Employees today need the freedom to work where and how they choose, as well as a smooth, productive experience. IT is responsible for delivering on this while maintaining security. It is a difficult task to complete. To help with this, Citrix Systems, Inc. is expanding its secure access solutions. Citrix Secure Private Access is a new cloud-delivered Zero-Trust Network Access (ZTNA) service that protects access to apps and data from managed, unmanaged, and Bring-Your-Own (BYO) devices, allowing employees to work the way they want in a secure, reliable, and productive manner, regardless of where they are.
Commenting on the development, Kyle Davies, Practice Lead, Integrated Technology Architecture, CDW, said “What employees today want more than anything is a simple experience and technology that just works, without hampering their experience or slowing them down,”
IT wants to accommodate what users want, but traditional solutions make it difficult.
John Grady, Cybersecurity Analyst, Independent Research Firm ESG, said “In today’s dynamic enterprise environments, solutions designed to defend static perimeters fall short in protecting critical assets and delivering a good end-user experience. Cloud-delivered zero trust network access solutions can enhance performance by pushing enforcement to the edge, increase efficiency with centralised policy management and ultimately improve security through the incorporation of zero trust principles,”
Citrix Secure Private Access provides simple, contextual access to all apps and data employees need to perform at their best in a consistent, reliable manner by leveraging new adaptive authentication and access policies in conjunction with security controls such as watermarking, preventing clipboard access, protection from keylogger and screen capturing malware, and browser isolation.
Citrix Secure Private Access is also specifically built to enable the modern, zero-trust approach to securing apps that is required in remote work environments, as it:
* Adaptively grants least-privilege access based on user behaviors and access patterns
* Continuously monitors and assesses user activities and automates security controls based on anomalies detected
* Provides unified management and distributed enforcement across the entire environment