Hi [[ session.user.profile.firstName ]]

Citrix Networking

  • Date
  • Rating
  • Views
  • Hybrid multi-cloud infrastructure for modern app delivery
    Hybrid multi-cloud infrastructure for modern app delivery
    Dave Potter, Senior Solutions Architect at Citrix, and Robin Manke-Cassidy, Director of Networking and Security Product Marke Recorded: Feb 6 2019 58 mins
    T transformation, cloud, and new application development methods are changing the face of application delivery infrastructure. These new infrastructures require flexibility, security, and operational efficiency to uncover the true value to the business. We will discuss the changes driving infrastructure architects to evaluate the application delivery networking and provide a clear strategy on successfully migrating your business to a modern app delivery for hybrid multi-cloud and Cloud Native environments.
  • Network considerations for hybrid cloud
    Network considerations for hybrid cloud
    Robin Manke-Cassidy, Dir. Product Marketing, Citrix; Valerie DiMartino, Sr. Product Marketing Manager, Citrix Recorded: Jan 23 2019 45 mins
    Moving to a hybrid-cloud strategy offers many benefits like flexibility and agility but can also bring challenges to securing your network and infrastructure as the traditional data center perimeter dissolves. Users are working from anywhere and the applications and data they’re accessing have moved to the cloud. Remove barriers to hybrid-cloud migration with a new secure networking and infrastructure approach that delivers investment protection. Learn how you can protect your users and deliver your applications and data to stay in control with centralized management, performance, visibility and analytics.

    Learn how Citrix networking solutions for hybrid cloud can deliver:

    •Contextual and secure access to applications
    •Website and application protection from internal and external threats
    •Application and network visibility and intelligent analytics
    •Flexibility and performance
  • Evolving security strategies- It’s time for a people-centric approach
    Evolving security strategies- It’s time for a people-centric approach
    Robin Manke-Cassidy, Dir. Product Marketing, Citrix; Akhilesh Dhawan, Principal Product Marketing Manager, Citrix Recorded: Jan 10 2019 58 mins
    Attackers aren’t storming the walls of your DMZ or planning a full-scale assault on your firewall. They’re stealing information by targeting your employees and sneaking in under the radar. How do you combat that? By evolving your strategy from an attack-centric to a people-centric approach. Use a secure digital perimeter to surround users, apps and data with defenses to securely deliver digital workspaces that are centered around the people that use them—whether those resources are virtual, SaaS, hybrid or cloud.

    Attend this webinar and we’ll show you how you can:
    • Get visibility to mitigate growing security threats resulting from multi-cloud environments
    • Protect apps, data and network resources while maximizing user experience
    • Get insights into user behavior with rich analytics
  • Network Reliability for your WAN and Beyond
    Network Reliability for your WAN and Beyond
    Jason Poole, Principal Product Marketing Manager, Citrix; Valerie DiMartino, Sr. Product Marketing Manager, Citrix Recorded: Dec 28 2018 52 mins
    A reliable network is crucial to the delivery of applications. Digital transformation is driving enterprise IT to re-evaluate their application delivery capabilities to ensure that the business continues to grow and innovate while delivering the best possible experience to branch users. This talk examines the expectations of the WAN and how to use it to effectively deliver virtualized applications from a centralized location, as well as the trend of cloud migration of IT resources as it pertains to user experience and WAN cost reduction.

    In this webinar you will learn how:
    •Intelligent traffic-steering allows Internet and SaaS breakout from the branch
    •To ensure secure, cost-effective access to traditional and modern applications from the branch
    •Real-time application classification can help utilize WAN links efficiently
    •To use SD-WAN to improve the HDX experience for branch users
  • App and Network Attacks
    App and Network Attacks
    Akhilesh Dhawan, Dir of Prod Marketing- Cloud/Security Citrix & Darshant Bhagat, Dir of Prod Management/Strat Citrix Recorded: Dec 18 2018 47 mins
    Find out how the Citrix Security approach brings together the entire Citrix portfolio to address internal and external threats by providing holistic visibility and proactive protection of your company assets.

    This webinar deep dives into: protection of applications from on-premise to the cloud, hypervisor protection of servers before the threat hits the operating system, and device and user protection from external threats. Proactively counter internal and external threats through analytics.
  • Search and Destroy Hard to Detect Security Risks
    Search and Destroy Hard to Detect Security Risks
    Blake Connell, Dir. Product Marketing, Citrix; Martin Zugec, Sr. Architect, Technical Marketing, Citrix Recorded: Dec 6 2018 46 mins
    Like a trojan horse, they’re already inside your fortress wall. Weak or compromised credentials allow bad actors to pose as internal users exacerbating the problem. Far and away compromised credentials is the biggest security challenge faced by IT, a full 81% of hacking-related breaches used either stolen and/or weak passwords.* Attend this webinar and learn how Citrix Analytics uses machine learning to ferret-out these bad actors and importantly, stop their malicious behavior.

    Learn the benefits of advanced analytics, including:
    • Building a digital fingerprint for individual users that lets you know when they are doing something unusual
    • Predictive and prescriptive analytics beyond descriptive and diagnostic analytics
    • Creating custom rules with conditions and actions to remediate problems
    • Halting ransomware and data loss prevention (DLP)

    * Verizon Data Breach Investigations Report (DBIR) 2017
  • Take the WAN superhighway to the cloud with SD-WAN
    Take the WAN superhighway to the cloud with SD-WAN
    Valerie DiMartino Senior Product Marketing Manager, Sony Kogin Principle Product Marketing, Managed Service Provider Recorded: Nov 15 2018 52 mins
    Azure or adopting Office 365, it’s time to look at SD-WAN to securely connect branch users and deliver and optimized experience that’s eases cloud and SaaS migration. This webinar will explain the advantages that Citrix SD-WAN brings to your Microsoft deployment including tools such as Microsoft Azure Virtual WAN and Office 365 performance.

    In this session, you will learn how Citrix SD-WAN helps:

    • Securely connect branches to the cloud, SaaS, and the Internet
    • Optimize Office 365 connectivity and performance
    • Simplify and automate large-scale branch connectivity with Azure Virtual WAN
  • Citrix SD-WAN and Tolly Group: Best practices for performance
    Citrix SD-WAN and Tolly Group: Best practices for performance
    Kevin Tolly, Founder of The Tolly Group; Valerie DiMartino,Senior Product Marketing Manager; Shoaib Yusuf,Solutions Architect Recorded: Oct 31 2018 80 mins
    The branch user experience is dependent upon the right SD-WAN technologies that ensure applications have sufficient bandwidth for your critical application traffic in combination with the lowest latency. The ability to classify, prioritize and steer application traffic puts you in control of application delivery for your branch users.

    Moving to cloud and SaaS can be a challenge for enterprises due to inefficiencies with backhauling Internet traffic over costly legacy WAN architecture. Citrix SD-WAN securely routes traffic from the branch to the Internet and cloud and SaaS apps, bringing branches closer to the apps users need.

    In this webinar, you will learn:
    •How Citrix SD-WAN provides application-aware, end-to-end QoS for guaranteed app delivery and efficiency
    •Deep packet inspection for real-time app discovery and classification
    •Traffic steering to enable Internet and SaaS breakout
  • Protect Your Network and Apps from Cyber Threats
    Protect Your Network and Apps from Cyber Threats
    Mike Spanbauer, NSS Labs, George McGregor, Citrix, Darshant Baghat, Citrix, and Lena Yarovaya, Citrix Recorded: Oct 25 2018 44 mins
    Discover how a Web Application Firewall (WAF) can protect your applications and infrastructure

    Attackers have moved up the stack, and network firewall technology is no longer sufficient to combat the application level threats to your infrastructure and your business. This webinar, brought to you by NSS Labs and Citrix, will explore how to assess WAF solutions in terms of security effectiveness, performance, stability, reliability, and TCO.

    Join this webinar to learn how Citrix WAF:

    • Has the best price-performance ratio
    • Provides “pay-as-you-grow” capability
    • Is available on a range of appliance, in software, or as a cloud service


    Mike Spanbauer, Vice President of Research Strategy,NSS Labs

    George McGregor, Senior Director, Product Marketing, Citrix

    Darshant Bhagat, Director, Product Manager, Networking & Cloud, Citrix

    Lena Yarovaya, Director, Products, Citrix
  • Scared of data security in SaaS applications? Don’t worry, we have your back
    Scared of data security in SaaS applications? Don’t worry, we have your back
    Akhilesh Dhawan, Dir. Product Marketing, Networking/Security; Praveen Raghuraman, Dir. Product Management, Networking, Citrix Recorded: Aug 23 2018 39 mins
    Most organizations have some data stored in SaaS applications or are thinking of moving to SaaS. Some of this migration to SaaS is controlled by IT (sanctioned SaaS apps), while most of this migration is undertaken by individual business units (unsanctioned SaaS apps) in order to achieve better productivity or to get some tasks done. While IT has deployed methods like single sign-on to sanctioned applications, they cannot control access to any unsanctioned SaaS applications using the same SSO solution. And traditional single sign-on solutions don’t provide any control on what actions a user can take after they login to SaaS applications, nor do they provide security policies for IT to control user access to the Internet.

    In this session, you will learn about a single solution that helps:

    • Improve user experience with single sign-on to SaaS, web and virtual apps
    • Implement enhanced security policies for SaaS apps to control user actions after login
    • Enable Web filtering to control what users cannot access on the Internet
    • Securely browse the internet
    • Provide end to end visibility and user behavior analytics with Citrix Analytics

Embed in website or blog