Securing virtual desktop infrastructure with Citrix NetScaler
|
|
|
- Rose Fields
- 10 years ago
- Views:
Transcription
1 Securing virtual desktop infrastructure with Citrix NetScaler
2 2 Today s enterprises are rapidly adopting desktop virtualization as a means to reduce operating costs, enable workplace flexibility, increase business agility and bolster their information security and compliance posture. Actually realizing these benefits, however, depends upon ensuring the security and availability of the virtual desktop infrastructure. This paper explains why Citrix NetScaler is ideally suited to these tasks. By integrating an extensive set of network and application-layer protection mechanisms, advanced access and action control capabilities and a wealth of additional service delivery features, NetScaler not only preserves the benefits promised by virtual desktops, it maximizes them. The security situation with desktop virtualization Migrating to virtual desktop technologies and techniques from traditional desktop deployment and management approaches is a top initiative for enterprises of all types and sizes worldwide. Indeed, Gartner expects adoption of hosted virtual desktops alone to reach 70 million users by Driving this growth is a compelling set of benefits. With a full-featured desktop virtualization solution enterprises can substantially and sustainably reduce desktop ownership and operating costs, enable complete workplace flexibility and increase business agility by providing rapid support for strategic initiatives such as mergers and acquisitions, geographic expansion and dynamic partnership arrangements. Another major advantage of desktop virtualization is a significantly strengthened information security and compliance posture. This benefit derives primarily from the ability to centralize all data and applications in the corporate datacenter. Because users view and manipulate their desktops remotely, there is no need for potentially sensitive material to be distributed to the local device. Security is also enhanced because centralization of desktop applications and operating systems increases IT administrators control over these crucial resources. Centralized control not only makes it easier to pursue standardization that reduces complexity, cost and an organization s attack surface, but also boosts the ease, speed and thoroughness with which updates and security patches can be implemented. Another advantage of a centralized model is that granting and revoking access rights and privileges can be accomplished quickly and efficiently. Moreover, there s no dependence on having users return distributed devices, software or data because, with desktop virtualization, there aren t any.
3 3 No free lunch Desktop virtualization clearly has a lot to offer today s enterprises. However, fully realizing its benefits is not a given. To preserve potential gains, organizations must, among other tasks, ensure the security of their desktop virtualization implementations. This may sound a bit circular organizations must invest in one set of security measures to effectively gain the benefits of a second set but that s exactly the point in this case. Robust security capabilities are required for several reasons: Remote access. With mobility and telecommuting initiatives on the rise, a substantial percentage of users are likely to require access to their desktops from a remote location, and often over an insecure public network. Device proliferation. Consumerization has sparked the need to support a rapidly expanding variety of client devices with widely varying security characteristics and profiles. This is further complicated by the fact that most of these devices are no longer owned or controlled by the enterprise. The crucial point, in any case, is that even though desktop virtualization can eliminate local retention of sensitive data, a compromised client device still poses a threat. Sensitive data can still be viewed and the rights attributed to the user/device can be exploited to launch a far more damaging attack. Extent of access. With desktop virtualization users have access to an entire desktop. In addition to their immediate applications and data they can also get to all of the downstream resources their desktops are entitled to access. This elevates the importance of security in general, and access control in particular. Concentration of resources. The importance of robust defenses is also elevated because desktop virtualization involves putting many of an organization s eggs in a single basket. In contrast to the conventional, distributed model of desktop computing, a single successful attack now has the potential to impact a substantial number of users and desktop systems. There is also the big picture to consider. Today s hackers are highly organized and motivated to do damage and make off with valuable data. As a result, robust defenses are generally required, if for no other reason than to provide protection from an increasingly sophisticated and hostile threat landscape.
4 4 How Citrix NetScaler helps An advanced solution for delivering apps and cloud and enterprise services, NetScaler provides an extensive set of capabilities that make it an ideal choice for front-ending an organization s desktop virtualization infrastructure. Particularly relevant in this context are the numerous security mechanisms and features that NetScaler delivers to help protect virtual desktop infrastructure. These are grouped into three distinct categories. Client Citrix NetScaler Secure Access Application Security High-availability Virtual Desktop Infrastructure Network-layer protection NetScaler provides core, network-layer protection for virtual desktop infrastructure (VDI) in several ways. To begin with, administrators can use NetScaler to enforce a basic level of access control using straightforward, layer 3 and 4 access control lists (ACLs) to selectively permit legal traffic while blocking traffic that is deemed unsafe. In addition, a couple of key design features automatically protect any infrastructure NetScaler is used to front-end. For example, NetScaler incorporates a highperformance, standards-compliant TCP/IP stack that has been enhanced to: Citrix NetScaler in a nutshell NetScaler is an enterprise-class solution that makes apps and services run five times better with a powerful combination of networkbased application acceleration, server offload, high availability and application security. Market proven, NetScaler is used by the world s largest websites, with an estimated 75 percent of Internet users accessing a site delivered by NetScaler on any given day. In addition, thousands of enterprises rely upon NetScaler for their public-facing web, intranet and virtual desktop delivery needs. automatically drop traffic that is malformed and could pose a threat to the entire virtual desktop infrastructure prevent disclosure of low-level connection information (e.g., IP addresses, server port numbers) that could prove useful to hackers intent on perpetrating an attack automatically thwart many types of denial of service (DoS) attacks that exploit gaps in common protocols Application-layer protection Moving up the computing stack, another significant NetScaler design feature is its proxy architecture. Coupled with HTTP/URL re-write and L7 content filtering capabilities, this allows NetScaler to: shield connection brokers and other downstream VDI components from direct TCP and UDP connections initiated from external users, thereby reducing their exposure to malware and other types of attacks provide cloaking and content security for these same components to effectively hide server error codes, real URLs and other pieces of information that could give hackers the details they need to formulate custom attacksautomatically thwart many types of denial of service (DoS) attacks that exploit gaps in common protocols
5 5 Many VDI implementations contain web-based components that also need robust protection against attacks. The integrated NetScaler App Firewall protects against application-layer attacks, such as SQL injection, cross-site scripting and buffer overflow threats. NetScaler App Firewall provides: a flexible, hybrid-security model that protects against known vulnerabilities using an updated attack-signature database and a positive security model to defeat zero-day attacks for which signatures do not yet exist easy-to-configure security policies and templates for simple and fast deployment and management full integration with NetScaler so that security and VDI availability can be managed via a common policy and console Greater application-layer protection is also derived from enhanced support for 2048-bit SSL encryption keys. Consistent with guidance from NIST Special Publication , key lengths for certificates supporting public key cryptography an underlying component of SSL are now routinely 2048 bits (versus the previously accepted 1024-bit standard). This doubling of the standard key size represents an exponential increase in the number of CPU cycles required to process SSL transactions on average, five times more. To ease the migration to 2048-bit SSL certificates, NetScaler boosts SSL performance with advanced acceleration capabilities to keep organizations from having to sacrifice security in order to maintain performance SLAs. Advanced access and action control An integral component of the product, NetScaler Access Gateway is a fullfeatured SSL VPN that gives administrators granular, application-level control while empowering users with remote access to their virtual desktops from anywhere. With Access Gateway, IT administrators can manage access control and limit actions within sessions based on both user identity and the endpoint device. The result is better application security, data protection and compliance management without the need to deploy another device. The first two ways that Access Gateway supports remote access to virtual desktops are by providing an encrypted tunnel and supporting a wide range of methods for user authentication. Desktop sessions traversing public networks are protected from eavesdropping while the enterprise remains able to leverage its existing directory and identity management infrastructure.
6 6 Next up is granular and adaptive access control. With Access Gateway, administrators can tightly control access to virtual desktops using policies comprised of both fixed and dynamic attributes, including user identity and role, strength of authentication, location, time of day, and identity and security status of the client device. Supporting this capability is another important security feature: endpoint analysis. Integrated endpoint scanning can be used to continually monitor client devices to determine if client security software such as antivirus, personal firewall or other mandatory programs are active and up-to-date. Devices that fail these checks can effectively be denied access, granted limited access or quarantined by restricting their access to sites that provide the tools necessary to restore them to a compliant configuration. Advanced action and data control capabilities provide yet another crucial layer of protection, particularly given the proliferation of client devices and growing tendency toward user ownership and self-management. Related features include: enhanced split tunneling control, where users can access their desktop and the client s local subnet but are prevented from directly accessing the Internet adaptive action control, where local printing, copy, paste and save-to-disk functionality can be restricted via adaptive policies browser cache cleanup, where objects and data stored on the local browser are removed upon completion of the virtual desktop session Rounding out the portfolio of protection features are the extensive logging, auditing and reporting capabilities provided by the NetScaler central management console, Citrix Command Center. These are invaluable not only for troubleshooting purposes, but also to uncover misuse and other telltale activities that might be indicative of a compromised client or virtual desktop, or a broader-based attack against the organization s virtual desktop environment. Additional considerations Network security is only one piece of a complete security strategy for VDI albeit a critically important one. It is also just one aspect of what NetScaler has to offer. Beyond NetScaler As powerful as NetScaler features for protecting virtual desktops are, they address only one dimension of a comprehensive security strategy for VDI. Besides network security, enterprises should consider the need for: Client security. Despite desktop virtualization s centralized operating model, a compromised client device still poses a threat. NetScaler endpoint analysis, action control, and data cleanup features definitely go a long way in this regard. Under certain high-risk access scenarios; however, it may also be necessary to implement a comprehensive suite of endpoint security software.
7 7 Virtual system security. This involves maintaining good virtual machine hygiene (e.g., ensuring virtual desktops use the latest, fully patched versions for embedded apps and operating systems, and retiring VMs that are no longer in use). It also entails providing network isolation for all VDI components and potentially implementing encryption for associated storage volumes given the concentration of resources involved. Virtual desktop security. VDI effectively brings user devices, with their highrisk behavior of connecting to networks and computers with varied trust levels, directly into the heart of the enterprise datacenter. Consequently, it is imperative to consider VM- and/or hypervisor-level implementation of anti-virus/antimalware agents, activity monitoring and threat prevention software. It might also make sense to provide different classes of users with different virtual desktop configurations and to subsequently segregate virtual desktop VMs according to their relative trust level. Beyond security By itself, adequately securing virtual desktop infrastructure is not sufficient to fully preserve the benefits of desktop virtualization. Enterprises also need to ensure the availability, performance and scalability of whatever solution they decide to implement. After all, what good is a highly secured virtual desktop environment if it s not consistently available? Or if performance is so poor that users perceive it to be unavailable, even when it isn t? This is where NetScaler truly excels as a front-end solution for an organization s desktop virtualization infrastructure. In addition to its compelling set of network security features, NetScaler delivers: a combination of enterprise-class server load balancing, global server load balancing and health monitoring, capabilities to ensure virtual desktop availability and business continuity an extensive collection of mechanisms that not only enhance virtual desktop performance over the network but also streamline the user experience intelligent load distribution and server offload capabilities that enable seamless scalability of virtual desktop infrastructure Conclusion Available as a high-performance hardware appliance or a flexible, software-based virtual appliance, NetScaler can be easily and cost-effectively deployed as a front end to today s virtual desktop solutions. By delivering a robust set of network-layer security, application-layer security and advanced access and data control capabilities, NetScaler not only preserves but extends the benefits organizations have come to expect when embracing desktop virtualization. More than just a security solution, NetScaler also helps IT managers substantially improve the availability, performance and scalability of their virtual desktop implementations. 1 Forecast: Hosted Virtual Desktops, Worldwide, , Gartner, November 2010.
8 8 Corporate Headquarters Fort Lauderdale, FL, USA Silicon Valley Headquarters Santa Clara, CA, USA EMEA Headquarters Schaffhausen, Switzerland India Development Center Bangalore, India Online Division Headquarters Santa Barbara, CA, USA Pacific Headquarters Hong Kong, China Latin America Headquarters Coral Gables, FL, USA UK Development Center Chalfont, United Kingdom About Citrix Citrix Systems, Inc. (NASDAQ:CTXS) is the company transforming how people, businesses and IT work and collaborate in the cloud era. With market-leading cloud, collaboration, networking and virtualization technologies, Citrix powers mobile workstyles and cloud services, making complex enterprise IT simpler and more accessible for 250,000 enterprises. Citrix touches 75 percent of Internet users each day and partners with more than 10,000 companies in 100 countries. Annual revenue in 2011 was $2.21 billion. Learn more at Citrix Systems, Inc. All rights reserved. Citrix, NetScaler, NetScaler App Firewall and NetScaler Access Gateway are trademarks or registered trademarks of Citrix Systems, Inc. and/or one or more of its subsidiaries, and may be registered in the United States Patent and Trademark Office and in other countries. All other trademarks and registered trademarks are property of their respective owners. 0412/PDF
Securing virtual desktop infrastructure with Citrix NetScaler
Securing virtual desktop infrastructure with Citrix NetScaler 2 Today s enterprises are rapidly adopting desktop virtualization as a means to reduce operating costs, enable workplace flexibility, increase
Secure virtual desktop infrastructure with Citrix NetScaler and Palo Alto Networks next-generation firewalls
Virtual desktop infrastructure Secure virtual desktop infrastructure with Citrix NetScaler and Palo Alto Networks next-generation firewalls 2 Today s enterprises are rapidly adopting desktop virtualization
Citrix desktop virtualization and Microsoft System Center 2012: better together
Citrix desktop virtualization and Microsoft System Center 2012: better together 2 Delivery of applications and data to users is an integral part of IT services today. But delivery can t happen without
NetScaler: A comprehensive replacement for Microsoft Forefront Threat Management Gateway
NetScaler: A comprehensive replacement for Microsoft Forefront Threat Management Gateway 2 Microsoft s Forefront Threat Management Gateway (TMG) is a network security and protection solution for enterprise
Cisco and Citrix: Building Application Centric, ADC-enabled Data Centers
Solutions Brief : Building Application Centric, ADC-enabled Data Centers Cisco Application Centric Infrastructure (ACI) integrates Citrix NetScaler Application Delivery Controller (ADC) appliances to reduce
Desktop virtualization for all
Desktop virtualization for all 2 Desktop virtualization for all Today s organizations encompass a diverse range of users, from road warriors using laptops and mobile devices as well as power users working
The falling cost and rising value of desktop virtualization
The falling cost and rising value of desktop virtualization 2 The growing strategic value of desktop virtualization, from a more flexible, productive workforce to lower real estate costs, has made it a
Desktop virtualization for all
Desktop virtualization for all 2 Desktop virtualization for all Today s organizations encompass a diverse range of users, from road warriors using laptops and mobile devices as well as power users working
Cisco and Citrix: Building Application Centric, ADC-enabled Data Centers
: Building Application Centric, ADC-enabled Data Centers Cisco Application Centric Infrastructure (ACI) integrates Citrix NetScaler Application Delivery Controller (ADC) appliances to reduce deployment
Microsoft SharePoint 2013 with Citrix NetScaler
Deployment Guide Microsoft SharePoint 2013 with Citrix NetScaler Deployment Guide citrix.com Table of contents Introduction 3 NetScaler value-add to SharePoint 4 Product versions and prerequisites 4 Deploying
Optimizing with Citrix NetScaler. Three keys to building the best front-end network for virtual desktop delivery. www.citrix.com
Optimizing with Citrix NetScaler White Paper Three keys to building the best front-end network for virtual desktop delivery www.citrix.com Executive summary Motivated by the compelling benefits virtual
Citrix NetScaler and Microsoft SharePoint 2013 Hybrid Deployment Guide
Citrix NetScaler and Microsoft SharePoint 2013 Hybrid Deployment Guide 2013 Deployment Guide Table of Contents Overview 3 SharePoint Hybrid Deployment Overview 3 Workflow 4 Step by Step Configuration on
Provisioning ShareFile on Microsoft Azure Storage
ShareFile StorageZones Provisioning ShareFile on Microsoft Azure Storage This document provides a technical overview of how ShareFile can be provisioned on customermanaged, Microsoft Azure cloud storage
Deploying NetScaler Gateway in ICA Proxy Mode
Deploying NetScaler Gateway in ICA Proxy Mode Deployment Guide This deployment guide defines the configuration required for using the NetScaler Gateway in ICA Proxy Mode. Table of Contents Introduction
White Paper. Protecting Mobile Apps with Citrix XenMobile and MDX. citrix.com
Protecting Mobile Apps with Citrix XenMobile and MDX citrix.com Mobility is a top priority for organizations as more employees demand access to the apps and data that will make them productive. Employees
Microsoft Dynamics CRM 2015 with NetScaler for Global Server Load Balancing
Microsoft Dynamics CRM 2015 with NetScaler for Global Server Load Balancing Solution Guide This solution guide focuses on defining the deployment process for Microsoft Dynamics CRM with Citrix NetScaler.
Guide to Deploying Microsoft Exchange 2013 with Citrix NetScaler
Deployment Guide Guide to Deploying Microsoft Exchange 2013 with Citrix NetScaler Extensive guide covering details of NetScaler ADC deployment with Microsoft Exchange 2013. Table of Contents Introduction
Windows XP Application Migration Checklist
Windows XP Application Migration Checklist Accelerate XP migration planning 2 Whether just beginning a Microsoft Windows XP application migration project or moving forward on an existing project, it s
Data Center Consolidation for Federal Government
Data Center Consolidation for Federal Government Virtual computing transforms IT environments so agencies can cut costs, bolster efficiency and agility, and improve user productivity In a slow economy,
Configuring Citrix NetScaler for IBM WebSphere Application Services
White Paper Configuring Citrix NetScaler for IBM WebSphere Application Services A deployment guide for configuring NetScaler load balancing and content switching When deploying IBM WebSphere Application
Trend Micro InterScan Web Security and Citrix NetScaler SDX Platform Overview
Trend Micro InterScan Web Security and Citrix NetScaler SDX Platform Overview 2 Trend Micro and Citrix have a long history of partnership based upon integration between InterScan Web Security and Citrix
Solutions Guide. Deploying Citrix NetScaler for Global Server Load Balancing of Microsoft Lync 2013. citrix.com
Solutions Guide Deploying Citrix NetScaler for Global Server Load Balancing of Microsoft Lync 2013 Table of Contents Introduction 3 Overview of Microsoft Lync 2013 3 Why NetScaler GSLB Solution for Lync
Secure remote access
Secure remote access Technical Solutions Brief Secure remote access Simple, secure access to apps and desktops from anywhere. Secure remote access Technical Solutions Brief 2 Today s fast-paced business
Advanced Service Desk Security
Advanced Service Desk Security Robust end-to-end security measures have been built into the GoToAssist Service Desk architecture to ensure the privacy and integrity of all data. gotoassist.com Many service
Deliver the Next Generation Intelligent Datacenter Fabric with the Cisco Nexus 1000V, Citrix NetScaler Application Delivery Controller and Cisco vpath
Citrix NetScaler for Cisco Nexus 1000v White Paper Deliver the Next Generation Intelligent Datacenter Fabric with the Cisco Nexus 1000V, Citrix NetScaler Application Delivery Controller and Cisco vpath
The Office Reinvented: Mobile Workspaces are the Future of Work
The Office Reinvented: Mobile Workspaces are the Future of Work How Citrix, Google and Samsung enable secure business mobility. Business mobility empowers people with a convenient and complete work experience
icrosoft TMG Replacement with NetScaler
icrosoft TMG Replacement with NetScaler Replacing Microsoft Forefront TMG with NetScaler for secure VPN access Table of contents Introduction 3 Configuration details 3 NetScaler features to be enabled
Secure SSL, Fast SSL
Citrix NetScaler and Thales nshield work together to protect encryption keys and accelerate SSL traffic With growing use of cloud-based, virtual, and multi-tenant services, customers want to utilize virtual
Trend Micro Cloud Security for Citrix CloudPlatform
Trend Micro Cloud Security for Citrix CloudPlatform Proven Security Solutions for Public, Private and Hybrid Clouds 2 Trend Micro Provides Security for Citrix CloudPlatform Organizations today are embracing
Mobility and cloud transform access and delivery of apps, desktops and data
Mobility and cloud transform access and delivery of apps, desktops and data Unified app stores and delivery of all apps (Windows, web, SaaS and mobile) and data to any device, anywhere. 2 The cloud transforms
Securing Outlook Web Access (OWA) 2013 with NetScaler AppFirewall
Solution Guide Securing Outlook Web Access (OWA) 2013 with NetScaler AppFirewall Solution Guide This solution guide provides guidelines for securing Exchange 2013 Outlook Web Access (OWA) with NetScaler
RSA Adaptive Authentication and Citrix NetScaler SDX Platform Overview
RSA Adaptive Authentication and Citrix NetScaler SDX Platform Overview 2 RSA and Citrix have a long history of partnership based upon integration between RSA Adaptive Authentication and Citrix NetScaler
Top Three Reasons to Deliver Web Apps with App Virtualization
Top Three Reasons to Deliver Web Apps with App Virtualization Improve manageability, security and performance for browser-based apps. Web browsers can cause many of the same headaches as any other Windows
Taking Windows Mobile on Any Device
Taking Windows Mobile on Any Device As the adoption of mobile devices continues to expand, IT organizations are challenged to keep up with the mobile demands of today s fast-paced workforce and at the
Websense Data Security Gateway and Citrix NetScaler SDX Platform Overview
Websense Data Security Gateway and Citrix NetScaler SDX Platform Overview 2 The next generation of SDX platform provides the foundation for further integration. Today, Citrix NetScaler SDX appliances enable
Enterprise- Grade MDM
Enterprise- Grade MDM This brief describes a foundational strategic feature of the Citrix enterprise mobility offering, enterprise-grade MDM. 2 While the transition of mobile phones into computers has
How To Use Netscaler As An Afs Proxy
Deployment Guide Guide to Deploying NetScaler as an Active Directory Federation Services Proxy Enabling seamless authentication for Office 365 use cases Table of Contents Introduction 3 ADFS proxy deployment
Citrix ShareFile Enterprise: a technical overview citrix.com
Citrix ShareFile Enterprise: a technical overview White Paper Citrix ShareFile Enterprise: a technical overview 2 The role of IT organizations is changing rapidly as the forces of consumerization pose
Citrix XenServer Industry-leading open source platform for cost-effective cloud, server and desktop virtualization. citrix.com
Citrix XenServer Industry-leading open source platform for cost-effective cloud, server and desktop virtualization. 2 While the core server virtualization market has matured, virtualization itself is seeing
Solve the application visibility challenge with NetScaler Insight Center
Citrix NetScaler Solve the application visibility challenge with NetScaler Insight Center 2 Executive Summary The ability to observe, diagnose, and subsequently improve the performance of business-critical
The top 5 truths behind what the cloud is not
Citrix Cloud Solutions White Paper The top 5 truths behind what the cloud is not Separating the noise of what cloud is and what it s not 2 It s clear that the cloud represents the biggest technology disruption
SolidFire SF3010 All-SSD storage system with Citrix CloudPlatform 3.0.5 Reference Architecture
SolidFire SF3010 All-SSD storage system with Citrix CloudPlatform 3.0.5 Reference Architecture 2 This reference architecture is a guideline for deploying Citrix CloudPlatform, powered by Apache CloudStack,
Citrix Lifecycle Management
Citrix Lifecycle Management Comprehensive cloud-based service lifecycle management solution IT administrators are realizing that application deployments are getting more complex and error-prone than ever
Secure Data Sharing in the Enterprise
Secure Data Sharing in the Enterprise 2 Follow-me data and productivity for users with security and manageability for IT Productivity today depends on the ability of workers to access and share their data
Enabling mobile workstyles with an end-to-end enterprise mobility management solution.
Mobile workstyles White Paper Enabling mobile workstyles with an end-to-end enterprise mobility management solution. 2 The evolution of mobile workstyles has made it increasingly important for professionals
White Paper. Optimizing the video experience for XenApp and XenDesktop deployments with CloudBridge. citrix.com
Optimizing the video experience for XenApp and XenDesktop deployments with CloudBridge Video content usage within the enterprise is growing significantly. In fact, Gartner forecasted that by 2016, large
Solutions Guide. Deploying Citrix NetScaler with Microsoft Exchange 2013 for GSLB. citrix.com
Deploying Citrix NetScaler with Microsoft Exchange 2013 for GSLB Table of Contents Introduction 3 Overview of Microsoft Exchange 2013 3 Why NetScaler GSLB for Exchange 2013? 3 Topology 3 Single Namespace
Citrix XenClient. Extending the benefits of desktop virtualization to mobile laptop users. www.citrix.com
Citrix XenClient White Paper Citrix XenClient Extending the benefits of desktop virtualization to mobile laptop users www.citrix.com Executive summary Desktop virtualization is attractive to organizations
Maximizing Flexibility and Productivity for Mobile MacBook Users
Citrix DesktopPlayer for Mac White Paper Maximizing Flexibility and Productivity for Mobile MacBook Users Windows virtual desktops to go for corporate and BYO Macs 2 Executive Overview The popularity of
Design and deliver cloudbased apps and data for flexible, on-demand IT
Design and deliver cloudbased apps and data for flexible, on-demand IT Discover the fastest and easiest way for IT to enable business productivity using cloud-based management and delivery of complete
BlueCat Networks Adonis and Proteus on Citrix NetScaler SDX Platform Overview
BlueCat Networks Adonis and Proteus on Citrix NetScaler SDX Platform Overview 2 The BlueCat Networks and Citrix partnership is based upon integration between BlueCat Networks DNS, DHCP and IP Address Management
NetScaler carriergrade network
White Paper NetScaler carriergrade network address translation Preserve IPv4 network investments, consolidate application delivery control in one platform and lower capex and opex Protect your investment
Optimizing service assurance for XenServer virtual infrastructures with Xangati
Solutions Brief Optimizing service assurance for XenServer virtual infrastructures with Xangati As IT organizations adopt application, desktop and server virtualization solutions as the primary method
How To Get Cloud Services To Work For You
Product Overview Citrix CloudPortal Business Manager Unified cloud services delivery and business management platform Enterprises and cloud providers have focused most of their initial cloud strategies
Deploying XenApp on a Microsoft Azure cloud
Deploying XenApp on a Microsoft Azure cloud The scalability and economics of XenApp services on-demand citrix.com Given business dynamics seasonal peaks, mergers, acquisitions, and changing business priorities
Fullerton India enhances its employee productivity and efficiency with Citrix XenDesktop
Fullerton India enhances its employee productivity and efficiency with Citrix XenDesktop 2 As a result of implementing Citrix XenDesktop, the number of our help desk tickets has fallen significantly. The
Citrix Ready Solutions Brief. CA Single Sign-On and Citrix NetScaler: Quickly Adapt to Your Dynamic Authentication Demands. citrix.
CA Single Sign-On and Citrix NetScaler: Quickly Adapt to Your Dynamic Authentication Demands citrix.com/ready CA Technologies and Citrix have partnered to integrate their complementary, industry-leading
BlueCat IPAM, DNS and DHCP Solutions on Citrix NetScaler SDX Platform Overview
BlueCat IPAM, DNS and DHCP Solutions on Citrix NetScaler SDX Platform Overview 2 The BlueCat and Citrix partnership is based upon integration between BlueCat s DNS, DHCP and IP Address Management (IPAM)
Features of a comprehensive application security solution
WHITE PAPER Citrix NetScaler Features of a comprehensive application security solution The comprehensive security features of Citrix NetScaler protect against DoS/DDoS, deliver intrusion filtering capabilities
White Paper. Optimizing your Microsoft application and infrastructure investments with Citrix CloudBridge. citrix.com
White Paper Optimizing your Microsoft application and infrastructure investments with Citrix CloudBridge Businesses of all types and sizes worldwide rely on a variety of Microsoft solutions, from key productivity
AppFlow: next-generation application performance monitoring. www.citrix.com
AppFlow White Paper AppFlow: next-generation application performance monitoring www.citrix.com Introduction: monitoring application performance has become more complex In today s always-on and connected
Mobilize Email with Enterprise-Grade Security and a Great Experience
White Paper Mobilize Email with Enterprise-Grade Security and a Great Experience Data protection for your business. Flexibility for IT. Seamless productivity for your workforce. People need to be able
Solution Brief. Deliver Production Grade OpenStack LBaaS with Citrix NetScaler. citrix.com
Solution Brief Deliver Production Grade OpenStack LBaaS with Citrix NetScaler Enterprises are increasingly turning to private cloud architectures for increased agility and greater operational efficiency
Deploying NetScaler with Microsoft Exchange 2016
Deployment Guide Deploying NetScaler with Microsoft Exchange 2016 Deployment Guide Load balancing Microsoft Exchange 2016 with NetScaler Table of Contents Introduction 3 Configuration 5 NetScaler features
White paper. Microsoft and Citrix VDI: Virtual desktop implementation scenarios
White paper Microsoft and Citrix VDI: Virtual desktop implementation scenarios Table of contents Objective Microsoft VDI offering components High definition user experience...3 A very cost-effective and
Does your Citrix or Terminal Server environment have an Achilles heel?
CRYPTZONE WHITE PAPER Does your Citrix or Terminal Server environment have an Achilles heel? Moving away from IP-centric to role-based access controls to secure Citrix and Terminal Server user access cryptzone.com
Deploying XenApp 7.5 on Microsoft Azure cloud
Deploying XenApp 7.5 on Microsoft Azure cloud The scalability and economics of delivering Citrix XenApp services Given business dynamics seasonal peaks, mergers, acquisitions, and changing business priorities
The fastest, most secure path to mobile employee productivity
The fastest, most secure path to mobile employee productivity 2 If your organization lacks a bring-your-own-device (BYOD) strategy, you may be in danger of losing employees who are unhappy because they
Deliver Enterprise Mobility with Citrix XenMobile and Citrix NetScaler
Deliver Enterprise Mobility with Citrix XenMobile and Citrix NetScaler 2 Introduction Mobility and the consumerization of IT pose key challenges for IT around scalability, security and application visibility.
Powering Real-Time Mobile Access to Critical Information With Citrix ShareFile
Powering Real-Time Mobile Access to Critical Information With Citrix ShareFile An enterprise file sync and sharing solution built for the needs of the energy, oil and gas industry to provide employee and
White paper. Keys to SAP application acceleration: advances in delivery systems.
White paper Keys to SAP application acceleration: advances in delivery systems. Table of contents The challenges of fast SAP application delivery...3 Solving the acceleration challenge: why traditional
Modernize your business with Citrix XenApp 7.6
Modernize your business with Citrix XenApp 7.6 Avoid non-compliance issues and keep your business running smoothly by upgrading your SAP environment to run on top of the latest Citrix and Microsoft technologies
White Paper. SDN 101: An Introduction to Software Defined Networking. citrix.com
SDN 101: An Introduction to Software Defined Networking citrix.com Over the last year, the hottest topics in networking have been software defined networking (SDN) and Network ization (NV). There is, however,
Bring your own device freedom
Bring your own device freedom BYOD solutions for federal government enterprises The Digital Government Strategy, issued by Federal Chief Information Officer (CIO) Steven VanRoekel on May 23, 2012, called
Single Sign On for ShareFile with NetScaler. Deployment Guide
Single Sign On for ShareFile with NetScaler Deployment Guide This deployment guide focuses on defining the process for enabling Single Sign On into Citrix ShareFile with Citrix NetScaler. Table of Contents
Build a cloud network leveraging best-in-class security and application delivery
Build a cloud network leveraging best-in-class security and application delivery 2 Introduction With the proliferation of enterprise applications, consumer applications and cloudbased services, IT managers
Citrix ShareFile Enterprise technical overview
Citrix ShareFile Enterprise technical overview 2 The role of IT organizations is changing rapidly as the forces of consumerization pose new challenges. IT is transitioning from the sole provider of user
Citrix OpenCloud Access. Accelerate cloud computing adoption and simplify identity management. www.citrix.com
Citrix OpenCloud Access White Paper Citrix OpenCloud Access Accelerate cloud computing adoption and simplify identity management www.citrix.com Executive summary Cloud-hosted application delivery models
Citrix XenDesktop with FlexCast technology. Citrix XenDesktop: Desktop Virtualization For All. www.citrix.com
Citrix XenDesktop with FlexCast technology White Paper Citrix XenDesktop: Desktop Virtualization For All www.citrix.com Today s organizations encompass a diverse range of users, from road warriors using
Secure remote access
Simple, secure access to apps and desktops from anywhere Today s fast-paced business world requires IT organizations to supply tools that allow employees to quickly react to the demands of a competitive
Building success in the cloud
Building success in the cloud Citrix customers are recognized in the Gartner Magic Quadrant for Public Cloud Infrastructure-as-a-Service. 2 Cloud computing is the biggest technology disruption in decades
Using Vasco IDENTIKEY Server with NetScaler
Using Vasco IDENTIKEY Server with NetScaler Deployment Guide This deployment guide describes the process for deploying Vasco IDENTIKEY server with NetScaler to enable secure authentication for application
Cisco ACI and Citrix NetScaler: Opening the Way to Data Center Agility
White Paper Cisco ACI and Citrix NetScaler: Opening the Way to Data Center Agility Business Agility Requires Data Center Agility Today s successful enterprises innovate and respond to change faster than
