Displaying 6 of 6 results

Cloud Guidepost: Protecting your network with Citrix Secure Browser

Why bother with Citrix Secure Browser Service? This blog dives into the benefits and use cases to help keep your information safe.

Zero Trust – The Citrix Way

Whack-a-mole (noun); “An arcade game in which players use a mallet to hit toy moles, which appear at random, back…

Approaching a zero-trust security model with Citrix Workspace – Part 2

In the first part of our discussion on approaching a zero-trust security model for your organization, we laid a solid…

XenServer 7.1 CU2 awarded Common Criteria EAL2+ status

Security is a top priority for our customers, and Citrix has a long history of demonstrating the security of our…

Automating the Citrix Federated Authentication Service with PowerShell

As SAML-based identity providers become more popular in the enterprise space, many companies are looking to integrating the tools into…

Citrix TIPs: Top 10 recommendations to improve your security posture

Following up from their findings last week, Citrix Architects provide recommendations to improve the security posture for your current or upcoming Citrix deployment.