Establish device trust with Citrix’s device posture service

In our mobile-first world, where hybrid work is the norm for many organizations, employees need access to corporate applications and…

Citrix App Layering and the new Azure Connector

Citrix App Layering went through a huge transformation process in 2022, with the developer doing a fantastic job rewriting a…

General availability is here for Policy Modeling in Citrix DaaS

We’re excited to share that one of the more popular features in Citrix Virtual Apps and Desktops is now available…

Enhance your Cloud PCs with Citrix HDX Plus for Windows 365

Today we are excited to announce the general availability of Citrix HDX Plus for Windows 365! Citrix DaaS customers can…

Citrix Session Recording in a compliance-driven world

Learn how a Citrix Ready Partner took insights from the field to develop an automated solution for pausing and resuming recording sessions and made Citrix Session Recording an even more powerful tool.

Introducing Citrix on Azure enterprise-scale reference architecture

Back in 2020 and 2021, I created a blog series that aligned Citrix design methodologies to the Microsoft Cloud Adoption…

How customers and partners can apply custom branding to Citrix client apps

Customization is personal, and for enterprises it is a reflection of identity. We have been amazed by the stories of…

Welcome to the Citrix Technology Professional (CTP) class of 2023!

In 2018, we restructured the Citrix Technology Professional (CTP) program by partnering CTP members with Citrix product managers and engineers…

Announcing the newest Citrix Technology Advocate (CTA) awardees!

We are very excited to share the newest additions to our Citrix Technology Advocate (CTA) class of 2023! CTAs are …

New Citrix Secure Hub for iOS app store experience now available!

As we move ahead in 2023 with Citrix Endpoint Management innovations, we are excited to announce the preview of the…

How to fix VMs that continuously show an unknown power state

Citrix Virtual Apps and Desktops helps administrators manage virtual machines (VMs) on hypervisors securely and reliably and in a cost-efficient…

Preventing the theft of OAuth session tokens using secure Cloud Development Environments

In this blog, we’ll explore the rising trend of cyberattacks targeting session tokens, illustrating their impact through recent high profile…

Machine Creation Services support for catalogs with Azure VM extensions

Azure extensions are small applications that you can add to VMs after deployment that provide VM configuration, monitoring, security, and…

Get secure, reliable access to Citrix Workspace through Citrix Workspace browser extension

Learn about the Citrix Workspace browser extension, which can help to streamline app and desktop launches from the web client and enhance the reliability and security of hybrid launches.

Overcoming observed challenges when adopting a zero trust architecture

Zero trust has become a crucial component in the cybersecurity strategy of organizations everywhere. More and more enterprises are finding…

Splunk data volume reduction techniques

As a product built from day one with Splunk as the primary backend platform, uberAgent is heavily optimized to generate…

Show More Loading