Tag: security

  1. Sibos 2014 tackles pivotal technology trends, encourages Financial IT to “buckle in”

    Future of Finance

    When asked to describe his firm’s approach to IT strategy in an interview last year, Joel Schwalbe, CIO of CNL Financial, paraphrased a famous quote by Wayne Gretzky, stating that they “skate to where the puck is going to be, not where it’s at or where it’s been.” With this statement, Joel alludes to the challenges financial IT face when trying to keep pace with ...

    Read More

  2. What’s safe to put in the cloud?

    Photo_SafetoPutinCloudBlog

    Data protection is a key concern for organizations seeking to leverage the cloud—and rightly so. It’s no small matter to send sensitive business data like customer information, financial records, legal documents or intellectual property outside your on-premise infrastructure. But security concerns don’t have to pose a barrier to the benefits of the cloud. “With the right measures and best practices,” Stan Black, Citrix Chief Security ...

    Read More

  3. Quad-Bypass: The Enterprise Mobility Worst-Case Security Scenario [VIDEO]

    Quadbypass_photo

    At Citrix, our definition of a quadruple bypass is a BYOD user on a consumer-grade device using sensitive enterprise data and going directly to the cloud. It truly represents the worst-case scenario for securing enterprise mobility. This approach completely bypasses the control and visibility of IT—and it’s alarmingly common in today’s organizations. There are good reasons for this, of course. Consumer devices are popular and ...

    Read More

  4. Getting your feet wet with NetScaler AppFirewall

    I love netscaler

    Some of our internal teams recently reviewed customer surveys that show that security is strong for NetScaler, but more documentation is needed out there so that more people know of all the awesome capabilities.   NetScaler AppFirewall was even voted for Gold award last year by security gurus, further cementing what we’ve known all along. As a recap, in addition to the full ADC functionality NetScaler has many different ...

    Read More

  5. Customer-centric security: “Assess once, comply many”

    image002_customercentric

    For a company like Citrix, selling solutions across a broad range of industries and geographies, meeting the security and compliance requirements of our customers could easily become an overwhelming prospect. This would be especially true if, like many companies, we approached security in a top-down fashion, beginning with a foundation of standards from ISO, NIST or ITIL, and then addressing compliance on an industry-by-industry and ...

    Read More

  6. Data privacy is now a very personal concern

    Triple_Identifier_quote

    Companies tend to think of privacy as a business issue, but for the general public, it’s quickly becoming a highly personal concern. From fears of government snooping to high-profile data breaches, people care more than ever about where their data is and how to keep it private. Trends like BYOD, big data and the Internet of Things add urgency to the challenge of helping people ...

    Read More

  7. What beta users have to say about Citrix NetScaler 10.5

    Here at Citrix, we just wrapped up the beta program for NetScaler 10.5 and got some great feedback from our beta users, whose contributions help improve our products for everyone. The NetScaler beta program is an opportunity for our customers and partners to experience the software and features of the NetScaler software before General Availability (GA). Beta participants are able to give direct feedback to engineering ...

    Read More

  8. It’s all about ‘people centric security’ at Gartner Security Summit 2014

    Screen Shot 2014-07-07 at 5.04.28 PM

    Are you ready for the next generation digital business? With an audience of top security practitioners, risk management was the focus of preparations for the next generation digital enterprises (and governments) at this year's Gartner Security and Risk Management Summit opening keynote, which took place June 23-26, 2014. With great change upon us, Gartner analysts were focused on 'people centric security' and said there is ...

    Read More

  9. Summer is the start of hurricane season! Is your organization prepared with a business continuity plan?

    BC Datacenter image

    It’s that time of year for backyard BBQs, beach trips, World Cup soccer and … hurricane season. Hurricane, cyclone, typhoon–whatever you call it–the hurricane season is off to a good start. And if you are in the potential path of the storm, it’s best to be prepared in advance with disaster recovery and business continuity plans that address hurricane preparedness. Read on and attend our ...

    Read More

  10. Are iOS devices putting your business at risk?

    Blog_Photo_lady_smartphone

    Wildly popular from the executive suite to the back office, Apple’s iPhone and iPad are the devices that launched a thousand bring-your-own-device (BYOD) programs. For IT, there’s a lot to love about the inherent security of the walled-garden iOS ecosystem. But don’t get complacent; iOS devices can still expose your business assets to risk. Here’s what you need to know about iOS security—and how to ...

    Read More