Securing Citrix XenApp Server in the Enterprise
  • Author : Tariq Azad
  • Release Date : 08 August 2008
  • Publisher : Syngress
  • Genre : Computers
  • Pages : 528
  • ISBN 13 : 0080569986
Ratings: 3
From 2 Voters
Get This Book

Download Securing Citrix XenApp Server in the Enterprise eBook in PDF, Epub and Kindle

Book Description: Citrix Presentation Server allows remote users to work off a network server as if they weren't remote. That means: Incredibly fast access to data and applications for users, no third party VPN connection, and no latency issues. All of these features make Citrix Presentation Server a great tool for increasing access and productivity for remote users. Unfortunately, these same features make Citrix just as dangerous to the network it's running on. By definition, Citrix is granting remote users direct access to corporate servers?..achieving this type of access is also the holy grail for malicious hackers. To compromise a server running Citrix Presentation Server, a hacker need not penetrate a heavily defended corporate or government server. They can simply compromise the far more vulnerable laptop, remote office, or home office of any computer connected to that server by Citrix Presentation Server. All of this makes Citrix Presentation Server a high-value target for malicious hackers. And although it is a high-value target, Citrix Presentation Servers and remote workstations are often relatively easily hacked, because they are often times deployed by overworked system administrators who haven't even configured the most basic security features offered by Citrix. "The problem, in other words, isn't a lack of options for securing Citrix instances; the problem is that administrators aren't using them." (eWeek, October 2007). In support of this assertion Security researcher Petko D. Petkov, aka "pdp", said in an Oct. 4 posting that his recent testing of Citrix gateways led him to "tons" of "wide-open" Citrix instances, including 10 on government domains and four on military domains. * The most comprehensive book published for system administrators providing step-by-step instructions for a secure Citrix Presentation Server. * Special chapter by Security researcher Petko D. Petkov'aka "pdp detailing tactics used by malicious hackers to compromise Citrix Presentation Servers. * Companion Web site contains custom Citrix scripts for administrators to install, configure, and troubleshoot Citrix Presentation Server.

Securing Citrix XenApp Server in the Enterprise

Securing Citrix XenApp Server in the Enterprise

Author : Tariq Azad
Publisher : Syngress
Genre : Computers
Get Book

Citrix Presentation Server allows remote users to work off a network server as if they weren't remote. That means: Incredibly fast access to data and applications for users, no third party VPN connection, and no latency issues. All of these features make Citrix Presentation Server a great tool for increasing ...

Securing Citrix XenApp Server in the Enterprise

Securing Citrix XenApp Server in the Enterprise

Author : Tariq Azad
Publisher : Syngress
Genre : Computers
Get Book

Citrix Presentation Server allows remote users to work off a network server as if they weren't remote. That means: Incredibly fast access to data and applications for users, no third party VPN connection, and no latency issues. All of these features make Citrix Presentation Server a great tool for increasing ...

Deploying Citrix MetaFrame Presentation Server 3 0 with Windows Server 2003 Terminal Services

Deploying Citrix MetaFrame Presentation Server 3 0 with Windows Server 2003 Terminal Services

Author : Melissa Craft
Publisher : Elsevier
Genre : Computers
Get Book

Almost 100% of all Fortune 500 and Fortune 1000 companies use Citrix. Deploying Citrix MetaFrame Presentation Server 3.0 with Windows Server 2003 Terminal Services covers the new release to Citrix MetaFrame and how companies can deploy it in their disaster recovery plans. Server Based Computing has been established as a solid networking model for any ...

Enterprise Single Sign On Design Guide Using IBM Security Access Manager for Enterprise Single Sign On 8 2

Enterprise Single Sign On Design Guide Using IBM Security Access Manager for Enterprise Single Sign On 8 2

Author : Axel Buecker,Nilesh Patel,Dirk Rahnenfuehrer,Joris Van Herzele,IBM Redbooks
Publisher : IBM Redbooks
Genre : Computers
Get Book

Everyone feels the pain of too many passwords to remember. Everyone can relate to the security exposure of weak passwords, chosen for convenience. And, everyone can relate to passwords placed in proximity to the workstation for a quick reminder. Unfortunately, that note can allow more than the intended user into ...

Information Security and Ethics  Concepts  Methodologies  Tools  and Applications

Information Security and Ethics Concepts Methodologies Tools and Applications

Author : Nemati, Hamid
Publisher : IGI Global
Genre : Education
Get Book

Presents theories and models associated with information privacy and safeguard practices to help anchor and guide the development of technologies, standards, and best practices. Provides recent, comprehensive coverage of all issues related to information security and ethics, as well as the opportunities, future challenges, and emerging trends related to this ...

Securing Microsoft Terminal Services

Securing Microsoft Terminal Services

Author : Roddy Rodstein
Publisher : Lulu.com
Genre : Computers
Get Book

"Securing Microsoft Terminal Services" shows how to use Enterprise Architecture methodologies, industry standards and best practices, such as ISO17799, CobIT, the National Security Agency (NSA) Guides, and Security Technical Implementation Guides (STIGS) to secure a Terminal Server environment. The bulk of the book is organized as a reference that lists ...

Citrix XenAppTM Platinum Edition Advanced Concepts  The Official Guide

Citrix XenAppTM Platinum Edition Advanced Concepts The Official Guide

Author : Citrix Sytems Inc
Publisher : McGraw Hill Professional
Genre : Computers
Get Book

The Only Official Guide to All Components of Citrix XenApp Platinum Edition Citrix XenApp, the new name for Citrix Presentation Server, is an end-to-end Windows application delivery system that offers both client-side and server-side application virtualization, for optimal application performance and flexible delivery options. It's the best access experience for ...

CITRIX ACCESS SUITE 4 ADVANCED CONCEPTS  THE OFFICIAL GUIDE  2 E

CITRIX ACCESS SUITE 4 ADVANCED CONCEPTS THE OFFICIAL GUIDE 2 E

Author : Steve Kaplan,Andy Jones
Publisher : McGraw Hill Professional
Genre : Computers
Get Book

Provides detailed and advanced configuration information for all Access Suite components Covers every installation option and provides in-depth technical information on custom installations Covers the implementation of all four database options: IBM, SQL Server, Oracle, and Access...

Technology Due Diligence  Best Practices for Chief Information Officers  Venture Capitalists  and Technology Vendors

Technology Due Diligence Best Practices for Chief Information Officers Venture Capitalists and Technology Vendors

Author : Andriole, Stephen J.
Publisher : IGI Global
Genre : Medical
Get Book

Due diligence conducted around technology decisions is complex. Done correctly, it has the power to enable outstanding positive outcomes; done poorly, it can wreak havoc on organizations, corporate cultures, and markets. Technology Due Diligence: Best Practices for Chief Information Officers, Venture Capitalists, and Technology Vendors develops a due diligence framework ...

Secure Telematic Applications for National Scale Projects

Secure Telematic Applications for National Scale Projects

Author : Jean-Guy Fontaine,Mikhail Makhaniok
Publisher : IOS Press
Genre : Computers
Get Book

The NATO Advances Research Workshop (ARW) 'Secure Telematic Applications for National Scale Projects' is organized in the frame of the National Week of Information Technologies and Sixth International Congress 'Scientific and Methodological Facilitation of the Development of Informatization and the System of Scientific and Technical Information in the Republic of ...

Integrated Security Technologies and Solutions   Volume II

Integrated Security Technologies and Solutions Volume II

Author : Aaron Woland,Vivek Santuka,Jamie Sanbower,Chad Mitchell
Publisher : Cisco Press
Genre : Computers
Get Book

The essential reference for security pros and CCIE Security candidates: identity, context sharing, encryption, secure connectivity and virtualization Integrated Security Technologies and Solutions – Volume II brings together more expert-level instruction in security design, deployment, integration, and support. It will help experienced security and network professionals manage complex solutions, succeed in ...

The Real Citrix CCA Exam Preparation Kit

The Real Citrix CCA Exam Preparation Kit

Author : Shawn Tooley
Publisher : Syngress
Genre : Computers
Get Book

The Citrix Certified Administrator (CCA) credential is the first tier of Citrix certification. The CCA is most often sought out by IT professionals whose networks employ Citrix virtualization technology, and for those IT professionals who are seeking a broad base of general network expertise. The number of CCAs is estimated ...

Citrix   Access Suite Security for IT Administrators

Citrix Access Suite Security for IT Administrators

Author : Citrix Product Development Team,Citrix Engineering Team
Publisher : McGraw Hill Professional
Genre : Computers
Get Book

Provides information on security threats, countermeasures, and techniques for each component of the Citrix Presentation Server and the Citrix Password Manager....