Citrix App Delivery and Security service

An automated application delivery solution with a self-driving service to orchestrate, manage and secure your apps and APIs across multi-cloud.

Citrix Secure Private Access

Citrix Secure Private Access provides a zero trust approach to securely access corporate web, SaaS, and virtual applications. With advanced security controls for managed, unmanaged, and BYO devices, it’s ideal for IT and employees alike.

Citrix DaaS

A comprehensive Desktop as a Service solution optimized to provide secure hybrid work environments through easy-to-manage cloud desktop and app delivery.

Citrix Workspace Browser

A first-of-its-kind browser that lets you access anything on the internet and intranet, from within the Workspace app context, with complete security applied as a transparent layer on top of an enhanced user experience. Usage: Do not use an acronym for Citrix Workspace Browser On the first mention, always use the full name. In subsequent … Continued

cross-platform image portability

The ability to move machine catalog images wherever they are required, on any cloud platform or on-premises location.

Customer Success Services (CSS)

A support program designed to help customers achieve their business goals faster. Replaces Citrix software maintenance program and Citrix Subscription Advantage.

cyber security

A focus on protecting apps, programs, data, computers, devices, and networks from unintended or unauthorized access, change, or destruction.

cybercrime

Malicious acts and crimes committed on digital data and services. Mitigated through cyber security.

contextual access

Access provided according to the user’s situation, taking into consideration factors such as the user’s device, their network location, access policies, and security policies. It allows for the user’s smooth transition from one device and location to another.

contextual performance

The ability for IT to adjust performance of apps and data delivery according to the user’s situation, taking into account factors like device, location, data types, application types, and security policies.

Scroll to Top