Tag: security

  1. Quad-Bypass: The Enterprise Mobility Worst-Case Security Scenario [VIDEO]

    Quadbypass_photo

    At Citrix, our definition of a quadruple bypass is a BYOD user on a consumer-grade device using sensitive enterprise data and going directly to the cloud. It truly represents the worst-case scenario for securing enterprise mobility. This approach completely bypasses the control and visibility of IT—and it’s alarmingly common in today’s organizations. There are good reasons for this, of course. Consumer devices are popular and ...

    Read More

  2. Getting your feet wet with NetScaler AppFirewall

    I love netscaler

    Some of our internal teams recently reviewed customer surveys that show that security is strong for NetScaler, but more documentation is needed out there so that more people know of all the awesome capabilities.   NetScaler AppFirewall was even voted for Gold award last year by security gurus, further cementing what we’ve known all along. As a recap, in addition to the full ADC functionality NetScaler has many different ...

    Read More

  3. Customer-centric security: “Assess once, comply many”

    image002_customercentric

    For a company like Citrix, selling solutions across a broad range of industries and geographies, meeting the security and compliance requirements of our customers could easily become an overwhelming prospect. This would be especially true if, like many companies, we approached security in a top-down fashion, beginning with a foundation of standards from ISO, NIST or ITIL, and then addressing compliance on an industry-by-industry and ...

    Read More

  4. Data privacy is now a very personal concern

    Triple_Identifier_quote

    Companies tend to think of privacy as a business issue, but for the general public, it’s quickly becoming a highly personal concern. From fears of government snooping to high-profile data breaches, people care more than ever about where their data is and how to keep it private. Trends like BYOD, big data and the Internet of Things add urgency to the challenge of helping people ...

    Read More

  5. What beta users have to say about Citrix NetScaler 10.5

    Here at Citrix, we just wrapped up the beta program for NetScaler 10.5 and got some great feedback from our beta users, whose contributions help improve our products for everyone. The NetScaler beta program is an opportunity for our customers and partners to experience the software and features of the NetScaler software before General Availability (GA). Beta participants are able to give direct feedback to engineering ...

    Read More

  6. It’s all about ‘people centric security’ at Gartner Security Summit 2014

    Screen Shot 2014-07-07 at 5.04.28 PM

    Are you ready for the next generation digital business? With an audience of top security practitioners, risk management was the focus of preparations for the next generation digital enterprises (and governments) at this year's Gartner Security and Risk Management Summit opening keynote, which took place June 23-26, 2014. With great change upon us, Gartner analysts were focused on 'people centric security' and said there is ...

    Read More

  7. Summer is the start of hurricane season! Is your organization prepared with a business continuity plan?

    BC Datacenter image

    It’s that time of year for backyard BBQs, beach trips, World Cup soccer and … hurricane season. Hurricane, cyclone, typhoon–whatever you call it–the hurricane season is off to a good start. And if you are in the potential path of the storm, it’s best to be prepared in advance with disaster recovery and business continuity plans that address hurricane preparedness. Read on and attend our ...

    Read More

  8. Are iOS devices putting your business at risk?

    Blog_Photo_lady_smartphone

    Wildly popular from the executive suite to the back office, Apple’s iPhone and iPad are the devices that launched a thousand bring-your-own-device (BYOD) programs. For IT, there’s a lot to love about the inherent security of the walled-garden iOS ecosystem. But don’t get complacent; iOS devices can still expose your business assets to risk. Here’s what you need to know about iOS security—and how to ...

    Read More

  9. How IT can securely control Android and iOS devices

    Devices

    Android and iOS mobile devices— including smartphones, tablets and everything in between—have transformed enterprise computing, providing new mobility and flexibility for people and IT. At the same time, they compound the challenge of maintaining effective security and privacy of business information.  Read on and attend our upcoming webinar to get best practices on how IT can securely embrace mobility, consumer devices and BYOD. Instead of seeking ...

    Read More

  10. [@Citrix Webinar] Maximizing performance and security with a @NetScaler and @XenMobile solution

    Maximizing performance and security with a NetScaler and XenMobile solution Date: Jul 23, 2014 Mobile security is an increasing challenge for companies. Join this webinar to learn how to architect a network infrastructure that supports mobile initiatives, while delivering uncompromised performance and security. Join Charles Kanavel – CEO of Kanavel Group and Marissa Schmidt — Citrix Director of Product Management to learn: • How to architect your network for deploying XenMobile with NetScaler • ...

    Read More