www.citrix.com
Open in
urlscan Pro
2a02:26f0:fb:5a0::2aec
Public Scan
URL:
https://www.citrix.com/blogs/2021/10/05/introducing-citrix-secure-private-access/
Submission: On March 02 via api from SE — Scanned from DE
Submission: On March 02 via api from SE — Scanned from DE
Form analysis
3 forms found in the DOMPOST
<form class="subscribeform js-subscribeform myform" action="" method="post" target="">
<input class="textfield subscribeform-textfield js-emailfield needsclick" type="email" name="EMAIL" id="EMAIL" placeholder="email address" value="">
<button class="subscribeform-button-inactive subscribe-btn">Subscribe</button>
<p class="subscribecard-note errMsg" style="display:none;"></p>
<p class="subscribecard-gdpr consentQues"> Yes, I'd like to hear about offers and services from Citrix by email. </p>
<p class="consentRadio">
<input class="radioConsent1" type="radio" name="consent1" value="yes"><span class="radioLabel">Yes</span>
<input class="radioConsent2" type="radio" name="consent2" value="no"><span class="radioLabel"> No</span>
</p>
<p class="subscribecard-gdpr successMsg" style="display:none;font-size: 20px;"> Your subscription must be activated. An email with an activation link has just been sent to you. </p>
<p class="subscribecard-gdpr"> Citrix will process your data according to our <a href="https://www.citrix.com/about/legal/privacy/" target="_blank">Privacy Policy</a>
</p>
<input name="FEEDID" id="FEEDID" type="hidden" value="1081367">
</form>
POST
<form class="subscribeform js-subscribeform myform" action="" method="post" target="">
<input class="textfield subscribeform-textfield js-emailfield needsclick" type="email" name="EMAIL" id="EMAIL" placeholder="email address" value="">
<button class="subscribeform-button-inactive subscribe-btn">Subscribe</button>
<p class="subscribecard-note errMsg" style="display:none;"></p>
<p class="subscribecard-gdpr consentQues"> Yes, I'd like to hear about offers and services from Citrix by email. </p>
<p class="consentRadio">
<input class="radioConsent1" type="radio" name="consent1" value="yes"><span class="radioLabel">Yes</span>
<input class="radioConsent2" type="radio" name="consent2" value="no"><span class="radioLabel"> No</span>
</p>
<p class="subscribecard-gdpr successMsg" style="display:none;font-size: 20px;"> Your subscription must be activated. An email with an activation link has just been sent to you. </p>
<p class="subscribecard-gdpr"> Citrix will process your data according to our <a href="https://www.citrix.com/about/legal/privacy/" target="_blank">Privacy Policy</a>
</p>
<input name="FEEDID" id="FEEDID" type="hidden" value="1081367">
</form>
GET
<form class="searchform js-searchform " role="search" method="get" action="">
<span class="searchform-loadingicon"></span>
<svg class="searchform-icon icon icon-search">
<use xlink:href="https://www.citrix.com/blogs/wp-content/themes/cx/assets/images/icons.svg#icon-search"></use>
</svg>
<input class="searchform-textfield textfield js-searchfield needsclick" type="search" name="s" id="s" value="" placeholder="Search" autocomplete="off">
</form>
Text Content
Diese Website verwendet Cookies und verwandte Technologien, wie in unserer Datenschutzrichtlinie beschrieben, für Zwecke, die den Betrieb der Website, Analysen, eine verbesserte Benutzererfahrung oder Werbung umfassen können. Sie können sich dafür entscheiden, unserer Verwendung dieser Technologien zuzustimmen oder Ihre eigenen Einstellungen vornehmen. Einstellungen verwalten Akzeptieren Alle Ablehnen * Topics * #CitrixLife * App Delivery & Security * Apps & Desktops * Business Continuity * Channel & Partners * Citrix 100 Days of Customers * Citrix CTPs & CTAs * Citrix Developer * Citrix Engineering * Citrix Ready * Citrix Service Provider * Citrix Services & Education * Citrix Summit * Citrix Synergy * Citrix Tech Bytes * Citrix Tech Support * Citrix Workspace * Cloud * Compete * CUGC * Customer Experience * Customer Success * Desktop Virtualization (VDI) * Endpoint Management * Experience & Productivity * Finance * From the Citrix CEO * Government * Healthcare * Higher Education * Public Sector * Recruiting & Employment * Security & Compliance * SMB * Thought Leadership * Workspace IoT * Products * Citrix ADC * Citrix Analytics * Citrix App Delivery and Security Service * Citrix Application Delivery Management * Citrix Cloud * Citrix Content Collaboration (ShareFile) * Citrix Endpoint Management * Citrix Gateway * Citrix Hypervisor * Citrix Intelligent Traffic Management * Citrix Ready workspace hub * Citrix Receiver * Citrix RightSignature * Citrix SD-WAN * Citrix Secure Internet Access * Citrix Secure Private Access * Citrix Virtual Apps & Desktops * Citrix Virtual Apps & Desktops Standard for Azure * Citrix Web App and API Protection * Citrix Web App Firewall * Citrix Workspace * Citrix Workspace app * Non-Specific * Podio * ShareFile * Wrike * Authors * Subscribe * Language * English * Japanese * Russian * Not Listed * Chinese * French * Spanish * Portuguese * Korean * German * Swedish * Dutch * Norwegian * Finnish * Italian * English * Japanese * Russian * Not Listed * Chinese * French * Spanish * Portuguese * Korean * German * Swedish * Dutch * Norwegian * Finnish * Italian * TOPICS * #CitrixLife * App Delivery & Security * Apps & Desktops * Business Continuity * Channel & Partners * Citrix 100 Days of Customers * Citrix CTPs & CTAs * Citrix Developer * Citrix Engineering * Citrix Ready * Citrix Service Provider * Citrix Services & Education * Citrix Summit * Citrix Synergy * Citrix Tech Bytes * Citrix Tech Support * Citrix Workspace * Cloud * Compete * CUGC * Customer Experience * Customer Success * Desktop Virtualization (VDI) * Endpoint Management * Experience & Productivity * Finance * From the Citrix CEO * Government * Healthcare * Higher Education * Public Sector * Recruiting & Employment * Security & Compliance * SMB * Thought Leadership * Workspace IoT PRODUCTS * Citrix ADC * Citrix Analytics * Citrix App Delivery and Security Service * Citrix Application Delivery Management * Citrix Cloud * Citrix Content Collaboration (ShareFile) * Citrix Endpoint Management * Citrix Gateway * Citrix Hypervisor * Citrix Intelligent Traffic Management * Citrix Ready workspace hub * Citrix Receiver * Citrix RightSignature * Citrix SD-WAN * Citrix Secure Internet Access * Citrix Secure Private Access * Citrix Virtual Apps & Desktops * Citrix Virtual Apps & Desktops Standard for Azure * Citrix Web App and API Protection * Citrix Web App Firewall * Citrix Workspace * Citrix Workspace app * Non-Specific * Podio * ShareFile * Wrike * Security & Compliance * Nov 4, 2021 INTRODUCING CITRIX SECURE PRIVATE ACCESS Andre Leibovici 0 * * * * * Security & Compliance * Nov 4, 2021 INTRODUCING CITRIX SECURE PRIVATE ACCESS Andre Leibovici Traditional enterprise architecture and security models aren’t suited to meet the needs of today’s hybrid workforce and the accompanying complex application-security requirements. With the shift to SaaS, more data and business apps are residing on the cloud, while many enterprise apps remain inside the datacenter. Unfortunately, this makes these complex environments challenging to secure and manage. On top of that, the growth of hybrid work and the expanded use of different device types have increased the attack surface for organizations. -------------------------------------------------------------------------------- “By 2024, at least 40% of all remote access usage will be served predominantly by zero trust network access (ZTNA), up from less than 5% at the end of 2020.” — Gartner® * -------------------------------------------------------------------------------- All these complexities and the expanded attack surface create opportunities for attackers. As a result, organizations need to rethink their approach to security, embracing zero trust, and at the same time make it seamless for employees to access apps securely from anywhere, at any time, and from any device. Common challenges faced by enterprises today include: * Cyberthreat Risks: Siloed point products cannot provide broad protection against cyberattacks * Poor Experience: High latency to access applications when backhauling traffic thought the datacenter * Complex Management: Multiple complex and hard-to-manage siloed technologies * Too Much Work: Overwhelmed IT staff due to rapid usage and high dependency on VPN * Slow Cloud Adoption: Complexity of transitioning to a cloud/multi-cloud architecture * Expensive: Overspending on siloed, redundant, and disjointed security technology increases costs CITRIX SECURE PRIVATE ACCESS: WHAT IS IT AND WHAT’S NEW? Citrix Secure Private Access is our new cloud delivered ZTNA service that adds new capabilities like adaptive authentication and adaptive access to deliver zero trust access to web, SaaS, TCP (e.g. SAP, Oracle), and UDP-based apps. Citrix Secure Private Access will replace Citrix Secure Workspace Access, which was primarily focused on secure access to browser-based applications. Traditional VPN solutions require end-user devices to be managed, provide access at the network level, and enforce static access control policies. Citrix Secure Private Access gives IT a set of security controls to protect against threats from BYO devices, giving users the choice to access their IT-sanctioned applications from any device, whether it’s managed or BYO. Citrix Secure Private Access also provides secure access at the application layer to prevent network-level attacks while enforcing contextual access control policies driven by continuous assessment and verification of the end user’s identity, geolocation, device posture check, and user risk score. -------------------------------------------------------------------------------- “Gartner forecasts 51 percent of global knowledge workers will be remote by the end of 2021.” — Gartner® * -------------------------------------------------------------------------------- In addition, Citrix Secure Private Access is the only solution on the market that helps consolidate SSO for SaaS and VDI applications within the same solution, provides protection from malicious content like keyloggers and screen capturing malware, and protects endpoints and the network from malicious content from the internet, with browser isolation policies. Citrix maintains globally distributed cloud-service points of presence (PoPs) that securely connect to your IT-sanctioned application hosted in the datacenter and/or in public clouds, and act as an authentication and traffic proxy for all incoming connections. The service scales automatically as usage increases, delivering agility and always-on security for the best user experience and security. As a hosted service, it allows IT to focus on more strategic initiatives as opposed to worrying about managing appliances across datacenters. Citrix Secure Private Access enables secure access to IT-sanctioned applications and protects users and networks from threats. Let’s take a closer look at the features and benefits: * Holistic, consolidated zero trust security strategy — Enables IT to implement a holistic zero trust security strategy across users, applications, and devices. Adaptive policies and controls apply equally across features and capabilities. * (NEW) Zero trust network access (ZTNA) to all IT sanctioned applications — While Citrix provided zero trust network access (ZTNA) to primarily browser-based apps earlier, Secure Private Access expands ZTNA to applications running on TCP- (e.g. SAP, Oracle) and UDP-based protocols (e.g. VoIP), whether these applications are deployed on-premises or on any public cloud, and are not accessed using Citrix Workspace, delivering expected zero trust outcomes. * (NEW) Adaptive authentication, user risk score, SSO, and enhanced security — Citrix Secure Private Access provides capabilities to scan end-user devices and utilize the user risk score as a trust factor before and after a user session is established. Based on the results of the user identity, geolocation, and the device-posture assessment, an admin can define how they want to authenticate and authorize user access to their applications. These policies allow admins to control actions users can take within these application and can be implemented for all sanctioned applications, including for Citrix Virtual Apps and Desktop service customers. * Integrated remote browser isolation to securely access IT sanctioned apps using BYO and unmanaged devices — Citrix Secure Private Access allow users to access their IT-sanctioned applications from their devices, without having any endpoint agent installed on the device. However, unlike a VPN, it redirects the user session from a local browser to a hosted Secure Browser Service. This ensures that users can access their applications in a sandbox environment and allows them to stay productive. At the same time, this protects devices and networks from malicious content from the Internet, creating an airgap from corporate resources. * Protection from keylogger and screen capturing malware — While devices managed by the organization can be closely monitored, IT lacks insight into the health of unmanaged devices. This creates risk as devices infected with malware, especially those with keyloggers or screenshot malware, can enable attackers to exfiltrate sensitive corporate data. Citrix Secure Private Access enforces controls that prevent the stealing of user credentials or taking screenshots of applications accessed through the Workspace app. * End-to-end visibility across sanctioned applications and users — Citrix Secure Private Access offers end-to-end visibility of all traffic to IT sanctioned applications, including applications and user access overview by top risky domains, data download volume, and more. Customers using multiple access solutions and dashboards for monitoring user traffic benefit from having a single dashboard that simplifies monitoring and unifies siloed environments. * Detect and defend against potential security risks — With insights into applications, devices, and networks, Citrix Analytics for Security helps automate security enforcements based on user behavior and anomalies detected. This helps reduce manual work for IT, provides timely enforcement and reduces risk of security breaches. As you modernize your IT to deliver a secure and productive environment for your hybrid workforce, you need to consider fully integrated solutions delivered as a cloud service. We are excited to be able to provide a ZTNA solution that provides these capabilities, and that our extensive Citrix Virtual Apps and Desktops customer base can integrate easily. Every organization’s journey to the cloud is different, depending on their business requirements, security and networking needs, and the gaps they need to fill. You can introduce Citrix Secure Private Access into your unique operational processes without disruption to the existing architecture, delivering zero trust access with adaptive authentication and SSO to all IT-sanctioned applications accessed from managed and BYO devices. GET STARTED TODAY Learn more about Citrix Secure Private Access, schedule a one-on-one session led by a Citrix expert, and access all the content from our Citrix Launchpad: Security event. -------------------------------------------------------------------------------- * Source: Gartner Press Release, “Gartner Forecasts 51% of Global Knowledge Workers Will Be Remote by the End of 2021”, 22 June 2021 (https://www.gartner.com/en/newsroom/press-releases/2021-06-22-gartner-forecasts-51-percent-of-global-knowledge-workers-will-be-remote-by-2021 ) GARTNER is a registered trademark and service mark of Gartner, Inc. and/or its affiliates in the U.S. and internationally and is used herein with permission. -------------------------------------------------------------------------------- For Citrix Investors This release contains forward-looking statements which are made pursuant to the safe harbor provisions of Section 27A of the Securities Act of 1933 and of Section 21E of the Securities Exchange Act of 1934. The forward-looking statements in this release do not constitute guarantees of future performance. Those statements involve a number of factors that could cause actual results to differ materially, including risks associated with the impact of the global economy and uncertainty in the IT spending environment, revenue growth and recognition of revenue, products and services, their development and distribution, product demand and pipeline, economic and competitive factors, the Company’s key strategic relationships, acquisition and related integration risks as well as other risks detailed in the Company’s filings with the Securities and Exchange Commission. Citrix assumes no obligation to update any forward-looking information contained in this press release or with respect to the announcements described herein. The development, release and timing of any features or functionality described for our products remains at our sole discretion and is subject to change without notice or consultation. The information provided is for informational purposes only and is not a commitment, promise or legal obligation to deliver any material, code or functionality and should not be relied upon in making purchasing decisions or incorporated into any contract. SHARE * * * * TAGGED UNDER: * Citrix Analytics * Citrix Launchpad Series * Citrix Secure Private Access * Citrix Virtual Apps & Desktops * Hybrid Work * Remote Work * SaaS * Secure Browser Service * Security * Security & Compliance * VDI * Zero Trust YOU MIGHT BE INTERESTED IN * Experience & Productivity * Security & Compliance * 2 days ago WHAT IS ELECTRONIC SIGNATURE? GET ANSWERS TO FOUR KEY QUESTIONS. Traditional signing processes for wet signatures can seem never-ending. Ensuring all the correct documents are... Stacy Shrader 0 * * * * STAY INFORMED. SUBSCRIBE TODAY. Subscribe Yes, I'd like to hear about offers and services from Citrix by email. Yes No Your subscription must be activated. An email with an activation link has just been sent to you. Citrix will process your data according to our Privacy Policy * App Delivery & Security * Security & Compliance * 6 days ago HELP MITIGATE YOUR ORGANIZATION’S CYBERSECURITY RISKS Cybersecurity can often seem to present impossible challenges as organizations strive to repel attack attempts. But, really, cybersecurity’s... Florin Lazurca 0 * * * * * Experience & Productivity * Security & Compliance * Jan 28 FOUR EASY WAYS TO ADDRESS DATA PRIVACY RISKS TODAY Today’s work environment is complex. There is content in apps, communication channels, devices, and different file storage locations. Content is… Laura Kaminski 0 * * * * Relevant * Relevant * Recent * Popular * Experience & Productivity * Security & Compliance * 2 days ago WHAT IS ELECTRONIC SIGNATURE? GET ANSWERS TO FOUR KEY QUESTIONS. 0 * * * * * App Delivery & Security * Security & Compliance * 6 days ago HELP MITIGATE YOUR ORGANIZATION’S CYBERSECURITY RISKS 0 * * * * * Experience & Productivity * Security & Compliance * Jan 28 FOUR EASY WAYS TO ADDRESS DATA PRIVACY RISKS TODAY 0 * * * * * Security & Compliance * Jan 27 DEFENDING YOUR ORGANIZATION AGAINST STATE-SPONSORED CYBER CAMPAIGNS 0 * * * * * Citrix Workspace * Security & Compliance * Jan 19 PREVIEW: ADAPTIVE ACCESS BASED ON NETWORK LOCATION FOR CITRIX WORKSPACE 1 * * * * * App Delivery & Security * Security & Compliance * Jan 18 HOW TO PROTECT YOURSELF AGAINST KEYLOGGERS 0 * * * * * Security & Compliance * Jan 10 IAM VS PAM: HOW ARE THEY DIFFERENT? 0 * * * * * App Delivery & Security * Apps & Desktops * Dec 27 HIGHLIGHTS FROM THE CITRIX BLOG 2021 0 * * * * * Experience & Productivity * Security & Compliance * Dec 27, 2021 WHAT’S NEW WITH CITRIX ANALYTICS — Q4 2021 0 * * * * * App Delivery & Security * Security & Compliance * Dec 24, 2021 GUIDANCE FOR REDUCING APACHE LOG4J SECURITY VULNERABILITY RISK WITH CITRIX WAF (CVE-2021-44228/CVE-2021-45046/CVE-2021-45105) 12 * * * * * Experience & Productivity * Security & Compliance * 2 days ago WHAT IS ELECTRONIC SIGNATURE? GET ANSWERS TO FOUR KEY QUESTIONS. 0 * * * * * App Delivery & Security * Security & Compliance * 6 days ago HELP MITIGATE YOUR ORGANIZATION’S CYBERSECURITY RISKS 0 * * * * * Apps & Desktops * Cloud * 6 days ago GETTING STARTED WITH POWERSHELL AUTOMATION FOR CITRIX CLOUD 0 * * * * * Featured * App Delivery & Security * Apps & Desktops * One week ago ACCELERATING OUR JOURNEY TO A UNIFIED, SIMPLIFIED DIGITAL WORKSPACE EXPERIENCE 0 * * * * * App Delivery & Security * Citrix Workspace * One week ago HOW CITRIX AND THE MONTEREY PENINSULA FOUNDATION DRIVE CHANGE 0 * * * * * Experience & Productivity * Thought Leadership * Feb 1 CITRIX CANADA: WHAT WE CAN EXPECT IN 2022 0 * * * * * Experience & Productivity * Jan 31 YEAR IN REVIEW: THE TOP E-SIGNATURE FEATURES ADDED TO CITRIX RIGHTSIGNATURE IN 2021 0 * * * * * Channel & Partners * Jan 31 FIELD KICKOFF 2022: THE GOOD, THE BETTER, THE BEST MOMENTS 0 * * * * * Experience & Productivity * Security & Compliance * Jan 28 FOUR EASY WAYS TO ADDRESS DATA PRIVACY RISKS TODAY 0 * * * * * Security & Compliance * Jan 27 DEFENDING YOUR ORGANIZATION AGAINST STATE-SPONSORED CYBER CAMPAIGNS 0 * * * * FOLLOW CITRIX * * * * About | Contact | Terms of use | Do Not Sell My Personal Information | Cookie preferences © 1999 - 2022 Citrix Systems, Inc. All rights reserved. STAY INFORMED. SUBSCRIBE TO THE CITRIX BLOG TODAY. Subscribe Yes, I'd like to hear about offers and services from Citrix by email. Yes No Your subscription must be activated. An email with an activation link has just been sent to you. Citrix will process your data according to our Privacy Policy Don’t worry, you can unsubscribe at any time. Topics * All Topics * #CitrixLife * App Delivery & Security * Apps & Desktops * Business Continuity * Channel & Partners * Citrix 100 Days of Customers * Citrix CTPs & CTAs * Citrix Developer * Citrix Engineering * Citrix Ready * Citrix Service Provider * Citrix Services & Education * Citrix Summit * Citrix Synergy * Citrix Tech Bytes * Citrix Tech Support * Citrix Workspace * Cloud * Compete * CUGC * Customer Experience * Customer Success * Desktop Virtualization (VDI) * Endpoint Management * Experience & Productivity * Finance * From the Citrix CEO * Government * Healthcare * Higher Education * Public Sector * Recruiting & Employment * Security & Compliance * SMB * Thought Leadership * Workspace IoT Products * All Products * Citrix ADC * Citrix Analytics * Citrix App Delivery and Security Service * Citrix Application Delivery Management * Citrix Cloud * Citrix Content Collaboration (ShareFile) * Citrix Endpoint Management * Citrix Gateway * Citrix Hypervisor * Citrix Intelligent Traffic Management * Citrix Ready workspace hub * Citrix Receiver * Citrix RightSignature * Citrix SD-WAN * Citrix Secure Internet Access * Citrix Secure Private Access * Citrix Virtual Apps & Desktops * Citrix Virtual Apps & Desktops Standard for Azure * Citrix Web App and API Protection * Citrix Web App Firewall * Citrix Workspace * Citrix Workspace app * Non-Specific * Podio * ShareFile * Wrike Relevant * Relevant * Recent Show More Loading Sorry, but nothing matched your search terms. Please try again with some different keywords. FEATURED TAGS * Cloud * Experience & Productivity * Security & Compliance * Citrix Synergy