

Citrix XenClient. Extending the benefits of desktop virtualization to mobile laptop users. www.citrix.com Citrix XenClient White Paper Citrix XenClient Extending the benefits of desktop virtualization to mobile laptop users www.citrix.com Executive summary Desktop virtualization is attractive to organizations

More information

Mobilize Email with Enterprise-Grade Security and a Great Experience

Mobilize Email with Enterprise-Grade Security and a Great Experience White Paper Mobilize Email with Enterprise-Grade Security and a Great Experience Data protection for your business. Flexibility for IT. Seamless productivity for your workforce. People need to be able

More information

Enterprise mobility management: Embracing BYOD through secure app and data delivery

Enterprise mobility management: Embracing BYOD through secure app and data delivery Enterprise mobility management: Embracing BYOD through secure app and data delivery Why Citrix XenMobile is the best approach 2 Introduction The transformation of computing through mobility, consumerisation,

More information

Fullerton India enhances its employee productivity and efficiency with Citrix XenDesktop

Fullerton India enhances its employee productivity and efficiency with Citrix XenDesktop Fullerton India enhances its employee productivity and efficiency with Citrix XenDesktop 2 As a result of implementing Citrix XenDesktop, the number of our help desk tickets has fallen significantly. The

More information

Enterprise- Grade MDM

Enterprise- Grade MDM Enterprise- Grade MDM This brief describes a foundational strategic feature of the Citrix enterprise mobility offering, enterprise-grade MDM. 2 While the transition of mobile phones into computers has

More information

Deploying XenApp 7.5 on Microsoft Azure cloud

Deploying XenApp 7.5 on Microsoft Azure cloud Deploying XenApp 7.5 on Microsoft Azure cloud The scalability and economics of delivering Citrix XenApp services Given business dynamics seasonal peaks, mergers, acquisitions, and changing business priorities

More information

Citrix Solutions. Overview

Citrix Solutions. Overview Citrix Solutions Citrix solutions empower people to work and collaborate from anywhere, securely accessing apps and data on any of the latest devices, as easily as they would in their own office. As work

More information

Cisco ASA and Cloud Web Security: Best-in-Class Network Security Combined with Best-in-Class Web Security

Cisco ASA and Cloud Web Security: Best-in-Class Network Security Combined with Best-in-Class Web Security White Paper Cisco ASA and Cloud Web Security: Best-in-Class Network Security Combined with Best-in-Class Web Security Introduction Organizations that want to harness the power of the web must deal with

More information

Mobilizing Windows apps

Mobilizing Windows apps Mobilizing Windows apps XenApp 7.5 Design Guide on vsphere 5.5 Table of Contents About FlexCast Services Design Guides 3 Project overview 3 Objective 3 Assumptions 4 Conceptual architecture 5 Detailed

More information

Transforming Call Centers

Transforming Call Centers Transforming Call Centers XenDesktop 7.5 Design Guide on Hyper-V 2012R2 Table of Contents About FlexCast Services Design Guides 3 Project overview 3 Objective 3 Assumptions 4 Conceptual architecture 5

More information

Secure remote access

Secure remote access Simple, secure access to apps and desktops from anywhere Today s fast-paced business world requires IT organizations to supply tools that allow employees to quickly react to the demands of a competitive

More information

The fastest, most secure path to mobile employee productivity

The fastest, most secure path to mobile employee productivity The fastest, most secure path to mobile employee productivity 2 If your organization lacks a bring-your-own-device (BYOD) strategy, you may be in danger of losing employees who are unhappy because they

More information