|
Support and Services
|
|
|
Training and Certification
|
|
|
Community
|
| |
Application Guides ()
|
3MB
|
Citrix XenApp: Enhance your Deployment with NetScaler
Learn how NetScaler’s integrated Access Gateway, Enterprise Edition SSL VPN, load balancing and global server load balancing features provide scalable secure access, high-availability and disaster recovery/business continuity for XenApp.
Nov 10, 2008
|
Brochures & Data sheets ()
|
429KB
|
Complying with PCI DSS Solution Brief
The Payment Card Industry Data Security Standard (PCI-DSS), produced and governed by the major credit card companies, comprises directives to reduce fraud. Citrix Application Firewall™, along with other Citrix solutions, provide compliance solutions for PCI-DSS and overall protection of critical Web applications.
Mar 21, 2007
|
Licensing Resources ()
|
|
Citrix Knowledge Base
Search for answers, view product documentations, access support forums and download product updates.
|
|
|
End User License Agreement (EULA)
Access additional licensing resources and learn about Citrix licensing programs, the Citrix licensing system, and how to get licenses and support.
|
White Papers ()
|
|
Green IT: Reducing Your Carbon Footprint with Citrix
This white paper explains how Citrix solutions can help bring environmental and organizational objectives into alignment, by alleviating the energy impact of equipment needed to serve both the datacenter and the desktop.
|
|
|
Security Beyond Corporate Boundaries
In this white paper discover how Citrix XenApp’s application delivery offers a new and smarter approach to security, giving IT the ultimate control it needs to ensure security and regulatory compliance without compromise to business performance and productivity.
|
|
|
Refactoring Sensitive Data Access: Benefits of Virtualization Security
Traditional security methods are strained to the breaking point. More threat vectors than ever, coupled with device proliferation in the workplace, workshifting and cloud computing have produced a threat landscape of unprecedented complexity. This paper presents a secure-by-design IT strategy based on desktop virtualization that provides both information security and optimal agility to respond to changing business needs.
|
|
2MB
|
Delivering IT to the Virtual Workforce
This technical white paper provides a simple guide on how to build a virtualization architecture to address IT requirements for productivity and performance, collaboration and support, security and cost efficiency.
Jul 6, 2011
|
|
|
Desktop Virtualization: Empowering Information Security
IT managers are facing an increasingly complex and costly battle to control and protect enterprise applications and data. At the same time as information security threats are growing more sophisticated and numerous, computing trends such as the consumerization of IT and cloud computing further complicate the information security landscape. In this paper, CSO explores why desktop virtualization should be the foundation of your approach to information security.
|
|
388KB
|
An insider's look at security strategy
Citrix Systems has implemented an information security strategy and business continuity plan that incorporates technology and best practices designed to mitigate risk while supporting business agility and growth. At the center of that strategy is desktop virtualization. We invite you to join a Citrix security insider to explore the benefits of desktop virtualization for information security and business continuity.
Sep 26, 2011
|
|
|
Desktop Virtualization: The Key for Securing Your Enterprise
TechTarget explores how desktop virtualization secures applications and data at all times, no matter where or how it is used. It offers the critical balance that IT managers must achieve is to protect sensitive enterprise information while supporting initiatives that promote business agility and growth.
|
|
|
Top 10 Reasons to Strengthen Information Security with Desktop Virtualization
Information security has become an increasingly critical concern for organizations of all kinds. Trends such as consumerization, worker mobility, cloud computing and workshifting mean that more people are accessing enterprise desktops, applications and data from more places and in more ways than ever before. In this paper we explore ten reasons why desktop virtualization should be the foundation of your layered approach to information security.
|
|
|
Delivering Enterprise Information Securely an Android and Apple iOS Devices
Android and iOS-based consumer devices including smartphones and tablets play an increasing role in enterprise computing, providing new flexibility and mobility for workers and IT—but creating new challenges around security. This paper describes these issues and explains how they can be addressed effectively with Citrix BYOD solutions.
|
|
|
Secure By Design: Five Customers Use Desktop Virtualization for Security
Desktop virtualization offers IT the means to regain control over sensitive information and meet growing requirements for compliance and data privacy while supporting business productivity and growth. In this paper we highlight five customers who implemented desktop virtualization to augment their information security strategy.
|
|
Downloads
Download NetScaler Gateway infrastructure and client software.
|