secure the datacenter with beyondtrust & citrix€¦ · solution, with moderate layers of...

2
Citrix XenApp and XenDesktop create a robust, customizable, remote workspace solution, with moderate layers of security out-of-the-box. For most organizations, however, moderate security simply isn’t enough. Many best practices and industry standards require enforcement of least privilege on workstations, session recording, forensic logging, patch management, and file integrity monitoring. BeyondTrust helps organizations protect against privilege misuse and abuse—by both insiders and external attackers--with the most comprehensive and integrated privileged access management solution. BeyondTrust’s PowerBroker Privileged Access Management (PAM) Platform is a modular, integrated solution that provides visibility, control, policy management, and reporting over all privileged accounts and users. Via a single, unified platform that centralizes policy and administration, PowerBroker enables organizations to: y Establish and enforce least privilege on Windows, Mac, Unix, and Linux systems y Automate password and session management y Audit user and administrator activity y Integrate Unix, Linux, and Mac OS systems with Microsoft Active Directory y Provide advanced analytics on user and asset risk and activities y Integrate with third-party solutions for augmented analytics Together, BeyondTrust and Citrix enable workforce productivity and condense the attack surface, securing datacenter environments against both external and insider threats. Secure the Datacenter with BeyondTrust & Citrix About BeyondTrust BeyondTrust is a global information security software company that helps organizations prevent cyber attacks and unauthorized data access due to privilege abuse. Our solutions give you the visibility to confidently reduce risks and the control to take proactive, informed action against data breach threats. And because threats can come from anywhere, we built a platform that unifies the most effective technologies for addressing both internal and external risk: Privileged Access Management and Vulnerability Management. Our solutions grow with your needs, making sure you maintain control no matter where your company goes. BeyondTrust’s security solutions are trusted by over 4,000 customers worldwide, including half of the Fortune 100.About BeyondTrust. About Citrix Citrix Systems, Inc. is an American multinational software company that provides server, application and desktop virtualization, networking, software as a service, and cloud computing technologies. Only Citrix provides a complete virtual app and desktop solution to meet all your needs from a single, easy-to-deploy platform. Give employees the freedom to work from anywhere while cutting IT costs. Deliver Windows, Linux, web, and SaaS applications or full virtual desktops to workers on any device, anywhere. Common Citrix Deployment Architecture

Upload: others

Post on 02-Jun-2020

2 views

Category:

Documents


1 download

TRANSCRIPT

Page 1: Secure the Datacenter with BeyondTrust & Citrix€¦ · solution, with moderate layers of security out-of-the-box. For most organizations, however, moderate security simply isn’t

Citrix XenApp and XenDesktop create a robust, customizable, remote workspace solution, with moderate layers of security out-of-the-box. For most organizations, however, moderate security simply isn’t enough. Many best practices and industry standards require enforcement of least privilege on workstations, session recording, forensic logging, patch management, and file integrity monitoring.

BeyondTrust helps organizations protect against privilege misuse and abuse—by both insiders and external attackers--with the most comprehensive and integrated privileged access management solution. BeyondTrust’s PowerBroker Privileged Access Management (PAM) Platform is a modular, integrated solution that provides visibility, control, policy management, and reporting over all privileged accounts and users. Via a single, unified platform that centralizes policy and administration, PowerBroker enables organizations to:

y Establish and enforce least privilege on Windows, Mac, Unix, and Linux systems

y Automate password and session management

y Audit user and administrator activity

y Integrate Unix, Linux, and Mac OS systems with Microsoft Active Directory

y Provide advanced analytics on user and asset risk and activities

y Integrate with third-party solutions for augmented analytics

Together, BeyondTrust and Citrix enable workforce productivity and condense the attack surface, securing datacenter environments against both external and insider threats.

Secure the Datacenter with BeyondTrust & Citrix

About BeyondTrust

BeyondTrust is a global information security software company that helps organizations prevent cyber attacks and unauthorized data access due to privilege abuse. Our solutions give you the visibility to confidently reduce risks and the control to take proactive, informed action against data breach threats. And because threats can come from anywhere, we built a platform that unifies the most effective technologies for addressing both internal and external risk: Privileged Access Management and Vulnerability Management. Our solutions grow with your needs, making sure you maintain control no matter where your company goes. BeyondTrust’s security solutions are trusted by over 4,000 customers worldwide, including half of the Fortune 100.About BeyondTrust.

About Citrix

Citrix Systems, Inc. is an American multinational software company that provides server, application and desktop virtualization, networking, software as a service, and cloud computing technologies.

Only Citrix provides a complete virtual app and desktop solution to meet all your needs from a single, easy-to-deploy platform. Give employees the freedom to work from anywhere while cutting IT costs. Deliver Windows, Linux, web, and SaaS applications or full virtual desktops to workers on any device, anywhere.

Common Citrix Deployment Architecture

Page 2: Secure the Datacenter with BeyondTrust & Citrix€¦ · solution, with moderate layers of security out-of-the-box. For most organizations, however, moderate security simply isn’t

BeyondTrust Use Cases for Protecting Citrix Environments y Manage passwords of Citrix servers and software, as well as embedded and user-

created passwords

y Perform session management, record keystrokes, log commands, and manage passwords for administrators of the Citrix environment and foundational infrastructure, as well as for end-users accessing regulated or high-risk servers

y Automate DevOps and application use cases which require use of passwords to avoid hard-coding in scripts

y Bridge Linux hosts to Active Directory for ease of management and single sign-on

y Monitor and control critical Active Directory groups and changes to reduce the chance of unauthorized access into Citrix

y Scan and report on server, desktop, and application vulnerabilities and use these vulnerabilities to inform policy

y Enforce least privilege on published Windows and Linux desktops; removing direct administrative privileges from users, but still allowing them to execute operations with appropriate accounts/ privileges

y Generate reports on privileged activity within your Citrix and data center systems

y Perform file integrity monitoring on Windows and Linux systems, and report on unauthorized changes

y Deliver compliance reports built against hundreds of included templates

y Build custom security rules with REST API calls in between partner security systems, including endpoint security and SIEM technologies

y Quickly deliver forensic usage reports in case of detected security incidents

The PowerBroker Privileged Access Management Platform

The BeyondTrust PowerBroker Privileged Access Management Platform delivers visibility and control over all privileged accounts, users and assets. The platform integrates a comprehensive set of PAM capabilities to simplify deployments, reduce costs, improve system security, and reduce privilege-related risks. PowerBroker solutions include:

y Enterprise Password Security: Provide accountability and control over privileged credentials and sessions.

y Server Privilege Management: Control, audit, and simplify access to business critical systems.

y Endpoint Least Privilege: Remove excessive user privileges and control applications on endpoints.

CONTACT

North America [email protected]

[email protected]

APAC [email protected]

[email protected]

CONNECT

Twitter: @beyondtrustFacebook.com/beyondtrustLinkedin.com/company/beyondtrustwww.beyondtrust.com

© 2017 BeyondTrust Corporation. All rights reserved. BeyondTrust, BeyondInsight and PowerBroker are trademarks or registered trademarks of BeyondTrust in the United States and other countries. Microsoft, Windows, and other marks are the trademarks of their respective owners. July 2017