Reference Architectures for Citrix Secure Private Access
A solution like Citrix Secure Private Access is applicable for many different scenarios. Many of the capabilities can easily solve an organization’s requirements. The following reference architectures provides insights into how organizations used Citrix Secure Private Access.
Flexible and Hybrid Work
For years, CompanyA supported remote work for a small percentage of the overall user population. To hire the best people from any geography, CompanyA is investigating expanding remote work to be a company wide policy. This policy not only opens up the pool of potential employee candidates, but also provides current employees with better work/life flexibility.
This reference architecture explains how CompanyA is planning their solution to support a flexible work style without compromising IT security.
|Read more: Flexible and Hybrid Work|
Protect Apps and Data on BYO Devices
End users, who are part of a hybrid and distributed workforce, use bring-your-own (BYO) devices to access internal and cloud resources. The company wants to implement a company-wide Zero Trust Network Access (ZTNA) solution to protect its resources.
|Read more: Protect apps and data on bring-your-own devices|
ZTNA for Contractors and Temp Workers
CompanyA is complementing its full-time staff with contractors and temp workers. Using Citrix, the company has realized several productivity benefits as contractors and temp workers can get on-boarded quickly and beginning work on business projects with minimal set up time. Also, since the company’s contractors and temp workers are typically mobile, they use Citrix to access resources from anywhere, at any time, and from any device.
|Read more: ZTNA for Contractors and Temp Workers|
Zero Trust Strategy for Mergers & Acquisitions
Learn how to design an environment to support a mergers and acquisition strategy without compromising IT security. The reference architecture incorporates Citrix Workspace, Secure Private Access, Virtual Apps and Desktops, Application Delivery Controller, Federated Authentication Service and Security Analytics.
|Read more: Zero Trust Strategy for Mergers & Acquisitions|
|View demo: Zero Trust Strategy for Mergers & Acquisitions|