• Home
  • Podcast
  • Contact
Ervik.as
Cloud, Cyber Security, EUC, DaaS and HCI
  • Cloud
    • Azure
    • Citrix Cloud
    • Cloud Management
    • Nutanix Clusters
  • Cyber Security
    • Arctic Wolf
    • Cyber Security News
  • EUC
    • Citrix
      • Citrix Analytics
      • Citrix NetScaler
      • Citrix Provisioning
      • Receiver
      • ShareFile
      • Citrix Virtual Apps (XenApp)
      • Citrix Virtual Desktops (XenDesktop)
      • Workspace
      • Workspace app
    • DaaS
      • Azure Virtual Desktop
      • Frame
    • Microsoft
      • HoloLens
      • Microsoft App-V
      • Remote Desktop Services
      • Windows 7
      • Windows 8
      • Windows 10
      • Windows Server 2008
      • Windows Server 2008 R2
      • Windows Server 2012
      • Windows Server 2012 R2
      • Windows Server 2016
    • Thin Clients
      • Igel
      • Wyse
    • VMware
      • Fusion
      • Horizon View
      • Vmware ThinApp
      • Vmware Workstation
    • Parallels
      • Remote Application Server
  • End User Experience
    • ControlUp
    • eG Innovations
    • Goliath Technologies
    • Liquidware
  • Datacenter
    • Backup & Disaster Recovery
      • Altaro
      • HYCU
      • Unitrends
      • Rubrik
      • Veeam Software
    • Containers
      • Docker
      • Red Hat OpenShift
    • Hybrid Multi Cloud
      • Nutanix
        • Nutanix Database Service
        • Files
        • Flow
        • Nutanix AHV
        • Nutanix Cloud Platform
    • Server Virtualization
      • Nutanix AHV
      • Microsoft Hyper-V
      • VMware vSphere
      • Citrix Hypervisor (XenServer)
    • Network & Security
      • Nutanix Flow
      • Palo Alto Networks
  • About
    • Cookie Policy (EU)
    • News
      • Citrix Community News

XenDesktop

Citrix explains Virtual Desktops and Security

Alexander Ervik Johnsen Access Gateway, application management, Citrix, client device access, Configuration Logging, desktop security, Desktop Virtualization, desktop virtualization security, drive management, how to publish an application, information security, monitoring, policy-based access control, print management, secure remote access, Security, session shadowing, smartaccess, smartauditor, video, XenApp, XenDesktop 2011-09-07

These 2 video demos provide an overview of how Citrix XenDekstop provides the strongest protection for sensitive data by centrally storing it in the datacenter and tightly controlling user access through SmartAccess.

Related Posts

XenDesktop /

Citrix positioned as a Leader in the 2019-2020 IDC MarketScape for VCC

XenDesktop /

How to Anticipate Citrix End-User Performance Issues with Embedded Intelligence and Automation

XenDesktop /

Citrix Optimizer 2.0.0.109

XenDesktop /

Citrix Receiver 4.x vs Citrix Workspace app 1808

XenDesktop /

How eG Enterprise ensures a samless upgrade to Citrix XenApp & XenDesktop 7.x

‹ Citrix Access Gateway VPX 5.0.3› The FREE Quest vWorkspace Desktop Optimizer

Back to Top

Crafted in the land of the Vikings 🇳🇴 by Alexander Ervik Johnsen.
Copyright 2000-2025 - www.ervik.as - All Rights Reserved