BY USE CASE
Secure Distributed Work
Access control is a fundamental component of data security that dictates who is permitted to access and use company apps and data.
Adaptive Access Control
Adaptive access control is the process of using IT policies that allow administrators to control user access to applications, files, and network features based on multiple real-time factors.
Adaptive authentication is a method for verifying user identity and authorization levels based on factors such as location, device status, and end user behavior.
Adaptive security is a security approach that’s used to respond to potential cyberthreats in real-time by continually monitoring user sessions.
API gateway enforces security measures on API calls like IP whitelisting/blacklisting, authentication, content routing, rate limiting, and more to secure and manage your traffic in a single pass for better performance, lower complexity, and lower TCO.
API Security provides comprehensive protection for your APIs so that you can protect your valuable application and data assets, get insight into the performance and use of your APIs, and help you make more informed decisions.
Application delivery is the process of bringing an application (typically a web application) to end users while the application’s data processing and computing is executed inside a data center or cloud environment.
Application Delivery Controller
An application delivery controller (ADC) is a network device that lives in the datacenter, located strategically between the firewall and one or more application servers. The ADC handles load balancing between servers and optimizes end-user performance and security for enterprise applications.
Application security refers to measures and countermeasures taken to protect applications from internal and external threats.
Application virtualization or app virtualization is technology that allows users to access and use an application from a separate computer than the one on which the application is installed.
Autoscaling is a technique used in cloud computing to allocate resources.
A bot management solution detects the bad bots and mitigates bot attacks to protect your web applications and appliance from advanced security attacks.
Bot mitigation is a security solution that helps mitigate the effect of bad bots on a company's assets by identifying incoming clients as bots and then filter them out.
Bring-Your-Own Device (BYOD)
Bring your own device (BYOD) is the evolving trend of employees using their personal devices like laptops, smartphones, tablets, or any consumer piece of information technology.
Remote browser isolation is a web security measure used to create a "gap" between a remote user's internet browser and corporate networks.
Business continuity is an organization's capability to maintain mission-critical functionality during and after a disaster, such as service outages, security breaches or other threats.
Business Continuity Plan
A business continuity plan refers to an organization’s system of procedures to restore critical business functions in the event of unplanned disaster.
BYOD security is the set of tools used to reduce risks from bring your own device (BYOD)—the practice of using a personal device, instead of a company-issued one, for work purposes.
Cloud Access Security Broker (CASB)
Cloud access security brokers (CASBs) are security solutions placed between cloud service consumers and providers, enforcing security policies when users or entities want to access cloud-based resources.
Cloud computing refers to the delivery of computing resources—things like applications, servers, storage, software, and networking—over the internet. Rather than host your own resources, you can use them as services from various cloud providers.
Cloud migration is the process of moving apps and data from an on-premises location to the cloud. The cloud offers greater cost efficiency and nearly eliminates the need to make capital investments in on-premises infrastructure.
Cloud native is the name for an approach to building and running applications across private, public and hybrid clouds. When an app is "cloud native," it’s designed specifically to be developed and managed within a cloud environment.
Cloud networking refers to hosting or using network resources and services—virtual routers, bandwidth, virtual firewalls, or network management software—from any public, private, or hybrid cloud. Cloud networking spans both in-house networks that utilize cloud-based services for various tasks, as well as networks that are entirely cloud-based.
Cloud security is the complete set of policies and controls for protecting cloud computing environments and the data within them.
The term "cloud services" refers to a wide range of services delivered on demand to companies and customers over the internet. These services are designed to provide easy, affordable access to applications and resources, without the need for internal infrastructure or hardware.
Cloud storage, or online storage, is the storage of data within an internet-accessible environment managed by a cloud storage provider. That service provider offers its storage customers on-demand network access to their data from virtually any device or location. Customers don’t have to manage the technical aspects of the storage or its supporting infrastructure.
A collaborative workspace enables people to work together, regardless of their physical location. This means workers can to easily access the tools they need to seamlessly collaborate anywhere, from any device.
Containerization is a form of operating system virtualization, through which applications run in isolated user spaces called containers, all using the same shared operating system (OS).
Continuous authentication is a method for authenticating users and granting access to corporate resources.
Cybersecurity is the collection of security tools, technologies, processes, and practices used to protect networks, users, devices, software, applications, and data from malicious digital actions known as cyberattacks.
Data security is the group of techniques, tools, and practices used to protect digital information from unauthorized access, malicious users, and corruption. It includes every aspect from the physical security of servers and storage to access control management.
Desktop virtualization is technology that lets users simulate a workstation load to access a desktop from a connected device remotely or locally.
Desktop as a Service (DaaS) is a cloud computing offering that enables businesses to deliver cloud-hosted virtual desktops to any device, from anywhere.
Device security is the defense of IT assets against harm and unauthorized use. Although the term “device security” is not as widely used as “cybersecurity,” it is a relevant concept that denotes the full range of practices for securing desktop PCs, laptops, smartphones, tablets, or Internet of Things (IoT) devices.
Digital transformation is the strategic adoption of digital technologies, such as a digital workspace, to improve processes and productivity, manage business risk and improve customer service.
Digital wellness (also known as digital wellbeing or digital health) is the pursuit of an intentional and healthy relationship with technology in the workplace and in personal life.
A digital workplace is a business strategy that brings together the tools, places, workstyles, culture, and skills employees need to do their best work and better serve their customers.
Digital workspace allows employees to access their apps and data using any device regardless of the network or cloud.
Disaster recovery is a set of prearranged plans and procedures that allow a company to recover its IT infrastructure in the event of an unanticipated event such as power outages, pandemics or weather emergencies.
An e-signature, or electronic signature, is a method for signing contracts and other documents electronically, without pen or paper. E-signatures are used by businesses to save time and reduce costs, and have the same legal validity and enforceability of pen-and-paper documents, when executed in compliance with e-signature laws.
Edge security enables advanced security and simplifies information security management for protecting the branch network from internet threats by providing a single management and reporting pane for various security functionalities along with SD-WAN.
Employee experience (EX) refers to the wide range of perceptions and observations workers develop as they interact with an organization.
Employee engagement is an employee’s emotional commitment and professional investment in their job as well as the organization’s business outcomes.
When it comes to your employees’ wellbeing, a little investment can pay off in the long run. Learn why you should deliver a workspace with built-in employee wellbeing features.
Endpoint security refers to a methodology of network protection that requires devices on a corporate network to meet certain standards of compliance before access is granted.
Enterprise Sync and Sharing (EFSS)
Enterprise file sync and sharing (EFSS) is a software service that allows users to securely share and sync files, documents, photos, and videos with employees, partners, or customers across multiple devices.
Enterprise Mobility Management (EMM)
Enterprise mobility management (EMM) is a set of technology, processes, and policies to secure and manage the use of corporate- and employee-owned mobile devices within an organization.
Hardware virtualization is a method of running multiple independent VMs on a single physical computer by fully utilizing the physical resources available in modern powerful servers, which reduces the total cost of ownership for server deployments.
HDX technology delivers a high-definition experience to users of centralized applications and desktops, on any device and over any network.
Hosted desktops improve the efficiency of IT infrastructure while simplifying the users’ work. However, companies are increasingly moving to the cloud. Learn when to move the Cloud Desktop (DaaS).
Hybrid cloud is a cloud computing solution that combines a private cloud with public cloud services, allowing shared data and apps between each service.
Hybrid IT is an enterprise computing approach that runs existing in-house IT infrastructure alongside public cloud services for various enterprise workload and data needs. Unlike hybrid cloud, the in-house and cloud resources in a hybrid IT environment are not integrated to work together as one.
A hybrid work model is the blending of in-office and remote work. An employee in this model may divide their time between commuting to the office and working from other locations.
A hypervisor is software that creates and runs virtual machines (VMs), which are software emulations of a computing hardware environment.
Identity Access Management
Identity and access management (IAM) is used by organizations to manage digital identities and prevent unauthorized users from accessing sensitive data.
IT transformation is the process of aligning IT with the broader organizational goals. It is just one element of digital transformation and refers to the ways IT can deliver next-generation solutions.
Kubernetes is an open-source platform for deploying, scaling, and managing containerized applications and microservices architectures.
Load balancing is a core networking solution responsible for distributing incoming traffic among servers hosting the same application content. By balancing application requests across multiple servers, a load balancer prevents any application server from becoming a single point of failure, thus improving overall application availability and responsiveness.
Malware, short for malicious software, is an umbrella term for many types of computer programs created to disrupt or exploit a network, device, or service.
Managed desktops allow an organization to deliver virtual apps and desktops from the cloud to any end user device or location without worrying about virtual desktop infrastructure (VDI) deployment or management.
Microservices are component parts of an application that are designed to run independently.
Mobile Device Management (MDM)
Mobile device management refers to any tool or software designed to help IT administrators control and secure mobile devices like smartphones and tablets across an organization.
Multi-cloud is a cloud strategy where an organization leverages two or more cloud computing platforms to perform various tasks.
Network Access Control (NAC)
Network access control (NAC), is a group of tools and methodologies aimed at improving the security, visibility, and access management of a network. NAC tools monitor and control the access to network resources according to a defined security policy.
Network security is the act of protecting digital resources, applications, and data from malicious intrusions.
Network virtualization refers to networks that consist of resources being linked together into a cohesive communication group. Virtual networks are used to sub-divide physical resource groups as a part of a larger network and can even be used to enable multiple virtual machines running on a single laptop to communicate with each other regardless of whether the laptop itself is connected to a network.
Private cloud is a computing model that offers a proprietary environment dedicated to a single business entity.
A public cloud is a computing model in which a service provider makes resources available to the public via the internet.
Remote access is the act of connecting to IT services, applications or data from a location other than headquarters or other than that which is closest to the data center.
Remote Work Security
Scalable remote work security is more important than ever as more employees telecommute. Here’s how to protect your digital workspace environment.
Remote working is a mode of work that allows employees of an organization to perform all their essential job responsibilities from outside traditional office space. By telecommuting from home offices, these out-of-office employees make up a remote workforce for that organization.
Role-based access control
Role-based access control is an approach to identity and access management where the user is given access to a resource according to their role at the organization.
Controlling access is a major component of SaaS security, and Citrix solutions for secure internet access, single sign-on can help protect SaaS access.
The Secure Access Service Edge (SASE) model unifies modern networking and security functionality into one integrated architecture, so it’s easy to manage, but also uses the cloud to deliver the functionality closer to the user, so they can stay productive.
Secure File Sharing
Secure file sharing is the act of digitally sharing links to documents, photos, videos, and other online files in a manner that does not make them vulnerable to hackers.
Secure Remote Access
Secure remote access is the process of enabling secure connections to a network, application, or data, even when users are logging in from remote locations.
Secure Web Gateway
A secure web gateway, or SWG, is a type of network security solution that prevents malicious traffic from entering the internal network of an organization.
Security analytics is an approach to digital security that analyzes data to detect anomalies, unusual user behavior, and other threats.
Security Service Edge (SSE)
Security service edge (SSE) is a combination of network security services delivered from a cloud platform.
Single sign-on (SSO) is an authentication capability that lets users access multiple applications with one set of sign-in credentials.
Software as a Service (SaaS)
Software as a service (SaaS) is a software delivery model where applications are hosted in the cloud, delivered to customers via the internet, and licensed as subscriptions.
Software Defined Networking (SDN)
Software-defined networking (SDN) is an agile networking architecture designed to help organizations keep pace with the dynamic nature of today’s applications.
Software-Defined WAN (SD-WAN)
Software-defined wide-area network (SD-WAN) is a service that grants the enterprise with the ability to dynamically connect branch offices and data centers on a global scale.
User Behavior Analytics
Process of baselining user activity and behavior combined with peer group analysis, to detect potential intrusions, and malicious activity.
Virtual Data Room
A virtual data room is a digital data repository that is tightly controlled to restrict access. Virtual data rooms enable businesses to share and exchange large amounts of data quickly and easily, without compromising on confidentiality.
A virtual desktop is a software emulation of a hardware device that runs on a physical or virtual machine at a remote location, hosted either on premises or in the cloud. Virtual desktops—such as Azure Virtual Desktop—enable end users to access their unique desktop environments remotely over a network.
Virtual Desktop Infrastructure (VDI)
Virtual desktop infrastructure (VDI) refers to the part of the IT environment dedicated to hosting desktop operating systems within virtual machines (VM). These virtual machines can run on a hosted, centralized or remote server or servers.
Virtual Machine (VM)
A virtual machine is an operating system environment that has been abstracted from its physical machine such that it can leverage an intermediate software layer to run on any physical hardware. Examples of virtual machines include virtual desktops, virtual servers and virtual appliances.
Virtual workspaces are not only for remote work. Find out all the ways your organization can benefit from virtual workspaces.
Virtualization refers to the method of abstracting all aspects of the physical IT infrastructure from the specific environments that it is charged with hosting (e.g. applications, desktops, servers, storage, or networks) thus enabling improved management, control, flexibility, security and utilization of the overall service infrastructure.
WAN edge solutions accelerate digital transformation with flexible, automated, and secure connectivity and performance for SaaS, cloud, and virtual applications to ensure an always-on workspace experience.
WAN failover helps prevent disruption of network connections and application access by identifying an outage or other failover event and rerouting traffic to an active WAN path.
A wide area network (WAN) connects a group of computers and other network devices over geographically dispersed locations. An enterprise WAN typically connects branch offices or remote employees to the data center, giving users access to applications, cloud services, and other corporate resources.
Web application security
Web application security is the group of technologies, processes, and methods used to protect web applications, servers, and web services from a cyber attack. Web application security products and services use tools and practices such as multi-factor authentication (MFA), web application firewalls (WAFs), security policies, and identity validation to maintain user privacy and prevent intrusions.
Workflow automation is the process of using predefined business rules to automatically trigger various actions for completing an activity, such as approving a document or capturing a signature. It can be achieved using low-code software with drag-and-drop features.
A workspace is a technology framework that brings together all the applications, tools and resources to get work done and collaborate securely, personalized for every individual in a digital world.
Workspace security refers to the application of tools and solutions to protect sensitive data, networks, and access in digital workspaces without disrupting the user experience.
A zero-trust model, or architecture, means that no user or device should have default access to an organization’s network, workspace, or other resources—even if they’re employed by the organization.
ZTNA is a group of technologies and functionalities to provide secure access to applications and data.