Feature Videos for Citrix Secure Private Access
Overview
The following is a list of capabilities for Citrix Secure Private Access. These short demonstrations provide examples of how the features impact the overall solution. Use these videos to gain deeper insights into the full range of capabilities within Citrix Secure Private Access.
Links | |
---|---|
![]() |
View demo: End User Experience Overview |
Adaptive Security
Security policies must adapt to the user, device, resource, and overall risk. Secure Private Access incorporates multiple adaptive security policies to provide better alignment of app restrictions to the current user scenario. When these capabilities work together, single Sign-On helps reduce weak passwords by enabling organizations to apply consistent adaptive authentication policies across any SaaS and private web applications.
Links | |
---|---|
![]() |
View demo: Adaptive Access |
![]() |
View demo: Adaptive Authentication |
![]() |
View demo: Single Sign-On - Video coming soon |
Application Access
Users need access to private web apps, private client/server apps (TCP/UDP), and SaaS apps. Citrix Secure Private Access provides a Zero Trust Network Access (ZTNA) solution to these resources, as demonstrated in the following videos.
Links | |
---|---|
![]() |
View demo: Private Client/Server App Access |
![]() |
View demo: Private Web App Access |
![]() |
View demo: Public SaaS App Access |
Device Posture
he Citrix Device Posture service is a cloud-based solution that helps admins to enforce certain requirements that the end devices must meet to gain access to Citrix DaaS (virtual apps and desktops) or Citrix Secure Private Access resources (SaaS, Web apps, TCP, and UDP apps). Establishing device trust by checking the device’s posture is critical to implementing zero-trust-based access. Device Posture service enforces zero trust principles in your network by checking the end devices for compliance (managed/BYOD and security posture) before allowing an end user to log in.
![]() |
View demo: Citrix Device Posture Service |
Enhanced Security Policies
With enhanced security policies, organizations can use adaptive access policies to better protect users, applications and data from data exfiltration, malware, and accidental dissemination.
Links | |
---|---|
![]() |
View demo: Enterprise Browser Restrictions |
![]() |
View demo: Keylogger Protection |
![]() |
View demo: Screen Sharing Protection |
Enterprise Browsers
Providing Zero Trust Network Access (ZTNA) to private web apps requires different levels of browser-based security. With Citrix Secure Private Access, the following browser options are available to provide better security.
Links | |
---|---|
![]() |
View demo: Isolated Browser |
![]() |
View demo: Mobile Web Viewer for Workspace app |
![]() |
View demo: Enterprise Browser |
User and Entity Behavior Analytics (UEBA)
By understanding typical user behaviors, organizations are better able to detect and mitigate threats when devices or user identities are compromised. Deviations in user behavior can signal growing threats that can be blocked through Citrix Analytics for Security.
Links | |
---|---|
![]() |
View demo: Identity Risk User Behavior |
ZTNA vs VPN
Many organizations rely on VPN solutions to provide users with access to private web and client/server apps. With a Zero Trust Network Access solution, the user receives a better experience with better security.
Links | |
---|---|
![]() |
View demo: ZTNA vs VPN - Logon Experience |
![]() |
View demo: ZTNA vs VPN - Port Scanning |