Citrix Workspace Browser

A first-of-its-kind browser that lets you access anything on the internet and intranet, from within the Workspace app context, with complete security applied as a transparent layer on top of an enhanced user experience. Usage: Do not use an acronym for Citrix Workspace Browser On the first mention, always use the full name. In subsequent … Continued

cross-platform image portability

The ability to move machine catalog images wherever they are required, on any cloud platform or on-premises location.

Customer Success Services (CSS)

A support program designed to help customers achieve their business goals faster. Replaces Citrix software maintenance program and Citrix Subscription Advantage.

cyber security

A focus on protecting apps, programs, data, computers, devices, and networks from unintended or unauthorized access, change, or destruction.


Malicious acts and crimes committed on digital data and services. Mitigated through cyber security.

contextual access

Access provided according to the user’s situation, taking into consideration factors such as the user’s device, their network location, access policies, and security policies. It allows for the user’s smooth transition from one device and location to another.

contextual performance

The ability for IT to adjust performance of apps and data delivery according to the user’s situation, taking into account factors like device, location, data types, application types, and security policies.

control plane

The part of a network that carries signaling traffic and is responsible for routing. Control packets originate from or are destined for a router. Functions of the control plane include system configuration and management. The control plane, the data plane and the management plane are the three basic components of a telecommunications architecture. The control … Continued


Avoid. Preferred term: stop responding Preferred term for disk behavior: fail

cross-site scripting (XSS)

Cross-site scripting attacks work by embedding script tags in URLs and enticing users to click them, ensuring that the malicious script gets executed on the user’s computer. These attacks leverage the trust between the user and the server and the fact that there is no input/output validation on the server to reject script language characters. … Continued

Scroll to Top