Advanced Service Desk Security
|
|
- Randell Shepherd
- 8 years ago
- Views:
Transcription
1 Advanced Service Desk Security Robust end-to-end security measures have been built into the GoToAssist Service Desk architecture to ensure the privacy and integrity of all data. gotoassist.com
2 Many service desk operations regularly deal with sensitive data, and support organizations and IT teams are rightly concerned with security. With the worldwide surge in privacy breaches, malware, viruses and denial-of-service attacks, it s important to scrutinize each and every IT solution to see that it is employing the most up-to-date and effective security measures available. This white paper outlines the measures that GoToAssist Service Desk utilizes to minimize security risks. Citrix considers the security of your information to be of the highest importance. Security is not an afterthought to functionality, but a key element that is designed and built into our systems from the ground up. Security encompasses all aspects of GoToAssist Service Desk, from the software to the facilities to the personnel developing and operating the service. Extensive measures have been undertaken to maintain the privacy and integrity of all data managed by GoToAssist Service Desk. This white paper describes some of those measures, including access controls, physical and operational security, data security and software development lifecycle security. Protecting the front door An essential element of information security is the reliable identification and authentication of those accessing the information. Every manner of application, data and network security could be applied to a system, but if we were not able to reliably identify those accessing the system, all our efforts toward security would be in vain. For this reason, GoToAssist Service Desk, as with all Citrix SaaS offerings, places great emphasis on user authentication. To begin with, all users must be registered using a valid account, which is associated with an identified organization. No guest or anonymous access to the system is permitted. In addition, numerous techniques are employed to detect and prevent unauthorized account access, such as complex password enforcement, soft and hard account lockout triggered by repeated unsuccessful log-in attempts and the logging and continuous monitoring of account probing and other anomalous behavior. Once a user is authenticated, continued access to the system is dependent upon the presence of a set of security tokens exchanged with the client during the authentication process. These tokens, or session identifiers, are protected using advanced web security mechanisms, including the use of cryptographically strong pseudo-random number generators and session hijacking/fixation countermeasures. All access to GoToAssist Service Desk, whether pre- or post-authentication, is permitted only over connections that are secured with SSL/TLS. Any connection attempt that is not using SSL/ TLS will be refused. Because of this security requirement, organizations and users can be gotoassist.com 2
3 confident that information passed between GoToAssist Service Desk and the user s browser or mobile app will be safe from would-be eavesdroppers and potential man-in-themiddle attacks that rely upon an initial HTTP (unsecured) connection. A secure foundation Although protecting the front door is essential, if the networks and systems that host a service are not themselves secure, the service may still be vulnerable. The successful penetration and compromise of the service can occur without passing through the front door at all. This, of course, is the reason that GoToAssist Service Desk is built upon a foundation of network, host and physical security. All web, application and database servers supporting Service Desk reside within highly secured worldwide datacenters. Physical access to these datacenters is actively monitored and restricted to authorized personnel only. The servers themselves are hardened to stringent Citrix standards and dedicated to running only those services required to support GoToAssist Service Desk. Citrix policy requires that all servers remain up to date with the latest security patches and undergo periodic reassessment through both internal and independent auditing and penetration testing. Network access to the systems hosting GoToAssist Service Desk is strictly controlled through firewalls and other network security devices designed to detect and respond to various attacks, including but not limited to denial-of-service (DoS) attacks originating from the Internet. Backend servers and services are never directly accessible to external systems or personnel. Furthermore, multiple levels of host and network security are employed to ensure that only authorized access is permitted between backend systems, effectively containing any potential internally leveraged attacks. Access to and activity on all systems is centrally logged and actively monitored for anomalous patterns or behavior. How safe is your data? Once your information has been entered into the GoToAssist Service Desk system, it is secured with multiple levels of access controls. Only those users explicitly granted access to your information may view or modify it. The design of the system requires that every access request pass through an authorization subsystem that verifies the access rights of the user before allowing the request to proceed. Unlike some data management systems, GoToAssist Service Desk does not include the concept of root access. This helps to ensure the privacy of your information, even against inadvertent or other internal exposure. Sensitive configuration information, passwords and keys are secured using the latest in cryptographic technology. Passwords are secured through a uniquely salted, one-way (irreversible) password hashing mechanism that ensures protection against exposure even to internal personnel with access to the storage systems and/or encryption keys. Security by design In addition to the many security measures already described, GoToAssist Service Desk was built and continues to be developed using processes that guarantee the priority of security at every stage of the development lifecycle. At Citrix, every significant design and architectural decision must undergo a review process known as threat modeling, in which all foreseeable threats to the system are evaluated and measured in light of the gotoassist.com 3
4 proposed design/architectural features. Additionally, all code is required to be assessed for security flaws via static analysis, while all new and updated systems must be scanned and tested for security weaknesses using industry-leading manual and automated application vulnerability assessment tools. Finally, the entire deployed system is subject to continuous 24/7 vulnerability scanning and security analysis by an independent, industryleading security firm. Our attention to secure product design is one of the reasons Citrix is the global market leader and one of the most-trusted names in IT support solutions. Citrix customers include 100 percent of the Fortune 100 and 99 percent of the Fortune Global 500, as well as hundreds of thousands of small businesses and individuals. Availability All the protection measures in the world will prove meaningless if you cannot access your information or systems when needed. Thus, one of the primary concerns with information security is availability. With GoToAssist Service Desk, the continued availability of your information is achieved in several ways. First, the Citrix datacenters that host your information incorporate system redundancy throughout in order to ensure resiliency in the face of outages due to failure or attack. Additionally, for the purposes of scalability and reliability, load balancers transparently distribute incoming requests among multiple Citrix servers. As mentioned above, security devices are also in place in every Citrix datacenter to implement countermeasures to denial-of-service (DoS) attacks. With regard to the prevention of unintended destruction or corruption of information, all Service Desk systems are backed up daily, and encrypted backups are securely replicated to multiple, geographically separated datacenters for disaster recovery purposes. Additionally, the Service Desk interface includes two independent protection mechanisms that require explicit user acknowledgement before executing any destructive requests and additionally provide for the recovery of inadvertently deleted data. Summary Security of data is more important than ever, and Citrix places a major focus on this across all levels of GoToAssist Service Desk. We have put in place a formidable array of security countermeasures so that our customers can use GoToAssist Service Desk with confidence. Nevertheless, we recommend that you perform your own appropriate best-fit analysis to make sure our service meets your security requirements. We invite you to talk to a GoToAssist Service Desk representative today to discuss your needs and answer any questions you may have. gotoassist.com 4
5 Corporate Headquarters Fort Lauderdale, FL, USA Silicon Valley Headquarters Santa Clara, CA, USA EMEA Headquarters Schaffhausen, Switzerland India Development Center Bangalore, India Online Division Headquarters Santa Barbara, CA, USA Pacific Headquarters Hong Kong, China Latin America Headquarters Coral Gables, FL, USA UK Development Center Chalfont, United Kingdom About Citrix Citrix (NASDAQ:CTXS) is a leader in virtualization, networking and cloud services to enable new ways for people to work better. Citrix solutions help IT and service providers to build, manage and secure, virtual and mobile workspaces that seamlessly deliver apps, desktops, data and services to anyone, on any device, over any network or cloud. This year Citrix is celebrating 25 years of innovation, making IT simpler and people more productive with mobile workstyles. With annual revenue in 2013 of $2.9 billion, Citrix solutions are in use at more than 330,000 organizations and by over 100 million people globally. Learn more at Copyright 2014 Citrix Systems, Inc. All rights reserved. Citrix, GoToAssist, GoToMeeting, GoToMyPC, GoToTraining, GoToWebinar, OpenVoice, Podio and ShareFile are trademarks of Citrix Systems, Inc. and/or one of its subsidiaries, and may be registered in the U.S. and other countries. Other product and company names mentioned herein may be trademarks of their respective companies /293302/PDF gotoassist.com 5
Citrix GoToAssist Service Desk Security
Citrix GoToAssist Service Desk Security Robust end-to-end security measures have been built into the GoToAssist Service Desk architecture to ensure the privacy and integrity of all data. 2 Many service
More informationGoToMyPC Corporate Security FAQs
GoToMyPC Corporate Security FAQs Common security questions about Citrix GoToMyPC Corporate gotomypc.com Q: What are the GoToMyPC Corporate software components that I need to install on the host and client
More informationCitrix NetScaler and Microsoft SharePoint 2013 Hybrid Deployment Guide
Citrix NetScaler and Microsoft SharePoint 2013 Hybrid Deployment Guide 2013 Deployment Guide Table of Contents Overview 3 SharePoint Hybrid Deployment Overview 3 Workflow 4 Step by Step Configuration on
More informationMicrosoft Dynamics CRM 2015 with NetScaler for Global Server Load Balancing
Microsoft Dynamics CRM 2015 with NetScaler for Global Server Load Balancing Solution Guide This solution guide focuses on defining the deployment process for Microsoft Dynamics CRM with Citrix NetScaler.
More information5 Reasons Why GoToAssist Remote Support and Service Desk Go Better Together
5 Reasons Why GoToAssist Remote Support and Service Desk Go Better Together Improve your customer support experience with the integrated GoToAssist toolset. GoToAssist Remote Support makes it easy to help
More informationSecure SSL, Fast SSL
Citrix NetScaler and Thales nshield work together to protect encryption keys and accelerate SSL traffic With growing use of cloud-based, virtual, and multi-tenant services, customers want to utilize virtual
More informationProvisioning ShareFile on Microsoft Azure Storage
ShareFile StorageZones Provisioning ShareFile on Microsoft Azure Storage This document provides a technical overview of how ShareFile can be provisioned on customermanaged, Microsoft Azure cloud storage
More informationSolutions Guide. Deploying Citrix NetScaler for Global Server Load Balancing of Microsoft Lync 2013. citrix.com
Solutions Guide Deploying Citrix NetScaler for Global Server Load Balancing of Microsoft Lync 2013 Table of Contents Introduction 3 Overview of Microsoft Lync 2013 3 Why NetScaler GSLB Solution for Lync
More informationSolutions Guide. Deploying Citrix NetScaler with Microsoft Exchange 2013 for GSLB. citrix.com
Deploying Citrix NetScaler with Microsoft Exchange 2013 for GSLB Table of Contents Introduction 3 Overview of Microsoft Exchange 2013 3 Why NetScaler GSLB for Exchange 2013? 3 Topology 3 Single Namespace
More informationCitrix Lifecycle Management
Citrix Lifecycle Management Comprehensive cloud-based service lifecycle management solution IT administrators are realizing that application deployments are getting more complex and error-prone than ever
More informationComprehensive Enterprise Mobile Management for ios 8
Comprehensive Enterprise Mobile Management for ios 8 Citrix XenMobile enhances the new iphone and ipad operating system to give mobile users increased functionality and enterprises greater management and
More informationWhite Paper. Protecting Mobile Apps with Citrix XenMobile and MDX. citrix.com
Protecting Mobile Apps with Citrix XenMobile and MDX citrix.com Mobility is a top priority for organizations as more employees demand access to the apps and data that will make them productive. Employees
More informationMobilize Email with Enterprise-Grade Security and a Great Experience
White Paper Mobilize Email with Enterprise-Grade Security and a Great Experience Data protection for your business. Flexibility for IT. Seamless productivity for your workforce. People need to be able
More informationMicrosoft SharePoint 2013 with Citrix NetScaler
Deployment Guide Microsoft SharePoint 2013 with Citrix NetScaler Deployment Guide citrix.com Table of contents Introduction 3 NetScaler value-add to SharePoint 4 Product versions and prerequisites 4 Deploying
More informationPowering Real-Time Mobile Access to Critical Information With Citrix ShareFile
Powering Real-Time Mobile Access to Critical Information With Citrix ShareFile An enterprise file sync and sharing solution built for the needs of the energy, oil and gas industry to provide employee and
More informationThe Office Reinvented: Mobile Workspaces are the Future of Work
The Office Reinvented: Mobile Workspaces are the Future of Work How Citrix, Google and Samsung enable secure business mobility. Business mobility empowers people with a convenient and complete work experience
More informationTop Three Reasons to Deliver Web Apps with App Virtualization
Top Three Reasons to Deliver Web Apps with App Virtualization Improve manageability, security and performance for browser-based apps. Web browsers can cause many of the same headaches as any other Windows
More informationCitrix ShareFile Enterprise: a technical overview citrix.com
Citrix ShareFile Enterprise: a technical overview White Paper Citrix ShareFile Enterprise: a technical overview 2 The role of IT organizations is changing rapidly as the forces of consumerization pose
More informationThe Always-on Enterprise: Business Continuity Scenarios that Work
Solutions Brief The Always-on Enterprise: Business Continuity Scenarios that Work How mobility solutions from Citrix, Google and Samsung ensure continuous productivity. Business continuity keeps CIOs up
More informationGuide to Deploying Microsoft Exchange 2013 with Citrix NetScaler
Deployment Guide Guide to Deploying Microsoft Exchange 2013 with Citrix NetScaler Extensive guide covering details of NetScaler ADC deployment with Microsoft Exchange 2013. Table of Contents Introduction
More informationHow To Use Netscaler As An Afs Proxy
Deployment Guide Guide to Deploying NetScaler as an Active Directory Federation Services Proxy Enabling seamless authentication for Office 365 use cases Table of Contents Introduction 3 ADFS proxy deployment
More informationDeploying XenApp on a Microsoft Azure cloud
Deploying XenApp on a Microsoft Azure cloud The scalability and economics of XenApp services on-demand citrix.com Given business dynamics seasonal peaks, mergers, acquisitions, and changing business priorities
More informationCitrix desktop virtualization and Microsoft System Center 2012: better together
Citrix desktop virtualization and Microsoft System Center 2012: better together 2 Delivery of applications and data to users is an integral part of IT services today. But delivery can t happen without
More informationCitrix Solutions. Overview
Citrix Solutions Citrix solutions empower people to work and collaborate from anywhere, securely accessing apps and data on any of the latest devices, as easily as they would in their own office. As work
More informationRSA Adaptive Authentication and Citrix NetScaler SDX Platform Overview
RSA Adaptive Authentication and Citrix NetScaler SDX Platform Overview 2 RSA and Citrix have a long history of partnership based upon integration between RSA Adaptive Authentication and Citrix NetScaler
More informationCisco and Citrix: Building Application Centric, ADC-enabled Data Centers
: Building Application Centric, ADC-enabled Data Centers Cisco Application Centric Infrastructure (ACI) integrates Citrix NetScaler Application Delivery Controller (ADC) appliances to reduce deployment
More informationFullerton India enhances its employee productivity and efficiency with Citrix XenDesktop
Fullerton India enhances its employee productivity and efficiency with Citrix XenDesktop 2 As a result of implementing Citrix XenDesktop, the number of our help desk tickets has fallen significantly. The
More informationConfiguring Citrix NetScaler for IBM WebSphere Application Services
White Paper Configuring Citrix NetScaler for IBM WebSphere Application Services A deployment guide for configuring NetScaler load balancing and content switching When deploying IBM WebSphere Application
More informationRedefining IT for federal healthcare agencies
Redefining IT for federal healthcare agencies Redefining IT for federal healthcare agencies Virtualization solutions for clinicians and patients: Anytime, anywhere, on any device Executive summary These
More informationCitrix ShareFile Enterprise technical overview
Citrix ShareFile Enterprise technical overview 2 The role of IT organizations is changing rapidly as the forces of consumerization pose new challenges. IT is transitioning from the sole provider of user
More informationSingle Sign On for ShareFile with NetScaler. Deployment Guide
Single Sign On for ShareFile with NetScaler Deployment Guide This deployment guide focuses on defining the process for enabling Single Sign On into Citrix ShareFile with Citrix NetScaler. Table of Contents
More informationHow To Get Cloud Services To Work For You
Product Overview Citrix CloudPortal Business Manager Unified cloud services delivery and business management platform Enterprises and cloud providers have focused most of their initial cloud strategies
More informationUsing Vasco IDENTIKEY Server with NetScaler
Using Vasco IDENTIKEY Server with NetScaler Deployment Guide This deployment guide describes the process for deploying Vasco IDENTIKEY server with NetScaler to enable secure authentication for application
More informationCisco and Citrix: Building Application Centric, ADC-enabled Data Centers
Solutions Brief : Building Application Centric, ADC-enabled Data Centers Cisco Application Centric Infrastructure (ACI) integrates Citrix NetScaler Application Delivery Controller (ADC) appliances to reduce
More informationDesign and deliver cloudbased apps and data for flexible, on-demand IT
Design and deliver cloudbased apps and data for flexible, on-demand IT Discover the fastest and easiest way for IT to enable business productivity using cloud-based management and delivery of complete
More informationBring-Your-Own-Device Freedom
Bring-Your-Own-Device Freedom Solutions for federal, state, and local governments Increasingly, IT organizations in federal, state, and local agencies are embracing consumerization with the understanding
More informationEnabling mobile workstyles with an end-to-end enterprise mobility management solution.
Mobile workstyles White Paper Enabling mobile workstyles with an end-to-end enterprise mobility management solution. 2 The evolution of mobile workstyles has made it increasingly important for professionals
More informationEnterprise- Grade MDM
Enterprise- Grade MDM This brief describes a foundational strategic feature of the Citrix enterprise mobility offering, enterprise-grade MDM. 2 While the transition of mobile phones into computers has
More informationSolutions Brief. Citrix Solutions for Healthcare and HIPAA Compliance. citrix.com/healthcare
Solutions Brief Citrix Solutions for Healthcare and HIPAA Compliance citrix.com/healthcare While most people are well aware of the repercussions of losing personal or organizational data from identity
More informationThe falling cost and rising value of desktop virtualization
The falling cost and rising value of desktop virtualization 2 The growing strategic value of desktop virtualization, from a more flexible, productive workforce to lower real estate costs, has made it a
More informationicrosoft TMG Replacement with NetScaler
icrosoft TMG Replacement with NetScaler Replacing Microsoft Forefront TMG with NetScaler for secure VPN access Table of contents Introduction 3 Configuration details 3 NetScaler features to be enabled
More informationPowering real-time mobile access to critical information with ShareFile
Powering real-time mobile access to critical information with ShareFile An enterprise file sync and sharing solution built for the needs of the energy, oil and gas industry to provide employee and third-party
More informationModernize your business with Citrix XenApp 7.6
Modernize your business with Citrix XenApp 7.6 Avoid non-compliance issues and keep your business running smoothly by upgrading your SAP environment to run on top of the latest Citrix and Microsoft technologies
More informationSolution Guide for Citrix NetScaler and Cisco APIC EM
Solution Guide for Citrix NetScaler and Cisco APIC EM Orchestrating Network QoS policy for delivering enhanced video experience to XenDesktop users Table of contents Solution Overview 3 Executive Summary
More informationDeploying NetScaler Gateway in ICA Proxy Mode
Deploying NetScaler Gateway in ICA Proxy Mode Deployment Guide This deployment guide defines the configuration required for using the NetScaler Gateway in ICA Proxy Mode. Table of Contents Introduction
More informationTrend Micro InterScan Web Security and Citrix NetScaler SDX Platform Overview
Trend Micro InterScan Web Security and Citrix NetScaler SDX Platform Overview 2 Trend Micro and Citrix have a long history of partnership based upon integration between InterScan Web Security and Citrix
More informationTaking Windows Mobile on Any Device
Taking Windows Mobile on Any Device As the adoption of mobile devices continues to expand, IT organizations are challenged to keep up with the mobile demands of today s fast-paced workforce and at the
More informationSafeguard Protected Health Information With Citrix ShareFile
Safeguard Protected Health Information With Citrix ShareFile This enterprise file sync and sharing solution supports HIPAA compliance, boosts security and mobilizes data access Citrix ShareFile helps healthcare
More informationTrend Micro Cloud Security for Citrix CloudPlatform
Trend Micro Cloud Security for Citrix CloudPlatform Proven Security Solutions for Public, Private and Hybrid Clouds 2 Trend Micro Provides Security for Citrix CloudPlatform Organizations today are embracing
More informationCitrix XenServer Industry-leading open source platform for cost-effective cloud, server and desktop virtualization. citrix.com
Citrix XenServer Industry-leading open source platform for cost-effective cloud, server and desktop virtualization. 2 While the core server virtualization market has matured, virtualization itself is seeing
More informationThe Trainer s Guide to Using Video Streaming, Video Conferencing and On-Demand Video
The Trainer s Guide to Using Video Streaming, Video Conferencing and On-Demand Video How to effectively add video into elearning Integrating video into online learning is an undeniably hot topic, but determining
More informationThe Beginner s Guide to Getting Your Business on Social Media. Simple tips for building an online social presence worthy of your webinars
The Beginner s Guide to Getting Your Business on Social Media Simple tips for building an online social presence worthy of your webinars Social media has transformed the way we get and give information.
More informationSecure Data Sharing in the Enterprise
Secure Data Sharing in the Enterprise 2 Follow-me data and productivity for users with security and manageability for IT Productivity today depends on the ability of workers to access and share their data
More informationSolutions Brief. A tale of three universities: Increasing access, engagement and learning. citrix.com/education
A tale of three universities: Increasing access, Three universities collaborated and designed a mobility strategy utilizing Citrix solutions to modernize their IT platforms and they are transforming the
More informationSolution Guide. Optimizing Microsoft SharePoint 2013 with Citrix NetScaler. citrix.com
Solution Guide Optimizing Microsoft SharePoint 2013 with Citrix NetScaler Table of Contents Overview of SharePoint 2013 3 Why NetScaler Optimization Solution for SharePoint 2013? 3 Product Versions and
More informationRun Skype for Business as a Secure Virtual App with a Great User Experience
Run Skype for Business as a Secure Virtual App with a Great User Experience Improve security and manageability while avoiding the performance problems of traditional virtual installations. Deliver secure,
More informationSecuring Outlook Web Access (OWA) 2013 with NetScaler AppFirewall
Solution Guide Securing Outlook Web Access (OWA) 2013 with NetScaler AppFirewall Solution Guide This solution guide provides guidelines for securing Exchange 2013 Outlook Web Access (OWA) with NetScaler
More informationBring your own device freedom
Bring your own device freedom BYOD solutions for federal government enterprises The Digital Government Strategy, issued by Federal Chief Information Officer (CIO) Steven VanRoekel on May 23, 2012, called
More informationWebsense Data Security Gateway and Citrix NetScaler SDX Platform Overview
Websense Data Security Gateway and Citrix NetScaler SDX Platform Overview 2 The next generation of SDX platform provides the foundation for further integration. Today, Citrix NetScaler SDX appliances enable
More informationShareFile Enterprise technical overview
Overview Guide ShareFile Enterprise technical overview Secure data sync and sharing services ShareFile empowers users to securely share files with anyone and to sync files across all of their devices The
More informationSecure remote access
Secure remote access Technical Solutions Brief Secure remote access Simple, secure access to apps and desktops from anywhere. Secure remote access Technical Solutions Brief 2 Today s fast-paced business
More informationCitrix Support and Maintenance Services
Citrix Support and Maintenance Services Optimize your Citrix software and hardware investment throughout its lifecycle Comprehensive support and maintenance services are essential to ensure high availability
More informationCitrix Workspace Cloud Apps and Desktop Service with an on-premises Resource Reference Architecture
Citrix Workspace Cloud Apps and Desktop Service with an on-premises Resource Reference Architecture Produced by Citrix Solutions Lab This guide walks you through an example of how to use Citrix Workspace
More informationOptimizing service assurance for XenServer virtual infrastructures with Xangati
Solutions Brief Optimizing service assurance for XenServer virtual infrastructures with Xangati As IT organizations adopt application, desktop and server virtualization solutions as the primary method
More informationSolution Brief. Deliver Production Grade OpenStack LBaaS with Citrix NetScaler. citrix.com
Solution Brief Deliver Production Grade OpenStack LBaaS with Citrix NetScaler Enterprises are increasingly turning to private cloud architectures for increased agility and greater operational efficiency
More informationNetScaler: A comprehensive replacement for Microsoft Forefront Threat Management Gateway
NetScaler: A comprehensive replacement for Microsoft Forefront Threat Management Gateway 2 Microsoft s Forefront Threat Management Gateway (TMG) is a network security and protection solution for enterprise
More informationDesktop virtualization for all
Desktop virtualization for all 2 Desktop virtualization for all Today s organizations encompass a diverse range of users, from road warriors using laptops and mobile devices as well as power users working
More informationData Center Consolidation for Federal Government
Data Center Consolidation for Federal Government Virtual computing transforms IT environments so agencies can cut costs, bolster efficiency and agility, and improve user productivity In a slow economy,
More informationMobility and cloud transform access and delivery of apps, desktops and data
Mobility and cloud transform access and delivery of apps, desktops and data Unified app stores and delivery of all apps (Windows, web, SaaS and mobile) and data to any device, anywhere. 2 The cloud transforms
More informationVirtual desktops in hospitals: streamlining clinical workflows
Virtual desktops in hospitals: streamlining clinical workflows How providers leverage Citrix and Imprivata solutions to optimize clinical workflows improving quality of care, while complying with industry
More informationThe fastest, most secure path to mobile employee productivity
The fastest, most secure path to mobile employee productivity 2 If your organization lacks a bring-your-own-device (BYOD) strategy, you may be in danger of losing employees who are unhappy because they
More informationNetScaler carriergrade network
White Paper NetScaler carriergrade network address translation Preserve IPv4 network investments, consolidate application delivery control in one platform and lower capex and opex Protect your investment
More informationDesktop virtualization for all
Desktop virtualization for all 2 Desktop virtualization for all Today s organizations encompass a diverse range of users, from road warriors using laptops and mobile devices as well as power users working
More informationMaximizing Flexibility and Productivity for Mobile MacBook Users
Citrix DesktopPlayer for Mac White Paper Maximizing Flexibility and Productivity for Mobile MacBook Users Windows virtual desktops to go for corporate and BYO Macs 2 Executive Overview The popularity of
More informationGoToAssist Remote Support HIPAA compliance guide
GoToAssist emote Support HIPAA compliance guide Privacy, productivity and remote support 2 The healthcare industry has benefited greatly from the ability to receive remote support from technology providers
More informationFeatures of a comprehensive application security solution
WHITE PAPER Citrix NetScaler Features of a comprehensive application security solution The comprehensive security features of Citrix NetScaler protect against DoS/DDoS, deliver intrusion filtering capabilities
More informationThe top 5 truths behind what the cloud is not
Citrix Cloud Solutions White Paper The top 5 truths behind what the cloud is not Separating the noise of what cloud is and what it s not 2 It s clear that the cloud represents the biggest technology disruption
More informationDeploying NetScaler with Microsoft Exchange 2016
Deployment Guide Deploying NetScaler with Microsoft Exchange 2016 Deployment Guide Load balancing Microsoft Exchange 2016 with NetScaler Table of Contents Introduction 3 Configuration 5 NetScaler features
More informationPut the IoT to Work in Your Store
Put the IoT to Work in Your Store IoT adds a personal touch to retail that keeps customers coming back. Your store still has time to be on the leading edge of retail IoT and to create an even more personalized
More informationEffective hosted desktops
Effective hosted desktops HP ConvergedSystem 100 for Hosted Desktops with Citrix XenDesktop 2 Driven by strong adoption of mobility technology, effective desktop and application virtualization, hosted
More informationHow To Install A Citrix Netscaler On A Pc Or Mac Or Ipad (For A Web Browser) With A Certificate Certificate (For An Ipad) On A Netscaler (For Windows) With An Ipro (For
Deployment Guide Deployment Guide VeriSign Certificate Authority Citrix NetScaler SSL Deployment Guide Notice: The information in this publication is subject to change without notice. THIS PUBLICATION
More informationThree ways companies are slashing IT costs with VDI
Three ways companies are slashing IT costs with VDI Citrix XenDesktop helps customers lower operating and capital expenses while avoiding costly security breaches In a time of compressed budgets and new
More informationWindows XP Application Migration Checklist
Windows XP Application Migration Checklist Accelerate XP migration planning 2 Whether just beginning a Microsoft Windows XP application migration project or moving forward on an existing project, it s
More informationCitrix Ready Solutions Brief. CA Single Sign-On and Citrix NetScaler: Quickly Adapt to Your Dynamic Authentication Demands. citrix.
CA Single Sign-On and Citrix NetScaler: Quickly Adapt to Your Dynamic Authentication Demands citrix.com/ready CA Technologies and Citrix have partnered to integrate their complementary, industry-leading
More informationWhite Paper. SDN 101: An Introduction to Software Defined Networking. citrix.com
SDN 101: An Introduction to Software Defined Networking citrix.com Over the last year, the hottest topics in networking have been software defined networking (SDN) and Network ization (NV). There is, however,
More informationCorporate and Payment Card Industry (PCI) compliance
Citrix GoToMyPC Corporate and Payment Card Industry (PCI) compliance GoToMyPC Corporate provides industryleading configurable security controls and centralized endpoint management that can be implemented
More informationDeploying XenApp 7.5 on Microsoft Azure cloud
Deploying XenApp 7.5 on Microsoft Azure cloud The scalability and economics of delivering Citrix XenApp services Given business dynamics seasonal peaks, mergers, acquisitions, and changing business priorities
More informationRemote Access Security
Remote Access Security Security is essential when accessing home and office computers remotely. Learn how GoToMyPC provides reliable, industry-leading security that keeps your files, applications and information
More informationWhat is an application delivery controller?
What is an application delivery controller? ADCs have gained traction within the last decade, largely due to increased demand for legacy load balancing appliances to handle more advanced application delivery
More informationDefend hidden mobile web properties
Defend hidden mobile web properties Is your mobile micro app concealing a complex web property? 2 We ve all used mobile micro apps to check the weather, stocks and news or to interact via social media
More informationSolidFire SF3010 All-SSD storage system with Citrix CloudPlatform 3.0.5 Reference Architecture
SolidFire SF3010 All-SSD storage system with Citrix CloudPlatform 3.0.5 Reference Architecture 2 This reference architecture is a guideline for deploying Citrix CloudPlatform, powered by Apache CloudStack,
More informationWhat s Missing from Your BYOD Strategy?
White Paper What s Missing from Your BYOD Strategy? for BYOD, CYOD or COPE In the early days of mobility, companies rushed to embrace bring-your-own-device (BYOD) programs, which allowed employees to use
More informationWhite paper. Microsoft and Citrix VDI: Virtual desktop implementation scenarios
White paper Microsoft and Citrix VDI: Virtual desktop implementation scenarios Table of contents Objective Microsoft VDI offering components High definition user experience...3 A very cost-effective and
More informationSolve the application visibility challenge with NetScaler Insight Center
Citrix NetScaler Solve the application visibility challenge with NetScaler Insight Center 2 Executive Summary The ability to observe, diagnose, and subsequently improve the performance of business-critical
More informationXenApp and XenDesktop 7.8 AppDisk & AppDNA for AppDisk technology
Citrix Frequently Asked Questions White Paper XenApp and XenDesktop 7.8 AppDisk & AppDNA for AppDisk technology Frequently Asked Questions February 2016 Prepared by: Citrix Windows App Delivery Product
More informationAdvanced virtualization management for Hyper-V and System Center environments. www.citrix.com
Advanced virtualization management for Hyper-V and System Center environments www.citrix.com Introduction Microsoft Hyper-V provides a dynamic, reliable and scalable virtualization platform enabling cost
More informationBlueCat Networks Adonis and Proteus on Citrix NetScaler SDX Platform Overview
BlueCat Networks Adonis and Proteus on Citrix NetScaler SDX Platform Overview 2 The BlueCat Networks and Citrix partnership is based upon integration between BlueCat Networks DNS, DHCP and IP Address Management
More informationSafeguard protected health information with ShareFile
Solutions Brief Safeguard protected health information with ShareFile This enterprise file sync and sharing solution supports HIPAA compliance, boosts security and mobilizes data access ShareFile helps
More information