| |
NetScaler Fixed Capacity |
Citrix for Private Cloud |
Citrix Universal Hybrid Multi-Cloud
|
Citrix Platform License |
|---|
| Single Sign-On (SSO) & Federated Identity |
|
* |
|
|
|---|
|
Single Sign-On (SSO) & Federated Identity: Citrix security and access control features include Microsoft Entra ID SSO, which is an Azure Active Directory SSO solution, and Seamless SSO using federated identity systems like Federated Authentication Service (FAS). These technologies facilitate a user-friendly experience by allowing one set of login credentials to access multiple applications.
* Requires seperate purchase of NS entitlements
|
| Authentication Methods |
|
* |
|
|
|---|
|
Citrix supports various user verification methods such as Challenge Response SMS using Radius protocol, User Certificate Authentication via Gateway for browser-based access, Smart Cards like CAC and PIV, Proximity or Contactless Cards, Credential Insertion methods like Fast Connect and Storebrowse, Pass-through Authentication, Biometric Authentication using Touch ID and Face ID, and Multi-factor Authentication solutions by providers like AAD, Ping, OKTA, Google, as well as using SAML 2.0 standard. These methods range from knowledge-based to possession-based and inherence-based factors for identity confirmation.
* Requires seperate purchase of NS entitlements
|
| Encryption and Security Protocols |
|
* |
|
|
|---|
|
Citrix technologies leverage secure data transmission protocols, including TLS 1.3 and DTLS 1.2 protocols which are the latest standards for securing network communications, providing strong encryption and integrity checks.
* Requires seperate purchase of NS entitlements
|
| Compliance and Standards |
|
* |
|
|
|---|
|
Citrix technologies ensure that security measures adhere to important regulations and standards, including FIPS (Federal Information Processing Standards), Credential Guard for protecting login credentials, and Common Criteria certification which is an international standard for computer security certification.
* Requires seperate purchase of NS entitlements
|
| Security Features and Monitoring |
|
* |
|
|
|---|
|
Citrix technologies leverage security-enhancing features such as Session Watermarking to prevent data leaks, On-premises Session Recording for auditing and monitoring, Smart Card Integration for authentication, HDX Proxy for secure remote access, SmartAccess for granular access control policies, and Endpoint Analysis for security checks at the Gateway level. This group is essential for proactive security management and compliance in Citrix environments.
* Requires seperate purchase of NS entitlements
|
| Adaptive Authentication |
|
|
|
|
|---|
|
Advanced authentication capabilities for Citrix Workspace login including multi-factor authentication, endpoint analysis, conditional/policy-driven authentication, logon page customization, and contextual access to virtual apps and desktops.
|
| Session recording (cloud) |
|
|
|
|
|---|
|
This is a security feature that captures and stores actions taken by users during their session in the cloud. It's used for audit trails, compliance, and troubleshooting purposes, allowing organizations to review user activity on demand.
|
| Native multi-factor authentication for administrator access |
|
|
|
|
|---|
|
A security feature built into the Citrix environment that requires administrators to provide multiple forms of verification before gaining access. This could include a combination of passwords, security tokens, biometric verification, or other forms of identification to enhance security.
|
| Device posture checking (VDI & DaaS) |
|
|
|
|
|---|
|
The Citrix Device Posture capabilities provide contextual access to virtual apps and desktop controls based on various checks, such as location, device certificate, device health, and more. It also integrates with third-party solutions like Crowdstrike and Intune.
|
| App Protection for virtualized apps |
|
|
|
|
|---|
|
Designed to safeguard virtualized applications from various types of malware and data exfiltration techniques. It generally includes measures such as anti-keylogging and screen capture protection to enhance the security of applications running in a virtualized environment.
|
| HDX Proxy Cloud Service (Gateway Service) - per user limit & pooled across users |
|
|
(2GB) |
Unlimited* |
|---|
|
HDX Proxy Cloud Service facilitates secure remote access to virtual desktops and applications. It can be configured with limits on the number of concurrent sessions per user, as well as the ability to pool these limits across a group of users, optimizing resource utilization and maintaining control over the maximum number of sessions that can be active at any given time.
*Initially configured for 5GB, contact your Citrix sales representative for additional capacity.
|
| Session recording (with audio) |
|
|
|
|
|---|
|
Allows administrators to record and replay user activities in Citrix VDI environments, capturing both screen and sound. This tool aids in security, compliance, and troubleshooting by providing detailed audits and insights into user interactions, making it essential for environments with stringent security and compliance requirements. Recorded sessions are securely stored for authorized review and analysis.
|
| App Protection for endpoints |
|
|
|
|
|---|
|
App Protection for endpoints is a security feature that protects sensitive applications from keylogging and screen capturing malware. Ideal for remote workforces, it secures confidential data on endpoints against external threats, ensuring data integrity and confidentiality in unsecured networks or environments.
|