The rise of business mobility is an exciting prospect for the enterprise, but it brings a daunting implication for IT: What happens when everyone is implicitly mobile?
With apps and data held up in the datacenter, being on campus or off becomes irrelevant. Everyone is on the “outside” network. So, what does this mean for security? How do you configure secure access for every type of app, in every scenario, and deal with the vast amounts of information that comes with your newly mobilized environment? Do I need to mention that you’ve got to get it done without the OpEx luxury of onboarding an army of experts and specialists?
That complexity is the core challenge facing our industry today. Sure, there’s a lot of technical innovation going on, and a lot of important problems are being solved, but that’s just table stakes for today’s vendors. The OWASP Top 10 is just one of the checklists we use at Citrix to make sure we’re delivering the right measures to help customers address vulnerabilities like SQL injection flaws and sensitive data exposure. Not to say that it’s easy to do so—but it’s the least you should expect.
The fact is, most people in charge of managing edge security aren’t deep security experts, and it’s not fair to expect them to figure out a strategy to protect this increasingly complex network environment—especially when it’s being constantly redefined under their feet through automation. CIOs need to provide a simple way to secure, audit and report on network access—without breaking the budget.
Citrix is hardly a newcomer to network security, of course. Our perspective is informed by a long and active history in secure app and data delivery.
More than 15 years ago, Microsoft relied on Citrix NetScaler to successfully defend its network against a massive Web DDoS attack launched by a fast propagating virus. A decade ago, we helped Weather.com keep its sites up and running during the massive traffic surges resulting from four hurricanes in a single month—not an attack per se, but similar in terms of its impact on the network. In 2010 we introduced the first pushbutton check for PCI validation. Since 2012, our AppFlow technology has give customers app-level visibility into traffic to perform deep security analytics.
Here are a few of the ways we’re simplifying security today—and helping control its cost.
Simple-to-use security analytics – When you’re trying to figure out whether your infrastructure is secure, you need a way to find the most relevant data in a mountain of log files and make sense of it—quickly. We provide that high level of expertise so you don’t have to develop or pay for it in-house. NetScaler Security Insight flags the configurations and issues that might indicate a vulnerability or compliance gap so you can quickly focus attention and effort where it matters most for your business.
Step-by-step configuration guides – It doesn’t matter how powerful a security feature is if it’s too much trouble to set up. To make sure customers of Citrix XenApp and XenDesktop actually benefit from their built-in security features, we provide step-by-step configuration guides that simplify adoption and use.
Automated micro-VPN – App-level security is a critical capability for the mobile enterprise. With Citrix XenMobile, people don’t have to do anything special to activate a micro-VPN; it’s a fully transparent part of the user experience. As long as you have the mobile client in place, the micro-VPN clicks on automatically as soon as users launch the app so everything they do is nice and secure.
Learn more about NetScaler security solutions here.
As network security becomes more challenging, it can be tempting to throw a bunch of new dials and levers at the problem, but solving complexity by adding complexity just doesn’t make sense. That’s why Citrix is focused on making effective security simpler to achieve and maintain.
Stop by our booth (North Hall #3214) on the RSA show floor where we will demonstrate a few more ways of how we’re addressing security with NetScaler.