Glossary of terms

  • Access control: Service that provides integration of single sign-on, remote access, and content inspection into a single solution for end-to-end access control. Learn more.

  • Actions: Closed loop responses to suspicious events. Actions are executed to prevent future anomalous events from occurring. Learn more.

  • Cloud Access Security Broker (CASB): On-premises or cloud-based security policy enforcement point placed between cloud service consumers and cloud service providers. CASBs combine and interject enterprise security policies as cloud-based resources are accessed. They also help organizations to extend security controls of their on-premises infrastructure to cloud.

  • Citrix ADC (Application Delivery Controller): Network device that lives in a data center, located strategically between the firewall, and one or more application servers. Handles load balancing between servers and optimizes end-user performance and security for enterprise applications. Learn more.

  • Citrix ADM (Application Delivery Management): Centralized network management, analytics, and orchestration solution. From a single platform, administrators can view, automate, and manage network services for scale-out application architectures. Learn more.

  • Citrix ADM agent: Proxy that enables communication between Citrix ADM and the managed instances in a data center. Learn more.

  • Citrix Analytics: Cloud service that collects data across services and products (on-premises and cloud), and generates actionable insights, enabling administrators to proactively handle user and application security threats, improve app performance, and support continuous operations. Learn more.

  • Citrix Cloud: Platform that connects to resources through the Citrix Cloud Connector on any cloud or infrastructure (on-premises, public cloud, private cloud, or hybrid cloud). Learn more.

  • Citrix Gateway: Consolidated remote access solution that consolidates remote access infrastructure to provide single sign-on across all applications whether in a datacenter, in the cloud, or delivered as SaaS. Learn more.

  • Citrix Hypervisor: Virtualization management platform optimized for application, desktop, and server virtualization infrastructures. Learn more.

  • Citrix Workspace App (formerly known as Citrix Receiver): Client software that provides seamless, secure access to applications, desktops and data from any device, including smartphones, tablets, PCs, and Macs. Learn more.

  • DLP (Data Loss Prevention): Solution that describes a set of technologies and inspection techniques to classify information contained in an object such as file, email, packet, application, or a data store. Also, the object can also be in storage, in use, or across a network. DLP tools can dynamically apply policies such as log, report, classify, relocate, tag, and encrypt. DLP tools can also apply enterprise data rights management protections. Learn more.

  • DNS (Domain Name System): Network service that is used to locate internet domain names and translate them to internet protocol (IP) addresses. DNS maps website names that users provide, to their corresponding IP-addresses that machines provide, to locate a website regardless of the physical location of the entities.

  • Data processing: Method of processing data from a data source to Citrix Analytics. Learn more.

  • Data source: Product or service that sends data to Citrix Analytics. A data source can be internal or external. Learn more.

  • Data export: Product or service that receives data from Citrix Analytics and provides insights. Learn more.

  • Discovered users: Total number of users in an organization that use data sources. Learn more.

  • FQDN (Fully Qualified Domain Name): Complete domain name for internal (StoreFront) and external (Citrix ADC) access.

  • Machine learning: Type of data analysis technology that extracts knowledge without being explicitly programmed to do so. Data from a wide variety of potential sources such as applications, sensors, networks, devices, and appliances are fed into a machine learning system. The system uses the data and applies algorithms to build its own logic to solve a problem, derive insight, or make a prediction.

  • Microsoft Graph Security: Gateway that connects customer security and organizational data. Provides easy-to-review alerts and remediation options when an action must be taken. Learn more.

  • Operations Analytics: Service that collates and presents information on user activities, such as, websites visited and the bandwidth consumed. Learn more.

  • Performance Analytics: Service that provides visibility into user session details across an organization. Learn more.

  • Policy: Set of conditions to be met for an action to be executed on a user’s risk profile. Learn more.

  • Risk indicator: Metric that provides information about the level of exposure to a business risk that the organization has at a given time. Learn more.

  • Risk score: Dynamic value that indicates the aggregate level of risk a user or an entity poses to an IT infrastructure over a pre-determined monitoring period. Learn more.

  • Risk timeline: Record of a user’s or an entity’s risky behavior that allows administrators to probe into a risk profile and understand the data usage, device usage, application usage, and location usage. Learn more.

  • Risky user: User that has acted in a risky manner or presented risky behavior. Learn more.

  • Security Analytics: Advanced analysis of data that is used to achieve compelling security outcomes such as security monitoring, threat hunting, and so on. Learn more.

  • Smart Tools: Collection of easily consumable services that facilitate automated deployment, usage-based scaling, simplified migration, and proactive health checks for Citrix workloads. Learn more.

  • Smart Tools agent: Software package that coordinates Smart Check and Smart Scale activities, collects metrics, and transmits logs. Also enables Smart Tools to communicate with machines in a Virtual Apps and Desktops Site. Learn more.

  • Splunk: SIEM ( Security Information and Event Management) software that receives intelligent data from Citrix Analytics and provides insights about the potential business risks. Learn more.

  • UBA (User Behavior Analytics): Process of baselining user activity and behavior combined with peer group analysis, to detect potential intrusions, and malicious activity.

  • Watchlist: List of users or entities whom administrators want to monitor for suspicious activities. Learn more.

Glossary of terms