top of page

Citrix How to set up BYOD users with cloud-hosted virtual desktops for zero trust network access to private applications

Source From / Citrix Official Blog


IT often faces the challenge of providing access to the company network and private applications to contractors, partners, and employees who use their own devices (BYOD). These devices pose security risks, such as data leakage, insecure usage, and more. They can also serve as a starting point for ransomware attacks because they often lack security software to periodically check for vulnerabilities, malware, and other issues. So how can IT solve this challenge?


One solution is a managed cloud-hosted virtual desktop infrastructure (VDI) solution or PC without connectivity to the company’s network and private applications. Air-gapping any client device from the cloud-hosted VDI/PC creates the first security barrier. But how can IT now ensure secure access to the company network and its applications?


The answer is simple: Citrix Secure Private Access!


Citrix Secure Private Access enables companies to go beyond traditional access security controls by enabling zero trust network access (ZTNA) to the company network or private applications.


The granular control provided by Citrix Secure Private Access ensures that before traffic leaves the VDI/PC user session, it is authorized, secured, and routed through the application’s closest Connector Appliance to minimize latency and achieve the best performance.


To set up Citrix Secure Private Access:

  1. Deploy Connector Appliances in your on-premises or cloud data centers for secure connectivity to Citrix Cloud 

  2. Define applications (web, TCP/UDP)

  3. Create access policies to grant application access to users and groups

  4. Get insights by monitoring user traffic and behavior


A more secure VPN alternative 

Citrix Secure Private Access provides zero trust network access (ZTNA), offering better security and an easier way to scale to multiple sites than a static site-to-site VPN to on-premises data centers or other cloud environments. Based on zero trust principles, all users have their own access permissions to the company network and private applications using a dedicated secured connection. You can take immediate, proactive action to block all connections from a particular user if unusual traffic flows or a large number of blocked requests are detected, ensuring the security of your network and applications.


Learn more

Check out the Citrix Secure Private Access product documentation and community page to learn more about this powerful solution and how it can help you implement zero trust-based access to SaaS and private applications for all of your users.



Comments


bottom of page