Citrix Access Gateway 8.1 will now integrate with XenDesktop, the firm said, giving a combined solution that will let firms control access to applications and desktops regardless of user location.
Three new features support these claims; SmartAccess for Virtual Desktops, which lets the IT department control who access what, and from where.
Improved scalability for Secure Virtual Desktop Access – a feature that the firm said would enable a wide geographical and user number spread for any rolled out applications. And faster configuration and deployment.
The latter speaks for itself, but the firm explained that new configuration wizards and automation tools had made this possible.
“Enterprise customers can now restrict the access and use of desktops and approved applications from a central location, without network reconfiguration or end client software changes,” said Sanjay Uppal, vice president of product marketing at Citrix Systems.
“By integrating scalable secure access with the Citrix XenDesktop product line, we greatly simplify the control of critical datacenter resources without compromising security.”
The new features are available as of now. Appliances start at US$3500.
Citrix adds secure virtual desktop access to its roster
Staff Writer on Jun 11, 2008 7:56AM
Got a news tip for our journalists? Share it with us anonymously here.
itweek.co.uk @ 2010 Incisive Media
Partner Content

Secure, integrated platforms enable MSPs to focus bringing powerful solutions to customers

Channel can help lead customers to boosting workplace wellbeing with professional headsets

How NinjaOne Is Supporting The Channel As It Builds An Innovative Global Partner Program

Build cybersecurity capability with award winning Fortinet training from Ingram Micro
Ingram Micro Ushers in the Age of Ultra
Sponsored Whitepapers
-1.jpg&w=100&c=1&s=0)
Stop Fraud Before It Starts: A Must-Read Guide for Safer Customer Communications

The Cybersecurity Playbook for Partners in Asia Pacific and Japan

Pulseway Essential Eight Framework

7 Best Practices For Implementing Human Risk Management

2025 State of Machine Identity Security Report