Tag: security

  1. Get ready for 2015. Time to refresh your BYO program. [Webinar Series]

    BYOD_image

    We perform back-ups daily. We perform maintenance weekly. We conduct security audits quarterly. We test our business continuity plans annually. How often do we revisit bring your own (BYO) programs? For many, it’s not often enough.  In response to BYO, organizations need to ensure that they have combined policies, procedures and technologies to protect their information assets in an evolving threat landscape regardless of where ...

    Read More

  2. Sibos 2014 tackles pivotal technology trends, encourages Financial IT to “buckle in”

    Future of Finance

    When asked to describe his firm’s approach to IT strategy in an interview last year, Joel Schwalbe, CIO of CNL Financial, paraphrased a famous quote by Wayne Gretzky, stating that they “skate to where the puck is going to be, not where it’s at or where it’s been.” With this statement, Joel alludes to the challenges financial IT face when trying to keep pace with ...

    Read More

  3. What’s safe to put in the cloud?

    Photo_SafetoPutinCloudBlog

    Data protection is a key concern for organizations seeking to leverage the cloud—and rightly so. It’s no small matter to send sensitive business data like customer information, financial records, legal documents or intellectual property outside your on-premise infrastructure. But security concerns don’t have to pose a barrier to the benefits of the cloud. “With the right measures and best practices,” Stan Black, Citrix Chief Security ...

    Read More

  4. Quad-Bypass: The Enterprise Mobility Worst-Case Security Scenario [VIDEO]

    Quadbypass_photo

    At Citrix, our definition of a quadruple bypass is a BYOD user on a consumer-grade device using sensitive enterprise data and going directly to the cloud. It truly represents the worst-case scenario for securing enterprise mobility. This approach completely bypasses the control and visibility of IT—and it’s alarmingly common in today’s organizations. There are good reasons for this, of course. Consumer devices are popular and ...

    Read More

  5. Getting your feet wet with NetScaler AppFirewall

    I love netscaler

    Some of our internal teams recently reviewed customer surveys that show that security is strong for NetScaler, but more documentation is needed out there so that more people know of all the awesome capabilities.   NetScaler AppFirewall was even voted for Gold award last year by security gurus, further cementing what we’ve known all along. As a recap, in addition to the full ADC functionality NetScaler has many different ...

    Read More

  6. Customer-centric security: “Assess once, comply many”

    image002_customercentric

    For a company like Citrix, selling solutions across a broad range of industries and geographies, meeting the security and compliance requirements of our customers could easily become an overwhelming prospect. This would be especially true if, like many companies, we approached security in a top-down fashion, beginning with a foundation of standards from ISO, NIST or ITIL, and then addressing compliance on an industry-by-industry and ...

    Read More

  7. Data privacy is now a very personal concern

    Triple_Identifier_quote

    Companies tend to think of privacy as a business issue, but for the general public, it’s quickly becoming a highly personal concern. From fears of government snooping to high-profile data breaches, people care more than ever about where their data is and how to keep it private. Trends like BYOD, big data and the Internet of Things add urgency to the challenge of helping people ...

    Read More

  8. What beta users have to say about Citrix NetScaler 10.5

    Here at Citrix, we just wrapped up the beta program for NetScaler 10.5 and got some great feedback from our beta users, whose contributions help improve our products for everyone. The NetScaler beta program is an opportunity for our customers and partners to experience the software and features of the NetScaler software before General Availability (GA). Beta participants are able to give direct feedback to engineering ...

    Read More

  9. It’s all about ‘people centric security’ at Gartner Security Summit 2014

    Screen Shot 2014-07-07 at 5.04.28 PM

    Are you ready for the next generation digital business? With an audience of top security practitioners, risk management was the focus of preparations for the next generation digital enterprises (and governments) at this year's Gartner Security and Risk Management Summit opening keynote, which took place June 23-26, 2014. With great change upon us, Gartner analysts were focused on 'people centric security' and said there is ...

    Read More

  10. Summer is the start of hurricane season! Is your organization prepared with a business continuity plan?

    BC Datacenter image

    It’s that time of year for backyard BBQs, beach trips, World Cup soccer and … hurricane season. Hurricane, cyclone, typhoon–whatever you call it–the hurricane season is off to a good start. And if you are in the potential path of the storm, it’s best to be prepared in advance with disaster recovery and business continuity plans that address hurricane preparedness. Read on and attend our ...

    Read More