News

Citrix Introduces Secure Access with Extranet

Citrix Systems Inc. introduced Citrix Extranet, its virtual private network (VPN) software solution that offers secure access to business critical applications over the Internet. Citrix Extranet is part of Citrix's overall expansion of its product line.

The solution is optimized for Citrix MetaFrame customers, supports a wide range of client operating systems, and supplies the three major types of safeguards required for the highest level of VPN security - authentication, access control, and encryption.

Key features include user-specific access control; service proxies; a GUI; event logging; and dynamic configuration. The product's authentication includes two-factor user identification; two-way authentication; third-party authentication support; and on-line registration. Extranet supports 3DES encryption, public key encryption (PKE), and firewall independence.

Contact Citrix, (954) 267-3000, www.citrix.com.

About the Author

Scott Bekker is editor in chief of Redmond Channel Partner magazine.

Featured

  • Old Stone Wall Graphic

    Microsoft Addressing 36 Vulnerabilities in December Security Patch Release

    Microsoft on Tuesday delivered its December bundle of security patches, which affect Windows, Internet Explorer, Office, Skype for Business, SQL Server and Visual Studio.

  • Microsoft Nudging Out Classic SharePoint Blogs

    So-called "classic" blogs used by SharePoint Online subscribers are on their way toward "retirement," according to Dec. 4 Microsoft Message Center post.

  • Datacenters in Space: OrbitsEdge Partners with HPE

    A Florida-based startup is partnering with Hewlett Packard Enterprise in a deal that gives new meaning to the "edge" in edge computing.

  • Windows 10 Hyper-V vs. Windows Server Hyper-V: Which Platform for Which Workloads?

    The differences between these two Hyper-V versions are pretty significant, depending on what you plan to use them for. Here's a quick rundown of each platform, from their features to licensing quirks to intended use cases.

comments powered by Disqus

Office 365 Watch

Sign up for our newsletter.

Terms and Privacy Policy consent

I agree to this site's Privacy Policy.