{"id":718692,"date":"2025-08-12T15:55:19","date_gmt":"2025-08-12T19:55:19","guid":{"rendered":"https:\/\/xentegra.com\/resources\/185-quantum-ready-security-with-citrix-netscaler-protecting-data-today-and-tomorrow\/"},"modified":"2025-09-14T19:56:10","modified_gmt":"2025-09-14T23:56:10","slug":"185-quantum-ready-security-with-citrix-netscaler-protecting-data-today-and-tomorrow","status":"publish","type":"post","link":"https:\/\/xentegra.com\/fr\/resources\/185-quantum-ready-security-with-citrix-netscaler-protecting-data-today-and-tomorrow\/","title":{"rendered":"185: Quantum-Ready Security with Citrix NetScaler: Protecting Data Today and Tomorrow"},"content":{"rendered":"<p><iframe loading=\"lazy\" style=\"width: 100%; height: 200px;\" src=\"https:\/\/www.buzzsprout.com\/670066\/episodes\/17661057-quantum-ready-security-with-citrix-netscaler-protecting-data-today-and-tomorrow?iframe=true\" width=\"100%\" height=\"200\" frameborder=\"0\" scrolling=\"no\"><\/iframe><\/p>\n\n\n\n<p class=\"has-large-font-size\"><strong>Quantum-Ready Security with Citrix NetScaler: Protecting Data Today and Tomorrow<\/strong>&nbsp;<\/p>\n\n\n\n<p>In today\u2019s rapidly evolving tech landscape, cybersecurity isn\u2019t just about defending against current threats\u2014it\u2019s about anticipating the ones that haven\u2019t arrived yet. One of the most pressing challenges on the horizon is quantum computing. While the technology promises breakthroughs in everything from medical research to artificial intelligence, it also poses a serious risk to the encryption standards we rely on today.&nbsp;<\/p>\n\n\n\n<p>Citrix NetScaler is stepping up to meet that challenge, bringing post-quantum cryptography (PQC) capabilities to help organizations secure data now, before quantum computers make decryption much faster and cheaper.&nbsp;<\/p>\n\n\n\n<p class=\"has-large-font-size\"><strong>Why Quantum Threats Matter Now<\/strong>&nbsp;<\/p>\n\n\n\n<p>Quantum computing\u2019s ability to process complex calculations at unprecedented speeds means encryption that\u2019s nearly impossible to crack today could be broken in hours in the future. The danger isn\u2019t just theoretical. Bad actors are already using a tactic known as <em>harvest now, decrypt later<\/em>\u2014collecting encrypted data today with the intention of unlocking it when quantum power becomes mainstream.&nbsp;<\/p>\n\n\n\n<p>That means sensitive data like health records, financial transactions, intellectual property, and even classified communications could be compromised years down the line.&nbsp;<\/p>\n\n\n\n<p class=\"has-large-font-size\"><strong>Citrix NetScaler\u2019s Quantum-Ready Approach<\/strong>&nbsp;<\/p>\n\n\n\n<p>NetScaler has long been known as a Swiss Army knife for application delivery and security. Now, it\u2019s evolving to take on quantum-era threats with new capabilities, including:&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Post-Quantum Cryptography (PQC)<\/strong> support, aligned with <strong>NIST encryption standards<\/strong>, giving organizations a head start in deploying quantum-resistant algorithms.\u00a0<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Acting as an <strong>application delivery controller security<\/strong> layer, inspecting traffic, blocking threats, and applying advanced encryption before data even reaches backend systems.\u00a0<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Providing a <strong>roadmap for encryption updates<\/strong> so organizations can start preparing now for the 2030\u20132035 deadlines when certain classical encryption methods will be deprecated.\u00a0<\/li>\n<\/ul>\n\n\n\n<p class=\"has-large-font-size\"><strong>More Than Encryption: Expanded Security Features<\/strong>&nbsp;<\/p>\n\n\n\n<p>Quantum readiness is only part of the story. Recent NetScaler enhancements make it even more versatile:&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>HTTP\/3 over QUIC<\/strong> for faster, more efficient, and secure web traffic.\u00a0<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Strengthened <strong>DNS security<\/strong> to guard against spoofing and interception.\u00a0<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>reCAPTCHA v3 integration<\/strong> to stop automated bot attacks with minimal user friction.\u00a0<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>NetScaler Console<\/strong> for centralized visibility, compliance monitoring, and automation across all NetScaler instances\u2014whether physical, virtual, or cloud-based.\u00a0<\/li>\n<\/ul>\n\n\n\n<p class=\"has-large-font-size\"><strong>Preparing for the Post-Quantum Era<\/strong>&nbsp;<\/p>\n\n\n\n<p>NIST has set clear guidelines for transitioning away from older encryption methods, and the timeline is shorter than it seems. Organizations should begin:&nbsp;<\/p>\n\n\n\n<ol start=\"1\" class=\"wp-block-list\">\n<li><strong>Assessing risks<\/strong> and identifying systems that handle sensitive or long-lived data.\u00a0<\/li>\n<\/ol>\n\n\n\n<ol start=\"2\" class=\"wp-block-list\">\n<li><strong>Piloting PQC<\/strong> in non-production environments to validate compatibility.\u00a0<\/li>\n<\/ol>\n\n\n\n<ol start=\"3\" class=\"wp-block-list\">\n<li><strong>Updating network and application architectures<\/strong> to ensure all secure data flows through PQC-enabled gateways like NetScaler.\u00a0<\/li>\n<\/ol>\n\n\n\n<p>With deadlines on the horizon and quantum advancements accelerating, delaying action increases long-term risk.&nbsp;<\/p>\n\n\n\n<p class=\"has-large-font-size\"><strong>R\u00e9flexions finales<\/strong>&nbsp;<\/p>\n\n\n\n<p>The leap from today\u2019s security challenges to tomorrow\u2019s quantum-powered threats is coming faster than many expect. Citrix NetScaler\u2019s post-quantum cryptography capabilities, combined with its proven application security features, give organizations a powerful way to defend sensitive data now and in the future.&nbsp;<\/p>\n\n\n\n<p>In cybersecurity, preparation isn\u2019t optional\u2014it\u2019s the only way to stay ahead.&nbsp;<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<p><strong>Description de l'\u00e9pisode :<\/strong><\/p>\n\n\n\n<p>In Episode 185 of <em>La session Citrix<\/em>, Andy Whiteside, Bill Sutton, and Todd Smith explore how Citrix NetScaler is evolving into a true Swiss Army knife for security\u2014delivering protection not just for Citrix workloads, but for all applications. The conversation dives into the looming challenge of quantum computing and the \u201charvest now, decrypt later\u201d threat, where bad actors collect encrypted data today to exploit when quantum capabilities emerge.<\/p>\n\n\n\n<p>Todd and Bill unpack how NetScaler is leading the way with post-quantum cryptography (PQC) readiness, new encryption standards aligned with NIST guidelines, and GA support for quantum-resistant algorithms. They also cover key advancements like HTTP\/3 over QUIC, enhanced DNS security, reCAPTCHA v3 integration, and the Netscaler Console for fleet-wide visibility, compliance, and automation.<\/p>\n\n\n\n<p>Whether you\u2019re concerned about securing sensitive data, meeting future compliance requirements, or leveraging cutting-edge application firewall capabilities, this episode will help you understand why now\u2014not later\u2014is the time to prepare for the quantum era.<\/p>\n\n\n\n<div class=\"transcript\">\n<p><!--block-->WEBVTT<\/p>\n<p>1<br>00:00:02.530 &#8211;&gt; 00:00:18.320<br>Andy Whiteside: Hi, everyone welcome to episode 185 of the Citrix session. I&#8217;m your host, Andy Whiteside. I guess I&#8217;m your host for today. Bill Sutton and Todd Smith are with me. Bill&#8217;s the normal host. I told Bill he could take a break from kicking this off, and I would do it this time excited to be here excited, to be talking about<\/p>\n<p>2<br>00:00:18.320 &#8211;&gt; 00:00:41.840<br>Andy Whiteside: Netscaler, and how it really does act like a Swiss army knife. And specifically in today&#8217;s conversation around being all things security front, ending those applications not just Citrix, but other applications that all need that extra layer of security on the front end before we jump into this. I want to do this integra commercial. If you&#8217;re a citrix or a cloud software group customer, Citrix, specifically, Citrix Netscaler Zen server.<\/p>\n<p>3<br>00:00:41.840 &#8211;&gt; 00:00:47.450<br>Andy Whiteside: If you&#8217;re using those technologies, chances are you don&#8217;t have a partner, that is all in on them the way we are.<\/p>\n<p>4<br>00:00:47.450 &#8211;&gt; 00:01:16.149<br>Andy Whiteside: and we can help you. Please reach out, use. Linkedin, reach out to myself. Bill, sudden Ping, Todd, give Todd some accolades for doing this podcast. But if you have needs, if you&#8217;re just looking for a support contract. I mean, that&#8217;s probably the number. One thing we can help our clients with is just a minimal support contract, so that when you pick up the phone. Somebody, you know, they know you. Somebody who&#8217;s invested time into getting to know you is available to help you with work through whatever it is, and if it gets too challenging, and we need to call Citrix support.<\/p>\n<p>5<br>00:01:16.150 &#8211;&gt; 00:01:24.010<br>Andy Whiteside: we&#8217;re going to go in and call them together, and it&#8217;s going to be a hand-in-hand partnership type thing to make sure you&#8217;re getting what you need, Todd. How many.<\/p>\n<p>6<br>00:01:24.050 &#8211;&gt; 00:01:28.020<br>Andy Whiteside: how many of your customers these days have some elevated Citrix support contract in place.<\/p>\n<p>7<br>00:01:30.244 &#8211;&gt; 00:01:33.970<br>Todd Smith: So all all the customers that I have are<\/p>\n<p>8<br>00:01:34.890 &#8211;&gt; 00:01:40.860<br>Todd Smith: eligible for unified services which is kind of our all encompassing services. Agreement?<\/p>\n<p>9<br>00:01:43.740 &#8211;&gt; 00:01:48.975<br>Todd Smith: But the majority of them are, you know, they&#8217;re they&#8217;re using support as needed.<\/p>\n<p>10<br>00:01:49.540 &#8211;&gt; 00:01:52.179<br>Andy Whiteside: You know they&#8217;re leveraging some of the some of the.<\/p>\n<p>11<br>00:01:52.340 &#8211;&gt; 00:01:55.924<br>Todd Smith: Some of the environment information that we provide and things like that. But<\/p>\n<p>12<br>00:01:56.660 &#8211;&gt; 00:02:06.449<br>Todd Smith: you know, there&#8217;s definitely a need out there for partners like yourselves to to step up and and get to know the customer more intimately, and<\/p>\n<p>13<br>00:02:06.850 &#8211;&gt; 00:02:15.220<br>Todd Smith: kind of embed yourself in the part in the customer&#8217;s operational responsibilities within the within their environment, and.<\/p>\n<p>14<br>00:02:15.500 &#8211;&gt; 00:02:21.099<br>Todd Smith: you know, keeping it modern, keeping it stable, keeping it optimized. I mean, those are critical things nowadays.<\/p>\n<p>15<br>00:02:21.640 &#8211;&gt; 00:02:36.849<br>Andy Whiteside: I tell you this comes up a lot. We we have customers that are our customers. They just don&#8217;t have support contracts for whatever in place, and I think they don&#8217;t know we have them, and they get to a point where something&#8217;s critical, and they&#8217;ve been working with Citrix support for a little bit, and they haven&#8217;t made progress, and they all of a sudden will call us up and ask us like, why didn&#8217;t you come to us first, st<\/p>\n<p>16<br>00:02:36.850 &#8211;&gt; 00:02:52.010<br>Andy Whiteside: then we go to Citrix together, and 9 out of 10 times. Maybe it&#8217;s 8 out of 14 out of 5. We don&#8217;t even have to call Citrix support. We know what they&#8217;ve got going on. We know their level of aptitude, and we&#8217;re able to help them get it. Get it solved beforehand. Bill, would you say? That&#8217;s a fairly accurate.<\/p>\n<p>17<br>00:02:52.390 &#8211;&gt; 00:03:08.299<br>Bill Sutton: That&#8217;s very accurate. A lot of times we don&#8217;t find out till after the fact, and we&#8217;re being asked to escalate or other things, and you know, not in every case, but in many cases, I think the we&#8217;re we&#8217;re able to help, or at least steer them in the right direction, and even get on the phone with Citrix with them. Which helps a lot.<\/p>\n<p>18<br>00:03:08.840 &#8211;&gt; 00:03:15.459<br>Bill Sutton: And sometimes that&#8217;s you know, Citrix, reaching out to us during off hours, and the customer doesn&#8217;t have to, you know, be standing by the phone. That&#8217;s there&#8217;s value there.<\/p>\n<p>19<br>00:03:16.410 &#8211;&gt; 00:03:35.980<br>Andy Whiteside: All right. So the blog for today that Bill and Todd had brought forward here says, and Bill, apparently there&#8217;s a webinar. You were introduced to this on last week, I believe, leading the quantum ready transition. How netscalar citrix netscalar I still got to call it citrix netscaler helps prevent a silent data breach<\/p>\n<p>20<br>00:03:36.090 &#8211;&gt; 00:03:48.700<br>Andy Whiteside: decades in the making. This is by Ablash Varma, good friend of this good friend of Zintegras Todd. Why this one? Why, from your perspective, why this article.<\/p>\n<p>21<br>00:03:49.840 &#8211;&gt; 00:04:02.350<br>Todd Smith: So this is this is preventing future attacks and and what you can do to not prevent them from happening, but preventing the the potential for an attack to happen.<\/p>\n<p>22<br>00:04:02.480 &#8211;&gt; 00:04:06.110<br>Todd Smith: Right? So we we refer to this as post quantum computing.<\/p>\n<p>23<br>00:04:07.060 &#8211;&gt; 00:04:09.899<br>Todd Smith: And think of it as you know what I&#8217;m gonna<\/p>\n<p>24<br>00:04:10.050 &#8211;&gt; 00:04:13.520<br>Todd Smith: I&#8217;m going to do something today to collect data.<\/p>\n<p>25<br>00:04:14.130 &#8211;&gt; 00:04:21.999<br>Todd Smith: and I may not be able to decipher it today. But I can do it in the future. I know the technology is going to be there in the future. So<\/p>\n<p>26<br>00:04:22.390 &#8211;&gt; 00:04:39.029<br>Todd Smith: classic example, if I were to go and collect someone&#8217;s usernames and passwords or IP addresses or hash tables, a variety of different security methods that are used today and exploit them in the future. When the technology comes up where I could actually<\/p>\n<p>27<br>00:04:39.620 &#8211;&gt; 00:04:47.350<br>Todd Smith: do some of these things kind of quicker with more success.<\/p>\n<p>28<br>00:04:47.640 &#8211;&gt; 00:04:58.119<br>Todd Smith: I&#8217;m gonna I&#8217;m gonna store some things away, and I&#8217;ll I&#8217;ll get to it when I when the opportunity is correct, right? Most by that time most people have forgotten about it, or they weren&#8217;t even aware that there was an issue.<\/p>\n<p>29<br>00:04:58.330 &#8211;&gt; 00:05:02.760<br>Todd Smith: So this article really kind of digs into what Citrix is doing now<\/p>\n<p>30<br>00:05:02.990 &#8211;&gt; 00:05:06.480<br>Todd Smith: to secure our customers in the future.<\/p>\n<p>31<br>00:05:06.920 &#8211;&gt; 00:05:08.989<br>Andy Whiteside: Yeah, whether they realize it or know it or not.<\/p>\n<p>32<br>00:05:10.350 &#8211;&gt; 00:05:19.679<br>Andy Whiteside: Yeah, hey, Bill, I&#8217;m sorry I kinda did the intro, and then I kind of took over. I&#8217;ll give it back to you. But what&#8217;s why this article coming off of last week? And how does that compare to what Todd Todd said.<\/p>\n<p>33<br>00:05:19.680 &#8211;&gt; 00:05:47.990<br>Bill Sutton: Yeah, I think I think the key thing that folks need to know is that the encryption standards that we use today. The Ssl encryption standards that we use for connectivity, you know, to Citrix, applications to any websites, pretty much anything, are largely it&#8217;s today with today&#8217;s computing capabilities. It&#8217;s very difficult to decrypt those by brute force. So folks have tried, and it&#8217;s possible to do it. But it takes a very, very long time. Really, it takes so much time. It&#8217;s really not even feasible.<\/p>\n<p>34<br>00:05:47.990 &#8211;&gt; 00:06:08.590<br>Bill Sutton: But with quantum computing. Some of what we&#8217;re using today and have been using is definitely capable within a matter of hours. The article alludes to that. I&#8217;ve read some articles about this. It&#8217;s rather interesting topic in the sense that these quantum computers, which probably 5 to 10 years out before they really start to be used.<\/p>\n<p>35<br>00:06:08.995 &#8211;&gt; 00:06:13.250<br>Bill Sutton: Have the ability to crack encryption algorithms that we&#8217;re using<\/p>\n<p>36<br>00:06:13.280 &#8211;&gt; 00:06:28.780<br>Bill Sutton: pretty much standard today. And like, Todd, said one of the key problems. With this it may not sound like it&#8217;s a major issue today. Okay, so we&#8217;ll we&#8217;ll evolve our standards down the road. The challenge is this harvest now decrypt later concept, which is where where<\/p>\n<p>37<br>00:06:28.780 &#8211;&gt; 00:06:34.829<br>Bill Sutton: bad actors can harvest the data like medical information or financial information. Maybe they get.<\/p>\n<p>38<br>00:06:34.830 &#8211;&gt; 00:06:58.969<br>Bill Sutton: They hack in somehow to a hospital which we know has happened in the world a lot of places recently, but they hack into a medical database, and they capture all the encrypted medical data. They can&#8217;t look at it now, but 3 to 5 years from now, leveraging quantum computer. They may have the capability probably will have the capability to crack that and have access to that data, and then use it<\/p>\n<p>39<br>00:06:59.020 &#8211;&gt; 00:07:09.409<br>Bill Sutton: in some manner, I suppose, to get Bitcoin or something else. So that&#8217;s really where this comes in. And then we&#8217;ll get into more of the details about how Netscaler impacts this in a few minutes.<\/p>\n<p>40<br>00:07:09.590 &#8211;&gt; 00:07:18.990<br>Andy Whiteside: Hey, Bill, if you&#8217;ve got the control of the screen, so I&#8217;ll let you walk through and walk through with Todd, and I&#8217;ll chime in along the way, but you know what what you just scares, what you just said scares the heck out of me.<\/p>\n<p>41<br>00:07:18.990 &#8211;&gt; 00:07:37.712<br>Bill Sutton: Yeah, me, too. And there was a there was actually a I think it was a 60&nbsp;min article about quantum computing several months ago that talked about this not quite in these details, but in the sense that a lot of encryption algorithms are going to be at risk once. This really comes into<\/p>\n<p>42<br>00:07:38.630 &#8211;&gt; 00:07:40.100<br>Bill Sutton: into production.<\/p>\n<p>43<br>00:07:40.100 &#8211;&gt; 00:07:58.239<br>Andy Whiteside: You know, it&#8217;s funny you say that because I saw that that article on 60&nbsp;min, that episode, and as much as I should be in tune with. You know how we&#8217;re gonna address that this never once came to me that you would put an application firewall type of device in front of it, and that was gonna be your best bet.<\/p>\n<p>44<br>00:07:58.690 &#8211;&gt; 00:08:02.540<br>Bill Sutton: Exactly Todd thoughts on what we just talked about.<\/p>\n<p>45<br>00:08:02.750 &#8211;&gt; 00:08:05.100<br>Todd Smith: Yeah. So so I think a lot of this<\/p>\n<p>46<br>00:08:05.650 &#8211;&gt; 00:08:12.068<br>Todd Smith: comes down to a lot of the standards that are currently in use, you know,<\/p>\n<p>47<br>00:08:13.000 &#8211;&gt; 00:08:23.509<br>Todd Smith: are not going to be able to be used in the future. Right? So there&#8217;s end of life. NIST has already come out with some recommendations around National Institute of Science and Technology.<\/p>\n<p>48<br>00:08:23.800 &#8211;&gt; 00:08:32.779<br>Todd Smith: which really controls a lot of the policies in the, in the the rules, in the governance that it kind of follows around<\/p>\n<p>49<br>00:08:33.030 &#8211;&gt; 00:08:35.369<br>Todd Smith: the the cybersecurity world!<\/p>\n<p>50<br>00:08:37.500 &#8211;&gt; 00:08:41.520<br>Todd Smith: They&#8217;ve come out with some pretty pretty<\/p>\n<p>51<br>00:08:41.950 &#8211;&gt; 00:08:46.719<br>Todd Smith: strong opinions and guidelines around what should be done<\/p>\n<p>52<br>00:08:46.950 &#8211;&gt; 00:08:52.430<br>Todd Smith: in the future, and they&#8217;ve end of life a couple of the standards that are used today<\/p>\n<p>53<br>00:08:52.630 &#8211;&gt; 00:08:57.509<br>Todd Smith: in preparation for some of these changes. Right? So<\/p>\n<p>54<br>00:08:57.780 &#8211;&gt; 00:09:00.139<br>Todd Smith: as an example, if you have.<\/p>\n<p>55<br>00:09:00.330 &#8211;&gt; 00:09:03.300<br>Todd Smith: you know, if you&#8217;re transmitting data securely.<\/p>\n<p>56<br>00:09:03.620 &#8211;&gt; 00:09:12.219<br>Todd Smith: there&#8217;s the concept of the hash table which is used to to figure out what the encoding needs to be. The hash table has a time to live<\/p>\n<p>57<br>00:09:12.740 &#8211;&gt; 00:09:18.500<br>Todd Smith: oftentimes that that lifespan of that could be several years.<\/p>\n<p>58<br>00:09:18.750 &#8211;&gt; 00:09:26.740<br>Todd Smith: Well, if it&#8217;s going to be around for several years, that means if I store it. Now, I&#8217;ve got a couple of years that I can still go and hit that hash table<\/p>\n<p>59<br>00:09:26.840 &#8211;&gt; 00:09:28.650<br>Todd Smith: and decrypt. That information<\/p>\n<p>60<br>00:09:30.360 &#8211;&gt; 00:09:40.849<br>Todd Smith: question is, how long do we need to have these things live? How long do we need to make sure that the hash table is one of those pieces of data that cannot be stored, replicated.<\/p>\n<p>61<br>00:09:41.140 &#8211;&gt; 00:09:47.380<br>Todd Smith: duplicated or cop, or or or basically saved right?<\/p>\n<p>62<br>00:09:48.810 &#8211;&gt; 00:09:53.160<br>Todd Smith: A lot of these things are having impact on the way we think about<\/p>\n<p>63<br>00:09:53.390 &#8211;&gt; 00:10:00.639<br>Todd Smith: cryptography, the way that we think about computing in general. And the way we think about data transmissions, right? So what is going to be<\/p>\n<p>64<br>00:10:00.740 &#8211;&gt; 00:10:02.230<br>Todd Smith: what&#8217;s going to be available<\/p>\n<p>65<br>00:10:02.520 &#8211;&gt; 00:10:11.169<br>Todd Smith: today. What&#8217;s going to be available in the future? And how do we make sure that we still have a usable system in the future that is even more secure than<\/p>\n<p>66<br>00:10:11.550 &#8211;&gt; 00:10:13.020<br>Todd Smith: currently what we&#8217;re doing<\/p>\n<p>67<br>00:10:13.500 &#8211;&gt; 00:10:22.419<br>Todd Smith: right? So this is a lot. Some of this is forward thinking. But a lot of this is the reality that we live in today, which is, we need to start<\/p>\n<p>68<br>00:10:22.540 &#8211;&gt; 00:10:29.799<br>Todd Smith: preparing ourselves to make sure that we&#8217;re not exposing something in the future that we should have cleared up or locked down today.<\/p>\n<p>69<br>00:10:31.530 &#8211;&gt; 00:10:36.069<br>Todd Smith: And there&#8217;s a lot of there&#8217;s a lot of examples out there, whether it be medical information<\/p>\n<p>70<br>00:10:36.180 &#8211;&gt; 00:10:45.839<br>Todd Smith: health records. So health records, electronic medical records, financial information, specifically financial information that that was historical in nature.<\/p>\n<p>71<br>00:10:47.450 &#8211;&gt; 00:10:49.980<br>Todd Smith: Think about it as you know, a way that you can<\/p>\n<p>72<br>00:10:50.150 &#8211;&gt; 00:11:00.520<br>Todd Smith: prevent your bank from going in the background, you know, looking. Someone exploits a bank, and they go and reverse transactions that were done multiple years ago.<\/p>\n<p>73<br>00:11:00.870 &#8211;&gt; 00:11:01.420<br>Bill Sutton : C'est vrai.<\/p>\n<p>74<br>00:11:01.580 &#8211;&gt; 00:11:09.760<br>Todd Smith: In having to do things like recalculate interest rates or recalculating service charges, or recalculating transactions<\/p>\n<p>75<br>00:11:09.950 &#8211;&gt; 00:11:20.620<br>Todd Smith: that are between. I mean, those are those are some pretty considerable risks out there. And then we talk about. You know, those are 2 examples that would impact you as an individual.<\/p>\n<p>76<br>00:11:20.930 &#8211;&gt; 00:11:32.530<br>Todd Smith: And then we start talking about. Well, what about intellectual property? And what about, you know? State secrets and classified communications? Right? So there&#8217;s some. There&#8217;s some critical things there that are at risk.<\/p>\n<p>77<br>00:11:33.980 &#8211;&gt; 00:11:43.699<br>Bill Sutton: Exactly. Yep. And the next section here says, What should that? What should you do about it? And kind of covers the concept that this sounds like a future problem. But it isn&#8217;t.<\/p>\n<p>78<br>00:11:43.720 &#8211;&gt; 00:12:00.559<br>Bill Sutton: You really need to start planning for this now. And even there&#8217;s even a quote in here. Gartner claims proactive, proud, proactive planning to avoid the devastating and widespread Jose impact of quantum computers on asymmetric cryptography will reduce costs and improve operational efficiency.<\/p>\n<p>79<br>00:12:00.560 &#8211;&gt; 00:12:16.324<br>Bill Sutton: It says very clearly that only 5% of organizations have a roadmap for this. And I think it&#8217;s something that we really need to that that customers really need to start looking at and considering, and they talk about a little bit a little bit here about a timeline.<\/p>\n<p>80<br>00:12:16.960 &#8211;&gt; 00:12:19.650<br>Bill Sutton: you wanna walk through that real quick. One of you.<\/p>\n<p>81<br>00:12:20.190 &#8211;&gt; 00:12:28.230<br>Todd Smith: Yeah. So so I think the 1st thing we need to to look at before we get into the timeline is, you know, the chip manufacturers are already coming out<\/p>\n<p>82<br>00:12:29.370 &#8211;&gt; 00:12:29.970<br>Todd Smith: right.<\/p>\n<p>83<br>00:12:30.110 &#8211;&gt; 00:12:30.470<br>Bill Sutton : Oui.<\/p>\n<p>84<br>00:12:30.470 &#8211;&gt; 00:12:42.040<br>Todd Smith: They&#8217;ve already they were. They&#8217;re already coming out with, you know. At first, st at 1st you had chip sets that were that were designed to work in serial with each other right? So every single thread<\/p>\n<p>85<br>00:12:42.210 &#8211;&gt; 00:12:45.489<br>Todd Smith: could only follow that thread. And then you started getting<\/p>\n<p>86<br>00:12:45.660 &#8211;&gt; 00:12:54.589<br>Todd Smith: parallel processing where you had multiple threads that could be initiated right? So that increased the the capabilities of the chips of<\/p>\n<p>87<br>00:12:55.100 &#8211;&gt; 00:12:57.230<br>Todd Smith: capabilities of the processors.<\/p>\n<p>88<br>00:12:57.500 &#8211;&gt; 00:13:04.250<br>Todd Smith: Then you started getting this mesh capability, which is really what quantum quantum computing is.<\/p>\n<p>89<br>00:13:04.500 &#8211;&gt; 00:13:07.430<br>Todd Smith: It&#8217;s a 3 dimensional mesh structure of<\/p>\n<p>90<br>00:13:07.620 &#8211;&gt; 00:13:12.839<br>Todd Smith: I can have multiple layers, you know. Think of it as a 3D spreadsheet<\/p>\n<p>91<br>00:13:13.070 &#8211;&gt; 00:13:22.779<br>Todd Smith: of each one of those cells in that 3D spreadsheet is doing its own separate thing. Now, all of a sudden I&#8217;ve increased not only in area, but also in volume.<\/p>\n<p>92<br>00:13:23.490 &#8211;&gt; 00:13:28.409<br>Todd Smith: Right? So now, all of a sudden, I&#8217;ve got a lot more processing capabilities<\/p>\n<p>93<br>00:13:28.520 &#8211;&gt; 00:13:43.660<br>Todd Smith: in there which is needed for things like high end graphics for 3D. Modeling for financial services requires a lot of modeling type of interactions or modeling type of equations that they have to go through<\/p>\n<p>94<br>00:13:44.230 &#8211;&gt; 00:13:46.160<br>Todd Smith: a variety of different things. Right?<\/p>\n<p>95<br>00:13:47.750 &#8211;&gt; 00:13:54.590<br>Todd Smith: A lot of this is driving the driving the chip manufacturers to build quantum chips.<\/p>\n<p>96<br>00:13:55.320 &#8211;&gt; 00:14:13.519<br>Todd Smith: The piece of it that we need to understand is, well, how do we make sure that those chips are used for good and not for evil? So we&#8217;ll start talking about things like, well, what do we do to prepare ourselves for the impact that these new chipsets are coming out with? Right? So we start looking at the timeline associated with it.<\/p>\n<p>97<br>00:14:15.182 &#8211;&gt; 00:14:22.440<br>Todd Smith: So if we look at it, you know the time to start validation on what your quantum safe encryption<\/p>\n<p>98<br>00:14:23.180 &#8211;&gt; 00:14:27.259<br>Todd Smith: strategy is for non-production environments is probably now.<\/p>\n<p>99<br>00:14:27.798 &#8211;&gt; 00:14:34.530<br>Todd Smith: you need to understand and identify what your map, what your roadmap is going to be for an organization, right? So what are we gonna do<\/p>\n<p>100<br>00:14:34.720 &#8211;&gt; 00:14:36.810<br>Todd Smith: to start planning these things out.<\/p>\n<p>101<br>00:14:37.070 &#8211;&gt; 00:14:56.100<br>Todd Smith: And then we need to start looking at, you know, by the end of the year, start figure, start phasing out or doing a phase rollout of some of those external sites. Right? So this is preparation for the future, because some of the changes that are coming up, you know, and this is highlighting<\/p>\n<p>102<br>00:14:56.350 &#8211;&gt; 00:15:03.239<br>Todd Smith: in the article. By 2030 there&#8217;s going to be a deprecated classical encryption. So the the<\/p>\n<p>103<br>00:15:03.760 &#8211;&gt; 00:15:13.649<br>Todd Smith: 112 bit encryption has to be phased out right? That&#8217;s a that&#8217;s a decision that was made by NIST. This is their recommendations. Right?<\/p>\n<p>104<br>00:15:14.100 &#8211;&gt; 00:15:17.310<br>Todd Smith: And then by 2035, you have to have<\/p>\n<p>105<br>00:15:20.030 &#8211;&gt; 00:15:27.509<br>Todd Smith: those those old encryption standards need to be fully disallowed. And you need to have Pqc.<\/p>\n<p>106<br>00:15:28.070 &#8211;&gt; 00:15:35.419<br>Todd Smith: Fully implemented. Right? So post quantum crytography needs to be fully implemented. The benefit here is really understanding.<\/p>\n<p>107<br>00:15:35.930 &#8211;&gt; 00:15:37.919<br>Todd Smith: Number one. What do I need to do?<\/p>\n<p>108<br>00:15:38.400 &#8211;&gt; 00:15:40.039<br>Todd Smith: Number 2? How am I going to do it?<\/p>\n<p>109<br>00:15:40.340 &#8211;&gt; 00:15:49.970<br>Todd Smith: And the 3rd way is really start moving on getting it done right? So being able to turn around and say, You know what, we&#8217;ve got a fairly significant window<\/p>\n<p>110<br>00:15:50.360 &#8211;&gt; 00:15:51.520<br>Todd Smith: to follow.<\/p>\n<p>111<br>00:15:51.770 &#8211;&gt; 00:15:54.009<br>Todd Smith: But if you look at it, you know<\/p>\n<p>112<br>00:15:54.560 &#8211;&gt; 00:15:57.019<br>Todd Smith: 2035 is 10 years away.<\/p>\n<p>113<br>00:15:57.790 &#8211;&gt; 00:16:03.760<br>Todd Smith: you know there&#8217;s a lot of things that have to be done for that, working with<\/p>\n<p>114<br>00:16:03.910 &#8211;&gt; 00:16:15.449<br>Todd Smith: working with manufacturers and vendors like like Citrix and Netscalar, working with partners like Zintegra, working with your own compliance and risk management teams within your organization<\/p>\n<p>115<br>00:16:15.720 &#8211;&gt; 00:16:21.419<br>Todd Smith: to make sure that they&#8217;re aware of the impact of this and start figuring out<\/p>\n<p>116<br>00:16:22.170 &#8211;&gt; 00:16:25.029<br>Todd Smith: what we need to do and how how soon we need to do it.<\/p>\n<p>117<br>00:16:25.940 &#8211;&gt; 00:16:29.790<br>Todd Smith: And that can be done through identifying risks and identifying.<\/p>\n<p>118<br>00:16:30.040 &#8211;&gt; 00:16:34.199<br>Todd Smith: you know, doing doing that risk assessment early<\/p>\n<p>119<br>00:16:34.540 &#8211;&gt; 00:16:36.810<br>Todd Smith: to determine where the you know<\/p>\n<p>120<br>00:16:37.100 &#8211;&gt; 00:16:39.640<br>Todd Smith: what is the what is the prioritization for this.<\/p>\n<p>121<br>00:16:42.030 &#8211;&gt; 00:16:53.529<br>Bill Sutton: So how is citrix helping readiness to the new standards? It looks like from the article it talks about netscalers. Long term vision for this post. Quantum cryptography era.<\/p>\n<p>122<br>00:16:53.981 &#8211;&gt; 00:16:58.948<br>Bill Sutton: And there&#8217;s some some release. Milestones listed in here, and it looks like in April.<\/p>\n<p>123<br>00:16:59.760 &#8211;&gt; 00:17:04.359<br>Bill Sutton: the the net scanner platforms offering some some mistaligned<\/p>\n<p>124<br>00:17:04.700 &#8211;&gt; 00:17:10.915<br>Bill Sutton: cryptography algorithms. I guess I I don&#8217;t know what those weird characters are or weird<\/p>\n<p>125<br>00:17:11.589 &#8211;&gt; 00:17:17.460<br>Bill Sutton: acronyms are that are in the parentheses. But there&#8217;s a private tech preview, giving customers a head start at this point.<\/p>\n<p>126<br>00:17:17.730 &#8211;&gt; 00:17:18.170<br>Todd Smith: Correct.<\/p>\n<p>127<br>00:17:18.170 &#8211;&gt; 00:17:20.049<br>Bill Sutton: What else is Netscaler doing here?<\/p>\n<p>128<br>00:17:20.230 &#8211;&gt; 00:17:30.859<br>Todd Smith: Yeah. So so the Creek critical thing there is. We introduce that as a private tech preview. Back in April. We&#8217;re expected to go ga this month which is August.<\/p>\n<p>129<br>00:17:31.471 &#8211;&gt; 00:17:36.880<br>Todd Smith: That&#8217;ll be generalized, generally available right? And it&#8217;s gonna allow customers<\/p>\n<p>130<br>00:17:37.020 &#8211;&gt; 00:17:46.790<br>Todd Smith: to really deploy quantum resistance. Sorry quantum resistant encryption into their production environments on their netscalars.<\/p>\n<p>131<br>00:17:47.010 &#8211;&gt; 00:17:49.699<br>Todd Smith: The benefit here is going to be<\/p>\n<p>132<br>00:17:50.000 &#8211;&gt; 00:17:56.430<br>Todd Smith: start preventing people from getting access to these bad actors. Access to<\/p>\n<p>133<br>00:17:56.770 &#8211;&gt; 00:18:01.770<br>Todd Smith: some of that cryptography information that could be used in the future<\/p>\n<p>134<br>00:18:02.330 &#8211;&gt; 00:18:09.290<br>Todd Smith: and could impact business. You know your your company&#8217;s business in the in in the future, when those<\/p>\n<p>135<br>00:18:09.560 &#8211;&gt; 00:18:15.679<br>Todd Smith: when the ability to to decipher is, you know.<\/p>\n<p>136<br>00:18:16.550 &#8211;&gt; 00:18:26.219<br>Todd Smith: a reality as opposed to right now it&#8217;s right now. It costs too much to to kind of dig through that amount of data and decipher. Everything takes too long.<\/p>\n<p>137<br>00:18:26.440 &#8211;&gt; 00:18:29.400<br>Todd Smith: very expensive, very time consuming.<\/p>\n<p>138<br>00:18:30.352 &#8211;&gt; 00:18:34.337<br>Todd Smith: Once that capture. Once that curve starts getting a little bit more<\/p>\n<p>139<br>00:18:35.500 &#8211;&gt; 00:18:40.220<br>Todd Smith: little faster and a little bit more resilient. That&#8217;s gonna become an issue.<\/p>\n<p>140<br>00:18:40.970 &#8211;&gt; 00:18:45.979<br>Todd Smith: So preventing it. Now, you know, doing some prevention steps now is going to pay off in the future.<\/p>\n<p>141<br>00:18:45.980 &#8211;&gt; 00:18:46.640<br>Bill Sutton : Oui.<\/p>\n<p>142<br>00:18:47.050 &#8211;&gt; 00:19:02.859<br>Bill Sutton: I think it bears mentioning that that the article does reflect that Netscaler became the 1st ABC. Platform to offer the mistaligned cryptography in April that bears mentioning, and also but in practical terms.<\/p>\n<p>143<br>00:19:03.150 &#8211;&gt; 00:19:10.730<br>Bill Sutton: Todd in August or this month or later. Would this? Would it? Would it be<\/p>\n<p>144<br>00:19:10.830 &#8211;&gt; 00:19:40.389<br>Bill Sutton: understandable for a customer to deploy like a a net scaler that&#8217;s leveraging this encryption in front of their secure data. And then application servers would only be allowed through that net scaler to get to the secure data. Using that encryption method, you can still use the old encryption method to get to the app. But then, to get the data, you need to use the new one, so it makes it very difficult, if not impossible, probably impossible. If a doctor were to get that post, Pqc. Encrypted data, they would have a very difficult time getting at the core.<\/p>\n<p>145<br>00:19:40.970 &#8211;&gt; 00:19:44.929<br>Todd Smith: Yeah. And and I think the the critical thing there, Bill, is that you&#8217;ve got.<\/p>\n<p>146<br>00:19:45.400 &#8211;&gt; 00:19:50.739<br>Todd Smith: You&#8217;ve got Netscaler doing a function it was designed to do, which is an application level firewall.<\/p>\n<p>147<br>00:19:51.070 &#8211;&gt; 00:19:58.010<br>Todd Smith: right? And it&#8217;s being able to. Hey, we&#8217;re not just gonna block the traffic. We&#8217;re actually going to inspect the traffic as we&#8217;re going<\/p>\n<p>148<br>00:19:58.230 &#8211;&gt; 00:20:07.639<br>Todd Smith: and apply additional criteria, additional capabilities or additional controls and parameters onto that data to make sure that it doesn&#8217;t.<\/p>\n<p>149<br>00:20:08.530 &#8211;&gt; 00:20:10.310<br>Todd Smith: that it doesn&#8217;t pass through<\/p>\n<p>150<br>00:20:10.690 &#8211;&gt; 00:20:26.120<br>Todd Smith: the information, just because the source and destination matches up like a typical firewall. We&#8217;re actually looking inside the packets and seeing what&#8217;s what is the critical pieces of information that are going through that port to get out to the destination and blocking it where appropriate.<\/p>\n<p>151<br>00:20:29.700 &#8211;&gt; 00:20:42.869<br>Bill Sutton: So some additional elements in this article. It looks like these are certain security frameworks. I guess Fips is is referenced here regarding Department of Defense. Do you know much about this, Todd.<\/p>\n<p>152<br>00:20:42.870 &#8211;&gt; 00:20:58.760<br>Todd Smith: I happen to know a little bit more than the average bear about this. So yeah, so so earlier this year we had a team that focused really hard on getting our dod in. I&#8217;m sorry dote in Apl<\/p>\n<p>153<br>00:20:59.497 &#8211;&gt; 00:21:08.259<br>Todd Smith: certification for our netscalar. Specifically, our Fips appliances. This is basically, it&#8217;s an approved product list<\/p>\n<p>154<br>00:21:08.710 &#8211;&gt; 00:21:16.971<br>Todd Smith: that basically allows the Us department of defense and other other agencies that recognize Dod as a standard<\/p>\n<p>155<br>00:21:17.560 &#8211;&gt; 00:21:27.680<br>Todd Smith: to leverage. The Netscalar in both classify or highly secure environments.<\/p>\n<p>156<br>00:21:28.150 &#8211;&gt; 00:21:34.920<br>Todd Smith: and it was really a stamp of approval because it needed to be able to say, Hey, you know, this is. This is<\/p>\n<p>157<br>00:21:35.030 &#8211;&gt; 00:21:42.590<br>Todd Smith: complying with the Fip standards. It&#8217;s also giving us ability to get into to get that validation.<\/p>\n<p>158<br>00:21:44.500 &#8211;&gt; 00:21:48.420<br>Todd Smith: It was a lot of testing a lot of, you know, back and forth around.<\/p>\n<p>159<br>00:21:48.530 &#8211;&gt; 00:21:52.509<br>Todd Smith: you know, testing it, reviewing the results, retesting.<\/p>\n<p>160<br>00:21:52.780 &#8211;&gt; 00:22:01.794<br>Todd Smith: reviewing the results. And it wasn&#8217;t just. It wasn&#8217;t just Citrix and Dod. There were other agencies that were involved in other 3rd parties.<\/p>\n<p>161<br>00:22:02.660 &#8211;&gt; 00:22:08.410<br>Todd Smith: to get engaged in that in that testing and certification process.<\/p>\n<p>162<br>00:22:09.700 &#8211;&gt; 00:22:18.529<br>Todd Smith: couple of other things besides, just the the Apl certification is, you know, supporting Http 3<\/p>\n<p>163<br>00:22:19.410 &#8211;&gt; 00:22:21.718<br>Todd Smith: that was critical as well.<\/p>\n<p>164<br>00:22:22.320 &#8211;&gt; 00:22:26.409<br>Todd Smith: once again, anytime you get further and further down into the protocol. Stack<\/p>\n<p>165<br>00:22:26.560 &#8211;&gt; 00:22:30.570<br>Todd Smith: tends to be the more secure and the more optimized that traffic is.<\/p>\n<p>166<br>00:22:31.133 &#8211;&gt; 00:22:37.430<br>Todd Smith: So there&#8217;s some. There&#8217;s some changes there, as well as you know, one of the biggest<\/p>\n<p>167<br>00:22:37.900 &#8211;&gt; 00:22:40.790<br>Todd Smith: changes as well is the way we handle Dns security.<\/p>\n<p>168<br>00:22:41.080 &#8211;&gt; 00:22:41.710<br>Bill Sutton : Oui.<\/p>\n<p>169<br>00:22:41.710 &#8211;&gt; 00:22:45.439<br>Todd Smith: So you know, the the challenge with Dns<\/p>\n<p>170<br>00:22:45.550 &#8211;&gt; 00:22:51.660<br>Todd Smith: is it&#8217;s a very open standard, right? So Dns was one of the original open source projects right.<\/p>\n<p>171<br>00:22:51.660 &#8211;&gt; 00:22:51.990<br>Bill Sutton : Oui.<\/p>\n<p>172<br>00:22:51.990 &#8211;&gt; 00:22:59.720<br>Todd Smith: How do we figure out what the correct name and addresses are? Because humans think in names, computers think in numbers.<\/p>\n<p>173<br>00:23:00.920 &#8211;&gt; 00:23:08.770<br>Todd Smith: And when you go and say I need to go to www.citrix.com. There&#8217;s a series of IP addresses associated with that.<\/p>\n<p>174<br>00:23:09.000 &#8211;&gt; 00:23:16.109<br>Todd Smith: We don&#8217;t need to know that that URL is associated with<\/p>\n<p>175<br>00:23:16.410 &#8211;&gt; 00:23:23.769<br>Todd Smith: a dozen or so different IP addresses and know the routing for there. So domain name services, Dns basically<\/p>\n<p>176<br>00:23:24.140 &#8211;&gt; 00:23:27.029<br>Todd Smith: had to be created to allow<\/p>\n<p>177<br>00:23:28.000 &#8211;&gt; 00:23:31.770<br>Todd Smith: the Internet, the the inner networking to occur<\/p>\n<p>178<br>00:23:32.240 &#8211;&gt; 00:23:35.940<br>Todd Smith: and be understandable. For you know, us humans.<\/p>\n<p>179<br>00:23:37.900 &#8211;&gt; 00:23:38.400<br>Andy Whiteside : Oui.<\/p>\n<p>180<br>00:23:38.400 &#8211;&gt; 00:23:40.080<br>Bill Sutton: And go ahead, dandy.<\/p>\n<p>181<br>00:23:40.080 &#8211;&gt; 00:23:46.849<br>Andy Whiteside: Well, I was gonna I want to go back to the previous one. Http, 3 over quick. QUIC. Is that how you say it. Quick.<\/p>\n<p>182<br>00:23:46.850 &#8211;&gt; 00:23:47.410<br>Todd Smith: Yep.<\/p>\n<p>183<br>00:23:47.410 &#8211;&gt; 00:23:59.030<br>Andy Whiteside: Yep, I I had never even heard of that until last week. And now I understand it&#8217;s basically, when you take Tcp and flip it, I think, to Udp, and it&#8217;s a something Google invented to make those.<\/p>\n<p>184<br>00:23:59.260 &#8211;&gt; 00:24:06.929<br>Andy Whiteside: you know, Tcp connections that don&#8217;t really need to have all the packet loss monitored and captured. Work more efficiently.<\/p>\n<p>185<br>00:24:08.400 &#8211;&gt; 00:24:09.009<br>Todd Smith: And this is where.<\/p>\n<p>186<br>00:24:09.010 &#8211;&gt; 00:24:11.349<br>Andy Whiteside: Pretty much where everything&#8217;s gonna go is what I understand.<\/p>\n<p>187<br>00:24:11.510 &#8211;&gt; 00:24:18.264<br>Todd Smith: Yeah. And Andy, this goes back to the Tcp versus Udp, right com conversation, you know.<\/p>\n<p>188<br>00:24:19.580 &#8211;&gt; 00:24:27.750<br>Todd Smith: Udp being kind of connectionless where you don&#8217;t need to receive an acknowledgement, but yet Tcp. Requires an acknowledgement on every single packet<\/p>\n<p>189<br>00:24:27.960 &#8211;&gt; 00:24:28.870<br>Todd Smith: which creates.<\/p>\n<p>190<br>00:24:28.870 &#8211;&gt; 00:24:29.390<br>Andy Whiteside: In order.<\/p>\n<p>191<br>00:24:29.390 &#8211;&gt; 00:24:30.130<br>Todd Smith: Bonus.<\/p>\n<p>192<br>00:24:30.440 &#8211;&gt; 00:24:31.280<br>Andy Whiteside: In order.<\/p>\n<p>193<br>00:24:32.540 &#8211;&gt; 00:24:33.020<br>Todd Smith: Oh!<\/p>\n<p>194<br>00:24:33.020 &#8211;&gt; 00:24:33.490<br>Andy Whiteside: All the pack.<\/p>\n<p>195<br>00:24:33.490 &#8211;&gt; 00:24:33.940<br>Todd Smith : Oui.<\/p>\n<p>196<br>00:24:33.940 &#8211;&gt; 00:24:37.100<br>Andy Whiteside: So you you have no choice other than to wait.<\/p>\n<p>197<br>00:24:37.340 &#8211;&gt; 00:24:37.880<br>Todd Smith: Yep.<\/p>\n<p>198<br>00:24:40.370 &#8211;&gt; 00:24:54.030<br>Bill Sutton: Yeah, it looks like quick is a a relatively new protocol. Leverages Udp versus Tcp, based on clicking through the the link in the article very interesting. I&#8217;d never heard of this before until today, either.<\/p>\n<p>199<br>00:24:56.190 &#8211;&gt; 00:25:20.560<br>Bill Sutton: Alright. So a couple of other things in the in the article apparently there&#8217;s a new instance. Level security dashboard. In the netscaler console Todd. Why don&#8217;t you talk a little bit about the Netscaler console that&#8217;s come up in a couple of situations with our customers recently where they had Abm. And they didn&#8217;t know what that scalar console was. They didn&#8217;t realize they were. It&#8217;s available in the cloud. Talk a little bit about Netscalar, console.<\/p>\n<p>200<br>00:25:21.130 &#8211;&gt; 00:25:24.570<br>Todd Smith: Yeah. So yeah, so netscale console is an interesting<\/p>\n<p>201<br>00:25:25.000 &#8211;&gt; 00:25:29.019<br>Todd Smith: product. It&#8217;s been around for a while. We&#8217;ve had different names for it.<\/p>\n<p>202<br>00:25:29.020 &#8211;&gt; 00:25:29.610<br>Bill Sutton : C'est vrai.<\/p>\n<p>203<br>00:25:29.780 &#8211;&gt; 00:25:30.710<br>Todd Smith: So.<\/p>\n<p>204<br>00:25:31.070 &#8211;&gt; 00:25:37.030<br>Todd Smith: you know, if you remember, back in the day we had Nmas NMAS. Which was a<\/p>\n<p>205<br>00:25:37.160 &#8211;&gt; 00:25:39.090<br>Todd Smith: management.<\/p>\n<p>206<br>00:25:39.320 &#8211;&gt; 00:25:45.590<br>Todd Smith: an administration console right that would sit in front of the that would sit in front of your fleet of net scalers.<\/p>\n<p>207<br>00:25:46.080 &#8211;&gt; 00:25:51.750<br>Todd Smith: By the way, a fleet can be anywhere from 2 to 2, 2,000, or even more.<\/p>\n<p>208<br>00:25:53.420 &#8211;&gt; 00:26:04.770<br>Todd Smith: We always refer to it as if you had more than one net scaler that you needed to keep in sync with each other as far as configurations. You want to do it from a single console or or a single config file that you could push out to all of them.<\/p>\n<p>209<br>00:26:06.270 &#8211;&gt; 00:26:13.960<br>Todd Smith: so n mass was the 1st piece of it. Then we then we rebranded it called adm, which was application, delivery management<\/p>\n<p>210<br>00:26:14.130 &#8211;&gt; 00:26:18.949<br>Todd Smith: piece of it, which was very similar to what Nmask could do<\/p>\n<p>211<br>00:26:19.140 &#8211;&gt; 00:26:27.680<br>Todd Smith: and think of it as I&#8217;ve got a management console that I can control all of my Netscalars, and all of the components of the Netscalar<\/p>\n<p>212<br>00:26:28.020 &#8211;&gt; 00:26:33.299<br>Todd Smith: in there. The most recent iteration of it is called netscaler console.<\/p>\n<p>213<br>00:26:33.840 &#8211;&gt; 00:26:39.889<br>Todd Smith: The critical thing is is that Netscaler, Adm and Nmass used to be a separate license<\/p>\n<p>214<br>00:26:40.040 &#8211;&gt; 00:26:46.759<br>Todd Smith: right? And it was limited as to how many Netscalers you could control, or how many instances of Netscalars you could control.<\/p>\n<p>215<br>00:26:47.430 &#8211;&gt; 00:27:03.179<br>Todd Smith: We have changed that with netscaler console to include all of your netscalers, regardless of what version they&#8217;re on, whether they&#8217;re a virtual appliance. So a Vpx, whether it&#8217;s a physical appliance being an Mpx or Sdx, or even if it&#8217;s a containerized version of a Netscalar.<\/p>\n<p>216<br>00:27:03.600 &#8211;&gt; 00:27:06.550<br>Todd Smith: all those can be managed within the netscaler console.<\/p>\n<p>217<br>00:27:07.210 &#8211;&gt; 00:27:11.400<br>Todd Smith: What we have added into Netscalar console is<\/p>\n<p>218<br>00:27:11.880 &#8211;&gt; 00:27:20.480<br>Todd Smith: not only the ability to control and manage the configurations, but also get notifications. When things like certificates are expiring.<\/p>\n<p>219<br>00:27:20.480 &#8211;&gt; 00:27:21.120<br>Bill Sutton : C'est vrai.<\/p>\n<p>220<br>00:27:21.810 &#8211;&gt; 00:27:32.529<br>Todd Smith: Or when there&#8217;s been Cve notifications that are applicable to your net scalers. Or if there&#8217;s any other type of notifications that need to be updated<\/p>\n<p>221<br>00:27:32.670 &#8211;&gt; 00:27:39.910<br>Todd Smith: as part of the netscalar console and the Netscaler console can also be run as a service. So it doesn&#8217;t need to be consuming<\/p>\n<p>222<br>00:27:40.150 &#8211;&gt; 00:27:46.430<br>Todd Smith: servers in your environment. Actually, it can actually be connected to the Internet and have a management console<\/p>\n<p>223<br>00:27:46.600 &#8211;&gt; 00:27:48.679<br>Todd Smith: as a cloud-based service<\/p>\n<p>224<br>00:27:49.130 &#8211;&gt; 00:28:05.100<br>Todd Smith: right? Depending on which customers we&#8217;re talking to. Some of them are all in for for having management consoles in the cloud, and other ones are saying, Hey, we need to. We need to hold off on doing that right now. But it really gives you the ability<\/p>\n<p>225<br>00:28:05.930 &#8211;&gt; 00:28:08.460<br>Todd Smith: to manage your fleet of net scalers<\/p>\n<p>226<br>00:28:09.480 &#8211;&gt; 00:28:12.360<br>Todd Smith: across the entire organization. It&#8217;s got<\/p>\n<p>227<br>00:28:12.590 &#8211;&gt; 00:28:27.830<br>Todd Smith: all the security tools built into it from an authentication perspective, from a administrative authentications, perspective as well as being able to do things like scheduling, downtime, scheduling, automatic updates doing all of those management tasks<\/p>\n<p>228<br>00:28:28.150 &#8211;&gt; 00:28:30.369<br>Todd Smith: that used to be manually driven<\/p>\n<p>229<br>00:28:30.480 &#8211;&gt; 00:28:33.289<br>Todd Smith: can now be automated and optimized.<\/p>\n<p>230<br>00:28:36.720 &#8211;&gt; 00:29:05.050<br>Bill Sutton: Yep, and and what this makes the point is that it like you just said it. Gives it makes it easier. The Security Advisory dashboard to track vulnerabilities and prioritize updates and stay in compliance across the net scalar fleet. That&#8217;s important takeaway, I think. Here the last item in the list is our our E capture. V. 3. Support. So this is really around bot detection. Probably. You know, bad actors trying to to<\/p>\n<p>231<br>00:29:05.180 &#8211;&gt; 00:29:08.329<br>Bill Sutton: brute force websites, or what have you right, Todd?<\/p>\n<p>232<br>00:29:08.580 &#8211;&gt; 00:29:19.459<br>Todd Smith: Yeah. And and I think this is, this is kind of where we&#8217;re catching up to a lot of other systems that are out there that used to be a 3rd party system that you&#8217;d have to bolt on<\/p>\n<p>233<br>00:29:20.370 &#8211;&gt; 00:29:23.880<br>Todd Smith: to do advanced authentication, or or<\/p>\n<p>234<br>00:29:25.480 &#8211;&gt; 00:29:31.040<br>Todd Smith: I like the way they put it low friction, authentication, or low friction.<\/p>\n<p>235<br>00:29:31.290 &#8211;&gt; 00:29:38.370<br>Todd Smith: additional authentication. Right? So we&#8217;ve all we&#8217;ve all been to those sites where it says, Hey, how many fire hydrants do you see in the.<\/p>\n<p>236<br>00:29:38.370 &#8211;&gt; 00:29:39.741<br>Bill Sutton: No, I have one of those.<\/p>\n<p>237<br>00:29:39.970 &#8211;&gt; 00:29:50.060<br>Todd Smith: Which ones that&#8217;s an example of what recaptcha does right. A bot is not going to be able to go and tell you that a, it&#8217;s to really identify.<\/p>\n<p>238<br>00:29:50.250 &#8211;&gt; 00:29:55.969<br>Todd Smith: Is there really a human interacting with my system? And sometimes it&#8217;s not looking at<\/p>\n<p>239<br>00:29:56.240 &#8211;&gt; 00:30:10.919<br>Todd Smith: the fact that it&#8217;s picked. The, you know, the 3 fire hydrants out of the 9 options, the 9 photos. It&#8217;s actually detecting that the mouse is actually moving and that the the mouse is not. You know it&#8217;s not an auto select button.<\/p>\n<p>240<br>00:30:10.920 &#8211;&gt; 00:30:11.480<br>Bill Sutton : C'est vrai.<\/p>\n<p>241<br>00:30:11.480 &#8211;&gt; 00:30:24.219<br>Todd Smith: There&#8217;s a variety of different tools and techniques of doing that. But it&#8217;s now part of a lot of the customers, multi-factor authentication workflows. And now Netscaler supports that capability as well.<\/p>\n<p>242<br>00:30:25.900 &#8211;&gt; 00:30:26.660<br>Bill Sutton : Oui.<\/p>\n<p>243<br>00:30:27.270 &#8211;&gt; 00:30:44.269<br>Bill Sutton: so we&#8217;re at the end of the article. And you know it&#8217;s really kind of summarizes things here regarding Netscalar&#8217;s commitment. And that Citrix&#8217;s commitment to security innovation, and bringing things like this to the forefront and taking them and and moving them forward and and investing in<\/p>\n<p>244<br>00:30:44.380 &#8211;&gt; 00:30:48.560<br>Bill Sutton: better securing the environment and for customers now, and in the future right, Todd.<\/p>\n<p>245<br>00:30:48.740 &#8211;&gt; 00:30:56.910<br>Todd Smith: Yeah, absolutely. And this is this is once again, you know, commitments that we made several years ago to becoming much more security focused.<\/p>\n<p>246<br>00:30:56.910 &#8211;&gt; 00:30:57.390<br>Bill Sutton : C'est vrai.<\/p>\n<p>247<br>00:30:57.390 &#8211;&gt; 00:31:02.289<br>Todd Smith: And I&#8217;m sure you know, you guys remember the old security by design<\/p>\n<p>248<br>00:31:02.470 &#8211;&gt; 00:31:08.729<br>Todd Smith: slide that was in all of our presentations that really didn&#8217;t get into the depth of how we&#8217;re actually doing it.<\/p>\n<p>249<br>00:31:08.900 &#8211;&gt; 00:31:11.920<br>Bill Sutton: Now we&#8217;re starting to explain to customers.<\/p>\n<p>250<br>00:31:12.080 &#8211;&gt; 00:31:16.270<br>Todd Smith: And partners, and, you know, end users in some cases<\/p>\n<p>251<br>00:31:16.970 &#8211;&gt; 00:31:28.379<br>Todd Smith: what exactly we&#8217;re doing around security right? And how we&#8217;re not only leveraging industry standards, but in some cases kind of expanding our own<\/p>\n<p>252<br>00:31:28.760 &#8211;&gt; 00:31:34.599<br>Todd Smith: standards to become industry standards. Right? So there&#8217;s a lot of things that we&#8217;re doing.<\/p>\n<p>253<br>00:31:34.700 &#8211;&gt; 00:31:48.639<br>Todd Smith: specifically leveraging our experience doing it, web app firewalls or application, firewalling the ability to actually optimize and and manage the individual packets of information in that flow.<\/p>\n<p>254<br>00:31:49.093 &#8211;&gt; 00:31:55.770<br>Todd Smith: And then being able to to leverage not only the hardware, but also the software associated with our net scalers.<\/p>\n<p>255<br>00:31:56.370 &#8211;&gt; 00:31:56.990<br>Bill Sutton : C'est vrai.<\/p>\n<p>256<br>00:31:58.240 &#8211;&gt; 00:32:10.499<br>Bill Sutton: Good stuff. So there is. I want to point out at the very end of the article there&#8217;s reference to a multi-part blog series on the community site. And we talked about this a couple of weeks ago on the blog. I&#8217;m sorry on the podcast<\/p>\n<p>257<br>00:32:10.580 &#8211;&gt; 00:32:17.400<br>Bill Sutton: about how we&#8217;ll probably start leveraging the community tech blog sites for some additional content.<\/p>\n<p>258<br>00:32:17.699 &#8211;&gt; 00:32:43.049<br>Bill Sutton: And there&#8217;s a couple of articles out there that kind of add to this, and from a technical perspective that explain some of the things we talked about in a in a lot more detail. So I would say, if our listeners are interested in that we, we very well could do another blog another podcast on one of these or both of these. But if you&#8217;re interested in more information you can reach out to one of us, or or go to the blog series. Any final thoughts? Andy Todd.<\/p>\n<p>259<br>00:32:44.310 &#8211;&gt; 00:32:46.889<br>Andy Whiteside: Yeah, I&#8217;m just excited to see that this<\/p>\n<p>260<br>00:32:47.770 &#8211;&gt; 00:32:53.179<br>Andy Whiteside: application delivery controller, app firewall thing that&#8217;s, you know.<\/p>\n<p>261<br>00:32:53.610 &#8211;&gt; 00:32:58.620<br>Andy Whiteside: been around for I don&#8217;t know. 15 years now is just continue to evolve, to.<\/p>\n<p>262<br>00:32:58.620 &#8211;&gt; 00:32:59.120<br>Bill Sutton : Oui.<\/p>\n<p>263<br>00:32:59.120 &#8211;&gt; 00:33:15.679<br>Andy Whiteside: To put us in a position where what it&#8217;s always done, which is, prepare you and and protect you in scenarios where you may not protect yourself through code? Or what have you just becomes more and more applicable as systems around us get smarter.<\/p>\n<p>264<br>00:33:18.280 &#8211;&gt; 00:33:22.740<br>Todd Smith: Yeah. And I think a critical thing on here as well is.<\/p>\n<p>265<br>00:33:23.340 &#8211;&gt; 00:33:25.729<br>Todd Smith: You&#8217;ve probably seen over the past<\/p>\n<p>266<br>00:33:26.070 &#8211;&gt; 00:33:32.359<br>Todd Smith: 6 to 12 months a lot more interaction with customers from a<\/p>\n<p>267<br>00:33:33.390 &#8211;&gt; 00:33:46.475<br>Todd Smith: from an information sharing perspective. Right? So being able to, you know, up leveling our blogs, increasing our overall text zone messaging right? So we&#8217;ve talked about this on a couple of other podcasts.<\/p>\n<p>268<br>00:33:47.340 &#8211;&gt; 00:33:49.180<br>Todd Smith: around citrix tech zone.<\/p>\n<p>269<br>00:33:49.330 &#8211;&gt; 00:34:00.370<br>Todd Smith: which is really the technically focused site that has a lot more detail than just the blogs. Right? This is a community site.<\/p>\n<p>270<br>00:34:00.772 &#8211;&gt; 00:34:19.400<br>Todd Smith: And it&#8217;s really driven around. You know the technical content. That&#8217;s where you go. Get your Poc guides and your evaluation guides and things like that as well as it&#8217;s a really great place where other contributors put information as well to go deeper into the products and the services.<\/p>\n<p>271<br>00:34:19.889 &#8211;&gt; 00:34:27.689<br>Todd Smith: But Bill mentioned at the beginning of the the session here that there was a webinar last week, and I&#8217;ll<\/p>\n<p>272<br>00:34:27.820 &#8211;&gt; 00:34:32.560<br>Todd Smith: there&#8217;s a there&#8217;s a webinar series now called What&#8217;s new, what&#8217;s next?<\/p>\n<p>273<br>00:34:33.090 &#8211;&gt; 00:34:38.659<br>Todd Smith: And that is typically presented by either our<\/p>\n<p>274<br>00:34:38.800 &#8211;&gt; 00:34:42.590<br>Todd Smith: Svp of global services. So customer success.<\/p>\n<p>275<br>00:34:42.830 &#8211;&gt; 00:34:56.619<br>Todd Smith: or one of our Ctos tends to drive that. And we&#8217;ve had Ryan Mcclure, who&#8217;s our senior Vp. Of customer success. And we&#8217;ve also had Bill Gray, who&#8217;s our one of our field Ctos<\/p>\n<p>276<br>00:34:56.940 &#8211;&gt; 00:35:00.820<br>Todd Smith: kind of lead the discussions on these what&#8217;s new? What&#8217;s next?<\/p>\n<p>277<br>00:35:01.310 &#8211;&gt; 00:35:10.640<br>Todd Smith: They&#8217;re scheduled to be a regularly, you know. There&#8217;s going to be a regular cadence of those, I think right now they&#8217;re quarterly. Probably there&#8217;s enough changing that could<\/p>\n<p>278<br>00:35:10.870 &#8211;&gt; 00:35:14.647<br>Todd Smith: that could require them to be more frequent.<\/p>\n<p>279<br>00:35:15.540 &#8211;&gt; 00:35:37.290<br>Todd Smith: certainly, because the information is coming out at a much faster pace. But there&#8217;s also a lot of innovation that&#8217;s happening very quickly. So definitely take advantage of paying attention to those. What&#8217;s new? What&#8217;s next? Webinars? And then there&#8217;s also a series of sorry there&#8217;s a series of Citrix connect events which are<\/p>\n<p>280<br>00:35:37.782 &#8211;&gt; 00:35:53.480<br>Todd Smith: it&#8217;s pretty much spread out across the globe. They are more customer facing customer interacting. There&#8217;s actually a citrix connect event coming up in Washington, DC. In September. There&#8217;s still space available for that as well. So I will<\/p>\n<p>281<br>00:35:53.620 &#8211;&gt; 00:36:08.398<br>Todd Smith: make sure we talk about that. And then, finally, you know, we&#8217;ve also got great partners like Centegra, who do not only not only podcasts like this, but we also work with them on doing live events and things like that. So<\/p>\n<p>282<br>00:36:08.900 &#8211;&gt; 00:36:14.508<br>Todd Smith: definitely, you know, leverage this, this is a day when everyone, this is a time of<\/p>\n<p>283<br>00:36:14.910 &#8211;&gt; 00:36:20.459<br>Todd Smith: time of the industry where a lot of people need to to kind of get up to speed quickly.<\/p>\n<p>284<br>00:36:20.690 &#8211;&gt; 00:36:25.170<br>Todd Smith: and some of these events and activities are certainly helpful for that.<\/p>\n<p>285<br>00:36:26.610 &#8211;&gt; 00:36:27.810<br>Bill Sutton: Yep, absolutely.<\/p>\n<p>286<br>00:36:27.980 &#8211;&gt; 00:36:28.400<br>Todd Smith: Yep.<\/p>\n<p>287<br>00:36:28.400 &#8211;&gt; 00:36:30.720<br>Bill Sutton: All right. Guys anything else.<\/p>\n<p>288<br>00:36:33.190 &#8211;&gt; 00:36:38.139<br>Andy Whiteside: No Bill, all right, I guess, just to piggyback on Todd&#8217;s comments. It&#8217;s it&#8217;s good to see<\/p>\n<p>289<br>00:36:38.750 &#8211;&gt; 00:36:45.379<br>Andy Whiteside: New Citrix getting to be more like old, old Citrix, in terms of community and knowledge, share.<\/p>\n<p>290<br>00:36:45.840 &#8211;&gt; 00:36:47.280<br>Bill Sutton : Oui, bien s\u00fbr.<\/p>\n<p>291<br>00:36:48.490 &#8211;&gt; 00:36:50.580<br>Bill Sutton: All right, we&#8217;ll see you all next week.<\/p>\n<p>292<br>00:36:50.580 &#8211;&gt; 00:36:52.170<br>Andy Whiteside: Todd, when&#8217;s synergy coming back?<\/p>\n<p>293<br>00:36:52.350 &#8211;&gt; 00:36:53.680<br>Bill Sutton: There you go. That&#8217;s okay.<\/p>\n<p>294<br>00:36:53.680 &#8211;&gt; 00:36:57.254<br>Todd Smith: Oh, it&#8217;s it&#8217;s coming back in<\/p>\n<p>295<br>00:36:58.880 &#8211;&gt; 00:37:04.299<br>Todd Smith: in our, in our thoughts and prayers around. And it&#8217;s being rejuvenated under a citrix connect.<\/p>\n<p>296<br>00:37:04.300 &#8211;&gt; 00:37:10.209<br>Andy Whiteside: That&#8217;s fine. Yeah, that&#8217;s that&#8217;s the answer. And and truthfully, it does make it more accessible and reachable for more people.<\/p>\n<p>297<br>00:37:10.510 &#8211;&gt; 00:37:17.209<br>Todd Smith: Yep, yep, and I&#8217;ll be the I&#8217;ll be the actual host of Citrix connect in DC. So.<\/p>\n<p>298<br>00:37:17.210 &#8211;&gt; 00:37:20.130<br>Bill Sutton: Oh, you will. I&#8217;m planning to be there, so I&#8217;ll see you then.<\/p>\n<p>299<br>00:37:21.550 &#8211;&gt; 00:37:24.240<br>Bill Sutton: All right, thank you, guys. We&#8217;ll do it again next week.<\/p>\n<p>300<br>00:37:24.480 &#8211;&gt; 00:37:25.290<br>Todd Smith: Alright. Thank you.<\/p>\n<p>301<br>00:37:25.290 &#8211;&gt; 00:37:29.850<br>Bill Sutton: Good morning, Andy. It&#8217;s been a while since you&#8217;ve been on. So appreciate you joining today.<\/p>\n<p>302<br>00:37:30.280 &#8211;&gt; 00:37:36.100<br>Andy Whiteside: Not a problem, love. I&#8217;d rather be doing that than what I am doing. But must get the other stuff done.<\/p>\n<p>303<br>00:37:36.100 &#8211;&gt; 00:37:37.790<br>Bill Sutton: Yeah. Got it? Alright, thanks. Guys.<\/p>\n<p>304<br>00:37:37.790 &#8211;&gt; 00:37:38.360<br>Andy Whiteside: Guys.<\/p>\n<p>305<br>00:37:38.360 &#8211;&gt; 00:37:38.950<br>Bill Sutton : Au revoir.<\/p>\n<p>&nbsp;<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>Quantum-Ready Security with Citrix NetScaler: Protecting Data Today and Tomorrow&nbsp; In today\u2019s rapidly evolving tech landscape, cybersecurity isn\u2019t just about defending against current threats\u2014it\u2019s about anticipating the ones that haven\u2019t &hellip;<\/p>","protected":false},"author":7,"featured_media":65995,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_price":"","_stock":"","_tribe_ticket_header":"","_tribe_default_ticket_provider":"","_tribe_ticket_capacity":"0","_ticket_start_date":"","_ticket_end_date":"","_tribe_ticket_show_description":"","_tribe_ticket_show_not_going":false,"_tribe_ticket_use_global_stock":"","_tribe_ticket_global_stock_level":"","_global_stock_mode":"","_global_stock_cap":"","_tribe_rsvp_for_event":"","_tribe_ticket_going_count":"","_tribe_ticket_not_going_count":"","_tribe_tickets_list":"[]","_tribe_ticket_has_attendee_info_fields":false,"footnotes":""},"categories":[5],"tags":[],"class_list":["post-718692","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-podcast"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Quantum-Ready Security with Citrix NetScaler: Protecting Data<\/title>\n<meta name=\"description\" content=\"Explore how Citrix NetScaler delivers quantum-ready security, protecting critical data today while preparing for tomorrow\u2019s cyber threats.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/xentegra.com\/fr\/resources\/185-quantum-ready-security-with-citrix-netscaler-protecting-data-today-and-tomorrow\/\" \/>\n<meta property=\"og:locale\" content=\"fr_CA\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Quantum-Ready Security with Citrix NetScaler: Protecting Data\" \/>\n<meta property=\"og:description\" content=\"Explore how Citrix NetScaler delivers quantum-ready security, protecting critical data today while preparing for tomorrow\u2019s cyber threats.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/xentegra.com\/fr\/resources\/185-quantum-ready-security-with-citrix-netscaler-protecting-data-today-and-tomorrow\/\" \/>\n<meta property=\"og:site_name\" content=\"XenTegra\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/XenTegra\/\" \/>\n<meta property=\"article:published_time\" content=\"2025-08-12T19:55:19+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-09-14T23:56:10+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/eadn-wc05-13529174.nxedge.io\/wp-content\/uploads\/2024\/03\/Citrix-Session.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1100\" \/>\n\t<meta property=\"og:image:height\" content=\"600\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Chase Newmyer\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@xentegra\" \/>\n<meta name=\"twitter:site\" content=\"@xentegra\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"Chase Newmyer\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimation du temps de lecture\" \/>\n\t<meta name=\"twitter:data2\" content=\"37 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/xentegra.com\\\/resources\\\/185-quantum-ready-security-with-citrix-netscaler-protecting-data-today-and-tomorrow\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/xentegra.com\\\/resources\\\/185-quantum-ready-security-with-citrix-netscaler-protecting-data-today-and-tomorrow\\\/\"},\"author\":{\"name\":\"Chase Newmyer\",\"@id\":\"https:\\\/\\\/xentegra.com\\\/#\\\/schema\\\/person\\\/84736408f096bfd92b80305aea8846a7\"},\"headline\":\"185: Quantum-Ready Security with Citrix NetScaler: Protecting Data Today and Tomorrow\",\"datePublished\":\"2025-08-12T19:55:19+00:00\",\"dateModified\":\"2025-09-14T23:56:10+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/xentegra.com\\\/resources\\\/185-quantum-ready-security-with-citrix-netscaler-protecting-data-today-and-tomorrow\\\/\"},\"wordCount\":8153,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/xentegra.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/xentegra.com\\\/resources\\\/185-quantum-ready-security-with-citrix-netscaler-protecting-data-today-and-tomorrow\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/xentegra.com\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/Citrix-Session.png\",\"articleSection\":[\"Podcast\"],\"inLanguage\":\"fr-CA\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/xentegra.com\\\/resources\\\/185-quantum-ready-security-with-citrix-netscaler-protecting-data-today-and-tomorrow\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/xentegra.com\\\/resources\\\/185-quantum-ready-security-with-citrix-netscaler-protecting-data-today-and-tomorrow\\\/\",\"url\":\"https:\\\/\\\/xentegra.com\\\/resources\\\/185-quantum-ready-security-with-citrix-netscaler-protecting-data-today-and-tomorrow\\\/\",\"name\":\"Quantum-Ready Security with Citrix NetScaler: Protecting Data\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/xentegra.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/xentegra.com\\\/resources\\\/185-quantum-ready-security-with-citrix-netscaler-protecting-data-today-and-tomorrow\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/xentegra.com\\\/resources\\\/185-quantum-ready-security-with-citrix-netscaler-protecting-data-today-and-tomorrow\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/xentegra.com\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/Citrix-Session.png\",\"datePublished\":\"2025-08-12T19:55:19+00:00\",\"dateModified\":\"2025-09-14T23:56:10+00:00\",\"description\":\"Explore how Citrix NetScaler delivers quantum-ready security, protecting critical data today while preparing for tomorrow\u2019s cyber threats.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/xentegra.com\\\/resources\\\/185-quantum-ready-security-with-citrix-netscaler-protecting-data-today-and-tomorrow\\\/#breadcrumb\"},\"inLanguage\":\"fr-CA\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/xentegra.com\\\/resources\\\/185-quantum-ready-security-with-citrix-netscaler-protecting-data-today-and-tomorrow\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-CA\",\"@id\":\"https:\\\/\\\/xentegra.com\\\/resources\\\/185-quantum-ready-security-with-citrix-netscaler-protecting-data-today-and-tomorrow\\\/#primaryimage\",\"url\":\"https:\\\/\\\/xentegra.com\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/Citrix-Session.png\",\"contentUrl\":\"https:\\\/\\\/xentegra.com\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/Citrix-Session.png\",\"width\":1100,\"height\":600},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/xentegra.com\\\/resources\\\/185-quantum-ready-security-with-citrix-netscaler-protecting-data-today-and-tomorrow\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/xentegra.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"185: Quantum-Ready Security with Citrix NetScaler: Protecting Data Today and Tomorrow\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/xentegra.com\\\/#website\",\"url\":\"https:\\\/\\\/xentegra.com\\\/\",\"name\":\"XenTegra\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/xentegra.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/xentegra.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-CA\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/xentegra.com\\\/#organization\",\"name\":\"XenTegra\",\"url\":\"https:\\\/\\\/xentegra.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-CA\",\"@id\":\"https:\\\/\\\/xentegra.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/xentegra.com\\\/wp-content\\\/uploads\\\/2023\\\/06\\\/1519903807641-min.jpg\",\"contentUrl\":\"https:\\\/\\\/xentegra.com\\\/wp-content\\\/uploads\\\/2023\\\/06\\\/1519903807641-min.jpg\",\"width\":200,\"height\":200,\"caption\":\"XenTegra\"},\"image\":{\"@id\":\"https:\\\/\\\/xentegra.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/XenTegra\\\/\",\"https:\\\/\\\/x.com\\\/xentegra\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/xentegra-llc\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/xentegra.com\\\/#\\\/schema\\\/person\\\/84736408f096bfd92b80305aea8846a7\",\"name\":\"Chase Newmyer\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-CA\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d46cd44f0bd433dc5a386cbac549c62fd92266e3951669c705b347be2130cca3?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d46cd44f0bd433dc5a386cbac549c62fd92266e3951669c705b347be2130cca3?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d46cd44f0bd433dc5a386cbac549c62fd92266e3951669c705b347be2130cca3?s=96&d=mm&r=g\",\"caption\":\"Chase Newmyer\"},\"url\":\"https:\\\/\\\/xentegra.com\\\/fr\\\/resources\\\/author\\\/chasenewmyer\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Quantum-Ready Security with Citrix NetScaler: Protecting Data","description":"Explore how Citrix NetScaler delivers quantum-ready security, protecting critical data today while preparing for tomorrow\u2019s cyber threats.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/xentegra.com\/fr\/resources\/185-quantum-ready-security-with-citrix-netscaler-protecting-data-today-and-tomorrow\/","og_locale":"fr_CA","og_type":"article","og_title":"Quantum-Ready Security with Citrix NetScaler: Protecting Data","og_description":"Explore how Citrix NetScaler delivers quantum-ready security, protecting critical data today while preparing for tomorrow\u2019s cyber threats.","og_url":"https:\/\/xentegra.com\/fr\/resources\/185-quantum-ready-security-with-citrix-netscaler-protecting-data-today-and-tomorrow\/","og_site_name":"XenTegra","article_publisher":"https:\/\/www.facebook.com\/XenTegra\/","article_published_time":"2025-08-12T19:55:19+00:00","article_modified_time":"2025-09-14T23:56:10+00:00","og_image":[{"width":1100,"height":600,"url":"https:\/\/eadn-wc05-13529174.nxedge.io\/wp-content\/uploads\/2024\/03\/Citrix-Session.png","type":"image\/png"}],"author":"Chase Newmyer","twitter_card":"summary_large_image","twitter_creator":"@xentegra","twitter_site":"@xentegra","twitter_misc":{"\u00c9crit par":"Chase Newmyer","Estimation du temps de lecture":"37 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/xentegra.com\/resources\/185-quantum-ready-security-with-citrix-netscaler-protecting-data-today-and-tomorrow\/#article","isPartOf":{"@id":"https:\/\/xentegra.com\/resources\/185-quantum-ready-security-with-citrix-netscaler-protecting-data-today-and-tomorrow\/"},"author":{"name":"Chase Newmyer","@id":"https:\/\/xentegra.com\/#\/schema\/person\/84736408f096bfd92b80305aea8846a7"},"headline":"185: Quantum-Ready Security with Citrix NetScaler: Protecting Data Today and Tomorrow","datePublished":"2025-08-12T19:55:19+00:00","dateModified":"2025-09-14T23:56:10+00:00","mainEntityOfPage":{"@id":"https:\/\/xentegra.com\/resources\/185-quantum-ready-security-with-citrix-netscaler-protecting-data-today-and-tomorrow\/"},"wordCount":8153,"commentCount":0,"publisher":{"@id":"https:\/\/xentegra.com\/#organization"},"image":{"@id":"https:\/\/xentegra.com\/resources\/185-quantum-ready-security-with-citrix-netscaler-protecting-data-today-and-tomorrow\/#primaryimage"},"thumbnailUrl":"https:\/\/eadn-wc05-13529174.nxedge.io\/wp-content\/uploads\/2024\/03\/Citrix-Session.png","articleSection":["Podcast"],"inLanguage":"fr-CA","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/xentegra.com\/resources\/185-quantum-ready-security-with-citrix-netscaler-protecting-data-today-and-tomorrow\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/xentegra.com\/resources\/185-quantum-ready-security-with-citrix-netscaler-protecting-data-today-and-tomorrow\/","url":"https:\/\/xentegra.com\/resources\/185-quantum-ready-security-with-citrix-netscaler-protecting-data-today-and-tomorrow\/","name":"Quantum-Ready Security with Citrix NetScaler: Protecting Data","isPartOf":{"@id":"https:\/\/xentegra.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/xentegra.com\/resources\/185-quantum-ready-security-with-citrix-netscaler-protecting-data-today-and-tomorrow\/#primaryimage"},"image":{"@id":"https:\/\/xentegra.com\/resources\/185-quantum-ready-security-with-citrix-netscaler-protecting-data-today-and-tomorrow\/#primaryimage"},"thumbnailUrl":"https:\/\/eadn-wc05-13529174.nxedge.io\/wp-content\/uploads\/2024\/03\/Citrix-Session.png","datePublished":"2025-08-12T19:55:19+00:00","dateModified":"2025-09-14T23:56:10+00:00","description":"Explore how Citrix NetScaler delivers quantum-ready security, protecting critical data today while preparing for tomorrow\u2019s cyber threats.","breadcrumb":{"@id":"https:\/\/xentegra.com\/resources\/185-quantum-ready-security-with-citrix-netscaler-protecting-data-today-and-tomorrow\/#breadcrumb"},"inLanguage":"fr-CA","potentialAction":[{"@type":"ReadAction","target":["https:\/\/xentegra.com\/resources\/185-quantum-ready-security-with-citrix-netscaler-protecting-data-today-and-tomorrow\/"]}]},{"@type":"ImageObject","inLanguage":"fr-CA","@id":"https:\/\/xentegra.com\/resources\/185-quantum-ready-security-with-citrix-netscaler-protecting-data-today-and-tomorrow\/#primaryimage","url":"https:\/\/eadn-wc05-13529174.nxedge.io\/wp-content\/uploads\/2024\/03\/Citrix-Session.png","contentUrl":"https:\/\/eadn-wc05-13529174.nxedge.io\/wp-content\/uploads\/2024\/03\/Citrix-Session.png","width":1100,"height":600},{"@type":"BreadcrumbList","@id":"https:\/\/xentegra.com\/resources\/185-quantum-ready-security-with-citrix-netscaler-protecting-data-today-and-tomorrow\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/xentegra.com\/"},{"@type":"ListItem","position":2,"name":"185: Quantum-Ready Security with Citrix NetScaler: Protecting Data Today and Tomorrow"}]},{"@type":"WebSite","@id":"https:\/\/xentegra.com\/#website","url":"https:\/\/xentegra.com\/","name":"XenTegra","description":"","publisher":{"@id":"https:\/\/xentegra.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/xentegra.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-CA"},{"@type":"Organization","@id":"https:\/\/xentegra.com\/#organization","name":"XenTegra","url":"https:\/\/xentegra.com\/","logo":{"@type":"ImageObject","inLanguage":"fr-CA","@id":"https:\/\/xentegra.com\/#\/schema\/logo\/image\/","url":"https:\/\/eadn-wc05-13529174.nxedge.io\/wp-content\/uploads\/2023\/06\/1519903807641-min.jpg","contentUrl":"https:\/\/eadn-wc05-13529174.nxedge.io\/wp-content\/uploads\/2023\/06\/1519903807641-min.jpg","width":200,"height":200,"caption":"XenTegra"},"image":{"@id":"https:\/\/xentegra.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/XenTegra\/","https:\/\/x.com\/xentegra","https:\/\/www.linkedin.com\/company\/xentegra-llc"]},{"@type":"Person","@id":"https:\/\/xentegra.com\/#\/schema\/person\/84736408f096bfd92b80305aea8846a7","name":"Chase Newmyer","image":{"@type":"ImageObject","inLanguage":"fr-CA","@id":"https:\/\/secure.gravatar.com\/avatar\/d46cd44f0bd433dc5a386cbac549c62fd92266e3951669c705b347be2130cca3?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d46cd44f0bd433dc5a386cbac549c62fd92266e3951669c705b347be2130cca3?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d46cd44f0bd433dc5a386cbac549c62fd92266e3951669c705b347be2130cca3?s=96&d=mm&r=g","caption":"Chase Newmyer"},"url":"https:\/\/xentegra.com\/fr\/resources\/author\/chasenewmyer\/"}]}},"_links":{"self":[{"href":"https:\/\/xentegra.com\/fr\/wp-json\/wp\/v2\/posts\/718692","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/xentegra.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/xentegra.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/xentegra.com\/fr\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/xentegra.com\/fr\/wp-json\/wp\/v2\/comments?post=718692"}],"version-history":[{"count":2,"href":"https:\/\/xentegra.com\/fr\/wp-json\/wp\/v2\/posts\/718692\/revisions"}],"predecessor-version":[{"id":718696,"href":"https:\/\/xentegra.com\/fr\/wp-json\/wp\/v2\/posts\/718692\/revisions\/718696"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/xentegra.com\/fr\/wp-json\/wp\/v2\/media\/65995"}],"wp:attachment":[{"href":"https:\/\/xentegra.com\/fr\/wp-json\/wp\/v2\/media?parent=718692"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/xentegra.com\/fr\/wp-json\/wp\/v2\/categories?post=718692"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/xentegra.com\/fr\/wp-json\/wp\/v2\/tags?post=718692"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}