Getting Started with Citrix XenApp and XenDesktop Security
|
|
|
- Nicholas Boone
- 9 years ago
- Views:
Transcription
1 Getting Started with Citrix XenApp and XenDesktop Security Security guidance for Citrix Deployments This document is based on Citrix XenApp and XenDesktop 7.6 Long Term Service Release. However, the guidance and the principles are relevant to most releases. Where release-specific details are included, these are highlighted.
2 Table of Contents Introduction... 3 Scope and use cases... 3 Audience... 3 Security challenges and trends... 4 Security considerations in XenApp and XenDesktop deployments... 5 Security capabilities and recommendations in XenApp and XenDesktop deployments... 7 Identity and access... 7 Network security Application security Data security Monitoring and Response Representative deployment Security Standards Common Criteria FIPS with XenApp and XenDesktop TSL/SSL IP Security Smart cards Finding more information Compliance and standards Best Practices Products Last updated: 18 March 2016 citrix.com
3 Introduction Citrix products offer a wide range of features and capabilities to help secure applications and data within Citrix XenApp and XenDesktop deployments. These features and capabilities are particularly important when deploying Citrix XenApp and XenDesktop in government, finance and health sector environments, where security is an essential consideration and often a regulated requirement. This document provides an overview and guidance regarding configuring Citrix environments to mitigate security threats and to comply with security standards. Further documentation is available to support the guidance in this document, providing examples and use cases. See Finding more information. You can also consult your local Citrix representatives for advice regarding your deployments and updates. Scope and use cases Citrix offers solutions and associated licensing models for deployments managed and hosted by the customer (on the customer s premises), or deployments managed in the cloud. This document provides security guidance for solutions deployed on customer premises, rather than cloud deployments. The primary use case for this document is a deployment that allows local and remote users to access published resources (desktops and applications) managed and hosted on the customer s premises. This document is based on XenApp and XenDesktop 7.6 Long Term Service Release. However, the guidance and the principles are relevant to most releases. Where release-specific details are included, these are highlighted. For more information regarding the Long Term Service Release, see Audience This document is designed to meet the needs of security specialists, systems integrators and consultants responsible for designing, deploying and securing Citrix deployments. citrix.com 3
4 Security challenges and trends In recent years, there have been many high profile cases of security breaches and attacks. There is no sign of this relenting, endorsing the need to consider security at the design stage, to continuously monitor and respond to security threats and to adapt and harden the environment accordingly. It is of course essential to protect sensitive data and intellectual property. Security is becoming more complex with the increase in remote working and a highly mobile workforce, including adoption of bring your own device (BOYD) work styles. The result is more unmanaged and/or unknown devices accessing resources. Security complexity increases with the emergence and use of more types of devices (including mobile devices, tablets and internet-enabled devices) and additional network types (such as 3G/4G, Wi-Fi and Bluetooth). Monitoring, identifying and responding to security breaches is a significant challenge and essential to ensure business continuity and security of resources. Additionally, many sectors insist on certain accreditation or security compliance. For example, to deploy Citrix products within US Federal environments, the deployment must be FIPS compliant. Citrix products offer substantial security features and options to help safeguard sensitive data and intellectual property, ensure business continuity, and help organizations comply with security standards. This document provides guidance and recommendations to help you design and manage your Citrix deployment. The Citrix Ready Marketplace includes an extensive list of verified products, trusted solutions, and enterprise-enabled apps. See citrix.com 4
5 Security considerations in XenApp and XenDesktop deployments There are various security considerations when designing and deploying Citrix XenApp and XenDesktop. This diagram shows key security areas and deployment options that help assure confidentiality, integrity and availability of resources. To ensure security, integrity and business continuity, you need to determine your IT governance, risk management and compliance strategy. Your strategy should include security risk assessments, procedures, process, training and awareness. The integrity and confidentiality of data is essential. Appropriate encryption, segmentation of users and access to resources, and managing the location of data, helps provide compliance that is more consistent, enforceable and verified. You can protect against data loss outside the corporate network by restricting data access and transfer to user devices. For example, employees travelling on business may lose their laptop (in a taxi for example), or have a device seized by border control, and you can restrict and protect the data on these devices. You can implement privacy controls and configuration, to benefit both the organization and users. The key areas, shown in the diagram, help you optimize your deployment and mitigate security risks and achieve your security and compliance strategy: Identity and Access Well-designed identity management and access control determines who can access resources, how they authenticate and, once authenticated, the resources available and the level of access granted. Identity and access are an important consideration for all types of accounts including users, administrators and service accounts. Benefits of a sound identify and access strategy include secure and controlled access to resources from personal devices (for example, employees working remotely and employees bringing their own devices to the office) and non-employees (for example, contractors, partners, suppliers and students). Authentication within large scale deployments is simplified, with a common URL provided to log on and access the required and relevant resources. citrix.com 5
6 Network Security Appropriate network security is required to ensure network traffic is secured and encrypted throughout the deployment, from user devices through to servers hosting resources and data. The type and level of network security required may also need to meet specific standards. For example, you may need to ensure end-to-end TLS encryption and specific network Access Control Lists (ACLs). For examples of end-to-end TLS and FIPS compliant XenDesktop and XenApp deployments (including NetScaler), see Citrix XenApp and XenDesktop 7.6 FIPS Sample Deployments. Application Security Application provisioning, hosting and monitoring must be designed to ensure applications are available to appropriate users only and hosted across servers, as needed, to minimize security risks. Contextual application security can be enabled using application policies to ensure that applications only have access to what is needed in a specific situation. You can host applications in appropriate silos and use third party tools to prevent cross application security breaches. Data Security Protecting data is paramount and a feature of Citrix XenApp and XenDesktop, where data is protected in the data center. Data security can be strengthened through the configuration of Citrix virtual channels, Windows policies and third party tools. Data security policies ensure sensitive data is kept in the data center (and off user devices), restricting access to resources and sensitive data on a contextual per-application basis. For example, policies may only allow certain users and devices access to sensitive data and applications such as payroll data. You can enable and configure endpoint validation and control to ensure policy-verified access, residual data management, and restrict and define the level of access to user device drives and peripherals. For examples of policy configuration to restrict access to user device drives and peripherals, see the relevant procedures in the Common Criteria Evaluated Configuration Guide for XenApp and XenDesktop 7.6, available from Monitoring and Response Monitoring is central to your security risk and ongoing assessment strategy. Monitoring allows you to determine application usage, compliance, optimization and security. Based on monitoring logs, events and alerts, you can proactively identify and respond to security risks. Monitoring for security related issues, enables you to check the status of your deployment and identify irregular events or issues. You can respond as needed to address issues, refine configuration, and support users. citrix.com 6
7 Security capabilities and recommendations in XenApp and XenDesktop deployments Citrix products offer many security features that can be configured to suit your environment, requirements, risk assessment and compliance. You need to review your security requirements and configure the products and features appropriately. Security should be a key consideration during the planning phase. Configuring, testing and refining your deployment in a staging environment, ahead of rolling out a production deployment, is highly recommended. To ensure ongoing mitigation against security threats, continuous monitoring, auditing and assessment of your deployment is also essential. Citrix recommends the following security design and implementation options to help address security challenges and threats. Identity and access To determine identity and access needs, consider and confirm the requirements for each type of account, defining the identity, authentication and access rights and privileges. Each account type presents different challenges and requires specific identity and access configuration. Account type Identity Access User Administrator Service Account Authentication, as defined by administrator. The authentication required is tailored to your environment (for example, twofactor authentication may be required). Authentication to provide access to management tools and consoles. Autonomous service account used by specific program/process. Programspecific authentication. Based on their privileges, users are able to access appropriate published resources. Administrators have direct access to management tools and consoles, usually from within the network, with access to security sensitive resources and data. Administrators require elevated privileges. Specific privileges to access programs, resources, and scripts. citrix.com 7
8 Identity and authentication You need to determine how users must authenticate to access resources and review the required authentication policies. When considering identity and authentication in a secure environment, multi-factor authentication is recommended. For example, a combination of user name, password, plus additional methods such as hardware or software-based token access. Multi-factor authentication is likely to be mandatory for remote access. Depending on your security requirements and policies, multi-factor authentication could be extended to within the corporate environment and network. Smart card authentication is mandatory within certain environments. For example, in the US Department of Defense, smart card access is used to authenticate all users, local and remote. Smart card access is supported and can be configured in a XenApp and XenDesktop deployment. For more detail, see Smart Card Support. StoreFront and, optionally, NetScaler are deployed and configured to manage access to published resources and data. For remote access, NetScaler is recommended. For internal access, StoreFront is often appropriate. However, the exact configuration depends on your security risks and needs. To avoid security breaches, ensure appropriate password policies are in place. For example, the password policy may require passwords to comprise at least eight characters and include at least one upper case letter and one number or symbol. The password expiration period must also be defined. Other rules such as whether or not previous passwords can be reused may be defined. It is important to have a password policy in place and to ensure it is applied to all accounts (users, administrators and service accounts). Access and privileges Least privilege For all account types (users, administrators and service accounts), you should grant the minimum privileges needed to allow completion of tasks. This is often referred to as the principle of least privilege. Some organizations achieve this through granting elevated privileges to confirm everything works, then reset to minimum privileges and gradually increase privileges until the account has adequate privileges to perform the required tasks. User privileges - publishing For publishing purposes, use Active Directory groups and policies. Configure the required privileges for the relevant AD group and add the appropriate users to the group. Avoid publishing to all users (Domain Users), individual user accounts, anonymous (non-authenticated) users or shared accounts. citrix.com 8
9 Administrator privileges Accounts for administrators and support staff require elevated privileges. As with other account types, use groups (AD groups, for example) to provide access. The group must: Include the relevant users (administrators or support personnel) Be configured to allow access to the required consoles only Be based on role (access and privileges needed to complete tasks) Be configured to allow the level of logging required by governance and regulatory compliance Regularly review reports to determine whether users can be removed from the group. This is particularly important with administrator accounts; roles and responsibilities are likely to change regularly and therefore group membership and management rights may need to be modified accordingly. Ensure you have at least two users allocated to each group so there is no risk of only one person available to complete tasks (as that could result in a single point of failure). Do not use default names and passwords for administrator accounts and, as with other accounts, ensure an appropriate password policy (and strong authentication) is in place. Your deployment will include various administrator accounts, across various systems. For example, administrators for management of XenApp and XenDesktop, administrators to manage your data storage, administrators to manage your database infrastructure. Ensure you monitor and track all administrator accounts as they are all likely to have elevated privileges and data access. Note that NetScaler, XenApp and XenDesktop (and other third party tools) include default delegated administrator roles. This may be a consideration when configuring AD groups for administrator purposes and roles. Consult the relevant product guides for more information on default roles. Service account privileges With elevated privileges and often poor password management (for example, password never expires), and in some cases access to multiple components, service accounts can be a target for security attacks. Avoid using a single service account for multiple components or programs (avoid aggregated super accounts ). As with all accounts, ensure proper password policies are in place. Where a service account is a local computer account (rather than a domain account), it is necessary to manually update the password regularly. Access Rights You can configure SmartAccess, a feature of XenApp and XenDesktop, to help secure your deployment. SmartAccess allows you to control access to published applications and desktops based on NetScaler Gateway session policies. You configure pre-authentication and post-authentication conditions that must be validated to access published resources. These conditions can cover security related requirements such as checks for the correct version of virus protection software and domain membership. You can also configure conditions, based on XenApp or XenDesktop policies and/or NetScaler SmartControl, to control access to local devices and processes (for example, user device drive mapping, clipboard, and printer mapping). Additionally, specific privileges in XenApp, including clipboard usage, can also be configured on a per-application basis. citrix.com 9
10 Network security Citrix products provide many security features to help secure the network. Each network comprises layers (referred to as enclaves within government environments), as shown in this example: In the example, users in the Sales group log on and access the Sales application (salesforce) and the salesforce data. Users in the Human Resources team access the HR application and data (provided by SAP). The diagram shows the location of components and resources within the network layers. The network layers are described below: Layer External Presentation Application Data This includes devices and networks that are not controlled by the organization. This is of course the least trusted layer. In many cases, users and partners will access your network from here. This outermost layer managed by you (the external layer is not controlled by you), is the most likely to be attacked. It includes NetScaler, within a DMZ, and access to virtual applications and desktops. This layer contains your application servers and management consoles. The inner most layer and the most protected layer. It contains your data and intellectual property hosted on your database and file server infrastructure citrix.com 10
11 A well designed network, with secured and discrete layers, helps prevent security breaches. Each layer is protected and isolated; network traffic can move between adjacent layers only (traffic is unable to skip layers). Firewalls are used to protect and control communication between the layers. Only essential ports are opened, restricting traffic to certain ports and protocols. Network traffic is encrypted, throughout the deployment and all layers. For an example of network encryption and firewall configuration, see the Representative deployment. In addition to firewall protection within the network, ensure appropriate firewalls are configured on user devices. Data is kept secure and isolated. Management is conducted within the secure inner application layer to safeguard sensitive configuration and data. Application security Within a Citrix deployment, there are various techniques you can employ to protect the application layer. The biggest security threat is application jailbreaking (also known as application breakout), where potential malicious activity can occur after gaining access to the underlying network infrastructure. Third party tools, such as Microsoft Windows AppLocker, help improve application security by restricting who can run applications and also the type of applications that can be run. Using AppLocker, you specify which users and groups have access to particular applications. You create rules for your organization, to allow or deny access to specific applications. AppLocker also allows you to restrict and prevent access to different types of files, including executable files and scripts. You can configure separate and discrete application servers and files servers, within your XenApp and XenDesktop environment, to keep applications and data protected. For example, host payroll applications and data on separate dedicated servers and restrict access to the payroll applications (for example, only users in Human_Resources group are able to access the payroll applications). With the applications and data managed on separate file servers and databases, they are protected should there be a jailbreak elsewhere in the deployment. As with data security, publish applications to specific groups of users only. Avoid publishing to individual users, anonymous users or shared accounts. Also, if appropriate, you can enforce higher levels of credential access for more sensitive applications. For example, payroll applications may require a higher level of authentication such as multi-factor authentication. Where a number of applications are hosted on the same server, you can isolate and restrict access to applications using NTFS (New Technology File System) permissions on the application folders. NTFS permissions can also be used to restrict access to management consoles and features such as session sharing (so authorized administrators only can access the management console and tools). Your XenApp and XenDesktop provisioning scheme allows you to manage the base images, application hosting and silos. You manage these centrally on a per-image basis, simplifying rollout and updates. citrix.com 11
12 Data security Hosting data in the data center is a long standing security feature of Citrix XenApp and XenDesktop. To increase data security, consider the following: Virtual channels: To determine the virtual channels needed and those that can be disabled, you must consider your user needs and use cases. This must be balanced with your security needs and compliance requirements. Where possible, restrict or prevent the use of virtual channels that allow data transfer to and from user devices, to ensure data is kept in the data center and protected. For example, client drive mapping and USB redirection allow transfer of data between the data center and user devices. Where the requirements and needs differ for local and remote users, SmartAccess can be configured to manage the virtual channel settings. The virtual channels settings are applied based on whether or not the user is accessing the environment from within the corporate network or remotely. Note that in some deployments, customer specific virtual channels may have been configured. If so, you should disable these customer specific virtual channels by default. If a particular application or use case deems a customer specific virtual channel absolutely necessary, you must determine whether the security risks are acceptable before enabling the virtual channel. NetScaler Gateway: You can also configure NetScaler Gateway ICA proxy mode to further isolate sensitive data, ensuring data is available using published applications or desktops only (and not accessible directly, even for those within the network). Access to restricted data: You may need to refine and increase the level of authentication required depending on resource access. For example, to access sensitive data, consider introducing increased levels of authentication. For example, in a health environment, smart card access may be required to access patient data. Provisioning: Depending on the use case and provisioning scheme, XenApp and XenDesktop provisioning options provide the ability to contain security breaches. For example, if desktops are provisioned on a per-session basis in read-only mode, at the end of the session the desktop is discarded. Therefore, in the event of a security breach (for example, a malware breach), the threat is mitigated once the session is terminated. Hosting applications and data Ensure that data and applications are hosted appropriately and in relevant silos, as required. It should not be possible to run programs (for example, executables and scripts) on the data file server. It should also not be possible for users (or resources running on the user device) to access and modify files on the folders containing programs. citrix.com 12
13 Monitoring and Response Monitoring is essential for detecting and responding to risk, allowing you to determine deployment usage, optimization, security and compliance. You can monitor the deployment to detect and respond to suspicious behavior and attacks, detect abuse of privileged accounts, ensure products and components have the latest updates and security fixes applied, and check virus protection software is installed and up to date. You must have policies and processes in place to ensure regular review of monitoring reports. You must respond as needed to address issues, refine configuration, and support users. Risk and compliance Your organization s IT governance, risk management and compliance strategy is central to the design of your deployment. Monitoring and response is key to your risk and compliance strategy. Risk You need to confirm and review your risk strategy and confirm how to detect, deter, prevent and recover from risks. Data is likely to be central to your risk strategy. For example, how to safeguard sensitive data and intellectual property. Detect: Monitoring can help detect security risks. For example, you can use NetScaler Security Insight feature to help identify and highlight security risks, parse NetScaler logs to automatically detect context-sensitive reporting and highlight compliance issues. Deter: Monitoring user behavior (and letting your users know they are being monitoring) not only helps detect issues but may also deter user activity that may result in security issues. Prevent: Techniques such as segmentation of users, applications and data, plus policy-based access to applications and data, can help prevent risk. Data security also ensures protection of data loss outside our organization (for example, restricting the data stored on remote devices). Training users may also help prevent issues. Recover: Virtualization of applications and desktops provides inherent features to assist with recovery and response to issues. For example, with shared and read-only desktop images, security breaches are contained and discard on termination of sessions. If you identify a security risk or breach, you may also need to reconfigure your deployment, and revisit your procedures and processes, to prevent further issues. Compliance You need to consider your compliance requirements. For example, do you need to comply with market specific compliance requirements? You may need to consider and meet the requirements for the Payment Card Industry Data Security Standard, for example, if working with payment systems and data. Appropriate encryption, segmentation of users and access to resources, and managing the location of data, helps provide compliance that is more consistent, enforceable and verified. citrix.com 13
14 Representative deployment The deployment below is an example of a Citrix deployment designed to meet the guidelines detailed in this document. The deployment includes Citrix Receiver, NetScaler Gateway, StoreFront, XenApp and XenDesktop (Delivery Controller and VDA). For simplicity, only one Delivery Controller and VDA are shown. The deployment is based on the XenApp and XenDesktop 7.6 Long Term Service Release. However, the deployment includes the addition of StoreFront 3.5, as this allows encryption of network traffic using TLS 1.2. NetScaler Gateway MPX 11.0 (with the 2.2 level Cavium firmware applied) is included in the deployment s it also supports TLS 1.2. Users log on and authenticate using NetScaler Gateway. NetScaler Gateway is deployed and secured in the DMZ. Two factor authentication is configured. Based on the user credentials, users are provided with the relevant resources and applications. Applications and data are located on appropriate servers (not shown on the diagram), with separate servers used for security sensitive applications and data. The deployment includes monitoring utilities to check usage, risks and security issues. Procedures are in place to review and respond to security risks. citrix.com 14
15 How the components interact This diagram shows a detailed view of the deployment including the components and certificates on each server, plus the communication and port settings. NetScaler Gateway is deployed in the DMZ to provide secure remote access to XenApp and XenDesktop environments. Traffic between the web browser on the user device and NetScaler Gateway is secured using HTTPS. All other traffic is secured using TLS 1.2. NetScaler Gateway terminates the TLS/HTTPS connections from the user device (browser and Citrix Receiver). Traffic from NetScaler Gateway through StoreFront, Delivery Controller, and the VDA is secured using TLS 1.2. Network traffic is encrypted end-to-end, using TLS 1.2. As noted, StoreFront 3.5 is required (TLS 1.2 support was introduced with StoreFront 3.5). citrix.com 15
16 Security Standards This section provides details regarding security standards that may be relevant top your deployment. Some standards may be mandatory depending on your use case and environment. Common Criteria Common Criteria certification is an internationally recognized standard for evaluating the security of IT products and systems. Common Criteria certification provides assurance that products were thoroughly and independently tested and validated against a set of requirements established by the worldwide International Standards Organization to ensure IT security. For customers, especially US Federal and international government agencies, Common Criteria certification is an important requirement when procuring IT products and systems. Common Criteria certification is also applicable to private sector industries such as healthcare and financial. Citrix XenApp and XenDesktop 7.6 and NetScaler 10.5 were evaluated under the terms of the UK IT Security Evaluation and Certification Scheme and meet the Common Criteria, conformant requirements of Evaluation Assurance Level EAL2 augmented by ALC_FLR.2 Flaw Reporting Procedures. NetScaler 10.5 also meets Protection Profile for Network Devices v1.1. FIPS with XenApp and XenDesktop FIPS is a U.S. federal government standard that details a benchmark for implementing cryptographic software. The security community at large values products that follow the guidelines detailed in FIPS and the use of FIPS validated cryptographic modules. To facilitate implementing secure application server access and to meet the FIPS requirements, Citrix products can use cryptographic modules that are FIPS validated for implementations of secure TLS/SSL connections. The FIPS-enabled NetScaler Gateway MPX-FIPS appliance (NetScaler Gateway 10.x) is fully compatible, allowing full TLS configuration in deployments that include NetScaler Gateway. NetScaler Gateway MPX-FIPS appliances are FIPS Level 2 compliant. To facilitate implementing secure application server access and to meet the FIPS requirements, Citrix products can use cryptographic modules that are FIPS validated for implementations of secure TLS connections. When configured for FIP 140-2, Citrix XenApp and XenDesktop, StoreFront and Receiver, use cryptographic modules provided by the Microsoft Windows operating system. NetScaler uses the FIPS validated Cavium cryptographic module. The representative deployment in this guide is configured with TLS connections enabled with FIPS validated cryptographic modules. citrix.com 16
17 TSL/SSL Transport Layer Security (TLS) is an open, nonproprietary protocol that provides data encryption, server authentication, message integrity and optional client authentication for a TCP/IP connection. In Citrix deployments, you can configure TLS secure communications between user devices and XenApp and XenDesktop servers, ensuring data and traffic is encrypted throughout the deployment. Secure Socket Layer (SSL) is the previous standard, superseded by TLS. You can configure both TLS and SSL within a Citrix deployment. The server certificates in your deployment support both TLS and SSL. Citrix products support for TLS 1.2 This table shows Citrix products and components that support and can be configured for TLS 1.2 (the latest recommended release of TLS). Product TLS 1.2 support NetScaler version 11.0 Yes * NetScaler version 11.1 StoreFront version 3.5 Windows Virtual Desktop Agent version 7.6 Linux Virtual Desktop Agent Receiver for Windows Receiver for Linux ARM version 13.2 Receiver for Linux x86 version 13.2 Receiver for Mac Receiver for ios Receiver for Android version 3.7 Receiver for Chrome Receiver for HTML5 Receiver for Windows 10 Mobile Yes Yes Yes No Yes Yes Yes Yes Yes Yes Yes Yes No * NetScaler 11.0 requires the 2.2 level Cavium firmware. citrix.com 17
18 IP Security IP Security (IPsec) is a set of standard extensions to the Internet Protocol (IP) that provides authenticated and encrypted communications with data integrity and replay protection. IPsec is a network-layer protocol set, so higher level protocols such as Citrix ICA can use it without modification. Current and recent versions of XenApp and XenDesktop support end-to-end TLS encryption, so there is no reliance on IPsec. However, for earlier versions of XenApp and XenDesktop, IPsec was required for full encryption of network traffic within a virtual private network (VPN) environment. IPsec is described in Internet RFC All current versions of Microsoft Windows have built-in support for IPsec. Smart cards You can use smart cards with XenApp and XenDesktop, to provide secure access to published resources and data. Using smart cards simplifies the authentication process while enhancing logon security. XenApp and XenDesktop support smart card authentication to published applications, including smart card enabled applications such as Microsoft Outlook. In a business network, smart cards are an effective implementation of public-key technology and can be used to: Authenticate users to networks and computers Secure channel communications over a network Use digital signatures for securing content If you are using smart cards for secure network authentication, your users can authenticate to applications and content published using XenApp and XenDesktop. In addition, smart card functionality within these published applications is also supported. For example, a published Microsoft Outlook application can be configured to require that users insert a smart card into a smart card reader attached to the user device to log on to a server running XenApp or XenDesktop. After users are authenticated to the application, they can digitally sign using certificates stored on their smart cards. Citrix supports the use of Personal Computer Smart Card (PC/SC) based cryptographic smart cards. These cards include support for cryptographic operations such as digital signatures and encryption. Cryptographic cards are designed to allow secure storage of private keys such as those used in Public Key Infrastructure (PKI) security systems. These cards perform the actual cryptographic functions on the smart card itself, meaning the private key and digital certificates never leave the card. In addition, you can use two-factor authentication for increased security. Instead of merely presenting the smart card (one factor) to conduct a transaction, a user-defined PIN (a second factor), known only to the user, is used to prove that the cardholder is the rightful owner of the smart card. citrix.com 18
19 Smart Card Support Citrix continues testing various smart cards to address smart card usage and compatibility issues with XenApp and XenDesktop. XenApp and XenDesktop fully support the Common Access Card (CAC) and Personal Identity Verification (PIV) cards, with the appropriate versions of Citrix Receiver. There are many different types of smart card and smart card vendors. Within the US Government, both of these cards are used extensively: The Common Access Card (CAC) is used by employees and other personnel in the US Department of Defense (DoD). The CAC includes a photograph of the user, plus their name and associated details. The CAC is used to gain physical access to DoD buildings and areas and is also used to log on to the IT systems on the NIPR network. The CAC uses a proprietary on-card applet and requires proprietary middleware. Note that a Personal Identify Verification (PIV) authentication applet and certificate can be installed on modern CAC cards post-issuance using the User Maintenance Portal for CAC users, for users that also require access to PIV-protected systems (see below). The Personal Identify Verification (PIV) card is similar to a CAC, used by employees and contractors working in US Federal agencies. It includes a photograph and user details and is used to gain physical access to federal buildings and used to log on to IT systems. However, unlike CAC, PIV developed as a result of the Homeland Security Presidential Directive 12 (HSPD-12), does not necessarily require proprietary middleware and is supported by default on Microsoft Windows 7 or later. For further information, see The Citrix Ready Marketplace includes details of verified smart card and smart card hardware products. See Contact your smart card vendor or Citrix representative for further information regarding supported versions of smart card hardware and software. Citrix tests smart cards using certificates from common certificate authorities such as those supported by Microsoft. If you have any concerns regarding your certificate authority and compatibility with XenApp and XenDesktop, contact your local Citrix representative. For guidance regarding smart card configuration in US Government environments, see citrix.com 19
20 Finding more information The following documents and resources provide supplementary and additional information regarding securing Citrix deployments. The resources include links to specific product documentation plus security related technical articles and whitepapers. Compliance and standards Common Criteria XenApp 7.6 and XenDesktop 7.6 and NetScaler 10.5 Common Criteria Information: FIPS Citrix XenApp and XenDesktop 7.6 FIPS Sample Deployments: Healthcare Citrix XenApp and XenDesktop 7.6 Healthcare Design Guide: Smart cards Smart Card - Support Updates: Finance Best Practices Best Practices for Enterprise Security Payment Card Industry and Citrix XenApp and XenDesktop Deployment Scenarios: Citrix Ready Marketplace The Citrix Ready Marketplace includes an extensive list of verified products, trusted solutions, and enterprise-enabled apps. See citrix.com 20
21 Products XenApp and XenDesktop XenApp and XenDesktop 7.6 product documentation: System Hardening Guidance for XenApp and XenDesktop whitepaper: NetScaler NetScaler Gateway 10.5 product documentation: NetScaler Gateway 11.0 product documentation: StoreFront StoreFront 3.0 product documentation: StoreFront 3.5 product documentation: Receiver Receiver 4.4 product documentation: citrix.com 21
22 About Citrix Citrix (NASDAQ:CTXS) is leading the transition to software-defining the workplace, uniting virtualization, mobility management, networking and SaaS solutions to enable new ways for businesses and people to work better. Citrix solutions power business mobility through secure, mobile workspaces that provide people with instant access to apps, desktops, data and communications on any device, over any network and cloud. With annual revenue in 2014 of $3.14 billion, Citrix solutions are in use at more than 330,000 organizations and by over 100 million users globally. Learn more at Copyright 2016 Citrix Systems, Inc. All rights reserved. Citrix XenApp, XenDesktop, NetScaler, NetScaler Gateway, StoreFront, and Citrix Receiver are trademarks of Citrix Systems, Inc. and/or one of its subsidiaries, and may be registered in the U.S. and other countries. Other product and company names mentioned herein may be trademarks of their respective companies. citrix.com 22
Citrix XenApp and XenDesktop 7.6 FIPS 140-2 Sample Deployments
Citrix XenApp and XenDesktop 7.6 FIPS 140-2 Sample Deployments Table of Contents Introduction... 1 Audience... 1 Security features introduced in XenApp and XenDesktop 7.6... 2 FIPS 140-2 with XenApp and
Deploying NetScaler Gateway in ICA Proxy Mode
Deploying NetScaler Gateway in ICA Proxy Mode Deployment Guide This deployment guide defines the configuration required for using the NetScaler Gateway in ICA Proxy Mode. Table of Contents Introduction
Citrix MetaFrame XP Security Standards and Deployment Scenarios
Citrix MetaFrame XP Security Standards and Deployment Scenarios Including Common Criteria Information MetaFrame XP Server for Windows with Feature Release 3 Citrix Systems, Inc. Information in this document
Did you know your security solution can help with PCI compliance too?
Did you know your security solution can help with PCI compliance too? High-profile data losses have led to increasingly complex and evolving regulations. Any organization or retailer that accepts payment
White Paper. Protecting Mobile Apps with Citrix XenMobile and MDX. citrix.com
Protecting Mobile Apps with Citrix XenMobile and MDX citrix.com Mobility is a top priority for organizations as more employees demand access to the apps and data that will make them productive. Employees
Taking Windows Mobile on Any Device
Taking Windows Mobile on Any Device As the adoption of mobile devices continues to expand, IT organizations are challenged to keep up with the mobile demands of today s fast-paced workforce and at the
A new Secure Remote Access Platform from Giritech. Page 1
A new Secure Remote Access Platform from Giritech Page 1 Remote users have preferences G/On 5 works for Windows, Mac and Linux The G/On Client user experience is specific to the operating system Users
Citrix Workspace Cloud Apps and Desktop Service with an on-premises Resource Reference Architecture
Citrix Workspace Cloud Apps and Desktop Service with an on-premises Resource Reference Architecture Produced by Citrix Solutions Lab This guide walks you through an example of how to use Citrix Workspace
CNS-207 Implementing Citrix NetScaler 10.5 for App and Desktop Solutions
CNS-207 Implementing Citrix NetScaler 10.5 for App and Desktop Solutions The objective of Implementing Citrix NetScaler 10.5 for App and Desktop Solutions is to provide the foundational concepts and skills
Citrix XenApp 6.5 and XenDesktop 5.6 Security Standards and Deployment Scenarios Supplementary scenarios
Citrix XenApp 6.5 and XenDesktop 5.6 Security Standards and Deployment Scenarios Supplementary scenarios Overview Citrix products offer the security specialist a wide range of features for securing Citrix
"Charting the Course... Implementing Citrix NetScaler 11 for App and Desktop Solutions CNS-207 Course Summary
Course Summary Description The objective of this course is to provide the foundational concepts and teach the skills necessary to implement, configure, secure and monitor a Citrix NetScaler system with
NetScaler for the best XenApp/XenDesktop access and mobile experience
NetScaler for the best XenApp/XenDesktop access and mobile experience Discover 10 reasons NetScaler is the best way to futureproof your infrastructure As you refresh your network, it s important to understand
Design Guide: Remote Access to Windows Apps XenApp 7.6 Feature Pack 2 vsphere 6
Remote Access to Windows Apps FlexCast Services Design Guide Design Guide: Remote Access to Windows Apps XenApp 7.6 Feature Pack 2 vsphere 6 TABLE OF CONTENTS About FlexCast Services Design Guides... 2
CMB 207 1I Citrix XenApp and XenDesktop Fast Track
CMB 207 1I Citrix XenApp and XenDesktop Fast Track This fast paced course provides the foundation necessary for students to effectively centralize and manage desktops and applications in the datacenter
Sophistication of attacks will keep improving, especially APT and zero-day exploits
FAQ Isla Q&A General What is Isla? Isla is an innovative, enterprise-class web malware isolation system that prevents all browser-borne malware from penetrating corporate networks and infecting endpoint
SAFE-T RSACCESS REPLACEMENT FOR MICROSOFT FOREFRONT UNIFIED ACCESS GATEWAY (UAG)
SAFE-T RSACCESS REPLACEMENT FOR MICROSOFT FOREFRONT UNIFIED ACCESS GATEWAY (UAG) A RSACCESS WHITE PAPER 1 Microsoft Forefront Unified Access Gateway Overview 2 Safe-T RSAccess Secure Front-end Overview
MetaFrame Presentation Server Security Standards and Deployment Scenarios Including Common Criteria Information
MetaFrame Presentation Server Security Standards and Deployment Scenarios Including Common Criteria Information Citrix MetaFrame Presentation Server 4.0 for Windows Information in this document is subject
Corporate and Payment Card Industry (PCI) compliance
Citrix GoToMyPC Corporate and Payment Card Industry (PCI) compliance GoToMyPC Corporate provides industryleading configurable security controls and centralized endpoint management that can be implemented
Does your Citrix or Terminal Server environment have an Achilles heel?
CRYPTZONE WHITE PAPER Does your Citrix or Terminal Server environment have an Achilles heel? Moving away from IP-centric to role-based access controls to secure Citrix and Terminal Server user access cryptzone.com
How to Configure NetScaler Gateway 10.5 to use with StoreFront 2.6 and XenDesktop 7.6.
How to Configure NetScaler Gateway 10.5 to use with StoreFront 2.6 and XenDesktop 7.6. Introduction The purpose of this document is to record the steps required to configure a NetScaler Gateway for use
Building A Secure Microsoft Exchange Continuity Appliance
Building A Secure Microsoft Exchange Continuity Appliance Teneros, Inc. 215 Castro Street, 3rd Floor Mountain View, California 94041-1203 USA p 650.641.7400 f 650.641.7401 ON AVAILABLE ACCESSIBLE Building
IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:
IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including: 1. IT Cost Containment 84 topics 2. Cloud Computing Readiness 225
Course Description. Course Audience. Course Outline. Course Page - Page 1 of 12
Course Page - Page 1 of 12 Windows 7 Enterprise Desktop Support Technician M-50331 Length: 5 days Price: $2,795.00 Course Description This five-day instructor-led course provides students with the knowledge
CNS-207 - Implementing NetScaler 11.0 For App and Desktop Solutions
CNS-207 - Implementing NetScaler 11.0 For App and Desktop Solutions Overview The objective of this course is to provide the foundational concepts and teach the skills necessary to implement, configure,
Citrix NetScaler and Microsoft SharePoint 2013 Hybrid Deployment Guide
Citrix NetScaler and Microsoft SharePoint 2013 Hybrid Deployment Guide 2013 Deployment Guide Table of Contents Overview 3 SharePoint Hybrid Deployment Overview 3 Workflow 4 Step by Step Configuration on
PortWise Access Management Suite
Create secure virtual access for your employees, partners and customers from any location and any device. With todays global and homogenous economy, the accuracy and responsiveness of an organization s
Google Identity Services for work
INTRODUCING Google Identity Services for work One account. All of Google Enter your email Next Online safety made easy We all care about keeping our data safe and private. Google Identity brings a new
F5 and Microsoft Exchange Security Solutions
F5 PARTNERSHIP SOLUTION GUIDE F5 and Microsoft Exchange Security Solutions Deploying a service-oriented perimeter for Microsoft Exchange WHAT'S INSIDE Pre-Authentication Mobile Device Security Web Application
BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note
BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise
ADDING STRONGER AUTHENTICATION for VPN Access Control
ADDING STRONGER AUTHENTICATION for VPN Access Control Adding Stronger Authentication for VPN Access Control 1 ADDING STRONGER AUTHENTICATION for VPN Access Control A VIRTUAL PRIVATE NETWORK (VPN) allows
RSA Authentication Manager 7.1 Security Best Practices Guide. Version 2
RSA Authentication Manager 7.1 Security Best Practices Guide Version 2 Contact Information Go to the RSA corporate web site for regional Customer Support telephone and fax numbers: www.rsa.com. Trademarks
FIREWALL. Features SECURITY OF INFORMATION TECHNOLOGIES
FIREWALL Features SECURITY OF INFORMATION TECHNOLOGIES To ensure that they stay competitive and in order to expand their activity, businesses today know it is in their best interests to open up more channels
PortWise Access Management Suite
Create secure virtual access for your employees, partners and customers from any location and any device. With todays global and homogenous economy, the accuracy and responsiveness of an organization s
Security. TestOut Modules 12.6 12.10
Security TestOut Modules 12.6 12.10 Authentication Authentication is the process of submitting and checking credentials to validate or prove user identity. 1. Username 2. Credentials Password Smart card
MOBILITY & INTERCONNECTIVITY. Features SECURITY OF INFORMATION TECHNOLOGIES
MOBILITY & INTERCONNECTIVITY Features SECURITY OF INFORMATION TECHNOLOGIES Frequent changes to the structure of enterprise workforces mean that many are moving away from the traditional model of a single
MCTS Guide to Microsoft Windows 7. Chapter 7 Windows 7 Security Features
MCTS Guide to Microsoft Windows 7 Chapter 7 Windows 7 Security Features Objectives Describe Windows 7 Security Improvements Use the local security policy to secure Windows 7 Enable auditing to record security
Information Supplement: Requirement 6.6 Code Reviews and Application Firewalls Clarified
Standard: Data Security Standard (DSS) Requirement: 6.6 Date: February 2008 Information Supplement: Requirement 6.6 Code Reviews and Application Firewalls Clarified Release date: 2008-04-15 General PCI
Securing access to Citrix applications using Citrix Secure Gateway and SafeWord. PremierAccess. App Note. December 2001
Securing access to Citrix applications using Citrix Secure Gateway and SafeWord PremierAccess App Note December 2001 DISCLAIMER: This White Paper contains Secure Computing Corporation product performance
When your users take devices outside the corporate environment, these web security policies and defenses within your network no longer work.
Deployment Guide Revision C McAfee Web Protection Hybrid Introduction Web Protection provides the licenses and software for you to deploy Web Gateway, SaaS Web Protection, or a hybrid deployment using
Authentication in XenMobile 8.6 with a Focus on Client Certificate Authentication
Authentication in XenMobile 8.6 with a Focus on Client Certificate Authentication Authentication is about security and user experience and balancing the two goals. This document describes the authentication
STRONGER AUTHENTICATION for CA SiteMinder
STRONGER AUTHENTICATION for CA SiteMinder Adding Stronger Authentication for CA SiteMinder Access Control 1 STRONGER AUTHENTICATION for CA SiteMinder Access Control CA SITEMINDER provides a comprehensive
DeviceLock Virtual DLP: Overview & Scenarios
DeviceLock Virtual DLP: Overview & Scenarios DeviceLock Virtual DLP Overview DeviceLock s Virtual DLP feature extends the reach of DeviceLock data leak prevention capabilities to a variety of virtual computing
Integration Guide. SafeNet Authentication Client. Using SAC CBA for Check Point Security Gateway
SafeNet Authentication Client Integration Guide Technical Manual Template Release 1.0, PN: 000-000000-000, Rev. A, March 2013, Copyright 2013 SafeNet, Inc. All rights reserved. 1 Document Information Document
VeriSign PKI Client Government Edition v 1.5. VeriSign PKI Client Government. VeriSign PKI Client VeriSign, Inc. Government.
END USER S GUIDE VeriSign PKI Client Government Edition v 1.5 End User s Guide VeriSign PKI Client Government Version 1.5 Administrator s Guide VeriSign PKI Client VeriSign, Inc. Government Copyright 2010
White Paper. Anywhere, Any Device File Access with IT in Control. Enterprise File Serving 2.0
White Paper Enterprise File Serving 2.0 Anywhere, Any Device File Access with IT in Control Like it or not, cloud- based file sharing services have opened up a new world of mobile file access and collaborative
Secure SSL, Fast SSL
Citrix NetScaler and Thales nshield work together to protect encryption keys and accelerate SSL traffic With growing use of cloud-based, virtual, and multi-tenant services, customers want to utilize virtual
Deployment Guide for Citrix XenDesktop
Deployment Guide for Citrix XenDesktop Securing and Accelerating Citrix XenDesktop with Palo Alto Networks Next-Generation Firewall and Citrix NetScaler Joint Solution Table of Contents 1. Overview...
BlackBerry 10.3 Work and Personal Corporate
GOV.UK Guidance BlackBerry 10.3 Work and Personal Corporate Published Contents 1. Usage scenario 2. Summary of platform security 3. How the platform can best satisfy the security recommendations 4. Network
How To Protect A Web Application From Attack From A Trusted Environment
Standard: Version: Date: Requirement: Author: PCI Data Security Standard (PCI DSS) 1.2 October 2008 6.6 PCI Security Standards Council Information Supplement: Application Reviews and Web Application Firewalls
ADAPTIVE USER AUTHENTICATION
ADAPTIVE USER AUTHENTICATION SMS PASSCODE is the leading technology in adaptive multi-factor authentication, improving enterprise security and productivity through an easy to use and intelligent solution
1Y0-250 Implementing Citrix NetScaler 10 for App and Desktop Solutions Practice Exam
1Y0-250 Implementing Citrix NetScaler 10 for App and Desktop Solutions Practice Exam Section 1: Assessing infrastructure needs for the NetScaler implementation 1.1 Task Description: Verify the objectives
PCI COMPLIANCE ON AWS: HOW TREND MICRO CAN HELP
solution brief PCI COMPLIANCE ON AWS: HOW TREND MICRO CAN HELP AWS AND PCI DSS COMPLIANCE To ensure an end-to-end secure computing environment, Amazon Web Services (AWS) employs a shared security responsibility
IDENTITY & ACCESS. BYOD and Mobile Security Seizing Opportunities, Eliminating Risks in a Dynamic Landscape
IDENTITY & ACCESS BYOD and Mobile Security Seizing Opportunities, Eliminating Risks in a Dynamic Landscape Introduction How does your enterprise view the BYOD (Bring Your Own Device) trend opportunity
Remote Vendor Monitoring
` Remote Vendor Monitoring How to Record All Remote Access (via SSL VPN Gateway Sessions) An ObserveIT Whitepaper Daniel Petri March 2008 Copyright 2008 ObserveIT Ltd. 2 Table of Contents Executive Summary...
PCI Compliance for Branch Offices: Using Router-Based Security to Protect Cardholder Data
White Paper PCI Compliance for Branch Offices: Using Router-Based Security to Protect Cardholder Data Using credit cards to pay for goods and services is a common practice. Credit cards enable easy and
Active Directory Services with Windows Server
Course 10969B: Active Directory Services with Windows Server Page 1 of 8 Active Directory Services with Windows Server Course 10969B: 4 days; Instructor-Led Introduction Get Hands on instruction and practice
Single Sign On for ShareFile with NetScaler. Deployment Guide
Single Sign On for ShareFile with NetScaler Deployment Guide This deployment guide focuses on defining the process for enabling Single Sign On into Citrix ShareFile with Citrix NetScaler. Table of Contents
Using Entrust certificates with VPN
Entrust Managed Services PKI Using Entrust certificates with VPN Document issue: 1.0 Date of issue: May 2009 Copyright 2009 Entrust. All rights reserved. Entrust is a trademark or a registered trademark
Building Your Complete Remote Access Infrastructure on Windows Server 2012
Building Your Complete Remote Access nappliance White Paper August 2012 Introduction Remote access is a complex challenge for IT administrators. Providing system access to remote users involves a broad
Ensuring the security of your mobile business intelligence
IBM Software Business Analytics Cognos Business Intelligence Ensuring the security of your mobile business intelligence 2 Ensuring the security of your mobile business intelligence Contents 2 Executive
Securing Outlook Web Access (OWA) 2013 with NetScaler AppFirewall
Solution Guide Securing Outlook Web Access (OWA) 2013 with NetScaler AppFirewall Solution Guide This solution guide provides guidelines for securing Exchange 2013 Outlook Web Access (OWA) with NetScaler
Common Criteria Security Target For XenApp 6.0 for Windows Server 2008 R2 Platinum Edition
Common Criteria Security Target For XenApp 6.0 for Windows Server 2008 R2 Platinum Edition Version 1-0 7 February 2011 2011 Citrix Systems, Inc. All rights reserved. Summary of Amendments Version 1-0 7
Card Management System Integration Made Easy: Tools for Enrollment and Management of Certificates. September 2006
Card Management System Integration Made Easy: Tools for Enrollment and Management of Certificates September 2006 Copyright 2006 Entrust. All rights reserved. www.entrust.com Entrust is a registered trademark
Security Guide. BlackBerry Enterprise Service 12. for ios, Android, and Windows Phone. Version 12.0
Security Guide BlackBerry Enterprise Service 12 for ios, Android, and Windows Phone Version 12.0 Published: 2015-02-06 SWD-20150206130210406 Contents About this guide... 6 What is BES12?... 7 Key features
Desktop Virtualization Made Easy Execution Plan
Consulting Solutions WHITE PAPER Citrix XenDesktop Desktop Virtualization Made Easy Execution Plan A desktop virtualization architecture guide for small to medium environments www.citrix.com Trying to
App Orchestration 2.0
App Orchestration 2.0 Configuring NetScaler Load Balancing and NetScaler Gateway for App Orchestration Prepared by: Christian Paez Version: 1.0 Last Updated: December 13, 2013 2013 Citrix Systems, Inc.
DriveLock and Windows 8
Why alone is not enough CenterTools Software GmbH 2013 Copyright Information in this document, including URL and other Internet Web site references, is subject to change without notice. Unless otherwise
Windows 7, Enterprise Desktop Support Technician
Course 50331D: Windows 7, Enterprise Desktop Support Technician Page 1 of 11 Windows 7, Enterprise Desktop Support Technician Course 50331D: 4 days; Instructor-Led Introduction This four-day instructor-ledcourse
DigitalPersona Pro Enterprise
DigitalPersona Pro Enterprise Version 5.3 Frequently Asked Questions 2012 DigitalPersona, Inc. All Rights Reserved. All intellectual property rights in the DigitalPersona software, firmware, hardware and
Dell SonicWALL SRA 7.5 Citrix Access
Dell SonicWALL SRA 7.5 Citrix Access Document Scope This document describes how to configure and use Citrix bookmarks to access Citrix through Dell SonicWALL SRA 7.5. It also includes information about
BYOD Guidance: BlackBerry Secure Work Space
GOV.UK Guidance BYOD Guidance: BlackBerry Secure Work Space Published 17 February 2015 Contents 1. About this guidance 2. Summary of key risks 3. Secure Work Space components 4. Technical assessment 5.
Payment Card Industry and Citrix XenApp and XenDesktop Deployment Scenarios
Payment Card Industry and Citrix XenApp and XenDesktop Deployment Scenarios Overview Citrix XenApp, XenDesktop and NetScaler are commonly used in the creation of Payment Card Industry (PCI), Data Security
How to Secure a Groove Manager Web Site
How to Secure a Groove Manager Web Site Information in this document, including URL and other Internet Web site references, is subject to change without notice. Unless otherwise noted, the companies, organizations,
Common Criteria Security Target
Common Criteria Security Target for Citrix XenDesktop 5.6 Platinum edition Version 1-1 16 November 2012 2012 Citrix Systems, Inc. All rights reserved Summary of Amendments Version Date Notes 1-1 16 November
Windows 7, Enterprise Desktop Support Technician Course 50331: 5 days; Instructor-led
Lincoln Land Community College Capital City Training Center 130 West Mason Springfield, IL 62702 217-782-7436 www.llcc.edu/cctc Windows 7, Enterprise Desktop Support Technician Course 50331: 5 days; Instructor-led
End User Devices Security Guidance: Apple ios 8
GOV.UK Guidance End User Devices Security Guidance: Apple ios 8 Published Contents 1. Changes since previous guidance 2. Usage scenario 3. Summary of platform security 4. How the platform can best satisfy
icrosoft TMG Replacement with NetScaler
icrosoft TMG Replacement with NetScaler Replacing Microsoft Forefront TMG with NetScaler for secure VPN access Table of contents Introduction 3 Configuration details 3 NetScaler features to be enabled
Citrix XenApp-7.6 Administration Training. Course
Citrix XenApp-7.6 Administration Training Course Course Duration : 20 Working Days Class Duration : 3 hours per day Fast Track: - Course duration 10days (Per day 8 hours) Get Fee Details Module 1: Citrix
Citrix StoreFront 2.0
White Paper Citrix StoreFront 2.0 Citrix StoreFront 2.0 Proof of Concept Implementation Guide www.citrix.com Contents Contents... 2 Introduction... 3 Architecture... 4 Installation and Configuration...
Application Note. Intelligent Application Gateway with SA server using AD password and OTP
Application Note Intelligent Application Gateway with SA server using AD password and OTP ii Preface All information herein is either public information or is the property of and owned solely by Gemalto
Citrix Access on SonicWALL SSL VPN
Citrix Access on SonicWALL SSL VPN Document Scope This document describes how to configure and use Citrix bookmarks to access Citrix through SonicWALL SSL VPN 5.0. It also includes information about configuring
BYOD Guidance: Good Technology
GOV.UK Guidance BYOD Guidance: Good Technology Published 16 March 2015 Contents 1. About this guidance 2. Summary of key risks 3. Architectural components 4. Technical assessment 5. Other considerations
An Overview of Samsung KNOX Active Directory and Group Policy Features
C E N T R I F Y W H I T E P A P E R. N O V E M B E R 2013 An Overview of Samsung KNOX Active Directory and Group Policy Features Abstract Samsung KNOX is a set of business-focused enhancements to the Android
2003, Rainbow Technologies, Inc.
Expertise Corporate 25 Years of Security SMB to Fortune 30 Access Control 28 Million Hardware Keys 50% Token market share 6 Years of ikey Web Security 10 Years of SSL Secure > 50% of the Data NetSwift
Security IIS Service Lesson 6
Security IIS Service Lesson 6 Skills Matrix Technology Skill Objective Domain Objective # Configuring Certificates Configure SSL security 3.6 Assigning Standard and Special NTFS Permissions Enabling and
Infor CloudSuite. Defense-in-depth. Table of Contents. Technical Paper Plain talk about Infor CloudSuite security
Technical Paper Plain talk about security When it comes to Cloud deployment, security is top of mind for all concerned. The Infor CloudSuite team uses best-practice protocols and a thorough, continuous
NERC CIP Whitepaper How Endian Solutions Can Help With Compliance
NERC CIP Whitepaper How Endian Solutions Can Help With Compliance Introduction Critical infrastructure is the backbone of any nations fundamental economic and societal well being. Like any business, in
FileCloud Security FAQ
is currently used by many large organizations including banks, health care organizations, educational institutions and government agencies. Thousands of organizations rely on File- Cloud for their file
Security Considerations for DirectAccess Deployments. Whitepaper
Security Considerations for DirectAccess Deployments Whitepaper February 2015 This white paper discusses security planning for DirectAccess deployment. Introduction DirectAccess represents a paradigm shift
THE BLUENOSE SECURITY FRAMEWORK
THE BLUENOSE SECURITY FRAMEWORK Bluenose Analytics, Inc. All rights reserved TABLE OF CONTENTS Bluenose Analytics, Inc. Security Whitepaper ISO 27001/27002 / 1 The Four Pillars of Our Security Program
Ensuring Enterprise Data Security with Secure Mobile File Sharing.
A c c e l l i o n S e c u r i t y O v e r v i e w Ensuring Enterprise Data Security with Secure Mobile File Sharing. Accellion, Inc. Tel +1 650 485-4300 1804 Embarcadero Road Fax +1 650 485-4308 Suite
Security Overview Enterprise-Class Secure Mobile File Sharing
Security Overview Enterprise-Class Secure Mobile File Sharing Accellion, Inc. 1 Overview 3 End to End Security 4 File Sharing Security Features 5 Storage 7 Encryption 8 Audit Trail 9 Accellion Public Cloud
CONTENTS. PCI DSS Compliance Guide
CONTENTS PCI DSS COMPLIANCE FOR YOUR WEBSITE BUILD AND MAINTAIN A SECURE NETWORK AND SYSTEMS Requirement 1: Install and maintain a firewall configuration to protect cardholder data Requirement 2: Do not
CXA 204 1I Basic Administration for Citrix XenApp 6
COURSE DESCRIPTION CXA 204 1I Basic Administration for Citrix XenApp 6 Basic Administration for Citrix XenApp 6 training course provides the foundation necessary for administrators to effectively centralize
"Charting the Course... ... to Your Success!" MOC 50331 D Windows 7 Enterprise Desktop Support Technician Course Summary
Description Course Summary This course provides students with the knowledge and skills needed to isolate, document and resolve problems on a Windows 7 desktop or laptop computer. It will also help test
Nuclear Regulatory Commission Computer Security Office Computer Security Standard
Nuclear Regulatory Commission Computer Security Office Computer Security Standard Office Instruction: Office Instruction Title: CSO-STD-2105 Remote Access Security Standard Revision Number: 1.0 Effective
