Gain the controls needed to ensure the right levels of authentication and authorization
Citrix security solutions have built-in identity and access capabilities so you can control access to your apps, data, and network beyond just credentials. Managing user access calls for a balanced approach that’s convenient for users and more secure than a simple user name and password combination.
Because passwords are so vulnerable, requiring people to use at least two forms of authentication—like a password and token—to access apps and desktops is essential for effective security. This multifactor authentication process makes it significantly harder for an attacker to impersonate a user, even if the primary password has been exposed.
With Citrix Gateway, simplify the sign-in experience for your users while encouraging the use of strong passwords.
With Citrix Virtual Apps and Desktops and Citrix Gateway, you can achieve more granular contextual access control by setting policies to allow different levels of access based on who, what, when, where, and why someone is seeking access.
Authorizing users based on task or location is especially effective for remote workers and third parties. Because Citrix Gateway integrates with role-based access mechanisms like Active Directory, you can create predefined access control policies at the both group and user level.
Being able to also authorize access based on device allows you to quarantine or grant limited access for devices out of compliance.
Policy orchestration allows enterprise security policies to be applied for all the ways a user will access business resources, while considering the location, device, and other context to provide the best user experience balanced with the most security.
With Citrix you can leverage the suite and breadth of enforcement points offered and use a rich palette of policies that can be applied to these different enforcement points. This provides a huge advantage over individual point products that cannot offer multiple vantage points or enforcement actions across multiple devices as they move across multiple locations and security domains.