Citrix Virtual Desktops und Apps
Citrix Virtual Desktops and Apps (CVAD) combined with Citrix Cloud provides an easy way to quickly provision virtual desktops and applications within the data center or via the cloud to enable secure remote work. Together with deviceTRUST contextual security, administrators now have a powerful new way to securely and intelligently enforce all security, compliance and regulatory requirements when accessing your environment.
Ensures that only devices that meet all security and compliance requirements can be used. This includes a variety of different information for compliance checking such as antivirus and firewall status, OS update status, device and user certificates, domain membership, device management server, country, etc.
Full device support
In addition to the usual operating systems such as Microsoft Windows and Apple macOS, other operating systems such as Ubuntu, IGEL OS, Unicon eLux, Apple iOS and Chrome OS are also fully supported by deviceTRUST.
Compliant application access
Apply configuration defaults and policies to control available options and resources. This makes it very easy, for example, to apply policies to control the session idle time depending on the context of access or the location-dependent connection of session printers.
Apply configuration defaults and policies to control available options and resources. This makes it very easy, for example, to apply policies to control session idle time depending on the context of access, or to connect session printers based on location.
Contextual Citrix policies
Citrix policies can be fully contextually defined to control Citrix product functionality, such as client drive mapping or copy and paste.
The deviceTRUST context is always up to date. Context changes can be detected not only during login and when reconnecting to the session, but also during the session runtime to launch predefined actions.
For the context definition, a variety of information from the physical device, the connected network, the location, the time of day, as well as information about the user themselves can be used. In addition, external information is supported, such as from Microsoft SharePoint lists, databases, text files, etc.
You can quickly and easily create visibility of accesses via predefined and ready-to-use dashboards for Splunk, Graylog and ELK Stack.
Works without endpoint management
deviceTRUST does not require device management, whether for corporate-owned or BYOD devices. Optionally however, the installation of our client extension can also be done via your endpoint management system.
No additional infrastructure required
No additional infrastructure is required to use deviceTRUST, whether local or cloud-based installation.
With it, deviceTRUST brings together all the context and control you need to protect your Citrix Virtual Desktops and Apps (CVAD) workspaces while providing the modern access your users demand.