Chapter 4. Understanding XenApp Security

Solutions in this chapter:

▪ Defining the XenApp Security Model
▪ Defining Types of Deployments
▪ Understanding Authentication Methods
▪ Encrypting XenApp
Summary
Solutions Fast Track
Frequently Asked Questions

Introduction

Data security incidents and breaches into identity theft are now daily headlines. Until recently publicity regarding these breaches was more limited. In 2003, California was one of the first states to pass a law requiring companies to notify affected consumers regarding security breaches. Since then, many other states have passed similar legislation. These public notice requirements have heightened consumer and public awareness regarding data security breaches.
As a result of these many incidents, ...

Get Securing Citrix XenApp Server in the Enterprise now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.