Citrix Access Gateway



Similar documents
Citrix Access Gateway

Citrix Password Manager 4.1

Citrix MetaFrame Password Manager 2.5

7 Key Requirements for Secure Remote Access

Using Citrix Application Delivery Infrastructure Solutions to Enable Simple and Secure Teleworking for Federal Employees

White paper. Microsoft and Citrix VDI: Virtual desktop implementation scenarios

Citrix XenDesktop with FlexCast technology. Citrix XenDesktop: Desktop Virtualization For All.

Deployment Guide ICA Proxy for XenApp

How To Install A Citrix Netscaler On A Pc Or Mac Or Ipad (For A Web Browser) With A Certificate Certificate (For An Ipad) On A Netscaler (For Windows) With An Ipro (For

icrosoft TMG Replacement with NetScaler

Accelerating Microsoft Windows 7 migrations with Citrix XenApp

The complete solution for enabling BYO.

Deploying NetScaler Gateway in ICA Proxy Mode

Simplicity is power.

Top Three Reasons to Deliver Web Apps with App Virtualization

Novell Access Manager SSL Virtual Private Network

DEPLOYMENT GUIDE XenApp, Avaya 1X Agent. Deployment Guide. Avaya 1X Agent. XenApp.

White Paper. Protecting Mobile Apps with Citrix XenMobile and MDX. citrix.com

Securing Citrix with SSL VPN Technology

White paper. Rapidly Deliver Microsoft Offi ce 2007 with Citrix XenApp

PRODUCT CATEGORY BROCHURE

Best Practices for Secure Remote Access. Aventail Technical White Paper

SSL VPN Technical Primer

PRODUCT CATEGORY BROCHURE. Juniper Networks SA Series

SSL-Based Remote-Access VPN Solution

Citrix XenApp, MDOP, and Configuration Manager

What s New in Juniper s SSL VPN Version 6.0

Why Switch from IPSec to SSL VPN. And Four Steps to Ease Transition

Desktop virtualization for all

Technical Guide for Adding XenDesktop 4 to an Existing XenApp 5 Environment

Citrix XenApp Frequently Asked Questions (The New Name for Citrix Presentation Server)

Citrix MetaFrame Presentation Server 3.0 and Microsoft Windows Server 2003 Value Add Feature Guide

Endpoint Security VPN for Mac

SECURE ACCESS TO THE VIRTUAL DATA CENTER

Extending Microsoft Hyper-V with Advanced Automation and Management from Citrix

White paper. Improving visibility to user login experience with Citrix EdgeSight

CNS-207 Implementing Citrix NetScaler 10.5 for App and Desktop Solutions

Deployment Guide ICA Proxy for XenApp

Microsoft Dynamics CRM 2015 with NetScaler for Global Server Load Balancing

Secure, Mobile Access to Corporate , Applications, and Intranet Resources

WHITE PAPER. Citrix XenDesktop. Cost savings with centralized virtual desktops.

Secure remote access to your applications and data. Secure Application Access

Dell SonicWALL Secure Virtual Assist: Clientless remote support over SSL VPN

The Benefits of Virtualizing Citrix XenApp with Citrix XenServer

"Charting the Course... Implementing Citrix NetScaler 11 for App and Desktop Solutions CNS-207 Course Summary

Desktop virtualization for all

Citrix XenApp 6 Fundamentals Edition for Windows Server 2008 R2 Administrator's Guide

Requirements Collax Security Gateway Collax Business Server or Collax Platform Server including Collax SSL VPN module

Advanced virtualization management for Hyper-V and System Center environments.

AppFlow: next-generation application performance monitoring.

Application Template Deployment Guide

IBM Lotus Instant Messaging and Web Conferencing 6.5.1

Desktop virtualization and the branch office. Optimizing virtual desktops and applications to the branch office VDI.

Microsoft SharePoint 2013 with Citrix NetScaler

IBM Tivoli Remote Control

GoToMyPC reviewer s guide

Citrix Solutions for Complying with PCI-DSS ENSURING PROTECTION OF WEB APPLICATIONS AND PRIVACY OF CARDHOLDER INFORMATION

SSL VPN vs. IPSec VPN

The Citrix guide to desktop virtualisation

Professional Integrated SSL-VPN Appliance for Small and Medium-sized businesses

Collaboration solutions for midsized businesses Buyer s guide

Staying Ahead of the Hacker Curve Turn-key Web Application Security Solution

Mobilize with Enterprise-Grade Security and a Great Experience

Citrix OpenCloud Access. Accelerate cloud computing adoption and simplify identity management.

Barracuda SSL VPN Administrator s Guide

GoToMyPC Technology Making Life Simpler for Remote and Mobile Workers

Citrix desktop virtualization and Microsoft System Center 2012: better together

Advanced Service Desk Security

How To Configure A Citrix Access Gateway Standard Edition Administrator Administrator S Guide

Safeguard Protected Health Information With Citrix ShareFile

SonicWALL Aventail SSL VPNs Working Together With SonicWALL End Point Security Solutions for Granular End Point Control

Secure remote access

How To Use Netscaler As An Afs Proxy

Barracuda Networks Technical Documentation. Barracuda SSL VPN. Administrator s Guide. Version 2.x RECLAIM YOUR NETWORK

INUVIKA OPEN VIRTUAL DESKTOP FOUNDATION SERVER

GoToMyPC Corporate Advanced Firewall Support Features

NetScaler SQL Intelligent Load Balancing. Scaling the Data Tier with.

Single Sign On for ShareFile with NetScaler. Deployment Guide

FIREWALL. Features SECURITY OF INFORMATION TECHNOLOGIES

Citrix XenClient. Extending the benefits of desktop virtualization to mobile laptop users.

Deploy secure, corporate access for mobile device users with the Junos Pulse Mobile Security Suite

Secure Remote Access Give users in office remote access anytime, anywhere

Enterprise Solution for Remote Desktop Services System Administration Server Management Server Management (Continued)...

Corporate and Payment Card Industry (PCI) compliance

Guide to Deploying Microsoft Exchange 2013 with Citrix NetScaler

CISCO REMOTE ACCESS VPN SOLUTIONS

GoToMyPC Corporate Security FAQs

Citrix ShareFile Enterprise: a technical overview citrix.com

Features of a comprehensive application security solution

White Paper. SSL vs. IPSec. Streamlining Site-to-Site VPN Deployments

MOBILITY & INTERCONNECTIVITY. Features SECURITY OF INFORMATION TECHNOLOGIES

White paper. Getting started with EdgeSight for Load Testing

Transcription:

F E A T U R E S O V E R V I E W Citrix Access Gateway Citrix Access Gateway is a universal SSL VPN appliance that combines the best features of IPSec and typical SSL VPNs without the costly and cumbersome implementation and management to make access easy for users, secure for the company, and low-cost for the IT department. The Access Gateway provides a secure, always-on, single point of access to any information resource. It works through any firewall; supports all applications and protocols, including IP telephony; is fast, simple and cost-effective to deploy and maintain via its Web-deployed, auto-updating client; and ensures that devices meet company security standards with a worm-blocking client and integrated end-point scanning. The Access Gateway automatically and seamlessly reconnects users to their applications when they change locations and devices, and gives them the same access experience they have at the desktop. Citrix Access Gateway provides secure access to any application hosted on Citrix Presentation Server, as well as distributed Windows and UNIX applications, direct-access Web applications, network file shares, data and collaboration services, and even telephony services using VoIP softphones. With the addition of the, the IT organization can utilize sense and response capabilities to not only provide or deny access to appropriate applications, but also control the level of user action rights for each application or resource accessed.

EASE AND SIMPLICITY Auto-download client Kiosk mode Remote control Automatically downloads the client software to the device when the user connects to the gateway. Additionally, users always receive the latest version of the client software when they connect. Enables access to web-based applications from any device or Windows applications via the Linux ICA client. Provides administrators with the ability to remotely troubleshoot client issues with the Access Gateway. Alleviates the burden of installing, maintaining and supporting software on the client device. Allows organizations to easily and cost-effectively extend remote and mobile access to more users. Gives users the flexibility to access company information from any device that supports a Web browser. Allows IT organizations to quickly and efficiently resolve user access issues. EASY MANAGEMENT Network ACLs SNMP Support Syslog Servers Administration console Centralized administration Event logging Wizard-driven installation Administrators can configure Access Control lists of allowed servers and ports. The Access Gateway devices support SNMP for gathering health and performance metric data. The Access Gateway supports logging to remote syslog servers. Access Gateway Administrative user interface. Integrates with the Citrix Access Suite, allowing administrators to manage their entire Citrix access infrastructure from a single interface. Allows organizations to log user activities such as log on, log off, session time and resources accessed by the users for auditing purposes. Provides an intuitive series of click-through screens and simple instructions to guide administrators through installation and configuration. Control was resources can be accessed remotely. Integrate with existing SNMP based network management systems. Integrate with existing syslog servers. Java-based management console that does not require installation of any software and is accessed via a browser. It allows fast and easy appliance installation and configuration, provides system monitoring, and aids maintenance and upgrades. Maximizes efficiency of the IT organization. Give organizations the tools they need to track user activity. Reduces impact on IT staff by minimizing the time required to install the product. 2

F E A T U R E S O V E R V I E W CONSISTENT USER EXPERIENCE Desk-like access Always On access Access center Support for any client device Consistent user interface Interface optimization Support for small form factor devices Users receive the same network experience and application access as if physically connected to the local network. Automatically reconnects disconnected users to the gateway when network connection is restored. Provides a robust landing page for users to easily access all their applications, files, email and other IT resources. Supports a wide range of client devices from PCs to PDAs. Allows administrators to configure any user interface, such as SharePoint or WebSphere, for use with Control and ensure that the view persists whether users are internal or external to the corporate network. Intelligently and automatically optimizes the delivery and display of IT resources on small devices such as PDAs. Intelligently and automatically optimizes the delivery and display of IT resources on small devices such as PDAs. Gives users a familiar level of access thus eliminating the need for training. Allows users to quickly and seamlessly reconnect to network resources without a keystroke or mouse click. Provides users with a consistent landing page whether they are accessing information from inside or outside the organization. Ensures that users can access information from the device of their choice from corporate-owned laptops to home PCs and PDAs. Give organizations the flexibility to choose the right interface while ensuring that users maintain a consistent experience regardless of where they access information. Mobile users can easily access internal resources email, file shares and documents in a format that is easily visible. Mobile users can easily access internal resources email, file shares and documents in a format that is easily visible. PRESENTATION SERVER INTEGRATION Secure Gateway compatibility Web Interface proxy The Access Gateway appliance supports the ICA client in a similar manner to the secure gateway feature, allowing access from any SSL enabled ICA client. The Access Gateway proxies login to the web interface. Presentation Server users can replace the secure gateway without loss of user functionality. Users can easily login to the web interface and gain access to Presentation Server applications. 3

SECURE ACCESS TO ANY APPLICATION OR IT RESOURCE Integrated endpoint scanning Blocks worm traversal Supports any application or network resource Supports access from any location Optimized support for UDP based applications Disable or enable split tunneling RADIUS Authentication LDAP Authentication Provides a combination of initial login and continuous, real-time scanning of the end-point device. Hides the IP addresses of the connected network from the client workstation. Gives users access to any application in its native form whether client-server or web-based. Additionally, the Access Gateway supports UDP protocol based applications, such as real-time voice traffic (softphones). Provides access to corporate resources from anywhere and from behind any firewall. The Access Gateway uses specific techniques to optimize the delivery of UDP based traffic, used by applications such as email and IP telephony. Administrative control on a per-group basis as to whether a user s local network is available while a network client is active. Authenticate users against a RADIUS server. Authenticate users against an external LDAP server. Ensures that the device remains safe to connect to the network. Reduces the threat of worms infecting the network by reading the routing tables and propagating throughout all connected networks. Enables administrators to give users access to IT resources without the need for custom development, or the need to maintain both SSL and IPSEC VPN infrastructures. Enables users to remain productive and get the job done from any location. Customers do not need to continue to maintain IPSEC VPNs to support UDP based applications, such as IP softphones. Reduces the threat of malicious attacks by disabling split tunneling, if a remote PC is connected directly to the Web and at the same time tied into the VPN, attackers coming on from the Web could commandeer the PC and gain access to the corporate network. Organizations can leverage existing authentication directories, using open standard protocols. Organizations can leverage existing authentication directories, using open standard protocols. 4

F E A T U R E S O V E R V I E W SECURELY EXPAND MOBILE ACCESS Advanced end-point analysis Secure access to Web-based email Secure Web access to files Clientless access Support for corporate portals Support for two-factor authentication Firewall traversal Analyzes the integrity and identity of the device connecting to the network to determine if it is safe to connect. Provides users with secure remote access to their corporate Outlook Web Access or inotes email. Enables users to access corporate network shares securely over the Internet through a Web-based user interface. Allows users to access network file shares, Web email and internal Web sites from devices that are locked down and do not permit the downloading of any software. Administrators can securely deliver existing portal, intranet and Web page implementations to remote and mobile users. Provides built-in support for 2-factor authentication. Provides a generic interface to LDAP-compliant directory servers such as Microsoft Active Directory Application Mode (AD/AM), Novell edirectory, IBM Tivoli Directory Server, and Sun Java System Directory Server. Ensures that devices are safe before granting them access to the network. Unacceptable devices may be denied access, quarantined or given limited to the IT resources. Improves Outlook Web Access and Lotus inotes security by avoiding inadvertent intellectual property leakage from email attachments. Enables mobile users to be productive no matter where they are located. Increases user productivity by giving them access to corporate IT resources from any device including kiosks and small form factor devices. Provides organizations with the flexibility to securely deliver existing portals to users while controlling access to portal resources based on the user s access scenario. Supports stronger protection of corporate information. Provides additional options for storage of credentials and settings. 5

FACILITATE REGULATORY COMPLIANCE Access scenario analysis Policy-based access control Granular resource control Live Edit Integration with Presentation Server policies Analyzes the user s access scenario in order to tailor the appropriate level of access for the user s connecting environment. The Advanced Access also provides administrators with the flexibility to develop custom end-point analysis or the ability to integrate with third-party solutions. Allows organizations to enforce polices that define what resources users can access depending on their access scenario. Controls how users can interact with applications and resources once they are given access. Enables administrators to define flexible policies based on user identity, device and location that allow or deny saving documents to local client devices; provide preview only access to documents and enable server-based file editing without the need to download documents. Allows administrators to control Presentation Server policies to selectively enable client-side drive mapping, cut and paste as well as local printing based on the user s access scenario. Gives organization complete flexibility in defining access parameters for any access scenario. Presents users with an appropriate level of access depending on who they are, what device they are using and how it is configured and the connection through which they are entering the network. Gives administrators total control over the rights users have within applications depending on their access scenario. Ensures that company information is not inadvertently left on any client device and that it does not leave the confines of the internal network while still giving users the flexibility to view, edit and save documents. Seamlessly extends SmartAccess capabilities to Presentation Server applications and resources. 6

The Citrix Access Platform Citrix products are designed to solve particular access challenges as standalone solutions. When multiple products are leveraged together, they lay the foundation of a secure, flexible, and extensible access platform. Citrix Presentation Server is the market leader for centralizing deployment and management of enterprise applications, and provides secure, on-demand access to users anywhere, on any device and any connection. Citrix Access Gateway is an advanced, easy to use, and cost effective SSL VPN with advanced access control that manages who accesses company information and what they can do with it. Citrix Password Manager is the most secure, efficient and easiest-to-deploy enterprise single sign-on solution for easy access to all applications with a single logon. Citrix GoToMeeting is a Web-based managed service that makes it easy for anyone to access real-time collaboration tools and online meetings instantly, securely and cost-effectively. Citrix GoToAssist is an industry-leading remote-support solution that enables organizations to provide access to world-class support over the Internet for customers and end users in a highly available and secure environment. Citrix GoToMyPC is a managed service that provides secure, encrypted remote access to Windows PC desktops from any Internet-connected computer. Strike a Balance Today, you don t have to choose between dangerous, unrestricted access to information on the one hand, or one-size-fits-all security that impedes business on the other. The simplest, most cost effective way to balance productivity and security. from the most trusted name in secure access. Give us a call. We d like to help you find a better answer. Visit us at www.citrix.com/accessgateway and find out more. Citrix Worldwide WORLDWIDE HEADQUARTERS Citrix Systems, Inc. 851 West Cypress Creek Road Fort Lauderdale, FL 33309 USA Tel: +1 (800) 393 1888 Tel: +1 (954) 267 3000 EUROPEAN HEADQUARTERS Citrix Systems International GmbH Rheinweg 9 8200 Schaffhausen Switzerland Tel: +41 (52) 635 7700 ASIA PACIFIC HEADQUARTERS About Citrix: Citrix Systems, Inc. (Nasdaq:CTXS) is the global leader in access infrastructure solutions and the most trusted name in secure access for enterprises and individuals. More than 160,000 organizations around the world use Citrix every day. Our access software, services and appliances give people secure and well-managed access to business information wherever it lives on demand. Citrix customers include 100% of the Fortune 100 companies, 99% of the Fortune 500, and 97% of the Fortune Global 500. Based in Fort Lauderdale, Florida, Citrix has offices in 22 countries, and approximately 6,200 channel and alliance partners in more than 100 countries. Citrix Systems Hong Kong Ltd. Suite 3201, 32nd Floor One International Finance Centre 1 Harbour View Street Central Hong Kong Tel: +852 2100 5000 CITRIX ONLINE DIVISION 5385 Hollister Avenue Santa Barbara, CA 93111 Tel: +1 (805) 690 6400 2005 Citrix Systems, Inc. All rights reserved. Citrix, Citrix Access Suite, Citrix Presentation Server, Citrix Access Gateway, Citrix Password Manager, Citrix GoToMeeting, Citrix GoToAssist, and Citrix GoToMyPC, are trademarks or registered trademarks of Citrix Systems, Inc. in the United States and other countries. UNIX is a registered trademark of The Open Group in the United States and other countries. AIX is a registered trademark of International Business Machines Corporation. HP-UX is a registered trademark of Hewlett-Packard Company. Sun, Java and Solaris are trademarks or registered trademarks of Sun Microsystems, Inc. Macintosh is a registered trademark of Apple Computer, Inc. Microsoft and Windows are registered trademarks or trademarks of Microsoft Corporation. Linux is a registered trademark of Linus Torvalds. All other trademarks and registered trademarks are the property of their respective owners. 0405/PDF www.citrix.com