An introduction to Citrix’s Secure Private Access (SPA)
Traditional enterprise architecture and security models aren’t suited to meet the needs of today’s hybrid workforce and the accompanying complex application-security requirements. With the shift to SaaS, more data and business apps are residing on the cloud, while many enterprise apps remain inside the datacenter.
Unfortunately, this makes these complex environments challenging to secure and manage. On top of that, the growth of hybrid work and the expanded use of different device types have increased the attack surface for organizations.
“By 2024, at least 40% of all remote access usage will be served predominantly by zero trust network access (ZTNA), up from less than 5% at the end of 2020.” — Gartner® *
All these complexities and the expanded attack surface create opportunities for attackers. As a result, organizations need to rethink their approach to security, embracing zero trust, and at the same time make it seamless for employees to access apps securely from anywhere, at any time, and from any device.
Common challenges faced by enterprises today include:
- Cyberthreat Risks: Siloed point products cannot provide broad protection against cyberattacks
- Poor Experience: High latency to access applications when backhauling traffic thought the datacenter
- Complex Management: Multiple complex and hard-to-manage siloed technologies
- Too Much Work: Overwhelmed IT staff due to rapid usage and high dependency on VPN
- Slow Cloud Adoption: Complexity of transitioning to a cloud/multi-cloud architecture
- Expensive: Overspending on siloed, redundant, and disjointed security technology increases costs
Citrix Secure Private Access: What Is It and What’s New?
Citrix Secure Private Access is our new cloud delivered ZTNA service that adds new capabilities like adaptive authentication and adaptive access to deliver zero trust access to web, SaaS, TCP (e.g. SAP, Oracle), and UDP-based apps. Citrix Secure Private Access will replace Citrix Secure Workspace Access, which was primarily focused on secure access to browser-based applications.
Léa la publicación completa aquí