Hi [[ session.user.profile.firstName ]]

Citrix Networking

  • Date
  • Rating
  • Views
  • Hybrid multi-cloud infrastructure for modern app delivery
    Hybrid multi-cloud infrastructure for modern app delivery
    Dave Potter, Senior Solutions Architect at Citrix, and Robin Manke-Cassidy, Director of Networking and Security Product Marke Recorded: May 14 2019 57 mins
    T transformation, cloud, and new application development methods are changing the face of application delivery infrastructure. These new infrastructures require flexibility, security, and operational efficiency to uncover the true value to the business. We will discuss the changes driving infrastructure architects to evaluate the application delivery networking and provide a clear strategy on successfully migrating your business to a modern app delivery for hybrid multi-cloud and Cloud Native environments.
  • App and Network Attacks
    App and Network Attacks
    Akhilesh Dhawan, Dir of Prod Marketing- Cloud/Security Citrix & Darshant Bhagat, Dir of Prod Management/Strat Citrix Recorded: Dec 18 2018 47 mins
    Find out how the Citrix Security approach brings together the entire Citrix portfolio to address internal and external threats by providing holistic visibility and proactive protection of your company assets.

    This webinar deep dives into: protection of applications from on-premise to the cloud, hypervisor protection of servers before the threat hits the operating system, and device and user protection from external threats. Proactively counter internal and external threats through analytics.
  • Search and Destroy Hard to Detect Security Risks
    Search and Destroy Hard to Detect Security Risks
    Blake Connell, Dir. Product Marketing, Citrix; Martin Zugec, Sr. Architect, Technical Marketing, Citrix Recorded: Dec 6 2018 46 mins
    Like a trojan horse, they’re already inside your fortress wall. Weak or compromised credentials allow bad actors to pose as internal users exacerbating the problem. Far and away compromised credentials is the biggest security challenge faced by IT, a full 81% of hacking-related breaches used either stolen and/or weak passwords.* Attend this webinar and learn how Citrix Analytics uses machine learning to ferret-out these bad actors and importantly, stop their malicious behavior.

    Learn the benefits of advanced analytics, including:
    • Building a digital fingerprint for individual users that lets you know when they are doing something unusual
    • Predictive and prescriptive analytics beyond descriptive and diagnostic analytics
    • Creating custom rules with conditions and actions to remediate problems
    • Halting ransomware and data loss prevention (DLP)

    * Verizon Data Breach Investigations Report (DBIR) 2017
  • Citrix SD-WAN and Tolly Group: Best practices for performance
    Citrix SD-WAN and Tolly Group: Best practices for performance
    Kevin Tolly, Founder of The Tolly Group; Valerie DiMartino,Senior Product Marketing Manager; Shoaib Yusuf,Solutions Architect Recorded: Oct 31 2018 80 mins
    The branch user experience is dependent upon the right SD-WAN technologies that ensure applications have sufficient bandwidth for your critical application traffic in combination with the lowest latency. The ability to classify, prioritize and steer application traffic puts you in control of application delivery for your branch users.

    Moving to cloud and SaaS can be a challenge for enterprises due to inefficiencies with backhauling Internet traffic over costly legacy WAN architecture. Citrix SD-WAN securely routes traffic from the branch to the Internet and cloud and SaaS apps, bringing branches closer to the apps users need.

    In this webinar, you will learn:
    •How Citrix SD-WAN provides application-aware, end-to-end QoS for guaranteed app delivery and efficiency
    •Deep packet inspection for real-time app discovery and classification
    •Traffic steering to enable Internet and SaaS breakout
  • Protect Your Network and Apps from Cyber Threats
    Protect Your Network and Apps from Cyber Threats
    Mike Spanbauer, NSS Labs, George McGregor, Citrix, Darshant Baghat, Citrix, and Lena Yarovaya, Citrix Recorded: Oct 25 2018 44 mins
    Discover how a Web Application Firewall (WAF) can protect your applications and infrastructure

    Attackers have moved up the stack, and network firewall technology is no longer sufficient to combat the application level threats to your infrastructure and your business. This webinar, brought to you by NSS Labs and Citrix, will explore how to assess WAF solutions in terms of security effectiveness, performance, stability, reliability, and TCO.

    Join this webinar to learn how Citrix WAF:

    • Has the best price-performance ratio
    • Provides “pay-as-you-grow” capability
    • Is available on a range of appliance, in software, or as a cloud service

    Speakers:

    Mike Spanbauer, Vice President of Research Strategy,NSS Labs

    George McGregor, Senior Director, Product Marketing, Citrix

    Darshant Bhagat, Director, Product Manager, Networking & Cloud, Citrix

    Lena Yarovaya, Director, Products, Citrix
  • Scared of data security in SaaS applications? Don’t worry, we have your back
    Scared of data security in SaaS applications? Don’t worry, we have your back
    Akhilesh Dhawan, Dir. Product Marketing, Networking/Security; Praveen Raghuraman, Dir. Product Management, Networking, Citrix Recorded: Aug 23 2018 39 mins
    Most organizations have some data stored in SaaS applications or are thinking of moving to SaaS. Some of this migration to SaaS is controlled by IT (sanctioned SaaS apps), while most of this migration is undertaken by individual business units (unsanctioned SaaS apps) in order to achieve better productivity or to get some tasks done. While IT has deployed methods like single sign-on to sanctioned applications, they cannot control access to any unsanctioned SaaS applications using the same SSO solution. And traditional single sign-on solutions don’t provide any control on what actions a user can take after they login to SaaS applications, nor do they provide security policies for IT to control user access to the Internet.

    In this session, you will learn about a single solution that helps:

    • Improve user experience with single sign-on to SaaS, web and virtual apps
    • Implement enhanced security policies for SaaS apps to control user actions after login
    • Enable Web filtering to control what users cannot access on the Internet
    • Securely browse the internet
    • Provide end to end visibility and user behavior analytics with Citrix Analytics
  • Scared of data security in SaaS applications? Don’t worry, we have your back
    Scared of data security in SaaS applications? Don’t worry, we have your back
    Akhilesh Dhawan, Dir. Product Marketing, Networking/Security; Praveen Raghuraman, Dir. Product Management, Networking, Citrix Recorded: Aug 23 2018 39 mins
    Most organizations have some data stored in SaaS applications or are thinking of moving to SaaS. Some of this migration to SaaS is controlled by IT (sanctioned SaaS apps), while most of this migration is undertaken by individual business units (unsanctioned SaaS apps) in order to achieve better productivity or to get some tasks done. While IT has deployed methods like single sign-on to sanctioned applications, they cannot control access to any unsanctioned SaaS applications using the same SSO solution. And traditional single sign-on solutions don’t provide any control on what actions a user can take after they login to SaaS applications, nor do they provide security policies for IT to control user access to the Internet.

    In this session, you will learn about a single solution that helps:

    • Improve user experience with single sign-on to SaaS, web and virtual apps
    • Implement enhanced security policies for SaaS apps to control user actions after login
    • Enable Web filtering to control what users cannot access on the Internet
    • Securely browse the internet
    • Provide end to end visibility and user behavior analytics with Citrix Analytics
  • Protect Your Network and Apps from Cyber Threats
    Protect Your Network and Apps from Cyber Threats
    Mike Spanbauer, NSS Labs, George McGregor, Citrix, Darshant Baghat, Citrix, and Lena Yarovaya, Citrix Recorded: Mar 22 2018 44 mins
    Discover how a Web Application Firewall (WAF) can protect your applications and infrastructure

    Attackers have moved up the stack, and network firewall technology is no longer sufficient to combat the application level threats to your infrastructure and your business. This webinar, brought to you by NSS Labs and Citrix, will explore how to assess WAF solutions in terms of security effectiveness, performance, stability, reliability, and TCO.

    Join this webinar to learn how Citrix WAF:

    • Has the best price-performance ratio
    • Provides “pay-as-you-grow” capability
    • Is available on a range of appliance, in software, or as a cloud service

    Speakers:

    Mike Spanbauer, Vice President of Research Strategy,NSS Labs

    George McGregor, Senior Director, Product Marketing, Citrix

    Darshant Bhagat, Director, Product Manager, Networking & Cloud, Citrix

    Lena Yarovaya, Director, Products, Citrix
  • Application Visibility and Control in the Cloud
    Application Visibility and Control in the Cloud
    George McGregor, Senior Director, Product Marketing, Citrix & Kenneth Ross, Director of Product Management, Citrix Recorded: Mar 20 2018 57 mins
    Are you concerned about loss of control and visibility as you move applications and workloads to the cloud?

    NetScaler Management and Analytics (NetScaler MAS) provides application level visibility, management and automation of your application delivery environment across multiple clouds. NetScaler MAS is available as a Citrix cloud service or can be deployed as software in your data center.

    Join this webinar and learn how to:

    • Harness and use data about users, apps, and traffic from any NetScaler or HAproxy
    • Automate and manage your entire application delivery infrastructure from one console
    • Deploy and map applications to infrastructure using stylebooks so that you can easily manage your app’s lifecycle
    • Ensure policies are consistently applied by automating provisioning, configuration and SSL certificate management across your environment
    • And more!
  • How IT teams can engage effectively with your LoB developers and Devops teams
    How IT teams can engage effectively with your LoB developers and Devops teams
    Mikko Disini, Director, Product Management, Citrix & Nihal Mirashi, Senior Product Marketing Manager, Citrix Recorded: Mar 15 2018 40 mins
    With the ubiquity of cloud computing and enterprises embracing digital transformation, application development is at its peak of intensity. Line of Business (LoB) application developers are at the forefront of this application transformation from monolithic architectures to microservices.  
     
    In this webinar, you will learn:
    • Key application delivery requirements for the LoB developer and Devops teams
    • Common use cases and scenarios
    • How Citrix can help your IT team provide an IT managed cost-effective application delivery service to your developers
     
    Speakers:
     
    • Mikko Disini, Director, Product Management, Citrix
    • Nihal Mirashi, Senior Product Marketing Manager, Citrix
     

Embed in website or blog