Search Results for “cybersecurity” – Citrix Blogs https://www.citrix.com/blogs Official Citrix Blogs Wed, 02 Apr 2025 16:41:32 +0000 en-US hourly 1 https://wordpress.org/?v=6.8.1 Citrix’s approach to Secure by Design https://www.citrix.com/blogs/2025/04/02/citrixs-approach-to-secure-by-design/ Wed, 02 Apr 2025 16:28:32 +0000 https://www.citrix.com/blogs/?p=174261750

Citrix has established itself as a leader in enabling secure, hybrid work environments through its industry-leading virtualization, secure private access, and application delivery products. For decades, we’ve empowered organizations to achieve operational flexibility while maintaining robust security standards. Our recent

]]>

Citrix has established itself as a leader in enabling secure, hybrid work environments through its industry-leading virtualization, secure private access, and application delivery products. For decades, we’ve empowered organizations to achieve operational flexibility while maintaining robust security standards. Our recent

]]>
Password spraying attacks on NetScaler/NetScaler Gateway – December 2024 https://www.citrix.com/blogs/2024/12/13/password-spraying-attacks-netscaler-december-2024/ Fri, 13 Dec 2024 14:17:04 +0000 https://www.citrix.com/blogs/?p=174261651

Cloud Software Group is aware of a recent series of password spraying attacks directed at various organizations around the globe. These attacks have been seen across various products and platforms, suggesting an industry-wide issue, as highlighted in the following resources:

]]>

Cloud Software Group is aware of a recent series of password spraying attacks directed at various organizations around the globe. These attacks have been seen across various products and platforms, suggesting an industry-wide issue, as highlighted in the following resources:

]]>
Citrix Secure Private Access for ZTNA now supports Linux https://www.citrix.com/blogs/2024/11/14/citrix-secure-private-access-for-ztna-now-supports-linux/ Thu, 14 Nov 2024 14:25:22 +0000 https://www.citrix.com/blogs/?p=174261590

Citrix Secure Private Access provides zero trust network access (ZTNA) to private applications. It provides stronger security than a VPN, a simpler way to connect to cloud and on-premises data centers, and an easier way to scale access to private

]]>

Citrix Secure Private Access provides zero trust network access (ZTNA) to private applications. It provides stronger security than a VPN, a simpler way to connect to cloud and on-premises data centers, and an easier way to scale access to private

]]>
This Cybersecurity Awareness Month, Enhance Security with Citrix Zero Trust Application Delivery https://www.citrix.com/blogs/2024/10/16/this-cybersecurity-awareness-month-enhance-security-with-citrix-zero-trust-application-delivery/ Wed, 16 Oct 2024 20:32:18 +0000 https://www.citrix.com/blogs/?p=174261537

As we recognize Cybersecurity Awareness Month this October, it’s the perfect opportunity to reassess how we secure applications in today’s rapidly evolving technology landscape. With the increase of remote work, cloud-based applications, and SaaS platforms, attack surfaces have expanded

]]>

As we recognize Cybersecurity Awareness Month this October, it’s the perfect opportunity to reassess how we secure applications in today’s rapidly evolving technology landscape. With the increase of remote work, cloud-based applications, and SaaS platforms, attack surfaces have expanded

]]>
金融機関に対するサイバーセキュリティ https://www.citrix.com/blogs/2024/08/30/cybersecurity-financial-services/ Fri, 30 Aug 2024 11:17:37 +0000 https://www.citrix.com/blogs/?p=174261405

サイバー犯罪はあらゆる業界で増加傾向にあり、企業は新たなセキュリティ対策の導入を迫られています。現在、データ侵害の世界平均コストは約445万ドルであり、当然ながら多くの企業は新たなセキュリティソリューションに投資しています。これは特に金融機関に当てはまります。その理由は、セキュリティ侵害はコストがかかるだけでなく、顧客の信頼を失い、組織の評判にも悪影響を及ぼすからです。

驚くべきことではなく、銀行や投資会社がリスク低減とレジリエンス強化に投資していることは、明らかです。Gartner 2023 CIO and Technology Executive Surveyによると、これらの企業のCIOは2023年に、サイバーセキュリティ、データとアナリティクス、統合テクノロジー、クラウド、に最も多くの新規または追加資金を使うとしていました。しかしながら、セキュリティを強化しても、従業員がそのセキュリティ対策に従わなければ何の意味もありません。別のGartner surveyでは、自分自身やチームのビジネス目標達成を優先すれば、従業員の74%がサイバーセキュリティのガイダンスに従わないと回答しました。金融機関は、強固なセキュリティを備えた柔軟性高いデジタル戦略を採用し、データを侵害から保護すると同時に、重要なシステムへのセキュアでコンプライアンス準拠のリモートアクセスを可能にしなければなりません。これがシステムのサイロ化をなくし、顧客価値の向上につながります。

サイバー脅威の増大

データ侵害のコストは年々増加しているだけでなく、サイバー攻撃の件数も増加傾向にあります。米国国土安全保障省によると、2020年から2022年にかけて米国ではランサムウェア攻撃が47%増加し、2023年上半期にはランサムウェア攻撃の被害額が世界中で4億4,910万ドルに上ったそうです。つまり、ランサムウェア攻撃は順調に拡大し、過去最高の利益を記録することが確実なのです

加えて、大きな組織を狙う手口が目立つようになり大手金融機関は悪意を持った者たちの標的となっています。こうした脅威に先手を打つために、金融機関は脅威検知に向けたAI、生体認証、ブロックチェーンといった高度な防御策を導入する必要があります。技術が進歩するにつれ、サイバー脅威の高度化も進んでおり、銀行は多層的なセキュリティ戦略を採用し、量子コンピューティングのような未来の手法も考慮する必要に迫られています。

シトリックスは幅広い多要素認証製品と連携可能です。最適なIDプロバイダー(IdP)を使用して、お客様のビジネスデータを保護します。さらにNetScalerが、API保護、DDoS保護、ボット攻撃緩和のためのセキュアなアプリケーション配信を強化します。

リスク管理、規制、コンプライアンス 

金融機関はデータを保護するために多大な努力を積み重ねていますが、国や地域の規制に対処しなければなりません。リスク管理と規制コンプライアンスは金融機関にとって常にある課題です。、ユーザー体験とセキュリティを高める可能性がある一方で、厳格な規制遵守に関する機能を持たない新技術の導入には注意が必要です。例えばCapital Oneは、2019年に発生した大規模な顧客データ漏洩に関して、厳重なサイバーセキュリティ対策を実施しなかったとして、1億9,000万ドルの和解金

]]>

サイバー犯罪はあらゆる業界で増加傾向にあり、企業は新たなセキュリティ対策の導入を迫られています。現在、データ侵害の世界平均コストは約445万ドルであり、当然ながら多くの企業は新たなセキュリティソリューションに投資しています。これは特に金融機関に当てはまります。その理由は、セキュリティ侵害はコストがかかるだけでなく、顧客の信頼を失い、組織の評判にも悪影響を及ぼすからです。

驚くべきことではなく、銀行や投資会社がリスク低減とレジリエンス強化に投資していることは、明らかです。Gartner 2023 CIO and Technology Executive Surveyによると、これらの企業のCIOは2023年に、サイバーセキュリティ、データとアナリティクス、統合テクノロジー、クラウド、に最も多くの新規または追加資金を使うとしていました。しかしながら、セキュリティを強化しても、従業員がそのセキュリティ対策に従わなければ何の意味もありません。別のGartner surveyでは、自分自身やチームのビジネス目標達成を優先すれば、従業員の74%がサイバーセキュリティのガイダンスに従わないと回答しました。金融機関は、強固なセキュリティを備えた柔軟性高いデジタル戦略を採用し、データを侵害から保護すると同時に、重要なシステムへのセキュアでコンプライアンス準拠のリモートアクセスを可能にしなければなりません。これがシステムのサイロ化をなくし、顧客価値の向上につながります。

サイバー脅威の増大

データ侵害のコストは年々増加しているだけでなく、サイバー攻撃の件数も増加傾向にあります。米国国土安全保障省によると、2020年から2022年にかけて米国ではランサムウェア攻撃が47%増加し、2023年上半期にはランサムウェア攻撃の被害額が世界中で4億4,910万ドルに上ったそうです。つまり、ランサムウェア攻撃は順調に拡大し、過去最高の利益を記録することが確実なのです

加えて、大きな組織を狙う手口が目立つようになり大手金融機関は悪意を持った者たちの標的となっています。こうした脅威に先手を打つために、金融機関は脅威検知に向けたAI、生体認証、ブロックチェーンといった高度な防御策を導入する必要があります。技術が進歩するにつれ、サイバー脅威の高度化も進んでおり、銀行は多層的なセキュリティ戦略を採用し、量子コンピューティングのような未来の手法も考慮する必要に迫られています。

シトリックスは幅広い多要素認証製品と連携可能です。最適なIDプロバイダー(IdP)を使用して、お客様のビジネスデータを保護します。さらにNetScalerが、API保護、DDoS保護、ボット攻撃緩和のためのセキュアなアプリケーション配信を強化します。

リスク管理、規制、コンプライアンス 

金融機関はデータを保護するために多大な努力を積み重ねていますが、国や地域の規制に対処しなければなりません。リスク管理と規制コンプライアンスは金融機関にとって常にある課題です。、ユーザー体験とセキュリティを高める可能性がある一方で、厳格な規制遵守に関する機能を持たない新技術の導入には注意が必要です。例えばCapital Oneは、2019年に発生した大規模な顧客データ漏洩に関して、厳重なサイバーセキュリティ対策を実施しなかったとして、1億9,000万ドルの和解金

]]>
uberAgent 7.2: Optimize Data, Elevate Security! https://www.citrix.com/blogs/2024/04/30/uberagent-7-2-optimize-data-elevate-security/ Tue, 30 Apr 2024 10:39:38 +0000 https://www.citrix.com/blogs/?p=174260716

More than just an incremental upgrade! The release of uberAgent 7.2 represents a comprehensive evolution in cybersecurity defenses and the enhancement of End-user Computing experience (EUCx), as the agent capabilities for macOS endpoints have dramatically increased since the last version.

]]>

More than just an incremental upgrade! The release of uberAgent 7.2 represents a comprehensive evolution in cybersecurity defenses and the enhancement of End-user Computing experience (EUCx), as the agent capabilities for macOS endpoints have dramatically increased since the last version.

]]>
Cybersecurity for financial services https://www.citrix.com/blogs/2024/03/19/cybersecurity-for-financial-services/ Tue, 19 Mar 2024 13:45:18 +0000 https://www.citrix.com/blogs/?p=174260649

Cybercrime is on the rise across every industry, pushing organizations to adopt new security measures. Now that the global average data breach costs around 4.45 million dollars, it’s no surprise that so many organizations are investing in new security solutions.

]]>

Cybercrime is on the rise across every industry, pushing organizations to adopt new security measures. Now that the global average data breach costs around 4.45 million dollars, it’s no surprise that so many organizations are investing in new security solutions.

]]>
Citrix 2024 roadmap: Protecting business-critical apps and data https://www.citrix.com/blogs/2024/03/12/citrix-2024-roadmap-protecting-business-critical-apps-and-data/ Tue, 12 Mar 2024 18:35:01 +0000 https://www.citrix.com/blogs/?p=174260632

The number one concern across all of our customers is security. With the average cost of a data breach in 2023 costing over 4.45 million, companies have good reason to invest in their security and zero trust infrastructure. Per

]]>

The number one concern across all of our customers is security. With the average cost of a data breach in 2023 costing over 4.45 million, companies have good reason to invest in their security and zero trust infrastructure. Per

]]>
Evolution of Cybersecurity in Healthcare: Insights from a CIO https://www.citrix.com/blogs/2024/02/20/evolution-of-cybersecurity-in-healthcare-insights-from-a-cio/ Tue, 20 Feb 2024 14:42:42 +0000 https://www.citrix.com/blogs/?p=174260545

In the increasingly digitized world of healthcare, safeguarding sensitive patient data and ensuring the integrity of critical systems are both top concerns. Here, Michelle Leafloor, VP of Health Information Technology Services and CIO at Hamilton Health Sciences, shares insights into

]]>

In the increasingly digitized world of healthcare, safeguarding sensitive patient data and ensuring the integrity of critical systems are both top concerns. Here, Michelle Leafloor, VP of Health Information Technology Services and CIO at Hamilton Health Sciences, shares insights into

]]>
Top 5 business challenges we heard from customers in 2023 https://www.citrix.com/blogs/2024/01/16/top-5-business-challenges-we-heard-from-customers-in-2023/ Tue, 16 Jan 2024 16:46:50 +0000 https://www.citrix.com/blogs/?p=174260502

This blog was co-authored by Dave Brear, Senior Principal Solution Architect at Citrix.

2023 was a challenging year for many businesses. Geopolitical instability and financial uncertainty have had broad reaching implications. Hybrid work continues to be in a state of

]]>

This blog was co-authored by Dave Brear, Senior Principal Solution Architect at Citrix.

2023 was a challenging year for many businesses. Geopolitical instability and financial uncertainty have had broad reaching implications. Hybrid work continues to be in a state of

]]>
5 reasons to use Citrix Security solutions for your healthcare organization https://www.citrix.com/blogs/2023/09/18/5-reasons-to-use-citrix-security-solutions-for-your-healthcare-organization/ Mon, 18 Sep 2023 13:30:44 +0000 https://www.citrix.com/blogs/?p=174260173

Cybersecurity is on everyone’s mind. Especially when the data that you need to protect, like electronic health records (EHRs), contains sensitive patient information. Cyber attacks are on the rise across the healthcare industry so now is the time to strengthen

]]>

Cybersecurity is on everyone’s mind. Especially when the data that you need to protect, like electronic health records (EHRs), contains sensitive patient information. Cyber attacks are on the rise across the healthcare industry so now is the time to strengthen

]]>
The Successful 2023 Collaboration of Citrix and Google: An Inside Look https://www.citrix.com/blogs/2023/08/07/the-successful-2023-collaboration-of-citrix-and-google/ Mon, 07 Aug 2023 14:30:28 +0000 https://www.citrix.com/blogs/?p=174260106

In the current era of hybrid work, businesses are constantly looking to optimize operational costs while addressing challenges such as increased cybersecurity risks and loss of control over IT governance. Amid these concerns, finding suitable business solutions that meet specific

]]>

In the current era of hybrid work, businesses are constantly looking to optimize operational costs while addressing challenges such as increased cybersecurity risks and loss of control over IT governance. Amid these concerns, finding suitable business solutions that meet specific

]]>
The time is now to prioritize connected ecosystems in the manufacturing industry https://www.citrix.com/blogs/2023/06/08/the-time-is-now-to-prioritize-connected-ecosystems-in-the-manufacturing-industry/ Thu, 08 Jun 2023 18:05:55 +0000 https://citrixblogs.wpengine.com/?p=174259851

If ever there was a time for the manufacturing industry to futureproof themselves and their supply chains, that time is now. Recent global events have created unprecedented change, forcing companies to look for ways to embed security, resilience, and agility …

]]>

If ever there was a time for the manufacturing industry to futureproof themselves and their supply chains, that time is now. Recent global events have created unprecedented change, forcing companies to look for ways to embed security, resilience, and agility …

]]>
Meet the biggest threat to your security, and how to protect your employees https://www.citrix.com/blogs/2023/06/05/meet-the-biggest-threat-to-your-security-and-how-to-protect-your-employees/ Mon, 05 Jun 2023 15:30:32 +0000 https://citrixblogs.wpengine.com/?p=174259796

We all make mistakes. Perhaps we left our laptop open when we got up at a coffee shop. Maybe we clicked a link inside an official-looking email. And who among us hasn’t used the same password across multiple web apps …

]]>

We all make mistakes. Perhaps we left our laptop open when we got up at a coffee shop. Maybe we clicked a link inside an official-looking email. And who among us hasn’t used the same password across multiple web apps …

]]>
The prescription to secure endpoints in healthcare is IGEL OS https://www.citrix.com/blogs/2023/03/29/the-prescription-to-secure-endpoints-in-healthcare-is-igel-os/ Wed, 29 Mar 2023 22:00:43 +0000 https://citrixblogs.wpengine.com/?p=174259495

This is a guest blog post by Sydney Atlass, Marketing Operations Specialist at IGEL.

In 2022, 25 percent of ransomware attacks targeted healthcare organizations. This equates to more than 300 hospitals that were hit with ransomware, resulting in compromised …

]]>

This is a guest blog post by Sydney Atlass, Marketing Operations Specialist at IGEL.

In 2022, 25 percent of ransomware attacks targeted healthcare organizations. This equates to more than 300 hospitals that were hit with ransomware, resulting in compromised …

]]>
Enhance security protocols for remote healthcare employees, contractors with SessionGuardian https://www.citrix.com/blogs/2023/03/29/enhance-security-protocols-for-remote-healthcare-employees-contractors-with-sessionguardian/ Wed, 29 Mar 2023 14:00:51 +0000 https://citrixblogs.wpengine.com/?p=174259415

This is a guest blog post by Cristina Roa, VP of Global Business Development at SessionGuardian.

Can you prove who’s looking at your healthcare organization’s sensitive protected health information (PHI)? Most organizations cannot verify the identity of users logging …

]]>

This is a guest blog post by Cristina Roa, VP of Global Business Development at SessionGuardian.

Can you prove who’s looking at your healthcare organization’s sensitive protected health information (PHI)? Most organizations cannot verify the identity of users logging …

]]>
Uncover VDI and DaaS data risks with in-session clipboard monitoring https://www.citrix.com/blogs/2023/03/16/uncover-vdi-and-daas-data-risks-with-in-session-clipboard-monitoring/ Thu, 16 Mar 2023 19:15:09 +0000 https://citrixblogs.wpengine.com/?p=174259323

This blog post was co-authored by Gavin Strong, Pre-Sales Engineer at Citrix.

To meet the needs of a fast-growing, distributed workforce, organizations have rolled out virtual desktop infrastructure (VDI) with a goal of improving employee productivity and the end-user experience.…

]]>

This blog post was co-authored by Gavin Strong, Pre-Sales Engineer at Citrix.

To meet the needs of a fast-growing, distributed workforce, organizations have rolled out virtual desktop infrastructure (VDI) with a goal of improving employee productivity and the end-user experience.…

]]>
Overcoming observed challenges when adopting a zero trust architecture https://www.citrix.com/blogs/2023/01/25/overcoming-observed-challenges-when-adopting-a-zero-trust-architecture/ Wed, 25 Jan 2023 21:15:31 +0000 https://citrixblogs.wpengine.com/?p=174258872

Zero trust has become a crucial component in the cybersecurity strategy of organizations everywhere. More and more enterprises are finding themselves turning toward zero trust architecture to keep their data, infrastructure, and other assets safe. As a result, this concept …

]]>

Zero trust has become a crucial component in the cybersecurity strategy of organizations everywhere. More and more enterprises are finding themselves turning toward zero trust architecture to keep their data, infrastructure, and other assets safe. As a result, this concept …

]]>
Critical security update now available for Citrix ADC, Citrix Gateway https://www.citrix.com/blogs/2022/12/13/critical-security-update-now-available-for-citrix-adc-citrix-gateway/ Tue, 13 Dec 2022 12:00:16 +0000 https://citrixblogs.wpengine.com/?p=174258688

Today we released builds to fix CVE-2022-27518, which affects the following Citrix ADC and Citrix Gateway versions: 12.1 (including FIPS and NDcPP) and 13.0 before 13.0-58.32 of Citrix ADC and Citrix Gateway, both of which must be configured with an

]]>

Today we released builds to fix CVE-2022-27518, which affects the following Citrix ADC and Citrix Gateway versions: 12.1 (including FIPS and NDcPP) and 13.0 before 13.0-58.32 of Citrix ADC and Citrix Gateway, both of which must be configured with an

]]>
Announcing Europe-based Citrix DaaS control plane on Google Cloud https://www.citrix.com/blogs/2022/11/02/announcing-europe-based-citrix-daas-control-plane-on-google-cloud/ Wed, 02 Nov 2022 14:00:29 +0000 https://citrixblogs.wpengine.com/?p=174258435

There has been no lack of exciting news coming from the Citrix and Google partnership this year. From introducing two new purpose-built Citrix DaaS editions in the Google Marketplace to rolling out new technical capabilities like Citrix Provisioning Service for …

]]>

There has been no lack of exciting news coming from the Citrix and Google partnership this year. From introducing two new purpose-built Citrix DaaS editions in the Google Marketplace to rolling out new technical capabilities like Citrix Provisioning Service for …

]]>
Engineer a secure future in Industry 4.0 https://www.citrix.com/blogs/2022/10/19/engineer-a-secure-future-in-industry-4-0/ Wed, 19 Oct 2022 17:00:08 +0000 https://citrixblogs.wpengine.com/?p=174258363

Today’s manufacturer isn’t short of challenges. Supply chain disruptions and labor shortages are just some of the obstacles it must address. Another is the ever-increasing risk of a cyberattack. In this blog post, we look at what makes the industry …

]]>

Today’s manufacturer isn’t short of challenges. Supply chain disruptions and labor shortages are just some of the obstacles it must address. Another is the ever-increasing risk of a cyberattack. In this blog post, we look at what makes the industry …

]]>
Five hot topics for the manufacturing supply chain https://www.citrix.com/blogs/2022/09/26/five-hot-topics-for-the-manufacturing-supply-chain/ Mon, 26 Sep 2022 14:00:08 +0000 https://citrixblogs.wpengine.com/?p=174258101

If ever there was a time for the manufacturing industry to futureproof itself and its supply chains, that time is now. Recent global events have created unprecedented change in the industry, forcing companies to look for ways to embed security, …

]]>

If ever there was a time for the manufacturing industry to futureproof itself and its supply chains, that time is now. Recent global events have created unprecedented change in the industry, forcing companies to look for ways to embed security, …

]]>
6 essential steps for planning a hybrid cloud migration https://www.citrix.com/blogs/2022/09/20/plan-hybrid-cloud-migration-in-6-steps/ Tue, 20 Sep 2022 14:00:19 +0000 https://citrixblogs.wpengine.com/?p=174258069

Are you considering moving some of your on-premises workloads to the cloud? Many organizations are migrating to hybrid cloud environments. This allows them to enjoy the benefits of the cloud while continuing to leverage existing datacenter investments. Here are some …

]]>

Are you considering moving some of your on-premises workloads to the cloud? Many organizations are migrating to hybrid cloud environments. This allows them to enjoy the benefits of the cloud while continuing to leverage existing datacenter investments. Here are some …

]]>
What to know about zero trust architectures https://www.citrix.com/blogs/2022/08/30/what-to-know-about-zero-trust-architectures/ Tue, 30 Aug 2022 14:00:30 +0000 https://citrixblogs.wpengine.com/?p=174257883

Zero trust architectures have gained rapid adoption by cybersecurity teams recently with the rise of knowledge workers moving to remote or hybrid work models. The need to secure access for these workers without compromising their productivity, especially in light of …

]]>

Zero trust architectures have gained rapid adoption by cybersecurity teams recently with the rise of knowledge workers moving to remote or hybrid work models. The need to secure access for these workers without compromising their productivity, especially in light of …

]]>
How to implement zero trust security for your network https://www.citrix.com/blogs/2022/08/25/how-to-implement-zero-trust-network/ Thu, 25 Aug 2022 14:00:30 +0000 https://citrixblogs.wpengine.com/?p=174257855

“Never trust, always verify” and “just enough” access.

These are the key philosophies behind zero trust approaches to cybersecurity. Although the name zero trust speaks for itself, cybersecurity architectures based on zero trust approaches ensure that your data, and infrastructure …

]]>

“Never trust, always verify” and “just enough” access.

These are the key philosophies behind zero trust approaches to cybersecurity. Although the name zero trust speaks for itself, cybersecurity architectures based on zero trust approaches ensure that your data, and infrastructure …

]]>
How to create a zero trust network https://www.citrix.com/blogs/2022/08/18/how-to-create-zero-trust-network/ Thu, 18 Aug 2022 14:00:41 +0000 https://citrixblogs.wpengine.com/?p=174257846

Looking to achieve zero trust security for your business?

You’re not alone.

The White House recently released an edict declaring the implementation of a federal zero-trust architecture (ZTA) requiring all agencies to comply with specific cybersecurity standards and objectives by …

]]>

Looking to achieve zero trust security for your business?

You’re not alone.

The White House recently released an edict declaring the implementation of a federal zero-trust architecture (ZTA) requiring all agencies to comply with specific cybersecurity standards and objectives by …

]]>
Zero trust architecture benefits for your business https://www.citrix.com/blogs/2022/08/16/zero-trust-architecture-benefits-for-your-business/ Tue, 16 Aug 2022 14:00:03 +0000 https://citrixblogs.wpengine.com/?p=174257798

In a perfect world, you could turn a blind eye to your company network and safely trust that anyone trying to access it had the purest intentions. But in reality, there’s no telling how or when a malicious actor might …

]]>

In a perfect world, you could turn a blind eye to your company network and safely trust that anyone trying to access it had the purest intentions. But in reality, there’s no telling how or when a malicious actor might …

]]>
Seven principles of the zero trust security model https://www.citrix.com/blogs/2022/08/11/seven-principles-of-zero-trust-security-model/ Thu, 11 Aug 2022 15:15:17 +0000 https://citrixblogs.wpengine.com/?p=174257642

The reality of today’s fast-paced, increasingly remote work environment positions your business as vulnerable to security breaches. Your employees increasingly rely on their own unprotected devices for work, leveraging SaaS and web-based apps to access your valuable assets and data.…

]]>

The reality of today’s fast-paced, increasingly remote work environment positions your business as vulnerable to security breaches. Your employees increasingly rely on their own unprotected devices for work, leveraging SaaS and web-based apps to access your valuable assets and data.…

]]>
What is the difference between virtualization and cloud computing? https://www.citrix.com/blogs/2022/08/10/difference-between-virtualization-and-cloud-computing/ Wed, 10 Aug 2022 14:00:50 +0000 https://citrixblogs.wpengine.com/?p=174257763

Users often get confused between virtualization and cloud computing. While virtualization and cloud computing both create useful environments, there are key differences between the two technologies. In short, virtualization creates simulated versions of a machine’s software or hardware components, while …

]]>

Users often get confused between virtualization and cloud computing. While virtualization and cloud computing both create useful environments, there are key differences between the two technologies. In short, virtualization creates simulated versions of a machine’s software or hardware components, while …

]]>
Why should you evolve your multi-factor authentication to adaptive authentication? https://www.citrix.com/blogs/2022/08/04/multi-factor-authenticaton-vs-adaptive-authentication/ Thu, 04 Aug 2022 14:00:18 +0000 https://citrixblogs.wpengine.com/?p=174257757

As organizations embrace digital transformation, the need to protect data and control who accesses it increases. Distributed workforces and online users compound the challenge since they often need remote access to critical apps and data. Many organizations also have …

]]>

As organizations embrace digital transformation, the need to protect data and control who accesses it increases. Distributed workforces and online users compound the challenge since they often need remote access to critical apps and data. Many organizations also have …

]]>
DaaS and VDI vs. VPN: Which is best for your business? https://www.citrix.com/blogs/2022/07/26/daas-and-vdi-vs-vpn/ Tue, 26 Jul 2022 14:00:19 +0000 https://citrixblogs.wpengine.com/?p=174257630

While VPNs have traditionally connected an end-user with the organization’s private network, VDI and DaaS enable users to securely connect to a fully virtual workspace.

As organizations embrace remote and hybrid work models, cybersecurity risks grow. According to our latest …

]]>

While VPNs have traditionally connected an end-user with the organization’s private network, VDI and DaaS enable users to securely connect to a fully virtual workspace.

As organizations embrace remote and hybrid work models, cybersecurity risks grow. According to our latest …

]]>
How Citrix can help customers achieve zero trust maturity https://www.citrix.com/blogs/2022/07/21/how-citrix-can-help-customers-achieve-zero-trust-maturity/ Thu, 21 Jul 2022 14:00:08 +0000 https://citrixblogs.wpengine.com/?p=174257605

Information technology has evolved, and so has the way we engage with it for work. With the proliferation of remote work, connected devices, cloud computing systems, and access points — how can we keep users safe without impeding their productivity?…

]]>

Information technology has evolved, and so has the way we engage with it for work. With the proliferation of remote work, connected devices, cloud computing systems, and access points — how can we keep users safe without impeding their productivity?…

]]>
Making healthcare IT better for patients, clinicians, and organizations https://www.citrix.com/blogs/2022/06/23/making-healthcare-it-better-for-patients-clinicians-and-organizations/ Thu, 23 Jun 2022 19:00:47 +0000 https://citrixblogs.wpengine.com/?p=174257384

The crisis in U.S. healthcare isn’t exactly a new development — but it’s getting worse, fast. Annual industry spending has soared to $3.8 trillion, or nearly one-fifth of the nation’s GDP. But for all their investment, healthcare organizations are struggling …

]]>

The crisis in U.S. healthcare isn’t exactly a new development — but it’s getting worse, fast. Annual industry spending has soared to $3.8 trillion, or nearly one-fifth of the nation’s GDP. But for all their investment, healthcare organizations are struggling …

]]>
Protect your workforce against browser-based attacks with a zero trust network https://www.citrix.com/blogs/2022/06/23/protect-from-browser-attacks-with-zero-trust-network/ Thu, 23 Jun 2022 14:00:00 +0000 https://citrixblogs.wpengine.com/?p=174257341

Which web browsing risks concern you the most?

Businesses are faced with the reality of threat actors attempting to access their networks and infrastructure and getting access to their applications and data. Today’s workforce is increasingly remote-capable, and chances are …

]]>

Which web browsing risks concern you the most?

Businesses are faced with the reality of threat actors attempting to access their networks and infrastructure and getting access to their applications and data. Today’s workforce is increasingly remote-capable, and chances are …

]]>
MFA, SAML, and SSO with 10ZiG and Citrix https://www.citrix.com/blogs/2022/06/16/mfa-saml-and-sso-with-10zig-and-citrix/ Thu, 16 Jun 2022 14:00:02 +0000 https://citrixblogs.wpengine.com/?p=174257306

This is a guest blog post by Jason Hudson, Technical Solutions Architect, and Michele Pelusi, Marketing Manager U.S. at 10ZiG.

Username entered. Password entered. We’re signing in … but wait, what about security? In today’s world, you can never …

]]>

This is a guest blog post by Jason Hudson, Technical Solutions Architect, and Michele Pelusi, Marketing Manager U.S. at 10ZiG.

Username entered. Password entered. We’re signing in … but wait, what about security? In today’s world, you can never …

]]>
Reduce remote cybersecurity risks with ZTNA as a service https://www.citrix.com/blogs/2022/06/14/ztna-as-a-service-reduces-cybersecurity-risks/ Tue, 14 Jun 2022 14:30:14 +0000 https://citrixblogs.wpengine.com/?p=174257300

How are you managing the risk presented by your employees using personal devices to access corporate resources outside the office?

The reality of an increasingly remote workforce means your valuable data and information is being requested from devices you may …

]]>

How are you managing the risk presented by your employees using personal devices to access corporate resources outside the office?

The reality of an increasingly remote workforce means your valuable data and information is being requested from devices you may …

]]>
Citrix ZTNA solutions help organizations secure their remote workforces https://www.citrix.com/blogs/2022/06/09/citrix-ztna-solutions-help-organizations-secure-their-remote-workforces/ Thu, 09 Jun 2022 19:45:44 +0000 https://citrixblogs.wpengine.com/?p=174257280

Citrix has been in the business of delivering secure remote work through its digital workspace solutions for more than three decades. And leading companies around the world are using them to provide employees with access to the applications and insights …

]]>

Citrix has been in the business of delivering secure remote work through its digital workspace solutions for more than three decades. And leading companies around the world are using them to provide employees with access to the applications and insights …

]]>
Citrix named a Leader and Fast Mover in ZTNA market https://www.citrix.com/blogs/2022/06/07/citrix-named-a-leader-and-fast-mover-in-ztna-market/ Tue, 07 Jun 2022 18:20:50 +0000 https://citrixblogs.wpengine.com/?p=174257252

With RSA Conference 2022 happening in San Francisco this week, we’re proud to announce that Citrix was named a Leader and Fast Mover in GigaOm’s Radar report for ZTNA.

Citrix offers a complete ZTNA solution with very strong, well-thought-out

]]>

With RSA Conference 2022 happening in San Francisco this week, we’re proud to announce that Citrix was named a Leader and Fast Mover in GigaOm’s Radar report for ZTNA.

Citrix offers a complete ZTNA solution with very strong, well-thought-out

]]>
ZTNA Vendors: What to look for https://www.citrix.com/blogs/2022/06/06/zero-trust-network-access-ztna-vendors/ Mon, 06 Jun 2022 14:00:52 +0000 https://citrixblogs.wpengine.com/?p=174257237

Zero trust network access (ZTNA) has been a watchword in digital security for years. Recently, the technology has reached a tipping point.

Two parallel trends have increased the importance of using ZTNA to connect users with companies’ digital resources. First, …

]]>

Zero trust network access (ZTNA) has been a watchword in digital security for years. Recently, the technology has reached a tipping point.

Two parallel trends have increased the importance of using ZTNA to connect users with companies’ digital resources. First, …

]]>
Are you protecting your third-party contractors from cyberattacks? https://www.citrix.com/blogs/2022/05/19/are-you-protecting-your-third-party-contractors-from-cyberattacks/ Thu, 19 May 2022 19:40:58 +0000 https://citrixblogs.wpengine.com/?p=174257142

Akshay Kakar, Principal Product Marketing Manager at Citrix, contributed to this blog post.

Cyberattacks should be a concern for everyone — businesses, government organizations, and consumers. Among the targets threat actors focus on as they search for weak links are …

]]>

Akshay Kakar, Principal Product Marketing Manager at Citrix, contributed to this blog post.

Cyberattacks should be a concern for everyone — businesses, government organizations, and consumers. Among the targets threat actors focus on as they search for weak links are …

]]>
ABAC vs. RBAC: What’s the difference? https://www.citrix.com/blogs/2022/05/17/abac-vs-rbac-comparison/ Tue, 17 May 2022 14:00:59 +0000 https://citrixblogs.wpengine.com/?p=174257090

Two of the most common methods for securing access to business resources are attribute-based access control (ABAC) and role-based access control (RBAC). These types of access control models determine authorization based on who the user is and what resources they’re …

]]>

Two of the most common methods for securing access to business resources are attribute-based access control (ABAC) and role-based access control (RBAC). These types of access control models determine authorization based on who the user is and what resources they’re …

]]>
How Citrix Analytics can help you protect your employees and your organization https://www.citrix.com/blogs/2022/03/24/how-citrix-analytics-can-help-you-protect-your-employees-and-your-organization/ Thu, 24 Mar 2022 17:15:04 +0000 https://citrixblogs.wpengine.com/?p=174256640

The massive shift to remote work and adoption of new technologies to support distributed workforces during the COVID-19 pandemic expanded the attack surface, creating challenges for organizations that were trying to enable access to essential resources and to keep employees …

]]>

The massive shift to remote work and adoption of new technologies to support distributed workforces during the COVID-19 pandemic expanded the attack surface, creating challenges for organizations that were trying to enable access to essential resources and to keep employees …

]]>
Take control of IT security for your organization https://www.citrix.com/blogs/2022/03/17/take-control-of-it-security-for-your-organization/ Thu, 17 Mar 2022 14:00:03 +0000 https://citrixblogs.wpengine.com/?p=174256526

You’re probably familiar with the idea of a computer network resembling a castle with tall walls, a single front gate, and a moat. But as we all know, that’s a poor way to secure modern IT infrastructure. With thousands of …

]]>

You’re probably familiar with the idea of a computer network resembling a castle with tall walls, a single front gate, and a moat. But as we all know, that’s a poor way to secure modern IT infrastructure. With thousands of …

]]>
Citrix ADC 12.1 achieves Common Criteria certification https://www.citrix.com/blogs/2022/03/07/citrix-adc-12-1-achieves-common-criteria-certification/ Mon, 07 Mar 2022 19:00:49 +0000 https://citrixblogs.wpengine.com/?p=174256428

Citrix is proud to announce that Citrix ADC version 12.1 has achieved Common Criteria certification. The evaluated configuration consists of the physical platforms MPX 8900 FIPS and MPX 15000-50G FIPS. We’re also thrilled to have the VPX FIPS virtual …

]]>

Citrix is proud to announce that Citrix ADC version 12.1 has achieved Common Criteria certification. The evaluated configuration consists of the physical platforms MPX 8900 FIPS and MPX 15000-50G FIPS. We’re also thrilled to have the VPX FIPS virtual …

]]>
How healthcare organizations can strengthen security, improve employee experience https://www.citrix.com/blogs/2022/03/07/how-healthcare-organizations-can-strengthen-security-improve-employee-experience/ Mon, 07 Mar 2022 15:00:58 +0000 https://citrixblogs.wpengine.com/?p=174256406

As we enter the third year of the pandemic, many healthcare organizations are reeling from burnout, revenue disruption, and shifting care-delivery models — not to mention the constant threat of cyberattack. But for all the challenges you’ve endured, the outlook …

]]>

As we enter the third year of the pandemic, many healthcare organizations are reeling from burnout, revenue disruption, and shifting care-delivery models — not to mention the constant threat of cyberattack. But for all the challenges you’ve endured, the outlook …

]]>
Help mitigate your organization’s cybersecurity risks https://www.citrix.com/blogs/2022/02/03/help-mitigate-your-organizations-cybersecurity-risks/ Thu, 03 Feb 2022 22:30:33 +0000 https://citrixblogs.wpengine.com/?p=174256145

Cybersecurity can often seem to present impossible challenges as organizations strive to repel attack attempts. But, really, cybersecurity’s is about risk management — layering on controls to reduce risk to an acceptable level.

Cybersecurity risk management requires a multi-faceted approach, …

]]>

Cybersecurity can often seem to present impossible challenges as organizations strive to repel attack attempts. But, really, cybersecurity’s is about risk management — layering on controls to reduce risk to an acceptable level.

Cybersecurity risk management requires a multi-faceted approach, …

]]>
Defending your organization against state-sponsored cyber campaigns https://www.citrix.com/blogs/2022/01/27/defending-your-organization-against-state-sponsored-cyber-campaigns/ Thu, 27 Jan 2022 22:00:48 +0000 https://citrixblogs.wpengine.com/?p=174256071

Earlier this month, Ukraine was the target of a series of cyberattacks, alleged to be part of a larger hybrid warfare campaign conducted by Russia. While geopolitical issues are beyond the scope of this blog post, these attacks should serve …

]]>

Earlier this month, Ukraine was the target of a series of cyberattacks, alleged to be part of a larger hybrid warfare campaign conducted by Russia. While geopolitical issues are beyond the scope of this blog post, these attacks should serve …

]]>
How to protect yourself against keyloggers https://www.citrix.com/blogs/2022/01/18/protect-against-keyloggers/ Tue, 18 Jan 2022 13:00:43 +0000 https://citrixblogs.wpengine.com/?p=174255938

Conversations about the future of work were propelled forward during the pandemic. The rapid shift to remote work and the necessity to expand bring-your-own-device (BYOD) programs encouraged business leaders to fully embrace innovative business models. This trend is expected to …

]]>

Conversations about the future of work were propelled forward during the pandemic. The rapid shift to remote work and the necessity to expand bring-your-own-device (BYOD) programs encouraged business leaders to fully embrace innovative business models. This trend is expected to …

]]>
Add Citrix DDoS mitigation service to Citrix Virtual Apps and Desktops to protect your business https://www.citrix.com/blogs/2022/01/13/citrix-ddos-mitigation-service-protect-your-business/ Thu, 13 Jan 2022 20:00:02 +0000 https://citrixblogs.wpengine.com/?p=174255929

Citrix Virtual Apps and Desktops is easy to manage, delivers a seamless app experience, can secure your organization’s apps, and help you boost employee productivity. Citrix Gateway ensures secure access to apps, enabling SSO, authenticating users, and protecting your network …

]]>

Citrix Virtual Apps and Desktops is easy to manage, delivers a seamless app experience, can secure your organization’s apps, and help you boost employee productivity. Citrix Gateway ensures secure access to apps, enabling SSO, authenticating users, and protecting your network …

]]>
Hybrid, Streamlined, and Secure: Building a workplace that wins in 2022 https://www.citrix.com/blogs/2022/01/11/hybrid-streamlined-and-secure-building-a-workplace-that-wins-in-2022/ Tue, 11 Jan 2022 13:00:06 +0000 https://citrixblogs.wpengine.com/?p=174255902

It’s a new year, and we’re all in the thick of setting goals and priorities for the next 12 months. In our latest Fieldwork by Citrix report, we break down key recommendations for building a workplace that wins in …

]]>

It’s a new year, and we’re all in the thick of setting goals and priorities for the next 12 months. In our latest Fieldwork by Citrix report, we break down key recommendations for building a workplace that wins in …

]]>
IAM vs PAM: How are they different? https://www.citrix.com/blogs/2022/01/10/iam-vs-pam-how-are-they-different/ Mon, 10 Jan 2022 13:00:35 +0000 https://citrixblogs.wpengine.com/?p=174255894

New remote and hybrid working styles have companies thinking deeply about the devices employees use to access company infrastructure. And many are looking into options for privileged access management (PAM) and identity access management (IAM). Both are common methods for …

]]>

New remote and hybrid working styles have companies thinking deeply about the devices employees use to access company infrastructure. And many are looking into options for privileged access management (PAM) and identity access management (IAM). Both are common methods for …

]]>
3 priorities to consider when choosing hybrid-work technologies https://www.citrix.com/blogs/2021/12/21/3-priorities-to-consider-when-choosing-hybrid-work-technologies/ Tue, 21 Dec 2021 13:00:40 +0000 https://citrixblogs.wpengine.com/?p=174255775

This is a guest blog post by Stacey Loew, Sr. Director, Technical Marketing, ATSG.

Hybrid work is being heralded as the next great disruption in the workplace, and although there was already a trend towards working from home, the …

]]>

This is a guest blog post by Stacey Loew, Sr. Director, Technical Marketing, ATSG.

Hybrid work is being heralded as the next great disruption in the workplace, and although there was already a trend towards working from home, the …

]]>
2022 Predictions: The year ahead for channel partners https://www.citrix.com/blogs/2021/12/16/2022-predictions-the-year-ahead-for-channel-partners/ Thu, 16 Dec 2021 13:00:09 +0000 https://citrixblogs.wpengine.com/?p=174255673

As we near the end of 2021, one thing is certain — continued change. The global pandemic has forced businesses to significantly adapt how they operate and how/where their employees work, prompting massive technological transformation across the board. For channel …

]]>

As we near the end of 2021, one thing is certain — continued change. The global pandemic has forced businesses to significantly adapt how they operate and how/where their employees work, prompting massive technological transformation across the board. For channel …

]]>
Guidance for reducing Apache Log4j security vulnerability risk with Citrix WAF (CVE-2021-44228/CVE-2021-45046/CVE-2021-45105) https://www.citrix.com/blogs/2021/12/13/guidance-for-reducing-apache-log4j-security-vulnerability-risk-with-citrix-waf/ Mon, 13 Dec 2021 23:08:38 +0000 https://citrixblogs.wpengine.com/?p=174255617

A zero-day exploit affecting the Apache Log4j version from 2.0-beta9 to 2.14.1 was made public on December 9, 2021, as to which JNDI features used in the configuration, log messages, and parameters do not protect against attacker-controlled LDAP and other …

]]>

A zero-day exploit affecting the Apache Log4j version from 2.0-beta9 to 2.14.1 was made public on December 9, 2021, as to which JNDI features used in the configuration, log messages, and parameters do not protect against attacker-controlled LDAP and other …

]]>
3 cybersecurity checklist items to consider in 2022 https://www.citrix.com/blogs/2021/12/07/3-cybersecurity-checklist-items-to-consider-in-2022/ Tue, 07 Dec 2021 16:45:11 +0000 https://citrixblogs.wpengine.com/?p=174255563

The total value of ransomware-related payments in just the first six months of 2021 ($590 million) exceeded all of 2020 ($416 million). Yet, even with the increasing impact of cyberattacks, 90 percent of security leaders still believe they’re falling short

]]>

The total value of ransomware-related payments in just the first six months of 2021 ($590 million) exceeded all of 2020 ($416 million). Yet, even with the increasing impact of cyberattacks, 90 percent of security leaders still believe they’re falling short

]]>
Cybersecurity 2022: Disrupt and conquer https://www.citrix.com/blogs/2021/11/18/cybersecurity-2022-disrupt-and-conquer/ Thu, 18 Nov 2021 20:30:55 +0000 https://citrixblogs.wpengine.com/?p=174255419

As the journey towards digital transformation continues, IT will leverage innovative technologies to transform the user experience and fuel competitive advantage

Cybersecurity has taken center stage. In the wake of attacks that have crippled business and threatened our daily lives, …

]]>

As the journey towards digital transformation continues, IT will leverage innovative technologies to transform the user experience and fuel competitive advantage

Cybersecurity has taken center stage. In the wake of attacks that have crippled business and threatened our daily lives, …

]]>
Biometrics authentication into Citrix Workspace with TrustKey FIDO2 Security Keys https://www.citrix.com/blogs/2021/11/04/biometrics-authentication-into-citrix-workspace-with-trustkey-fido2-security-keys/ Thu, 04 Nov 2021 12:00:40 +0000 https://citrixblogs.wpengine.com/?p=174255264

This is a guest blog post by Stephen Oh, Head of Global Sales, TrustKey.

With the pandemic, organizations have experienced an increase in hacking attacks, resulting in immense loss and damage for many businesses. One of the most effective …

]]>

This is a guest blog post by Stephen Oh, Head of Global Sales, TrustKey.

With the pandemic, organizations have experienced an increase in hacking attacks, resulting in immense loss and damage for many businesses. One of the most effective …

]]>
Empowering secure distributed workforces with Citrix innovations https://www.citrix.com/blogs/2021/10/27/empowering-secure-distributed-workforces-with-citrix-innovations/ Wed, 27 Oct 2021 19:30:03 +0000 https://citrixblogs.wpengine.com/?p=174255150

This is a guest blog post by Shira Rubinoff, Cybersecurity Executive, Author and Advisor.

Organizations of all types and sizes, all around the world, are prioritizing secure distributed work models. This shift has been propelled by the growing adoption …

]]>

This is a guest blog post by Shira Rubinoff, Cybersecurity Executive, Author and Advisor.

Organizations of all types and sizes, all around the world, are prioritizing secure distributed work models. This shift has been propelled by the growing adoption …

]]>
Passwordless authentication to Citrix Workspace with FEITIAN security key https://www.citrix.com/blogs/2021/10/15/passwordless-authentication-to-citrix-workspace-with-feitian-security-key/ Fri, 15 Oct 2021 12:00:57 +0000 https://citrixblogs.wpengine.com/?p=174254947

This is a guest blog post by Haichuan Hu, FIDO product manager, FEITIAN Technologies.

Passwords have always been a critical problem for online security. A simple password across multiple websites may lead to an account takeover, while complex passwords …

]]>

This is a guest blog post by Haichuan Hu, FIDO product manager, FEITIAN Technologies.

Passwords have always been a critical problem for online security. A simple password across multiple websites may lead to an account takeover, while complex passwords …

]]>
Recapping Citrix Launchpad: Security Innovations https://www.citrix.com/blogs/2021/10/05/recapping-citrix-launchpad-security/ Tue, 05 Oct 2021 15:30:46 +0000 https://citrixblogs.wpengine.com/?p=174254626

Hybrid and remote work have empowered employees, and with companies benefiting from this model, distributed work environments are here to stay. But what does that mean for security?

The rapid shift to new work models has expanded the attack surface …

]]>

Hybrid and remote work have empowered employees, and with companies benefiting from this model, distributed work environments are here to stay. But what does that mean for security?

The rapid shift to new work models has expanded the attack surface …

]]>
Citrix and Chrome OS: Secure, seamless access to all your apps, for all your employees https://www.citrix.com/blogs/2021/10/05/citrix-and-chrome-os-secure-seamless-access/ Tue, 05 Oct 2021 15:00:10 +0000 https://citrixblogs.wpengine.com/?p=174254635

Citrix and Chrome OS are joining forces to enable greater employee productivity through secure and seamless access to all your apps apps and the internet for all your employees everywhere, all while reducing the burden on IT. Chrome OS devices …

]]>

Citrix and Chrome OS are joining forces to enable greater employee productivity through secure and seamless access to all your apps apps and the internet for all your employees everywhere, all while reducing the burden on IT. Chrome OS devices …

]]>
Back to Office: Hybrid novelties and new norms https://www.citrix.com/blogs/2021/09/23/back-to-office-hybrid-novelties-and-new-norms/ Thu, 23 Sep 2021 12:00:02 +0000 https://citrixblogs.wpengine.com/?p=174254458

It’s no surprise that the traditional workplace has been turned upside down by COVID-19. Well over a year into large-scale remote work, it’s clear that leaders must prepare now for the long-term changes to business operations catalyzed by the pandemic.…

]]>

It’s no surprise that the traditional workplace has been turned upside down by COVID-19. Well over a year into large-scale remote work, it’s clear that leaders must prepare now for the long-term changes to business operations catalyzed by the pandemic.…

]]>
Business resilience and lessons learned from the pandemic https://www.citrix.com/blogs/2021/09/22/business-resilience-and-lessons-learned-from-the-pandemic/ Wed, 22 Sep 2021 12:00:21 +0000 https://citrixblogs.wpengine.com/?p=174254413

There have been many takeaways from our experience during the COVID-19 pandemic, but a key lesson is the importance of business resilience.

What is business resilience? It’s a holistic focus on ensuring that operations, technology, facilities, and people can survive …

]]>

There have been many takeaways from our experience during the COVID-19 pandemic, but a key lesson is the importance of business resilience.

What is business resilience? It’s a holistic focus on ensuring that operations, technology, facilities, and people can survive …

]]>
How 11 leading technologists detox from technology https://www.citrix.com/blogs/2021/08/03/how-11-leading-technologists-detox-from-technology/ Tue, 03 Aug 2021 12:00:50 +0000 https://citrixblogs.wpengine.com/?p=174253723

This is a guest blog post by Natalie Zfat, a social media entrepreneur and Forbes Contributor who has partnered with some of the most iconic brands in the world. The post originally appeared here.

Don’t it always seem

]]>

This is a guest blog post by Natalie Zfat, a social media entrepreneur and Forbes Contributor who has partnered with some of the most iconic brands in the world. The post originally appeared here.

Don’t it always seem

]]>
Take a strategic approach to empowering a secure hybrid workforce with SASE https://www.citrix.com/blogs/2021/07/27/take-a-strategic-approach-to-empowering-a-secure-hybrid-workforce-with-sase/ Tue, 27 Jul 2021 12:00:30 +0000 https://citrixblogs.wpengine.com/?p=174253661

In the first blog post in our series on Secure Access Service Edge (SASE), we looked at the need for a unified approach to securing the hybrid workforce, the complex application landscape, and the rapidly expanding attack surface.

In …

]]>

In the first blog post in our series on Secure Access Service Edge (SASE), we looked at the need for a unified approach to securing the hybrid workforce, the complex application landscape, and the rapidly expanding attack surface.

In …

]]>
Rethink your app security strategy with a unified approach to SASE https://www.citrix.com/blogs/2021/07/15/why-you-need-a-unified-approach-to-sase-when-tackling-a-complex-app-landscape/ Thu, 15 Jul 2021 12:00:44 +0000 https://citrixblogs.wpengine.com/?p=174253557

Digital transformation, cloud adoption, and the expanding hybrid workforce have fundamentally changed the dynamics of the security and connectivity landscape. Businesses like yours rely on applications, and more employees than ever are using the internet and different types of …

]]>

Digital transformation, cloud adoption, and the expanding hybrid workforce have fundamentally changed the dynamics of the security and connectivity landscape. Businesses like yours rely on applications, and more employees than ever are using the internet and different types of …

]]>
Hybrid Work and Hackers: The 2021 zero trust approach to security https://www.citrix.com/blogs/2021/07/13/hybrid-work-zero-trust-security/ Tue, 13 Jul 2021 12:00:49 +0000 https://citrixblogs.wpengine.com/?p=174253517

Picture this: It’s 8:45 a.m. on a Tuesday, and you’ve just fired up your laptop. Within minutes you have 10 different browser tabs and apps open, including one for messaging, another for email, and another for the presentation you’ve been …

]]>

Picture this: It’s 8:45 a.m. on a Tuesday, and you’ve just fired up your laptop. Within minutes you have 10 different browser tabs and apps open, including one for messaging, another for email, and another for the presentation you’ve been …

]]>
Zero Trust for Healthcare — Not If, but When. https://www.citrix.com/blogs/2021/07/07/zero-trust-for-healthcare-not-if-but-when/ Wed, 07 Jul 2021 12:00:27 +0000 https://citrixblogs.wpengine.com/?p=174253442

The healthcare industry has long been overburdened by slow-moving innovation due to the complexity of the medical ecosystem. Healthcare IT will tell you that healthcare is one of the most traditional industries and is averse to change. After all, it’s …

]]>

The healthcare industry has long been overburdened by slow-moving innovation due to the complexity of the medical ecosystem. Healthcare IT will tell you that healthcare is one of the most traditional industries and is averse to change. After all, it’s …

]]>
Are you ready for a ransomware attack? https://www.citrix.com/blogs/2021/06/09/are-you-ready-for-a-ransomware-attack/ Wed, 09 Jun 2021 18:15:04 +0000 https://citrixblogs.wpengine.com/?p=174253039

The scourge of ransomware has been wildly escalating, causing mayhem not just for companies, but for society. Witness the high-profile breaches impacting critical infrastructure while damaging trust relationships across healthcare, financial, retail, manufacturing, oil and gas, and other industries we …

]]>

The scourge of ransomware has been wildly escalating, causing mayhem not just for companies, but for society. Witness the high-profile breaches impacting critical infrastructure while damaging trust relationships across healthcare, financial, retail, manufacturing, oil and gas, and other industries we …

]]>
Building a new, better, and more collaborative future of work post-pandemic https://www.citrix.com/blogs/2021/05/27/building-a-new-better-and-more-collaborative-future-of-work-post-pandemic/ Thu, 27 May 2021 12:00:15 +0000 https://citrixblogs.wpengine.com/?p=174252779

This is a guest blog post by Dion Hinchcliffe, VP and Principal Analyst at Constellation Research.

With hindsight, it’s easy to look back and see how our workplaces and cultures could have been better prepared for a year like …

]]>

This is a guest blog post by Dion Hinchcliffe, VP and Principal Analyst at Constellation Research.

With hindsight, it’s easy to look back and see how our workplaces and cultures could have been better prepared for a year like …

]]>
Getting security and experience to work together https://www.citrix.com/blogs/2021/05/20/getting-security-and-experience-to-work-together/ Thu, 20 May 2021 19:30:26 +0000 https://citrixblogs.wpengine.com/?p=174252696

Across the Eastern Seaboard, millions of Americans experienced the consequences of compromised cybersecurity. Earlier this month a ransomware attack led to the shutdown of a section of one of the nation’s critical sources of fuel, resulting in gas shortages and …

]]>

Across the Eastern Seaboard, millions of Americans experienced the consequences of compromised cybersecurity. Earlier this month a ransomware attack led to the shutdown of a section of one of the nation’s critical sources of fuel, resulting in gas shortages and …

]]>
How to evaluate security vendors during a security consolidation https://www.citrix.com/blogs/2021/05/19/how-to-evaluate-security-vendors-during-a-security-consolidation/ Wed, 19 May 2021 12:00:17 +0000 https://citrixblogs.wpengine.com/?p=174252661

As you look for ways to support a primarily remote workforce, it’s critical that you modernize your security architecture. Here’s how to choose the optimal security vendors.

As many as 36 million Americans could be working remote by 2025, according …

]]>

As you look for ways to support a primarily remote workforce, it’s critical that you modernize your security architecture. Here’s how to choose the optimal security vendors.

As many as 36 million Americans could be working remote by 2025, according …

]]>
The role of Citrix’s secure access solutions in IT security reskilling https://www.citrix.com/blogs/2021/04/21/the-role-of-citrixs-secure-access-solutions-in-it-security-reskilling/ Wed, 21 Apr 2021 20:15:53 +0000 https://citrixblogs.wpengine.com/?p=174252255

We’ve all heard the alarm bells ringing — organizations around the globe are suffering from a cybersecurity talent gap. While this is a great opportunity for our future leaders, organizations need to cope with the demands of increased cyber threats. …

]]>

We’ve all heard the alarm bells ringing — organizations around the globe are suffering from a cybersecurity talent gap. While this is a great opportunity for our future leaders, organizations need to cope with the demands of increased cyber threats. …

]]>
Driving 2021 security initiatives with Citrix’s cloud-delivered security solution https://www.citrix.com/blogs/2021/04/01/driving-2021-security-initiatives-with-citrixs-cloud-delivered-security-solution/ Thu, 01 Apr 2021 14:00:48 +0000 https://citrixblogs.wpengine.com/?p=174251893

Based on my conversations with enterprise IT teams, there seem to be a few high priority items that consistently feature on every IT team’s 2021 to-do list:

  • Protecting home-based workers with full-featured security (beyond VPN)
  • Enabling fast, local internet breakouts
…]]>

Based on my conversations with enterprise IT teams, there seem to be a few high priority items that consistently feature on every IT team’s 2021 to-do list:

  • Protecting home-based workers with full-featured security (beyond VPN)
  • Enabling fast, local internet breakouts
…]]>
Automate SSL certificate lifecycle with Citrix ADM and Venafi integration https://www.citrix.com/blogs/2021/03/22/automate-ssl-certificate-lifecycle-with-citrix-adm-and-venafi-integration/ Mon, 22 Mar 2021 12:00:23 +0000 https://citrixblogs.wpengine.com/?p=174251663

This blog post was co-authored by Asit Mohapatra, Senior Product Manager.

There are two actors on a network — people and machines. People rely on usernames and passwords to identify themselves to machines so they can get access to networks …

]]>

This blog post was co-authored by Asit Mohapatra, Senior Product Manager.

There are two actors on a network — people and machines. People rely on usernames and passwords to identify themselves to machines so they can get access to networks …

]]>
The tension between effective security and employee experience https://www.citrix.com/blogs/2021/03/11/the-tension-between-effective-security-and-employee-experience/ Thu, 11 Mar 2021 08:30:41 +0000 https://citrixblogs.wpengine.com/?p=174251457

This blog post is based on a webinar, ‘The Tension Between Effective Security and Employee Experience’, which can be viewed in full here. It is the sixth webinar in The New Workspace series. The event featured the insights of

]]>

This blog post is based on a webinar, ‘The Tension Between Effective Security and Employee Experience’, which can be viewed in full here. It is the sixth webinar in The New Workspace series. The event featured the insights of

]]>
What’s new with Citrix Workspace – February 2021 https://www.citrix.com/blogs/2021/03/01/whats-new-with-citrix-workspace-february-2021/ Mon, 01 Mar 2021 13:00:28 +0000 https://citrixblogs.wpengine.com/?p=174251164

In my opinion, the greatest benefit of Citrix Workspace is that it enables our customers to provide their end users with a complete digital workspace from a single vendor. We call this the “platform approach” to workspace delivery.

Taking …

]]>

In my opinion, the greatest benefit of Citrix Workspace is that it enables our customers to provide their end users with a complete digital workspace from a single vendor. We call this the “platform approach” to workspace delivery.

Taking …

]]>
How financial institutions see the future https://www.citrix.com/blogs/2021/02/18/how-financial-institutions-see-the-future/ Thu, 18 Feb 2021 09:00:04 +0000 https://citrixblogs.wpengine.com/?p=174251049

As part of Citrix’s recent research on Financial Institutions of the Future, we surveyed 45 C-level representatives from around the world. As head of financial services for Citrix in the UK and Ireland, I’ve seen firsthand the challenges our …

]]>

As part of Citrix’s recent research on Financial Institutions of the Future, we surveyed 45 C-level representatives from around the world. As head of financial services for Citrix in the UK and Ireland, I’ve seen firsthand the challenges our …

]]>
The crisis-accelerated digital revolution of work https://www.citrix.com/blogs/2021/02/11/the-crisis-accelerated-digital-revolution-of-work/ Thu, 11 Feb 2021 15:00:41 +0000 https://citrixblogs.wpengine.com/?p=174250912

This is a guest blog post by Dion Hinchcliffe, Vice President and Principal Analyst at Constellation Research. This post originally appeared on the Constellation Research blog.

Over the last year, the world has undergone a true work revolution …

]]>

This is a guest blog post by Dion Hinchcliffe, Vice President and Principal Analyst at Constellation Research. This post originally appeared on the Constellation Research blog.

Over the last year, the world has undergone a true work revolution …

]]>
Simplifying the zero trust security discussion https://www.citrix.com/blogs/2020/12/21/simplifying-the-zero-trust-security-discussion/ Mon, 21 Dec 2020 15:00:03 +0000 https://citrixblogs.wpengine.com/?p=174250081

Zero trust is not a product or a solution. Zero trust is the concept that trust between people and access must be constantly earned.”

That line comes from an insightful series of Citrix blog posts describing zero trust …

]]>

Zero trust is not a product or a solution. Zero trust is the concept that trust between people and access must be constantly earned.”

That line comes from an insightful series of Citrix blog posts describing zero trust …

]]>
Healthcare leaders provide security insights for 2021 https://www.citrix.com/blogs/2020/11/16/healthcare-leaders-provide-security-insights-for-2021/ Mon, 16 Nov 2020 15:15:07 +0000 https://citrixblogs.wpengine.com/?p=174249380

Under the best of circumstances, information security in healthcare is challenging. With HIPAA requirements guiding an organization’s operational policies and architectural designs, safeguarding protected health information (PHI) is a perpetual priority.

These are not the best of circumstances. With fallout …

]]>

Under the best of circumstances, information security in healthcare is challenging. With HIPAA requirements guiding an organization’s operational policies and architectural designs, safeguarding protected health information (PHI) is a perpetual priority.

These are not the best of circumstances. With fallout …

]]>
Go passwordless with YubiKeys for Citrix Workspace https://www.citrix.com/blogs/2020/11/12/go-passwordless-with-yubikeys-for-citrix-workspace/ Thu, 12 Nov 2020 15:30:55 +0000 https://citrixblogs.wpengine.com/?p=174249348

This is a guest blog post from Citrix Ready partner Yubico.

Over the past few years, organizations have started to implement flexible work policies, empowering teams to work at home or in the office at their convenience. More recently, …

]]>

This is a guest blog post from Citrix Ready partner Yubico.

Over the past few years, organizations have started to implement flexible work policies, empowering teams to work at home or in the office at their convenience. More recently, …

]]>
Secure workspaces anywhere to keep business running as usual https://www.citrix.com/blogs/2020/11/03/secure-workspaces-anywhere-to-keep-business-running-as-usual/ Tue, 03 Nov 2020 13:00:24 +0000 https://citrixblogs.wpengine.com/?p=174249061

This is a guest blog post by Avishag Daniely, Director of Product Marketing, at Guardicore.

Remote working is powering the new normal, and virtual apps and desktops infrastructure is doing a great job of helping to facilitate that shift. …

]]>

This is a guest blog post by Avishag Daniely, Director of Product Marketing, at Guardicore.

Remote working is powering the new normal, and virtual apps and desktops infrastructure is doing a great job of helping to facilitate that shift. …

]]>
Citrix enables smart, flexible security for customers https://www.citrix.com/blogs/2020/10/29/citrix-enables-smart-flexible-security-for-customers/ Thu, 29 Oct 2020 12:00:28 +0000 https://citrixblogs.wpengine.com/?p=174248876

With employees working from anywhere and everywhere in 2020, the COVID-19 pandemic has made security even more front of mind for IT leaders. It should be. After all, the attack surface has expanded because of an increasingly diverse number of …

]]>

With employees working from anywhere and everywhere in 2020, the COVID-19 pandemic has made security even more front of mind for IT leaders. It should be. After all, the attack surface has expanded because of an increasingly diverse number of …

]]>
How Citrix Workspace can help you to stop social engineering attacks https://www.citrix.com/blogs/2020/10/01/how-citrix-workspace-can-help-you-to-stop-social-engineering-attacks/ Thu, 01 Oct 2020 18:00:47 +0000 /blogs/?p=174248310

Many organizations are training their employees how to recognize social engineering and how attackers will attempt to distribute malware to them. But research shows that even after a year of continuous security training for employees, the best possible result is …

]]>

Many organizations are training their employees how to recognize social engineering and how attackers will attempt to distribute malware to them. But research shows that even after a year of continuous security training for employees, the best possible result is …

]]>
Citrix SD-WAN shines the secure WAN Edge at Check Point virtual summit https://www.citrix.com/blogs/2020/07/22/citrix-sd-wan-shines-the-secure-wan-edge-at-check-point-virtual-summit/ Wed, 22 Jul 2020 16:30:47 +0000 /blogs/?p=174247669

Citrix is a proud platinum sponsor for the Check Point: <Secure> Virtual Summit US on Thursday, July 23, at 9 a.m. PT. Leading experts will discuss the impact of the global pandemic on cybersecurity vulnerabilities, risks, and strategies, showcasing what …

]]>

Citrix is a proud platinum sponsor for the Check Point: <Secure> Virtual Summit US on Thursday, July 23, at 9 a.m. PT. Leading experts will discuss the impact of the global pandemic on cybersecurity vulnerabilities, risks, and strategies, showcasing what …

]]>
Keep up to date with the Citrix Trust Center https://www.citrix.com/blogs/2020/06/16/keep-up-to-date-with-the-citrix-trust-center/ Tue, 16 Jun 2020 16:00:40 +0000 /blogs/?p=174247264

This blog post was co-authored by Peter Lefkowitz, Chief Privacy and Digital Risk Officer.

Security is one of our top priorities at Citrix, and we are committed to tackling security vulnerabilities to help keep our customers running smoothly. As part …

]]>

This blog post was co-authored by Peter Lefkowitz, Chief Privacy and Digital Risk Officer.

Security is one of our top priorities at Citrix, and we are committed to tackling security vulnerabilities to help keep our customers running smoothly. As part …

]]>
Enable your remote work IT infrastructure with Citrix Ready partners https://www.citrix.com/blogs/2020/05/21/enable-your-remote-work-it-infrastructure-with-citrix-ready-partners/ Thu, 21 May 2020 12:00:48 +0000 /blogs/?p=174247014

When the COVID-19 (coronavirus) pandemic hit, business continuity was top of mind for everyone. Even if you had a business continuity plan and extensive remote work capabilities, few would have imagined such a prolonged absence from traditional offices. Some companies …

]]>

When the COVID-19 (coronavirus) pandemic hit, business continuity was top of mind for everyone. Even if you had a business continuity plan and extensive remote work capabilities, few would have imagined such a prolonged absence from traditional offices. Some companies …

]]>
Citrix, Check Point Software support choice in protecting the WAN Edge https://www.citrix.com/blogs/2020/05/14/citrix-check-point-software-support-choice-in-protecting-the-wan-edge/ Thu, 14 May 2020 12:30:17 +0000 /blogs/?p=174245706

As applications move to SaaS and cloud, it makes sense to have your branches connect directly to them via the local internet path. But, by intelligently routing traffic more directly via the internet, you could expose your organization to sophisticated …

]]>

As applications move to SaaS and cloud, it makes sense to have your branches connect directly to them via the local internet path. But, by intelligently routing traffic more directly via the internet, you could expose your organization to sophisticated …

]]>
Citrix ADC achieves certification for DoDIN Approved Products List https://www.citrix.com/blogs/2020/05/01/citrix-adc-achieves-certification-for-dodin-approved-products-list/ Fri, 01 May 2020 13:30:29 +0000 /blogs/?p=174246831

The Citrix Application Delivery Controller (ADC) MPX 14000-FIPS 11.1 Platinum Edition, formerly known as NetScaler, has achieved certification to remain on the Department of Defense Information Network Approved Products List (DoDIN APL).

The purpose of the Approved Products List …

]]>

The Citrix Application Delivery Controller (ADC) MPX 14000-FIPS 11.1 Platinum Edition, formerly known as NetScaler, has achieved certification to remain on the Department of Defense Information Network Approved Products List (DoDIN APL).

The purpose of the Approved Products List …

]]>
Curing your complex healthcare network ills with microsegmentation https://www.citrix.com/blogs/2020/03/02/curing-your-complex-healthcare-network-ills-with-microsegmentation/ Mon, 02 Mar 2020 13:00:14 +0000 /blogs/?p=174246046

This is a guest blog post by Sharon Besser, VP Business Development, Guardicore.

In its whitepaper, The Rampant Growth of Cybercrime in Healthcare, health IT advisor organization Workgroup for Electronic Data Interchange (WEDI) reported that attacks on the …

]]>

This is a guest blog post by Sharon Besser, VP Business Development, Guardicore.

In its whitepaper, The Rampant Growth of Cybercrime in Healthcare, health IT advisor organization Workgroup for Electronic Data Interchange (WEDI) reported that attacks on the …

]]>
Accelerate your move to the cloud with Citrix Ready https://www.citrix.com/blogs/2020/01/09/accelerate-your-move-to-the-cloud-with-citrix-ready/ Thu, 09 Jan 2020 22:00:25 +0000 /blogs/?p=174245664

The last year has seen digital transformation accelerate dramatically. The Citrix Ready Hybrid Multi-Cloud Program has been a big part of transforming workspace delivery, as infrastructure increasingly moves to the cloud. The public cloud has rapidly become ubiquitous, with …

]]>

The last year has seen digital transformation accelerate dramatically. The Citrix Ready Hybrid Multi-Cloud Program has been a big part of transforming workspace delivery, as infrastructure increasingly moves to the cloud. The public cloud has rapidly become ubiquitous, with …

]]>
The Grace Hopper Celebration: What a blast for this Citrite! https://www.citrix.com/blogs/2019/10/15/the-grace-hopper-celebration-what-a-blast-for-this-citrite/ Tue, 15 Oct 2019 14:00:15 +0000 /blogs/?p=174244820

When I was a student leader at my university’s chapter of the Society of Women Engineers (SWE), we always coveted the opportunity to attend the Grace Hopper Celebration. It’s the world’s largest annual gathering of women technologists, helping them …

]]>

When I was a student leader at my university’s chapter of the Society of Women Engineers (SWE), we always coveted the opportunity to attend the Grace Hopper Celebration. It’s the world’s largest annual gathering of women technologists, helping them …

]]>
Protect your enterprise with Citrix ADC content inspection https://www.citrix.com/blogs/2019/09/30/protect-your-enterprise-with-citrix-adc-content-inspection/ Mon, 30 Sep 2019 06:30:05 +0000 /blogs/?p=174244648

As organizations move enterprise services and applications to the cloud, a larger segment of their user traffic is going to the internet. Users within enterprises are accessing internet websites and company’s resources as cloud services. The increasing sophistication of cybersecurity …

]]>

As organizations move enterprise services and applications to the cloud, a larger segment of their user traffic is going to the internet. Users within enterprises are accessing internet websites and company’s resources as cloud services. The increasing sophistication of cybersecurity …

]]>
Werken zoals jij dat wil https://www.citrix.com/blogs/2019/09/12/werken-zoals-jij-dat-wil/ Thu, 12 Sep 2019 07:00:58 +0000 /blogs/?p=174244461

Zijn er nog mensen die echt iedere werkdag van 9 tot 5 op kantoor zitten? Jazeker. Wij hebben dat onderzocht, en voor een derde van de Nederlanders is dat heel gewoon. Maar de rest werkt geregeld buiten kantoor en de

]]>

Zijn er nog mensen die echt iedere werkdag van 9 tot 5 op kantoor zitten? Jazeker. Wij hebben dat onderzocht, en voor een derde van de Nederlanders is dat heel gewoon. Maar de rest werkt geregeld buiten kantoor en de

]]>
Delivering apps to the modern workspace with performance and security https://www.citrix.com/blogs/2019/08/21/delivering-apps-to-the-modern-workspace-with-performance-and-security/ Wed, 21 Aug 2019 16:00:03 +0000 /blogs/?p=174244207

As organizations rapidly move forward with digital and cloud transformation, the most reliable indicators of the success of any solution involve the experiences of employees and customers. Positive experiences happen when performance and security come together. You could choose …

]]>

As organizations rapidly move forward with digital and cloud transformation, the most reliable indicators of the success of any solution involve the experiences of employees and customers. Positive experiences happen when performance and security come together. You could choose …

]]>
Citrix concludes investigation of unauthorized internal network access https://www.citrix.com/blogs/2019/07/19/citrix-concludes-investigation-of-unauthorized-internal-network-access/ Fri, 19 Jul 2019 14:59:35 +0000 /blogs/?p=174243922

We have concluded our investigation into our previously disclosed security incident. I’d like to share an overview of our work, our major findings, and some of the steps we are taking to improve our security moving forward.

First, I …

]]>

We have concluded our investigation into our previously disclosed security incident. I’d like to share an overview of our work, our major findings, and some of the steps we are taking to improve our security moving forward.

First, I …

]]>
The future of work is here in Singapore. Are you ready? https://www.citrix.com/blogs/2019/07/15/the-future-of-work-is-here-in-singapore-are-you-ready/ Mon, 15 Jul 2019 05:00:23 +0000 /blogs/?p=174243808

The way employees work has changed a lot. For example, working from home is now the norm for many people, and there’s really no difference between working from an office desk, home, a coffee shop, or anywhere else with an …

]]>

The way employees work has changed a lot. For example, working from home is now the norm for many people, and there’s really no difference between working from an office desk, home, a coffee shop, or anywhere else with an …

]]>
Preparing the next generation of engineering leaders https://www.citrix.com/blogs/2019/07/11/preparing-the-next-generation-of-engineering-leaders/ Thu, 11 Jul 2019 16:00:23 +0000 /blogs/?p=174243798

Think back to your school days. I bet you can recall someone who shaped the course of your life. Maybe it was a teacher who inspired you to learn a foreign language and travel to new countries. Or a volunteer …

]]>

Think back to your school days. I bet you can recall someone who shaped the course of your life. Maybe it was a teacher who inspired you to learn a foreign language and travel to new countries. Or a volunteer …

]]>
New Citrix Virtual Apps and Desktops 7 course teaches advanced skills https://www.citrix.com/blogs/2019/06/25/new-citrix-virtual-apps-and-desktops-7-course-teaches-advanced-skills/ Tue, 25 Jun 2019 12:00:59 +0000 /blogs/?p=174243545

According to Information Age, a key IT trend for 2019 is the global shortage of cybersecurity skills in the workplace. In fact, in its 2019 IT Security Employment Outlook report, eSecurity Planet estimates there is a shortfall of …

]]>

According to Information Age, a key IT trend for 2019 is the global shortage of cybersecurity skills in the workplace. In fact, in its 2019 IT Security Employment Outlook report, eSecurity Planet estimates there is a shortfall of …

]]>