Armored Client for Citrix provides missing link in virtualisation security

SentryBay has announced the launch of Armored Client for Citrix which securely “wraps” the Citrix receiver – providing key endpoint and browser security for connections  to XenDesktop and XenApp installations. The solution overcomes existing security threats such as keylogging, browser vulnerabilities, DNS poisoning and session hijacking.

The endpoint software, which can be deployed alongside or post Citrix installation, ensures the security integrity of the endpoint – helping overcome key security and compliance issues.

The Armored Client launches a separate secure desktop using a one-time random user and a locked-down “armored” web client – within which the Citrix Receiver operates. No other software (including malware) is able to run within this browser session, and it also overcomes kernel-based malware threats.

Multi-level keylogging protection scrambles keystrokes, prevents screenshots and denies malware access, protecting the entry of login credentials into the Citrix Receiver. The protection operates throughout the Citrix session, securing data entry into all enterprise applications and web services. The dedicated session then leaves no trace when closed. 

Version 1 applies to HTML5-based versions of the Windows receiver, with the Citrix ReceiverWeb application versions due out shortly.  A mobile version of the solution is currently in development and will be ready to launch in 2016. This version does not require a corporate device or any MDM solution to be operating to provide the necessary endpoint and browser security. 

Deployment of the Armored Client is far more economical for enterprises than issuing corporate managed devices for remote access via Citrix.

Key technology within the solution is patented to SentryBay, meaning the blend of technologies cannot be provided by other vendors.

The technology is applicable to other virtualised clients such as VMware, Microsoft including RDP, Oracle & others.

For more information visit www.sentrybay.com

+ posts

The editorial team behind Compare the Cloud made up a unique group of IT specialists, digital marketers and cloud specialists. We understand the industry from both the IT manager’s perspective and the perspective of the IT service provider.

Unlocking Cloud Secrets and How to Stay Ahead in Tech with James Moore

Newsletter

Related articles

Generative AI Unlocking Quantum Computing Data Potential

In the modern world of technology, two transformative forces...

Driving the Future of Connectivity with Data Centres

As an astonishing matter of fact, there are 5.3 billion people...

Willow’s Breakthroughs in Quantum Stability

The Start of a New Era Have you heard the...

Cloud Computing Demands Robust Security Solutions

Modern organisations are increasingly reliant on cloud computing to...

Unlocking the future of manufacturing; AIOps network optimisation

Global manufacturing activity has failed to show signs of...