Feature Videos for Citrix Secure Private Access
The following is a list of capabilities for Citrix Secure Private Access. These short demonstrations provide examples of how the features impact the overall solution. Use these videos to gain deeper insights into the full range of capabilities within Citrix Secure Private Access.
|View demo: End User Experience Overview|
Security policies must adapt to the user, device, resource, and overall risk. Secure Private Access incorporates multiple adaptive security policies to provide better alignment of app restrictions to the current user scenario. When these capabilities work together, single Sign-On helps reduce weak passwords by enabling organizations to apply consistent adaptive authentication policies across any SaaS and private web applications.
|View demo: Adaptive Access|
|View demo: Adaptive Authentication|
|View demo: Single Sign-On - Video coming soon|
Users need access to private web apps, private client/server apps (TCP/UDP), and SaaS apps. Citrix Secure Private Access provides a Zero Trust Network Access (ZTNA) solution to these resources, as demonstrated in the following videos.
|View demo: Private Client/Server App Access|
|View demo: Private Web App Access|
|View demo: Public SaaS App Access|
Enhanced Security Policies
With enhanced security policies, organizations can use adaptive access policies to better protect users, applications and data from data exfiltration, malware, and accidental dissemination.
|View demo: Enterprise Browser Restrictions - Coming Soon|
|View demo: Keylogger Protection|
|View demo: Screen Sharing Protection|
Providing Zero Trust Network Access (ZTNA) to private web apps requires different levels of browser-based security. With Citrix Secure Private Access, the following browser options are available to provide better security.
|View demo: Isolated Browser|
|View demo: Mobile Web Viewer for Workspace app|
|View demo: Workspace Browser|
User and Entity Behavior Analytics (UEBA)
By understanding typical user behaviors, organizations are better able to detect and mitigate threats when devices or user identities are compromised. Deviations in user behavior can signal growing threats that can be blocked through Citrix Analytics for Security.
|View demo: Identity Risk User Behavior|
ZTNA vs VPN
Many organizations rely on VPN solutions to provide users with access to private web and client/server apps. With a Zero Trust Network Access solution, the user receives a better experience with better security.
|View demo: ZTNA vs VPN - Logon Experience|
|View demo: ZTNA vs VPN - Port Scanning|