The recent security breach in a popular consumer app has shined the spotlight on the potential for spyware to be installed on nonmanaged devices. At Citrix Synergy 2019, we are introducing new technology that can help protect application data from keyloggers and screen scrapers while still allowing companies to embrace BYOD and extend their apps to contractors and gig economy workers.

Controlling which users have access to sensitive data and what the users can do with that data has long been one of the key features of Citrix Workspace solutions. By giving secure access to applications only to the users who really need it and being able to apply context-aware policies that control actions like printing, copying, and pasting, companies can embrace the changes that come with an ever-increasing mobile workforce, digitization, and regulations without compromising on their security standards. They can even apply a watermark on the application pages, raising the bar for taking a photograph or a screenshot of the screen and sharing it on the web. This regardless if it is a Windows, Linux, SaaS, or web application.

To help our customers enhance their security posture even more, Citrix is proud to introduce its new app-protection technology. With this policy-controlled technology enabled, the authentication screen of the Citrix Workspace app will be protected from keylogging and screen capture. Any SaaS, web, Windows, or Linux application initiated from the Workspace app will be protected from keylogging and screen-capturing malware that could steal potentially sensitive data out of the organization.

Screenshot of an application protected by app-protection policies (no, I’m not kidding!)

But the protection doesn’t stop there.

Even files from Citrix Files or any other connectors like Google Drive or Microsoft One Drive that are accessed from within the Workspace app will be protected from screen scrapers, as will be all the micro apps and their notifications from within Workspace.

Integrating this technology with already existing Citrix components will help organizations protect sensitive applications and data with an additional layer of security without adding complexity. Companies in the finance, government, and healthcare verticals can apply this to help them achieve endpoint-security compliance. For companies that deal with an increasing number of contractors and a gig-economy workforce, it will help protect company IP even in situations where managing the endpoint isn’t possible. It will also help address concerns companies have around expanding BYOD programs because of potentially compromised end-user devices.

General availability is targeted for second half of 2019, but if you are attending Citrix Synergy 2019, you can get a glimpse of this technology in action at the Citrix Experience Center. Make sure you add this to your “must see” list. And if you want to learn more, please attend SYN128: App protection and Citrix Access Control — Protect your application information from keyloggers and screen scraper malware.

For Citrix Investors
This release contains forward-looking statements which are made pursuant to the safe harbor provisions of Section 27A of the Securities Act of 1933 and of Section 21E of the Securities Exchange Act of 1934. The forward-looking statements in this release do not constitute guarantees of future performance. Those statements involve a number of factors that could cause actual results to differ materially, including risks associated with the impact of the global economy and uncertainty in the IT spending environment, revenue growth and recognition of revenue, products and services, their development and distribution, product demand and pipeline, economic and competitive factors, the Company’s key strategic relationships, acquisition and related integration risks as well as other risks detailed in the Company’s filings with the Securities and Exchange Commission. Citrix assumes no obligation to update any forward-looking information contained in this press release or with respect to the announcements described herein. The development, release and timing of any features or functionality described for our products remains at our sole discretion and is subject to change without notice or consultation. The information provided is for informational purposes only and is not a commitment, promise or legal obligation to deliver any material, code or functionality and should not be relied upon in making purchasing decisions or incorporated into any contract.