SlideShare ist ein Scribd-Unternehmen logo
1 von 17
Enterprise Access Infrastructure
What is CITRIX? -CITRIX is a technology that can allow a remote users to access applications securely and these application will be centralized on the terminal server ,without any kind of installing any application on the client PC. -Citrix delivers any application to any user with the best performance, security, cost over any kind of network , device or operating system.
Key Benefits ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Six Keys to Successful Application Delivery Citrix EdgeSight ™ Monitor End User Experience Citrix WANScaler ™ Accelerate Apps to Branch Users Citrix Access Gateway ™ Enable Secure Application Access Citrix ®  NetScaler ® Deliver Web Applications Citrix Desktop Server ™ Deliver Desktops Citrix  Presentation Server ™ Deliver Windows  Applications Apps Users
The Worldwide Leader in End-to-End Application Delivery Infrastructure LAN Branch Office Mobile User Application Visibility Application Security Application Delivery Citrix EdgeSight™ Citrix Access Gateway™ Citrix Password Manager™ Citrix Application Firewall Citrix Presentation Server™ Citrix NetScaler® Citrix WANScaler® Citrix Streaming Server® Web OPTIMISE Desktop STREAM Client-Server VIRTUALISE SECURITY COST VISIBILITY PERFORMANCE
Two Steps to Application Delivery Data Center Users First, centralize applications in the data center Easy to manage and support  Secure and control applications  Deploy and update easily Presentation Server Then, choose best delivery method  Virtualize or stream based on user, applications & network Presentation Server
Application Delivery – Virtualization Centralize and host in data center Easier to install, manage and support Secure—Apps and data are protected Application Servers Presentation Server environment Server component Web apps Custom apps Data Center Desktop Client component Web browser Desktop apps
Deliver all Windows applications – anywhere, on demand Citrix XenApp Advanced Enterprise Platinum
Xen App 5.0 ,[object Object],Best Performance and Scalability High Security It is End to End Application Delivery system for all  Windows application, both client and desktop server XenApp benefits:  -Simplifies Windows application delivery  -Optimizes security and compliance for sensitive information  -Accelerates application and network performance
Difference Between Editions NEW! Advanced Edition Enterprise Edition Platinum Edition Application Virtualization Speed Screen Progressive Display *64 Support Application Streaming Application Hub Isolation Health Assistant Performance Monitoring Smart Access Single Sign-On
Presentation Server Enterprise Edition Health Assistant Isolation 2.0 Application Hub App Streaming
[object Object],[object Object],[object Object],Presentation Server New! Platinum Edition App PerfMon SmartAccess Single Sign-on
Application Streaming Admin simply installs once and users run anywhere Record Enables a simple publish and subscribe model Download Users run app in a protected environment, without installing, while connected or offline Play Record Profile Application Download Publish to User Play Play  in Protected Environment
Access Gateway ,[object Object],[object Object]
Access Management & Action Control Action control Edit View Only Print Save What actions can the user carry out? Which access scenario? + Client machine analysis Which user? User profile Access control Who can access what?
What is Citrix Password Manager? Access to Any Application One Primary Logon…   Distinct credentials for each  backend application/resource Single Sign-On to Windows, Web and  host-based applications Integrated with more than 20  strong authentication vendors Windows Web Host
THANK YOU

Weitere ähnliche Inhalte

Was ist angesagt?

WSO2Con USA 2017: Managing Verifone’s New Payment Device “Carbon” with WSO2’s...
WSO2Con USA 2017: Managing Verifone’s New Payment Device “Carbon” with WSO2’s...WSO2Con USA 2017: Managing Verifone’s New Payment Device “Carbon” with WSO2’s...
WSO2Con USA 2017: Managing Verifone’s New Payment Device “Carbon” with WSO2’s...
WSO2
 
SaaSPlex Enterprise
SaaSPlex EnterpriseSaaSPlex Enterprise
SaaSPlex Enterprise
La Lakis
 

Was ist angesagt? (18)

WSO2Con USA 2017: Managing Verifone’s New Payment Device “Carbon” with WSO2’s...
WSO2Con USA 2017: Managing Verifone’s New Payment Device “Carbon” with WSO2’s...WSO2Con USA 2017: Managing Verifone’s New Payment Device “Carbon” with WSO2’s...
WSO2Con USA 2017: Managing Verifone’s New Payment Device “Carbon” with WSO2’s...
 
Troubleshooting The Modern Managed Client - Workplace Nijna Summit 2020
Troubleshooting The Modern Managed Client - Workplace Nijna Summit 2020  Troubleshooting The Modern Managed Client - Workplace Nijna Summit 2020
Troubleshooting The Modern Managed Client - Workplace Nijna Summit 2020
 
Dell Quest TPAM Privileged Access Control
Dell Quest TPAM Privileged Access ControlDell Quest TPAM Privileged Access Control
Dell Quest TPAM Privileged Access Control
 
Cloud Computing
Cloud Computing Cloud Computing
Cloud Computing
 
Ewug 1802 secure your windows device in a modern way
Ewug 1802   secure your windows device in a modern wayEwug 1802   secure your windows device in a modern way
Ewug 1802 secure your windows device in a modern way
 
WSO2Con EU 2016: Understanding the WSO2 API Management Platform
WSO2Con EU 2016: Understanding the WSO2 API Management PlatformWSO2Con EU 2016: Understanding the WSO2 API Management Platform
WSO2Con EU 2016: Understanding the WSO2 API Management Platform
 
Accelerate Digital Transformation with Application Delivery Automation
Accelerate Digital Transformation with Application Delivery AutomationAccelerate Digital Transformation with Application Delivery Automation
Accelerate Digital Transformation with Application Delivery Automation
 
Virutalization and the Future of Datacenter Security
Virutalization and the Future of Datacenter SecurityVirutalization and the Future of Datacenter Security
Virutalization and the Future of Datacenter Security
 
SaaSPlex Enterprise
SaaSPlex EnterpriseSaaSPlex Enterprise
SaaSPlex Enterprise
 
IBM Security Identity and Access Management - Portfolio
IBM Security Identity and Access Management - PortfolioIBM Security Identity and Access Management - Portfolio
IBM Security Identity and Access Management - Portfolio
 
Branch Office Solution Son Vu
Branch Office Solution   Son VuBranch Office Solution   Son Vu
Branch Office Solution Son Vu
 
Privileged Access Manager Product Q&A
Privileged Access Manager Product Q&APrivileged Access Manager Product Q&A
Privileged Access Manager Product Q&A
 
A Single Strong Authentication Platform for Cloud and On-Premise Applications
A Single Strong Authentication Platform for Cloud and On-Premise ApplicationsA Single Strong Authentication Platform for Cloud and On-Premise Applications
A Single Strong Authentication Platform for Cloud and On-Premise Applications
 
Network Field Day 11 - Skyport Systems Presentation
Network Field Day 11 - Skyport Systems PresentationNetwork Field Day 11 - Skyport Systems Presentation
Network Field Day 11 - Skyport Systems Presentation
 
Securing Internal Applications with Cloudflare Access - April 2018
Securing Internal Applications with Cloudflare Access - April 2018Securing Internal Applications with Cloudflare Access - April 2018
Securing Internal Applications with Cloudflare Access - April 2018
 
Azure Overview Capgemini
Azure Overview CapgeminiAzure Overview Capgemini
Azure Overview Capgemini
 
Ras pro
Ras proRas pro
Ras pro
 
No-Code SAML Support for SaaS Applications with Stormpath
No-Code SAML Support for SaaS Applications with StormpathNo-Code SAML Support for SaaS Applications with Stormpath
No-Code SAML Support for SaaS Applications with Stormpath
 

Andere mochten auch

06 01 сертифицированные продукты
06 01 сертифицированные продукты06 01 сертифицированные продукты
06 01 сертифицированные продукты
Liudmila Li
 
CloudsNN 2013 Халяпин Сергей. Безопасность подхода Byod – мифы и реальность
CloudsNN 2013 Халяпин Сергей. Безопасность подхода Byod – мифы и реальностьCloudsNN 2013 Халяпин Сергей. Безопасность подхода Byod – мифы и реальность
CloudsNN 2013 Халяпин Сергей. Безопасность подхода Byod – мифы и реальность
Clouds NN
 
Stonesoft: Безопасный удаленный доступ - это просто!
Stonesoft: Безопасный удаленный доступ - это просто!Stonesoft: Безопасный удаленный доступ - это просто!
Stonesoft: Безопасный удаленный доступ - это просто!
Expolink
 
Xen App Sergey Kh
Xen App Sergey KhXen App Sergey Kh
Xen App Sergey Kh
Liudmila Li
 

Andere mochten auch (13)

06 01 сертифицированные продукты
06 01 сертифицированные продукты06 01 сертифицированные продукты
06 01 сертифицированные продукты
 
Мобильный офис глазами пентестера
Мобильный офис глазами пентестераМобильный офис глазами пентестера
Мобильный офис глазами пентестера
 
Переход к централизованной инфраструктуре рабочих мест вместе с Dell
Переход к централизованной инфраструктуре рабочих мест вместе с DellПереход к централизованной инфраструктуре рабочих мест вместе с Dell
Переход к централизованной инфраструктуре рабочих мест вместе с Dell
 
IT infrastructure - from PC to Mobility
IT infrastructure - from PC to MobilityIT infrastructure - from PC to Mobility
IT infrastructure - from PC to Mobility
 
CloudsNN 2013 Халяпин Сергей. Безопасность подхода Byod – мифы и реальность
CloudsNN 2013 Халяпин Сергей. Безопасность подхода Byod – мифы и реальностьCloudsNN 2013 Халяпин Сергей. Безопасность подхода Byod – мифы и реальность
CloudsNN 2013 Халяпин Сергей. Безопасность подхода Byod – мифы и реальность
 
Stonesoft: Безопасный удаленный доступ - это просто!
Stonesoft: Безопасный удаленный доступ - это просто!Stonesoft: Безопасный удаленный доступ - это просто!
Stonesoft: Безопасный удаленный доступ - это просто!
 
10 Dg Xd
10 Dg Xd10 Dg Xd
10 Dg Xd
 
13 zakharchenko
13 zakharchenko13 zakharchenko
13 zakharchenko
 
Webinar совместные решения Citrix и S-Terra
Webinar совместные решения Citrix и S-TerraWebinar совместные решения Citrix и S-Terra
Webinar совместные решения Citrix и S-Terra
 
Xen App Sergey Kh
Xen App Sergey KhXen App Sergey Kh
Xen App Sergey Kh
 
VDI. Факторы успеха проекта
VDI. Факторы успеха проектаVDI. Факторы успеха проекта
VDI. Факторы успеха проекта
 
Citrix Strategy Brief
Citrix Strategy BriefCitrix Strategy Brief
Citrix Strategy Brief
 
Citrix Remote Access Solution Soup
Citrix Remote Access Solution SoupCitrix Remote Access Solution Soup
Citrix Remote Access Solution Soup
 

Ähnlich wie Citrix Enterprise Access Infrastructure

ISS SA le presenta los Escenarios para IdentityGuard de Entrust
ISS SA le presenta los Escenarios para IdentityGuard de EntrustISS SA le presenta los Escenarios para IdentityGuard de Entrust
ISS SA le presenta los Escenarios para IdentityGuard de Entrust
Information Security Services SA
 
Citrix sb 0707-lowres
Citrix sb 0707-lowresCitrix sb 0707-lowres
Citrix sb 0707-lowres
Hai Nguyen
 
Presentation a vision for user centric computing
Presentation   a vision for user centric computingPresentation   a vision for user centric computing
Presentation a vision for user centric computing
solarisyourep
 
Testting application with a presentation downloaded from the internet
Testting application with a presentation downloaded from the internetTestting application with a presentation downloaded from the internet
Testting application with a presentation downloaded from the internet
indradipg
 
Reduce Capital & Operational Expenses with Business Productivity Online Suite
Reduce Capital & Operational Expenses with Business Productivity Online SuiteReduce Capital & Operational Expenses with Business Productivity Online Suite
Reduce Capital & Operational Expenses with Business Productivity Online Suite
Microsoft Private Cloud
 

Ähnlich wie Citrix Enterprise Access Infrastructure (20)

Cyberoam SSL VPN
Cyberoam SSL VPNCyberoam SSL VPN
Cyberoam SSL VPN
 
Business Mobility - otevřete svou mysl k tomu, co je možné
Business Mobility - otevřete svou mysl k tomu, co je možnéBusiness Mobility - otevřete svou mysl k tomu, co je možné
Business Mobility - otevřete svou mysl k tomu, co je možné
 
ISS SA le presenta los Escenarios para IdentityGuard de Entrust
ISS SA le presenta los Escenarios para IdentityGuard de EntrustISS SA le presenta los Escenarios para IdentityGuard de Entrust
ISS SA le presenta los Escenarios para IdentityGuard de Entrust
 
ISS SA le presenta los escenarios para IdentityGuard de Entrust
ISS SA le presenta los escenarios para IdentityGuard de EntrustISS SA le presenta los escenarios para IdentityGuard de Entrust
ISS SA le presenta los escenarios para IdentityGuard de Entrust
 
Presentation technical deep dive of horizon 6 and mirage 5
Presentation   technical deep dive of horizon 6 and mirage 5Presentation   technical deep dive of horizon 6 and mirage 5
Presentation technical deep dive of horizon 6 and mirage 5
 
Presentaties seminar rethink the desktop 20.01.2011
Presentaties seminar rethink the desktop 20.01.2011Presentaties seminar rethink the desktop 20.01.2011
Presentaties seminar rethink the desktop 20.01.2011
 
Citrix sb 0707-lowres
Citrix sb 0707-lowresCitrix sb 0707-lowres
Citrix sb 0707-lowres
 
Sierraware browser isolation
Sierraware browser isolationSierraware browser isolation
Sierraware browser isolation
 
Symposium Cloud En Grid Computing Microsoft Online Strategy - 21-4-2009
Symposium Cloud En Grid Computing   Microsoft Online Strategy - 21-4-2009Symposium Cloud En Grid Computing   Microsoft Online Strategy - 21-4-2009
Symposium Cloud En Grid Computing Microsoft Online Strategy - 21-4-2009
 
Desafíos de la Ciberseguridad en un ecosistema digitalmente transformado
Desafíos de la Ciberseguridad en un ecosistema digitalmente transformadoDesafíos de la Ciberseguridad en un ecosistema digitalmente transformado
Desafíos de la Ciberseguridad en un ecosistema digitalmente transformado
 
Presentation a vision for user centric computing
Presentation   a vision for user centric computingPresentation   a vision for user centric computing
Presentation a vision for user centric computing
 
Presentation a vision for user centric computing
Presentation   a vision for user centric computingPresentation   a vision for user centric computing
Presentation a vision for user centric computing
 
Architecting Application Services For Hybrid Cloud - AWS Summit SG 2017
Architecting Application Services For Hybrid Cloud - AWS Summit SG 2017Architecting Application Services For Hybrid Cloud - AWS Summit SG 2017
Architecting Application Services For Hybrid Cloud - AWS Summit SG 2017
 
What's new in Citrix XenApp 7.5 und XenDesktop 7.5?
What's new in Citrix XenApp 7.5 und XenDesktop 7.5?What's new in Citrix XenApp 7.5 und XenDesktop 7.5?
What's new in Citrix XenApp 7.5 und XenDesktop 7.5?
 
Testting application with a presentation downloaded from the internet
Testting application with a presentation downloaded from the internetTestting application with a presentation downloaded from the internet
Testting application with a presentation downloaded from the internet
 
Contextual Security and Application Control for Virtualized Desktops
Contextual Security and Application Control for Virtualized DesktopsContextual Security and Application Control for Virtualized Desktops
Contextual Security and Application Control for Virtualized Desktops
 
Citrix xenapp training
Citrix xenapp training Citrix xenapp training
Citrix xenapp training
 
V mware view 5 customer presentation
V mware view 5 customer presentationV mware view 5 customer presentation
V mware view 5 customer presentation
 
Reduce Capital & Operational Expenses with Business Productivity Online Suite
Reduce Capital & Operational Expenses with Business Productivity Online SuiteReduce Capital & Operational Expenses with Business Productivity Online Suite
Reduce Capital & Operational Expenses with Business Productivity Online Suite
 
VDI and Application Virtualization
VDI and Application VirtualizationVDI and Application Virtualization
VDI and Application Virtualization
 

Mehr von Emirates Computers

Changing the Virtualization Landscape
Changing the Virtualization LandscapeChanging the Virtualization Landscape
Changing the Virtualization Landscape
Emirates Computers
 
Emirates Computers / EMC Signature Solution Center
Emirates Computers / EMC Signature Solution CenterEmirates Computers / EMC Signature Solution Center
Emirates Computers / EMC Signature Solution Center
Emirates Computers
 
Virtualize Your Disaster! Introduction & Update
Virtualize Your Disaster! Introduction & UpdateVirtualize Your Disaster! Introduction & Update
Virtualize Your Disaster! Introduction & Update
Emirates Computers
 
Virtualize Your Disaster! Remove the Disaster from “Disaster Recovery”
Virtualize Your Disaster! Remove the Disaster from “Disaster Recovery”Virtualize Your Disaster! Remove the Disaster from “Disaster Recovery”
Virtualize Your Disaster! Remove the Disaster from “Disaster Recovery”
Emirates Computers
 
Virtualize Your Disaster! Customer Use Cases & Scenarios
Virtualize Your Disaster! Customer Use Cases & ScenariosVirtualize Your Disaster! Customer Use Cases & Scenarios
Virtualize Your Disaster! Customer Use Cases & Scenarios
Emirates Computers
 

Mehr von Emirates Computers (20)

Changing the Virtualization Landscape
Changing the Virtualization LandscapeChanging the Virtualization Landscape
Changing the Virtualization Landscape
 
Emirates Computers / EMC Signature Solution Center
Emirates Computers / EMC Signature Solution CenterEmirates Computers / EMC Signature Solution Center
Emirates Computers / EMC Signature Solution Center
 
EMC At A Glance
EMC At A GlanceEMC At A Glance
EMC At A Glance
 
Virtualize Your Disaster! Introduction & Update
Virtualize Your Disaster! Introduction & UpdateVirtualize Your Disaster! Introduction & Update
Virtualize Your Disaster! Introduction & Update
 
Virtualize Your Disaster! Remove the Disaster from “Disaster Recovery”
Virtualize Your Disaster! Remove the Disaster from “Disaster Recovery”Virtualize Your Disaster! Remove the Disaster from “Disaster Recovery”
Virtualize Your Disaster! Remove the Disaster from “Disaster Recovery”
 
Virtualize Your Disaster! Customer Use Cases & Scenarios
Virtualize Your Disaster! Customer Use Cases & ScenariosVirtualize Your Disaster! Customer Use Cases & Scenarios
Virtualize Your Disaster! Customer Use Cases & Scenarios
 
Sunray Presentation
Sunray PresentationSunray Presentation
Sunray Presentation
 
Sun Product Overview
Sun Product OverviewSun Product Overview
Sun Product Overview
 
VMware Presentation
VMware PresentationVMware Presentation
VMware Presentation
 
EMC Solution Center
EMC Solution CenterEMC Solution Center
EMC Solution Center
 
Cisco Product & Solutions Overview
Cisco Product & Solutions OverviewCisco Product & Solutions Overview
Cisco Product & Solutions Overview
 
Beyond Green: EMC and Energy Efficient IT
Beyond Green: EMC and Energy Efficient ITBeyond Green: EMC and Energy Efficient IT
Beyond Green: EMC and Energy Efficient IT
 
EMC Documentum Enterprise Content Management 6.5
EMC Documentum Enterprise Content Management 6.5EMC Documentum Enterprise Content Management 6.5
EMC Documentum Enterprise Content Management 6.5
 
EMC Documentum Product Line Overview
EMC Documentum Product Line OverviewEMC Documentum Product Line Overview
EMC Documentum Product Line Overview
 
Ca Service Desk Presentation
Ca Service Desk PresentationCa Service Desk Presentation
Ca Service Desk Presentation
 
Ca Service Desk Demo Scenarios
Ca Service Desk Demo ScenariosCa Service Desk Demo Scenarios
Ca Service Desk Demo Scenarios
 
EC History Timeline
EC History TimelineEC History Timeline
EC History Timeline
 
EC Smart Living
EC Smart LivingEC Smart Living
EC Smart Living
 
EC Unified Communications Presentation
EC Unified Communications PresentationEC Unified Communications Presentation
EC Unified Communications Presentation
 
Smart SMB Presentation
Smart SMB PresentationSmart SMB Presentation
Smart SMB Presentation
 

Kürzlich hochgeladen

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 

Kürzlich hochgeladen (20)

Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 

Citrix Enterprise Access Infrastructure

  • 2. What is CITRIX? -CITRIX is a technology that can allow a remote users to access applications securely and these application will be centralized on the terminal server ,without any kind of installing any application on the client PC. -Citrix delivers any application to any user with the best performance, security, cost over any kind of network , device or operating system.
  • 3.
  • 4. Six Keys to Successful Application Delivery Citrix EdgeSight ™ Monitor End User Experience Citrix WANScaler ™ Accelerate Apps to Branch Users Citrix Access Gateway ™ Enable Secure Application Access Citrix ® NetScaler ® Deliver Web Applications Citrix Desktop Server ™ Deliver Desktops Citrix Presentation Server ™ Deliver Windows Applications Apps Users
  • 5. The Worldwide Leader in End-to-End Application Delivery Infrastructure LAN Branch Office Mobile User Application Visibility Application Security Application Delivery Citrix EdgeSight™ Citrix Access Gateway™ Citrix Password Manager™ Citrix Application Firewall Citrix Presentation Server™ Citrix NetScaler® Citrix WANScaler® Citrix Streaming Server® Web OPTIMISE Desktop STREAM Client-Server VIRTUALISE SECURITY COST VISIBILITY PERFORMANCE
  • 6. Two Steps to Application Delivery Data Center Users First, centralize applications in the data center Easy to manage and support Secure and control applications Deploy and update easily Presentation Server Then, choose best delivery method Virtualize or stream based on user, applications & network Presentation Server
  • 7. Application Delivery – Virtualization Centralize and host in data center Easier to install, manage and support Secure—Apps and data are protected Application Servers Presentation Server environment Server component Web apps Custom apps Data Center Desktop Client component Web browser Desktop apps
  • 8. Deliver all Windows applications – anywhere, on demand Citrix XenApp Advanced Enterprise Platinum
  • 9.
  • 10. Difference Between Editions NEW! Advanced Edition Enterprise Edition Platinum Edition Application Virtualization Speed Screen Progressive Display *64 Support Application Streaming Application Hub Isolation Health Assistant Performance Monitoring Smart Access Single Sign-On
  • 11. Presentation Server Enterprise Edition Health Assistant Isolation 2.0 Application Hub App Streaming
  • 12.
  • 13. Application Streaming Admin simply installs once and users run anywhere Record Enables a simple publish and subscribe model Download Users run app in a protected environment, without installing, while connected or offline Play Record Profile Application Download Publish to User Play Play in Protected Environment
  • 14.
  • 15. Access Management & Action Control Action control Edit View Only Print Save What actions can the user carry out? Which access scenario? + Client machine analysis Which user? User profile Access control Who can access what?
  • 16. What is Citrix Password Manager? Access to Any Application One Primary Logon… Distinct credentials for each backend application/resource Single Sign-On to Windows, Web and host-based applications Integrated with more than 20 strong authentication vendors Windows Web Host