Citrix Virtual Apps and Desktops are the first in the industry to achieve Common Criteria certification. Citrix Virtual Apps and Desktops are also FIPS 140-2 compliant, simplifying regulated compliance.
App and desktop virtualization gives organizations a better way to manage remote desktop security and risk. The foundation of app and desktop virtualization is the centralization of IT resources in the data center—an inherently secure architecture that makes it easy to control both information and access.
Centrally managed, virtualized Windows apps and desktops are delivered on demand to any device, providing an experience that looks, feels, and acts like working on their traditional PC.
With app virtualization and VDI, corporate apps, desktops, and data remain protected in the datacenter—not users’ endpoint devices—enabling security and compliance while providing remote access from anywhere. IT gains full visibility and control over centrally managed Windows apps and desktops, and can easily define and enforce policies that determine which resources specific users or groups can access. Centralized resources also help IT control whether or not users can install or configure apps on their own.
Preconfigured policies determine the right level of user access to apps and data, based on the user profile, which device they are using, and their network or location. Granular policies also determine which actions users may perform with each app.
Centralization of resources in the data center and strict access control policies make it easier for IT to protect against remote desktop security risks and meet compliance standards, with full activity logging, reporting, and auditing built in.
Citrix gives us a security platform where users can easily and securely access files, folders, and email. As an administrator, it is easy to manage sessions and check on users’ connectivity, and manage it in a timely manner.
Virtual Windows desktops and apps are hardware-independent, so IT can ensure access for every user, from any personal or corporate-owned device they choose to use, without compromising security. Rather than making distinctions between enterprise-owned and personally owned devices, IT evaluates every device and user according to administrator-defined criteria, as people attempt to connect to the enterprise network, then grants the appropriate level of access to each resource as indicated by the access control policies.
The top healthcare institutions rely on Citrix solutions.
We’ve used Citrix to implement security controls and prevent breaches from occurring. Citrix XenApp, Citrix XenDesktop and Citrix XenMobile have all been critical in how we deliver essential applications or services while maintaining a very high level of security.