Visit us at Booth 1515
Our comprehensive security approach combines app, data, endpoint and network security with advanced analytics for 360-degree visibility across multi-device, hybrid/multi-cloud environments, so you have the control to maintain security and compliance without disrupting the user experience.
Stop by the Citrix booth 1515 and talk to an expert about how the Citrix security solutions address the challenges of mobile security, data security, cybersecurity, and securely deploying workloads in a hybrid multi-cloud environment.
This new cloud service securely aggregates and correlates user behavior events spanning applications, devices, networks and data across the suite of Citrix products and solutions and uses machine learning and AI to deliver actionable insights to prevent malicious activity and data loss to the enterprise.
Access security services, including Identity and access management (IAM), secure web gateway (SWG) as well as comprehensive visibility and analytics. Access security services are available either as appliances, as software on-premises or in AWS or Azure, or as cloud service.
XenMobile Service addresses mobile security with unified endpoint management (UEM) and secure application delivery for a secure digital workspace. XenMobile Service simplifies the management of a UEM infrastructure and allows IT administrators to focus on defining policies, managing compliance, and increasing user productivity.
With ShareFile, IT can define policies to allow the right level of secure access for each user, in any scenario. ShareFile gives IT the control to track and log activity in real time and create custom reports to meet compliance requirements. This helps security, risk, and audit officers protect intellectual property, prevent data leakage, and facilitate compliance.
With app virtualization and VDI, corporate apps, desktops, and data remain protected in the datacenter—not users’ endpoint devices—enabling security and compliance while providing remote access from anywhere. DesktopPlayer for Windows and Mac secures virtual computers and reduces the risk of data loss for on-the-go laptop users with features such as time-based lockout, expiration, and remote wipe policies. With these capabilities, sensitive information within the virtual desktop stays safe—even if the device is lost or stolen.
Secure Browser Standard Service protects the corporate network from browser-based attacks by isolating web browsing. It delivers consistent, secure remote access to internet hosted web applications with zero endpoint configuration. By isolating internet browsing, IT administrators can offer end users safe internet access without sacrificing security.
Citrix ADC and Web Application Firewall (WAF) software deliver business continuity and application resiliency and protect against DDoS attacks and application layer targeted attacks. The Citrix application security solutions are available either as appliances, as software on-premises or in AWS or Azure, or as a cloud service: with the Management and Analytics service (MAS) providing consistent visibility and control wherever they are deployed. At RSA we will be showing new features in our WAF service and demonstrate how MAS allows you to see and manage threats to your infrastructure and apps.
The NetScaler SD-WAN solution forms the backbone of the new enterprise network, ensuring an always-on, high-quality experience and a simpler, more agile branch network. Citrix will be showing a cloud-based orchestration system used when offering Citrix SD-WAN as a service. This multi-tenant orchestration system can be used by service providers to configure, manage and troubleshoot SD-WAN networks. It provides a cross-customer dashboard of network and application performance, including the status of underlying network links, and a single interface point for defining security, application and network policies for customer networks. You can also see the Citrix SD-WAN Solution at the Intel Booth.
Mark your calendars now and we'll see you in San Francisco!
Apr 12, 2018
Arming IT security teams with U.S. Secret Service tactics