Duration 46:40
16+
Play
Video

Citrix Synergy TV - SYN120 - Address growing cybersecurity threats with a people-centric security...

Akhilesh Dhawan
Director of Product Marketing at Citrix
+ 1 speaker
  • Video
  • Table of contents
  • Video
Citrix Synergy Atlanta 2019
May 21, 2019, Atlanta, GA, United States
Citrix Synergy Atlanta 2019
Video
Citrix Synergy TV - SYN120 - Address growing cybersecurity threats with a people-centric security...
Available
In cart
Free
Free
Free
Free
Free
Free
Add to favorites
260
I like 0
I dislike 0
Available
In cart
Free
Free
Free
Free
Free
Free
  • Description
  • Transcript
  • Discussion

About speakers

Akhilesh Dhawan
Director of Product Marketing at Citrix
Robin Manke-Cassidy
Director, Product Management at Citrix

An experienced professional with over 16 years of work experience in Product Marketing/Management, Consulting, and Program Management• Strong understanding of the IT security, cloud and SaaS markets• Good experience in product positioning, messaging and strategy for “go to market”• 5 yrs+ experience in consulting• Excellent communication, leadership and team management skills

View the profile

About the talk

In order to focus on people and security in tandem, you need a workspace and network that are context-aware and intelligent enough to provide insights into both the end user and the admin sides. The Citrix people-centric approach to security enables an individualized security perimeter that follows each user, combining policies, analytics, and information about user device, location, access rights, and expected behaviors to secure all types of enterprise apps and data. Join this session to learn how this dynamic approach proactively protects information, simplifies management, and provides visibility across increasingly complex hybrid and multi-cloud environments.Note: This session will be available for on-demand viewing post-event on Citrix Synergy TV.

Share

Hi everybody. Thanks for coming and listening to us this afternoon. I know you guys are all ready for the drinks and stuff to start later. So we'll help you along there and educate you as well. Thank you. My name is Robin manke Cassidy. I'm director of product marketing for our networking and security stories, and I'm presenting today with support marketing looking at the security messaging. So we're going to talk today about how to address the growing

cyber threats for our application our infrastructures and our networking. So first of all, if you have the desire to tweet more power to you Citrix Synergy Citrix is how and this is synergy 120. So please pass it along. Serena talked a little bit today about the state of the Enterprise security. What is our Citrix security approach? How do we envision and are driving our products to help answer and solve for a lot of these issues and we're actually going to focus on three and ready to talk about the force when a little bit

areas of focus on our access security or device security and how to protect your application from Insider and Outsider threat The first let's talk about the state of it yesterday. Everything was in our data centers. We managed all the endpoint devices. We had antivirus on everything we had what about firewalls? We knew where everything was and we knew how we were protecting it and we do help people can get access to it. And as we all know that's changed. It's funny. We use this slide last year. It was already kind of behind the times if you think

about it, we've all been using phones for ever admit. I actually had one of the first window Cee phone specifically to get to my windows servers. So when I got a call in the middle of the night, I didn't have to get in my car and drive all the way to the day Center to figure out what the heck was going on with remote desktop. I could easily get from my phone into my my systems that became available to all of our customers, right all of our users. They have their phones. They have their tablets. Most of us don't even manage endpoints anymore. They're bringing their own

devices anti-viruses change how you manage these devices have changed and where they're working from his changed a lot of call centers no longer our physical location anymore where you can Hold everything call centers are people working at home and they get a device they get in the internet connection. And that's how they do all of their calls now. So because of this changing Market as well as the apps that were using so we used to all have, you know, either the canned apps or we built our own apps and we had Oracle or sap. Now, we have all these staff that

how many people change from sap or PeopleSoft to work day. Yep, how many are people are using ATP now for their HR and then yep changes how we interact with their application but it also brings new security vectors that we have to think about to make sure that we're still protecting our data. So I've already talked about many of these the but the one item I haven't really talked about is iot. So the number and types of devices. It's just not those phones in those tablets and those laptops anymore. It's iot devices. I can now do all my mail from my watch right? So we

need to think about how these new devices are going to be impacting the security component also globalization. So as companies do m&a as we broaden our Business perspective that means we're Global now. That means we have to think about the new vectors and who might be attacking us if you're in different countries dresses, there's different people going after you and you have to think about how they get in. So some of those challenges are how do we make sure the end-users devices are secured. How many people are still

using VPN? Yep, how many are 100% sure your policy doesn't basically let him have full ride on your on your backbone. Yeah, the number of arms just went down right vpns were the bane of my existence. You just let everybody's home. Not only their home device but their home network into your data center and into your environment because it's complex to manage all those policies and you need have that visibility. We have a bunch of tools in place to manage certain areas, right? We have

an MDM solution we have firewalls. We have threat detection systems. But how many of those actually talk together and how many of those can you bring all of the data get together to have a full view of what users are doing and what your applications are doing? So this picture security approach is really taking our full portfolio. It's not just virtual apps on desktop. It's not just mdn. It's actually bringing the full Suite together to help address these larger bigger problems. So the areas that we

focus on are contextual and secure access. I'm so how do you get your users in and make sure they are who they are and their devices are what you think they are device security and we're not just talking IOS and Android. We're talkin McIntosh Chromebook and windows as well. How do you reduce the internal and external threats that are coming at your applications now because you're coming from multiple directions, especially if you're using third-party applications out there, how do you make sure that your data is still secure? Content

collaboration. How do you ensure that the people who should be opening documents are those people and nobody else? How do you make sure that they're sharing with the people? They should not just copy paste and send it off to Aunt Lucy because there's a cool thing in it. And finally governance risk and compliance. We all have compliance in some way either. It's PCI. It's HIPAA. It's DOD regulations. Its government regulations or our own industry. How do we make sure that everything that we're doing is helping to apply

and solve those solution and underlying it is is analytics if you don't have an end-to-end view of your environment from a security perspective not looking at 10 different schools not looking at 10 different screen, but how do you have a full picture of what's actually going on and we're going to talk about our analytics solution as well. So what are we going to talk about today? All right, pacifically. Yes. So thank you Robin for giving a little bit of an overview of what we going to talk about. But the key takeaway, I want

you guys to take me to get from this conversation is the focus on defense in depth and and that has been the Citrix Mantra to work providing the security and different layers. If you look at the slide that is showing here. These are essentially or five different products that you may have purchased from five or six different vendors. That's where I think Citrix comes in and provides you a complete end-to-end Security value across all the different verticals different products different use cases different users and the different applications. And what time is

them together as Robin was suggesting is the analects module which brings in all of these data points gets free from all these different products and give you an old picture or when a complete picture of cross what's happening in your environment what users are accessing and what devices are being accessing your Networks? Zombies that are 5 benefits that we talked about but obviously we have only 45 minutes. So we're going to focus on the top three. This is based on these surveys that we have done in the past, you know, based on what customers are more kind of looking to hear from us to

India session today. We're going to talk about the context of secure access, which is nothing but our identity and access management story around single sign-on and and and and security policies and then obviously talk about Are you suggesting that application using a different devices which talks about the more device security or how do I secure the user devices with the used to access these applications? And then in the end we talked about in what other Tech vectors we should be looking at when we move into size or different microservices with all these

different type of articles. So let's begin. Let's talk about what contraction and secure access is this is something that you've been using mostly with your on-prem gateway accessing your vdi environment since once but the story is bigger than that. I want to see challenges actually receive across when customers talk about access is. I have too many access points something. You know, I have too many applications and I have too many access points for each application. How many of you are using Citrus gate before your work labs in the stops and keep

your hand up. And how many users are using SSL VPN? And then how many are you that users are using a single sign-on for sides and back which is separate. Okay, the mostly if you look at all these customers they have all these different solutions for different application types. Which makes the environment not only Compass to manage but it also it results in a not-so-good and user experience and in the end the policies that Robin was talking about the inconsistency that we see your cross policy that you would apply for an SSL VPN. What is

your single sign-on to SAS vs. You're worthless and desktops. They may not be very consistent and obviously venues are accessing all the different applications. Not only do they did not get a good user experience. But now they have to go to different set of different requirements that you are asked for them. So the solution mostly is open back. So when you talk about the multiple access points, it means a in the solution that before why it is, you know, how do I now consolidate all these different access points into one single solution that can give me

not only access to my watch Latin desktops, but I also can give me a secure access to remote users for my size for my aunt RenWeb my data and so on and so forth. Which obviously results in a much better and user experience? The second point where it is or the it especially for you guys is managing three four five different solutions may not be the best use of your time and resources and your skills. The solution that we help, you know, it's ask Lauren consolidation on how do I make sure that I not only provide a much better and you'll experience but make it life

easier for my IP address on my ID to manage and provide one single solution for all my all my users. Also the fact that now I can go and apply all my security policies in one place and they are consistent and their timely and they are dear to my organization policies for accepting my applications. So last year we announced Citrix Access Control service, which is basically and I'm bringing all these different pieces together which provides you access to not only your work but it also gives you

access to your sass you remember applications as well as you can control access to the internet. Now, if you look at all these three different for you guys that I mentioned on the slide with his web filtering proxy SSL when the end of security policies for different products and consolidating and help you cannot provide more value to your users and get a much better or why for managing only one solution. Which of the cloud service My doing that not only do I get you know, the user Spinners that I'm talking about witches in a single sign-on to be all your

apps, which is yours assassinated. I'm not talking with which lies that maybe we saw shops and also by baps the picture of the part on premises as well as you worthless and desktops. Now, you can start applying all these security policies where in if you look at the way other access Management Solutions work in Odell help with multi-factor with contacts relaxers and so on and so forth, but they can't control what does off the Earth indicated and this is where we add value over your existing single sign-on Solutions is we can provide you a much grander set of

security policies where you can enforce in some aspects of a watermark. You want to control copy paste for end users. Are you want to you know control all that in a good stuff there? And when are you accessing? Science applications are not able to steal information about you know competitors. In addition to that we've seen a lot of customers talk about compliance-related requirements when the use of accessing the internet. Now again, that is a different product. You would get it from a third party vendor, but within the same service offering in a wedding gown rust out of a full team

policies where you can now start enforcing his policies within our separate cloud service platform where you can control what do users can access when they're on your corporate networks. Some of you may have some compliance requirements and are there any colleges universities public? Universities or colleges here now so lot of these public institutions. They have these requirements where students cannot access them up definitely want them there a lot of other Healthcare manufacturing vendors that that have their apartment where the devil don't want users to

access anything. That is malicious that may be malicious with might affect their internet. To all of those can be actually control now with Access Control service and now I have service now within the service which provides you a complete isolated environment where in if you don't want you use to restrict access to the internet, they can still access internet using this sandbox environment. That is all students of his cloud. And in addition to that now, we also give you a complete set of analytics wherein you can see what users accessing,

you know, what kind of race course do they have? So this course I calculated based on if they're trying to access any malicious content and so on and so forth and Baseball sports, you can start in a boot and forcing some of the policies of Damages in the internet and coming soon. We're also looking at providing immoralities on BMX in the users accessing the science applications and web applications and what actions are they taking when they're inside those as applications? So these are developing policies and that we have involved in the product. Are there a hundred and eighty

calories and you can actually start unlocking in blocking some of the users for accessing and all these webcam. So you will see how far block URLs you can and I'll mention any explicit allowed URLs and then you can direction will the traffic into the secure browser service. Add experience what it looks like is in a users can access their work face using the workplace a portable switch experience portal wearing if they do the single sign-on, you know, you can use any Standard Schnauzer. But if you have these security policies enabled and you can actually use your voice this app and the browser

that is including the workspace app to access your sass applications and you'll see the water marks in Arizona. So hot in those applications and then you can actually start enforcing the bathroom policies for the links that are in that has applications. Anybody was using Gmail Office 365 year. Yeah, I'm sure you guys get all these spam and the links and that may be malicious in your Gmail to your office 65 email account. Right? So sometimes by accident a lot of fuses click those and they can infected with some out of contact

solution. Can I block access doors sites explicitly? So I'm one of the other things you could go back. So sorry, so. Last year when we introduced the service with Access Control a lot of times in a week the biggest feedback that we got from you guys was I want to use Access Control service, but I cannot because you don't integrate with my multi-factor authentication schemes that I have. So obviously We are announcing tech review for that wedding. You can actually start using your multi-factor authentication that you have built in with your video radius Integrations and I'll be

your daughter. Say is your mom picking you up. So these are already that something that you are already configured with on transit in Gateway allows you to access your applications, but you can look into move to Cloud. We used to offer we offer the one time password one time. They've also busy with his generally available today, but now you can extend those Gateway authentication schemes on to the Citrus Bowl place. So this will allow you to now start authenticating users with call the inspector policies that your Define with on-premise. It is Gateway. You can actually not start authenticating

users with any indications that you have done with tickets Gateway. And if you are using Duo security RSA Symantec VIP, or even our own lady passwords and it is a one-time password, you can start now it's sending that users. So this is something that we going to make it available very very soon. So, how are we different and why should I buy Citrix for providing contactor and secure access to one is obviously the consolidation that we provide with all your security access to apps that we have with the new environments

and then on top of that we allow you a much grander a set of policies ready to start enforcing water marks and coffee Pest Control in brain controls for users accessing size of applications. And then obviously are attending multi-factor authentication is based on the zero trust model wherein you can do the EPS cans for your end user devices and they strongly location. The device is being used in Swan and support you can actually told them the authentication challenge depending on all those different parameters. And then Indian provide you a complete end-to-end view of your

users accessing all the applications that are sitting behind access control video work labs has a web apps as well as the mobile apps. So let's move forward, right? So this is something that you provided our MDM solution, which is around I know security you and do the devices. I sorry I just keep taking this. So this is basically your device security where the first challenge that BC is multiple devices. How many of you guys have multiple devices that you manage are you? That I use it on videos Android devices iOS

devices Mac Windows laptop in all of that stuff. And then other part is you know, how do I add the security policy that have that? I cannot make Intelligent Decisions based on know what uses are trying to access as well as how do I know how secure data data that is sitting on those devices can be stored on your MacBook and restore on your windows or your mobile devices. How do I make sure that I can you know store and retrieve the data that is on the new devices because a lot of times

and you just may be using their own personal devices. So for the multiple devices, you know, we have centralized security wearing now, you can manage all the different Apple device is not only Android on iOS, but also your Mac windows and Linux Apartments. And also we provide you a complete zero trust model to prevent unauthorized access still with the uterus model now since we own devices and we managed it for you. We can actually get all the state of the use of device we can bring up and then we can do whatever all is it that you want to enforce for the end of the devices and give you a

complete data protection based on the policies that you want to set for your date and rest and motion coming from those devices then so on and so forth. So Citrix endpoint management, it it does support Aldi use the devices that you may have. So you may have current solution. I don't know how you have deployed today in the past and Pain Management used to manage IOS and Android on mobile devices and now we're extending that to the windows Linux and your Max and so on and so forth. So using that not only you can actually provide your

ear. You can do the endpoint reasoning and configuration of your devices. But also you can actually push all the apps of the contribution schemes are any of the immigration policy that even enforce on from the for the device access in your applications? In addition to that you can also now provide an additional level of security across application. So if you don't want to manage you and use the devices, you can still manage applications sitting on those devices and using this you can now say no segregated the traffic that is coming from your puzzle apps like

Facebook. You don't want Facebook to access any official or corporate information that you sitting on your devices. So you can actually know do that alarm and policies and the MDS rappers that comes with those You want to head into that problem solution for Citrix is in addition to the the man policies that are on all the OSS that exist today. So this is above and beyond that. So if you're using our secure mail or secure web it automatically has the the

micro VPN turned her on in it and we'll make a connection back to the Gateway service for just that one application on the device. So it makes it a lot easier to control what users can and cannot do and what traffic is actually coming into your environment. The other thing is that it's compliant. So if you're in the dod or or federal government or basically most industry-recognized Phipps has a encryption protocol that they will allow coming from those devices the Security Vault around these applications are fips

compliant. So that means that if the the device gets lost or stolen that's pretty much on unable to be broken into so those are really good. Thanks. The passcode is also a really good feature set. So you can just use your finger or or a 6 or 8 digit code. Would you actually get to decide your users can and cannot use so it's Citrix. We actually use both we have both the the physical thumb touch authentication as well as the pin. So if you go for so long, I think we have it set to a week anyting over week. You have to re put the pin and not just your the the

police academy. Cancel this allows you to kind of give some flexibility to users do not manage their own devices or manage their devices. You can actually just manage some apps sitting on the person devices and you can still lock the admin. I don't like people touching my machine, so I used to cure male and I'm happy about it because I still control the device. So obviously has Gateway coming in this integration that you know, we have it as a certain point management. Now it allows you to do a complete

single sign on to all your apps on the app that you have deployed on your mobile phones and also do a multi-factor check depending on the again the contextual Parameters of the user really coming from and so on and so forth so you can do all the multi-factor authentication with Gateway and then we can do it. You can also do a SSL termination. Now what SSL termination allows you to do is it takes a load off the server in the back end and improve the performance of your applications. That's the kind of value prop that to bring in with the integration that we have at the Gateway Blvd

endpoint management. And in addition to that we're also be announcing soon is the Gateway service doing all the authentication as well as a single sign-on for T-Mobile apps. So this is something that we are also coming at the booth if you want to stop by and take a look at it, but generally they use cases that you use in your own from gate before you can actually no use it with the cloud service, which is the Gateway service. That's something that is going to be coming soon. So then how are we different

is a complete comprehensive endpoint management. If you are looking at doing any MDM / mmmm project with your company, you know, you can consider the circuit Center management and the value that is not only we get the feed from the access points. Now you can actually know get the fees from UCM riches En Pointe medical device into cities analytics. And once you see start seeing the data and cervix, and now you can start enforcing policies based on the reader that you have for for certain users are you know, you lit using your own devices and you

can track you know, what uses what devices are using where they're coming in from what kind of applications are using and there are some practice methods that allow you to ask, you know, and for some access for those users based on their race course, so if they're accessing some biblical meaning for example of jailbroken device, for example, you can actually listed their access to coming into an echo can access email applications at all. It's all of those stuff that can happen with citizen or take that brings to the table. And then obviously with you if you have

Indian in Microsoft InTune, you can actually add value with in pain management for MBM use cases. So the third benefit that we're going to talk about is now I have secured my Users access to my applications providing the end-user experience and simplified my life as an IT person. I will just go to my devices. Now. How do I protect applications from text like malware or spyware? I told us that the next defense-in-depth mechanism diffuse at Citrix. so obviously a challenge around

here is I have a lot of BYO initiatives in my company. And I'm just afraid that they may be infected with some malware because you don't control what people do or users do on their own devices. They can go to any side. They can have a keylogger on a spin casting now, we're sitting in the device which can steal information from your application sessions and that includes your username password that includes any pii information that he may be sending and that can break a PCI compliance. Protection from box this is not coming up quite a bit

boxer. Everywhere are only present. How do I detect what traffic is coming from coming from a human voices coming from my boss? And how do I protect my application down time if the bolts are coming and I'm sending the fictitious traffic. And then in the end, I am also working on a lot of microservices in my microservices talk to other microservices. And how do I protect the communication between these how do I protect my nurse applications calling my application for some information director application needs to apis. so those are the big challenge

that we see from the from the customers and obviously we have Solutions around if you look at the keynote with me announce the extended security cap space without protection policies, and these are the set of policies where Excuse me. You can ask me if there is a keylogger deployed on your end user device. You can actually protect the information flow between the end-user and the application starting from your login screens, and I'm putting in anything or getting information from the app.

And that is acupresion and do you need then also for if you have to share some information on a on a on a GTA motorbikes or a Skype or whatever you use lot of times you end up showing some confidential information by mistake or if you if your customers or somebody ask for it and nothing stop them from taking a screen capture on those presentations. So how do I provide you controls for disabled in screen capture? Not only for my customers in the external users, but also for my internal employees who can take a screenshot of my sales for data

and give it to competitors. and in the end the BART management support management is something that we going to be announcing very soon as a part of the ATC portfolio and that helps you detect and limit access offered to your applications. Meaning, you know, it can improve your application of time if there is a bar tabac coming into your application Apartments as well as your I API protection authentication authorization of your API API calls in Clifton of the apis end-to-end rate limiting does APS all of the

good stuff, you know, we will provide with our ATC portfolio. So this is just like a slide that I was talking about you the application and you are a user your login to your whatever it's as applications or web applications or even watch l'application if you're using. How do I make sure that my protection that I'm sharing with the application is protector and this is also a requirement for PCI compliance this also protects your VII and it can be it also protects your user information credentials from keyloggers who can push it out to the Packers and they can get

access to the internet internet. So all of this policies are available or going to be available very soon. In addition to the copy paste commands on different commands that you can disable today for your socks and grab applications. So this is the kind of security policies that provide weather cloud services. Also coming soon is the BART management. This is something that we are really excited about a lot of customers have been asking for the using supplies ATC for load balancing their web applications are any external pacing applications? But the police lady sees,

you know, if you look at the other in the past they cannot detect if it's a traffic coming from a bot or a real human user. Now. These capabilities will be available in a portfolio where you can actually now and I'll go and Implement these policies and get defense against bots weed. We do some major detection. We do fingerprinting of the devices you can control where the traffic is coming from and you know how much traffic that you can accept from a certain IP or IP ranges are devices coming in those applications. That also you can also protect any

application the Adidas because you cannot limit the traffic coming in from a certain IP address on a certain device. You can also look at getting protection from any passport scrapping or spraying or any credential stuffing attacks that comes apart of these. So this allows your you don't you bought facts that you will from the API side, which is also going to be part of the ATC offering is the ability to authenticate Enterprise and a p h r a t i called and what that means is we can use multi mechanic shops to

authenticate your apis. It can be using the API keys or it can be using any of what protocol for authorization purposes for what APS can access with a different application. You can also do anything and this is something that is something very important because This allows you to set limits on what how much data or how much information on a p i can share with Europe externality. I can share with your own application apis. So that allows you to prevent any attacks from Bots sending in a lot of information and getting replication down. So that that becomes a challenge

when you're opening rapey eyes and nothing is controlling in and in the end you can also do a transport level security where you can enter PIN to him. So in case there is a man-in-the-middle sitting between your apis and take a nap now in and read what's going on. What information is being shared or they cannot interject or interest payoff putting their own information in that particular session. Everything Robin you would like to add on I just want to make sure that is not restricted to microservices and and containers most

developers are moving to starting to use apis to to gather information and move it back and forth between different systems both internally and externally so being able to authenticate and validate that the the API calls are coming from the system's you're expecting him from and not from random users. The other thing is botnets. So we haven't seen a whole lot of this in the US yet. It is growing quite quickly around the world. I don't know if anyone's from the APAC region companies are actually using this against other

companies. So the air traffic small airlines that do short-haul flights and a PJ There's a lot of them there is like hundreds of them. There's just a lot of them. And with it the companies are doing is putting up bought against other companies by blocking all of their seats. So no one can actually reserve a seat on flight. Yeah, it's actually put some of them out of business. Do you need to think about in your own environment? What type of web apps do you have available? Not only to your end users

but to your customers that a competitors or people who are looking to do malicious things for you are actually going to try to use against you especially if you're working in a really tight vertical that there's maybe a handful of you. It's something to keep on a lot of people look at this and go that doesn't apply to me at all. If this is totally unify to you not only now but definitely in the next probably 6 months to a year. Satya I think in in in I don't know if you have seen any accessing your

websites on the internet. They prompt you for some Map me to capture kind of thing because asking you if you're bored or if you're a robot and going to click on the pictures that have traffic lights on cars. I think that's one way to look at operating it. But obviously that's not the the only way or that's not a hundred percent guarantee that do not do bought. Traffic will not go beyond that much more sophisticated. So captcha is not necessarily save you. That's why I think you need to look at a more holistic solution that can

not only provide You Again Sports but also for maybe I am sleepy eye calls from users were trying to access Internet while internet applications and so on and so forth. So actually I won with things that you need to think about it. Also if you're like healthcare and you use the same systems to allow your your user your customers to be able to see their their their patient records be able to see what kind of medication they're getting and things like that if that's the same system that then your employees used. That's where you got to start thinking.

How am I protecting both sides? Alright, so this is something obviously coming soon to talk about protection a production keyloggers and bought Management in ATF election. So let's talk about what you can use today as well is Something that we also celebrate Citrix ATC is our web application firewall. Anybody hear familiar with that? Not much are circus ATC licenses and you can use and done on these application firewall capabilities for applications that you may have deployed for your

internal users or even for your external customers. So any of them facing any internet a single application can now be protected against from all the different type of attacks using a web application firewall. Take a look at the WASP top 10 places open web application security project. This is a set of people who will come together as a community to Define in what are the most occurring Security tax for web applications from 2017 because they still look at the 2018-2019 data

to kind of come up with a list to do a periodic update off of this list. And from the 2017 list that is the most current we do protect against all the different all the box that they have categorized into top 10 list. In addition to that you can actually, you know also restrict any IP addresses trying to access your web applications with IP reputation that we have and you can now look at all the intelligence to look at the traffic to your website and

having a app for one sitting in front of your properties. So this is something that if you are in that industry in finance or anything that is processing credit cards, I can do something that you can look at. Yeah, this is foundational. You're not running a web app firewall in front of your web services. Go home and put one in. Sew-in in the last and talk about now. We spoke of this piece with a security analyst and this is how I know kind of a screenshot of what

your security unreleased look like for for application firewall traffic. Supposed to fall obviously, you will look at you know, we show you all the certificate information as these are certificates that may be expired may be expiring soon. Maybe the most up-to-date and this allows you to where are you going to ask you? No wonder they're all your SSL certificates that you may have deployed in an application environments. In addition to that you can also look at the signature algorithms, you know, are you using the latest and the most secure? If not,

then you can actually going to take a look at them and start updating or getting new certificates. You can also look at all the virtues of information ATC instances whether they are available available all in one single place. And in the end, you can also look at all the users who are using SSL certificates and what kind of key strengths they have for signatures. So this is all in one place gives you a complete holistic view of your SSN environment. And then obviously there are other analytics that provide with all

those endpoint management that I was talking about earlier in all of those. Do you have different accents in the same platform now see what users are accessing on the from the endpoint and points your applications like SAS and Webb in what kind of internet link solder using all this information is available to you where to take Alex. So with that just want to talk about the differentiators that we have. So again, it's a different approach is not a point solution is not a point specific yusuke is that supposed talks about Iran to in value across all these

different layers of application devices use it and what not to give you a complete holistic secure environment. Show me that I'll give it to Robin to wrap the conversation to put everything together and how you visualize where things are. So we just went through the first three content collaboration was kind of hidden in there. If you were paying attention and then government risk and compliance. We actually have a whole website on citrix.com. Now that talks to

our security story. I also want to pimp a couple of other sessions that we'd love you to go see session 1:15. Oh wait, that's why I had another section. I was trying to get to put on suit 120 to access management with aqualish later this week send 200, which is that bad or security analytics if you haven't played with If you haven't seen it Go seed Lake this will be a great session and then sin 236, which is really talking the broader work space and how security ties into that specifically again a really good session with some of our colleagues.

Please the other thing I want to tell you about is on citrix.com. We now have a trust Center who is heard of a trust Center handful of you. So it's the new industry thing everyone who has a service. So if you go to Microsoft you go to work day you go to Salesforce. They all have trust sensors and what the tresidder is it tells you. Really what we do about security what we do in the cloud how we handle incidence. How are products are secured. So if you're looking at our products and you get questions from your csis

the perfect place to go and get the actual information about what we do and do not do it. It also has links to all of our security documentation. So it's a great resource to go out and check out. Hopefully you enjoyed our session and you learn something a little something at least. Please rate us. We'd love to hear what you have to say, and hopefully we'll see you at one of our other sessions. Thank you so much.

Cackle comments for the website

Buy this talk

Access to the talk “Citrix Synergy TV - SYN120 - Address growing cybersecurity threats with a people-centric security...”
Available
In cart
Free
Free
Free
Free
Free
Free

Access to all the recordings of the event

Get access to all videos “Citrix Synergy Atlanta 2019”
Available
In cart
Free
Free
Free
Free
Free
Free
Ticket

Interested in topic “Software development”?

You might be interested in videos from this event

September 28, 2018
Moscow
16
129
app store, apps, development, google play, mobile, soft

Buy this video

Video

Access to the talk “Citrix Synergy TV - SYN120 - Address growing cybersecurity threats with a people-centric security...”
Available
In cart
Free
Free
Free
Free
Free
Free

Conference Cast

With ConferenceCast.tv, you get access to our library of the world's best conference talks.

Conference Cast
525 conferences
20515 speakers
7489 hours of content