Access "Hot Pick: Citrix Systems' Citrix Access Essentials"
This article is part of the December 2005 issue of Top forensics tools for tracking down cybercriminals
Citrix Access Essentials Citrix Systems Price: $229 per seat @exb Citrix Access Essentials @exe In the past, small businesses did not have many reasons to look at Citrix's offerings. The company's products were generally developed for large enterprises with many users, which effectively priced small businesses out of their market. Knowing this, Citrix has released Access Essentials, developed specifically with small businesses in mind. Like Citrix's large enterprise solutions, Access Essentials allows users to access internal network resources and work securely from anywhere. It also helps businesses save money by lowering the costs associated with workstations. Since the applications are running on the server, Access Essentials enables users to work with resource-intensive applications, which can be used even on the most basic of PCs. In addition, the security of the organization is likely to be improved; thinner client systems and basic PCs are likely to be easier to manage and maintain. Access Essentials offers many of the attractive features of the ... Access >>>
Premium Content for Free.
Building A Perimeter Defense With Application-Level Firewalls
Learn how application level firewalls, when carefully deployed, can build perimeter defenses and prevent hackers from exploiting vulnerabilities, such as application code, to achieve attacks.
To Catch a Thief
Forensics tools aren't only used in high-profile cases.
On the Mend
Health care giant Novartis AG got a much-needed shot in the arm with a comprehensive risk assessment and revamped security management system.
Recent Releases: Security product briefs, December 2005
Learn about the security products released in December 2005.
Controlling the Uncontrollable
Organizations must leverage policy, and harness new protocols and technology to tame wild WLANs.
Information Security's 2006 Priorities Survey signals a transition for security managers from an operational to a more strategic stance.
- Building A Perimeter Defense With Application-Level Firewalls
Hot Pick: Citrix Systems' Citrix Access Essentials
Citrix Systems' Citrix Access Essentials
SSL VPN: Array Networks' Array SPX5000
A review of Array Networks' Array SPX5000
Configuration Management: Configuresoft's Enterprise Configuration Manager v4.7
Configuresoft's ECM v4.7
Application Security: Cenzic's Hailstorm v2.6
Cenzic's Hailstorm v2.6
Secure Reads: Mergers and Acquisitions Security
Read a review of the security book Mergers and Acquisitions Security.
- Hot Pick: Citrix Systems' Citrix Access Essentials
On The Radar: Security technology can't solve process problems
Perspectives: History teaches security lessons well
Expert Richard Bejtlich looks at the lessons learned in engineering disasters and applies them to information security.
Editor's Desk: Security for the corporate brand
Know Thy Business
Ping: Desiree Beck
- On The Radar: Security technology can't solve process problems
More Premium Content Accessible For Free
Cloud and mobility in the enterprise has caused a heightened need for organizations to take a closer look at next generation authentication ...
Virtualization and cloud computing are part and parcel of enterprise networks today. Virtualization security, however, is still a bolt-on affair ...
Mobile device security is one of the biggest nightmares InfoSec pros face in the era of bring your own everything (BYOE). Simply banning employees ...