
Sign up to save your podcasts
Or
With the increased popularity of mobility, hybrid work, and bring-your-own-device (BYOD) initiatives, the IT risk profile has changed. At Citrix, we constantly strive to make our products even more secure. Whether it’s providing security controls for Citrix Virtual Apps and Desktops administrators with offerings like app protection, or enhancing the architecture of our products, security has always been our guiding principle.
Today, we are announcing a preview of an important architecture change to the way Citrix Workspace app for Windows handles ICA files during the launch of a virtual app or desktop. To reduce the attack surface, ICA files from Citrix Workspace app for Windows will now be stored in memory.
Host: Andy Whiteside
Co-Host: Bill Sutton
Guest: Aayush Agarwal
5
1111 ratings
With the increased popularity of mobility, hybrid work, and bring-your-own-device (BYOD) initiatives, the IT risk profile has changed. At Citrix, we constantly strive to make our products even more secure. Whether it’s providing security controls for Citrix Virtual Apps and Desktops administrators with offerings like app protection, or enhancing the architecture of our products, security has always been our guiding principle.
Today, we are announcing a preview of an important architecture change to the way Citrix Workspace app for Windows handles ICA files during the launch of a virtual app or desktop. To reduce the attack surface, ICA files from Citrix Workspace app for Windows will now be stored in memory.
Host: Andy Whiteside
Co-Host: Bill Sutton
Guest: Aayush Agarwal
409 Listeners
111,157 Listeners
5,917 Listeners
28,406 Listeners
3 Listeners