Sécurisez des documents, appareils et utilisateurs

One of the biggest challenges IT teams face stems from data loss and security risks caused by the unauthorized use of personal file sharing services. Using personal file sharing services for business purposes invites data leakage and compliance violations, allowing files to escape beyond the visibility and control of IT. However, users want the ability to access and share data from anywhere, on any device they choose.

IT can stop the spread of uncontrolled data sharing through an approved, secure content collaboration service that meets employees needs better than any consumer service could. Market-leading content collaboration services combine the convenience and simplicity of a personal file sharing service with enterprise controls to increase productivity for end users while adding security, flexibility and control for IT.

Découvrir comment

Citrix Content Collaboration eliminates threats posed by consumer file-sharing services and provides a comprehensive set of data protection features. With Content Collaboration, IT maintains total control over data access, storage, and sharing across the organization. The service also includes controls to audit, track, and log all user activity to support compliance requirements and provide visibility into data usage.

Additionally, shared files are encrypted both at rest and in transit. A remote wipe feature allows secure destruction of all Content Collaboration-stored data and passwords on a device that has been lost or stolen. Key Management Systems help IT gain greater control, flexibility, and security by managing your own encryption keys when storing files in a Citrix-managed cloud storage zone. Une fonctionnalité de « pilule empoisonnée » permet aux directions informatiques d’établir des stratégies d’expiration des données pour les périphériques mobiles.

An organization’s most sensitive information lives in their documents, so protecting those documents is of the highest priority for IT. But between phishing attacks, ransomware, user error, and other security threats, there’s never been more for IT to worry about. With limited resources and a wide range of data repositories, devices, users, and apps to protect, IT is in search of tools that can improve their security posture without dedicating extensive manpower.

Citrix Analytics leverages machine learning to identify threats and risky behavior by your end users. With the ability to recognize anomalous activity by recognized users and malicious actions by external threats, Citrix Analytics adds visibility into end user behavior and can take proactive action to protect your organization.. With a customizable, rules-based engine to take proactive measures against those threats, IT doesn’t have to dedicate vast resources to add a layer of security. When integrated with Citrix Workspace and Citrix Networking, organizations have the ability to monitor and protect data, devices, apps, and networks from a single partner.

To stay secure, organizations need to be able to control file sharing based on the content inside the files themselves. Grâce à l’intégration de systèmes de prévention de perte de données, Citrix Content Collaboration classe les éléments en fonction de leur contenu et applique les restrictions de partage en fonction de catégories de données. It integrates with popular DLP systems including Symantec Data Loss Prevention, McAfee DLP Prevent, and Websense Forcepoint to restrict document sharing based on the file’s DLP classification.

When sharing a document with business-critical or confidential content, senders need to ensure that the intended recipient securely receives the document while preventing further sharing with unauthorized recipients.

With IRM, you can add a layer of security to your document shares to prevent further unauthorized distribution. Prior to sending the document, the document owner can choose to apply a watermark with the recipient’s name, email address, and IP address to mitigate the risk of screen captures. Additionally, senders can also choose to block recipients from downloading documents. This ensures that the recipients will not be able to locally store copies of documents on their devices.

Produits Citrix

Citrix Content Collaboration

  • Offre l’ensemble le plus complet de fonctionnalités de gestion des droits du secteur et permet aux utilisateurs d’appliquer des images en filigrane, de bloquer les captures et les partages d’écran, et de protéger automatiquement les données sensibles.
  • S’intègre aux systèmes de prévention des pertes de données pour des déploiements de StorageZones avec gestion client, en vue de restreindre le partage de documents en fonction de la classification du client selon le système de prévention de perte de données.
  • Protège la propriété intellectuelle, empêche la perte de données et assure le respect des exigences, particulièrement dans les secteurs très réglementés tels que la finance ou la santé.

Consulter

Sécurité de Citrix Content Collaboration

Découvrez les caractéristiques de sécurité de Citrix Content Collaboration.

Découvrir

Citrix Content Collaboration : conçu pour l’entreprise, reconnu par les directions informatiques

Découvrez les caractéristiques de sécurité de Citrix Content Collaboration dans la fiche produit.