{"id":66043,"date":"2022-07-13T11:00:00","date_gmt":"2022-07-13T15:00:00","guid":{"rendered":"http:\/\/74d2948405.nxcli.io\/resources\/109-the-citrix-session-citrix-features-explained-increase-app-security-with-citrix-secure-private-access\/"},"modified":"2025-02-06T06:50:56","modified_gmt":"2025-02-06T11:50:56","slug":"109-the-citrix-session-citrix-features-explained-increase-app-security-with-citrix-secure-private-access","status":"publish","type":"post","link":"https:\/\/xentegra.com\/hi\/resources\/109-the-citrix-session-citrix-features-explained-increase-app-security-with-citrix-secure-private-access\/","title":{"rendered":"109: The Citrix Session: Citrix Features Explained: Increase app security with Citrix Secure Private Access"},"content":{"rendered":"<p><iframe loading=\"lazy\" src=\"https:\/\/www.buzzsprout.com\/670066\/episodes\/10954275-the-citrix-session-citrix-features-explained-increase-app-security-with-citrix-secure-private-access?iframe=true\" scrolling=\"no\" width=\"100%\" height=\"200\" frameborder=\"0\" style=\"width: 100%;height: 200px\"><\/iframe><\/p>\n<p>For your hybrid workers to do their best, most productive work, they need anywhere access to a wide variety of SaaS and web applications. But today <a href=\"https:\/\/www.okta.com\/businesses-at-work\/2021\/\">the average business relies on 88 different apps<\/a>, creating a larger-than-ever attack surface for your cybersecurity team to protect. Making <a href=\"https:\/\/www.citrix.com\/solutions\/app-delivery-and-security\/what-is-application-security.html\">web app security<\/a> even more complex, each type of SaaS app demands a different type of security posture to defend against new threats. As you explore how to secure SaaS applications, it\u2019s vital you deliver anywhere access to your hybrid workforce without sacrificing SaaS app security.<\/p>\n<p><a href=\"https:\/\/www.citrix.com\/products\/citrix-secure-private-access\/\">Citrix Secure Private Access<\/a> helps companies strengthen web app security with versatile and secure app access that doesn\u2019t disrupt the hybrid work experience. In this post, we will examine how you can use Public SaaS App Access, Private Web App Access, and Private Client\/Server App Access to empower your hybrid workers without compromising your SaaS application security requirements.<\/p>\n<p>Host:\u00a0 Andy Whiteside<br \/>\u0938\u0939-\u092e\u0947\u091c\u092c\u093e\u0928: \u092c\u093f\u0932 \u0938\u091f\u0928<br \/>\u0938\u0939-\u092e\u0947\u091c\u092c\u093e\u0928: \u0917\u0947\u0930\u0947\u092e\u0940 \u092e\u0947\u092f\u0930\u094d\u0938<\/p>\n<div class=\"transcript\">\n<p><!--block-->\u0935\u0947\u092c\u0935\u0940\u091f\u0940\u091f\u0940<\/p>\n<p>1<br \/>00:00:03.240 &#8211;&gt; 00:00:14.340<br \/>Andy Whiteside: hi everyone, welcome to episode 109 of the citrix session i&#8217;m your host Andy whiteside i&#8217;ve got bill said and director of services billy&#8217;s to got 7000 hours of project ready work coming at you.<\/p>\n<p>2<br \/>00:00:14.849 &#8211;&gt; 00:00:19.770<br \/>Bill Sutton: pretty much what it seems like these days, which is a good problem to have I guess.<\/p>\n<p>3<br \/>00:00:20.610 &#8211;&gt; 00:00:34.500<br \/>Andy Whiteside: Good problem to have still a problem, though, so if you&#8217;re listening and you would like to be on a digital workspace and user compute hardcore focused on that industry and beyond team then reach out and let&#8217;s INTEGRA know yeah.<\/p>\n<p>4<br \/>00:00:34.890 &#8211;&gt; 00:00:35.460<br \/>Exactly.<\/p>\n<p>5<br \/>00:00:36.840 &#8211;&gt; 00:00:52.110<br \/>Andy Whiteside: get to work with bill, who is an awesome and knowledgeable manager, which is you know not what everybody else has we we have someone who&#8217;s a good at managing and also knows how this stuff works which, believe it or not, that&#8217;s how it&#8217;s supposed to work.<\/p>\n<p>6<br \/>00:00:55.110 &#8211;&gt; 00:01:07.140<br \/>Andy Whiteside: Okay, but i&#8217;m gonna do this to both you guys i&#8217;m I am using an LG all in one thing client and using the zoom custom partition and Nigel to do this, one I really want to do it to my virtual desktop but I was having a crash.<\/p>\n<p>7<br \/>00:01:07.950 &#8211;&gt; 00:01:24.270<br \/>Andy Whiteside: Not a citrix issue, not a windows issue but a browser issue earlier got that dreaded do you want to wait for the whatever thing to run before we move on what are you what are you using to record the podcast it&#8217;s okay if you&#8217;re using a fat PC laptop whatever what are you using.<\/p>\n<p>8<br \/>00:01:24.390 &#8211;&gt; 00:01:31.800<br \/>Bill Sutton: i&#8217;m using a fat laptop currently I have done it using teams through a or zoom through vdi but I wasn&#8217;t using that today.<\/p>\n<p>9<br \/>00:01:32.820 &#8211;&gt; 00:01:44.550<br \/>Andy Whiteside: In INTEGRA world and i&#8217;m an idiot for not knowing this zoom offload if you have the right pieces in the vdi and on your endpoint and the endpoints windows does that currently work do we have that turned on and working.<\/p>\n<p>10<br \/>00:01:45.000 &#8211;&gt; 00:01:48.870<br \/>Bill Sutton: I believe so, yes, last time I did I did, and it worked fine yeah.<\/p>\n<p>11<br \/>00:01:50.010 &#8211;&gt; 00:01:58.050<br \/>Andy Whiteside: I gotta go test that again and see if it&#8217;s working or turned on we&#8217;re like the cobbler and we have shoes for our kids but they&#8217;re not the best us because we&#8217;re too busy doing and everywhere else.<\/p>\n<p>12<br \/>00:01:59.520 &#8211;&gt; 00:02:00.360<br \/>Bill Sutton: yeah exactly.<\/p>\n<p>13<br \/>00:02:00.840 &#8211;&gt; 00:02:06.750<br \/>Andy Whiteside: So JEREMY myers with is JEREMY is the director of sales engineering for the southeast for citrix how&#8217;s it going.<\/p>\n<p>14<br \/>00:02:07.830 &#8211;&gt; 00:02:15.570<br \/>Geremy Meyers: First of all, thanks for the Promotion but second of all that is true, I cover the southeast i&#8217;m not a director, yet, but one of these days, maybe.<\/p>\n<p>15<br \/>00:02:15.930 &#8211;&gt; 00:02:16.620<br \/>Andy Whiteside: it&#8217;s promoting you.<\/p>\n<p>16<br \/>00:02:17.220 &#8211;&gt; 00:02:21.780<br \/>Geremy Meyers: I appreciate that Thank you can nudge nudge my w two that&#8217;d be awesome too.<\/p>\n<p>17<br \/>00:02:23.730 &#8211;&gt; 00:02:25.410<br \/>Andy Whiteside: I don&#8217;t even know who report to anyone.<\/p>\n<p>18<br \/>00:02:26.220 &#8211;&gt; 00:02:28.230<br \/>Geremy Meyers: I will Eric Fisher actually.<\/p>\n<p>19<br \/>00:02:30.330 &#8211;&gt; 00:02:31.920<br \/>Geremy Meyers: long, long time guy you know.<\/p>\n<p>20<br \/>00:02:33.540 &#8211;&gt; 00:02:35.580<br \/>Andy Whiteside: So many people got thinking all right, so what.<\/p>\n<p>21<br \/>00:02:36.600 &#8211;&gt; 00:02:38.640<br \/>Andy Whiteside: what&#8217;s your device influence story.<\/p>\n<p>22<br \/>00:02:39.900 &#8211;&gt; 00:02:49.860<br \/>Geremy Meyers: So right now I am fat for this zoom call here, I do have to virtual desktops open right now, so I have my citrix desktop which I use quite a bit.<\/p>\n<p>23<br \/>00:02:50.880 &#8211;&gt; 00:03:05.760<br \/>Geremy Meyers: You know I use it for team calls I use it for a lot of, and this kind of plays into our conversation today I use a lot for internal web Apps for sure, so a lot of our you know engineering dashboard a lot of our some of the tableau dashboards they only exist internal right so.<\/p>\n<p>24<br \/>00:03:06.000 &#8211;&gt; 00:03:18.780<br \/>Andy Whiteside: You can get to them is to tunnel through and I using the word tunnels politically but it&#8217;s not really tunnel, but it is right up through an application also windows not application think that&#8217;s, the only way you have access this thing&#8217;s.<\/p>\n<p>25<br \/>00:03:19.380 &#8211;&gt; 00:03:21.090<br \/>Geremy Meyers: Correct all the way.<\/p>\n<p>26<br \/>00:03:22.890 &#8211;&gt; 00:03:28.290<br \/>Geremy Meyers: And then, I have a second environment that is my team&#8217;s lab environment and so we&#8217;re going through.<\/p>\n<p>27<br \/>00:03:28.530 &#8211;&gt; 00:03:36.480<br \/>Geremy Meyers: configuring some things for add adaptive all some other things like that, but you know that&#8217;s completely separate and irrelevant outside of me just want the name drop that were.<\/p>\n<p>28<br \/>00:03:36.900 &#8211;&gt; 00:03:45.000<br \/>Geremy Meyers: You know, doing some of that stuff as well and tinkering with the new features that we have with which looks like our topic today secure private access so.<\/p>\n<p>29<br \/>00:03:45.840 &#8211;&gt; 00:03:53.730<br \/>Andy Whiteside: Well, you know to me it&#8217;s it&#8217;s not a relative right because it&#8217;s first of all, you got to use your own stuff and I can&#8217;t tell you how many companies we work with where.<\/p>\n<p>30<br \/>00:03:54.120 &#8211;&gt; 00:04:01.650<br \/>Andy Whiteside: I try to impress them with the idea that we&#8217;re using our own stuff and it just goes right by them and, like no, you have to understand this, because when time comes, you need to use your own stuff.<\/p>\n<p>31<br \/>00:04:02.190 &#8211;&gt; 00:04:17.790<br \/>Andy Whiteside: And if you&#8217;re running around on a $2,000 laptop expecting your users to use a virtual desktop and you&#8217;re not using it, you know shame on you and, at the same time, your team has to have a lab I don&#8217;t have any clients, we have that they have a single machine catalog maybe.<\/p>\n<p>32<br \/>00:04:18.390 &#8211;&gt; 00:04:23.430<br \/>Andy Whiteside: And that&#8217;s their lab and you&#8217;re like that&#8217;s won&#8217;t get it done with the intricacies these days.<\/p>\n<p>33<br \/>00:04:23.730 &#8211;&gt; 00:04:30.900<br \/>Geremy Meyers: Well i&#8217;ll tell you what right So when I first started at citrix, by the way this is 10 years at citrix so I don&#8217;t want to make you feel all dandy but.<\/p>\n<p>34<br \/>00:04:31.290 &#8211;&gt; 00:04:37.530<br \/>Geremy Meyers: It occurred to me, as I was sitting at the 10 year anniversary of his integrity that this might be my 10 years at citrix and of course it was and I got the email.<\/p>\n<p>35<br \/>00:04:38.430 &#8211;&gt; 00:04:45.570<br \/>Geremy Meyers: So that was fun, but I remember back when I first started, and I wanted to lab and here&#8217;s what that looked like i&#8217;m went and bought like three.<\/p>\n<p>36<br \/>00:04:45.930 &#8211;&gt; 00:04:51.690<br \/>Geremy Meyers: I want to say small form factor Shell PCs something I could slap in some cpu a whole lot of Ram.<\/p>\n<p>37<br \/>00:04:52.140 &#8211;&gt; 00:04:56.250<br \/>Geremy Meyers: And some solid state drives right because I wanted to runs in server I wanted to have a pool.<\/p>\n<p>38<br \/>00:04:56.640 &#8211;&gt; 00:05:10.650<br \/>Geremy Meyers: And I wanted to you know to all this stuff up the biggest challenge that I had at the time was trying to figure out the Microsoft licensing right because I didn&#8217;t have already RDS cows, so that meant I had to rebuild Zen APP servers literally every was 180 days anyways long story short.<\/p>\n<p>39<br \/>00:05:11.700 &#8211;&gt; 00:05:19.380<br \/>Geremy Meyers: I remember how hard it was for me to give up that on Prem lab environment because i&#8217;ve got space in azure now right and so we&#8217;ll build some things in azure.<\/p>\n<p>40<br \/>00:05:19.710 &#8211;&gt; 00:05:29.790<br \/>Geremy Meyers: Standard up tear it down multiple different catalog types in those sorts of things just because man folks are just they&#8217;re asking, first of all, just want to know how things work we all want to know how things work but.<\/p>\n<p>41<br \/>00:05:30.180 &#8211;&gt; 00:05:36.900<br \/>Geremy Meyers: In some of the scenarios customers kind of put in front of us it&#8217;s Nice that we have a more flexibility now because it&#8217;s in a hyper scale or like azure.<\/p>\n<p>42<br \/>00:05:38.100 &#8211;&gt; 00:05:39.240<br \/>Geremy Meyers: to tinker with it was really cool.<\/p>\n<p>43<br \/>00:05:40.410 &#8211;&gt; 00:05:45.510<br \/>Andy Whiteside: yeah I love that comment, but as a person has been dealing with a customer over the weekend and today.<\/p>\n<p>44<br \/>00:05:46.530 &#8211;&gt; 00:05:57.990<br \/>Andy Whiteside: it&#8217;s like okay tell them exactly what to do, but then scope out all the options, like all the options, you know what you just said, I mean it&#8217;s it&#8217;s like you know and then so at the end, the day and they were very open to it.<\/p>\n<p>45<br \/>00:05:59.190 &#8211;&gt; 00:06:03.090<br \/>Andy Whiteside: The other day we just told hey this our blueprint This way we want to go with you.<\/p>\n<p>46<br \/>00:06:03.630 &#8211;&gt; 00:06:12.120<br \/>Andy Whiteside: hmm like this great if you want to deviate some great if you want to completely overhaul it but for us to you know, be able to guarantee you a price and guarantee you.<\/p>\n<p>47<br \/>00:06:12.660 &#8211;&gt; 00:06:18.000<br \/>Andy Whiteside: A solution that works really need to follow the blueprint, and they were all and then we started talking about you know.<\/p>\n<p>48<br \/>00:06:18.420 &#8211;&gt; 00:06:28.530<br \/>Andy Whiteside: To nine verses four nines and all sudden they got there like it doesn&#8217;t matter tonight&#8217;s is great, I mean it&#8217;s not great, but it&#8217;s really, really good and the truth is we&#8217;re not gonna know the difference between two and three nines.<\/p>\n<p>49<br \/>00:06:29.730 &#8211;&gt; 00:06:36.450<br \/>Geremy Meyers: Probably not what&#8217;s that 12 hours 16 hours something like that the difference between two nines and five nines I forget but it&#8217;s it&#8217;s something like that.<\/p>\n<p>50<br \/>00:06:38.430 &#8211;&gt; 00:06:41.310<br \/>Geremy Meyers: And that&#8217;s over the course of a year, so let me put that in perspective but yeah.<\/p>\n<p>51<br \/>00:06:44.040 &#8211;&gt; 00:06:45.270<br \/>Andy Whiteside: Well, in guys some.<\/p>\n<p>52<br \/>00:06:46.560 &#8211;&gt; 00:06:58.830<br \/>Andy Whiteside: We have picked for today, the following topic oh yeah and, as I was looking I was looking at this one on the Left from five days ago introduction to citrix adaptive authentication I want to come back and do that one guy so.<\/p>\n<p>53<br \/>00:06:59.550 &#8211;&gt; 00:07:00.660<br \/>Andy Whiteside: For that list for next week.<\/p>\n<p>54<br \/>00:07:01.290 &#8211;&gt; 00:07:05.490<br \/>Geremy Meyers: Who, we might have that configured for next week, too, so that might be fun for sure cool.<\/p>\n<p>55<br \/>00:07:06.030 &#8211;&gt; 00:07:08.070<br \/>Andy Whiteside: very hot off the top part of the process.<\/p>\n<p>56<br \/>00:07:09.030 &#8211;&gt; 00:07:09.630<br \/>Andy Whiteside: and your lap.<\/p>\n<p>57<br \/>00:07:10.950 &#8211;&gt; 00:07:18.630<br \/>Andy Whiteside: Okay, so, but for this week another one by Stephen bills I think it&#8217;s pronounced that way former citrix sales engineer, but now i&#8217;m product manager, I believe.<\/p>\n<p>58<br \/>00:07:19.230 &#8211;&gt; 00:07:26.580<br \/>Andy Whiteside: This one citrix features explained so we&#8217;re staying in that series and it&#8217;s increased APP security with citrix secure private access.<\/p>\n<p>59<br \/>00:07:27.870 &#8211;&gt; 00:07:33.990<br \/>Andy Whiteside: We want to go through that one today so JEREMY can you kind of just to start by telling us you know what this is why it matters.<\/p>\n<p>60<br \/>00:07:34.800 &#8211;&gt; 00:07:35.340<br \/>So.<\/p>\n<p>61<br \/>00:07:36.510 &#8211;&gt; 00:07:50.010<br \/>Geremy Meyers: In a nutshell, it&#8217;s protecting access to public, and this is right off the right off the BAT this is really what it what it does right so we&#8217;re protecting access to public SAS Apps right, what does that mean public website right, so if you&#8217;re a user of.<\/p>\n<p>62<br \/>00:07:50.760 &#8211;&gt; 00:08:03.840<br \/>Geremy Meyers: salesforce right, you know how does an organization, do you protect that outside of things like single sign on right private web access So what if that SAS APP that website that APP that you&#8217;re delivering.<\/p>\n<p>63<br \/>00:08:04.860 &#8211;&gt; 00:08:13.950<br \/>Geremy Meyers: exists, internally and then lastly client server application access right, so you know something that involves a client like a fat client.<\/p>\n<p>64<br \/>00:08:14.970 &#8211;&gt; 00:08:17.520<br \/>Geremy Meyers: And then some sort of back end right obviously something that might.<\/p>\n<p>65<br \/>00:08:18.270 &#8211;&gt; 00:08:21.600<br \/>Geremy Meyers: represent a traditional citrix APP you might have a scenario where.<\/p>\n<p>66<br \/>00:08:21.900 &#8211;&gt; 00:08:29.280<br \/>Geremy Meyers: You know, you want to protect that outside of a traditional Zen ads and desktop deployment which maybe that&#8217;s a good conversation in itself because that&#8217;s still might not make sense but.<\/p>\n<p>67<br \/>00:08:29.670 &#8211;&gt; 00:08:37.740<br \/>Geremy Meyers: Really that&#8217;s what we&#8217;re talking about with you know SP a secure private access is you know, protecting public private and even clients or wraps if you need to.<\/p>\n<p>68<br \/>00:08:38.460 &#8211;&gt; 00:08:45.480<br \/>Andy Whiteside: Well let&#8217;s let&#8217;s dig in the first one little bit so and be very specific exactly tell the people in the citrus world don&#8217;t know what you guys do for SAS Apps.<\/p>\n<p>69<br \/>00:08:46.050 &#8211;&gt; 00:09:05.640<br \/>Andy Whiteside: that&#8217;s probably the one of the most future proofing pieces of your business and i&#8217;m kind of blame that on the success on the x86 side of the House so we&#8217;re just stuck in that world and don&#8217;t realize that they&#8217;ve got to have some of those same features and beyond, for the SAS the.<\/p>\n<p>70<br \/>00:09:05.730 &#8211;&gt; 00:09:10.320<br \/>Andy Whiteside: browser application this case public facing so.<\/p>\n<p>71<br \/>00:09:11.340 &#8211;&gt; 00:09:14.250<br \/>Andy Whiteside: So this topic simply is how to strengthen SAS.<\/p>\n<p>72<br \/>00:09:15.630 &#8211;&gt; 00:09:30.900<br \/>Andy Whiteside: Software as a service APP security with public software as a service APP access and you&#8217;ll see me do that occasionally i&#8217;ll just quit with the acronyms because we frank, a lot of people get caught up in the acronyms and he asked them what they mean they don&#8217;t actually know.<\/p>\n<p>73<br \/>00:09:31.860 &#8211;&gt; 00:09:32.130<br \/>Geremy Meyers: Right.<\/p>\n<p>74<br \/>00:09:32.970 &#8211;&gt; 00:09:33.780<br \/>Geremy Meyers: And if I were the same.<\/p>\n<p>75<br \/>00:09:34.200 &#8211;&gt; 00:09:44.010<br \/>Geremy Meyers: On the same thing goes for SAS APP right I just think we assume folks notice asset is but, at the end of they were we talking about public website, you know, for instance, right, so if your applet your organization runs off of.<\/p>\n<p>76<br \/>00:09:44.460 &#8211;&gt; 00:09:56.010<br \/>Geremy Meyers: You know, Microsoft dynamics to the runs off of salesforce if it runs off things I mean, these are all SAS Apps right and you&#8217;re just organization is delivering up a website to their users for their application access that&#8217;s what we&#8217;re talking about here.<\/p>\n<p>77<br \/>00:09:56.550 &#8211;&gt; 00:10:05.970<br \/>Andy Whiteside: And the chances that you would take today dynamics and you bring it in house and delivered through a browser but do it privately know I heard you speak very common, but now it&#8217;s almost unheard of.<\/p>\n<p>78<br \/>00:10:06.480 &#8211;&gt; 00:10:12.060<br \/>Geremy Meyers: Well, in there&#8217;s still some Apps out there, like that right so, for instance, take Oracle you know era P, is probably installed.<\/p>\n<p>79<br \/>00:10:12.540 &#8211;&gt; 00:10:24.150<br \/>Geremy Meyers: You know, it could be the cloud version, but you know we a lot of folks running that internally SAP I mean that&#8217;s a that&#8217;s a that&#8217;s a big man with APP right and so folks are you know struggling to get that you know into the SAP cloud so.<\/p>\n<p>80<br \/>00:10:24.360 &#8211;&gt; 00:10:36.540<br \/>Geremy Meyers: collapse yeah yeah I mean listen, we saw customers running windows xp So if you think that you know folks are going to go to the cloud with some of these things it&#8217;s just it&#8217;s going to take a lot of effort, because there&#8217;s a lot of technical debt there honestly right.<\/p>\n<p>81<br \/>00:10:38.040 &#8211;&gt; 00:10:47.520<br \/>Andy Whiteside: So let me, let me do this first and then we&#8217;ll let you and bill both comment on this so SAS It all starts with single identity, if possible.<\/p>\n<p>82<br \/>00:10:48.360 &#8211;&gt; 00:10:56.670<br \/>Andy Whiteside: That allows you to multifactor authenticate that then enables you for single sign on into everywhere, you want to go after that.<\/p>\n<p>83<br \/>00:10:57.030 &#8211;&gt; 00:11:06.990<br \/>Andy Whiteside: And if you want to you can even turn off single sign on and force them to re authenticate but there&#8217;s a balance between Okay, I want to make it easy single identity, I want to make it secure multifactor.<\/p>\n<p>84<br \/>00:11:07.500 &#8211;&gt; 00:11:20.460<br \/>Andy Whiteside: I want to make it easy insecure single sign on, and I could even turn that up a level if need be, is that, basically, what citrix is providing or Is there something beyond that they were talking about here with the public SAS offerings.<\/p>\n<p>85<br \/>00:11:21.390 &#8211;&gt; 00:11:28.230<br \/>Geremy Meyers: So citrix can provide all those things you just described, but they can also take that a step further right so.<\/p>\n<p>86<br \/>00:11:28.650 &#8211;&gt; 00:11:36.060<br \/>Geremy Meyers: I think, to sort of be in the space, right now, you have to provide or be able to provide that single sign on, you have to be able to provide that second factor.<\/p>\n<p>87<br \/>00:11:36.420 &#8211;&gt; 00:11:43.020<br \/>Geremy Meyers: as a way of protecting the front door that APP I would argue, you know, forcing users to re authenticate might be less secure.<\/p>\n<p>88<br \/>00:11:43.440 &#8211;&gt; 00:11:48.840<br \/>Geremy Meyers: than doing the single sign in the sense that you know now here&#8217;s another password or users got to remember.<\/p>\n<p>89<br \/>00:11:49.470 &#8211;&gt; 00:11:56.340<br \/>Geremy Meyers: If you&#8217;re like my dad you&#8217;re probably going to use the same password several different locations so there&#8217;s a security challenge in itself.<\/p>\n<p>90<br \/>00:11:57.330 &#8211;&gt; 00:12:05.310<br \/>Geremy Meyers: But on top of that it&#8217;s just multiple attack services you opened up so when you do single sign on if you can just pull pull back to users ability to manage their own password.<\/p>\n<p>91<br \/>00:12:05.700 &#8211;&gt; 00:12:15.120<br \/>Geremy Meyers: And just put that behind a single identity with multi factor I think you&#8217;ve got a long way, but yes, at the very least that is step one, but there are some additional things we can do we can get into that.<\/p>\n<p>92<br \/>00:12:16.920 &#8211;&gt; 00:12:24.780<br \/>Andy Whiteside: So my my comment on the re authenticate piece was after like a timeout type thing and I guess at that point you&#8217;re back to the single identity to come right back through.<\/p>\n<p>93<br \/>00:12:26.070 &#8211;&gt; 00:12:35.880<br \/>Andy Whiteside: know any any thoughts comments on how this is playing out and you see our customers implementing this across the board, or is it still just one offs that get.<\/p>\n<p>94<br \/>00:12:36.090 &#8211;&gt; 00:12:36.750<br \/>Bill Sutton: it&#8217;s it&#8217;s.<\/p>\n<p>95<br \/>00:12:36.900 &#8211;&gt; 00:12:53.970<br \/>Bill Sutton: it&#8217;s mostly one offs at this point, I think, to be honest with you that my view is that a lot of customers don&#8217;t really know that citrix offers this at this level, and that the at the level that jeremy&#8217;s about to go into the the items that are go beyond just sso because to jeremy&#8217;s point.<\/p>\n<p>96<br \/>00:12:54.990 &#8211;&gt; 00:12:58.320<br \/>Bill Sutton: Having the ability to use single identity single sign on.<\/p>\n<p>97<br \/>00:12:59.070 &#8211;&gt; 00:13:08.010<br \/>Bill Sutton: Multi factor those those those are the entry points you&#8217;ve got to have that that&#8217;s Those are the two halves and then what central provides is really provides, in addition to that is really I think the real.<\/p>\n<p>98<br \/>00:13:08.400 &#8211;&gt; 00:13:13.020<br \/>Bill Sutton: Added value is and there&#8217;s lots of security elements that go along with that that will get into.<\/p>\n<p>99<br \/>00:13:13.530 &#8211;&gt; 00:13:28.500<br \/>Bill Sutton: But I don&#8217;t think that your average customer I think they they many of them still see citrix as the vdi play and that&#8217;s obviously still a very solid play, but there&#8217;s a lot more than that this technology, in particular, can do than than what they&#8217;ve been doing.<\/p>\n<p>100<br \/>00:13:29.400 &#8211;&gt; 00:13:32.280<br \/>Andy Whiteside: Well, I don&#8217;t want to call out that you know its.<\/p>\n<p>101<br \/>00:13:33.660 &#8211;&gt; 00:13:37.020<br \/>Andy Whiteside: Customers thinking to use citrix for SAS Apps.<\/p>\n<p>102<br \/>00:13:37.050 &#8211;&gt; 00:13:40.410<br \/>Andy Whiteside: and protection SAS Apps I mean part of what we talked about before.<\/p>\n<p>103<br \/>00:13:40.710 &#8211;&gt; 00:13:53.010<br \/>Andy Whiteside: just want to highlight that citrix actually has that single that single identity single sign on multi factor challenge piece, all within the product and a lot of people are looking to third parties, which is fine she&#8217;s gonna be able to work with those two.<\/p>\n<p>104<br \/>00:13:53.580 &#8211;&gt; 00:13:57.210<br \/>Andy Whiteside: But it&#8217;s in the product you&#8217;re already buying and paying for.<\/p>\n<p>105<br \/>00:13:58.230 &#8211;&gt; 00:14:01.770<br \/>Andy Whiteside: You don&#8217;t have to look elsewhere for just the basic things we talked about so far right.<\/p>\n<p>106<br \/>00:14:02.850 &#8211;&gt; 00:14:13.230<br \/>Geremy Meyers: that&#8217;s true, and so I think a lot of our conversations with customers who are longtime customers is just exposing them to with audio right, so they don&#8217;t realize that you know, London, a lot of cases this this functionality they&#8217;ve already got.<\/p>\n<p>107<br \/>00:14:14.070 &#8211;&gt; 00:14:19.020<br \/>Geremy Meyers: If you&#8217;ve got an adc maybe if you&#8217;re not using the cloud services is something that we&#8217;ve done in some capacity for a long.<\/p>\n<p>108<br \/>00:14:19.020 &#8211;&gt; 00:14:26.250<br \/>Geremy Meyers: Time and again just serving up web Apps I mean that is the number one published application.<\/p>\n<p>109<br \/>00:14:26.790 &#8211;&gt; 00:14:37.020<br \/>Geremy Meyers: In citrix today no the non you know SAS the SBA stuff we&#8217;re talking about here a web browser publishing an internal web APP or even potentially a public with that, I mean folks are doing that today.<\/p>\n<p>110<br \/>00:14:37.590 &#8211;&gt; 00:14:45.870<br \/>Geremy Meyers: For some, some of the security reasons that you know we haven&#8217;t gotten into yet, but just being able to protect that data is pretty important to the customers.<\/p>\n<p>111<br \/>00:14:46.590 &#8211;&gt; 00:14:58.650<br \/>Andy Whiteside: yeah so JEREMY what beyond single identity single sign on multi factor when it comes to public SAAs what else can you do with citrix to take that security story to another level.<\/p>\n<p>112<br \/>00:14:59.340 &#8211;&gt; 00:15:11.130<br \/>Geremy Meyers: So let me, let me ask you this question what security reasons were customers deploying citrix I say citrix virtualize windows applications, or even Linux applications like, why did they do this in the past.<\/p>\n<p>113<br \/>00:15:11.850 &#8211;&gt; 00:15:18.720<br \/>Andy Whiteside: Well, to be honest, most of the time it was that case we&#8217;re going to talk about a minute ago in a minute where it&#8217;s private Apps and that&#8217;s, the only way you get there.<\/p>\n<p>114<br \/>00:15:19.980 &#8211;&gt; 00:15:22.080<br \/>Andy Whiteside: The other was performance reasons.<\/p>\n<p>115<br \/>00:15:22.350 &#8211;&gt; 00:15:22.860<br \/>Andy Whiteside: It is.<\/p>\n<p>116<br \/>00:15:23.100 &#8211;&gt; 00:15:37.020<br \/>Andy Whiteside: It is historically in my world been very rare that they did it for security reasons, even though they got the security benefits of it by doing it, the way they felt like they needed to had to they got security benefits they may may or may not even recognize.<\/p>\n<p>117<br \/>00:15:37.980 &#8211;&gt; 00:15:40.380<br \/>Geremy Meyers: Well, so I think in some customers i&#8217;ve seen.<\/p>\n<p>118<br \/>00:15:40.830 &#8211;&gt; 00:15:49.590<br \/>Geremy Meyers: sort of a delineation when they&#8217;re rationalizing their Apps and they&#8217;re looking what&#8217;s out there they&#8217;ll go hey there are certain Apps in our portfolio that need some additional levels of security, I get that.<\/p>\n<p>119<br \/>00:15:49.860 &#8211;&gt; 00:15:56.550<br \/>Geremy Meyers: And then, sometimes it doesn&#8217;t matter right I just need to get this APP in front of this user i&#8217;m not so concerned around you know managing.<\/p>\n<p>120<br \/>00:15:57.000 &#8211;&gt; 00:16:02.820<br \/>Geremy Meyers: printing or copy and paste you know some of this will fall into whatever industry and regulation that you need to protect for.<\/p>\n<p>121<br \/>00:16:03.150 &#8211;&gt; 00:16:07.710<br \/>Geremy Meyers: But when you look at that application portfolio they realize there&#8217;s a few that do and here&#8217;s a few that don&#8217;t.<\/p>\n<p>122<br \/>00:16:08.130 &#8211;&gt; 00:16:16.320<br \/>Geremy Meyers: But the fact that we can enable some of those controls on those applications, has been a big selling point for a long time, and so what we&#8217;re noticing is two things one.<\/p>\n<p>123<br \/>00:16:16.980 &#8211;&gt; 00:16:25.770<br \/>Geremy Meyers: What if we could provide that same level of control to weapons SAS Apps even Apps that aren&#8217;t hosted within your data Center that are those SAS Apps that are public facing.<\/p>\n<p>124<br \/>00:16:26.370 &#8211;&gt; 00:16:33.090<br \/>Geremy Meyers: And then, secondly, you know still provide that same rationalization listen, there are some Apps that I just don&#8217;t care about right, you know getting you into.<\/p>\n<p>125<br \/>00:16:33.600 &#8211;&gt; 00:16:41.760<br \/>Geremy Meyers: You know the salesforce, for instance, I might want to lock that down potentially not saying I need to, but I can provide copy and paste and I can provide.<\/p>\n<p>126<br \/>00:16:42.540 &#8211;&gt; 00:16:48.330<br \/>Geremy Meyers: You know, printing restrictions and things like that I can also turn on things like you know anti key logging right So if I want to protect.<\/p>\n<p>127<br \/>00:16:48.780 &#8211;&gt; 00:16:51.660<br \/>Geremy Meyers: The user as they&#8217;re logging into this APP from a local browser.<\/p>\n<p>128<br \/>00:16:52.140 &#8211;&gt; 00:17:02.670<br \/>Geremy Meyers: You know, maybe I can do that as well right, so you know I think just being able to rationalize and turn on some of those additional controls that we&#8217;ve had for windows Apps that we&#8217;ve published to SAS Apps is pretty powerful know.<\/p>\n<p>129<br \/>00:17:03.180 &#8211;&gt; 00:17:14.490<br \/>Andy Whiteside: Understanding the need of those things like a watermark like keep logging like turning off printing turning off copy paste turning off download.<\/p>\n<p>130<br \/>00:17:15.000 &#8211;&gt; 00:17:21.900<br \/>Andy Whiteside: It This is my one I use all the time for us on the podcast for please forgive me, but you know WikiLeaks had he only had access through ICA.<\/p>\n<p>131<br \/>00:17:22.830 &#8211;&gt; 00:17:35.130<br \/>Andy Whiteside: That wouldn&#8217;t happen you&#8217;d have to take screenshots of 10,000 documents, instead of just a download and had it been in the world of citrix today, even the download piece, we would have seen that happening could have taken action.<\/p>\n<p>132<br \/>00:17:35.250 &#8211;&gt; 00:17:40.290<br \/>Bill Sutton: We could have restrictively and building do screenshots unless they wanted to take pictures of this monitor right.<\/p>\n<p>133<br \/>00:17:40.860 &#8211;&gt; 00:17:41.160<br \/>\u0939\u093e\u0901\u0964<\/p>\n<p>134<br \/>00:17:42.210 &#8211;&gt; 00:17:50.460<br \/>Geremy Meyers: that&#8217;s true, but you know, to take it a step further and this goes into probably more of the SBA stuff but you know, being able to go beyond single sign on an MFA to.<\/p>\n<p>135<br \/>00:17:50.880 &#8211;&gt; 00:17:56.160<br \/>Geremy Meyers: You know what we call adaptive off, but really it&#8217;s kind of like a contextual access right so being able to posture.<\/p>\n<p>136<br \/>00:17:56.700 &#8211;&gt; 00:18:04.530<br \/>Geremy Meyers: The device device before you give them access to that SAS APP so what kind of device, you know, whatever you know where you come in from you know.<\/p>\n<p>137<br \/>00:18:04.980 &#8211;&gt; 00:18:11.640<br \/>Geremy Meyers: And just tying that into even our own security analytics story so being able to say hey based on your risk or to the organization, maybe even.<\/p>\n<p>138<br \/>00:18:11.970 &#8211;&gt; 00:18:22.260<br \/>Geremy Meyers: You know, turn that application off and on or at least enable additional security controls, based on your your risk or you know these are all things that you can do, and you can do that with something that&#8217;s either hosted in your data Center which is pretty powerful.<\/p>\n<p>139<br \/>00:18:22.830 &#8211;&gt; 00:18:23.520<br \/>\u092c\u093f\u0932\u094d\u0915\u0941\u0932\u0964<\/p>\n<p>140<br \/>00:18:24.570 &#8211;&gt; 00:18:28.200<br \/>Bill Sutton: Because I kind of like the old EPA concept, but to the next level.<\/p>\n<p>141<br \/>00:18:28.860 &#8211;&gt; 00:18:31.590<br \/>Geremy Meyers: That is absolutely the EPA concept, but to the next level.<\/p>\n<p>142<br \/>00:18:32.550 &#8211;&gt; 00:18:37.890<br \/>Andy Whiteside: And the next level and from a different, I mean the conceptual stuffs the same.<\/p>\n<p>143<br \/>00:18:38.370 &#8211;&gt; 00:18:40.110<br \/>Andy Whiteside: But it&#8217;s coming from somewhere else and.<\/p>\n<p>144<br \/>00:18:40.110 &#8211;&gt; 00:18:43.710<br \/>Andy Whiteside: it&#8217;s coming through this browser thing that you know isn&#8217;t the same as this.<\/p>\n<p>145<br \/>00:18:44.250 &#8211;&gt; 00:18:55.650<br \/>Andy Whiteside: me look in a lot of times using citrix to provide access to an application some of the security intangibles was just the fact that all you got was the application and you had to find a way to break out of it if you could.<\/p>\n<p>146<br \/>00:18:56.340 &#8211;&gt; 00:19:08.820<br \/>Geremy Meyers: write well in wealth and just to tag team on that, so you know even once you&#8217;re in that web or SAS APP being able to do things like isolate links out of that that that that access so, for instance.<\/p>\n<p>147<br \/>00:19:09.120 &#8211;&gt; 00:19:12.450<br \/>Geremy Meyers: If I go into like a salesforce and you know there&#8217;s a link.<\/p>\n<p>148<br \/>00:19:13.110 &#8211;&gt; 00:19:21.510<br \/>Geremy Meyers: buried in that salesforce page and I click it being able to say hey listen what&#8217;s the status what&#8217;s the posture of this link is something I trust is there, something I don&#8217;t trust you know, maybe.<\/p>\n<p>149<br \/>00:19:21.990 &#8211;&gt; 00:19:29.820<br \/>Geremy Meyers: Maybe it just opens up in a different browser tab or you know I can turn on a feature called browser isolation which will launch that link and a containerized browser.<\/p>\n<p>150<br \/>00:19:30.060 &#8211;&gt; 00:19:42.390<br \/>Geremy Meyers: So that listen it&#8217;s not going to impact either a what&#8217;s in salesforce or you know, this is an internal web APP you know there&#8217;s not going to impact something in my data Center so I can isolate traffic, depending on the posture of things like embedded links which is pretty pretty slick.<\/p>\n<p>151<br \/>00:19:44.070 &#8211;&gt; 00:20:00.000<br \/>Andy Whiteside: hey what&#8217;s the likelihood these days that a right or a salesforce or workday or concur has the ability to turn off public access that doesn&#8217;t come through this digital workspace and takes advantage of the the citrix or somebody else is offering.<\/p>\n<p>152<br \/>00:20:00.960 &#8211;&gt; 00:20:11.820<br \/>Geremy Meyers: So it&#8217;s I mean you tell me if i&#8217;m wrong bill, but for a lot of these Apps it&#8217;s pretty common that you can whitelist and blacklist access from certain locations like I know.<\/p>\n<p>153<br \/>00:20:12.750 &#8211;&gt; 00:20:20.730<br \/>Geremy Meyers: Maybe this is with office 365 I mean you can you can whitelist and blacklist where traffic can come from so, for instance, you could say hey i&#8217;m not going to allow users to hit.<\/p>\n<p>154<br \/>00:20:21.180 &#8211;&gt; 00:20:30.120<br \/>Geremy Meyers: My website directly from their local browser from wherever they&#8217;re at, but you know if they&#8217;re coming into the data Center or they&#8217;re coming into a certain you know location, we will allow access, so you.<\/p>\n<p>155<br \/>00:20:30.600 &#8211;&gt; 00:20:40.260<br \/>Geremy Meyers: don&#8217;t this what you&#8217;re asking anybody being able to partition off where folks can access from means the only way to access, some of these applications is from this digital workspace yeah yeah.<\/p>\n<p>156<br \/>00:20:41.730 &#8211;&gt; 00:20:42.090<br \/>\u0917\u0947\u0930\u0947\u092e\u0940 \u092e\u0947\u092f\u0930\u094d\u0938: \u0920\u0940\u0915 \u0939\u0948\u0964<\/p>\n<p>157<br \/>00:20:42.390 &#8211;&gt; 00:20:45.150<br \/>Andy Whiteside: forcing us to have to use this digital workspace.<\/p>\n<p>158<br \/>00:20:46.440 &#8211;&gt; 00:20:49.260<br \/>Andy Whiteside: In some cases, the only way we&#8217;re ever going to get control over.<\/p>\n<p>159<br \/>00:20:50.340 &#8211;&gt; 00:20:51.000<br \/>Andy Whiteside: It happening.<\/p>\n<p>160<br \/>00:20:52.290 &#8211;&gt; 00:20:54.660<br \/>Bill Sutton: To the single identity sso concept.<\/p>\n<p>161<br \/>00:20:54.690 &#8211;&gt; 00:21:06.600<br \/>Bill Sutton: You know that you cannot get into salesforce unless you authenticate via azure ad or some other identity provider and if you can&#8217;t go to salesforce.com and enter your credentials, there are no you don&#8217;t know what they are.<\/p>\n<p>162<br \/>00:21:06.960 &#8211;&gt; 00:21:08.160<br \/>Bill Sutton: I think that&#8217;s one way.<\/p>\n<p>163<br \/>00:21:08.400 &#8211;&gt; 00:21:15.630<br \/>Bill Sutton: But with adaptive off is the ability to say if you&#8217;re if you&#8217;re coming from this IP range you&#8217;re allowed not coming from that IP range you&#8217;re not allowed.<\/p>\n<p>164<br \/>00:21:15.960 &#8211;&gt; 00:21:24.840<br \/>Bill Sutton: If your devices have a certain type or you know what what have you then you can get to the application, if you don&#8217;t have that, then you can&#8217;t get to the application so on.<\/p>\n<p>165<br \/>00:21:25.740 &#8211;&gt; 00:21:35.370<br \/>Geremy Meyers: Well, you know the other thing too, and maybe this is where Andy was going is you know your traffic, the traffic to that sasa might not be able to be sourced from your local machine directly so, for instance.<\/p>\n<p>166<br \/>00:21:35.670 &#8211;&gt; 00:21:38.730<br \/>Geremy Meyers: One of my favorite demos is and i&#8217;ll publish IP chicken.<\/p>\n<p>167<br \/>00:21:39.360 &#8211;&gt; 00:21:47.430<br \/>Geremy Meyers: You know into workspace and i&#8217;ve got a secure in an unsecured version and if I run the unsecured version, it shows the IP address of my local machine right.<\/p>\n<p>168<br \/>00:21:47.790 &#8211;&gt; 00:21:53.250<br \/>Geremy Meyers: But if I run the secured version what i&#8217;m doing is i&#8217;m forcing it to go through my data Center and proxy through that data Center.<\/p>\n<p>169<br \/>00:21:53.940 &#8211;&gt; 00:22:03.570<br \/>Geremy Meyers: To tip chickens, it will show the IP address of the data Center so, in other words, you know I can restrict the ability of a user to access directly from the endpoint you forced to go through.<\/p>\n<p>170<br \/>00:22:03.840 &#8211;&gt; 00:22:12.150<br \/>Geremy Meyers: The data Center all the security controls anything you might have running there as well before you access that that traffic now does that introducing latency probably a little bit depends on the APP.<\/p>\n<p>171<br \/>00:22:12.630 &#8211;&gt; 00:22:17.160<br \/>Geremy Meyers: But you know again there&#8217;s another security control, you can enable you know and that&#8217;s an area.<\/p>\n<p>172<br \/>00:22:20.610 &#8211;&gt; 00:22:33.930<br \/>Andy Whiteside: So we really in our world have two options one we can make it so great in the digital workspace row with single identity multifactor challenge but single sign on after that that they want to use it, what we try to do as INTEGRA.<\/p>\n<p>173<br \/>00:22:34.320 &#8211;&gt; 00:22:42.090<br \/>Andy Whiteside: What I noticed that the other day i&#8217;ve still got very smart people my company that are going out and logging in to everything creating links on their browser on their computer and.<\/p>\n<p>174<br \/>00:22:42.420 &#8211;&gt; 00:22:44.850<br \/>Andy Whiteside: And then creating the same links on their home computer and then.<\/p>\n<p>175<br \/>00:22:45.390 &#8211;&gt; 00:22:55.530<br \/>Andy Whiteside: we&#8217;ve got multifactor turned out everywhere, but they&#8217;re building their own system around and i&#8217;m like why don&#8217;t you just use what we sell and the only way i&#8217;m ever going to get us all there is to turn off the ability to go around this.<\/p>\n<p>176<br \/>00:22:55.980 &#8211;&gt; 00:22:56.250<br \/>yep.<\/p>\n<p>177<br \/>00:22:57.660 &#8211;&gt; 00:23:06.120<br \/>Geremy Meyers: yep so a lot of a lot like two points so right, you know sales for some of these sites can do that today just whitelist blacklist work in this traffic come from yep.<\/p>\n<p>178<br \/>00:23:07.170 &#8211;&gt; 00:23:13.440<br \/>Geremy Meyers: hey what&#8217;s up some cases it&#8217;s not like bill said, if you don&#8217;t know your password, then you have to go to the workspace you can&#8217;t.<\/p>\n<p>179<br \/>00:23:14.490 &#8211;&gt; 00:23:17.250<br \/>Geremy Meyers: You can&#8217;t type it in direct because you just don&#8217;t know yeah.<\/p>\n<p>180<br \/>00:23:18.630 &#8211;&gt; 00:23:32.310<br \/>Andy Whiteside: hey did we hit on in this topic deal ability yeah you mentioned the sandbox browser I don&#8217;t know that we mentioned the browser as a service, yet I think it applies here, we use it we use it for DEMO purposes for our salesforce within our workspace as well as our outlook.<\/p>\n<p>181<br \/>00:23:33.780 &#8211;&gt; 00:23:46.740<br \/>Andy Whiteside: But you know the sandbox browser that&#8217;s part of your workspace APP as well as the browser as a service which is you know chromium running on a Linux machine in azure reboots battle gold image that applies is one of the stories here T right.<\/p>\n<p>182<br \/>00:23:47.520 &#8211;&gt; 00:23:55.260<br \/>Geremy Meyers: It does it does and I guess I don&#8217;t necessarily delineate when I talk about the isolated browser so we do have a service that is hosted.<\/p>\n<p>183<br \/>00:23:55.620 &#8211;&gt; 00:24:09.240<br \/>Geremy Meyers: By citrix it is basically a Zen APP delivered, so now it is a virtual APP running a browser that&#8217;s that&#8217;s that&#8217;s taking that link in isolating it for you, but there is a browser built in the workspace APP in fact.<\/p>\n<p>184<br \/>00:24:09.960 &#8211;&gt; 00:24:20.640<br \/>Geremy Meyers: it&#8217;s chromium based it&#8217;s actually super fast and honestly the user experience, based on the first version we had it&#8217;s pretty impressive, in fact, sometimes I forget that it&#8217;s not you know it&#8217;s not chrome.<\/p>\n<p>185<br \/>00:24:21.870 &#8211;&gt; 00:24:23.430<br \/>Geremy Meyers: There was magic my my local chrome browser.<\/p>\n<p>186<br \/>00:24:23.850 &#8211;&gt; 00:24:30.780<br \/>Andy Whiteside: dumb question for me, is there a way to call that browser from the workspace APP other than being redirected by the workspace itself.<\/p>\n<p>187<br \/>00:24:33.330 &#8211;&gt; 00:24:35.970<br \/>Geremy Meyers: Ask that one more time will be the only thing through that as you&#8217;re saying.<\/p>\n<p>188<br \/>00:24:36.150 &#8211;&gt; 00:24:38.370<br \/>Andy Whiteside: Like click if you can see my screen here, which I think you can.<\/p>\n<p>189<br \/>00:24:38.730 &#8211;&gt; 00:24:52.020<br \/>Andy Whiteside: Like is there a way the call the sandbox browser or is it simply a matter of publishing something and it being told us the local sandbox browser to do this under these conditions.<\/p>\n<p>190<br \/>00:24:52.440 &#8211;&gt; 00:25:02.880<br \/>Geremy Meyers: Right now, if you have to call a link that pulls up the browser but i&#8217;ll be honest, I wish we would add that function I don&#8217;t know if it&#8217;s on the roadmap, but I would love to pull up just that sandbox browser because it&#8217;s that good.<\/p>\n<p>191<br \/>00:25:03.360 &#8211;&gt; 00:25:13.590<br \/>Andy Whiteside: and on my computer here i&#8217;m essentially doing that i&#8217;ve got chromium on part of my ideal solution that you can probably see on the screen here but it&#8217;s not not the same as a truly isolated sandbox browser this one is a.<\/p>\n<p>192<br \/>00:25:14.160 &#8211;&gt; 00:25:21.600<br \/>Andy Whiteside: Part of the idol sandbox which is not I don&#8217;t think that part&#8217;s totally read only that that is that can have some residuals.<\/p>\n<p>193<br \/>00:25:22.950 &#8211;&gt; 00:25:27.990<br \/>Geremy Meyers: Are you showing it any I can&#8217;t see it, maybe i&#8217;m wrong I forgot I forgot to use a computer.<\/p>\n<p>194<br \/>00:25:28.380 &#8211;&gt; 00:25:29.910<br \/>Andy Whiteside: No, no, no you&#8217;re good now how about now.<\/p>\n<p>195<br \/>00:25:32.460 &#8211;&gt; 00:25:33.780<br \/>Geremy Meyers: Other we are yeah I got you.<\/p>\n<p>196<br \/>00:25:34.710 &#8211;&gt; 00:25:41.340<br \/>Andy Whiteside: that&#8217;s my real world, I go to death, like a for desktops I really should have one or two, but I own a company, therefore, have four.<\/p>\n<p>197<br \/>00:25:43.320 &#8211;&gt; 00:25:49.470<br \/>Andy Whiteside: But i&#8217;ve got workspace right here, I would love to be able to just call a you know generic sandbox browser and know that inside that APP.<\/p>\n<p>198<br \/>00:25:49.920 &#8211;&gt; 00:26:02.850<br \/>Andy Whiteside: i&#8217;ve created this you know truly isolated go away when I close it world and i&#8217;m in control of it, the best I have right now in this ideal unit, at least, is to use the the chromium that&#8217;s included as part I don&#8217;t.<\/p>\n<p>199<br \/>00:26:03.750 &#8211;&gt; 00:26:15.540<br \/>Geremy Meyers: yeah we don&#8217;t we don&#8217;t have that just yet, the browser service does that I think there&#8217;s I don&#8217;t think there&#8217;s residuals on the workspace hub, but I also can&#8217;t just call that workspace if either not yet.<\/p>\n<p>200<br \/>00:26:15.810 &#8211;&gt; 00:26:17.130<br \/>Geremy Meyers: I have to go on a link first.<\/p>\n<p>201<br \/>00:26:17.430 &#8211;&gt; 00:26:22.560<br \/>Andy Whiteside: On chrome browser secure and it&#8217;s going to probably use your chrome service.<\/p>\n<p>202<br \/>00:26:22.770 &#8211;&gt; 00:26:27.750<br \/>Andy Whiteside: I believe and i&#8217;m going to have what I need it just takes another click or two but that&#8217;s okay.<\/p>\n<p>203<br \/>00:26:30.120 &#8211;&gt; 00:26:34.350<br \/>Geremy Meyers: yeah I think that I think this is probably calling the service to yeah like you said.<\/p>\n<p>204<br \/>00:26:34.410 &#8211;&gt; 00:26:41.520<br \/>Andy Whiteside: will be, we will see the desktop view or toolbar inside well we&#8217;ll see we&#8217;ll see an old school citrix launch but fast and very lightweight.<\/p>\n<p>205<br \/>00:26:42.630 &#8211;&gt; 00:26:42.990<br \/>Geremy Meyers: yeah.<\/p>\n<p>206<br \/>00:26:45.150 &#8211;&gt; 00:26:46.500<br \/>Andy Whiteside: yeah yeah dragged around.<\/p>\n<p>207<br \/>00:26:47.040 &#8211;&gt; 00:26:49.500<br \/>Geremy Meyers: In, even though this is an isolated browser.<\/p>\n<p>208<br \/>00:26:50.940 &#8211;&gt; 00:26:59.490<br \/>Geremy Meyers: We still got the ability to proxy into your data Center So if you got an internally hosted web APP we can still present that inside of that isolated browser so we&#8217;ve got a.<\/p>\n<p>209<br \/>00:27:00.150 &#8211;&gt; 00:27:05.880<br \/>Geremy Meyers: We got appliance that sits in your data Center called the connector appliance and it does all of that proxy for here, which is nice.<\/p>\n<p>210<br \/>00:27:06.450 &#8211;&gt; 00:27:06.720<br \/>Now.<\/p>\n<p>211<br \/>00:27:08.280 &#8211;&gt; 00:27:13.860<br \/>Andy Whiteside: I think we&#8217;re really talking about this whole conversation is citrix is a massive security company and security play.<\/p>\n<p>212<br \/>00:27:14.250 &#8211;&gt; 00:27:14.790<br \/>Geremy Meyers: It is.<\/p>\n<p>213<br \/>00:27:15.210 &#8211;&gt; 00:27:30.600<br \/>Andy Whiteside: it&#8217;s not the ecosystem you guys want to go disrupt every other partner of yours and ecosystem, so you don&#8217;t you don&#8217;t talk about it as much as you could and because it takes one extra level of thinking to get people there, a lot of people don&#8217;t come to their own conclusions.<\/p>\n<p>214<br \/>00:27:31.710 &#8211;&gt; 00:27:38.100<br \/>Geremy Meyers: So I think we could do a better job of just understanding when I say we, I mean you know citrix.<\/p>\n<p>215<br \/>00:27:38.430 &#8211;&gt; 00:27:46.050<br \/>Geremy Meyers: We can do a better job of understanding the applications that are that our customers are deploying outside of what i&#8217;m gonna use air quotes citrix right.<\/p>\n<p>216<br \/>00:27:46.860 &#8211;&gt; 00:27:52.500<br \/>Geremy Meyers: So we&#8217;ll focus in on, in fact, sometimes customers, just because I don&#8217;t know we&#8217;ll just assume we&#8217;re talking about what they&#8217;re delivering with citrix.<\/p>\n<p>217<br \/>00:27:52.830 &#8211;&gt; 00:28:02.730<br \/>Geremy Meyers: And they&#8217;ll tell us what that is and we&#8217;ll talk to their use cases and things like that other user groups there are scenarios, but then we don&#8217;t always go next level and go well, what are you delivering outside of citrix you know and sometimes that&#8217;s a.<\/p>\n<p>218<br \/>00:28:03.990 &#8211;&gt; 00:28:07.260<br \/>Geremy Meyers: Sometimes a question that our normal context don&#8217;t know.<\/p>\n<p>219<br \/>00:28:07.830 &#8211;&gt; 00:28:16.950<br \/>Geremy Meyers: But sometimes it&#8217;s just they haven&#8217;t thought of well heck yeah I mean i&#8217;ll get all these public websites that i&#8217;m sending folks to I never really thought of that is what we&#8217;re using right so that&#8217;s just an easy conversation to have.<\/p>\n<p>220<br \/>00:28:18.150 &#8211;&gt; 00:28:23.580<br \/>Andy Whiteside: What if I could put on my transparent with you real quick I think when your problems is a lot of partners like INTEGRA they&#8217;re.<\/p>\n<p>221<br \/>00:28:23.850 &#8211;&gt; 00:28:34.950<br \/>Andy Whiteside: happy to sell the citrix solution but also sell these other security plays that if you execute as a citrix play correctly, you wouldn&#8217;t be able to sell the other stuff so a lot of times the message never lands.<\/p>\n<p>222<br \/>00:28:36.300 &#8211;&gt; 00:28:41.910<br \/>Geremy Meyers: Just by on the flip side of the flip side, I might say that you know I think security in general.<\/p>\n<p>223<br \/>00:28:42.330 &#8211;&gt; 00:28:48.630<br \/>Geremy Meyers: Is a layered approach, and so I mean I think there&#8217;s space to layer in what citrix we can do from this solution into.<\/p>\n<p>224<br \/>00:28:48.930 &#8211;&gt; 00:28:53.580<br \/>Geremy Meyers: Maybe some of those I don&#8217;t we&#8217;re not getting very specific here, but you know what some of those other solutions are.<\/p>\n<p>225<br \/>00:28:54.180 &#8211;&gt; 00:29:03.810<br \/>Geremy Meyers: Because again there&#8217;s not one solution that does security across the board, and you know a lot of our conversations with customers is where to citrix and what we&#8217;re doing play into maybe their existing security strategy.<\/p>\n<p>226<br \/>00:29:04.290 &#8211;&gt; 00:29:08.160<br \/>Geremy Meyers: Now, what do we, where do we meet some layers and are we going to display some products, probably.<\/p>\n<p>227<br \/>00:29:08.730 &#8211;&gt; 00:29:19.290<br \/>Geremy Meyers: But on the flip side I think we&#8217;re going to find that we need to integrate nicely with some of these other products as well, I mean listen i&#8217;ll use okta is a great example right so understanding what Dr does and understanding the value there.<\/p>\n<p>228<br \/>00:29:19.650 &#8211;&gt; 00:29:30.360<br \/>Geremy Meyers: I think there&#8217;s a great story, I mean we can leverage and integrate okta into the workspace In fact we do it at citrix today but understanding what that solution does and where they live together is pretty important.<\/p>\n<p>229<br \/>00:29:31.230 &#8211;&gt; 00:29:34.680<br \/>Andy Whiteside: It bill would you like to see the anti virus i&#8217;m running on this I gel read only unit.<\/p>\n<p>230<br \/>00:29:35.640 &#8211;&gt; 00:29:38.130<br \/>Andy Whiteside: Sure Okay, where do I find it.<\/p>\n<p>231<br \/>00:29:38.550 &#8211;&gt; 00:29:38.820<br \/>This is.<\/p>\n<p>232<br \/>00:29:42.210 &#8211;&gt; 00:29:47.700<br \/>Andy Whiteside: Just don&#8217;t need it right, but if I sold you a windows endpoint guess what I could sell you antivirus for the vdi and for the endpoint and.<\/p>\n<p>233<br \/>00:29:51.540 &#8211;&gt; 00:30:07.590<br \/>Andy Whiteside: it&#8217;s not the right okay next one is increased private web APP security without disrupting ux or user experience again acronyms everywhere, how does private web APP compared to SAS JEREMY I don&#8217;t know why we use in different terms, this time.<\/p>\n<p>234<br \/>00:30:09.000 &#8211;&gt; 00:30:11.190<br \/>Geremy Meyers: And when we get down into that here real quick.<\/p>\n<p>235<br \/>00:30:14.700 &#8211;&gt; 00:30:15.840<br \/>Andy Whiteside: Oh no man i&#8217;m sorry.<\/p>\n<p>236<br \/>00:30:16.530 &#8211;&gt; 00:30:23.730<br \/>Geremy Meyers: I mean it&#8217;s it&#8217;s an internal SAS APP is what it is, so you know, obviously, their public websites, and this is a private website So how do you grant access.<\/p>\n<p>237<br \/>00:30:24.930 &#8211;&gt; 00:30:27.420<br \/>Geremy Meyers: To those those Apps So what do we do in the past.<\/p>\n<p>238<br \/>00:30:28.860 &#8211;&gt; 00:30:29.880<br \/>Geremy Meyers: We published a browser.<\/p>\n<p>239<br \/>00:30:30.180 &#8211;&gt; 00:30:31.320<br \/>Geremy Meyers: We poured us chrome.<\/p>\n<p>240<br \/>00:30:31.380 &#8211;&gt; 00:30:35.730<br \/>Geremy Meyers: IE whatever right or desktop and that&#8217;s how we granted access so now.<\/p>\n<p>241<br \/>00:30:36.900 &#8211;&gt; 00:30:47.610<br \/>Geremy Meyers: You know, we could provide just a link on that same workspace that proxies you right into it, without the virtualization please not mean the desktop but not even windows in the background, the hosted.<\/p>\n<p>242<br \/>00:30:48.450 &#8211;&gt; 00:30:58.560<br \/>Andy Whiteside: Well, you got a ton of us a while ago, you talked about actually publishing a secure browser service that has a backdoor into your environment you&#8217;ve got external access to your internal.<\/p>\n<p>243<br \/>00:31:00.030 &#8211;&gt; 00:31:05.700<br \/>Bill Sutton: And without without having to instantiate a vpn client a virtual private network client on your endpoint right.<\/p>\n<p>244<br \/>00:31:06.690 &#8211;&gt; 00:31:23.130<br \/>Geremy Meyers: Correct, so I think so, the answer is yes, so for public websites, you know absolutely for private websites absolutely you know when we get into vpn you know, I think that maybe is a maybe we&#8217;ll save that one for the next one, we talked about client server ads but.<\/p>\n<p>245<br \/>00:31:23.580 &#8211;&gt; 00:31:23.700<br \/>Andy Whiteside: You.<\/p>\n<p>246<br \/>00:31:23.850 &#8211;&gt; 00:31:31.650<br \/>Geremy Meyers: are correct it&#8217;s a client was access it&#8217;s a reverse proxy into an internal website and you&#8217;re protected, because there&#8217;s nothing about that into a website that&#8217;s exposed.<\/p>\n<p>247<br \/>00:31:32.790 &#8211;&gt; 00:31:41.190<br \/>Andy Whiteside: had a conversation with a college computer science get super smart and I try to explain some of this another day so on the back boards over beer and.<\/p>\n<p>248<br \/>00:31:42.600 &#8211;&gt; 00:31:51.810<br \/>Andy Whiteside: And he got like a vpn and i&#8217;m like get that thought out of your mind if you ever use the vpn and going forward you&#8217;re doing it wrong just remember I said.<\/p>\n<p>249<br \/>00:31:54.690 &#8211;&gt; 00:32:00.150<br \/>Geremy Meyers: that&#8217;s awesome i&#8217;m just impressed that he knew what a vpn was, I think we&#8217;re starting to turn away from that, generally speaking, I always hope we are.<\/p>\n<p>250<br \/>00:32:00.720 &#8211;&gt; 00:32:05.310<br \/>Andy Whiteside: Well he&#8217;s doing his college internship now they just hired in full time he&#8217;s so awesome he&#8217;s still in.<\/p>\n<p>251<br \/>00:32:05.310 &#8211;&gt; 00:32:10.620<br \/>Andy Whiteside: kalia um but they&#8217;re so far behind they&#8217;re there they&#8217;re poisoning the water hole.<\/p>\n<p>252<br \/>00:32:13.380 &#8211;&gt; 00:32:21.000<br \/>Geremy Meyers: yeah so I mean when you think about how vpn work right, you know you&#8217;ve created a tunnel from that end point into the data Center.<\/p>\n<p>253<br \/>00:32:21.300 &#8211;&gt; 00:32:22.050<br \/>Geremy Meyers: We talked about that he.<\/p>\n<p>254<br \/>00:32:22.320 &#8211;&gt; 00:32:24.480<br \/>Andy Whiteside: Had in 1997 and the one I could have right now.<\/p>\n<p>255<br \/>00:32:25.410 &#8211;&gt; 00:32:29.220<br \/>Geremy Meyers: So, to be fair vpn haven&#8217;t changed that much they might have.<\/p>\n<p>256<br \/>00:32:30.120 &#8211;&gt; 00:32:37.800<br \/>Geremy Meyers: They might have transitioned from like IP SEC to ssl but the end of the day, it&#8217;s still does the same thing, which is open up a tunnel to the data Center which by the way.<\/p>\n<p>257<br \/>00:32:38.250 &#8211;&gt; 00:32:47.880<br \/>Geremy Meyers: isn&#8217;t explicit allow right, and so it he&#8217;s got to go into security teams got to go in and actually create access control list and say hey, this is what you can&#8217;t do once you&#8217;ve connected.<\/p>\n<p>258<br \/>00:32:48.330 &#8211;&gt; 00:32:55.200<br \/>Geremy Meyers: And that&#8217;s what we call leaky which means that&#8217;s hard to maintain like, how do you know you know what&#8217;s new that you need to go block so.<\/p>\n<p>259<br \/>00:32:55.680 &#8211;&gt; 00:33:07.290<br \/>Geremy Meyers: I think what we&#8217;re doing with our Z tna our secure private access with what we&#8217;re calling the zero trust network access is it&#8217;s an explicit deny, and then you got to go turn on what&#8217;s allowed through which is much, much different.<\/p>\n<p>260<br \/>00:33:08.580 &#8211;&gt; 00:33:10.650<br \/>Andy Whiteside: When we talk about zero trust real quick.<\/p>\n<p>261<br \/>00:33:11.640 &#8211;&gt; 00:33:12.990<br \/>Andy Whiteside: Because we&#8217;re even i&#8217;m a.<\/p>\n<p>262<br \/>00:33:13.440 &#8211;&gt; 00:33:18.720<br \/>Andy Whiteside: bill to build a some degree, but you and I live in a place where a lot of folks from the north have moved to the south correct.<\/p>\n<p>263<br \/>00:33:19.350 &#8211;&gt; 00:33:21.090<br \/>Geremy Meyers: um you are not wrong.<\/p>\n<p>264<br \/>00:33:22.470 &#8211;&gt; 00:33:29.280<br \/>Andy Whiteside: Is it fair to say that most people from the north have a zero trust posture that people in the south are just now starting to understand.<\/p>\n<p>265<br \/>00:33:30.210 &#8211;&gt; 00:33:32.010<br \/>Geremy Meyers: we&#8217;re not even talking about technology are we.<\/p>\n<p>266<br \/>00:33:32.130 &#8211;&gt; 00:33:35.490<br \/>Geremy Meyers: Just general just life viewpoints.<\/p>\n<p>267<br \/>00:33:36.990 &#8211;&gt; 00:33:50.130<br \/>Andy Whiteside: i&#8217;ve got a friend of mine, now that lives, it has a condo some some place I do and her name is Linda and I met her and then three days later, I approached Linda again, and she was guard up immediately because she didn&#8217;t remember meeting me.<\/p>\n<p>268<br \/>00:33:50.610 &#8211;&gt; 00:33:50.880<br \/>\u0914\u0930<\/p>\n<p>269<br \/>00:33:52.140 &#8211;&gt; 00:33:56.850<br \/>Andy Whiteside: I went up to give her a hug and she bought she was about to call the police on me because.<\/p>\n<p>270<br \/>00:33:57.810 &#8211;&gt; 00:34:01.650<br \/>Geremy Meyers: So what you needed to do and zero trust road is re authenticate yourself with her.<\/p>\n<p>271<br \/>00:34:01.710 &#8211;&gt; 00:34:02.700<br \/>Geremy Meyers: So that she knows.<\/p>\n<p>272<br \/>00:34:03.060 &#8211;&gt; 00:34:03.480<br \/>it&#8217;s right.<\/p>\n<p>273<br \/>00:34:04.710 &#8211;&gt; 00:34:07.410<br \/>Geremy Meyers: Maybe maybe MFA with some knowledge that we met before.<\/p>\n<p>274<br \/>00:34:08.340 &#8211;&gt; 00:34:16.800<br \/>Andy Whiteside: I should have approached her and said hey man nice meeting you Sunday night at the Homeowners association meeting i&#8217;m Andy good to see you again now, can I have a hug.<\/p>\n<p>275<br \/>00:34:18.450 &#8211;&gt; 00:34:27.300<br \/>Geremy Meyers: Sometimes, sometimes that needs to be, and until the algorithm realizes who you are based on the analytics man, you know what we can really run with this idea if we let ourselves.<\/p>\n<p>276<br \/>00:34:28.290 &#8211;&gt; 00:34:29.160<br \/>Andy Whiteside: What this is all about.<\/p>\n<p>277<br \/>00:34:29.190 &#8211;&gt; 00:34:30.120<br \/>Geremy Meyers: it&#8217;s about is.<\/p>\n<p>278<br \/>00:34:30.540 &#8211;&gt; 00:34:38.040<br \/>Andy Whiteside: Coming from a world where you know there&#8217;s bad stuff happening, and you have a guard that you takes two or three authentication before you let it down a little bit.<\/p>\n<p>279<br \/>00:34:40.200 &#8211;&gt; 00:34:43.530<br \/>Geremy Meyers: Actually really liked it i&#8217;m gonna steal that that&#8217;s good that&#8217;s true.<\/p>\n<p>280<br \/>00:34:44.910 &#8211;&gt; 00:34:53.610<br \/>Andy Whiteside: So what have we not covered here in the zero trust world of private web Apps Ak private SAS that we still need to cover.<\/p>\n<p>281<br \/>00:34:54.690 &#8211;&gt; 00:35:06.840<br \/>Geremy Meyers: um you know I would I would layer on, because this is internal these web Apps that we&#8217;re talking about our internal it still doesn&#8217;t it doesn&#8217;t change, the need to protect the Web APP itself right so even though i&#8217;ve provided access.<\/p>\n<p>282<br \/>00:35:08.040 &#8211;&gt; 00:35:16.830<br \/>Geremy Meyers: I mean listen folks could still script it right, you can still find a way in and maybe do some cross site scripting all the things that you would normally use a web APP firewall for.<\/p>\n<p>283<br \/>00:35:17.370 &#8211;&gt; 00:35:25.410<br \/>Geremy Meyers: So just just building awareness around the fact that you know, even though you&#8217;ve allowed access, you know, this is still something internal your networking to protect so.<\/p>\n<p>284<br \/>00:35:25.740 &#8211;&gt; 00:35:41.100<br \/>Geremy Meyers: The same reason you deployed at CES in the past, is the same reason you&#8217;ll need to deploy an ABC or you know we&#8217;ve got etc as a service now protect that application, you know, with some sort of you know web APP firewall you know, or even more importantly, these days, protect the API.<\/p>\n<p>285<br \/>00:35:42.180 &#8211;&gt; 00:35:54.360<br \/>Andy Whiteside: So I thought was going to show you that I i&#8217;m in what I put up on the screen, here is my non persistent gpu enabled vdi and until right now bus routes to use the post podcast was blocked.<\/p>\n<p>286<br \/>00:35:55.050 &#8211;&gt; 00:35:55.320<br \/>Geremy Meyers: or.<\/p>\n<p>287<br \/>00:35:55.560 &#8211;&gt; 00:36:04.440<br \/>Andy Whiteside: You know, social media consumer or something um so yeah I mean there&#8217;s firewall at firewall related things inbound and outbound outbound this case.<\/p>\n<p>288<br \/>00:36:04.890 &#8211;&gt; 00:36:14.280<br \/>Andy Whiteside: I mean all that stuff still matters and and I could show you in my tray running here, I have the citrix workspace APP so I could use that.<\/p>\n<p>289<br \/>00:36:14.760 &#8211;&gt; 00:36:28.860<br \/>Andy Whiteside: To have rules that prevent where I can go to once I got into here, which is my kind of jumping off point I still need to have control where I go after that and citrix is enabling both the access and the security on both pieces of the equation that same time.<\/p>\n<p>290<br \/>00:36:32.490 &#8211;&gt; 00:36:34.350<br \/>Geremy Meyers: Oh, and by the way, Nice background wallpaper alone.<\/p>\n<p>291<br \/>00:36:35.310 &#8211;&gt; 00:36:35.790<br \/>rebel.<\/p>\n<p>292<br \/>00:36:36.810 &#8211;&gt; 00:36:39.120<br \/>Andy Whiteside: is missing the citrix one, though I couldn&#8217;t find exactly the one.<\/p>\n<p>293<br \/>00:36:41.700 &#8211;&gt; 00:36:54.660<br \/>Andy Whiteside: And I know you&#8217;ve probably heard me say this 10 times I promise on the podcast I had the original Red Bull meeting at the nascar team, this was my and and been grieves idea, long before citrix and the Formula one team to.<\/p>\n<p>294<br \/>00:36:55.530 &#8211;&gt; 00:36:58.980<br \/>Geremy Meyers: Oh, my man, I want to hear that story at some point that&#8217;s interesting.<\/p>\n<p>295<br \/>00:37:00.060 &#8211;&gt; 00:37:17.790<br \/>Andy Whiteside: yep all right did did to do, moving on the next section, and I think it&#8217;s our last section, it says, simplify secure remote user access to private client server Apps Okay, we talked about publix asked about internal private SAS what is this part talking about.<\/p>\n<p>296<br \/>00:37:18.270 &#8211;&gt; 00:37:19.770<br \/>Geremy Meyers: So this is.<\/p>\n<p>297<br \/>00:37:20.790 &#8211;&gt; 00:37:30.570<br \/>Geremy Meyers: Think of it almost like a personal, let me, let me take a step back and say for performance reasons, this might not be a great idea for a lot of clients or application so.<\/p>\n<p>298<br \/>00:37:31.020 &#8211;&gt; 00:37:38.910<br \/>Geremy Meyers: You know, think about how folks are using vpn today right, so I establish vpn tunnel I fire up the local on my local machine.<\/p>\n<p>299<br \/>00:37:39.240 &#8211;&gt; 00:37:45.150<br \/>Geremy Meyers: The client side of a server client server APP and then i&#8217;m hitting you know the the server APP and the data set right so.<\/p>\n<p>300<br \/>00:37:45.750 &#8211;&gt; 00:37:53.580<br \/>Geremy Meyers: So the anti version of what we&#8217;ve deployed citrix for years, you know, the idea of putting the client right next to the server in the data Center to make the performance better.<\/p>\n<p>301<br \/>00:37:53.820 &#8211;&gt; 00:38:03.240<br \/>Geremy Meyers: There might be some scenarios, where you need to put the client on the endpoint or that&#8217;s maybe that&#8217;s just how it works and you want to provide access back in right, so we talked about vpn a little little bit ago where.<\/p>\n<p>302<br \/>00:38:03.690 &#8211;&gt; 00:38:13.230<br \/>Geremy Meyers: You fire up a vpn and it&#8217;s almost like an explicit allow, so this is zero trust network access, so this is like a restricted vpn where once you&#8217;ve connected.<\/p>\n<p>303<br \/>00:38:13.830 &#8211;&gt; 00:38:21.750<br \/>Geremy Meyers: it&#8217;s an explicit you know disallow so you can&#8217;t pass traffic and you&#8217;ve got to go in and actually allow traffic so, for instance, if I wanted to allow.<\/p>\n<p>304<br \/>00:38:22.170 &#8211;&gt; 00:38:34.590<br \/>Geremy Meyers: You know, secure Shell because i&#8217;m an IT admin I can fire, a party on my local machine through this this service here connect into maybe a server back in the data Center but the only thing i&#8217;m allowing through is you know port 22 for secure shell.<\/p>\n<p>305<br \/>00:38:35.670 &#8211;&gt; 00:38:39.150<br \/>Geremy Meyers: You know, we point out, maybe you know exchange here or potentially sequel.<\/p>\n<p>306<br \/>00:38:40.320 &#8211;&gt; 00:38:48.390<br \/>Geremy Meyers: same idea applies, but again at the end of that you got to figure out what makes sense to do something like this, because you might impact performance but.<\/p>\n<p>307<br \/>00:38:49.080 &#8211;&gt; 00:39:00.390<br \/>Geremy Meyers: it&#8217;s like a more secure vpn is essentially what it is and to take it a step further, we can layer on all of the zero trust access as well, so, for instance, the the multifactor the endpoint analysis.<\/p>\n<p>308<br \/>00:39:01.530 &#8211;&gt; 00:39:11.160<br \/>Geremy Meyers: Does adding additional security control that&#8217;s all a part of this access as well and, more importantly, you know some of the security analytics that we can factor as well, so where you&#8217;re coming from you know that might.<\/p>\n<p>309<br \/>00:39:12.660 &#8211;&gt; 00:39:24.810<br \/>Geremy Meyers: You know the posture of the machine might, let us know whether or not you can you know access at all, but this is what we&#8217;re talking about here, this is client server access with the client on your machine the server back in the data Center and providing that access back in.<\/p>\n<p>310<br \/>00:39:25.860 &#8211;&gt; 00:39:28.800<br \/>Andy Whiteside: And is that client we&#8217;re talking about really just the citrix workspace out.<\/p>\n<p>311<br \/>00:39:29.880 &#8211;&gt; 00:39:39.900<br \/>Geremy Meyers: Today it&#8217;s not it&#8217;s it&#8217;s the it&#8217;s actually a secure access client from citrix that you would use to tie in, but I know the Roadmap is to integrate that functionality and workspace out it&#8217;s just not there today.<\/p>\n<p>312<br \/>00:39:41.040 &#8211;&gt; 00:39:53.280<br \/>Andy Whiteside: And I would add one word what you&#8217;re saying, do we know this and tying all that other stuff together intelligently right, we can do it based on endpoint analysis, we can do it in real time, whatever you&#8217;re accessing it&#8217;s like you said.<\/p>\n<p>313<br \/>00:39:54.300 &#8211;&gt; 00:39:59.250<br \/>Andy Whiteside: Zero trusting, but we can even get smart about how when where we trust things.<\/p>\n<p>314<br \/>00:39:59.730 &#8211;&gt; 00:40:05.730<br \/>Geremy Meyers: yep and we can segment to specific Apps to so that that&#8217;s probably one of the key pieces here.<\/p>\n<p>315<br \/>00:40:06.480 &#8211;&gt; 00:40:09.540<br \/>Andy Whiteside: He built do we have a single customer that&#8217;s implemented this.<\/p>\n<p>316<br \/>00:40:10.020 &#8211;&gt; 00:40:16.560<br \/>Bill Sutton: Not all the way through now actually I can&#8217;t think of one that&#8217;s done even the basic secure private access.<\/p>\n<p>317<br \/>00:40:17.520 &#8211;&gt; 00:40:18.750<br \/>Bill Sutton: But yeah we have.<\/p>\n<p>318<br \/>00:40:18.930 &#8211;&gt; 00:40:20.460<br \/>Andy Whiteside: Lots of customers that need to do this.<\/p>\n<p>319<br \/>00:40:20.670 &#8211;&gt; 00:40:21.570<br \/>Bill Sutton: Sure yeah.<\/p>\n<p>320<br \/>00:40:21.960 &#8211;&gt; 00:40:23.130<br \/>Bill Sutton: They just don&#8217;t know about it.<\/p>\n<p>321<br \/>00:40:24.810 &#8211;&gt; 00:40:26.370<br \/>Andy Whiteside: I just I don&#8217;t know how to fix it, I mean.<\/p>\n<p>322<br \/>00:40:27.960 &#8211;&gt; 00:40:36.810<br \/>Bill Sutton: that&#8217;s an assumption on my part, but you know they you know when they when they go to the grocery store and they they only want milk that&#8217;s that&#8217;s what they gotta go looking for they don&#8217;t know that there&#8217;s.<\/p>\n<p>323<br \/>00:40:37.110 &#8211;&gt; 00:40:41.490<br \/>Bill Sutton: all kinds of other things available to them unless they look or pay attention yeah.<\/p>\n<p>324<br \/>00:40:42.030 &#8211;&gt; 00:40:52.020<br \/>Geremy Meyers: So here&#8217;s what i&#8217;ll say we officially released secure private access beginning April right so it&#8217;s fairly fresh from a from a skewed perspective now granted.<\/p>\n<p>325<br \/>00:40:52.710 &#8211;&gt; 00:40:59.910<br \/>Geremy Meyers: The things around CC single sign on multi factor publishing the Web Apps, and this has been something that&#8217;s been in workspace for a couple of years now, so not.<\/p>\n<p>326<br \/>00:41:00.270 &#8211;&gt; 00:41:04.290<br \/>Geremy Meyers: not new, but when we talk about adaptive off that&#8217;s a brand new feature that was just released.<\/p>\n<p>327<br \/>00:41:05.160 &#8211;&gt; 00:41:20.910<br \/>Geremy Meyers: It the beginning of the quarter the zero trust network access that we just talked about that private access for client server web Apps that&#8217;s still tech preview so that hasn&#8217;t released just yet, so I guess what i&#8217;m saying is i&#8217;m giving you a past but moving forward, we have no excuse.<\/p>\n<p>328<br \/>00:41:20.970 &#8211;&gt; 00:41:30.120<br \/>Bill Sutton: But I think any customer that&#8217;s publishing a web browser to get to a SAS APP is right for this and we have customers to do that today.<\/p>\n<p>329<br \/>00:41:30.570 &#8211;&gt; 00:41:31.530<br \/>Andy Whiteside: I mean, most of them.<\/p>\n<p>330<br \/>00:41:31.860 &#8211;&gt; 00:41:32.880<br \/>Bill Sutton: Yes, and.<\/p>\n<p>331<br \/>00:41:33.510 &#8211;&gt; 00:41:34.530<br \/>Geremy Meyers: Very many of them.<\/p>\n<p>332<br \/>00:41:34.950 &#8211;&gt; 00:41:40.680<br \/>Bill Sutton: yeah all of them and very many of them will use a published APP or even a public desktop, as you said earlier, Jeremy to get.<\/p>\n<p>333<br \/>00:41:40.980 &#8211;&gt; 00:41:48.210<br \/>Bill Sutton: Internal web APP or an internal application of some sort now if you&#8217;re talking about you know, on premises dynamics or something like that.<\/p>\n<p>334<br \/>00:41:48.480 &#8211;&gt; 00:41:59.250<br \/>Bill Sutton: you&#8217;re not going to want to use this I don&#8217;t think you&#8217;re going to want to use this secure remote user access to client server because the shadiness of that APP the whole we did citrix To begin with, or part of the reason of.<\/p>\n<p>335<br \/>00:41:59.850 &#8211;&gt; 00:42:13.920<br \/>Bill Sutton: Delivering the the the access as close to the data as possible we don&#8217;t you know if we if we go back a step and do that using the client server concept here from the you know through secure private access that it&#8217;s not going to perform as well.<\/p>\n<p>336<br \/>00:42:14.280 &#8211;&gt; 00:42:20.310<br \/>Bill Sutton: But for those that are you know completely web Apps on Prem or completely SAS Apps absolutely.<\/p>\n<p>337<br \/>00:42:20.730 &#8211;&gt; 00:42:33.270<br \/>Andy Whiteside: But bill, can you argue that when you and I made those decisions back in the day, we were talking 56 K dial up modems in some cases, and now we&#8217;ve got bandwidth and latency that is just near it&#8217;s faster than the land, we had at the time.<\/p>\n<p>338<br \/>00:42:33.630 &#8211;&gt; 00:42:34.500<br \/>Bill Sutton: yeah that&#8217;s true.<\/p>\n<p>339<br \/>00:42:35.580 &#8211;&gt; 00:42:36.600<br \/>Bill Sutton: that&#8217;s absolutely true.<\/p>\n<p>340<br \/>00:42:37.230 &#8211;&gt; 00:42:39.930<br \/>Andy Whiteside: I think a lot of cases citrix is a victim of its own success.<\/p>\n<p>341<br \/>00:42:41.220 &#8211;&gt; 00:42:48.930<br \/>Geremy Meyers: yeah I told the story of someone else you said 36 K mode on the remember our first farm was a dial up modem bank in a server we do 3D.<\/p>\n<p>342<br \/>00:42:50.010 &#8211;&gt; 00:42:55.260<br \/>Bill Sutton: Oh yeah HP net servers daltrey 80s digi boards yeah.<\/p>\n<p>343<br \/>00:42:55.350 &#8211;&gt; 00:42:57.690<br \/>Geremy Meyers: You know the digi board that was the guy right there yeah.<\/p>\n<p>344<br \/>00:42:59.790 &#8211;&gt; 00:43:03.570<br \/>Andy Whiteside: I remember, I had a bank of like 15 modems and i&#8217;d go in there and hear it all the squeaking and.<\/p>\n<p>345<br \/>00:43:03.570 &#8211;&gt; 00:43:05.940<br \/>Andy Whiteside: squawking it was all working.<\/p>\n<p>346<br \/>00:43:07.500 &#8211;&gt; 00:43:08.070<br \/>Geremy Meyers: Yes, sir.<\/p>\n<p>347<br \/>00:43:08.730 &#8211;&gt; 00:43:21.720<br \/>Andy Whiteside: Alright guys got four minutes left i&#8217;ll give it back to you, thank you for joining and get this posted and i&#8217;m going to share it with a couple clients and my sales folks I play the kind of just have people watch this video to listen to podcast something it&#8217;s invaluable not too.<\/p>\n<p>348<br \/>00:43:23.220 &#8211;&gt; 00:43:25.560<br \/>Geremy Meyers: yeah yeah bill Andy I was a pleasure.<\/p>\n<p>349<br \/>00:43:25.740 &#8211;&gt; 00:43:26.340<br \/>Geremy Meyers: till next time.<\/p>\n<p>350<br \/>00:43:26.490 &#8211;&gt; 00:43:27.810<br \/>Bill Sutton: Thanks JEREMY thanks.<\/p>\n<p><\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>For your hybrid workers to do their best, most productive work, they need anywhere access to a wide variety of SaaS and web applications. But today the average business relies &hellip;<\/p>","protected":false},"author":7,"featured_media":65995,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_price":"","_stock":"","_tribe_ticket_header":"","_tribe_default_ticket_provider":"","_tribe_ticket_capacity":"0","_ticket_start_date":"","_ticket_end_date":"","_tribe_ticket_show_description":"","_tribe_ticket_show_not_going":false,"_tribe_ticket_use_global_stock":"","_tribe_ticket_global_stock_level":"","_global_stock_mode":"","_global_stock_cap":"","_tribe_rsvp_for_event":"","_tribe_ticket_going_count":"","_tribe_ticket_not_going_count":"","_tribe_tickets_list":"[]","_tribe_ticket_has_attendee_info_fields":false,"footnotes":""},"categories":[5],"tags":[],"class_list":["post-66043","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-podcast"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>109: The Citrix Session: Increase app security with Citrix<\/title>\n<meta name=\"description\" content=\"For your hybrid workers to do their best, most productive work, they need anywhere access to a wide variety of SaaS and web applications.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/xentegra.com\/hi\/resources\/109-the-citrix-session-citrix-features-explained-increase-app-security-with-citrix-secure-private-access\/\" \/>\n<meta property=\"og:locale\" content=\"hi_IN\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"109: The Citrix Session: Increase app security with Citrix\" \/>\n<meta property=\"og:description\" content=\"For your hybrid workers to do their best, most productive work, they need anywhere access to a wide variety of SaaS and web applications.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/xentegra.com\/hi\/resources\/109-the-citrix-session-citrix-features-explained-increase-app-security-with-citrix-secure-private-access\/\" \/>\n<meta property=\"og:site_name\" content=\"XenTegra\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/XenTegra\/\" \/>\n<meta property=\"article:published_time\" content=\"2022-07-13T15:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-02-06T11:50:56+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/eadn-wc05-13529174.nxedge.io\/wp-content\/uploads\/2024\/03\/Citrix-Session.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1100\" \/>\n\t<meta property=\"og:image:height\" content=\"600\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Chase Newmyer\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@xentegra\" \/>\n<meta name=\"twitter:site\" content=\"@xentegra\" \/>\n<meta name=\"twitter:label1\" content=\"\u0926\u094d\u0935\u093e\u0930\u093e \u0932\u093f\u0916\u093f\u0924\" \/>\n\t<meta name=\"twitter:data1\" content=\"Chase Newmyer\" \/>\n\t<meta name=\"twitter:label2\" content=\"\u0905\u0928\u0941\u092e\u093e\u0928\u093f\u0924 \u092a\u0922\u093c\u0928\u0947 \u0915\u093e \u0938\u092e\u092f\" \/>\n\t<meta name=\"twitter:data2\" content=\"47 \u092e\u093f\u0928\u091f\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/xentegra.com\\\/resources\\\/109-the-citrix-session-citrix-features-explained-increase-app-security-with-citrix-secure-private-access\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/xentegra.com\\\/resources\\\/109-the-citrix-session-citrix-features-explained-increase-app-security-with-citrix-secure-private-access\\\/\"},\"author\":{\"name\":\"Chase Newmyer\",\"@id\":\"https:\\\/\\\/xentegra.com\\\/#\\\/schema\\\/person\\\/84736408f096bfd92b80305aea8846a7\"},\"headline\":\"109: The Citrix Session: Citrix Features Explained: Increase app security with Citrix Secure Private Access\",\"datePublished\":\"2022-07-13T15:00:00+00:00\",\"dateModified\":\"2025-02-06T11:50:56+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/xentegra.com\\\/resources\\\/109-the-citrix-session-citrix-features-explained-increase-app-security-with-citrix-secure-private-access\\\/\"},\"wordCount\":10589,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/xentegra.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/xentegra.com\\\/resources\\\/109-the-citrix-session-citrix-features-explained-increase-app-security-with-citrix-secure-private-access\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/xentegra.com\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/Citrix-Session.png\",\"articleSection\":[\"Podcast\"],\"inLanguage\":\"hi-IN\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/xentegra.com\\\/resources\\\/109-the-citrix-session-citrix-features-explained-increase-app-security-with-citrix-secure-private-access\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/xentegra.com\\\/resources\\\/109-the-citrix-session-citrix-features-explained-increase-app-security-with-citrix-secure-private-access\\\/\",\"url\":\"https:\\\/\\\/xentegra.com\\\/resources\\\/109-the-citrix-session-citrix-features-explained-increase-app-security-with-citrix-secure-private-access\\\/\",\"name\":\"109: The Citrix Session: Increase app security with Citrix\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/xentegra.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/xentegra.com\\\/resources\\\/109-the-citrix-session-citrix-features-explained-increase-app-security-with-citrix-secure-private-access\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/xentegra.com\\\/resources\\\/109-the-citrix-session-citrix-features-explained-increase-app-security-with-citrix-secure-private-access\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/xentegra.com\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/Citrix-Session.png\",\"datePublished\":\"2022-07-13T15:00:00+00:00\",\"dateModified\":\"2025-02-06T11:50:56+00:00\",\"description\":\"For your hybrid workers to do their best, most productive work, they need anywhere access to a wide variety of SaaS and web applications.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/xentegra.com\\\/resources\\\/109-the-citrix-session-citrix-features-explained-increase-app-security-with-citrix-secure-private-access\\\/#breadcrumb\"},\"inLanguage\":\"hi-IN\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/xentegra.com\\\/resources\\\/109-the-citrix-session-citrix-features-explained-increase-app-security-with-citrix-secure-private-access\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"hi-IN\",\"@id\":\"https:\\\/\\\/xentegra.com\\\/resources\\\/109-the-citrix-session-citrix-features-explained-increase-app-security-with-citrix-secure-private-access\\\/#primaryimage\",\"url\":\"https:\\\/\\\/xentegra.com\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/Citrix-Session.png\",\"contentUrl\":\"https:\\\/\\\/xentegra.com\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/Citrix-Session.png\",\"width\":1100,\"height\":600},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/xentegra.com\\\/resources\\\/109-the-citrix-session-citrix-features-explained-increase-app-security-with-citrix-secure-private-access\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/xentegra.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"109: The Citrix Session: Citrix Features Explained: Increase app security with Citrix Secure Private Access\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/xentegra.com\\\/#website\",\"url\":\"https:\\\/\\\/xentegra.com\\\/\",\"name\":\"XenTegra\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/xentegra.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/xentegra.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"hi-IN\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/xentegra.com\\\/#organization\",\"name\":\"XenTegra\",\"url\":\"https:\\\/\\\/xentegra.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"hi-IN\",\"@id\":\"https:\\\/\\\/xentegra.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/xentegra.com\\\/wp-content\\\/uploads\\\/2023\\\/06\\\/1519903807641-min.jpg\",\"contentUrl\":\"https:\\\/\\\/xentegra.com\\\/wp-content\\\/uploads\\\/2023\\\/06\\\/1519903807641-min.jpg\",\"width\":200,\"height\":200,\"caption\":\"XenTegra\"},\"image\":{\"@id\":\"https:\\\/\\\/xentegra.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/XenTegra\\\/\",\"https:\\\/\\\/x.com\\\/xentegra\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/xentegra-llc\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/xentegra.com\\\/#\\\/schema\\\/person\\\/84736408f096bfd92b80305aea8846a7\",\"name\":\"Chase Newmyer\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"hi-IN\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d46cd44f0bd433dc5a386cbac549c62fd92266e3951669c705b347be2130cca3?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d46cd44f0bd433dc5a386cbac549c62fd92266e3951669c705b347be2130cca3?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d46cd44f0bd433dc5a386cbac549c62fd92266e3951669c705b347be2130cca3?s=96&d=mm&r=g\",\"caption\":\"Chase Newmyer\"},\"url\":\"https:\\\/\\\/xentegra.com\\\/hi\\\/resources\\\/author\\\/chasenewmyer\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"109: The Citrix Session: Increase app security with Citrix","description":"For your hybrid workers to do their best, most productive work, they need anywhere access to a wide variety of SaaS and web applications.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/xentegra.com\/hi\/resources\/109-the-citrix-session-citrix-features-explained-increase-app-security-with-citrix-secure-private-access\/","og_locale":"hi_IN","og_type":"article","og_title":"109: The Citrix Session: Increase app security with Citrix","og_description":"For your hybrid workers to do their best, most productive work, they need anywhere access to a wide variety of SaaS and web applications.","og_url":"https:\/\/xentegra.com\/hi\/resources\/109-the-citrix-session-citrix-features-explained-increase-app-security-with-citrix-secure-private-access\/","og_site_name":"XenTegra","article_publisher":"https:\/\/www.facebook.com\/XenTegra\/","article_published_time":"2022-07-13T15:00:00+00:00","article_modified_time":"2025-02-06T11:50:56+00:00","og_image":[{"width":1100,"height":600,"url":"https:\/\/eadn-wc05-13529174.nxedge.io\/wp-content\/uploads\/2024\/03\/Citrix-Session.png","type":"image\/png"}],"author":"Chase Newmyer","twitter_card":"summary_large_image","twitter_creator":"@xentegra","twitter_site":"@xentegra","twitter_misc":{"\u0926\u094d\u0935\u093e\u0930\u093e \u0932\u093f\u0916\u093f\u0924":"Chase Newmyer","\u0905\u0928\u0941\u092e\u093e\u0928\u093f\u0924 \u092a\u0922\u093c\u0928\u0947 \u0915\u093e \u0938\u092e\u092f":"47 \u092e\u093f\u0928\u091f"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/xentegra.com\/resources\/109-the-citrix-session-citrix-features-explained-increase-app-security-with-citrix-secure-private-access\/#article","isPartOf":{"@id":"https:\/\/xentegra.com\/resources\/109-the-citrix-session-citrix-features-explained-increase-app-security-with-citrix-secure-private-access\/"},"author":{"name":"Chase Newmyer","@id":"https:\/\/xentegra.com\/#\/schema\/person\/84736408f096bfd92b80305aea8846a7"},"headline":"109: The Citrix Session: Citrix Features Explained: Increase app security with Citrix Secure Private Access","datePublished":"2022-07-13T15:00:00+00:00","dateModified":"2025-02-06T11:50:56+00:00","mainEntityOfPage":{"@id":"https:\/\/xentegra.com\/resources\/109-the-citrix-session-citrix-features-explained-increase-app-security-with-citrix-secure-private-access\/"},"wordCount":10589,"commentCount":0,"publisher":{"@id":"https:\/\/xentegra.com\/#organization"},"image":{"@id":"https:\/\/xentegra.com\/resources\/109-the-citrix-session-citrix-features-explained-increase-app-security-with-citrix-secure-private-access\/#primaryimage"},"thumbnailUrl":"https:\/\/eadn-wc05-13529174.nxedge.io\/wp-content\/uploads\/2024\/03\/Citrix-Session.png","articleSection":["Podcast"],"inLanguage":"hi-IN","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/xentegra.com\/resources\/109-the-citrix-session-citrix-features-explained-increase-app-security-with-citrix-secure-private-access\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/xentegra.com\/resources\/109-the-citrix-session-citrix-features-explained-increase-app-security-with-citrix-secure-private-access\/","url":"https:\/\/xentegra.com\/resources\/109-the-citrix-session-citrix-features-explained-increase-app-security-with-citrix-secure-private-access\/","name":"109: The Citrix Session: Increase app security with Citrix","isPartOf":{"@id":"https:\/\/xentegra.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/xentegra.com\/resources\/109-the-citrix-session-citrix-features-explained-increase-app-security-with-citrix-secure-private-access\/#primaryimage"},"image":{"@id":"https:\/\/xentegra.com\/resources\/109-the-citrix-session-citrix-features-explained-increase-app-security-with-citrix-secure-private-access\/#primaryimage"},"thumbnailUrl":"https:\/\/eadn-wc05-13529174.nxedge.io\/wp-content\/uploads\/2024\/03\/Citrix-Session.png","datePublished":"2022-07-13T15:00:00+00:00","dateModified":"2025-02-06T11:50:56+00:00","description":"For your hybrid workers to do their best, most productive work, they need anywhere access to a wide variety of SaaS and web applications.","breadcrumb":{"@id":"https:\/\/xentegra.com\/resources\/109-the-citrix-session-citrix-features-explained-increase-app-security-with-citrix-secure-private-access\/#breadcrumb"},"inLanguage":"hi-IN","potentialAction":[{"@type":"ReadAction","target":["https:\/\/xentegra.com\/resources\/109-the-citrix-session-citrix-features-explained-increase-app-security-with-citrix-secure-private-access\/"]}]},{"@type":"ImageObject","inLanguage":"hi-IN","@id":"https:\/\/xentegra.com\/resources\/109-the-citrix-session-citrix-features-explained-increase-app-security-with-citrix-secure-private-access\/#primaryimage","url":"https:\/\/eadn-wc05-13529174.nxedge.io\/wp-content\/uploads\/2024\/03\/Citrix-Session.png","contentUrl":"https:\/\/eadn-wc05-13529174.nxedge.io\/wp-content\/uploads\/2024\/03\/Citrix-Session.png","width":1100,"height":600},{"@type":"BreadcrumbList","@id":"https:\/\/xentegra.com\/resources\/109-the-citrix-session-citrix-features-explained-increase-app-security-with-citrix-secure-private-access\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/xentegra.com\/"},{"@type":"ListItem","position":2,"name":"109: The Citrix Session: Citrix Features Explained: Increase app security with Citrix Secure Private Access"}]},{"@type":"WebSite","@id":"https:\/\/xentegra.com\/#website","url":"https:\/\/xentegra.com\/","name":"\u091c\u093c\u0947\u0928\u091f\u0947\u0917\u094d\u0930\u093e","description":"","publisher":{"@id":"https:\/\/xentegra.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/xentegra.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"hi-IN"},{"@type":"Organization","@id":"https:\/\/xentegra.com\/#organization","name":"\u091c\u093c\u0947\u0928\u091f\u0947\u0917\u094d\u0930\u093e","url":"https:\/\/xentegra.com\/","logo":{"@type":"ImageObject","inLanguage":"hi-IN","@id":"https:\/\/xentegra.com\/#\/schema\/logo\/image\/","url":"https:\/\/eadn-wc05-13529174.nxedge.io\/wp-content\/uploads\/2023\/06\/1519903807641-min.jpg","contentUrl":"https:\/\/eadn-wc05-13529174.nxedge.io\/wp-content\/uploads\/2023\/06\/1519903807641-min.jpg","width":200,"height":200,"caption":"XenTegra"},"image":{"@id":"https:\/\/xentegra.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/XenTegra\/","https:\/\/x.com\/xentegra","https:\/\/www.linkedin.com\/company\/xentegra-llc"]},{"@type":"Person","@id":"https:\/\/xentegra.com\/#\/schema\/person\/84736408f096bfd92b80305aea8846a7","name":"Chase Newmyer","image":{"@type":"ImageObject","inLanguage":"hi-IN","@id":"https:\/\/secure.gravatar.com\/avatar\/d46cd44f0bd433dc5a386cbac549c62fd92266e3951669c705b347be2130cca3?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d46cd44f0bd433dc5a386cbac549c62fd92266e3951669c705b347be2130cca3?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d46cd44f0bd433dc5a386cbac549c62fd92266e3951669c705b347be2130cca3?s=96&d=mm&r=g","caption":"Chase Newmyer"},"url":"https:\/\/xentegra.com\/hi\/resources\/author\/chasenewmyer\/"}]}},"_links":{"self":[{"href":"https:\/\/xentegra.com\/hi\/wp-json\/wp\/v2\/posts\/66043","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/xentegra.com\/hi\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/xentegra.com\/hi\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/xentegra.com\/hi\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/xentegra.com\/hi\/wp-json\/wp\/v2\/comments?post=66043"}],"version-history":[{"count":1140,"href":"https:\/\/xentegra.com\/hi\/wp-json\/wp\/v2\/posts\/66043\/revisions"}],"predecessor-version":[{"id":710079,"href":"https:\/\/xentegra.com\/hi\/wp-json\/wp\/v2\/posts\/66043\/revisions\/710079"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/xentegra.com\/hi\/wp-json\/wp\/v2\/media\/65995"}],"wp:attachment":[{"href":"https:\/\/xentegra.com\/hi\/wp-json\/wp\/v2\/media?parent=66043"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/xentegra.com\/hi\/wp-json\/wp\/v2\/categories?post=66043"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/xentegra.com\/hi\/wp-json\/wp\/v2\/tags?post=66043"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}