Zero Trust

Displaying 11 of 11 results

Improved security, admin interfaces, and user experiences across the Citrix solution portfolio

Ever wanted to make multi-monitor experiences simpler? Or encrypt your NetScaler hardware? Or maybe you have another use case you’ve…

This Cybersecurity Awareness Month, Enhance Security with Citrix Zero Trust Application Delivery

As we recognize Cybersecurity Awareness Month this October, it’s the perfect opportunity to reassess how we secure applications in today’s…

What’s New and Next with Citrix: XenServer, Security, and VDI Solution Updates

With the launch of the Citrix platform this year, we’re working towards building a better Citrix for you. This means…

Diving deep into Citrix zero trust architecture

In my previous”Overcoming observed challenges when adopting a zero trust architecture” blog post, I discussed some of the observed challenges…

How channel partners are architecting a seamless zero trust framework

Modern threats require a modern approach to security. Plus, our recent survey found that 95 percent of businesses are taking…

What to know about zero trust architectures

Zero trust architectures have gained rapid adoption by cybersecurity teams recently with the rise of knowledge workers moving to remote…

How to implement zero trust security for your network

“Never trust, always verify” and “just enough” access. These are the key philosophies behind zero trust approaches to cybersecurity. Although…

How to create a zero trust network

Looking to achieve zero trust security for your business? You’re not alone. The White House recently released an edict declaring…

Zero trust architecture benefits for your business

In a perfect world, you could turn a blind eye to your company network and safely trust that anyone trying…

Seven principles of the zero trust security model

The reality of today’s fast-paced, increasingly remote work environment positions your business as vulnerable to security breaches. Your employees increasingly…

How Citrix can help customers achieve zero trust maturity

Information technology has evolved, and so has the way we engage with it for work. With the proliferation of remote…