Citrix introduces two new workspace security solutions

To help companies defend themselves against cyberattacks due to the increasing adoption of cloud and remote working, Citrix Systems has introduced two new workspace security solutions designed to secure access and protect applications.

Citrix delivers on this through an application-centric approach that starts with the digital workspace. In a single solution, Citrix combines a full cloud-delivered security stack integrated with identity-aware Zero Trust Network Access (ZTNA) and an application-aware SD-WAN that allows companies to deliver cloud and Internet-based applications securely with high performance and reliability across work environments.

With the two new secure access offerings announced today, companies can accelerate their journey to a Secure Access Services Edge (SASE) and future proof their security investments:

Citrix Secure Internet Access – A comprehensive, global cloud security service that addresses the security requirements of modern enterprises. This includes secure web gateway, next-generation firewall, cloud access security broker (CASB), DLP, sandboxing and AI-driven attack detection.

Citrix Secure Workspace Access – A VPN-less solution that delivers zero trust access to the corporate web and SaaS applications accessed from managed and BYO devices.

Complemented by Citrix SD-WAN, the solutions – which can be purchased and used separately or together – also plug and play with third-party SD-WAN infrastructure, enabling companies to maximize their existing investments.

In embracing Citrix’s approach to security, companies can:
• Enhance security and productivity through identity-aware, zero trust access to all cloud and internet-based applications and virtual desktops.

• Leverage machine learning and artificial intelligence to provide real-time insights into user behaviour and automate the process of preventing cybersecurity breaches – all while maintaining a reliable digital workspace experience for employees.

• Identify specific security incidents, atypical activity and policy violations using built-in forensics and detailed search into all traffic and user behaviour.

• Protect against all threats, everywhere leveraging more than 100 global points-of-presence, powered by over 10 threat intelligence engines.

• Provide full coverage for all popular Cloud and SaaS properties, devices and operating systems, leaving no gap for access security coverage.

• Deliver consistently fast application performance regardless of network availability with built-in SD-WAN, application optimization and peering with thousands of SaaS services.