“Security is the bedrock of what Citrix has done for many years”
![“Security is the bedrock of what Citrix has done for many years” “Security is the bedrock of what Citrix has done for many years”](/uploads/2018/02/603a217b85133.jpg)
Ravindra Kelkar
Area Vice President, Indian Subcontinent, Citrix
Measures adopted: Innumerable organizations across the globe are tackling cyber security threats and data breaches at any given time. With applications being modernized for web-based access and deployed in multi-cloud environments, the traditional VPN model does not adequately meet the needs of the evolving use cases and falls short on end-user experience and security. By implementing Zero Trust approach or a VPN-less access business can eliminate the need to maintain VPN servers and limit access to specific IP addresses.
Bad actors are targeting web and cloud applications via the local internet connections that remote workers use. Secure access service edge technology (SASE) delivers security services like web filtering, data loss prevention, and next-generation firewalls to protect these workers across a network.
Way to tackle this is Fast Identity Online (FIDO2) authentication which enables users to prove their identity using biometrics, mobile devices, or specialized security tokens.
Mitigating threat situation: Security is the bedrock of what Citrix has done for many years — securing apps, access, networks, data, and endpoints. Our solutions let employees work securely, the way they want. As mentioned earlier, SD-WAN networking solution can help the IT teams improve monitoring, and overall security. Our virtualization and container-based solutions help organizations isolate environments.
Password-less multi-factor authentication (MFA) also helps add an additional layer of security to users, devices, and resource authentication, authorization, and access.
All these combined, can help organizations become more robust and resilient to any huge, unprecedented wave of disruption in the future without compromising the security and privacy of the organization.
Upcoming threat: Deepfakes are becoming more and more sophisticated with time. The algorithms associated with it are also evolving rapidly. These factors combined have made it increasingly challenging to combat the threats and their adverse consequences. Additionally, with the increasing amount of work and content being accessed and shared online due to the pandemic, the use of deepfake video and audio technologies is expected to evolve into a major cyber threat to businesses within the next few years.
See What’s Next in Tech With the Fast Forward Newsletter
Tweets From @varindiamag
Nothing to see here - yet
When they Tweet, their Tweets will show up here.