Title: Citrix: Secure By Design
1Citrix Secure By Design
2Citrix Systems
- Nearly 60 million people in more than130,000
organizations worldwide relyon Citrix access to
do their jobs - Citrix customers include 100 percent ofthe
Fortune 100 companies, 99 percentof the Fortune
500 and 92 percent of the Fortune Global 100 - Offices in 22 countries and more than7,000
channel and alliance partners
The only organization 100 focused on Access
3Citrix Secure By Design
- Security built-in, not an afterthought
- Citrix Access infrastructure enables enterprises
to build network infrastructure with security as
a foundation - Citrix delivers Access Security
- Securely enabling users to get secure access to
the right resources, at the right place. - Protect Intellectual property
4Security Solutions
- Protective Security establishes a barrier to
keep malicious attacks from affecting the
productivity of the organization
Access Security provides regulated access to the
business resources users need to perform their
duties
5Only Citrix Offers A Complete Secure Access
Solution
Citrix Access Infrastructure
Piece Part Approach
Action Rights Management
SingleSign On
On Demand Assistance
On Demand Assistance
SingleSign On
Collaboration
Application Deployment
SSL VPN
Application Deployment
Action Rights Management
SSL VPN
End PointSecurity
Mobility
End PointSecurity
Collaboration
Smooth Roaming
Integrated, Complete, Secure
6Citrix Access Platform
EnterpriseResources
PC
Data
Applications
Home
Voice
Office
Supply
Smartphone
IP Phone
Travel
Demand
7Citrix Access InfrastructureSmartAccess
Analyze Secure
Sense
Respond
8Citrix Access InfrastructureSmartAccess
Analyze Secure
Sense
Respond
9Citrix Access InfrastructureSmartAccess
Analyze Secure
Sense
Respond
10Citrix Product Portfolio Modular Components of
the Platform
11Integrated Access Platform SolutionsSecure By
Design
Architecture with built-in - not bolted on -
security Centralize intellectual property and
applications for data storage, rapid recovery
Control access Manage all users as external
users Encrypt data transmission Provide
end-to-end visibility, reporting and auditing
12A Complete Secure Access Solution
Password Manager
Presentation Server
GoToAssist
Conference Manager
Advanced Access Control
Access Gateway
GoToMyPC
IGEL
GoToMeeting
Secure Computing
Courion