{"id":66044,"date":"2022-07-01T18:00:00","date_gmt":"2022-07-01T22:00:00","guid":{"rendered":"http:\/\/74d2948405.nxcli.io\/resources\/108-the-citrix-session-citrix-features-explained-browser-security-in-citrix-secure-private-access\/"},"modified":"2025-02-06T06:50:57","modified_gmt":"2025-02-06T11:50:57","slug":"108-the-citrix-session-citrix-features-explained-browser-security-in-citrix-secure-private-access","status":"publish","type":"post","link":"https:\/\/xentegra.com\/hi\/resources\/108-the-citrix-session-citrix-features-explained-browser-security-in-citrix-secure-private-access\/","title":{"rendered":"108: The Citrix Session: Citrix Features Explained: Browser security in Citrix Secure Private Access"},"content":{"rendered":"<p><iframe loading=\"lazy\" src=\"https:\/\/www.buzzsprout.com\/670066\/episodes\/10890919-the-citrix-session-citrix-features-explained-browser-security-in-citrix-secure-private-access?iframe=true\" scrolling=\"no\" width=\"100%\" height=\"200\" frameborder=\"0\" style=\"width: 100%;height: 200px\"><\/iframe><\/p>\n<p>Swift and easy access to information is the lifeblood of productive remote work. You want your hybrid workers to be able to easily browse the internet for whatever insights and resources they need to do their best work \u2014 but how do you protect these users from browser-based attacks? It\u2019s tempting to adopt strict browser policies to liberally block any site or app that might be risky, but draconian internet policies can frustrate your hybrid workforce. This can lead to users devising complex and vulnerable workarounds to access the sites or apps they want to access, which puts your organization at risk.<\/p>\n<p>This is why <a href=\"https:\/\/www.citrix.com\/products\/citrix-secure-private-access\/\">Citrix Secure Private Access<\/a> offers remote browser isolation and security capabilities. Using secure browser, <a href=\"https:\/\/docs.citrix.com\/en-us\/citrix-workspace-browser.html\">\u0938\u093f\u091f\u094d\u0930\u093f\u0915\u094d\u0938 \u0935\u0930\u094d\u0915\u0938\u094d\u092a\u0947\u0938 \u092c\u094d\u0930\u093e\u0909\u091c\u093c\u0930<\/a>, and the mobile web viewer for Citrix Workspace, your hybrid workers can easily access the sites and web apps they want in a safe browsing experience. This protects users from browser-based attacks and malware to create proper internet security policies without disrupting the remote work experience.<\/p>\n<p>\u0939\u094b\u0938\u094d\u091f: \u090f\u0902\u0921\u0940 \u0935\u094d\u0939\u093e\u0907\u091f\u0938\u093e\u0907\u0921<br \/>\u0938\u0939-\u092e\u0947\u091c\u092c\u093e\u0928: \u0917\u0947\u0930\u0947\u092e\u0940 \u092e\u0947\u092f\u0930\u094d\u0938<br \/>\u0938\u0939-\u092e\u0947\u091c\u092c\u093e\u0928: \u091f\u0949\u0921 \u0938\u094d\u092e\u093f\u0925<\/p>\n<div class=\"transcript\">\n<p><!--block-->\u0935\u0947\u092c\u0935\u0940\u091f\u0940\u091f\u0940<\/p>\n<p>1<br \/>00:00:02.939 &#8211;&gt; 00:00:08.370<br \/>Andy Whiteside: hi everyone and welcome to episode 108 of the citrix session i&#8217;m your host Andy why so i&#8217;ve got to sit rights with me.<\/p>\n<p>2<br \/>00:00:09.300 &#8211;&gt; 00:00:20.460<br \/>Andy Whiteside: here on the call I tell you what guys I JEREMY you would know this place, maybe a spirited cyclist up in Davidson North in I walked in there Friday I didn&#8217;t mean to I take my son to the dentist.<\/p>\n<p>3<br \/>00:00:21.540 &#8211;&gt; 00:00:31.260<br \/>Andy Whiteside: The bike shop is right beside the dentist I saw exactly the bike i&#8217;ve been looking for kind of looking for, and so I just started talking to the guy and I end up buying it.<\/p>\n<p>4<br \/>00:00:33.120 &#8211;&gt; 00:00:39.660<br \/>Andy Whiteside: You know I i&#8217;ve needed a bike my bike 20 years old, it weighs 1000 pounds it&#8217;s horrible it&#8217;s a horrible mountain bike I needed a bike.<\/p>\n<p>5<br \/>00:00:40.110 &#8211;&gt; 00:00:47.850<br \/>Andy Whiteside: I deserve a bike I bought a entry level specialized was not that Nice of a bike but still nice long story short i&#8217;ve got on my citrix shirt.<\/p>\n<p>6<br \/>00:00:48.180 &#8211;&gt; 00:00:56.430<br \/>Andy Whiteside: And the guy who owns the bike shop asked me what a citrate was and he automatically associated with citrix because, as I started talking he started talking about his.<\/p>\n<p>7<br \/>00:00:56.880 &#8211;&gt; 00:01:05.220<br \/>Andy Whiteside: His file storage aka share file aka citrix files so it&#8217;s it&#8217;s still out there, people still still have an idea what it is.<\/p>\n<p>8<br \/>00:01:06.780 &#8211;&gt; 00:01:07.440<br \/>Andy Whiteside: that&#8217;s a while.<\/p>\n<p>9<br \/>00:01:08.040 &#8211;&gt; 00:01:09.180<br \/>Geremy Meyers: that&#8217;s very well that&#8217;s awesome.<\/p>\n<p>10<br \/>00:01:09.630 &#8211;&gt; 00:01:12.570<br \/>Todd Smith &#8211; Citrix: i&#8217;ve got relatives and either still think I worked for the gotomeeting company.<\/p>\n<p>11<br \/>00:01:15.120 &#8211;&gt; 00:01:17.640<br \/>Andy Whiteside: Well, and you still try to explain to them, where you just let it go.<\/p>\n<p>12<br \/>00:01:18.000 &#8211;&gt; 00:01:18.840<br \/>Todd Smith &#8211; Citrix: I just let it go.<\/p>\n<p>13<br \/>00:01:18.900 &#8211;&gt; 00:01:22.110<br \/>Geremy Meyers: You just let it go yeah sometimes it&#8217;s not the juice isn&#8217;t worth the squeeze.<\/p>\n<p>14<br \/>00:01:24.330 &#8211;&gt; 00:01:30.870<br \/>Andy Whiteside: Well guys i&#8217;m going to share my screen Well, first of all, how are you doing how have you been what&#8217;s going on in your world JEREMY i&#8217;ll start with you.<\/p>\n<p>15<br \/>00:01:31.470 &#8211;&gt; 00:01:39.690<br \/>Geremy Meyers: Oh man, so I just got back from vacation I spent a week and Alaska slash the Pacific Northwest so i&#8217;ve never been up there before and.<\/p>\n<p>16<br \/>00:01:40.320 &#8211;&gt; 00:01:54.330<br \/>Geremy Meyers: it&#8217;s pretty amazing so we did a cruise seven day cruise and we made the trip up the Juno got out and the little hiking saw I saw a glacier that was pretty amazing it made our way back so we&#8217;re good time good time.<\/p>\n<p>17<br \/>00:01:54.690 &#8211;&gt; 00:02:00.840<br \/>Andy Whiteside: I did that trip the reverse order from anchorage down to Vancouver when I was 13.<\/p>\n<p>18<br \/>00:02:02.520 &#8211;&gt; 00:02:05.670<br \/>Andy Whiteside: wasn&#8217;t wasn&#8217;t the most exciting cruise for a 13 year old to go on.<\/p>\n<p>19<br \/>00:02:07.650 &#8211;&gt; 00:02:17.460<br \/>Andy Whiteside: But yes i&#8217;ve been there i&#8217;ve been there twice since then for work which has been awesome to go, and you know spend some time and work and how you can do stuff if you haven&#8217;t been gotta go.<\/p>\n<p>20<br \/>00:02:17.910 &#8211;&gt; 00:02:22.860<br \/>Geremy Meyers: You gotta go you gotta go so you&#8217;ve done citrix work up in September work up in Alaska.<\/p>\n<p>21<br \/>00:02:23.550 &#8211;&gt; 00:02:25.740<br \/>Andy Whiteside: citrix work up and enrich.<\/p>\n<p>22<br \/>00:02:28.110 &#8211;&gt; 00:02:39.750<br \/>Andy Whiteside: I am I left there thinking Oh, I need open an office here there&#8217;s so much opportunity well working with the state in the organization and there&#8217;s, no, no, not allowed citrix partners up there yeah yeah.<\/p>\n<p>23<br \/>00:02:42.060 &#8211;&gt; 00:02:49.350<br \/>Geremy Meyers: there&#8217;s a there&#8217;s a there&#8217;s a town and so i&#8217;ve found out because it wasn&#8217;t you know right before she moved to juneau she lived in kings cove I want to say.<\/p>\n<p>24<br \/>00:02:49.770 &#8211;&gt; 00:03:04.620<br \/>Geremy Meyers: Okay talk, which is, it is the last peninsula before the illusions, you know shoot out towards roster right and she mentioned to me that the next closest big town was anchorage which was 1000 miles away so just to put the whole thing in perspective, like how big that state is.<\/p>\n<p>25<br \/>00:03:04.800 &#8211;&gt; 00:03:06.840<br \/>Geremy Meyers: yeah it&#8217;s ridiculous.<\/p>\n<p>26<br \/>00:03:07.590 &#8211;&gt; 00:03:08.490<br \/>Andy Whiteside: I was listening to.<\/p>\n<p>27<br \/>00:03:10.800 &#8211;&gt; 00:03:19.020<br \/>Andy Whiteside: Something recently I think on national parks or maybe it was something else yeah Maybe it was like the Andrew Jackson error of politics and.<\/p>\n<p>28<br \/>00:03:20.190 &#8211;&gt; 00:03:31.050<br \/>Andy Whiteside: Oh no, it was actually related to yeah it ended up in the civil war and steward the Attorney General or the Secretary of State at the time, he was the one trying to buy Alaska.<\/p>\n<p>29<br \/>00:03:32.250 &#8211;&gt; 00:03:40.950<br \/>Andy Whiteside: Actually, they tried to buy it before the civil war and then after the civil war, they revisit it and nobody understood why and now it&#8217;s a no brainer that was that was that was a deal.<\/p>\n<p>30<br \/>00:03:41.490 &#8211;&gt; 00:03:42.780<br \/>Geremy Meyers: It wasn&#8217;t deal yeah.<\/p>\n<p>31<br \/>00:03:43.470 &#8211;&gt; 00:03:46.770<br \/>Todd Smith &#8211; Citrix: It was originally called seward&#8217;s folly because of because of that.<\/p>\n<p>32<br \/>00:03:47.490 &#8211;&gt; 00:03:48.180<br \/>Is.<\/p>\n<p>33<br \/>00:03:49.800 &#8211;&gt; 00:03:56.670<br \/>Andy Whiteside: Before I go to Todd here for what&#8217;s new and todd&#8217;s world JEREMY I have to ask how did your virtual desktop performed from a cruise ship, I know you tried.<\/p>\n<p>34<br \/>00:03:57.000 &#8211;&gt; 00:03:58.860<br \/>Geremy Meyers: I didn&#8217;t try I didn&#8217;t even remotely try.<\/p>\n<p>35<br \/>00:03:58.920 &#8211;&gt; 00:04:09.870<br \/>Geremy Meyers: With the Internet, first of all, they had the Internet on the cruise ship is notorious and that stretch of of water for not working in general, so we got a little Internet the ports, but when you were cruising up and down the straight.<\/p>\n<p>36<br \/>00:04:10.230 &#8211;&gt; 00:04:17.520<br \/>Geremy Meyers: yeah even the whatever satellite service they&#8217;ve got was was not good, so I tried to turn it off, I thought about it.<\/p>\n<p>37<br \/>00:04:17.910 &#8211;&gt; 00:04:18.690<br \/>Andy Whiteside: But I didn&#8217;t.<\/p>\n<p>38<br \/>00:04:18.810 &#8211;&gt; 00:04:19.530<br \/>Geremy Meyers: I didn&#8217;t try it at all.<\/p>\n<p>39<br \/>00:04:20.370 &#8211;&gt; 00:04:20.610<br \/>Todd Smith &#8211; Citrix: well.<\/p>\n<p>40<br \/>00:04:20.700 &#8211;&gt; 00:04:30.990<br \/>Andy Whiteside: I mean kudos to you for turning it off it&#8217;s also then that&#8217;s pretty a guidance right, I mean what we do in the world of uc digital workspace vdi, if you will, in some cases, many cases.<\/p>\n<p>41<br \/>00:04:31.320 &#8211;&gt; 00:04:45.360<br \/>Andy Whiteside: Look, I mean there&#8217;s a there&#8217;s a time to know when the whole time and time to know when to fold them and, in some cases it&#8217;s not the right solution because of that pesky your network thing that you know it&#8217;s extremely important to be stable, reliable vast.<\/p>\n<p>42<br \/>00:04:47.010 &#8211;&gt; 00:04:47.310<br \/>Geremy Meyers: yeah.<\/p>\n<p>43<br \/>00:04:48.660 &#8211;&gt; 00:05:00.210<br \/>Geremy Meyers: yeah, although I will say this we&#8217;ve got I don&#8217;t think I can name drop, but we do have some cruise lines that we&#8217;re leveraging our branch for Peter, you know, for that kind of use case just working from the ship&#8217;s doing that sort of thing.<\/p>\n<p>44<br \/>00:05:00.990 &#8211;&gt; 00:05:11.700<br \/>Andy Whiteside: Well Todd you may remember, and I know we got a limited amount of time here so don&#8217;t that memory lane year, but there was somebody on my team has a citrix se that was like a week or two at a time got to go on a cruise ship and do you see where do you remember this.<\/p>\n<p>45<br \/>00:05:13.920 &#8211;&gt; 00:05:26.130<br \/>Todd Smith &#8211; Citrix: yeah there was a one of the one of the one of the cruise lines out of Miami had they had a couple of things that they were that they were investigating right one of them was the entertainment system.<\/p>\n<p>46<br \/>00:05:27.150 &#8211;&gt; 00:05:45.600<br \/>Todd Smith &#8211; Citrix: was going to be delivered via PBS right so they&#8217;re going to have all of the devices booed off of you know, an image, based on what type of device, it is so if it&#8217;s a crew facing device, it was going to have a obviously a crew image, if it was going to be something in a state room or a.<\/p>\n<p>47<br \/>00:05:46.680 &#8211;&gt; 00:06:03.570<br \/>Todd Smith &#8211; Citrix: or any of the the hotel areas of the the ship, they were going to have that and then there was another one for purely entertainment right yeah so very similar to some of the old wise use cases that they had with some of the hotels yeah where they wanted to be able to deliver.<\/p>\n<p>48<br \/>00:06:04.800 &#8211;&gt; 00:06:11.670<br \/>Todd Smith &#8211; Citrix: You know, Internet access via a PC experience, without giving them putting a PC in every single room.<\/p>\n<p>49<br \/>00:06:12.390 &#8211;&gt; 00:06:19.050<br \/>Andy Whiteside: yeah I love that you just touched on, I think three different types of potential virtualization concepts, one would have been streaming virtualization.<\/p>\n<p>50<br \/>00:06:20.280 &#8211;&gt; 00:06:27.600<br \/>Andy Whiteside: One would have been presenting virtualization which would have been the virtual desktop but, most people call the virtual desktop streaming that&#8217;s not provisioning services is streaming.<\/p>\n<p>51<br \/>00:06:28.170 &#8211;&gt; 00:06:33.630<br \/>Andy Whiteside: presentation is that one, and then you know machine virtualization potentially with what was called Zen client.<\/p>\n<p>52<br \/>00:06:34.590 &#8211;&gt; 00:06:37.800<br \/>Andy Whiteside: would have been another use case and all the things you just said and.<\/p>\n<p>53<br \/>00:06:38.250 &#8211;&gt; 00:06:45.780<br \/>Andy Whiteside: You know the truth is that the day the presentation virtual desktop hosted virtually you know back on some containerization solution.<\/p>\n<p>54<br \/>00:06:46.170 &#8211;&gt; 00:06:58.860<br \/>Andy Whiteside: And then presented to wherever has ultimately one out and that&#8217;s because of that network thing we&#8217;re just talking about has gotten better and better and better, to the point where on airplanes now sometimes it&#8217;s a great experience and sometimes it&#8217;s still crap but it&#8217;s getting there.<\/p>\n<p>55<br \/>00:06:59.370 &#8211;&gt; 00:07:03.690<br \/>Geremy Meyers: Believe it or not, this is going to be a good segue today&#8217;s topic so i&#8217;ll just go out there there&#8217;s a tease.<\/p>\n<p>56<br \/>00:07:04.260 &#8211;&gt; 00:07:07.440<br \/>Andy Whiteside: All right, real quick Todd anything, important that we know about, in your role going on.<\/p>\n<p>57<br \/>00:07:07.770 &#8211;&gt; 00:07:21.180<br \/>Todd Smith &#8211; Citrix: yeah so a couple of things up in the Boston area, we had a we finally hit 90 degrees over the weekend, so people are complaining about the heat, whereas three months ago they were complaining about the cold, so you know so cycle of life up here.<\/p>\n<p>58<br \/>00:07:23.010 &#8211;&gt; 00:07:32.580<br \/>Todd Smith &#8211; Citrix: But other than that you know it&#8217;s great seeing everyone seeing everyone&#8217;s kids graduate from high school college kindergarten you know nursery school.<\/p>\n<p>59<br \/>00:07:32.970 &#8211;&gt; 00:07:42.750<br \/>Todd Smith &#8211; Citrix: it&#8217;s you know it&#8217;s that time of year and it&#8217;s great also to hear people are taking some time off and enjoying themselves and kind of finding a way to disconnect from work either.<\/p>\n<p>60<br \/>00:07:43.320 &#8211;&gt; 00:07:54.660<br \/>Todd Smith &#8211; Citrix: By doing it intentionally by not paying attention or not not trying to work while they&#8217;re on vacation or unintentionally like having a ship that doesn&#8217;t always have great reliable Internet access.<\/p>\n<p>61<br \/>00:07:56.160 &#8211;&gt; 00:08:08.460<br \/>Andy Whiteside: So this week is the week is integrity gives away our bronco or Ford bronco with our work has no boundaries campaign, and you know, I think, as I say that out loud sometimes i&#8217;ll make work has no boundaries yay and then i&#8217;m like work has no boundaries, no.<\/p>\n<p>62<br \/>00:08:08.460 &#8211;&gt; 00:08:09.000<br \/>\u0928\u0939\u0940\u0902\u0964<\/p>\n<p>63<br \/>00:08:12.900 &#8211;&gt; 00:08:18.180<br \/>Andy Whiteside: Well i&#8217;ve committed to work to live live to work live to work so i&#8217;m toast anyway.<\/p>\n<p>64<br \/>00:08:19.770 &#8211;&gt; 00:08:27.030<br \/>Andy Whiteside: Alright, so for today&#8217;s topic we have a concept from citrix I want to review, let me share my screen.<\/p>\n<p>65<br \/>00:08:32.370 &#8211;&gt; 00:08:38.790<br \/>Andy Whiteside: And this concept around citrix is where you guys are using your blog workspace is workspace.<\/p>\n<p>66<br \/>00:08:39.450 &#8211;&gt; 00:08:49.620<br \/>Andy Whiteside: To talk about explain features and I, you know centered so over the past 10 years has really come out with new things to try to move beyond not run away from the move beyond.<\/p>\n<p>67<br \/>00:08:50.040 &#8211;&gt; 00:08:59.910<br \/>Andy Whiteside: The virtual desktop virtual APP presentation world i&#8217;m a huge fan of the the old product name presentations server because, as a truest I thought it really.<\/p>\n<p>68<br \/>00:09:00.300 &#8211;&gt; 00:09:04.800<br \/>Andy Whiteside: It really did exemplify what the product did of course marketing guys didn&#8217;t like it too much.<\/p>\n<p>69<br \/>00:09:05.520 &#8211;&gt; 00:09:13.950<br \/>Andy Whiteside: But now we&#8217;re talking about things like you know how to how to allow people to work remotely but work securely without having to go through that.<\/p>\n<p>70<br \/>00:09:14.400 &#8211;&gt; 00:09:29.580<br \/>Andy Whiteside: Virtual presentation layer guys any just kind of general ideas and we&#8217;re going to do a bunch of these features explain this one&#8217;s called this is, I Stephen bells bills citrix features explain this one&#8217;s a browser security in citrix secure private access.<\/p>\n<p>71<br \/>00:09:30.600 &#8211;&gt; 00:09:37.080<br \/>Andy Whiteside: Can you give any comments on just the overall concept of why it&#8217;s important that citrix starts to break down each feature and explain them one, at a time.<\/p>\n<p>72<br \/>00:09:38.700 &#8211;&gt; 00:09:49.950<br \/>Geremy Meyers: um man, so I know from a security perspective, we like to talk about citrix being a part of a layered approach to security so there&#8217;s lots of parts and pieces that make up a security strategy right so.<\/p>\n<p>73<br \/>00:09:50.310 &#8211;&gt; 00:09:58.980<br \/>Geremy Meyers: You know, trying to walk in the door, with a customer with just an organization and have a discussion around you know just citrix security, I mean that&#8217;s a that&#8217;s a loaded question right so.<\/p>\n<p>74<br \/>00:09:59.370 &#8211;&gt; 00:10:09.690<br \/>Geremy Meyers: You know, there is a lot that sectors can do as a part of that strategy, I think it&#8217;s very helpful to break down just where some of these parts and pieces fit, so I mean secure browser is a.<\/p>\n<p>75<br \/>00:10:10.230 &#8211;&gt; 00:10:15.540<br \/>Geremy Meyers: First of all, is a great use case but I mean listen, you know, at the end of the day, you know Andy before I even took this job.<\/p>\n<p>76<br \/>00:10:15.960 &#8211;&gt; 00:10:24.780<br \/>Geremy Meyers: 10 years ago if you were to ask me the question what&#8217;s the number one published application in a presentation server farm, so what I did there, what would you tell me.<\/p>\n<p>77<br \/>00:10:26.400 &#8211;&gt; 00:10:38.910<br \/>Andy Whiteside: Well, so I would tell you and I don&#8217;t know if you&#8217;re saying this question because you know i&#8217;m going to answer answer different events I say windows like windows Microsoft windows, is that application that&#8217;s most widely available through a presentation phone.<\/p>\n<p>78<br \/>00:10:39.780 &#8211;&gt; 00:10:43.140<br \/>Geremy Meyers: or you&#8217;re not wrong, but what would be the second most.<\/p>\n<p>79<br \/>00:10:43.770 &#8211;&gt; 00:10:44.880<br \/>Geremy Meyers: yeah popular.<\/p>\n<p>80<br \/>00:10:45.030 &#8211;&gt; 00:10:46.080<br \/>Geremy Meyers: Published application.<\/p>\n<p>81<br \/>00:10:46.470 &#8211;&gt; 00:10:57.540<br \/>Andy Whiteside: And that&#8217;s the Andy answer and people look at me weird but I truly believe that is the answer, however, the second most widely and probably the one I did the most of in my career as an admin is a browser.<\/p>\n<p>82<br \/>00:10:57.960 &#8211;&gt; 00:11:00.210<br \/>Geremy Meyers: it&#8217;s a browser yeah yeah, so I think.<\/p>\n<p>83<br \/>00:11:01.290 &#8211;&gt; 00:11:05.250<br \/>Geremy Meyers: You know, and why were folks doing that right, I mean the biggest thing was number one.<\/p>\n<p>84<br \/>00:11:06.690 &#8211;&gt; 00:11:14.220<br \/>Geremy Meyers: A lot of cases, honestly, it was trying to get users access to an internally based APP right, so you know how do you do that without a vpn that&#8217;s all part of the story.<\/p>\n<p>85<br \/>00:11:14.910 &#8211;&gt; 00:11:18.720<br \/>Geremy Meyers: But at the same time, you know, even if it&#8217;s an externally facing APP you know, can I.<\/p>\n<p>86<br \/>00:11:19.020 &#8211;&gt; 00:11:28.260<br \/>Geremy Meyers: publish that through citrix and, more importantly, route some security around it right, you know so a lot of the reasons folks were publishing things for presentation service, because they can control copy and paste printing.<\/p>\n<p>87<br \/>00:11:29.280 &#8211;&gt; 00:11:35.250<br \/>Geremy Meyers: You know, things like that you know, but you introduce that into a browser you know what are your options yeah.<\/p>\n<p>88<br \/>00:11:36.270 &#8211;&gt; 00:11:45.060<br \/>Todd Smith &#8211; Citrix: If I can add one thing on here as well, there were so many applications out there that were being accessed via browser.<\/p>\n<p>89<br \/>00:11:45.540 &#8211;&gt; 00:11:51.090<br \/>Todd Smith &#8211; Citrix: That any change to that browser could render that application either not performing at all or.<\/p>\n<p>90<br \/>00:11:51.480 &#8211;&gt; 00:12:01.800<br \/>Todd Smith &#8211; Citrix: subpar right so so having the ability to publish out a specific version of the browser with the plugins already added in and all of the features in the security settings.<\/p>\n<p>91<br \/>00:12:02.280 &#8211;&gt; 00:12:14.730<br \/>Todd Smith &#8211; Citrix: built in there, it really kind of it became a stopgap measure to restricting people&#8217;s access but also providing something that the it folks could actually support and support well.<\/p>\n<p>92<br \/>00:12:15.270 &#8211;&gt; 00:12:23.010<br \/>Andy Whiteside: So Todd true or false malicious people took down my company application portfolio.<\/p>\n<p>93<br \/>00:12:24.090 &#8211;&gt; 00:12:27.870<br \/>Andy Whiteside: More then Andy whiteside the systems administrator did.<\/p>\n<p>94<br \/>00:12:30.300 &#8211;&gt; 00:12:33.030<br \/>Todd Smith &#8211; Citrix: i&#8217;m gonna say it depends.<\/p>\n<p>95<br \/>00:12:33.150 &#8211;&gt; 00:12:33.360<br \/>\u0938\u0939\u0940\u0964<\/p>\n<p>96<br \/>00:12:34.410 &#8211;&gt; 00:12:38.520<br \/>Todd Smith &#8211; Citrix: But but it&#8217;s true true or false, it would be oftentimes it&#8217;s a user error.<\/p>\n<p>97<br \/>00:12:39.300 &#8211;&gt; 00:12:40.200<br \/>Todd Smith &#8211; Citrix: it&#8217;s causing us.<\/p>\n<p>98<br \/>00:12:40.260 &#8211;&gt; 00:12:55.470<br \/>Andy Whiteside: yeah I took the whole thing down the middle day flicked the switch okay that fixes that Issue No problem next thing you know the phone&#8217;s ringing everybody&#8217;s down because I systematically made a change to something and, at least in the world of presentation, I can put it right back.<\/p>\n<p>99<br \/>00:12:55.710 &#8211;&gt; 00:12:58.890<br \/>Andy Whiteside: versus getting the button that says okay roll that back and roll this in.<\/p>\n<p>100<br \/>00:12:59.640 &#8211;&gt; 00:13:00.450<br \/>Andy Whiteside: which can take forever.<\/p>\n<p>101<br \/>00:13:00.990 &#8211;&gt; 00:13:13.260<br \/>Todd Smith &#8211; Citrix: Well, and the other thing end that a lot of a lot of the software vendors, the the browser vendors have trained us to do is just click randomly and just to accept all updates except.<\/p>\n<p>102<br \/>00:13:13.860 &#8211;&gt; 00:13:29.850<br \/>Todd Smith &#8211; Citrix: by default when we add in a plugin or we we add or change the configuration settings right so taking that control away from the SIS admins and the security professionals has really cause some havoc out there, and a lot of organizations.<\/p>\n<p>103<br \/>00:13:31.800 &#8211;&gt; 00:13:42.600<br \/>Todd Smith &#8211; Citrix: what used to be under the control of the IT folks is now being pushed over towards the end users, which can have a huge impact on both security, as well as performance yeah.<\/p>\n<p>104<br \/>00:13:43.620 &#8211;&gt; 00:13:49.110<br \/>Andy Whiteside: hey so guys i&#8217;m in the world of citrix when it comes to secure private access related to a browser.<\/p>\n<p>105<br \/>00:13:49.830 &#8211;&gt; 00:13:55.200<br \/>Andy Whiteside: I think there&#8217;s at least three items to be covered i&#8217;m not sure exactly which one&#8217;s this one&#8217;s covering.<\/p>\n<p>106<br \/>00:13:55.560 &#8211;&gt; 00:14:00.210<br \/>Andy Whiteside: Where we&#8217;re actually controlling the flow of the data back and forth through some type of.<\/p>\n<p>107<br \/>00:14:00.540 &#8211;&gt; 00:14:10.740<br \/>Andy Whiteside: You know proxy mechanism there&#8217;s the secure browser which is embedded in the workspace APP and then there&#8217;s a secure browser workspace service where it&#8217;s actually launching the browser.<\/p>\n<p>108<br \/>00:14:11.190 &#8211;&gt; 00:14:23.490<br \/>Andy Whiteside: Somewhat seamlessly very seamlessly to the end user, but in some other data Center where you&#8217;re totally isolating it other than the screen shots to come across what is this blog specifically covering or is it covering all of them.<\/p>\n<p>109<br \/>00:14:25.380 &#8211;&gt; 00:14:35.730<br \/>Geremy Meyers: I think it&#8217;s covering all of them right So the first thing first it talks about to that last thing to flow right or, I guess, maybe i&#8217;m going to i&#8217;m going to i&#8217;m going to butcher the flow here but.<\/p>\n<p>110<br \/>00:14:36.300 &#8211;&gt; 00:14:45.390<br \/>Geremy Meyers: Ultimately there&#8217;s there&#8217;s two things that this this blog that are definitely hits on is what does that user experience like what is the user clicking on and what&#8217;s launching whatever they do the clicking so.<\/p>\n<p>111<br \/>00:14:45.540 &#8211;&gt; 00:14:50.430<br \/>Geremy Meyers: If i&#8217;ve got a URL that i&#8217;m clicking you know I think there are two ways for that URL to be presented to that end user.<\/p>\n<p>112<br \/>00:14:51.330 &#8211;&gt; 00:14:59.580<br \/>Geremy Meyers: The first one is there is a service that citrix hosts called the secure browser service, and that is basically a.<\/p>\n<p>113<br \/>00:15:00.210 &#8211;&gt; 00:15:03.600<br \/>Geremy Meyers: You know we&#8217;d like to call it, throwing browser but it&#8217;s a browser instance that.<\/p>\n<p>114<br \/>00:15:04.350 &#8211;&gt; 00:15:15.030<br \/>Geremy Meyers: will launch that URL inside of containerized browser that&#8217;s off your data Center so think about the original discussion where you publish the URL Andy off your presentation server farm here&#8217;s an F bar.<\/p>\n<p>115<br \/>00:15:15.360 &#8211;&gt; 00:15:23.310<br \/>Geremy Meyers: That that black that browser actually sat in your data Center this one actually sits off site in fact citrix hostess they manage it, they update it and maintain it.<\/p>\n<p>116<br \/>00:15:23.640 &#8211;&gt; 00:15:30.480<br \/>Geremy Meyers: And the nice thing about it is, is once you click the link and it fires up, you know that instance is created, it renders your your web page.<\/p>\n<p>117<br \/>00:15:30.900 &#8211;&gt; 00:15:37.890<br \/>Geremy Meyers: will skip the flow right now, just to say that it also works with internal Apps within your data Center so we can broker into an internal web APP.<\/p>\n<p>118<br \/>00:15:38.160 &#8211;&gt; 00:15:45.390<br \/>Geremy Meyers: But as soon as that user closes the tab guess what that browsers gone so along with any of the data that presented so that&#8217;s an pretty important concept.<\/p>\n<p>119<br \/>00:15:46.920 &#8211;&gt; 00:15:57.240<br \/>Geremy Meyers: The other thing that this article hits on is there&#8217;s also a browser embedded within any of the modern workspace Apps so if you&#8217;re launching this not from.<\/p>\n<p>120<br \/>00:15:58.290 &#8211;&gt; 00:16:02.790<br \/>Geremy Meyers: Not from the workspace for web, but from your local workspace APP.<\/p>\n<p>121<br \/>00:16:03.360 &#8211;&gt; 00:16:17.940<br \/>Geremy Meyers: Then it&#8217;ll actually initiate that local browser session within workspace which by the way, the security controls that you give the same ones, you get in the browser services just whereas that browser hosted either a in the browser service or be launched from the workspace APP so.<\/p>\n<p>122<br \/>00:16:19.020 &#8211;&gt; 00:16:19.890<br \/>Geremy Meyers: Does that make sense.<\/p>\n<p>123<br \/>00:16:20.970 &#8211;&gt; 00:16:33.240<br \/>Andy Whiteside: No, it does for me I just find that, for whatever reason, a lot of legacy citrix customers, or even new ones they&#8217;re just so understanding that citrix is this presentation virtualization company.<\/p>\n<p>124<br \/>00:16:33.600 &#8211;&gt; 00:16:47.520<br \/>Andy Whiteside: That they don&#8217;t even know these options exist and and you really don&#8217;t even think that way until you start thinking digital workspace as a solution and then all of a sudden, you know left turns right turns go straight turn around go backwards l become doable within one pane of glass.<\/p>\n<p>125<br \/>00:16:48.300 &#8211;&gt; 00:16:55.170<br \/>Geremy Meyers: Yes, I had a customer recently that we went down this path with and they showed me what their user experience was for their positions right.<\/p>\n<p>126<br \/>00:16:55.590 &#8211;&gt; 00:17:03.960<br \/>Geremy Meyers: And the way it works is they launched their emr and once they were inside their your margin their emr was hosted within the data Center it&#8217;s being delivered with you know see bad right.<\/p>\n<p>127<br \/>00:17:04.410 &#8211;&gt; 00:17:11.730<br \/>Geremy Meyers: And once they got into that emr sitting on a desktop inside their data Center we noticed that there was another page that popped up and guess what that was it was literally.<\/p>\n<p>128<br \/>00:17:12.270 &#8211;&gt; 00:17:21.450<br \/>Geremy Meyers: A URL they just had a web mix and they would click any of those web links and it would take them somewhere else now Andy you and I both know that physicians don&#8217;t like a lots of clicks.<\/p>\n<p>129<br \/>00:17:22.140 &#8211;&gt; 00:17:25.620<br \/>Geremy Meyers: Right, they want to, they want to click something to get right into it, and so, when I showed them.<\/p>\n<p>130<br \/>00:17:26.130 &#8211;&gt; 00:17:35.250<br \/>Geremy Meyers: You know, and this was literally a list of maybe 1620 different web links, I said hey you know what if we took those web links outside of this internal portal and presented those right inside of workspace.<\/p>\n<p>131<br \/>00:17:36.090 &#8211;&gt; 00:17:46.800<br \/>Geremy Meyers: And they could click that link it was like a game changer for them right they had no idea that that was even an option, why no one had ever talked to them about it, so we did to your point, we did, and it just kind of opened up a lot of possibility that and considered.<\/p>\n<p>132<br \/>00:17:48.210 &#8211;&gt; 00:18:02.070<br \/>Andy Whiteside: Well, and I, and I blame citrix because of the success of all the other stuff people just kind of you know there&#8217;s still people this day that are just now learning about routing protocols and how magical, that is, I saw my first one in 1999.<\/p>\n<p>133<br \/>00:18:03.600 &#8211;&gt; 00:18:08.670<br \/>Andy Whiteside: The success of that is kind of dwarfed all this other stuff but this other stuff is where it&#8217;s going next.<\/p>\n<p>134<br \/>00:18:09.810 &#8211;&gt; 00:18:14.310<br \/>Andy Whiteside: As you know, the world of SAS becomes more and more mainstream every day for everything.<\/p>\n<p>135<br \/>00:18:17.370 &#8211;&gt; 00:18:27.870<br \/>Geremy Meyers: yep nope you&#8217;re absolutely right you&#8217;re absolutely right now I think what&#8217;s different is the fact that you can apply those same policies that were used to doing with presentation server.<\/p>\n<p>136<br \/>00:18:28.620 &#8211;&gt; 00:18:34.920<br \/>Geremy Meyers: to any of these web links and that&#8217;s a game changer right so certainly I can do some single sign on these websites that&#8217;s great.<\/p>\n<p>137<br \/>00:18:35.220 &#8211;&gt; 00:18:48.930<br \/>Geremy Meyers: But being able to wrap that same level security to it, and you know, then today also bypass the vpn just like I couldn&#8217;t before again that touches on that that network flow you just discussed, but you know we&#8217;ve got a way to broker internal websites.<\/p>\n<p>138<br \/>00:18:50.250 &#8211;&gt; 00:18:52.920<br \/>Geremy Meyers: Even if they&#8217;re rendered locally on my device yeah.<\/p>\n<p>139<br \/>00:18:54.900 &#8211;&gt; 00:19:03.060<br \/>Todd Smith &#8211; Citrix: Well, not only that, but also being able to control the access right, so you have it, based on role based access, controls, but also being able to.<\/p>\n<p>140<br \/>00:19:03.600 &#8211;&gt; 00:19:20.430<br \/>Todd Smith &#8211; Citrix: to manage and control cut and paste and clipboard functionalities and printing printing functionalities as well within the browser even though it&#8217;s you know, coming from a from a secure browser service or from a secure browser inside the workspace APP.<\/p>\n<p>141<br \/>00:19:23.220 &#8211;&gt; 00:19:37.860<br \/>Geremy Meyers: yeah and that link right there you&#8217;ve got up right now Andy that&#8217;s a great flow, so what that does is, if you launch that i&#8217;m not saying do it here, but it takes you through the flow of the same web APP with a security controls turned on or not turned on so again it&#8217;s policy driven.<\/p>\n<p>142<br \/>00:19:40.500 &#8211;&gt; 00:19:42.090<br \/>Andy Whiteside: has helped me understand where.<\/p>\n<p>143<br \/>00:19:43.290 &#8211;&gt; 00:19:44.880<br \/>Andy Whiteside: Where the networking for some I.<\/p>\n<p>144<br \/>00:19:45.900 &#8211;&gt; 00:19:59.130<br \/>Andy Whiteside: can&#8217;t believe i&#8217;m drawing a blank on this, but the overall concept of routing your client in user browser traffic through in and out of some technology to make sure it&#8217;s clean or sanitized first what is that called.<\/p>\n<p>145<br \/>00:20:02.220 &#8211;&gt; 00:20:08.010<br \/>Geremy Meyers: You are we have what we have two different solutions here so i&#8217;m not i&#8217;m not quite sure which one you&#8217;re hitting on we&#8217;ve got.<\/p>\n<p>146<br \/>00:20:08.310 &#8211;&gt; 00:20:23.280<br \/>Geremy Meyers: Secure Internet access, which is really more filtering out based outbound traffic yeah but then we also have you know another solution that will basically it&#8217;s client lists access into internal web Apps you know that sort of thing too so which one, are you are you thinking of.<\/p>\n<p>147<br \/>00:20:25.140 &#8211;&gt; 00:20:28.320<br \/>Andy Whiteside: I guess i&#8217;m thinking of client list X some.<\/p>\n<p>148<br \/>00:20:29.910 &#8211;&gt; 00:20:39.840<br \/>Andy Whiteside: I can&#8217;t i&#8217;m drawing a blank on the concept of being able to have in users proxy through something you know the old days of a Microsoft proxy.<\/p>\n<p>149<br \/>00:20:40.380 &#8211;&gt; 00:20:53.160<br \/>Andy Whiteside: But now we&#8217;re doing it through a service that is expecting inspecting the traffic along the way, so that if things that we know are bad or malicious type of activities are happening in that traffic we&#8217;re able to call it out and stop it.<\/p>\n<p>150<br \/>00:20:54.660 &#8211;&gt; 00:20:56.820<br \/>Geremy Meyers: Are we taking a laugh so.<\/p>\n<p>151<br \/>00:20:57.030 &#8211;&gt; 00:20:58.530<br \/>Geremy Meyers: yeah like a like a web APP firewall.<\/p>\n<p>152<br \/>00:20:59.370 &#8211;&gt; 00:21:05.040<br \/>Andy Whiteside: Well, not really i&#8217;m not really on the endpoint the end user, the thing like eyeballs type technologies What are those call.<\/p>\n<p>153<br \/>00:21:05.040 &#8211;&gt; 00:21:15.330<br \/>Geremy Meyers: I gotcha I gotcha so that is a citrix secure internet access and the idea behind that guy is there&#8217;s an agent that would sit on either the employment or even within a virtual.<\/p>\n<p>154<br \/>00:21:15.750 &#8211;&gt; 00:21:20.760<br \/>Geremy Meyers: Virtual desktop you know share desktop and you know you need the traffic that&#8217;s outbound would get scrubbed.<\/p>\n<p>155<br \/>00:21:21.090 &#8211;&gt; 00:21:27.030<br \/>Geremy Meyers: You know, through the service so let&#8217;s say, for instance republishing that browser you know even there was an APP session or adapt session.<\/p>\n<p>156<br \/>00:21:27.750 &#8211;&gt; 00:21:40.620<br \/>Geremy Meyers: You know any of that outbound traffic is being scrubbed and the policies that we enable or everything from you know just just site content to you know dlp I mean the list of what you can scrub and again manage that data.<\/p>\n<p>157<br \/>00:21:41.790 &#8211;&gt; 00:21:47.940<br \/>Geremy Meyers: is pretty lengthy, but the idea behind that is scrubbing the traffic within the session that makes sense.<\/p>\n<p>158<br \/>00:21:48.510 &#8211;&gt; 00:21:54.960<br \/>Andy Whiteside: Now boy, and that agent, you talked about the beautiful thing is you&#8217;re already going to have the citrix workspace APP on there it is inside that that workspace APP correct.<\/p>\n<p>159<br \/>00:21:55.410 &#8211;&gt; 00:21:56.430<br \/>Geremy Meyers: It is yeah.<\/p>\n<p>160<br \/>00:21:57.720 &#8211;&gt; 00:22:05.910<br \/>Andy Whiteside: Well guys, I know you both had to go at the bottom of the hour, I do too so it&#8217;s probably fine I think what we&#8217;ll do is as a follow on to this conversation will do secure access.<\/p>\n<p>161<br \/>00:22:06.420 &#8211;&gt; 00:22:12.060<br \/>Andy Whiteside: Next, so we take the the browser story and then this story time to together, and then we move on to the other.<\/p>\n<p>162<br \/>00:22:12.300 &#8211;&gt; 00:22:21.810<br \/>Andy Whiteside: 20 features, we got to cover for our listeners and try to expand everybody&#8217;s horizons beyond see that and beyond presentation server and when frame and metaphor.<\/p>\n<p>163<br \/>00:22:22.470 &#8211;&gt; 00:22:31.440<br \/>Andy Whiteside: All the beautiful successful things that we all thought was a magical in, and still is, I mean I don&#8217;t want to diminish that still is, but there&#8217;s so much more that we need in a digital workspace strategy.<\/p>\n<p>164<br \/>00:22:33.120 &#8211;&gt; 00:22:34.410<br \/>Geremy Meyers: Absolutely i&#8217;m looking forward to it.<\/p>\n<p>165<br \/>00:22:36.270 &#8211;&gt; 00:22:40.290<br \/>Andy Whiteside: tada got the New York excel thing coming up right, so you just.<\/p>\n<p>166<br \/>00:22:40.290 &#8211;&gt; 00:22:50.310<br \/>Todd Smith &#8211; Citrix: We do we have a CDC XL event coming up on July 27 it&#8217;s going to be a Yankee stadium, we got a we&#8217;ve got a great lineup of.<\/p>\n<p>167<br \/>00:22:51.420 &#8211;&gt; 00:23:01.560<br \/>Todd Smith &#8211; Citrix: presenters including Joe Kim who is our chief product officer we&#8217;ve also got Christian Riley who&#8217;s one of our he&#8217;s our chief product strategist when it comes to technologies.<\/p>\n<p>168<br \/>00:23:02.400 &#8211;&gt; 00:23:12.540<br \/>Todd Smith &#8211; Citrix: We also have several CT peas and other folks that are going to be joining us it&#8217;s a full day event registration is available go to my cdc.org.<\/p>\n<p>169<br \/>00:23:13.140 &#8211;&gt; 00:23:24.060<br \/>Todd Smith &#8211; Citrix: And it&#8217;ll probably prompt you to create a new account because the platform did change but go ahead and register for that event once again it&#8217;s a great opportunity it&#8217;s free of charge.<\/p>\n<p>170<br \/>00:23:27.060 &#8211;&gt; 00:23:27.660<br \/>You know.<\/p>\n<p>171<br \/>00:23:28.710 &#8211;&gt; 00:23:32.430<br \/>Todd Smith &#8211; Citrix: There is a limit on the number of people can register so register now.<\/p>\n<p>172<br \/>00:23:33.450 &#8211;&gt; 00:23:45.300<br \/>Todd Smith &#8211; Citrix: it&#8217;s a great opportunity to go here what&#8217;s the latest and greatest from not only citrix, but a lot of our innovation partners and ecosystem partners, as well as well as going to visit to the hallowed halls of Yankee stadium.<\/p>\n<p>173<br \/>00:23:46.410 &#8211;&gt; 00:23:50.490<br \/>Geremy Meyers: Is that going to be virtual as well, but they&#8217;re going to do a an in person, but also make it virtually.<\/p>\n<p>174<br \/>00:23:50.520 &#8211;&gt; 00:23:53.340<br \/>Todd Smith &#8211; Citrix: No, this is a fully in person event.<\/p>\n<p>175<br \/>00:23:55.200 &#8211;&gt; 00:23:57.030<br \/>Andy Whiteside: Well Todd i&#8217;m going to go ahead and start planning my trip.<\/p>\n<p>176<br \/>00:23:58.620 &#8211;&gt; 00:23:59.220<br \/>Todd Smith &#8211; Citrix: i&#8217;ll be there.<\/p>\n<p>177<br \/>00:24:00.150 &#8211;&gt; 00:24:01.680<br \/>Andy Whiteside: And they gotta run we&#8217;ll see you next week.<\/p>\n<p>178<br \/>00:24:01.710 &#8211;&gt; 00:24:01.980<br \/>alright.<\/p>\n<p>179<br \/>00:24:03.240 &#8211;&gt; 00:24:04.200<br \/>Todd Smith &#8211; Citrix: Have a safe fourth of July.<\/p>\n<p><\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>Swift and easy access to information is the lifeblood of productive remote work. You want your hybrid workers to be able to easily browse the internet for whatever insights and &hellip;<\/p>","protected":false},"author":7,"featured_media":65995,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_price":"","_stock":"","_tribe_ticket_header":"","_tribe_default_ticket_provider":"","_tribe_ticket_capacity":"0","_ticket_start_date":"","_ticket_end_date":"","_tribe_ticket_show_description":"","_tribe_ticket_show_not_going":false,"_tribe_ticket_use_global_stock":"","_tribe_ticket_global_stock_level":"","_global_stock_mode":"","_global_stock_cap":"","_tribe_rsvp_for_event":"","_tribe_ticket_going_count":"","_tribe_ticket_not_going_count":"","_tribe_tickets_list":"[]","_tribe_ticket_has_attendee_info_fields":false,"footnotes":""},"categories":[5],"tags":[],"class_list":["post-66044","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-podcast"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>108: The Citrix Session: Browser security in Citrix<\/title>\n<meta name=\"description\" content=\"Join us on the Citrix Session as we discuss &quot;Citrix Features Explained: Browser security in Citrix Secure Private Access&quot;\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/xentegra.com\/hi\/resources\/108-the-citrix-session-citrix-features-explained-browser-security-in-citrix-secure-private-access\/\" \/>\n<meta property=\"og:locale\" content=\"hi_IN\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"108: The Citrix Session: Browser security in Citrix\" \/>\n<meta property=\"og:description\" content=\"Join us on the Citrix Session as we discuss &quot;Citrix Features Explained: Browser security in Citrix Secure Private Access&quot;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/xentegra.com\/hi\/resources\/108-the-citrix-session-citrix-features-explained-browser-security-in-citrix-secure-private-access\/\" \/>\n<meta property=\"og:site_name\" content=\"XenTegra\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/XenTegra\/\" \/>\n<meta property=\"article:published_time\" content=\"2022-07-01T22:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-02-06T11:50:57+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/eadn-wc05-13529174.nxedge.io\/wp-content\/uploads\/2024\/03\/Citrix-Session.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1100\" \/>\n\t<meta property=\"og:image:height\" content=\"600\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Chase Newmyer\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@xentegra\" \/>\n<meta name=\"twitter:site\" content=\"@xentegra\" \/>\n<meta name=\"twitter:label1\" content=\"\u0926\u094d\u0935\u093e\u0930\u093e \u0932\u093f\u0916\u093f\u0924\" \/>\n\t<meta name=\"twitter:data1\" content=\"Chase Newmyer\" \/>\n\t<meta name=\"twitter:label2\" content=\"\u0905\u0928\u0941\u092e\u093e\u0928\u093f\u0924 \u092a\u0922\u093c\u0928\u0947 \u0915\u093e \u0938\u092e\u092f\" \/>\n\t<meta name=\"twitter:data2\" content=\"25 \u092e\u093f\u0928\u091f\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/xentegra.com\\\/resources\\\/108-the-citrix-session-citrix-features-explained-browser-security-in-citrix-secure-private-access\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/xentegra.com\\\/resources\\\/108-the-citrix-session-citrix-features-explained-browser-security-in-citrix-secure-private-access\\\/\"},\"author\":{\"name\":\"Chase Newmyer\",\"@id\":\"https:\\\/\\\/xentegra.com\\\/#\\\/schema\\\/person\\\/84736408f096bfd92b80305aea8846a7\"},\"headline\":\"108: The Citrix Session: Citrix Features Explained: Browser security in Citrix Secure Private Access\",\"datePublished\":\"2022-07-01T22:00:00+00:00\",\"dateModified\":\"2025-02-06T11:50:57+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/xentegra.com\\\/resources\\\/108-the-citrix-session-citrix-features-explained-browser-security-in-citrix-secure-private-access\\\/\"},\"wordCount\":5638,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/xentegra.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/xentegra.com\\\/resources\\\/108-the-citrix-session-citrix-features-explained-browser-security-in-citrix-secure-private-access\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/xentegra.com\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/Citrix-Session.png\",\"articleSection\":[\"Podcast\"],\"inLanguage\":\"hi-IN\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/xentegra.com\\\/resources\\\/108-the-citrix-session-citrix-features-explained-browser-security-in-citrix-secure-private-access\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/xentegra.com\\\/resources\\\/108-the-citrix-session-citrix-features-explained-browser-security-in-citrix-secure-private-access\\\/\",\"url\":\"https:\\\/\\\/xentegra.com\\\/resources\\\/108-the-citrix-session-citrix-features-explained-browser-security-in-citrix-secure-private-access\\\/\",\"name\":\"108: The Citrix Session: Browser security in Citrix\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/xentegra.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/xentegra.com\\\/resources\\\/108-the-citrix-session-citrix-features-explained-browser-security-in-citrix-secure-private-access\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/xentegra.com\\\/resources\\\/108-the-citrix-session-citrix-features-explained-browser-security-in-citrix-secure-private-access\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/xentegra.com\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/Citrix-Session.png\",\"datePublished\":\"2022-07-01T22:00:00+00:00\",\"dateModified\":\"2025-02-06T11:50:57+00:00\",\"description\":\"Join us on the Citrix Session as we discuss \\\"Citrix Features Explained: Browser security in Citrix Secure Private Access\\\"\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/xentegra.com\\\/resources\\\/108-the-citrix-session-citrix-features-explained-browser-security-in-citrix-secure-private-access\\\/#breadcrumb\"},\"inLanguage\":\"hi-IN\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/xentegra.com\\\/resources\\\/108-the-citrix-session-citrix-features-explained-browser-security-in-citrix-secure-private-access\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"hi-IN\",\"@id\":\"https:\\\/\\\/xentegra.com\\\/resources\\\/108-the-citrix-session-citrix-features-explained-browser-security-in-citrix-secure-private-access\\\/#primaryimage\",\"url\":\"https:\\\/\\\/xentegra.com\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/Citrix-Session.png\",\"contentUrl\":\"https:\\\/\\\/xentegra.com\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/Citrix-Session.png\",\"width\":1100,\"height\":600},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/xentegra.com\\\/resources\\\/108-the-citrix-session-citrix-features-explained-browser-security-in-citrix-secure-private-access\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/xentegra.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"108: The Citrix Session: Citrix Features Explained: Browser security in Citrix Secure Private Access\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/xentegra.com\\\/#website\",\"url\":\"https:\\\/\\\/xentegra.com\\\/\",\"name\":\"XenTegra\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/xentegra.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/xentegra.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"hi-IN\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/xentegra.com\\\/#organization\",\"name\":\"XenTegra\",\"url\":\"https:\\\/\\\/xentegra.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"hi-IN\",\"@id\":\"https:\\\/\\\/xentegra.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/xentegra.com\\\/wp-content\\\/uploads\\\/2023\\\/06\\\/1519903807641-min.jpg\",\"contentUrl\":\"https:\\\/\\\/xentegra.com\\\/wp-content\\\/uploads\\\/2023\\\/06\\\/1519903807641-min.jpg\",\"width\":200,\"height\":200,\"caption\":\"XenTegra\"},\"image\":{\"@id\":\"https:\\\/\\\/xentegra.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/XenTegra\\\/\",\"https:\\\/\\\/x.com\\\/xentegra\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/xentegra-llc\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/xentegra.com\\\/#\\\/schema\\\/person\\\/84736408f096bfd92b80305aea8846a7\",\"name\":\"Chase Newmyer\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"hi-IN\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d46cd44f0bd433dc5a386cbac549c62fd92266e3951669c705b347be2130cca3?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d46cd44f0bd433dc5a386cbac549c62fd92266e3951669c705b347be2130cca3?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d46cd44f0bd433dc5a386cbac549c62fd92266e3951669c705b347be2130cca3?s=96&d=mm&r=g\",\"caption\":\"Chase Newmyer\"},\"url\":\"https:\\\/\\\/xentegra.com\\\/hi\\\/resources\\\/author\\\/chasenewmyer\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"108: The Citrix Session: Browser security in Citrix","description":"Join us on the Citrix Session as we discuss \"Citrix Features Explained: Browser security in Citrix Secure Private Access\"","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/xentegra.com\/hi\/resources\/108-the-citrix-session-citrix-features-explained-browser-security-in-citrix-secure-private-access\/","og_locale":"hi_IN","og_type":"article","og_title":"108: The Citrix Session: Browser security in Citrix","og_description":"Join us on the Citrix Session as we discuss \"Citrix Features Explained: Browser security in Citrix Secure Private Access\"","og_url":"https:\/\/xentegra.com\/hi\/resources\/108-the-citrix-session-citrix-features-explained-browser-security-in-citrix-secure-private-access\/","og_site_name":"XenTegra","article_publisher":"https:\/\/www.facebook.com\/XenTegra\/","article_published_time":"2022-07-01T22:00:00+00:00","article_modified_time":"2025-02-06T11:50:57+00:00","og_image":[{"width":1100,"height":600,"url":"https:\/\/eadn-wc05-13529174.nxedge.io\/wp-content\/uploads\/2024\/03\/Citrix-Session.png","type":"image\/png"}],"author":"Chase Newmyer","twitter_card":"summary_large_image","twitter_creator":"@xentegra","twitter_site":"@xentegra","twitter_misc":{"\u0926\u094d\u0935\u093e\u0930\u093e \u0932\u093f\u0916\u093f\u0924":"Chase Newmyer","\u0905\u0928\u0941\u092e\u093e\u0928\u093f\u0924 \u092a\u0922\u093c\u0928\u0947 \u0915\u093e \u0938\u092e\u092f":"25 \u092e\u093f\u0928\u091f"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/xentegra.com\/resources\/108-the-citrix-session-citrix-features-explained-browser-security-in-citrix-secure-private-access\/#article","isPartOf":{"@id":"https:\/\/xentegra.com\/resources\/108-the-citrix-session-citrix-features-explained-browser-security-in-citrix-secure-private-access\/"},"author":{"name":"Chase Newmyer","@id":"https:\/\/xentegra.com\/#\/schema\/person\/84736408f096bfd92b80305aea8846a7"},"headline":"108: The Citrix Session: Citrix Features Explained: Browser security in Citrix Secure Private Access","datePublished":"2022-07-01T22:00:00+00:00","dateModified":"2025-02-06T11:50:57+00:00","mainEntityOfPage":{"@id":"https:\/\/xentegra.com\/resources\/108-the-citrix-session-citrix-features-explained-browser-security-in-citrix-secure-private-access\/"},"wordCount":5638,"commentCount":0,"publisher":{"@id":"https:\/\/xentegra.com\/#organization"},"image":{"@id":"https:\/\/xentegra.com\/resources\/108-the-citrix-session-citrix-features-explained-browser-security-in-citrix-secure-private-access\/#primaryimage"},"thumbnailUrl":"https:\/\/eadn-wc05-13529174.nxedge.io\/wp-content\/uploads\/2024\/03\/Citrix-Session.png","articleSection":["Podcast"],"inLanguage":"hi-IN","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/xentegra.com\/resources\/108-the-citrix-session-citrix-features-explained-browser-security-in-citrix-secure-private-access\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/xentegra.com\/resources\/108-the-citrix-session-citrix-features-explained-browser-security-in-citrix-secure-private-access\/","url":"https:\/\/xentegra.com\/resources\/108-the-citrix-session-citrix-features-explained-browser-security-in-citrix-secure-private-access\/","name":"108: The Citrix Session: Browser security in Citrix","isPartOf":{"@id":"https:\/\/xentegra.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/xentegra.com\/resources\/108-the-citrix-session-citrix-features-explained-browser-security-in-citrix-secure-private-access\/#primaryimage"},"image":{"@id":"https:\/\/xentegra.com\/resources\/108-the-citrix-session-citrix-features-explained-browser-security-in-citrix-secure-private-access\/#primaryimage"},"thumbnailUrl":"https:\/\/eadn-wc05-13529174.nxedge.io\/wp-content\/uploads\/2024\/03\/Citrix-Session.png","datePublished":"2022-07-01T22:00:00+00:00","dateModified":"2025-02-06T11:50:57+00:00","description":"Join us on the Citrix Session as we discuss \"Citrix Features Explained: Browser security in Citrix Secure Private Access\"","breadcrumb":{"@id":"https:\/\/xentegra.com\/resources\/108-the-citrix-session-citrix-features-explained-browser-security-in-citrix-secure-private-access\/#breadcrumb"},"inLanguage":"hi-IN","potentialAction":[{"@type":"ReadAction","target":["https:\/\/xentegra.com\/resources\/108-the-citrix-session-citrix-features-explained-browser-security-in-citrix-secure-private-access\/"]}]},{"@type":"ImageObject","inLanguage":"hi-IN","@id":"https:\/\/xentegra.com\/resources\/108-the-citrix-session-citrix-features-explained-browser-security-in-citrix-secure-private-access\/#primaryimage","url":"https:\/\/eadn-wc05-13529174.nxedge.io\/wp-content\/uploads\/2024\/03\/Citrix-Session.png","contentUrl":"https:\/\/eadn-wc05-13529174.nxedge.io\/wp-content\/uploads\/2024\/03\/Citrix-Session.png","width":1100,"height":600},{"@type":"BreadcrumbList","@id":"https:\/\/xentegra.com\/resources\/108-the-citrix-session-citrix-features-explained-browser-security-in-citrix-secure-private-access\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/xentegra.com\/"},{"@type":"ListItem","position":2,"name":"108: The Citrix Session: Citrix Features Explained: Browser security in Citrix Secure Private Access"}]},{"@type":"WebSite","@id":"https:\/\/xentegra.com\/#website","url":"https:\/\/xentegra.com\/","name":"\u091c\u093c\u0947\u0928\u091f\u0947\u0917\u094d\u0930\u093e","description":"","publisher":{"@id":"https:\/\/xentegra.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/xentegra.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"hi-IN"},{"@type":"Organization","@id":"https:\/\/xentegra.com\/#organization","name":"\u091c\u093c\u0947\u0928\u091f\u0947\u0917\u094d\u0930\u093e","url":"https:\/\/xentegra.com\/","logo":{"@type":"ImageObject","inLanguage":"hi-IN","@id":"https:\/\/xentegra.com\/#\/schema\/logo\/image\/","url":"https:\/\/eadn-wc05-13529174.nxedge.io\/wp-content\/uploads\/2023\/06\/1519903807641-min.jpg","contentUrl":"https:\/\/eadn-wc05-13529174.nxedge.io\/wp-content\/uploads\/2023\/06\/1519903807641-min.jpg","width":200,"height":200,"caption":"XenTegra"},"image":{"@id":"https:\/\/xentegra.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/XenTegra\/","https:\/\/x.com\/xentegra","https:\/\/www.linkedin.com\/company\/xentegra-llc"]},{"@type":"Person","@id":"https:\/\/xentegra.com\/#\/schema\/person\/84736408f096bfd92b80305aea8846a7","name":"Chase Newmyer","image":{"@type":"ImageObject","inLanguage":"hi-IN","@id":"https:\/\/secure.gravatar.com\/avatar\/d46cd44f0bd433dc5a386cbac549c62fd92266e3951669c705b347be2130cca3?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d46cd44f0bd433dc5a386cbac549c62fd92266e3951669c705b347be2130cca3?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d46cd44f0bd433dc5a386cbac549c62fd92266e3951669c705b347be2130cca3?s=96&d=mm&r=g","caption":"Chase Newmyer"},"url":"https:\/\/xentegra.com\/hi\/resources\/author\/chasenewmyer\/"}]}},"_links":{"self":[{"href":"https:\/\/xentegra.com\/hi\/wp-json\/wp\/v2\/posts\/66044","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/xentegra.com\/hi\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/xentegra.com\/hi\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/xentegra.com\/hi\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/xentegra.com\/hi\/wp-json\/wp\/v2\/comments?post=66044"}],"version-history":[{"count":1139,"href":"https:\/\/xentegra.com\/hi\/wp-json\/wp\/v2\/posts\/66044\/revisions"}],"predecessor-version":[{"id":710080,"href":"https:\/\/xentegra.com\/hi\/wp-json\/wp\/v2\/posts\/66044\/revisions\/710080"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/xentegra.com\/hi\/wp-json\/wp\/v2\/media\/65995"}],"wp:attachment":[{"href":"https:\/\/xentegra.com\/hi\/wp-json\/wp\/v2\/media?parent=66044"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/xentegra.com\/hi\/wp-json\/wp\/v2\/categories?post=66044"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/xentegra.com\/hi\/wp-json\/wp\/v2\/tags?post=66044"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}