SlideShare a Scribd company logo
Executive Brief Security
1citrix.com/secure
Manage risk by protecting apps,
data and usage
Trusted to address risk management priorities by controlling
application and data access across any location, network and device
Although billons of dollars are spent on security solutions, information remains vulnerable as new
threat and attack vectors are emerging everyday and the volume of incidents is on the rise. The
tools and processes implemented in the past are often too general in scope and do not adequately
defend the organization today. Citrix helps organizations address risk management priorities by
protecting sensitive information as business mobility and transformation imperatives—including
mobile and distributed workforces, BYO, global operations, and third party consultants, outsourcing
vendors, and partnerships—become the norm. Across every industry, including the most highly
regulated sectors, customers rely on Citrix to assure privacy, protect sensitive information and
enable compliance of apps and data without compromising workforce flexibility and productivity.
Information security requires a new approach
While IT continues to control the corporate network perimeter and manage many business
applications, the perimeter of where work is done is evolving and expanding. Devices are now
both corporate and personally owned, many users select cloud-based applications, employees
no longer do all their work within a corporate facility and traditional office hours are a thing of
the past. Together the multiplication of devices, apps and locations increases the security
burden, and a new approach must be sought. This approach must enable workforce mobility
where remote, flexwork, and telework are common, and consultants, contractors, partners and
other third parties are part of the core team—but not generically part of the core network.
Contextual access and controlled connectivity that mediates usage of corporate apps and data
from various locations is a critical requirement. Organizations must be able to support yet
separate personal apps, business apps and data on both managed and unmanaged devices
(taking into account BYO as well as company-issued devices) without sacrificing security or
introducing increased risk.
Additionally, organizations must ensure sensitive business data, personal information and IP are
protected with strict enforcement of policies and complete visibility, reporting and auditing to
achieve compliance. Ensuring continuity of operations by providing secure, high-performance
access from anywhere, at any time, even during planned and unplanned disruptions is paramount.
Executive Brief Security
2citrix.com/secure
Best practices to control apps and data
Here are some important best practices to control apps and data:
•	Focus on balancing security needs with user experience demands. Rather than manage only
the device, successful organizations take a holistic view of security where the focus is on balancing
the user experience and productivity with security across devices, apps, data, networks and identity.
•	Enable flexible options for data storage, access and management. With the convenience
and cost benefit of a globally dispersed workforce, storing business information anywhere—
from mobile storage to cloud apps—requires increased IT control on where information
should reside and with whom it can be shared. Many organizations are looking for a flexible
mix of centralized control across datacenter servers, cloud storage and endpoint containerization.
•	Offer rich policy engine for contextual controls. Instead of giving users an all-access pass
to the network, all of the time, enforce contextual security, which combines insights from
personas and roles, where people are located at a given time, what type of device is being
used and who owns it, as well as what type of information they are trying to access—allowing
IT to set policies that manage contextual access to information including confidential and
restricted data for all business scenarios.
•	Enable efficient compliance management and reporting. Globally, organizations face more
than 300 security and privacy-related standards, regulations and laws, with more than 3,500
specific controls. Security solutions should provide complete and automated monitoring,
logging and reporting of data, user and network level activity to help respond to audits quickly,
efficiently—and successfully.
•	Reduce the attack surface while lowering IT costs. With an overall goal of reducing the
attack surface, organizations can lower operational costs and reduce spend on individual
security technologies, particularly for devices, by focusing on app and data security and
usage. Organizations should deliver secure apps with encryption for data in use, data at rest,
and data in motion.
A new mindset for specifically protecting information is the first step. The next is focusing on
solutions that enable your organization to protect its most sensitive apps, data and usage.
Citrix security protects apps, data and usage
While people expect instant and convenient access to their data and apps on any device they
use, along with the rich experience they’re used to, businesses need to be able to assess and
manage risk to sensitive information. With Citrix, organizations can provide the right level of
confidentiality, integrity and availability for data without placing undue restrictions on the ways
people choose to work. Citrix offers trusted solutions to address risk with powerful and flexible
options to control identity and access, network security, app security, data security, monitoring
and response across all scenarios. The core security pillars of the Citrix offering include:
Executive Brief Security
3citrix.com/secure
Identity and access
•	Authentication – Control and secure access to all apps including SaaS apps (e.g. Office 365)
by providing two-factor authentication and federation
•	Authorization – Provide appropriate levels of access specific to applications and resources
based on group membership, location, and task
•		Access Control – Perform endpoint analysis and enable contextual access control where
access to resources is granted or restricted based on dynamic parameters such as the user’s
endpoint and other situational aspects
Network security
•	Remote Access – Provide encrypted delivery of virtual applications and desktops to
employees and third parties (contractors, vendors, partners) wherever they may be working
•	Segmentation – Enforce network access control and dynamically segment networks and
services to limit lateral movement throughout the network while assuring compliance
and security
•	Availability – Provide service optimization and load balancing with intelligent health
monitoring to maintain the highest level of service uptime and performance
App security
•	Centralization – Application and operating system patch management and configuration
management are centralized to avoid inefficiency, inconsistency and security gaps
•	Containerization – Provide a suite of securely containerized business productivity apps that
have micro VPN access to organizational resources even from employee-owned
smartphones and tablets
•	Inspection – Provide protection against zero-day, logic flaws, and denial of service attacks
against critical business services
Data security
•	Centralization – Prevent data from residing on the endpoints by keeping data in the data
center to mitigate against data loss and leakage due to lost, stolen, compromised or
destroyed endpoints
•	Containerization – Address insecure mobile data storage with containerization to separate
personal and business apps along with their associated data to enforce segmentation at
the app level and data encryption
•	File Sharing – Enable file sharing within and outside the organization that has security built-in
at every level from authentication, authorization, and auditing to DLP, encryption and expiry
Monitoring & response
•	Visibility – Visibility into user level activity enables IT to triage performance degradation
and quickly identify the source, whether on the endpoint, network, or server side
•	Auditing – Multiple levels of monitoring and detailed logging exist to detect misconfigura-
tions, attacks and usage patterns
•	Compliance – Secure traffic from the endpoint to inside the data center using Common
Criteria validated configurations and FIPS 140-2 capabilities across Citrix HDX protocols and
Citrix NetScaler to comply with regulations and requirements and reduce the scope of audits
Executive Brief Security
4
About Citrix
Citrix (NASDAQ:CTXS) is leading the transition to software-defining the workplace, uniting virtualization, mobility management,
networking and SaaS solutions to enable new ways for businesses and people to work better. Citrix solutions power business mobility
through secure, mobile workspaces that provide people with instant access to apps, desktops, data and communications on any device,
over any network and cloud. With annual revenue in 2014 of $3.14 billion, Citrix solutions are in use at more than 330,000 organizations
and by over 100 million users globally. Learn more at www.citrix.com.
Copyright © 2015 Citrix Systems, Inc. All rights reserved. Citrix, HDX, Netscaler, XenApp, XenDesktop, XenMobile and ShareFile are
trademarks of Citrix Systems, Inc. and/or one of its subsidiaries, and may be registered in the U.S. and other countries. Other product and
company names mentioned herein may be trademarks of their respective companies.
1215/PDF/10938citrix.com/secure
Citrix delivers across security pillars with a complete portfolio including XenApp and XenDesktop
to manage apps and desktops centrally inside the data center, XenMobile to secure mobile
applications and devices with a great user experience, ShareFile to provide controlled and
audited data access, storage and sharing both on-prem and in the cloud, and NetScaler to
contextualize and control connectivity with end-to-end system and user visibility. Citrix
solutions also integrate with third-party security products for advanced levels of system
management and identity, endpoint and network protection.
Citrix is proven and trusted to protect the most sensitive information
As organizations focus on introducing new technologies to enable business and personal
mobility, dynamically assessing and managing risk is crucial. And, these risks must be
managed while delivering all apps (Windows, web, SaaS and mobile), building agile data
centers and leveraging cloud services. Citrix is trusted to protect our customers’ most
sensitive information, giving powerful options to control application and data access across
any location, network and device. At the same time, employees, contractors and partners
have the flexibility to choose how they work. Simple and secure access to their virtual
workspace with all the resources they need whether remote, mobile or in the office allows
them to best perform their job. Moreover end-to-end visibility of connections, traffic and
user activity allows IT to address privacy, compliance and risk management priorities without
compromising workforce productivity and workplace transformation initiatives.
No other vendor offers the breadth of app, data and networking security proven to protect
and secure the world’s most important apps—the apps businesses run on. Best-of-breed
technologies for security and integration across app, data and usage makes Citrix the clear
choice for protection of sensitive information, privacy and compliance without
compromising workforce flexibility and productivity.
Learn more about Citrix security at www.citrix.com/secure.

More Related Content

What's hot

En msft-scrty-cntnt-e book-protectyourdata
En msft-scrty-cntnt-e book-protectyourdataEn msft-scrty-cntnt-e book-protectyourdata
En msft-scrty-cntnt-e book-protectyourdata
Online Business
 
Windows 10 Enterprise E3 - Best in Class Security and Control - Presented by ...
Windows 10 Enterprise E3 - Best in Class Security and Control - Presented by ...Windows 10 Enterprise E3 - Best in Class Security and Control - Presented by ...
Windows 10 Enterprise E3 - Best in Class Security and Control - Presented by ...
David J Rosenthal
 

What's hot (19)

4 Ways to Ensure a Smooth Windows 10 Migration
4 Ways to Ensure a Smooth Windows 10 Migration4 Ways to Ensure a Smooth Windows 10 Migration
4 Ways to Ensure a Smooth Windows 10 Migration
 
Unified Endpoint Management: Security & Productivity for the Mobile Enterprise
Unified Endpoint Management: Security & Productivity for the Mobile EnterpriseUnified Endpoint Management: Security & Productivity for the Mobile Enterprise
Unified Endpoint Management: Security & Productivity for the Mobile Enterprise
 
Transforming Business with Citrix: Customers Share Their Stories.
Transforming Business with Citrix: Customers Share Their Stories.Transforming Business with Citrix: Customers Share Their Stories.
Transforming Business with Citrix: Customers Share Their Stories.
 
Secure Remote Browser
Secure Remote BrowserSecure Remote Browser
Secure Remote Browser
 
En msft-scrty-cntnt-e book-protectyourdata
En msft-scrty-cntnt-e book-protectyourdataEn msft-scrty-cntnt-e book-protectyourdata
En msft-scrty-cntnt-e book-protectyourdata
 
Product Assessment and Consulting Offerings
Product Assessment and Consulting OfferingsProduct Assessment and Consulting Offerings
Product Assessment and Consulting Offerings
 
2017-10-05 Mitigating Cybersecurity and Cyber Fraud risk in Your Organization
2017-10-05 Mitigating Cybersecurity and Cyber Fraud risk in Your Organization2017-10-05 Mitigating Cybersecurity and Cyber Fraud risk in Your Organization
2017-10-05 Mitigating Cybersecurity and Cyber Fraud risk in Your Organization
 
EMEA10: Trepidation in Moving to the Cloud
EMEA10: Trepidation in Moving to the CloudEMEA10: Trepidation in Moving to the Cloud
EMEA10: Trepidation in Moving to the Cloud
 
Big data and analytics
Big data and analytics Big data and analytics
Big data and analytics
 
GUIDE TO KEEP YOUR END-USERS CONNECTED TO THE DIGITAL WORKPLACE DURING DISRUP...
GUIDE TO KEEP YOUR END-USERS CONNECTED TO THE DIGITAL WORKPLACE DURING DISRUP...GUIDE TO KEEP YOUR END-USERS CONNECTED TO THE DIGITAL WORKPLACE DURING DISRUP...
GUIDE TO KEEP YOUR END-USERS CONNECTED TO THE DIGITAL WORKPLACE DURING DISRUP...
 
Enterprise Digital Assistants: How they can support you in your Credit, Colle...
Enterprise Digital Assistants: How they can support you in your Credit, Colle...Enterprise Digital Assistants: How they can support you in your Credit, Colle...
Enterprise Digital Assistants: How they can support you in your Credit, Colle...
 
The benefits of cloud technology for remote working
The benefits of cloud technology for remote workingThe benefits of cloud technology for remote working
The benefits of cloud technology for remote working
 
Windows 10 Enterprise E3 - Best in Class Security and Control - Presented by ...
Windows 10 Enterprise E3 - Best in Class Security and Control - Presented by ...Windows 10 Enterprise E3 - Best in Class Security and Control - Presented by ...
Windows 10 Enterprise E3 - Best in Class Security and Control - Presented by ...
 
BlockChain Enabled-Cloud Delivered For Network Secuirty
BlockChain Enabled-Cloud Delivered For Network SecuirtyBlockChain Enabled-Cloud Delivered For Network Secuirty
BlockChain Enabled-Cloud Delivered For Network Secuirty
 
There's No Such Thing As "Downtime" In a Hospital
There's No Such Thing As "Downtime" In a HospitalThere's No Such Thing As "Downtime" In a Hospital
There's No Such Thing As "Downtime" In a Hospital
 
Microsoft 365 Compliance
Microsoft 365 ComplianceMicrosoft 365 Compliance
Microsoft 365 Compliance
 
Bcs consumerisation
Bcs consumerisationBcs consumerisation
Bcs consumerisation
 
HIGH-IMPACT USE CASES POWERED BY NEXT-GENERATION NETWORK ANALYTICS
HIGH-IMPACT USE CASES POWERED BY NEXT-GENERATION NETWORK ANALYTICSHIGH-IMPACT USE CASES POWERED BY NEXT-GENERATION NETWORK ANALYTICS
HIGH-IMPACT USE CASES POWERED BY NEXT-GENERATION NETWORK ANALYTICS
 
Happiest Minds
Happiest MindsHappiest Minds
Happiest Minds
 

Similar to Manage risk by protecting apps, data and usage

report on Mobile security
report on Mobile securityreport on Mobile security
report on Mobile security
JAYANT RAJURKAR
 
Cloud Security POV_Final (by KM)
Cloud Security POV_Final (by KM)Cloud Security POV_Final (by KM)
Cloud Security POV_Final (by KM)
Khiro Mishra
 
Citrix sb 0707-lowres
Citrix sb 0707-lowresCitrix sb 0707-lowres
Citrix sb 0707-lowres
Hai Nguyen
 
4192 sslvpn sb_0412
4192 sslvpn sb_04124192 sslvpn sb_0412
4192 sslvpn sb_0412
Hai Nguyen
 

Similar to Manage risk by protecting apps, data and usage (20)

Manage Risk By Protecting the Apps and Data That Drive Business Productivity
Manage Risk By Protecting the Apps and Data That Drive Business ProductivityManage Risk By Protecting the Apps and Data That Drive Business Productivity
Manage Risk By Protecting the Apps and Data That Drive Business Productivity
 
Manage Risk By Protecting the Apps and Data Infographic
Manage Risk By Protecting the Apps and Data InfographicManage Risk By Protecting the Apps and Data Infographic
Manage Risk By Protecting the Apps and Data Infographic
 
Manage Risk by Protecting the Apps and Data That Drive Business Productivity
Manage Risk by Protecting the Apps and Data That Drive Business ProductivityManage Risk by Protecting the Apps and Data That Drive Business Productivity
Manage Risk by Protecting the Apps and Data That Drive Business Productivity
 
report on Mobile security
report on Mobile securityreport on Mobile security
report on Mobile security
 
Cloud Security POV_Final (by KM)
Cloud Security POV_Final (by KM)Cloud Security POV_Final (by KM)
Cloud Security POV_Final (by KM)
 
Never Compromise Your Mission: 5 Ways to Strengthen Data and Network Security...
Never Compromise Your Mission: 5 Ways to Strengthen Data and Network Security...Never Compromise Your Mission: 5 Ways to Strengthen Data and Network Security...
Never Compromise Your Mission: 5 Ways to Strengthen Data and Network Security...
 
R ramya devi cloud computing
R ramya devi cloud computingR ramya devi cloud computing
R ramya devi cloud computing
 
Trust based Mechanism for Secure Cloud Computing Environment: A Survey
Trust based Mechanism for Secure Cloud Computing Environment: A SurveyTrust based Mechanism for Secure Cloud Computing Environment: A Survey
Trust based Mechanism for Secure Cloud Computing Environment: A Survey
 
Strategy for Holistic Security
Strategy for Holistic SecurityStrategy for Holistic Security
Strategy for Holistic Security
 
Citrix sb 0707-lowres
Citrix sb 0707-lowresCitrix sb 0707-lowres
Citrix sb 0707-lowres
 
Citrix Strategy Brief
Citrix Strategy BriefCitrix Strategy Brief
Citrix Strategy Brief
 
Computer Security.pptx
Computer Security.pptxComputer Security.pptx
Computer Security.pptx
 
ISACA Journal Publication - Does your Cloud have a Secure Lining? Shah Sheikh
ISACA Journal Publication - Does your Cloud have a Secure Lining? Shah SheikhISACA Journal Publication - Does your Cloud have a Secure Lining? Shah Sheikh
ISACA Journal Publication - Does your Cloud have a Secure Lining? Shah Sheikh
 
4192 sslvpn sb_0412
4192 sslvpn sb_04124192 sslvpn sb_0412
4192 sslvpn sb_0412
 
InstaSafe Zero Trust Access - Key Features and Benefits
InstaSafe Zero Trust Access - Key Features and BenefitsInstaSafe Zero Trust Access - Key Features and Benefits
InstaSafe Zero Trust Access - Key Features and Benefits
 
Top Cloud Infrastructure Practices And Strategies For Maximum Security.pdf
Top Cloud Infrastructure Practices And Strategies For Maximum Security.pdfTop Cloud Infrastructure Practices And Strategies For Maximum Security.pdf
Top Cloud Infrastructure Practices And Strategies For Maximum Security.pdf
 
ZERO TRUST ARCHITECTURE - DIGITAL TRUST FRAMEWORK
ZERO TRUST ARCHITECTURE - DIGITAL TRUST FRAMEWORKZERO TRUST ARCHITECTURE - DIGITAL TRUST FRAMEWORK
ZERO TRUST ARCHITECTURE - DIGITAL TRUST FRAMEWORK
 
Strategically moving towards a secure hybrid it
Strategically moving towards a secure hybrid itStrategically moving towards a secure hybrid it
Strategically moving towards a secure hybrid it
 
the_role_of_resilience_data_in_ensuring_cloud_security.pdf
the_role_of_resilience_data_in_ensuring_cloud_security.pdfthe_role_of_resilience_data_in_ensuring_cloud_security.pdf
the_role_of_resilience_data_in_ensuring_cloud_security.pdf
 
the_role_of_resilience_data_in_ensuring_cloud_security.pptx
the_role_of_resilience_data_in_ensuring_cloud_security.pptxthe_role_of_resilience_data_in_ensuring_cloud_security.pptx
the_role_of_resilience_data_in_ensuring_cloud_security.pptx
 

More from Citrix

More from Citrix (20)

Building The Digital Workplace
Building The Digital WorkplaceBuilding The Digital Workplace
Building The Digital Workplace
 
Maximize your Investment in Microsoft Office 365 with Citrix Workspace
Maximize your Investment in Microsoft Office 365 with Citrix Workspace Maximize your Investment in Microsoft Office 365 with Citrix Workspace
Maximize your Investment in Microsoft Office 365 with Citrix Workspace
 
XenApp on Google Cloud Deployment Guide
XenApp on Google Cloud Deployment GuideXenApp on Google Cloud Deployment Guide
XenApp on Google Cloud Deployment Guide
 
Deploying Citrix XenApp & XenDesktop Service on Google Cloud Platform
Deploying Citrix XenApp & XenDesktop Service on Google Cloud PlatformDeploying Citrix XenApp & XenDesktop Service on Google Cloud Platform
Deploying Citrix XenApp & XenDesktop Service on Google Cloud Platform
 
How do Organizations Plan to Assure Application Delivery in a Multi-Cloud World?
How do Organizations Plan to Assure Application Delivery in a Multi-Cloud World?How do Organizations Plan to Assure Application Delivery in a Multi-Cloud World?
How do Organizations Plan to Assure Application Delivery in a Multi-Cloud World?
 
Workforce Flexibility Can Drive Greater Engagement & Productivity
Workforce Flexibility Can Drive Greater Engagement & ProductivityWorkforce Flexibility Can Drive Greater Engagement & Productivity
Workforce Flexibility Can Drive Greater Engagement & Productivity
 
Citrix Cloud Services: Total Economic Benefits Assessment Guide
Citrix Cloud Services: Total Economic Benefits Assessment GuideCitrix Cloud Services: Total Economic Benefits Assessment Guide
Citrix Cloud Services: Total Economic Benefits Assessment Guide
 
The Growing U.S. IT Productivity Gap
The Growing U.S. IT Productivity GapThe Growing U.S. IT Productivity Gap
The Growing U.S. IT Productivity Gap
 
Citrix Cloud Services: Total Economic Benefits Assessment Guide
Citrix Cloud Services: Total Economic Benefits Assessment GuideCitrix Cloud Services: Total Economic Benefits Assessment Guide
Citrix Cloud Services: Total Economic Benefits Assessment Guide
 
Citrix Synergy 2017: Technology Keynote Sketch Notes
Citrix Synergy 2017: Technology Keynote Sketch NotesCitrix Synergy 2017: Technology Keynote Sketch Notes
Citrix Synergy 2017: Technology Keynote Sketch Notes
 
Citrix Synergy 2017: Malcolm Gladwell Innovation Super Session Sketch Notes
Citrix Synergy 2017: Malcolm Gladwell Innovation Super Session Sketch NotesCitrix Synergy 2017: Malcolm Gladwell Innovation Super Session Sketch Notes
Citrix Synergy 2017: Malcolm Gladwell Innovation Super Session Sketch Notes
 
Synergy 2017: Colin Powell Innovation Super Session Sketch Notes
Synergy 2017: Colin Powell Innovation Super Session Sketch NotesSynergy 2017: Colin Powell Innovation Super Session Sketch Notes
Synergy 2017: Colin Powell Innovation Super Session Sketch Notes
 
Who Are Citrix Customers?
Who Are Citrix Customers?Who Are Citrix Customers?
Who Are Citrix Customers?
 
Citrix Paddington
Citrix PaddingtonCitrix Paddington
Citrix Paddington
 
The Security Compliance Countdown: How to Get Ahead of the GDPR [Infographic]
The Security Compliance Countdown: How to Get Ahead of the GDPR [Infographic]The Security Compliance Countdown: How to Get Ahead of the GDPR [Infographic]
The Security Compliance Countdown: How to Get Ahead of the GDPR [Infographic]
 
Citrix & Canalys: Northern European Channel Partners in a State of Transforma...
Citrix & Canalys: Northern European Channel Partners in a State of Transforma...Citrix & Canalys: Northern European Channel Partners in a State of Transforma...
Citrix & Canalys: Northern European Channel Partners in a State of Transforma...
 
Digital or die? British boardrooms divided on digital transformation
Digital or die? British boardrooms divided on digital transformationDigital or die? British boardrooms divided on digital transformation
Digital or die? British boardrooms divided on digital transformation
 
The Digital Disconnect in South Africa
The Digital Disconnect in South AfricaThe Digital Disconnect in South Africa
The Digital Disconnect in South Africa
 
Why Citrix beats VMware [Infographic]
Why Citrix beats VMware [Infographic]Why Citrix beats VMware [Infographic]
Why Citrix beats VMware [Infographic]
 
[Infographic] Moving at the Speed of Byte: Ushering the Era of the Digitally ...
[Infographic] Moving at the Speed of Byte: Ushering the Era of the Digitally ...[Infographic] Moving at the Speed of Byte: Ushering the Era of the Digitally ...
[Infographic] Moving at the Speed of Byte: Ushering the Era of the Digitally ...
 

Recently uploaded

Article writing on excessive use of internet.pptx
Article writing on excessive use of internet.pptxArticle writing on excessive use of internet.pptx
Article writing on excessive use of internet.pptx
abhinandnam9997
 
一比一原版UTS毕业证悉尼科技大学毕业证成绩单如何办理
一比一原版UTS毕业证悉尼科技大学毕业证成绩单如何办理一比一原版UTS毕业证悉尼科技大学毕业证成绩单如何办理
一比一原版UTS毕业证悉尼科技大学毕业证成绩单如何办理
aagad
 

Recently uploaded (12)

History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shopHistory+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
 
Article writing on excessive use of internet.pptx
Article writing on excessive use of internet.pptxArticle writing on excessive use of internet.pptx
Article writing on excessive use of internet.pptx
 
How to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptxHow to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptx
 
How Do I Begin the Linksys Velop Setup Process?
How Do I Begin the Linksys Velop Setup Process?How Do I Begin the Linksys Velop Setup Process?
How Do I Begin the Linksys Velop Setup Process?
 
The Best AI Powered Software - Intellivid AI Studio
The Best AI Powered Software - Intellivid AI StudioThe Best AI Powered Software - Intellivid AI Studio
The Best AI Powered Software - Intellivid AI Studio
 
The AI Powered Organization-Intro to AI-LAN.pdf
The AI Powered Organization-Intro to AI-LAN.pdfThe AI Powered Organization-Intro to AI-LAN.pdf
The AI Powered Organization-Intro to AI-LAN.pdf
 
一比一原版UTS毕业证悉尼科技大学毕业证成绩单如何办理
一比一原版UTS毕业证悉尼科技大学毕业证成绩单如何办理一比一原版UTS毕业证悉尼科技大学毕业证成绩单如何办理
一比一原版UTS毕业证悉尼科技大学毕业证成绩单如何办理
 
The+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptxThe+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptx
 
ER(Entity Relationship) Diagram for online shopping - TAE
ER(Entity Relationship) Diagram for online shopping - TAEER(Entity Relationship) Diagram for online shopping - TAE
ER(Entity Relationship) Diagram for online shopping - TAE
 
Pvtaan Social media marketing proposal.pdf
Pvtaan Social media marketing proposal.pdfPvtaan Social media marketing proposal.pdf
Pvtaan Social media marketing proposal.pdf
 
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesMulti-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
 
The Use of AI in Indonesia Election 2024: A Case Study
The Use of AI in Indonesia Election 2024: A Case StudyThe Use of AI in Indonesia Election 2024: A Case Study
The Use of AI in Indonesia Election 2024: A Case Study
 

Manage risk by protecting apps, data and usage

  • 1. Executive Brief Security 1citrix.com/secure Manage risk by protecting apps, data and usage Trusted to address risk management priorities by controlling application and data access across any location, network and device Although billons of dollars are spent on security solutions, information remains vulnerable as new threat and attack vectors are emerging everyday and the volume of incidents is on the rise. The tools and processes implemented in the past are often too general in scope and do not adequately defend the organization today. Citrix helps organizations address risk management priorities by protecting sensitive information as business mobility and transformation imperatives—including mobile and distributed workforces, BYO, global operations, and third party consultants, outsourcing vendors, and partnerships—become the norm. Across every industry, including the most highly regulated sectors, customers rely on Citrix to assure privacy, protect sensitive information and enable compliance of apps and data without compromising workforce flexibility and productivity. Information security requires a new approach While IT continues to control the corporate network perimeter and manage many business applications, the perimeter of where work is done is evolving and expanding. Devices are now both corporate and personally owned, many users select cloud-based applications, employees no longer do all their work within a corporate facility and traditional office hours are a thing of the past. Together the multiplication of devices, apps and locations increases the security burden, and a new approach must be sought. This approach must enable workforce mobility where remote, flexwork, and telework are common, and consultants, contractors, partners and other third parties are part of the core team—but not generically part of the core network. Contextual access and controlled connectivity that mediates usage of corporate apps and data from various locations is a critical requirement. Organizations must be able to support yet separate personal apps, business apps and data on both managed and unmanaged devices (taking into account BYO as well as company-issued devices) without sacrificing security or introducing increased risk. Additionally, organizations must ensure sensitive business data, personal information and IP are protected with strict enforcement of policies and complete visibility, reporting and auditing to achieve compliance. Ensuring continuity of operations by providing secure, high-performance access from anywhere, at any time, even during planned and unplanned disruptions is paramount.
  • 2. Executive Brief Security 2citrix.com/secure Best practices to control apps and data Here are some important best practices to control apps and data: • Focus on balancing security needs with user experience demands. Rather than manage only the device, successful organizations take a holistic view of security where the focus is on balancing the user experience and productivity with security across devices, apps, data, networks and identity. • Enable flexible options for data storage, access and management. With the convenience and cost benefit of a globally dispersed workforce, storing business information anywhere— from mobile storage to cloud apps—requires increased IT control on where information should reside and with whom it can be shared. Many organizations are looking for a flexible mix of centralized control across datacenter servers, cloud storage and endpoint containerization. • Offer rich policy engine for contextual controls. Instead of giving users an all-access pass to the network, all of the time, enforce contextual security, which combines insights from personas and roles, where people are located at a given time, what type of device is being used and who owns it, as well as what type of information they are trying to access—allowing IT to set policies that manage contextual access to information including confidential and restricted data for all business scenarios. • Enable efficient compliance management and reporting. Globally, organizations face more than 300 security and privacy-related standards, regulations and laws, with more than 3,500 specific controls. Security solutions should provide complete and automated monitoring, logging and reporting of data, user and network level activity to help respond to audits quickly, efficiently—and successfully. • Reduce the attack surface while lowering IT costs. With an overall goal of reducing the attack surface, organizations can lower operational costs and reduce spend on individual security technologies, particularly for devices, by focusing on app and data security and usage. Organizations should deliver secure apps with encryption for data in use, data at rest, and data in motion. A new mindset for specifically protecting information is the first step. The next is focusing on solutions that enable your organization to protect its most sensitive apps, data and usage. Citrix security protects apps, data and usage While people expect instant and convenient access to their data and apps on any device they use, along with the rich experience they’re used to, businesses need to be able to assess and manage risk to sensitive information. With Citrix, organizations can provide the right level of confidentiality, integrity and availability for data without placing undue restrictions on the ways people choose to work. Citrix offers trusted solutions to address risk with powerful and flexible options to control identity and access, network security, app security, data security, monitoring and response across all scenarios. The core security pillars of the Citrix offering include:
  • 3. Executive Brief Security 3citrix.com/secure Identity and access • Authentication – Control and secure access to all apps including SaaS apps (e.g. Office 365) by providing two-factor authentication and federation • Authorization – Provide appropriate levels of access specific to applications and resources based on group membership, location, and task • Access Control – Perform endpoint analysis and enable contextual access control where access to resources is granted or restricted based on dynamic parameters such as the user’s endpoint and other situational aspects Network security • Remote Access – Provide encrypted delivery of virtual applications and desktops to employees and third parties (contractors, vendors, partners) wherever they may be working • Segmentation – Enforce network access control and dynamically segment networks and services to limit lateral movement throughout the network while assuring compliance and security • Availability – Provide service optimization and load balancing with intelligent health monitoring to maintain the highest level of service uptime and performance App security • Centralization – Application and operating system patch management and configuration management are centralized to avoid inefficiency, inconsistency and security gaps • Containerization – Provide a suite of securely containerized business productivity apps that have micro VPN access to organizational resources even from employee-owned smartphones and tablets • Inspection – Provide protection against zero-day, logic flaws, and denial of service attacks against critical business services Data security • Centralization – Prevent data from residing on the endpoints by keeping data in the data center to mitigate against data loss and leakage due to lost, stolen, compromised or destroyed endpoints • Containerization – Address insecure mobile data storage with containerization to separate personal and business apps along with their associated data to enforce segmentation at the app level and data encryption • File Sharing – Enable file sharing within and outside the organization that has security built-in at every level from authentication, authorization, and auditing to DLP, encryption and expiry Monitoring & response • Visibility – Visibility into user level activity enables IT to triage performance degradation and quickly identify the source, whether on the endpoint, network, or server side • Auditing – Multiple levels of monitoring and detailed logging exist to detect misconfigura- tions, attacks and usage patterns • Compliance – Secure traffic from the endpoint to inside the data center using Common Criteria validated configurations and FIPS 140-2 capabilities across Citrix HDX protocols and Citrix NetScaler to comply with regulations and requirements and reduce the scope of audits
  • 4. Executive Brief Security 4 About Citrix Citrix (NASDAQ:CTXS) is leading the transition to software-defining the workplace, uniting virtualization, mobility management, networking and SaaS solutions to enable new ways for businesses and people to work better. Citrix solutions power business mobility through secure, mobile workspaces that provide people with instant access to apps, desktops, data and communications on any device, over any network and cloud. With annual revenue in 2014 of $3.14 billion, Citrix solutions are in use at more than 330,000 organizations and by over 100 million users globally. Learn more at www.citrix.com. Copyright © 2015 Citrix Systems, Inc. All rights reserved. Citrix, HDX, Netscaler, XenApp, XenDesktop, XenMobile and ShareFile are trademarks of Citrix Systems, Inc. and/or one of its subsidiaries, and may be registered in the U.S. and other countries. Other product and company names mentioned herein may be trademarks of their respective companies. 1215/PDF/10938citrix.com/secure Citrix delivers across security pillars with a complete portfolio including XenApp and XenDesktop to manage apps and desktops centrally inside the data center, XenMobile to secure mobile applications and devices with a great user experience, ShareFile to provide controlled and audited data access, storage and sharing both on-prem and in the cloud, and NetScaler to contextualize and control connectivity with end-to-end system and user visibility. Citrix solutions also integrate with third-party security products for advanced levels of system management and identity, endpoint and network protection. Citrix is proven and trusted to protect the most sensitive information As organizations focus on introducing new technologies to enable business and personal mobility, dynamically assessing and managing risk is crucial. And, these risks must be managed while delivering all apps (Windows, web, SaaS and mobile), building agile data centers and leveraging cloud services. Citrix is trusted to protect our customers’ most sensitive information, giving powerful options to control application and data access across any location, network and device. At the same time, employees, contractors and partners have the flexibility to choose how they work. Simple and secure access to their virtual workspace with all the resources they need whether remote, mobile or in the office allows them to best perform their job. Moreover end-to-end visibility of connections, traffic and user activity allows IT to address privacy, compliance and risk management priorities without compromising workforce productivity and workplace transformation initiatives. No other vendor offers the breadth of app, data and networking security proven to protect and secure the world’s most important apps—the apps businesses run on. Best-of-breed technologies for security and integration across app, data and usage makes Citrix the clear choice for protection of sensitive information, privacy and compliance without compromising workforce flexibility and productivity. Learn more about Citrix security at www.citrix.com/secure.