Glossary - Citrix

Download as pdf or txt
Download as pdf or txt
You are on page 1of 23

   

Solu

Citrix Glossary

A
Access Control
Adaptive Access Control
Adaptive Authentication
Adaptive Security
API Gateway
API Security
Application Delivery
Application Delivery Controller (ADC)
Application Security
Application Virtualization
Autoscaling

B
Bot Management
Bot Mitigation
Bring-Your-Own Device (BYOD)
Browser Isolation
Business Continuity
Business Continuity Plan
BYOD Security

C
Cloud Access Security Broker (CASB)
Cloud Computing
Cloud Migration
Cloud Native
Cloud Networking
Cloud Security
Cloud Service
Cloud Storage
Collaborative Workspace
Containerization
Continuous authentication
Cybersecurity

D
Data Security
Desktop Virtualization
Desktops-as-a-Service (DaaS)
Device Security
Digital Transformation
Digital Wellness
Digital Workplace
Digital Workspace
Disaster Recovery

E
E-Signature
Edge Security
Employee Experience (EX)
Employee Engagement
Employee Wellbeing
Endpoint Security
Enterprise File Sync and Sharing (EFSS)
Enterprise Mobility Management (EMM)

H
Hardware Virtualization
HDX
Hosted Desktop
Hybrid Cloud
Hybrid IT
Hybrid Work
Hypervisor

I
Identity Access Management
IT Transformation

K
Kubernetes

L
Load Balancing

M
Malware
Managed desktops
Microservices
Mobile Device Management (MDM)
Multi-cloud

N
Network Access Control (NAC)
Network Security
Network Virtualization

P
Private Cloud
Public Cloud

R
Remote Access
Remote Work Security
Remote Workforce
Role-based access control

S
SaaS Security
SASE
Secure File Sharing
Secure Remote Access
Secure Web Gateway
Security Analytics
Security Service Edge (SSE)
Single Sign-On
Software as a Service (SaaS)
Software DeSned Networking (SDN)
Software-DeSned WAN (SD-WAN)

U
User Behavior Analytics

V
Virtual Data Room
Virtual Desktop
Virtual Desktop Infrastructure (VDI)
Virtual Machine (VM)
Virtual Workspace
Virtualization

W
WAN Edge
WAN Failover
WAN Network
Web Application Security
WorkUow Automation
Workspace
Workspace Security

Z
Zero-trust Security
ZTNA

A
Access Control
Access control is a fundamental component of data security that dictates who is
permitted to access and use company apps and data.

Adaptive Access Control


Adaptive access control is the process of using IT policies that allow
administrators to control user access to applications, Lles, and network features
based on multiple real-time factors.

Adaptive Authentication
Adaptive authentication is a method for verifying user identity and authorization
levels based on factors such as location, device status, and end user behavior.

Adaptive Security
Adaptive security is a security approach that’s used to respond to potential
cyberthreats in real-time by continually monitoring user sessions.

API Gateway
API gateway enforces security measures on API calls like IP
whitelisting/blacklisting, authentication, content routing, rate limiting, and more to
secure and manage your trafLc in a single pass for better performance, lower
complexity, and lower TCO.

API Security
API Security provides comprehensive protection for your APIs so that you can
protect your valuable application and data assets, get insight into the performance
and use of your APIs, and help you make more informed decisions.
Application Delivery
Application delivery is the process of bringing an application (typically a web
application) to end users while the application’s data processing and computing is
executed inside a data center or cloud environment.

Application Delivery Controller


An application delivery controller (ADC) is a network device that lives in the
datacenter, located strategically between the Lrewall and one or more application
servers. The ADC handles load balancing between servers and optimizes end-user
performance and security for enterprise applications.

Application Security
Application security refers to measures and countermeasures taken to protect
applications from internal and external threats.

Application Virtualization
Application virtualization or app virtualization is technology that allows users to
access and use an application from a separate computer than the one on which the
application is installed.

Autoscaling
Autoscaling is a technique used in cloud computing to allocate resources.

B
Bot Management
A bot management solution detects the bad bots and mitigates bot attacks to
protect your web applications and appliance from advanced security attacks.

Bot Mitigation
Bot mitigation is a security solution that helps mitigate the effect of bad bots on a
company's assets by identifying incoming clients as bots and then Llter them out.
Bring-Your-Own Device (BYOD)
Bring your own device (BYOD) is the evolving trend of employees using their
personal devices like laptops, smartphones, tablets, or any consumer piece of
information technology.

Browser Isolation
Remote browser isolation is a web security measure used to create a "gap"
between a remote user's internet browser and corporate networks.

Business Continuity
Business continuity is an organization's capability to maintain mission-critical
functionality during and after a disaster, such as service outages, security
breaches or other threats.

Business Continuity Plan


A business continuity plan refers to an organization’s system of procedures to
restore critical business functions in the event of unplanned disaster.

BYOD Security
BYOD security is the set of tools used to reduce risks from bring your own device
(BYOD)—the practice of using a personal device, instead of a company-issued one,
for work purposes.

C
Cloud Access Security Broker (CASB)
Cloud access security brokers (CASBs) are security solutions placed between
cloud service consumers and providers, enforcing security policies when users or
entities want to access cloud-based resources.

Cloud Computing
Cloud computing refers to the delivery of computing resources—things like
applications, servers, storage, software, and networking—over the internet. Rather
than host your own resources, you can use them as services from various cloud
providers.

Cloud Migration
Cloud migration is the process of moving apps and data from an on-premises
location to the cloud. The cloud offers greater cost efLciency and nearly eliminates
the need to make capital investments in on-premises infrastructure.

Cloud Native
Cloud native is the name for an approach to building and running applications
across private, public and hybrid clouds. When an app is "cloud native," it’s
designed speciLcally to be developed and managed within a cloud environment.

Cloud Networking
Cloud networking refers to hosting or using network resources and services—
virtual routers, bandwidth, virtual Lrewalls, or network management software—
from any public, private, or hybrid cloud. Cloud networking spans both in-house
networks that utilize cloud-based services for various tasks, as well as networks
that are entirely cloud-based.

Cloud Security
Cloud security is the complete set of policies and controls for protecting cloud
computing environments and the data within them.

Cloud Service
The term "cloud services" refers to a wide range of services delivered on demand
to companies and customers over the internet. These services are designed to
provide easy, affordable access to applications and resources, without the need for
internal infrastructure or hardware.

Cloud Storage
Cloud storage, or online storage, is the storage of data within an internet-
accessible environment managed by a cloud storage provider. That service
provider offers its storage customers on-demand network access to their data
from virtually any device or location. Customers don’t have to manage the
technical aspects of the storage or its supporting infrastructure.
Collaborative Workspace
A collaborative workspace enables people to work together, regardless of their
physical location. This means workers can to easily access the tools they need to
seamlessly collaborate anywhere, from any device.

Containerization
Containerization is a form of operating system virtualization, through which
applications run in isolated user spaces called containers, all using the same
shared operating system (OS).

Continuous authentication
Continuous authentication is a method for authenticating users and granting
access to corporate resources.

Cybersecurity
Cybersecurity is the collection of security tools, technologies, processes, and
practices used to protect networks, users, devices, software, applications, and
data from malicious digital actions known as cyberattacks.

D
Data Security
Data security is the group of techniques, tools, and practices used to protect
digital information from unauthorized access, malicious users, and corruption. It
includes every aspect from the physical security of servers and storage to access
control management.

Desktop Virtualization
Desktop virtualization is technology that lets users simulate a workstation load to
access a desktop from a connected device remotely or locally.
Desktops-as-a-Service (DaaS)
Desktop as a Service (DaaS) is a cloud computing offering that enables businesses
to deliver cloud-hosted virtual desktops to any device, from anywhere.

Device Security
Device security is the defense of IT assets against harm and unauthorized use.
Although the term “device security” is not as widely used as “cybersecurity,” it is a
relevant concept that denotes the full range of practices for securing desktop PCs,
laptops, smartphones, tablets, or Internet of Things (IoT) devices.

Digital Transformation
Digital transformation is the strategic adoption of digital technologies, such as a
digital workspace, to improve processes and productivity, manage business risk
and improve customer service.

Digital Wellness
Digital wellness (also known as digital wellbeing or digital health) is the pursuit of
an intentional and healthy relationship with technology in the workplace and in
personal life.

Digital Workplace
A digital workplace is a business strategy that brings together the tools, places,
workstyles, culture, and skills employees need to do their best work and better
serve their customers.

Digital Workspace
Digital workspace allows employees to access their apps and data using any
device regardless of the network or cloud.

Disaster Recovery
Disaster recovery is a set of prearranged plans and procedures that allow a
company to recover its IT infrastructure in the event of an unanticipated event such
as power outages, pandemics or weather emergencies.
E
E-Signature
An e-signature, or electronic signature, is a method for signing contracts and other
documents electronically, without pen or paper. E-signatures are used by
businesses to save time and reduce costs, and have the same legal validity and
enforceability of pen-and-paper documents, when executed in compliance with e-
signature laws.

Edge Security
Edge security enables advanced security and simpliLes information security
management for protecting the branch network from internet threats by providing
a single management and reporting pane for various security functionalities along
with SD-WAN.

Employee Experience
Employee experience (EX) refers to the wide range of perceptions and
observations workers develop as they interact with an organization.

Employee Engagement
Employee engagement is an employee’s emotional commitment and professional
investment in their job as well as the organization’s business outcomes.

Employee Wellbeing
When it comes to your employees’ wellbeing, a little investment can pay off in the
long run. Learn why you should deliver a workspace with built-in employee
wellbeing features.

Endpoint Security
Endpoint security refers to a methodology of network protection that requires
devices on a corporate network to meet certain standards of compliance before
access is granted.

Enterprise Sync and Sharing (EFSS)


Enterprise Lle sync and sharing (EFSS) is a software service that allows users to
securely share and sync Lles, documents, photos, and videos with employees,
partners, or customers across multiple devices.
Enterprise Mobility Management (EMM)
Enterprise mobility management (EMM) is a set of technology, processes, and
policies to secure and manage the use of corporate- and employee-owned mobile
devices within an organization.

H
Hardware Virtualization
Hardware virtualization is a method of running multiple independent VMs on a
single physical computer by fully utilizing the physical resources available in
modern powerful servers, which reduces the total cost of ownership for server
deployments.

HDX
HDX technology delivers a high-deLnition experience to users of centralized
applications and desktops, on any device and over any network.

Hosted Desktop
Hosted desktops improve the efLciency of IT infrastructure while simplifying the
users’ work. However, companies are increasingly moving to the cloud. Learn when
to move the Cloud Desktop (DaaS).

Hybrid Cloud
Hybrid cloud is a cloud computing solution that combines a private cloud with
public cloud services, allowing shared data and apps between each service.

Hybrid IT
Hybrid IT is an enterprise computing approach that runs existing in-house IT
infrastructure alongside public cloud services for various enterprise workload and
data needs. Unlike hybrid cloud, the in-house and cloud resources in a hybrid IT
environment are not integrated to work together as one.
Hybrid Work
A hybrid work model is the blending of in-ofLce and remote work. An employee in
this model may divide their time between commuting to the ofLce and working
from other locations.

Hypervisor
A hypervisor is software that creates and runs virtual machines (VMs), which are
software emulations of a computing hardware environment.

I
Identity Access Management
Identity and access management (IAM) is used by organizations to manage digital
identities and prevent unauthorized users from accessing sensitive data.

IT Transformation
IT transformation is the process of aligning IT with the broader organizational
goals. It is just one element of digital transformation and refers to the ways IT can
deliver next-generation solutions.

K
Kubernetes
Kubernetes is an open-source platform for deploying, scaling, and managing
containerized applications and microservices architectures.

L
Load Balancing
Load balancing is a core networking solution responsible for distributing incoming
trafLc among servers hosting the same application content. By balancing
application requests across multiple servers, a load balancer prevents any
application server from becoming a single point of failure, thus improving overall
application availability and responsiveness.

M
Malware
Malware, short for malicious software, is an umbrella term for many types of
computer programs created to disrupt or exploit a network, device, or service.

Managed desktops
Managed desktops allow an organization to deliver virtual apps and desktops from
the cloud to any end user device or location without worrying about virtual desktop
infrastructure (VDI) deployment or management.

Microservices
Microservices are component parts of an application that are designed to run
independently.

Mobile Device Management (MDM)


Mobile device management refers to any tool or software designed to help IT
administrators control and secure mobile devices like smartphones and tablets
across an organization.

Multi-cloud
Multi-cloud is a cloud strategy where an organization leverages two or more cloud
computing platforms to perform various tasks.

N
Network Access Control (NAC)
Network access control (NAC), is a group of tools and methodologies aimed at
improving the security, visibility, and access management of a network. NAC tools
monitor and control the access to network resources according to a deLned
security policy.

Network Security
Network security is the act of protecting digital resources, applications, and data
from malicious intrusions.

Network Virtualization
Network virtualization refers to networks that consist of resources being linked
together into a cohesive communication group. Virtual networks are used to sub-
divide physical resource groups as a part of a larger network and can even be used
to enable multiple virtual machines running on a single laptop to communicate
with each other regardless of whether the laptop itself is connected to a network.
P
Private Cloud
Private cloud is a computing model that offers a proprietary environment
dedicated to a single business entity.

Public Cloud
A public cloud is a computing model in which a service provider makes resources
available to the public via the internet.

R
Remote Access
Remote access is the act of connecting to IT services, applications or data from a
location other than headquarters or other than that which is closest to the data
center.

Remote Work Security


Scalable remote work security is more important than ever as more employees
telecommute. Here’s how to protect your digital workspace environment.

Remote Workforce
Remote working is a mode of work that allows employees of an organization to
perform all their essential job responsibilities from outside traditional ofLce
space. By telecommuting from home ofLces, these out-of-ofLce employees make
up a remote workforce for that organization.
Role-based access control
Role-based access control is an approach to identity and access management
where the user is given access to a resource according to their role at the
organization.

S
SaaS Security
Controlling access is a major component of SaaS security, and Citrix solutions for
secure internet access, single sign-on can help protect SaaS access.

SASE
The Secure Access Service Edge (SASE) model uniLes modern networking and
security functionality into one integrated architecture, so it’s easy to manage, but
also uses the cloud to deliver the functionality closer to the user, so they can stay
productive.

Secure File Sharing


Secure Lle sharing is the act of digitally sharing links to documents, photos,
videos, and other online Lles in a manner that does not make them vulnerable to
hackers.

Secure Remote Access


Secure remote access is the process of enabling secure connections to a network,
application, or data, even when users are logging in from remote locations.

Secure Web Gateway


A secure web gateway, or SWG, is a type of network security solution that prevents
malicious trafLc from entering the internal network of an organization.

Security Analytics
Security analytics is an approach to digital security that analyzes data to detect
anomalies, unusual user behavior, and other threats.

Security Service Edge (SSE)


Security service edge (SSE) is a combination of network security services
delivered from a cloud platform.

Single Sign-on
Single sign-on (SSO) is an authentication capability that lets users access multiple
applications with one set of sign-in credentials.

Software as a Service (SaaS)


Software as a service (SaaS) is a software delivery model where applications are
hosted in the cloud, delivered to customers via the internet, and licensed as
subscriptions.

Software DeSned Networking (SDN)


Software-deLned networking (SDN) is an agile networking architecture designed
to help organizations keep pace with the dynamic nature of today’s applications.

Software-DeSned WAN (SD-WAN)


Software-deLned wide-area network (SD-WAN) is a service that grants the
enterprise with the ability to dynamically connect branch ofLces and data centers
1
on a global scale. 

U
User Behavior Analytics
Process of baselining user activity and behavior combined with peer group
analysis, to detect potential intrusions, and malicious activity.
V
Virtual Data Room
A virtual data room is a digital data repository that is tightly controlled to restrict
access. Virtual data rooms enable businesses to share and exchange large
amounts of data quickly and easily, without compromising on conLdentiality.

Virtual Desktop
A virtual desktop is a software emulation of a hardware device that runs on a
physical or virtual machine at a remote location, hosted either on premises or in
the cloud. Virtual desktops—such as Azure Virtual Desktop—enable end users to
access their unique desktop environments remotely over a network.

Virtual Desktop Infrastructure (VDI)


Virtual desktop infrastructure (VDI) refers to the part of the IT environment
dedicated to hosting desktop operating systems within virtual machines (VM).
These virtual machines can run on a hosted, centralized or remote server or
servers.

Virtual Machine (VM)


A virtual machine is an operating system environment that has been abstracted
from its physical machine such that it can leverage an intermediate software layer
to run on any physical hardware. Examples of virtual machines include virtual
desktops, virtual servers and virtual appliances.

Virtual Workspace
Virtual workspaces are not only for remote work. Find out all the ways your
organization can beneLt from virtual workspaces.

Virtualization
Virtualization refers to the method of abstracting all aspects of the physical IT
infrastructure from the speciLc environments that it is charged with hosting (e.g.
applications, desktops, servers, storage, or networks) thus enabling improved
management, control, aexibility, security and utilization of the overall service
infrastructure.

W
WAN Edge
WAN edge solutions accelerate digital transformation with aexible, automated,
and secure connectivity and performance for SaaS, cloud, and virtual applications
to ensure an always-on workspace experience.

WAN Failover
WAN failover helps prevent disruption of network connections and application
access by identifying an outage or other failover event and rerouting trafLc to an
active WAN path.

WAN Network
A wide area network (WAN) connects a group of computers and other network
devices over geographically dispersed locations. An enterprise WAN typically
connects branch ofLces or remote employees to the data center, giving users
access to applications, cloud services, and other corporate resources.

Web application security


Web application security is the group of technologies, processes, and methods
used to protect web applications, servers, and web services from a cyber attack.
Web application security products and services use tools and practices such as
multi-factor authentication (MFA), web application Lrewalls (WAFs), security
policies, and identity validation to maintain user privacy and prevent intrusions.

WorkUow Automation
Workaow automation is the process of using predeLned business rules to
automatically trigger various actions for completing an activity, such as approving
a document or capturing a signature. It can be achieved using low-code software
with drag-and-drop features.

Workspace
A workspace is a technology framework that brings together all the applications,
tools and resources to get work done and collaborate securely, personalized for
every individual in a digital world.

Workspace security
Workspace security refers to the application of tools and solutions to protect
sensitive data, networks, and access in digital workspaces without disrupting the
user experience.

Z
Zero-trust Security
A zero-trust model, or architecture, means that no user or device should have
default access to an organization’s network, workspace, or other resources—even
if they’re employed by the organization.

ZTNA
ZTNA is a group of technologies and functionalities to provide secure access to
applications and data.
Glossary Investor FOLLOW CITRIX
Relations 
Citrix Experience
Centers Careers 
 
 
Subscribe to
newsletters  

  
 

Privacy and legal terms Do Not Sell My Personal Information Cookie preferences Employee
login  Site map

XenApp, XenDesktop, XenMobile and XenServer are part of the Xen® family of products.

© 1999-2022 Citrix Systems, Inc. All rights reserved.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy