Introducing G2.ai, the future of software buying.Try now
Citrix Secure Workspace Access
Save to My Lists
Claimed
Claimed

Citrix Secure Workspace Access Features

What are the features of Citrix Secure Workspace Access?

Authentication Options

  • Authentication User experience
  • Supports Required Authentication systems
  • Multi-Factor Authentication
  • Supports Required Authentication Methods/Protocols

Access Control Types

  • Local Access
  • Remote Access

Administration

  • Ease of installation on server
  • Password Policy Enforcement
  • Administration Console
  • Ease of connecting applications
  • Self Service Password Administration

Platform

  • Multiple Operating system support
  • Multi-Domain Support
  • Cross Browser support
  • Reporting

Top Rated Citrix Secure Workspace Access Alternatives

Okta
(956)
4.5 out of 5

Filter for Features

Authentication Options

Authentication User experience

Process of providing credentials and logging into multiple systems is easy and intuitive for users 38 reviewers of Citrix Secure Workspace Access have provided feedback on this feature.
92%
(Based on 38 reviews)

Supports Required Authentication systems

Supports required 3rd party Authentication Technologies. Example systems: bioMetric, passwords, key cards, token based systems, etc. This feature was mentioned in 38 Citrix Secure Workspace Access reviews.
89%
(Based on 38 reviews)

Multi-Factor Authentication

Provides support for Multi-Factor authentication, so users are required to provide multiple factors to authenticate. For example, something they know, Something they have or something they are. 36 reviewers of Citrix Secure Workspace Access have provided feedback on this feature.
93%
(Based on 36 reviews)

Supports Required Authentication Methods/Protocols

Based on 36 Citrix Secure Workspace Access reviews. Support SSO via Web agents, proxy agents, agent-less, SAML or oAuth and WS-Federation authentication and authorization Web services depending upon the application and business use case
89%
(Based on 36 reviews)

Federation/SAML support (idp)

As reported in 29 Citrix Secure Workspace Access reviews. Can serve as the identity provider to external service providers so that when the user logs into a service, instead of providing credentials to the service provider, the service provider trusts the identity provider to validate the credentials.
90%
(Based on 29 reviews)

Federation/SAML support (sp)

Based on 25 Citrix Secure Workspace Access reviews. Can serve as the Service provider from an external service so that when the user logs in externally they have seamless SSO to internal applications from a service provider.
89%
(Based on 25 reviews)

Access Control Types

Endpoint access

Provides ability to control access to PC's, Mobile devices, and other endpoint devices. 27 reviewers of Citrix Secure Workspace Access have provided feedback on this feature.
93%
(Based on 27 reviews)

Local Access

Controls access to legacy applications, web based applications, network resources and servers while employees are on the companies local area network. This feature was mentioned in 29 Citrix Secure Workspace Access reviews.
94%
(Based on 29 reviews)

Remote Access

Based on 35 Citrix Secure Workspace Access reviews. Controls access to legacy applications, web based applications, networks resources while employees are outside the local area network.
91%
(Based on 35 reviews)

Partner Access

Controls access to users that are not company employees that are either within the companies local area network or outside the network This feature was mentioned in 28 Citrix Secure Workspace Access reviews.
91%
(Based on 28 reviews)

Supports BYOD users

Enables users to use their own device to access company applications. 25 reviewers of Citrix Secure Workspace Access have provided feedback on this feature.
91%
(Based on 25 reviews)

Administration

Ease of installation on server

As reported in 35 Citrix Secure Workspace Access reviews. Installation process is easy and flexible.
87%
(Based on 35 reviews)

Password Policy Enforcement

As reported in 33 Citrix Secure Workspace Access reviews. Options for resetting and enforcing password policies
89%
(Based on 33 reviews)

Administration Console

Provides Administration tools/console that are easy to use and learn for routine maintenance tasks This feature was mentioned in 32 Citrix Secure Workspace Access reviews.
92%
(Based on 32 reviews)

Ease of connecting applications

Based on 32 Citrix Secure Workspace Access reviews. Easily provisions new systems, platforms or applications using configuration and not customization.
90%
(Based on 32 reviews)

Self Service Password Administration

As reported in 32 Citrix Secure Workspace Access reviews. Users can set, change passwords without interaction from IT staff
90%
(Based on 32 reviews)

Network Segmentation

Allows administrative control over network components, mapping, and segmentation.

Not enough data

Scalability

Provides features to allow scaling for large organizations and user bases.

Not enough data

Global Access

Extends SDP network access to users regardless of their physical location.

Not enough data

Platform

Multiple Operating system support

Supports Endpoint access control to multiple operating systems This feature was mentioned in 33 Citrix Secure Workspace Access reviews.
92%
(Based on 33 reviews)

Multi-Domain Support

As reported in 33 Citrix Secure Workspace Access reviews. Allows user authentication to be honored by all the hosts in two or more domains
86%
(Based on 33 reviews)

Cross Browser support

Support access to browser based applications across required browser types This feature was mentioned in 33 Citrix Secure Workspace Access reviews.
83%
(Based on 33 reviews)

Fail over protection

Based on 28 Citrix Secure Workspace Access reviews. Provides required failover mechanisms to ensure if one server, network, etc fails users are still able able to authenticate
92%
(Based on 28 reviews)

Reporting

As reported in 29 Citrix Secure Workspace Access reviews. Contains pre-built and custom reporting tools to required to manage business
93%
(Based on 29 reviews)

Auditing

Provides mechanism for auditing authentication for trouble shooting purposes. 26 reviewers of Citrix Secure Workspace Access have provided feedback on this feature.
92%
(Based on 26 reviews)

Third Party Web Services support

Can call and pass credentials to third party web services. 26 reviewers of Citrix Secure Workspace Access have provided feedback on this feature.
94%
(Based on 26 reviews)

Network Management

Network Segmentation

Allows administrative control over network components, mapping, and segmentation. This feature was mentioned in 10 Citrix Secure Workspace Access reviews.
92%
(Based on 10 reviews)

Network Mapping

Allows visual display of networks segmented components and their connected resources.

Not enough data

Security Analytics

As reported in 10 Citrix Secure Workspace Access reviews. Utilizes behavioral analysis to improve security procedures and documentation.
92%
(Based on 10 reviews)

API/Integrations

Application Programming Interface - Specification for how the application communicates with other software. API's typically enable integration of data, logic, objects, etc. with other software applications. This feature was mentioned in 10 Citrix Secure Workspace Access reviews.
93%
(Based on 10 reviews)

Security

Security Automation

Based on 10 Citrix Secure Workspace Access reviews. Allows administrative control over automated security tasks.
90%
(Based on 10 reviews)

Application Security

Protects application access and data. Prompts additional authentication for suspicious users. 10 reviewers of Citrix Secure Workspace Access have provided feedback on this feature.
93%
(Based on 10 reviews)

Workload Protection

Protects computing resources across a network. Prompts additional authentication for suspicious users. 10 reviewers of Citrix Secure Workspace Access have provided feedback on this feature.
90%
(Based on 10 reviews)

Data Protection

Protects informatin stored on premises and in the cloud. Prompts additional authentication for suspicious users. This feature was mentioned in 10 Citrix Secure Workspace Access reviews.
90%
(Based on 10 reviews)

Governance

Allows users to create, edit, and relinquish user access privileges. 13 reviewers of Citrix Secure Workspace Access have provided feedback on this feature.
91%
(Based on 13 reviews)

Data loss Prevention

Based on 12 Citrix Secure Workspace Access reviews. Stores data securely either on premise or in an adjacent cloud database to prevent loss of data at rest.
86%
(Based on 12 reviews)

Data Encryption/Security

Based on 11 Citrix Secure Workspace Access reviews. Manages policies for user data access and data encryption.
83%
(Based on 11 reviews)

Access Control

As reported in 13 Citrix Secure Workspace Access reviews. Supports LDAP Protocol to enable access control and governance.
86%
(Based on 13 reviews)

Identity Management

Adaptive Access Control

As reported in 10 Citrix Secure Workspace Access reviews. Provides a risk-based approcach to determining trust within the network.
93%
(Based on 10 reviews)

Identity Scoring

Calculates risk based on user behavior, permissions, and requests. 10 reviewers of Citrix Secure Workspace Access have provided feedback on this feature.
92%
(Based on 10 reviews)

User Monitoring

Monitors users attempting unauthorized access to databases, applicaitons, and othe network components. 10 reviewers of Citrix Secure Workspace Access have provided feedback on this feature.
93%
(Based on 10 reviews)

Analysis

User Analytics

Allows for reporting and documentation of individual user behavior and privileges. This feature was mentioned in 10 Citrix Secure Workspace Access reviews.
83%
(Based on 10 reviews)

Cloud Gap Analytics

Analyzes data associated with denied entries and policy enforcement, giving information of better authentication and security protocols.

Not enough data

Anomoly Detection

Monitors acivity related to user behavior and compares activity to benchmarked patterns.

Not enough data

Functionality

SSO

Based on 13 Citrix Secure Workspace Access reviews. Provides a single access point for users to access multiple cloud products without multiple logins.
90%
(Based on 13 reviews)

Cloud Registry

Details SaaS products the cloud security product can integrate with and provide security for. This feature was mentioned in 10 Citrix Secure Workspace Access reviews.
80%
(Based on 10 reviews)

Mobile Device Mangement

As reported in 13 Citrix Secure Workspace Access reviews. Offers the ability to set standards for types of mobile devices and networks capable of accessing data.
88%
(Based on 13 reviews)

Protection

Policy Enforcement

Allows administrators to set policies for security and governance.

Not enough data

Security Audit

Allows for deep examination into network-connected devices, policies, and protocols.

Not enough data

Access Control

Supports LDAP Protocol to enable access control and governance.

Not enough data

User Authentication

Authenticates users prior to granting access to networks, applciations, and systems.

Not enough data

Monitoring

Compliance Monitoring

Monitors data and compliance requirements. Sends alerts based on violations or misuse.

Not enough data

Vulnerability Monitoring

Monitors networks, applications, and systems to identify misconfigurations and access points that can be easily compromised.

Not enough data

Configuration Monitoring

Monitors configuration rule sets and policy enforcement measures and document changes to maintain compliance.

Not enough data

Observability

Generate insights across IT systems utilizing event metrics, logging, traces, and metadata.

Not enough data

Generative AI

AI Text Summarization

Condenses long documents or text into a brief summary.

Not enough data

AI Text Generation

Allows users to generate text based on a text prompt.

Not enough data

Components - Secure Access Service Edge (SASE)

Zero Trust Network Access (ZTNA)

Enforces zero trust access rules.

Not enough data

Wide Area Network (WAN)

Integrates wide area network (WAN) capabilities, such as SD-WAN.

Not enough data

Cloud Access Security Broker (CASB)

Enforces security requirements and secures connections with cloud resources.

Not enough data

Secure Web Gateway (SWG)

Prevents unauthorized web domains from entering a network and protects against web-based threats.

Not enough data

Firewall as a Service

Provides cloud-based firewall protection.

Not enough data

Artificial Intelligence - Secure Access Service Edge (SASE)

Predictive Capabilities

Uses predictive analytics to anticipate emerging threats.

Not enough data

Real-Time Threat Detection

Utilizes AI algorithms to identify anomolies and block access to malicious sites.

Not enough data

Automation

Automates common workflows and remediation tasks.

Not enough data

Agentic AI - Secure Access Service Edge (SASE) Platforms

Autonomous Task Execution

Capability to perform complex tasks without constant human input

Not enough data

Cross-system Integration

Works across multiple software systems or databases

Not enough data

Proactive Assistance

Anticipates needs and offers suggestions without prompting

Not enough data

Decision Making

Makes informed choices based on available data and objectives

Not enough data