article thumbnail

Introducing Citrix Adaptive Authentication

Citrix

This diversity has created a complex landscape of devices … The post Introducing Citrix Adaptive Authentication first appeared on Citrix Blogs.

article thumbnail

Application Virtualization vs. Desktop Virtualization: What’s the difference?

Citrix

Organizations may wonder whether application virtualization or desktop virtualization is the way to go. first appeared on Citrix Blogs. Desktop Virtualization: What’s the difference?

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Why should you use NetScaler for TIBCO applications?

Citrix

Last September, two important software industry players came together under the same roof: NetScaler , a leader in the load balancing and network security space that is used by 75 percent of internet users daily, and TIBCO , whose software … The post Why should you use NetScaler for TIBCO applications? first appeared on Citrix Blogs.

article thumbnail

New Pure1 Mobile App Features Enhance Security and Storage Optimization

Pure Storage

New Pure1 Mobile App Features Enhance Security and Storage Optimization by Pure Storage Blog Introducing the latest evolution of the Pure1 ® Mobile Application! Receive push notifications for new requests, authenticate via external apps or SMS, and access request history. Figure 4: Biometric authentication.

Security 105
article thumbnail

Establish device trust with Citrix’s device posture service

Citrix

In our mobile-first world, where hybrid work is the norm for many organizations, employees need access to corporate applications and resources from anywhere, on any device, on the go.

article thumbnail

Remote Access Without VPN: Is It Secure?

Citrix

VPNs have long been a security standard for secure access to corporate applications. This blog post … The post Remote Access Without VPN: Is It Secure? first appeared on Citrix Blogs. Related Stories What is Authentication vs. Authorization?

article thumbnail

How to Implement Threat Modeling in Your DevSecOps Process

Pure Storage

How to Implement Threat Modeling in Your DevSecOps Process by Pure Storage Blog This blog on threat modeling was co-authored by Dr. Ratinder Paul Singh Ahuja, CTO for Security and Networking, and Rajan Yadav , Director of Engineering, CNBU (Portworx), Pure Storage. What Are Authentication Bypass Attacks?