BY USE CASE
Secure Distributed Work
Cyberattacks continue to grow and one of the most common threats are internal attackers. Combine this with more users working remotely from untrusted networks and personal devices becoming the norm, and it leaves IT with a greater attack surface they need to protect. Therefore, a lot of companies are now looking at a zero trust security model. With a zero trust architecture no one is trusted by default and users are adaptively granted access based on contextual awareness using patterns based on identity, time, and device posture. Join us as we talk in depth about zero trust network access (ZTNA) and how Citrix can help.
PODCAST | 24m
June 30, 2021
Principal Product Marketing, Citrix
Andre is an accomplished technologist with awarded patents, published books, and over 600 articles and papers on cloud, end-user computing, security, virtualization, business-critical applications, health IT, and web-scale technologies
Technical Marketing Architect, Citrix
Ana loves creating content that enables customers to understand the best practices and functionalities of Citrix solutions. Ana started at Citrix more than 6 years ago as a college graduate in the leadership development program. She has held various roles prior to joining the technical marketing team during her career at Citrix including, inside sales engineer, mobility sales engineer, and virtualization senior sales engineer for enterprise accounts.
Lead Architect, Citrix
With more than 15 years of experience designing and securing virtual workspaces, Daniel continues to deliver solutions and best practices for all types of organizations. Like many in the tech field, Daniel’s background originated with an on-premises, Windows-based environment, and grew to encompass cloud, mobility and digital workspaces.