Welcome!

IBM Cloud Authors: Yeshim Deniz, Elizabeth White, Pat Romanski, Liz McMillan, Stefan Bernbo

News Feed Item

Citrix Introduces First Secure Access Solution for Virtual Desktops

New Citrix Access Gateway Release Adds Intelligent Policy-Based Controls for Citrix XenDesktop

Citrix Systems, Inc. (Nasdaq: CTXS), the global leader in application delivery infrastructure, today announced the first solution in the industry designed to provide highly scalable secure access to virtual desktop infrastructure (VDI) environments. The newest release of the company’s popular Citrix Access Gateway™ appliance now includes integration with Citrix XenDesktop™, allowing companies to deliver virtual desktops securely to thousands of end users based on their unique identity, location and security status. Unlike traditional virtual private network (VPN) and network access control (NAC) solutions which control access solely to the network, Citrix Access Gateway provides intelligent access directly to approved applications and desktops through its innovative SmartAccess technology, an increasingly important requirement as datacenter resources become more virtualized and physically separated from end users.

By providing highly scalable secure access for virtual desktops, Citrix is making it easier for IT organizations to realize the tremendous security and cost reduction benefits that come from centralizing applications and desktops in the datacenter and delivering them virtually to end users in any location. The new Citrix Access Gateway 8.1 release accomplishes this by introducing the following key features:

  • SmartAccess for Virtual Desktops

Access Gateway’s innovative SmartAccess technology allows IT departments to provide access to specific applications and data based on the user’s identity, location and results of an end point analysis of the client device. Extending this capability to virtual desktops makes it easier for corporations to move to a delivered desktop model without compromising security or end user experience.

  • Improved Scalability for Secure Virtual Desktop Access

Adding a highly scalable Access Gateway appliance in front of virtual desktops in the datacenter can dramatically enhance an organization’s ability to deliver XenDesktop securely to thousands of XenDesktop users, regardless of how far away they are from corporate headquarters.

  • Fast Configuration and Deployment

New Access Gateway configuration wizards simplify and accelerate deployment in a virtual desktop environment by automating several commonly performed XenDesktop configuration tasks. In addition, new standalone MSI packaging for Windows simplifies and automates client installation by enabling administrative deployments through the broadly-available standard software deployment tools.

“With this announcement, Citrix is really delivering on its promise to bring the virtualized desktop closer, and more securely, to users,” said Zeus Kerravala of Yankee Group. “By offering the industry’s only out-of-the-box smart access solution for virtual desktops, Citrix is making virtualized desktops more compelling for IT organizations.”

“Partnering with Citrix allows us to offer our clients a one of a kind solution for virtual desktops,” said Steve Daly, director of systems engineering at Accelera Solutions. “Strengthening its strategic focus on application level access with SmartAccess, Citrix Access Gateway is an easy-to-use and easy-to-deploy solution that meets enterprise requirements for secure access and delivery of applications and virtual desktops. As a valued partner, we are happy to work with Citrix on the expanded market opportunities that secure access of virtual desktops brings to us.”

“The new release of Citrix Access Gateway for XenDesktop solves a thorny issue that enterprises face today. Enterprise customers can now restrict the access and use of desktops and approved applications from a central location, without network reconfiguration or end client software changes,” said Sanjay Uppal, vice president of product marketing at Citrix Systems, Inc. “By integrating scalable secure access with the Citrix XenDesktop product line, we greatly simplify the control of critical datacenter resources without compromising security.”

Pricing and Availability

These capabilities are available today in the new 8.1 release of Citrix Access Gateway. Access Gateway user licenses are included at no additional charge with Citrix XenDesktop purchases. Appliances must be purchased separately, starting at a suggested retail price of $3,500 per appliance.

About Citrix

Citrix Systems, Inc. is the global leader and the most trusted name in application delivery infrastructure. More than 215,000 organizations worldwide rely on Citrix to deliver any application to users anywhere with the best performance, highest security and lowest cost. Citrix customers include 100 percent of the Fortune 100 companies and 99 percent of the Fortune Global 500, as well as hundreds of thousands of small businesses and prosumers. Citrix has approximately 8,000 partners in more than 100 countries. Annual revenue in 2007 was $1.4 billion.

For Citrix Investors

This release contains forward-looking statements which are made pursuant to the safe harbor provisions of Section 21E of the Securities Exchange Act of 1934. The forward-looking statements in this release do not constitute guarantees of future performance. Those statements involve a number of factors that could cause actual results to differ materially, including risks associated with revenue growth and recognition of revenue, products, their development and distribution, product demand and pipeline, economic and competitive factors, the Company’s key strategic relationships, acquisition and related integration risks as well as other risks detailed in the Company’s filings with the Securities and Exchange Commission. Citrix assumes no obligation to update any forward-looking information contained in this press release or with respect to the announcements described herein.

Citrix®, Citrix XenDesktop™ and Citrix Access Gateway™ are trademarks of Citrix Systems, Inc. and/or one or more of its subsidiaries, and may be registered in the U.S. Patent and Trademark Office and in other countries. All other trademarks and registered trademarks are property of their respective owners.

More Stories By Business Wire

Copyright © 2009 Business Wire. All rights reserved. Republication or redistribution of Business Wire content is expressly prohibited without the prior written consent of Business Wire. Business Wire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

IoT & Smart Cities Stories
The deluge of IoT sensor data collected from connected devices and the powerful AI required to make that data actionable are giving rise to a hybrid ecosystem in which cloud, on-prem and edge processes become interweaved. Attendees will learn how emerging composable infrastructure solutions deliver the adaptive architecture needed to manage this new data reality. Machine learning algorithms can better anticipate data storms and automate resources to support surges, including fully scalable GPU-c...
Machine learning has taken residence at our cities' cores and now we can finally have "smart cities." Cities are a collection of buildings made to provide the structure and safety necessary for people to function, create and survive. Buildings are a pool of ever-changing performance data from large automated systems such as heating and cooling to the people that live and work within them. Through machine learning, buildings can optimize performance, reduce costs, and improve occupant comfort by ...
The explosion of new web/cloud/IoT-based applications and the data they generate are transforming our world right before our eyes. In this rush to adopt these new technologies, organizations are often ignoring fundamental questions concerning who owns the data and failing to ask for permission to conduct invasive surveillance of their customers. Organizations that are not transparent about how their systems gather data telemetry without offering shared data ownership risk product rejection, regu...
René Bostic is the Technical VP of the IBM Cloud Unit in North America. Enjoying her career with IBM during the modern millennial technological era, she is an expert in cloud computing, DevOps and emerging cloud technologies such as Blockchain. Her strengths and core competencies include a proven record of accomplishments in consensus building at all levels to assess, plan, and implement enterprise and cloud computing solutions. René is a member of the Society of Women Engineers (SWE) and a m...
Poor data quality and analytics drive down business value. In fact, Gartner estimated that the average financial impact of poor data quality on organizations is $9.7 million per year. But bad data is much more than a cost center. By eroding trust in information, analytics and the business decisions based on these, it is a serious impediment to digital transformation.
Digital Transformation: Preparing Cloud & IoT Security for the Age of Artificial Intelligence. As automation and artificial intelligence (AI) power solution development and delivery, many businesses need to build backend cloud capabilities. Well-poised organizations, marketing smart devices with AI and BlockChain capabilities prepare to refine compliance and regulatory capabilities in 2018. Volumes of health, financial, technical and privacy data, along with tightening compliance requirements by...
Predicting the future has never been more challenging - not because of the lack of data but because of the flood of ungoverned and risk laden information. Microsoft states that 2.5 exabytes of data are created every day. Expectations and reliance on data are being pushed to the limits, as demands around hybrid options continue to grow.
Digital Transformation and Disruption, Amazon Style - What You Can Learn. Chris Kocher is a co-founder of Grey Heron, a management and strategic marketing consulting firm. He has 25+ years in both strategic and hands-on operating experience helping executives and investors build revenues and shareholder value. He has consulted with over 130 companies on innovating with new business models, product strategies and monetization. Chris has held management positions at HP and Symantec in addition to ...
Enterprises have taken advantage of IoT to achieve important revenue and cost advantages. What is less apparent is how incumbent enterprises operating at scale have, following success with IoT, built analytic, operations management and software development capabilities - ranging from autonomous vehicles to manageable robotics installations. They have embraced these capabilities as if they were Silicon Valley startups.
As IoT continues to increase momentum, so does the associated risk. Secure Device Lifecycle Management (DLM) is ranked as one of the most important technology areas of IoT. Driving this trend is the realization that secure support for IoT devices provides companies the ability to deliver high-quality, reliable, secure offerings faster, create new revenue streams, and reduce support costs, all while building a competitive advantage in their markets. In this session, we will use customer use cases...