Jump to content
Welcome to our new Citrix community!

Citrix Secure Private Access

Citrix Secure Private Access provides users with secure access to applications and data regardless of location or device. Operating on a Zero Trust security model, it's designed to address modern challenges related to remote work, cloud adoption, and securing access to corporate resources. It helps organizations maintain a strong security posture while enabling secure, flexible access to corporate resources. This page lists articles related to Citrix Secure Private Access and its components.

Learn - Tech Insights

Tech Insights are short, 10-15-minute videos explaining a technology, a feature, a function with foundational technical insights, and a visual walkthrough of the technology.

Secure Private Access for Enterprise Web Apps - Access enterprise-hosted web apps seamlessly and securely through Citrix Workspace via Citrix Gateway.

Secure Private Access for SaaS Apps - Single sign-on, secure remote access, URL, and content inspection and filtering for SaaS and web applications.

Secure Private Access User Experience - Securely access the corporate web and SaaS applications with advanced security controls and website filtering for managed, unmanaged, and BYO devices.

Learn - Tech Briefs

Tech Briefs are short overview documents explaining a technology, a feature, or a function next to a technical diagram.

Secure Private Access - With Secure Private Access, organizations go beyond access and aggregation to provide IT with policy controls that provide conditional access to cloud apps and internet browsing, enhancing the organization’s overall security and compliance posture.

Learn - PoC Guides

PoC guides provide step-by-step instructions to learn about the solution's functionality by following these guides in a test environment.

Secure Access to Azure-managed SaaS Applications and Citrix Secure Private Access - Learn how to set up a Citrix Secure Private Access environment that provides enhanced security to Microsoft Azure SaaS Apps.

Secure Access to Internal Web Applications with Citrix Secure Private Access - Learn how to set up VPN-less access to an internal web application with Citrix Secure Private Access, utilizing Citrix-provided SSO.

Secure Access to Office 365 with Citrix Secure Private Access - Learn how to set up a Citrix Secure Private Access environment that provides single sign-on and enhanced security to Office 365.

Secure Access to SaaS Applications with Citrix Secure Private Access - Learn how to set up a Citrix Secure Private Access environment that uses Citrix as the single sign-on provider for SaaS applications.

Secure Access to SaaS Applications with Okta and Citrix Secure Private Access - Learn how to set up a Citrix Secure Private Access environment using Okta as the single sign-on provider for SaaS applications.

Design - Reference Architectures

Reference architectures are comprehensive guides that assist organizations in planning their Citrix implementations, complete with use cases, recommendations, and more.

Reference Architecture - Protect apps and data on bring-your-own devices - Learn how to design an environment to support bring-your-own-devices without compromising IT security. The reference architecture incorporates Secure Private Access, Web App Firewall, and Virtual Apps and Desktops

Secure Private Access - Gain knowledge about the Citrix Secure Private Access solution, including key concepts, use cases, and strategies for implementing this comprehensive security solution for an organization’s apps and data.

Zero Trust Network Access for Contractors and Temp Workers - This reference architecture explains CompanyA’s Zero Trust Network Access plan to protect contractor and temp worker access to its data and apps.

Build - Deployment Guides

Citrix Secure Private Access On-Premises - Learn how to deploy Citrix Secure Private Access On-Premises with StoreFront and NetScaler Gateway.

Communication Ports Used by Citrix Technologies - Overview of ports used by Citrix components and must be considered part of networking architecture.


User Feedback


There are no comments to display.



Guest
This is now closed for further comments

×
×
  • Create New...