With everyone returning to the office more frequently, and also having the option to continue working from home, IT departments have faced new challenges. As there is limited control over internet connections within houses and its security in combination with BYOD, this becomes a blind spot.
In order to gain insights, we have to think differently. We must therefore move away from traditional infrastructures and the associated challenges, therefore no more traditional VPN with all the associated risks if an employee's laptop is hacked or infected.
Almost everyone will have heard or even read about the abbreviation ZTNA (Zero Trust Network Access) by now. ZTNA is part of a security framework devised by Gartner called Secure Access Services Edge, SASE for short. It is a combination of network security features and WAN (eg SD-WAN) capabilities. This framework makes it possible to dynamically set up and support security. In addition, this also allows us to achieve a better user experience.
Citrix has embraced the entire framework. The image below shows how Citrix links their products to the framework.
With SIA, the user gets an agent on the device where settings can be configured. You can identify the accessibility options for a user that requires access from a device, ensuring they arrive safely onto a page via a remote browser.
Via the Citrix Workspace it is possible to let users log in and to secure an application, in whichever form, with any desired option. For example, an extra MFA is requested because it concerns a company-critical application. So it is much more about the context of someone than just a username, password and possibly MFA.
By using Citrix Analytics, it is possible to monitor both security and performance-related incidents in real time and, if necessary, to immediately deploy actions to avoid far-reaching risks.
Software-Defined WAN solutions provide low latency and resilient connectivity from distributed enterprise locations to cloud and on-premise applications, while overcoming the complexity of using traditional router-based networking solutions to manage modern networks.
Do you want to know more about how Citrix sets up their secure perimeter for end users? Contact Insight today.