Citrix Glossary


Access Control
Access control is a fundamental component of data security that dictates who’s allowed to access and use company information and resources.

Access Control Management
In computing, access control management refers to the management of access to systems, resources or other information for a user or user group. This often includes authentication to prove the identity of the user or group requesting access.

API Gateway
API gateway enforces security measures on API calls like IP whitelisting/blacklisting, authentication, content routing, rate limiting, and more to secure and manage your traffic in a single pass for better performance, lower complexity, and lower TCO.

API Security
With API Security, you get comprehensive protection for your APIs so that you can protect your valuable application and data assets, provide insight into the performance and use of your APIs, and help you make more informed decisions.

Application Acceleration
Application acceleration is the process of speeding the performance and delivery of applications with network componentry that leverages a variety of caching, compression and encryption methods to gain improved performance from application servers and faster delivery to end-point devices.

Application Compatibility
Application compatibility is the ability and level of support that a particular application may have within a specific run-time environment or operating system, such as the ability for a specific set of web browsers – for instance Internet Explorer or Firefox – to run on Linux.

Application Delivery
Application delivery is the process of bringing an application (typically a web application) to end users while the application’s data processing and computing is executed inside a data center or cloud environment.

Application Delivery Controller
An application delivery controller (ADC) is a network device that lives in the datacenter, located strategically between the firewall and one or more application servers. The ADC handles load balancing between servers and optimizes end-user performance and security for enterprise applications.

Application Firewall
An application firewall is a network security device which controls input, output and/or access between an application and a service to protect applications from attacks.

Application Management
Application management is the process of managing the lifecycle of an application, from development to deployment.

Application Migration
Application migration refers to the activities and processes involved in moving from one application to another, from one application version to another, or of moving an application from one operating system to another.

Application Security
Application security refers to measures and countermeasures taken to protect applications from internal and external threats.

Application Virtualization
Application virtualization or app virtualization is technology that allows users to access and use an application from a separate computer than the one on which the application is installed.


Bot Management
A bot management solution detects the bad bots and mitigates bot attacks to protect your web applications and appliance from advanced security attacks.

Bot Mitigation
Bot mitigation is a security solution that helps mitigate the effect of bad bots on a company's assets by identifying incoming clients as bots and then filter them out.

Branch Office Networking
Branch office networking refers to the ability to connect a main corporate office to branch offices via an IT infrastructure that will accelerate, control and optimize all services, including desktops, applications, multimedia and more.

Bring-Your-Own Device
Bring your own device, BYOD, is the evolving trend of employees using their personal devices like laptops, smartphones, tablets, or any consumer piece of information technology.

Business Continuity
Business continuity is an organization's capability to maintain mission-critical functionality during and after a disaster, such as service outages, security breaches or other threats.

Business Continuity Plan
A business continuity plan refers to an organization’s system of procedures to restore critical business functions in the event of unplanned disaster. 

Business-Ready Desktop
The business-ready desktop is a complete end user focused desktop ready for line-of-business use. As a virtual hosted workspace, a business-ready desktop is complete with applications, productivity tools, storage and more. Business-ready desktops have comprehensive value, are fully-supported, and delivered on-demand.


Caching is an area of a computer’s memory devoted to the retrieval of frequently-used or requested content. The content, which includes HTML pages, images, files and Web objects, is stored on the local hard drive in order to make it faster for the user to access it, which helps improve the efficiency of the computer and its overall performance.

Client Virtualization
Client virtualization is method of abstracting or separating a user operating system from the underlying device in order to increase security, manageability and supportability. Client virtualization enables multiple OS instances to run on a single device directly on top of the bare metal without interfering with one another and without the need for a fully functional operating system acting as a host layer.

Cloud Architecture
Cloud architecture refers to the components necessary for cloud computing. There are four essential parts, which create a complete cloud computing architecture when combined: a front end platform, back end platforms, a cloud based delivery, and a network.

Cloud Computing
Cloud computing refers to the delivery of computing resources—things like applications, servers, storage, software, and networking—over the internet. Rather than host your own resources, you can use them as services from various cloud providers. Cloud providers typically offer subscriptions and charge based on usage—you can scale up or down depending on your needs, much like how you’re billed for electricity.

Cloud Migration
Cloud migration provides greater flexibility, enabling IT teams to support changing business processes with alacrity. And with the ability to dynamically size storage, compute, and other resources, the cloud offers greater cost efficiency and nearly eliminates the need to make capital investments in on-premises infrastructure.

Cloud Management
Cloud management refers to the technologies and software needed for operating and monitoring data, applications and other services that live in the cloud.

Cloud Native
Cloud native is the name for an approach to building and running applications across private, public and hybrid clouds. When an app is "cloud native," it’s designed specifically to be developed and managed within a cloud environment.

Cloud Networking
Cloud networking refers to hosting or using network resources and services—virtual routers, bandwidth, virtual firewalls, or network management software—from any public, private, or hybrid cloud. Cloud networking spans both in-house networks that utilize cloud-based services for various tasks, as well as networks that are entirely cloud-based.

Cloud Orchestration
Cloud orchestration is the process of automating the configuration and management of complex cloud workloads through a single interface, which provides greater performance and scalability.

Cloud Scalability
Cloud scalability refers to the ability of a cloud platform to increase its size and performance based on current network resources.

Cloud Service
The term "cloud services" refers to a wide range of services delivered on demand to companies and customers over the internet. These services are designed to provide easy, affordable access to applications and resources, without the need for internal infrastructure or hardware.

Cloud Service Automation
Cloud service automation is the process of automating the deployment of cloud services across a hybrid cloud environment.

Collaborative Workspace
Accessing, collaborating, and sharing is made easy with Citrix Workspace, a secure work environment that gives all workers access to apps, files, and resources to collaborate efficiently and effectively on any device anywhere.

Consumerization of IT
Consumerization of IT refers to the growing trend of new information technology that is consumer-driven. This is a major shift in the IT industry, where large business and government organizations have long since dominated computer usage and development.

Containerization is a form of operating system virtualization, through which applications run in isolated user spaces called containers, all using the same shared operating system (OS).


Desktop Management
Desktop management is the technology, processes and procedures for managing and supporting the laptops, desktops and other end-user computing devices that leverage enterprise IT services and resources.

Desktop Virtualization
Desktop virtualization is technology that lets users simulate a workstation load to access a desktop from a connected device remotely or locally.

Desktops-as-a-Service (DaaS)
Desktop as a Service (DaaS) is a cloud computing offering that enables businesses to deliver cloud-hosted virtual desktops to any device, from anywhere.

Digital Transformation
Digital transformation is the strategic adoption of digital technologies, such as a digital workspace, to improve processes and productivity, manage business risk and improve customer service.

Digital Wellness
Digital wellness (also known as digital wellbeing or digital health) is the pursuit of an intentional and healthy relationship with technology in the workplace and in personal life.

Digital Workplace
A digital workplace is a business strategy that brings together the tools, places, workstyles, culture, and skills employees need to do their best work and better serve their customers.

Digital Workspace
Digital workspace allows employees to access their apps and data using any device regardless of the network or cloud.

Disaster Recovery
Disaster recovery is a set of prearranged plans and procedures that allow a company to recover its IT infrastructure in the event of an unanticipated event such as power outages, pandemics or weather emergencies.


An e-signature, or electronic signature, is a method for signing contracts and other documents electronically, without pen or paper. E-signatures are used by businesses to save time and reduce costs, and have the same legal validity and enforceability of pen-and-paper documents, when executed in compliance with e-signature laws.

Edge Security
Edge security enables advanced security and simplifies information security management for protecting the branch network from internet threats by providing a single management and reporting pane for various security functionalities along with SD-WAN.

Employee Experience
Employee experience (EX) refers to the wide range of perceptions and observations workers develop as they interact with an organization.

Employee Engagement
Employee engagement is an employee’s emotional commitment and professional investment in their job as well as the organization’s business outcomes. 

Endpoint Security
Endpoint security refers to a methodology of network protection that requires devices on a corporate network to meet certain standards of compliance before access is granted.

Enterprise App Store
An enterprise app store is a virtual application storefront for enterprise employees. Users can access the enterprise app store from mobile or desktop devices and self-select the software and services they need to interact with to perform work and collaborate to accomplish enterprise objectives.

Enterprise Sync and Sharing (EFSS)
Enterprise file sync and sharing (EFSS) is a software service that allows users to securely share and sync files, documents, photos, and videos with employees, partners, or customers across multiple devices.

Enterprise Mobility
Enterprise mobility refers to a shift in business practices, where more employees work outside the office and require secure access to corporate data. This includes using mobile devices such as smartphones or tablets, as well as accessing cloud services, to conduct business.

Enterprise Mobility Management (EMM)
Enterprise mobility management (EMM) is a set of technology, processes, and policies to secure and manage the use of corporate- and employee-owned mobile devices within an organization. 


Flexible Workplace
A flexible workplace offers a wide spectrum of work structures that go beyond traditional business scheduling. A flexible workplace may offer flexibility in hours or amount of hours worked, days or number of days worked, or in location of work, such as working from home or from a satellite location.


Global Server Load Balancing (GSLB)
Global server load balancing (GSLB) applies layer 4-7 load balancer capabilities and applies them worldwide across geographically distributed server farms to enable business continuity in the event of site-level failure.


Hardware Virtualization
Hardware virtualization is a method of running multiple independent VMs on a single physical computer by fully utilizing the physical resources available in modern powerful servers, which reduces the total cost of ownership for server deployments.

HDX technology delivers a high-definition experience to users of centralized applications and desktops, on any device and over any network.

High Availability
High availability is the continuous operational availability of resources in a computer system during scheduled downtime or system failure.

Hosted Workspace
A hosted workspace is a business-ready desktop that includes access to line of business applications, a complete user desktop, mobile device management plus file synch and share.

Hybrid Cloud
Hybrid cloud is a type of computing environment that integrates private computing resources, such as a data center or private cloud, with public clouds. Apps, data, and services are shared among these resources, which are separate entities but managed together as a unified environment.

Hybrid IT
Hybrid IT is an enterprise computing approach that runs existing in-house IT infrastructure alongside public cloud services for various enterprise workload and data needs. Unlike hybrid cloud, the in-house and cloud resources in a hybrid IT environment are not integrated to work together as one.

A hypervisor is software that creates and runs virtual machines (VMs), which are software emulations of a computing hardware environment.


Infrastructure-as-a-Service (IaaS)
Infrastructure-as-a-Service (IaaS) is a provision model in which physical or virtual machines are outsourced by an organization. Pools of hypervisors, such as the Xen® hypervisor, run the virtual machines. This can be scaled up or down according to an organization's requirements.

IT-as-a-Service (ITaaS)
IT-as-a-Service (ITaaS) is a method of delivering information technology as a commodity. In an ITaaS model, the IT organization acts as a paid service to the enterprise and must compete for its business.

IT Transformation
IT transformation is the process of aligning IT with the broader organizational goals. It is just one element of digital transformation, and refers to the ways IT can deliver next-generation solutions.


As containerization has brought speed and flexibility to IT, Kubernetes has become the default orchestration platform for automating deployment and managing container life cycle.


Load Balancing
Load balancing is a core networking solution responsible for distributing incoming traffic among servers hosting the same application content. By balancing application requests across multiple servers, a load balancer prevents any application server from becoming a single point of failure, thus improving overall application availability and responsiveness.


Microservices are component parts of an application that are designed to run independently.

Mobile Application Security
Mobile application security, or mobile app security, is the protection of mobile device applications (apps) from malware, hackers or other malicious attacks. Mobile app security is a chief component of mobile application management (MAM), which protects mobile devices from the risk of exploits via their apps.

Mobile Device Management (MDM)
Mobile device management refers to any tool or software designed to help IT administrators control and secure mobile devices like smartphones and tablets across an organization.

Mobile Device Security
Mobile device security refers to the protection of mobile devices deployed across the enterprise. Mobile device security is designed to extend the same protection and policy controls available on-premise to BYO devices such as smartphones or tablets.

Mobile Web Application
A mobile web application is a mobile application (app) that combines web and touch-enabled functionality. Mobile web applications are web-based, which improves device compatibility, but provide users with the look and feel of a native app.

Mobile Workspace
Mobile workspace technology addresses the needs of a mobile workforce by securely delivering apps, desktops, files and services seamlessly to any user, on any device, over any network.

Multi Cloud
Multi-cloud is a strategy where an organization leverages two or more cloud computing platforms to perform various tasks.


Network Functions Virtualization (NFV)
Network functions virtualization (NFV) refers to an initiative aimed at reducing the amount of hardware, power and space required to deploy network functions. The concept is designed to virtualize network functions via virtual machines, which would decrease the amount of hardware previously needed for network functions, such as routers, firewalls and load balancers.

Network Virtualization
Network virtualization refers to networks that consist of resources being linked together into a cohesive communication group. Virtual networks are used to sub-divide physical resource groups as a part of a larger network and can even be used to enable multiple virtual machines running on a single laptop to communicate with each other regardless of whether the laptop itself is connected to a network.


Online Collaboration
Collaboration occurs when people meet and work together on the Internet in real time, erasing the distance between your team with instant face-to-face online video conferencing and screen sharing.

Open-Source Virtualization
Open-source virtualization refers to virtualization technologies that are available as open-source software. Examples include the Xen ProjectTM hypervisor from


PCI-DSS Compliance
Payment Card Industry Data Security Standard (PCI-DSS) compliance is following a set of policies and procedures created to increase controls around cardholder data to reduce credit card fraud.

Private Cloud
Private cloud is a computing model that offers a proprietary environment dedicated to a single business entity.

Public Cloud
A public cloud is a type of computing in which a service provider makes resources available to the public via the internet.


Remote Access
Remote access is the act of connecting to IT services, applications or data from a location other than headquarters or other than that which is closest to the data center.

Remote Desktop
A remote desktop is a user-targeted computing environment running somewhere other than a user’s physical location.

Remote Workforce
Learn what a remote workforce is and how full-time remote workers can improve work-life balance, increased productivity and better employee engagement.


The Secure Access Service Edge model unifies modern networking and security functionality into one integrated architecture, so it’s easy to manage, but also uses the cloud to deliver the functionality closer to the user, so they feel productive, engaged and empowered to do their best work, from anywhere.

Secure Access Gateway
A secure access gateway provides remote access to an agency network via a secure link.

Security Analytics
Security analytics is an approach to digital security that analyzes data to detect anomalies, unusual user behavior, and other threats.

Server Virtualization
Server virtualization is the act of separating server-class operating systems from the hardware on which they are traditionally installed through the use of a middle-ware layer. This enables the server hardware to be leveraged as a single pool of capacity such that any instance of a server operating system running as a virtual machine can be hosted anywhere in the pool.

Session Virtualization
Session virtualization uses application streaming to deliver applications to hosting servers in the datacenter. The user connects to the server to which the application has been delivered and the application then executes entirely on the server. The user interacts with the application remotely by sending mouse-clicks and keystrokes to the server, which responds by sending screen updates back to the user’s device.

Single Sign-on
Single sign-on (SSO) is an authentication capability that lets users access multiple applications with one set of sign-in credentials.

Software Defined Networking (SDN)
Software-defined networking (SDN) is an agile networking architecture designed to help organizations keep pace with the dynamic nature of today’s applications.

Software-Defined WAN (SD-WAN)
Software-defined wide-area network (SD-WAN) is a service that grants the enterprise with the ability to dynamically connect branch offices and data centers on a global scale.

A virtual private network (VPN) is a private communication channel that interconnects networks through primarily public infrastructures (e.g. the Internet). Secure Sockets Layer Virtual Private Network, or SSL VPNs, provide security and encrypted communications through the secure sockets layer tunneling protocols.


Telework is a work arrangement that allows employees to work from home or from other remote locations, using IT and telecommunications such as phone, Internet teleconferencing, e-mail or instant messaging to perform work duties.


User Behavior Analytics
Process of baselining user activity and behavior combined with peer group analysis, to detect potential intrusions, and malicious activity.


Virtual Appliance
A virtual appliance (VA) is a virtual machine (VM) image file that is used to simplify application delivery. The virtual appliance consists of a pre-configured operating system environment and a single application.

Virtual Data Room
A virtual data room is a digital data repository that is tightly controlled to restrict access. Virtual data rooms enable businesses to share and exchange large amounts of data quickly and easily, without compromising on confidentiality.

Virtual Desktop
Virtual desktops may refer to any isolated desktop-class environment dedicated and provisioned for use by a specific user either as a virtual machine or as a session within a client-server environment.

Virtual Desktop Infrastructure (VDI)
Virtual desktop infrastructure (VDI) refers to the part of the IT environment dedicated to hosting desktop operating systems within virtual machines (VM). These virtual machines can run on a hosted, centralized or remote server or servers.

Virtual Laptop
A virtual laptop is a laptop device that utilizes the benefits of desktop virtualization to become a manageable, reliable and secure virtual appliance.

Virtual Machine (VM)
A virtual machine is an operating system environment that has been abstracted from its physical machine such that it can leverage an intermediate software layer to run on any physical hardware. Examples of virtual machines include virtual desktops, virtual servers and virtual appliances.

Virtual Network Architecture
Virtual network architecture refers to a network infrastructure that can be scaled to adapt to any workload. A virtual network architecture integrates network virtualization and cloud computing to create an open virtualization solution that can connect datacenters from any location.

Virtual Workforce
A virtual workforce refers to a workforce not bound by physical or geographic location. Instead, a virtual workforce uses IT and telecommunications such as phone, Internet teleconferencing, e-mail or instant messaging to perform work duties from home or other remote locations.

Virtualization refers to the method of abstracting all aspects of the physical IT infrastructure from the specific environments that it is charged with hosting (e.g. applications, desktops, servers, storage, networks, etc.) thus enabling improved management, control, flexibility, security and utilization of the overall service infrastructure.


WAN Edge
WAN edge solutions accelerate digital transformation with flexible, automated, and secure connectivity and performance for SaaS, cloud, and virtual applications to ensure an always-on workspace experience.

WAN Failover
WAN failover helps prevent disruption of network connections and application access by identifying an outage or other failover event and rerouting traffic to an active WAN path.

WAN Network
A wide area network (WAN) connects a group of computers and other network devices over geographically dispersed locations. An enterprise WAN typically connects branch offices or remote employees to the data center, giving users access to applications, cloud services, and other corporate resources.

WAN Optimization
Also known as WAN acceleration, WAN optimization is a collection of techniques used to increase the efficiency of data transfer across a wide area network (WAN). Techniques used to achieve WAN optimization include deduplication, compression, latency optimization, caching, forward error correction, protocol spoofing, traffic shaping, equalizing, connection limiting and service-level rate limiting.

White Label Hosting Reseller
A white label hosting reseller of Desktops-as-a-Service offer generic Desktop-as-a-Service (DaaS) via an ecosystem of value added resellers. White label hosting resellers can provide their business channel partners with a fast route to market and an easy route to scale business by offering a pre-built, proven partner platform. Downstream resellers and service providers add value through the addition of unique brand, bundled services, and direct customer support.

Windows XP Migration
Windows XP Migration refers to the process of migrating a computer's operating system from Windows XP to Windows 7 or Windows 8. Microsoft will no longer offer support for Windows XP as of April 8, 2014. This means that enterprise IT will no longer receive security updates or other necessary support from Microsoft after this time and thus must upgrade their infrastructure to a more modern platform.

Workshifting is a flexible work arrangement that allows employees to work from anywhere, at any time, on any device.

Find out what is a workspace, the benefits, and how Citrix helps people do their best work while keeping company data secure.


The Xen Project™ hypervisor is a layer of software which replaces the traditionally installed operating system and which runs directly on a computer's hardware, allowing it to run multiple guest operating systems concurrently. Support for x86, x86-64, Itanium, Power PC, and ARM processors allow the Xen Project hypervisor to run on a wide variety of computing devices and currently supports Linux, NetBSD, FreeBSD, Solaris, Windows, and other common operating systems as guests running on the hypervisor. The community develops and maintains the Xen Project hypervisor as a free solution licensed under the GNU General Public License.


Zero Trust Security
A zero trust model, or architecture, means that no user or device should have default access to an organization’s network, workspace, or other resources—even if they’re employed by the organization.