Improving NetScaler security is an ongoing process that demands constant vigilance, regular maintenance and updates to stay protected.
Blog

Citrix Secure Developer Space gives developers secure, ready-to-use coding environments in seconds, without the delays and complexity of traditional setups.

Citrix training ensures professionals not only understand the platform’s capabilities but can also deploy, manage, and troubleshoot it effectively.

Read our practical guide, that will walk you through what External Tasks are, how they differ from Scripted Tasks, and how to leverage them effectively in your Citrix WEM deployment.

If a Citrix VDA (Citrix workload) is not in a ‘Registered’ state, then it will not accept user sessions. Put another way, if a Citrix VDA is not in a Registered state, then it is effectively offline. The registration state is a key indicator of a Citrix VDA’s health at the most fundamental level: Having unregistered …

The rise of remote work, cloud adoption, and increasing cyber threats has forced companies to rethink their security approach. For IT departments, an IT security model with the philosophy of “Never Trust, Always Verify” takes centre stage – This is where Zero Trust Network Access (ZTNA) comes in. In 2021, Citrix, a leader in secure …

Citrix Workspace Environment Management (WEM) continues to evolve, introducing powerful enhancements that optimize logon performance, streamline management, and improve overall system reliability. The latest features of Citrix WEM are aimed at delivering improved policy migration and enhanced navigation to smarter device identification and advanced logon analysis. Whether you’re an IT administrator looking to refine your …

Attention! Citrix Hypervisor 8.2 Cumulative Update 1 (CU1) is going End of Life on June 25th, 2025 Citrix Xenserver is a server virtualization platform based upon the open-source Xen hypervisor. It allows IT departments to host virtual machines across a pool of hardware, Citrix Xenserver has been continually developed and upgraded since its initial release …

User credentials get compromised. This is a fact of life. Organizations use multi-factor authentication mechanisms to try to reduce the attack surface, but even these are not always 100% effective and breaches will happen. So, we have user authentication as a factor, and we have other solutions to provide a second factor. Imagine if we could …

Efficiency, flexibility and reliable are three focuses IT departments will always look for. One powerful combination that help in these aspects is Citrix on a Nutanix environment. Not only does this combination enhance performance, and save money, but it also simplifies backup and disaster recovery. In this blog I want to explain, what benefits you …


