"The majority of users in a typical enterprise simply want frequent, location-independent access to a few key applications, such as email, calendar and.

Slides:



Advertisements
Similar presentations
| Copyright © 2009 Juniper Networks, Inc. | 1 WX Client Rajoo Nagar PLM, WABU.
Advertisements

Citrix Secure Gateway v1.1 Technical Presentation August 2002 Technical Presentation August 2002.
Enabling IPv6 in Corporate Intranet Networks
EToken PRO Anywhere. Agenda  eToken PRO Anywhere Overview  Market background and target markets  Identifying the opportunity  Implementation and Pricing.
Setting Up a Virtual Private Network Chapter 9. Learning Objectives Understand the components and essential operations of virtual private networks (VPNs)
Secure Remote Access from Cyber Cafe Timothy Siu SunONE SE Manager
Florida Department of Transportation Citrix Implementation
Securing Remote Network Access FirePass ®. Business Case VirginiaCORIS is an initiative to modernize the way that offender information is managed, to.
Network Security Topologies Chapter 11. Learning Objectives Explain network perimeter’s importance to an organization’s security policies Identify place.
Citrix ® Secure Gateway Phil Montgomery Senior Product Manager Citrix Products and Services October 2001.
E-business Infrastructure
K. Salah 1 Chapter 31 Security in the Internet. K. Salah 2 Figure 31.5 Position of TLS Transport Layer Security (TLS) was designed to provide security.
Citrix Partner Update The Citrix Delivery Centre.
This work is supported by the National Science Foundation under Grant Number DUE Any opinions, findings and conclusions or recommendations expressed.
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
Goal of The Paper  What exactly is a VPN?  Why do you need a VPN?  what are some of the technologies used in deploying a VPN?  How does a VPN work?
Virtual Private Networks Globalizing LANs Timothy Hohman.
Remote Access SSL VPN Stewart Duncan Technical Manager.
Firewalls Presented By Hareesh Pattipati. Outline Introduction Firewall Environments Type of Firewalls Future of Firewalls Conclusion.
RSA SecurID November 10, 2005.
1 © 2001, Cisco Systems, Inc. All rights reserved. Session Number Presentation_ID Cisco Easy VPN Solutions Applications and Implementation with Cisco IOS.
Faten Yahya Ismael.  It is technology creates a network that is physically public, but virtually it’s private.  A virtual private network (VPN) is a.
Copyright Microsoft Corp Ramnish Singh IT Advisor Microsoft Corporation Secure Remote Access Challenges, Choices, Best Practices.
Installing Citrix Secure Gateway Andrew Wilmot Citrix Technical Business Development Manager Abcd IT Citrix Technical Overview.
Virtual Private Network
SharePoint Portal Server 2003 JAMES WEIMHOLT WEIDER HAO JUAN TURCIOS BILL HUERTA BRANDON BROWN JAMES WEIMHOLT INTRODUCTION OVERVIEW IMPLEMENTATION CASE.
© 2005,2006 NeoAccel Inc. Training Access Modes. © 2005,2006 NeoAccel Inc. Agenda 2. Access Terminals 6. Quick Access Terminal Client 3. SSL VPN-Plus.
Virtual Private Network prepared by Rachna Agrawal Lixia Hou.
Secure remote access to applications through any web browser Internet Headquarters SSL Customers Suppliers Partners Mobile Workforce Applications .
Network Services Lesson 6. Objectives Skills/ConceptsObjective Domain Description Objective Domain Number Setting up common networking services Understanding.
Course 201 – Administration, Content Inspection and SSL VPN
Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 IPSec or SSL VPN? Decision Criteria.
RSA Security Validating Users and Devices to Protect Network Assets Endpoint Solutions for Cisco Environments.
Intranet, Extranet, Firewall. Intranet and Extranet.
Cyberoam - Unified Threat Management Unified Threat Management Cyberoam Copyright (C) 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy.
Access Gateway Operation
1 FirePass 6.0 Sales Training. 2 Agenda FirePass 6.0 Release Highlights Packaging & Pricing Product Availability Q&A.
©Kwan Sai Kit, All Rights Reserved Windows Small Business Server 2003 Features.
Deploying PKI Inside Microsoft The experience of Microsoft in deploying its own corporate PKI Published: December 2003.
Joseph Ferracin Director IT Security Solutions Managing Security.
The Citrix Delivery Center. 2 © 2008 Citrix Systems, Inc. — All rights reserved Every Day, IT Gets More Complex EMPLOYEES PARTNERS CUSTOMERS.
Jetro Platforms – Corporate Introduction What Do We Do? How Do We Do It? Why Choose Jetro CockpIT™ Technical Demonstration Agenda.
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
XPand your capabilities with Citrix ® MetaFrame XP ™ for Windows ®, Feature Release 2.
Name Company A Day in the Life… A Demonstration of Application Delivery.
BZUPAGES.COM. What is a VPN VPN is an acronym for Virtual Private Network. A VPN provides an encrypted and secure connection "tunnel" path from a user's.
Remote Access Using Citrix Presentation Server December 6, 2006 Matthew Granger IT665.
® Gradient Technologies, Inc. Inter-Cell Interworking Access Control Across the Boundary Open Group Members Meeting Sand Diego, CA USA April 1998 Brian.
John Girard Bill Clark Gartner Webinar SSL VPN - A Lightweight Alternative To IPSEC These materials can be reproduced only with Gartner’s official approval.
Integrating and Troubleshooting Citrix Access Gateway.
Citrix Secure Gateway v1.1 Customer Presentation Aug 2002 Customer Presentation Aug 2002.
"The majority of users in a typical enterprise simply want frequent, location-independent access to a few key applications, such as , calendar and.
Total Threat Protection Securing All Your Threat Vectors Hartford Tech Summit.
2015 NetSymm Overview NETSYMM OVERVIEW December
Client Access – Published applications Control through TEMPLATE.ICA Use SSL Authentication level –Remove: EncRc5-0 EncRc5-40 EncRc5-56.
Virtual Private Networks Manraj Sekhon. What is a VPN?
Windows Small Business Server 2003 R2 Powering Small Businesses.
Citrix On Demand Services. Agenda About Citrix & the “on-demand” access infrastructure Traditional client/server via Citrix Access Infrastructure –Scalable,
Securing Access to Data Using IPsec Josh Jones Cosc352.
Secure Access Link (SAL): Supporting Cost Savings and Improving Secure Access.
MetaFrame Secure Access Manager Overview Presented by Douglas A. Brown.
Virtual Private Networks
Barracuda SSL VPN 2012.
Barracuda SSL VPN Remote, Authenticated Access to Applications and Data.
Barracuda NextGen Firewalls
Recipes for Use With Thin Clients
Tailor slide to customer industry/pain points
Check Point Connectra NGX R60
Virtual Private Network
Secure Gateway Today Internet Internet Explorer and ICA MetaFrame
Presentation transcript:

"The majority of users in a typical enterprise simply want frequent, location-independent access to a few key applications, such as , calendar and selected reports.“ - John Girard, vice president and director of research at Gartner Group

The Internet — network of choice n Global population now exceeds 200 million users n Will reach one billion in the next 2 – 5 years n By 2004, e-commerce solutions will reach $2.5 trillion

The Internet — network of choice Greater Faster Lower reach implementation cost Partners Competitive data and joint initiatives Suppliers Inventory updates and production status Employees Most up-to-date news, information and apps Customers Enhanced interactive e-commerce

What is Citrix Secure Gateway? Citrix Secure Gateway is a secure Internet gateway between MetaFrame® servers and ICA Client workstations that allows customers to simply and securely deliver applications across the Internet, on demand, to any device

Benefits of Citrix Secure Gateway n Provides secure remote access - anywhere n Lowers cost of ownership n Protects your MetaFrame investment n Integrates employees, customers, etc.

Citrix Security Solutions SSL Solutions CSG is a simple and secure, ICA only solution SecureICA™ SSL Relay Citrix Secure Gateway Citrix Extranet™ Lower Security Highest Security

When to use SecureICA or SSL Relay Use SecureICA when:  Internal LAN / WAN / Intranet  Secure DOS or Win 16 access is necessary  Have older devices/ ICA clients that cannot be upgraded  Risk of “man-in-the-middle” attack is acceptable Use SSL Relay when:  Small number of MetaFrame servers to support (<5)  No need to secure access at DMZ  No need to hide server IP addresses, or NAT is used  Need end-to-end encryption of data between client and server

When to use CSG or Citrix Extranet Use Citrix Secure Gateway when:  Large number of servers to support  Want to hide internal network addresses  Want to secure from DMZ  Need two-factor authentication (in conjunction with NFuse)  Need non-intrusive client install i.e. access from Internet cafes Use Citrix Extranet or another VPN when:  Need two-factor authentication  Need to create a secure pipeline for full (beyond ICA) network access  Need to create secure tunnels between sites  Want to secure from within DMZ  Access is normally via same workstation i.e. OK to install additional client  Want to use IPSEC

Key Features of Citrix Secure Gateway Strong Encryption n Industry standard SSL 3.0 Minimal Client Configuration n Uses latest ICA client Single Authentication n Integrates with NFuse Simplified Server Management n Gateway to MetaFrame server farm Ease of Firewall Traversal n Uses standard port 443

Typical architecture MetaFrame Server Farm Citrix XML Service Secure Web Server Citrix NFuse Citrix Secure Gateway ICA Client Web Browser

CSG Architecture – key points Authorization based on ticketing, leverages NFuse for authentication n Compatible with a wide range of authentication systems n Compatible with any Web-compatible authentication n Replaceable Secure Ticketing Authority n Works with replaceable authentication – e.g. SecurID, Smart Card Operates in Gateway mode – installed in DMZ n Highly scalable – by design n Single CSG server can support 500 to 2000 concurrent connections n Highly reliable – fail-over support for STA, external Load Balancer for main CSG Server Uses XML for inter-component communication n Components are easily replaceable by Citrix or 3 rd party

Pricing and Packaging

Pricing, Packaging, Subscription Advantage Pricing n Citrix Secure Gateway is delivered at no cost as a benefit of Subscription Advantage. Therefore, there is no price associated with the product. Packaging n Citrix Secure Gateway is available via the Citrix Secure Portal only at There is no physical media. n CSG is less than 6MB in size Subscription Advantage Fulfillment n Subscription Advantage customers to be contacted via . n Only customers who have purchased a MetaFrame XP solution, or MetaFrame for UNIX, and have a valid and active Subscription Advantage contract are entitled to receive Citrix Secure Gateway as a benefit. n These customers can visit the Citrix Secure Portal Web site at for Subscription Advantage benefit fulfillment. n Citrix Secure Gateway will NOT be optionally sold to MetaFrame XP for Windows and MetaFrame for UNIX customers who did not buy with Subscription Advantage,

For More Information… For More Information n Contact a local member of the Citrix Solutions Network™ n Connect to Citrix Web site at: