(154)
4.7 out of 5
Visit Website
Sponsored
Authentication User experience | Process of providing credentials and logging into multiple systems is easy and intuitive for users 38 reviewers of Citrix Secure Workspace Access have provided feedback on this feature. | 92% (Based on 38 reviews) | |
Supports Required Authentication systems | Supports required 3rd party Authentication Technologies. Example systems: bioMetric, passwords, key cards, token based systems, etc. This feature was mentioned in 38 Citrix Secure Workspace Access reviews. | 89% (Based on 38 reviews) | |
Multi-Factor Authentication | Provides support for Multi-Factor authentication, so users are required to provide multiple factors to authenticate. For example, something they know, Something they have or something they are. 36 reviewers of Citrix Secure Workspace Access have provided feedback on this feature. | 93% (Based on 36 reviews) | |
Supports Required Authentication Methods/Protocols | Based on 36 Citrix Secure Workspace Access reviews. Support SSO via Web agents, proxy agents, agent-less, SAML or oAuth and WS-Federation authentication and authorization Web services depending upon the application and business use case | 89% (Based on 36 reviews) | |
Federation/SAML support (idp) | As reported in 29 Citrix Secure Workspace Access reviews. Can serve as the identity provider to external service providers so that when the user logs into a service, instead of providing credentials to the service provider, the service provider trusts the identity provider to validate the credentials. | 90% (Based on 29 reviews) | |
Federation/SAML support (sp) | Based on 25 Citrix Secure Workspace Access reviews. Can serve as the Service provider from an external service so that when the user logs in externally they have seamless SSO to internal applications from a service provider. | 89% (Based on 25 reviews) |
Endpoint access | Provides ability to control access to PC's, Mobile devices, and other endpoint devices. 27 reviewers of Citrix Secure Workspace Access have provided feedback on this feature. | 93% (Based on 27 reviews) | |
Local Access | Controls access to legacy applications, web based applications, network resources and servers while employees are on the companies local area network. This feature was mentioned in 29 Citrix Secure Workspace Access reviews. | 94% (Based on 29 reviews) | |
Remote Access | Based on 35 Citrix Secure Workspace Access reviews. Controls access to legacy applications, web based applications, networks resources while employees are outside the local area network. | 91% (Based on 35 reviews) | |
Partner Access | Controls access to users that are not company employees that are either within the companies local area network or outside the network This feature was mentioned in 28 Citrix Secure Workspace Access reviews. | 91% (Based on 28 reviews) | |
Supports BYOD users | Enables users to use their own device to access company applications. 25 reviewers of Citrix Secure Workspace Access have provided feedback on this feature. | 91% (Based on 25 reviews) |
Ease of installation on server | As reported in 35 Citrix Secure Workspace Access reviews. Installation process is easy and flexible. | 87% (Based on 35 reviews) | |
Password Policy Enforcement | As reported in 33 Citrix Secure Workspace Access reviews. Options for resetting and enforcing password policies | 89% (Based on 33 reviews) | |
Administration Console | Provides Administration tools/console that are easy to use and learn for routine maintenance tasks This feature was mentioned in 32 Citrix Secure Workspace Access reviews. | 92% (Based on 32 reviews) | |
Ease of connecting applications | Based on 32 Citrix Secure Workspace Access reviews. Easily provisions new systems, platforms or applications using configuration and not customization. | 90% (Based on 32 reviews) | |
Self Service Password Administration | As reported in 32 Citrix Secure Workspace Access reviews. Users can set, change passwords without interaction from IT staff | 90% (Based on 32 reviews) | |
Network Segmentation | Allows administrative control over network components, mapping, and segmentation. | Not enough data | |
Scalability | Provides features to allow scaling for large organizations and user bases. | Not enough data | |
Global Access | Extends SDP network access to users regardless of their physical location. | Not enough data |
Multiple Operating system support | Supports Endpoint access control to multiple operating systems This feature was mentioned in 33 Citrix Secure Workspace Access reviews. | 92% (Based on 33 reviews) | |
Multi-Domain Support | As reported in 33 Citrix Secure Workspace Access reviews. Allows user authentication to be honored by all the hosts in two or more domains | 86% (Based on 33 reviews) | |
Cross Browser support | Support access to browser based applications across required browser types This feature was mentioned in 33 Citrix Secure Workspace Access reviews. | 83% (Based on 33 reviews) | |
Fail over protection | Based on 28 Citrix Secure Workspace Access reviews. Provides required failover mechanisms to ensure if one server, network, etc fails users are still able able to authenticate | 92% (Based on 28 reviews) | |
Reporting | As reported in 29 Citrix Secure Workspace Access reviews. Contains pre-built and custom reporting tools to required to manage business | 93% (Based on 29 reviews) | |
Auditing | Provides mechanism for auditing authentication for trouble shooting purposes. 26 reviewers of Citrix Secure Workspace Access have provided feedback on this feature. | 92% (Based on 26 reviews) | |
Third Party Web Services support | Can call and pass credentials to third party web services. 26 reviewers of Citrix Secure Workspace Access have provided feedback on this feature. | 94% (Based on 26 reviews) |
Network Segmentation | Allows administrative control over network components, mapping, and segmentation. This feature was mentioned in 10 Citrix Secure Workspace Access reviews. | 92% (Based on 10 reviews) | |
Network Mapping | Allows visual display of networks segmented components and their connected resources. | Not enough data | |
Security Analytics | As reported in 10 Citrix Secure Workspace Access reviews. Utilizes behavioral analysis to improve security procedures and documentation. | 92% (Based on 10 reviews) | |
API/Integrations | Application Programming Interface - Specification for how the application communicates with other software. API's typically enable integration of data, logic, objects, etc. with other software applications. This feature was mentioned in 10 Citrix Secure Workspace Access reviews. | 93% (Based on 10 reviews) |
Security Automation | Based on 10 Citrix Secure Workspace Access reviews. Allows administrative control over automated security tasks. | 90% (Based on 10 reviews) | |
Application Security | Protects application access and data. Prompts additional authentication for suspicious users. 10 reviewers of Citrix Secure Workspace Access have provided feedback on this feature. | 93% (Based on 10 reviews) | |
Workload Protection | Protects computing resources across a network. Prompts additional authentication for suspicious users. 10 reviewers of Citrix Secure Workspace Access have provided feedback on this feature. | 90% (Based on 10 reviews) | |
Data Protection | Protects informatin stored on premises and in the cloud. Prompts additional authentication for suspicious users. This feature was mentioned in 10 Citrix Secure Workspace Access reviews. | 90% (Based on 10 reviews) | |
Governance | Allows users to create, edit, and relinquish user access privileges. 13 reviewers of Citrix Secure Workspace Access have provided feedback on this feature. | 91% (Based on 13 reviews) | |
Data loss Prevention | Based on 12 Citrix Secure Workspace Access reviews. Stores data securely either on premise or in an adjacent cloud database to prevent loss of data at rest. | 86% (Based on 12 reviews) | |
Data Encryption/Security | Based on 11 Citrix Secure Workspace Access reviews. Manages policies for user data access and data encryption. | 83% (Based on 11 reviews) | |
Access Control | As reported in 13 Citrix Secure Workspace Access reviews. Supports LDAP Protocol to enable access control and governance. | 86% (Based on 13 reviews) |
Adaptive Access Control | As reported in 10 Citrix Secure Workspace Access reviews. Provides a risk-based approcach to determining trust within the network. | 93% (Based on 10 reviews) | |
Identity Scoring | Calculates risk based on user behavior, permissions, and requests. 10 reviewers of Citrix Secure Workspace Access have provided feedback on this feature. | 92% (Based on 10 reviews) | |
User Monitoring | Monitors users attempting unauthorized access to databases, applicaitons, and othe network components. 10 reviewers of Citrix Secure Workspace Access have provided feedback on this feature. | 93% (Based on 10 reviews) |
User Analytics | Allows for reporting and documentation of individual user behavior and privileges. This feature was mentioned in 10 Citrix Secure Workspace Access reviews. | 83% (Based on 10 reviews) | |
Cloud Gap Analytics | Analyzes data associated with denied entries and policy enforcement, giving information of better authentication and security protocols. | Not enough data | |
Anomoly Detection | Monitors acivity related to user behavior and compares activity to benchmarked patterns. | Not enough data |
SSO | Based on 13 Citrix Secure Workspace Access reviews. Provides a single access point for users to access multiple cloud products without multiple logins. | 90% (Based on 13 reviews) | |
Cloud Registry | Details SaaS products the cloud security product can integrate with and provide security for. This feature was mentioned in 10 Citrix Secure Workspace Access reviews. | 80% (Based on 10 reviews) | |
Mobile Device Mangement | As reported in 13 Citrix Secure Workspace Access reviews. Offers the ability to set standards for types of mobile devices and networks capable of accessing data. | 88% (Based on 13 reviews) |
Policy Enforcement | Allows administrators to set policies for security and governance. | Not enough data | |
Security Audit | Allows for deep examination into network-connected devices, policies, and protocols. | Not enough data | |
Access Control | Supports LDAP Protocol to enable access control and governance. | Not enough data | |
User Authentication | Authenticates users prior to granting access to networks, applciations, and systems. | Not enough data |
Compliance Monitoring | Monitors data and compliance requirements. Sends alerts based on violations or misuse. | Not enough data | |
Vulnerability Monitoring | Monitors networks, applications, and systems to identify misconfigurations and access points that can be easily compromised. | Not enough data | |
Configuration Monitoring | Monitors configuration rule sets and policy enforcement measures and document changes to maintain compliance. | Not enough data | |
Observability | Generate insights across IT systems utilizing event metrics, logging, traces, and metadata. | Not enough data |
AI Text Summarization | Condenses long documents or text into a brief summary. | Not enough data | |
AI Text Generation | Allows users to generate text based on a text prompt. | Not enough data |
Zero Trust Network Access (ZTNA) | Enforces zero trust access rules. | Not enough data | |
Wide Area Network (WAN) | Integrates wide area network (WAN) capabilities, such as SD-WAN. | Not enough data | |
Cloud Access Security Broker (CASB) | Enforces security requirements and secures connections with cloud resources. | Not enough data | |
Secure Web Gateway (SWG) | Prevents unauthorized web domains from entering a network and protects against web-based threats. | Not enough data | |
Firewall as a Service | Provides cloud-based firewall protection. | Not enough data |
Predictive Capabilities | Uses predictive analytics to anticipate emerging threats. | Not enough data | |
Real-Time Threat Detection | Utilizes AI algorithms to identify anomolies and block access to malicious sites. | Not enough data | |
Automation | Automates common workflows and remediation tasks. | Not enough data |
Autonomous Task Execution | Capability to perform complex tasks without constant human input | Not enough data | |
Cross-system Integration | Works across multiple software systems or databases | Not enough data | |
Proactive Assistance | Anticipates needs and offers suggestions without prompting | Not enough data | |
Decision Making | Makes informed choices based on available data and objectives | Not enough data |