BYOD is still a thing, now more than ever!
BYOD has been around for a long time in practice, although the acronym was not popularized until 2011, when Citrix started to highlight the benefits. The fundamental desire for flexibility to work from anywhere on any device was true …
The post BYOD is still a thing, now more than ever! first appeared on Citrix Blogs.
Hybrid cloud security with zero trust solutions from Citrix
The growth in hybrid work creates challenges for IT admins everywhere. How do you keep remote workers safe? How do you protect endpoints? What do you do about unmanaged devices? How do you secure sensitive corporate data and resources while …
The post Hybrid cloud security with zero trust solutions from Citrix first appeared on Citrix Blogs.
Delivering enterprise web apps with Citrix Workspace Browser
When consumerization of IT was the next big thing, enterprises spent a lot of time and money modernizing apps and working to accommodate the way employees want to work. Many of those changes truly improved the way people work every …
The post Delivering enterprise web apps with Citrix Workspace Browser first appeared on Citrix Blogs.
How Citrix Web App Firewall can help mitigate risk of authentication bypass vulnerability
Citrix has crafted new signatures and has updated its Citrix Web App Firewall signature file to help customers mitigate the recent authentication bypass vulnerability in multiple versions of Atlassian Confluence app (versions prior to 2.7.38 and 3.0.5). The vulnerability (…
The post How Citrix Web App Firewall can help mitigate risk of authentication bypass vulnerability first appeared on Citrix Blogs.
Get highly flexible, SaaS-based app delivery and security with Citrix
Last November, Citrix introduced a paradigm-shifting advancement in application delivery with the first intent-based app delivery and security service. Citrix App Delivery and Security Service consists of two SaaS offerings — Self Managed and Citrix Managed. Self Managed …
The post Get highly flexible, SaaS-based app delivery and security with Citrix first appeared on Citrix Blogs.
What to know about zero trust architectures
Zero trust architectures have gained rapid adoption by cybersecurity teams recently with the rise of knowledge workers moving to remote or hybrid work models. The need to secure access for these workers without compromising their productivity, especially in light of …
The post What to know about zero trust architectures first appeared on Citrix Blogs.
How to implement zero trust security for your network
Read full post . . . or http://www.go-que.com/how-to-implement-zero-trust-security-for-your-network
“Never trust, always verify” and “just enough” access.
These are the key philosophies behind zero trust approaches to cybersecurity. Although the name zero trust speaks for itself, cybersecurity architectures based on zero trust approaches ensure that your data, and infrastructure …
The post How to implement zero trust security for your network first appeared on Citrix Blogs.
It’s time to stop using consumer browsers for work
It has been 32 years since the world’s first browser — the “WorldWideWeb browser” — was created by Tim Berners-Lee at CERN, and yet the two most-used browsers have only been around for half that time! The world of browsers …
The post It’s time to stop using consumer browsers for work first appeared on Citrix Blogs.
How to create a zero trust network
Looking to achieve zero trust security for your business?
You’re not alone.
The White House recently released an edict declaring the implementation of a federal zero-trust architecture (ZTA) requiring all agencies to comply with specific cybersecurity standards and objectives by …
The post How to create a zero trust network first appeared on Citrix Blogs.
Related Stories
Zero trust architecture benefits for your business
In a perfect world, you could turn a blind eye to your company network and safely trust that anyone trying to access it had the purest intentions. But in reality, there’s no telling how or when a malicious actor might …
The post Zero trust architecture benefits for your business first appeared on Citrix Blogs.