This blog post was co-authored by Christian Reilly, VP and Chief Technology Officer at Citrix.
Historically, IT network security has been based on a traditional castle-and-moat concept. In this model, access to corporate information by end users and user devices …
Related Stories
- Ensure your endpoints are secure as more of your users work from home
- Business continuity insights from the Citrix Office of the CTO
- Citrix TIPs: Secure and manage endpoints during a disruption