In our two previous blog posts, we talked about zero trust the Citrix way and a key use case, why…
IT organizations seeking to implement zero trust network access (ZTNA) often encounter operational challenges that prevent adoption and successful rollouts…
Customers implementing Zero Trust Network Access (ZTNA) solutions for secure access to enterprise apps demand greater choice and flexibility with…
If you joined our What’s New and Next Webinar, you know that we’ve released tons of new features for on-premises…
Cyber attacks are on the rise across the healthcare industry. Citrix has the technology to secure your whole IT environment. Learn five ways that Citrix can secure your healthcare organization.
The browser is where significant work gets done. However, consumer browsers offer little protection or IT control to manage corporate…
We are pleased to announce the General Availability of Citrix Secure Private Access On-Premises solution – a major milestone in our journey to deliver ZTNA as a full customer-managed on-premises solution, providing you the flexibility of a hybrid strategy with the choice to use a mix of SaaS-based and/or customer-managed solutions to best suit your needs.
This year has already been big for Citrix! With a renewed focus on hybrid deployments and meeting organizations where they…
In my previous”Overcoming observed challenges when adopting a zero trust architecture” blog post, I discussed some of the observed challenges…
In our mobile-first world, where hybrid work is the norm for many organizations, employees need access to corporate applications and…
Zero trust has become a crucial component in the cybersecurity strategy of organizations everywhere. More and more enterprises are finding…
When the U.K. government lifted its work-from-home guidance, large banks and insurers were among the first to announce plans to…
The banking industry has seen unrivaled transformation over the last decade — from significant regulatory reform to the establishment of…
Citrix Endpoint Management is back as part of the Citrix portfolio. Learn more about what's ahead for our endpoint management solution.
Today’s manufacturer isn’t short of challenges. Supply chain disruptions and labor shortages are just some of the obstacles it must…
Modern threats require a modern approach to security. Plus, our recent survey found that 95 percent of businesses are taking…
Learn how Citrix can help banks leverage technology to manage relationships better, both with employees and customers.
VPNs have long been a security standard for secure access to corporate applications. Organizations began using VPN services at a…
Authentication and authorization are essential processes of identity and access management. While the terms are often used interchangeably, authentication and…
BYOD has been around for a long time in practice, although the acronym was not popularized until 2011, when Citrix…
The growth in hybrid work creates challenges for IT admins everywhere. How do you keep remote workers safe? How do…
When consumerization of IT was the next big thing, enterprises spent a lot of time and money modernizing apps and…
Zero trust architectures have gained rapid adoption by cybersecurity teams recently with the rise of knowledge workers moving to remote…
“Never trust, always verify” and “just enough” access. These are the key philosophies behind zero trust approaches to cybersecurity. Although…
It has been 32 years since the world’s first browser — the “WorldWideWeb browser” — was created by Tim Berners-Lee…