Security, privacy and compliance for products and services

Find product and service specific information below.

Citrix Secure Private Access technical security overview
Overview of preferred security practices when using Citrix Secure Private Access and the information it collects and manages.

Citrix ADC secure deployment guide
Secure deployment guide for Citrix ADC appliances.

Citrix Networking SSL/TLS best practices
Steps to validate existing SSL\TLS configuration of vServer running on Citrix ADC.

Citrix Analytics customer content and log handling
Information around the collection, storage, and retention of logs generated in connection with Citrix Analytics service.

Citrix Analytics technical security overview
Overview of preferred security practices when using Citrix Analytics service and the information Citrix Analytics collects and manages.

Citrix Application Delivery Management customer content and log handling
This document is intended to communicate the data collected and stored in cloud as part of Citrix Application Delivery Management (ADM) service.

Citrix Cloud services customer content and log handling
Review information about Citrix handling of customer content and logs for Citrix Cloud services.

Citrix Cloud services platform secure deployment guide
Overview of preferred security practices when using Citrix Cloud and the information Citrix Cloud collects and manages.

Citrix services security exhibit
Explore technical and organizational controls for Citrix.

Due diligence for Citrix Content Collaboration, Citrix Endpoint Management, and Citrix Virtual Apps & Desktops
Learn about our security posture and related controls. Review the Shared Assessments Standardized Information Gathering (SIG) self-attestation questionnaire and supporting documentation.

Citrix Endpoint Management security experience guide
Security and user experience guide for Citrix Endpoint Management.

Due diligence for Citrix Content Collaboration, Citrix Endpoint Management, and Citrix Virtual Apps & Desktops
Learn about our security posture and related controls. Review the Shared Assessments Standardized Information Gathering (SIG) self-attestation questionnaire and supporting documentation.

Citrix Gateway technical security overview
Overview of preferred security practices when using Citrix Gateway and the information Citrix Gateway collects and manages.

Citrix Intelligent Traffic Management customer content and log handling
Review information about Citrix handling of customer content and logs for Citrix Intelligent Traffic Management.

Citrix SD-WAN secure deployment guide
Secure deployment guide for Citrix SD-WAN.

Citrix Secure Browser technical security overview
Overview of preferred security practices when using Citrix Remote Browser Isolation service and the information Citrix Remote Browser Isolation collects and manages.

Citrix Workspace Microapps service security overview
Answers to the most common customer questions and overview of our approach to security of the Citrix Workspace Microapps service.

Citrix DaaS technical security overview
Overview of preferred security practices when using Citrix DaaS and the information Citrix DaaS collects and manages

Endpoint security and antivirus best practices
Guidelines for configuring antivirus software in Citrix Virtual Apps and Desktops environments.

Due diligence for Citrix Content Collaboration, Citrix Endpoint Management, and Citrix Virtual Apps and Desktops
Learn about our security posture and related controls. Review the Shared Assessments Standardized Information Gathering (SIG) self-attestation questionnaire and supporting documentation.