• Home
  • Podcast
  • Contact
Ervik.as
Cloud, Cyber Security, EUC, DaaS and HCI
  • Cloud
    • Azure
    • Citrix Cloud
    • Cloud Management
    • Nutanix Clusters
  • Cyber Security
    • Arctic Wolf
    • Cyber Security News
  • EUC
    • Citrix
      • Citrix Analytics
      • Citrix NetScaler
      • Citrix Provisioning
      • Receiver
      • ShareFile
      • Citrix Virtual Apps (XenApp)
      • Citrix Virtual Desktops (XenDesktop)
      • Workspace
      • Workspace app
    • DaaS
      • Azure Virtual Desktop
      • Frame
    • Microsoft
      • HoloLens
      • Microsoft App-V
      • Remote Desktop Services
      • Windows 7
      • Windows 8
      • Windows 10
      • Windows Server 2008
      • Windows Server 2008 R2
      • Windows Server 2012
      • Windows Server 2012 R2
      • Windows Server 2016
    • Thin Clients
      • Igel
      • Wyse
    • VMware
      • Fusion
      • Horizon View
      • Vmware ThinApp
      • Vmware Workstation
    • Parallels
      • Remote Application Server
  • End User Experience
    • ControlUp
    • eG Innovations
    • Goliath Technologies
    • Liquidware
  • Datacenter
    • Backup & Disaster Recovery
      • Altaro
      • HYCU
      • Unitrends
      • Rubrik
      • Veeam Software
    • Containers
      • Docker
      • Red Hat OpenShift
    • Hybrid Multi Cloud
      • Nutanix
        • Nutanix Database Service
        • Files
        • Flow
        • Nutanix AHV
        • Nutanix Cloud Platform
    • Server Virtualization
      • Nutanix AHV
      • Microsoft Hyper-V
      • VMware vSphere
      • Citrix Hypervisor (XenServer)
    • Network & Security
      • Nutanix Flow
      • Palo Alto Networks
  • About
    • Cookie Policy (EU)
    • News
      • Citrix Community News

Citrix/ Secure Workspace Access

Kaizen Approach Transforms Security with Citrix Secure Access Solutions

Alexander Ervik Johnsen Citrix, secure access, Security, workspace 2021-08-05

Citrix Secure Access

Applications, data and people are the most valued assets of any organization and must be protected at all costs. But security can’t get in the way of work getting done. It’s a delicate balancing act. As a leading provider of security consulting services to government and commercial customers, Kaizen Approach recognizes this. And the firm is adjusting its playbook to better manage it. Leveraging cloud-delivered digital workspace and secure access solutions from Citrix Systems, Inc. , Kaizen has created a modern security framework through which it can help itself – and its clients – deliver a simple, secure work experience that empowers employees to work when, where and how they want while keeping their information and devices safe.

Changing the Game

“Work has fundamentally changed, and security needs to change with it,” said Melissa McCoy, Chief Technology Officer, Kaizen. “Employees aren’t coming into the office every day to connect to the corporate network. Instead, they are working from anywhere. And they expect to be able to connect to the resources they need to get things done – wherever they happen to be. It is critical that companies provide this flexibility to keep them productive and engaged, but it can’t come at the expense of security.”

Moving to the Cloud

How is Kaizen delivering on this? By moving to the cloud and leveraging solutions from Citrix to secure all the tools, apps, content, and devices that employees need and prefer to use and deliver them in a simple experience that can be customized to fit their personal preferences and evolving work styles. Among the solutions Kaizen has embraced: Citrix Workspace, Citrix ShareFile, Citrix Secure Workspace Access, and Citrix Analytics for Security.

“We had a desire to put most of our IT in the cloud being a small company, and we naturally gravitated towards a company that we felt had good fundamentals when it comes to security and reliability,” McCoy said.

Simplifying the Experience

Using Citrix Workspace, Kaizen has created one digital workspace where all its important applications can be securely accessed. And leveraging Citrix Secure Access and Workspace Access, it provides a Zero Trust  architecture so that employees can securely and easily access these applications and collaborate to do their best work.

Citrix Secure Workspace Access is a VPN-less solution that delivers zero trust access and SSO to corporate web and SaaS applications for managed, unmanaged and BYO endpoints, giving end users flexibility and choice while improving the overall security.

“Our team is excited about the simplicity of their experience,” McCoy said.

Securing the Fort

And McCoy is excited about another Citrix Secure Access solution, Citrix Analytics for Security, and the ability it gives her to assess, detect, and prevent risks in real time by continuously monitoring user behavior and end user device posture without hindering the user experience.

“Citrix Analytics for Security is my current favourite product, as it allows us to protect our assets in a way that is completely transparent,” said McCoy, who uses the solution to set up conditions and define actions to take based on those conditions across the cloud-based Citrix services she has in place. “When one of our employees took an international vacation and tried to access data, we had defined a policy to detect logins from outside the U.S. and block them and it worked as expected with a full audit trail that was automatically delivered.”

Citrix Secure Access provides a powerful set of secure access solutions that combine a full cloud-delivered security stack integrated with identity-aware Zero Trust Network Access (ZTNA) to protect employees without getting in their way. To learn more about these solutions and the value they can deliver, click here.

Related Posts

Citrix /

Citrix announces acquisition of Unicon

Secure Workspace Access /

Citrix Sets New Standard for Digital Workspace Security

Citrix /

Citrix acquires deviceTRUST and Strong Network

Citrix /

Citrix Announces General Availability of Citrix Daas for Amazon WorkSpaces Core

‹ Nutanix Mine with Commvault is out› Altaro Webinar on Windows Server Storage

Back to Top

Crafted in the land of the Vikings 🇳🇴 by Alexander Ervik Johnsen.
Copyright 2000-2025 - www.ervik.as - All Rights Reserved