Reference Architectures for Citrix Secure Private Access

Overview

A solution like Citrix Secure Private Access is applicable for many different scenarios. Many of the capabilities can easily solve an organization’s requirements. The following reference architectures provides insights into how organizations used Citrix Secure Private Access.

Flexible and Hybrid Work

For years, CompanyA supported remote work for a small percentage of the overall user population. To hire the best people from any geography, CompanyA is investigating expanding remote work to be a company wide policy. This policy not only opens up the pool of potential employee candidates, but also provides current employees with better work/life flexibility.

This reference architecture explains how CompanyA is planning their solution to support a flexible work style without compromising IT security.

  Links
Reference Architecture Read more: Flexible and Hybrid Work

Protect Apps and Data on BYO Devices

End users, who are part of a hybrid and distributed workforce, use bring-your-own (BYO) devices to access internal and cloud resources. The company wants to implement a company-wide Zero Trust Network Access (ZTNA) solution to protect its resources.

  Links
Reference Architecture Read more: Protect apps and data on bring-your-own devices

ZTNA for Contractors and Temp Workers

CompanyA is complementing its full-time staff with contractors and temp workers. Using Citrix, the company has realized several productivity benefits as contractors and temp workers can get on-boarded quickly and beginning work on business projects with minimal set up time. Also, since the company’s contractors and temp workers are typically mobile, they use Citrix to access resources from anywhere, at any time, and from any device.

  Links
Reference Architecture Read more: ZTNA for Contractors and Temp Workers

Zero Trust Strategy for Mergers & Acquisitions

Learn how to design an environment to support a mergers and acquisition strategy without compromising IT security. The reference architecture incorporates Citrix Workspace, Secure Private Access, Virtual Apps and Desktops, Application Delivery Controller, Federated Authentication Service and Security Analytics.

  Links
Reference Architecture Read more: Zero Trust Strategy for Mergers & Acquisitions
Video View demo: Zero Trust Strategy for Mergers & Acquisitions
Reference Architectures for Citrix Secure Private Access