Hi [[ session.user.profile.firstName ]]

Citrix Networking

  • Date
  • Rating
  • Views
  • Scared of data security in SaaS applications? Don’t worry, we have your back
    Scared of data security in SaaS applications? Don’t worry, we have your back Akhilesh Dhawan, Dir. Product Marketing, Networking/Security; Praveen Raghuraman, Dir. Product Management, Networking, Citrix Recorded: Aug 23 2018 39 mins
    Most organizations have some data stored in SaaS applications or are thinking of moving to SaaS. Some of this migration to SaaS is controlled by IT (sanctioned SaaS apps), while most of this migration is undertaken by individual business units (unsanctioned SaaS apps) in order to achieve better productivity or to get some tasks done. While IT has deployed methods like single sign-on to sanctioned applications, they cannot control access to any unsanctioned SaaS applications using the same SSO solution. And traditional single sign-on solutions don’t provide any control on what actions a user can take after they login to SaaS applications, nor do they provide security policies for IT to control user access to the Internet.

    In this session, you will learn about a single solution that helps:

    • Improve user experience with single sign-on to SaaS, web and virtual apps
    • Implement enhanced security policies for SaaS apps to control user actions after login
    • Enable Web filtering to control what users cannot access on the Internet
    • Securely browse the internet
    • Provide end to end visibility and user behavior analytics with Citrix Analytics
  • Scared of data security in SaaS applications? Don’t worry, we have your back
    Scared of data security in SaaS applications? Don’t worry, we have your back Akhilesh Dhawan, Dir. Product Marketing, Networking/Security; Praveen Raghuraman, Dir. Product Management, Networking, Citrix Recorded: Aug 23 2018 39 mins
    Most organizations have some data stored in SaaS applications or are thinking of moving to SaaS. Some of this migration to SaaS is controlled by IT (sanctioned SaaS apps), while most of this migration is undertaken by individual business units (unsanctioned SaaS apps) in order to achieve better productivity or to get some tasks done. While IT has deployed methods like single sign-on to sanctioned applications, they cannot control access to any unsanctioned SaaS applications using the same SSO solution. And traditional single sign-on solutions don’t provide any control on what actions a user can take after they login to SaaS applications, nor do they provide security policies for IT to control user access to the Internet.

    In this session, you will learn about a single solution that helps:

    • Improve user experience with single sign-on to SaaS, web and virtual apps
    • Implement enhanced security policies for SaaS apps to control user actions after login
    • Enable Web filtering to control what users cannot access on the Internet
    • Securely browse the internet
    • Provide end to end visibility and user behavior analytics with Citrix Analytics
  • Network reliability for your WAN and beyond
    Network reliability for your WAN and beyond Jason Poole, Principal Product Marketing Manager, Citrix; Valerie DiMartino, Sr. Product Marketing Manager, Citrix Recorded: Jul 12 2018 52 mins
    A reliable network is crucial to the delivery of applications. Digital transformation is driving enterprise IT to re-evaluate their application delivery capabilities to ensure that the business continues to grow and innovate while delivering the best possible experience to branch users. This talk examines the expectations of the WAN and how to use it to effectively deliver virtualized applications from a centralized location, as well as the trend of cloud migration of IT resources as it pertains to user experience and WAN cost reduction.

    In this webinar you will learn how:
    •Intelligent traffic-steering allows Internet and SaaS breakout from the branch
    •To ensure secure, cost-effective access to traditional and modern applications from the branch
    •Real-time application classification can help utilize WAN links efficiently
    •To use SD-WAN to improve the HDX experience for branch users
  • Network reliability for your WAN and beyond
    Network reliability for your WAN and beyond Jason Poole, Principal Product Marketing Manager, Citrix; Valerie DiMartino, Sr. Product Marketing Manager, Citrix Recorded: Jul 12 2018 52 mins
    A reliable network is crucial to the delivery of applications. Digital transformation is driving enterprise IT to re-evaluate their application delivery capabilities to ensure that the business continues to grow and innovate while delivering the best possible experience to branch users. This talk examines the expectations of the WAN and how to use it to effectively deliver virtualized applications from a centralized location, as well as the trend of cloud migration of IT resources as it pertains to user experience and WAN cost reduction.

    In this webinar you will learn how:
    •Intelligent traffic-steering allows Internet and SaaS breakout from the branch
    •To ensure secure, cost-effective access to traditional and modern applications from the branch
    •Real-time application classification can help utilize WAN links efficiently
    •To use SD-WAN to improve the HDX experience for branch users
  • Network considerations for hybrid cloud
    Network considerations for hybrid cloud Robin Manke-Cassidy, Dir. Product Marketing, Citrix; Valerie DiMartino, Sr. Product Marketing Manager, Citrix Recorded: Jun 21 2018 45 mins
    Moving to a hybrid-cloud strategy offers many benefits like flexibility and agility but can also bring challenges to securing your network and infrastructure as the traditional data center perimeter dissolves. Users are working from anywhere and the applications and data they’re accessing have moved to the cloud. Remove barriers to hybrid-cloud migration with a new secure networking and infrastructure approach that delivers investment protection. Learn how you can protect your users and deliver your applications and data to stay in control with centralized management, performance, visibility and analytics.

    Learn how Citrix networking solutions for hybrid cloud can deliver:

    •Contextual and secure access to applications
    •Website and application protection from internal and external threats
    •Application and network visibility and intelligent analytics
    •Flexibility and performance
  • Network considerations for hybrid cloud
    Network considerations for hybrid cloud Robin Manke-Cassidy, Dir. Product Marketing, Citrix; Valerie DiMartino, Sr. Product Marketing Manager, Citrix Recorded: Jun 21 2018 43 mins
    Moving to a hybrid-cloud strategy offers many benefits like flexibility and agility but can also bring challenges to securing your network and infrastructure as the traditional data center perimeter dissolves. Users are working from anywhere and the applications and data they’re accessing have moved to the cloud. Remove barriers to hybrid-cloud migration with a new secure networking and infrastructure approach that delivers investment protection. Learn how you can protect your users and deliver your applications and data to stay in control with centralized management, performance, visibility and analytics.

    Learn how Citrix networking solutions for hybrid cloud can deliver:

    •Contextual and secure access to applications
    •Website and application protection from internal and external threats
    •Application and network visibility and intelligent analytics
    •Flexibility and performance
  • Search and destroy hard to detect security risks
    Search and destroy hard to detect security risks Blake Connell, Dir. Product Marketing, Citrix; Martin Zugec, Sr. Architect, Technical Marketing, Citrix Recorded: Jun 5 2018 46 mins
    Like a trojan horse, they’re already inside your fortress wall. Weak or compromised credentials allow bad actors to pose as internal users exacerbating the problem. Far and away compromised credentials is the biggest security challenge faced by IT, a full 81% of hacking-related breaches used either stolen and/or weak passwords.* Attend this webinar and learn how Citrix Analytics uses machine learning to ferret-out these bad actors and importantly, stop their malicious behavior.

    Learn the benefits of advanced analytics, including:
    • Building a digital fingerprint for individual users that lets you know when they are doing something unusual
    • Predictive and prescriptive analytics beyond descriptive and diagnostic analytics
    • Creating custom rules with conditions and actions to remediate problems
    • Halting ransomware and data loss prevention (DLP)

    * Verizon Data Breach Investigations Report (DBIR) 2017
  • Search and destroy hard to detect security risks
    Search and destroy hard to detect security risks Blake Connell, Dir. Product Marketing, Citrix; Martin Zugec, Sr. Architect, Technical Marketing, Citrix Recorded: Jun 5 2018 46 mins
    Like a trojan horse, they’re already inside your fortress wall. Weak or compromised credentials allow bad actors to pose as internal users exacerbating the problem. Far and away compromised credentials is the biggest security challenge faced by IT, a full 81% of hacking-related breaches used either stolen and/or weak passwords.* Attend this webinar and learn how Citrix Analytics uses machine learning to ferret-out these bad actors and importantly, stop their malicious behavior.

    Learn the benefits of advanced analytics, including:
    • Building a digital fingerprint for individual users that lets you know when they are doing something unusual
    • Predictive and prescriptive analytics beyond descriptive and diagnostic analytics
    • Creating custom rules with conditions and actions to remediate problems
    • Halting ransomware and data loss prevention (DLP)

    * Verizon Data Breach Investigations Report (DBIR) 2017
  • Evolving security strategies:  It’s time for a people-centric approach
    Evolving security strategies: It’s time for a people-centric approach Robin Manke-Cassidy, Dir. Product Marketing, Citrix; Akhilesh Dhawan, Principal Product Marketing Manager, Citrix Recorded: May 30 2018 59 mins
    Attackers aren’t storming the walls of your DMZ or planning a full-scale assault on your firewall. They’re stealing information by targeting your employees and sneaking in under the radar. How do you combat that? By evolving your strategy from an attack-centric to a people-centric approach. Use a secure digital perimeter to surround users, apps and data with defenses to securely deliver digital workspaces that are centered around the people that use them—whether those resources are virtual, SaaS, hybrid or cloud.

    Attend this webinar and we’ll show you how you can:
    • Get visibility to mitigate growing security threats resulting from multi-cloud environments
    • Protect apps, data and network resources while maximizing user experience
    • Get insights into user behavior with rich analytics
  • Evolving security strategies:  It’s time for a people-centric approach
    Evolving security strategies: It’s time for a people-centric approach Robin Manke-Cassidy, Dir. Product Marketing, Citrix; Akhilesh Dhawan, Principal Product Marketing Manager, Citrix Recorded: May 30 2018 58 mins
    Attackers aren’t storming the walls of your DMZ or planning a full-scale assault on your firewall. They’re stealing information by targeting your employees and sneaking in under the radar. How do you combat that? By evolving your strategy from an attack-centric to a people-centric approach. Use a secure digital perimeter to surround users, apps and data with defenses to securely deliver digital workspaces that are centered around the people that use them—whether those resources are virtual, SaaS, hybrid or cloud.

    Attend this webinar and we’ll show you how you can:
    • Get visibility to mitigate growing security threats resulting from multi-cloud environments
    • Protect apps, data and network resources while maximizing user experience
    • Get insights into user behavior with rich analytics

Embed in website or blog