Zero Trust Network Access (ZTNA) & Citrix

Cyber-attacks continue to grow, and some of the most common threats come from within, for example through a hacker using an employee’s compromised credentials. Combine that with more users working remotely from untrusted networks and personal devices becoming the norm, and IT has a larger attack surface to protect. Therefore, a lot of companies are now looking at a zero-trust security model. What exactly is Zero Trust Network Access? Why has it become an increasingly popular topic? How...

Om Podcasten

Stop living in the past. With technology changing, it's important to be aware of the latest features, functionality, and best practices. Join Steve Beals as he interviews the tech experts that helped design, build and deploy the latest Citrix technology. They'll help you understand how the magic works so you can impress others with your Citrix knowledge and expertise. So subscribe, tune in, and geek out with us on The Click-Down. Follow Steve Beals on X (formally Twitter) @SRBeals