Title: Citrix Access Gateway with Advanced Access Control 4'2 Technical Overview
1Citrix Access Gateway with Advanced Access
Control 4.2Technical Overview
2Agenda
3Citrix Delivers Access Security
- Perimeter Security Establishes a barrier to keep
malicious attacks from affecting the productivity
of the organization
Access Security Provides regulated access to the
business resources users need to perform their
duties
4Secure Access Challenges
- Anywhere access to business applications and data
- Expanding access to more users and device types
cost-effectively - Prevent downtime and business loss from security
breaches - Meet or exceed security, privacy and regulatory
concerns
5The Customer Problems
Consistent user experience
Cannot access from behind firewalls
CPS Applications
Access from widely varying devices
Corporate Laptop
Local Users
Advanced Access Control
Access Gateway
Email Servers
Need access to all internal IT resources
Mobile PDA
Firewall
Firewall
Web or App Servers
Internet
Minimize re-authentication on re-connect
Home Computer
File Servers
- Bandwidth
- Latency
- Deviceidiosyncrasies
Desktops Phones
Partners
Control over how information and applications can
be used
Endpoint security, identification, and integrity
validation
Centralized access control to all IT resources
Hardened Appliance
Consistent user experience
6Agenda
7Citrix Access Strategy
IntegratedApproach
Piece-Part Approach
EnterpriseSingleSign-On
Access Rights Management
UserAssistance
Real-TimeCollaboration
User Assistance
EnterpriseSingleSign-On
Application Delivery
SSL VPN
Access Rights Management
SSL VPN
Application Delivery
End-PointSecurity
End-PointSecurity
Visibility Reporting
Real-TimeCollaboration
Security, Interoperability Management Gaps
Secure, Integrated, Flexible Extensible
8Product Components
Access Gateway
Advanced Access Control
- Deployed in a secured network
- Deployed on Windows Server platform
- Centralizes administration, management policy
based access control - Centralized reporting and auditing
- Manages endpoint analysis and client delivery
- Extends access to more devices and scenarios
- Advanced policy engine with action control
- Access Gateway hardened appliance in DMZ
- Enables end-to-end secure communication via SSL
- Authentication point
- Enforces policies generated by Advanced Access
Control
9Agenda
10Advanced Access ControlFeatures Benefits
11SmartAccess Technology
- Extensive policy-based sense and response
- Automatically reconfigures the appropriate level
of access as users roam between devices,
locations and connections - Advanced, extensible end-point security policies
and analysis - Action control defines what the user can access,
and what actions they can take
12SmartAccess Overview
- Analyze Access Scenario
- Analyze endpoint to ensure connections are
- Safe ensure connection will not harm corporate
infrastructure - Trusted analyze user, machine, and network
identity to ensure the connection is being made
as claimed - Secure ensure malicious parties cannot attack
corporate infrastructure from connecting devices - Provide an extensible architecture (via SDK) to
allow customers and 3rd parties to easily create
custom scans
Analyze Access Scenario
- Machine Identity
- NetBIOS name
- Domain Membership
- MAC address
- Machine Configuration
- Operating System
- Anti-Virus System
- Personal Firewall
- Browser
- Network Zone
- Login Agent
- Authentication Method
- Custom Endpoint Scans
13SmartAccess Overview
- Policy Based Access Control
- Situational or contextual access control based on
user membership, authentication strength, device
and connection to ensure IT resources are not
exposed to unwarranted risk
Analyze Endpoint Connection
Implement Access Control
- CPS applications
- File network shares (UNCs)
- Web based email
- Web sites (URLs)
- Web applications
- Email application synchronization
- Machine Identity
- NetBIOS name
- Domain Membership
- MAC address
- Machine Configuration
- Operating System
- Anti-Virus System
- Personal Firewall
- Browser
- Network Zone
- Login Agent
- Authentication Method
- Client Certificate Queries
- Custom Endpoint Scans
14SmartAccess Overview
- Intellectual Property Control
- Manage the use of sensitive information by
- controlling how information is accessed and
used(CPS, HTML Preview, LiveEdit etc.) - controlling what can be done with that
information(download, print, save, copy, etc.) - ensuring no data is left on the local machine
- Enable companies to log all access
SSL-VPNs
Analyze Endpoint Connection
Implement Access Control
Implement Resource Usage Control
- Full download of documents
- LiveEdit
- Edit locally
- Save back to server
- Retain in memory during edit
- Avoid data leakage on client
- Preview documents with HTML
- Access from PDAs
- View without application on client
- Attach to email
- Avoid data transmission to client
- CPS Applications
- Control available applications
- Limit local mapped drives printing
- CPS applications
- File network shares (UNCs)
- Web based email
- Web sites (URLs)
- Web applications
- Email application synchronization
- Machine Identity
- NetBIOS name
- Domain Membership
- MAC address
- Machine Configuration
- Operating System
- Anti-Virus System
- Personal Firewall
- Browser
- Network Zone
- Login Agent
- Authentication Method
- Custom Endpoint Scans
15Access ScenarioCorporate Users from a Hotel
CPS Applications
Corporate Laptop
Access Gateway
Advanced Access Control
Email Servers
Mobile PDA
Firewall
Firewall
Web or App Servers
Internet
- Download and Access Information
- Full download
- Download to memory only
- Access via CPS only
- Preview in HTML only
- Edit and Save Changes
- Save locally
- Save only to network
- Save disabled
- Print
- Print locally
- Print to selected printers only
- Printing disabled
- CPS Applications
Home Computer
File Servers
Desktops Phones
Partner Machine
16Access ScenarioCorporate Users from Home
CPS Applications
Corporate Laptop
Access Gateway
Advanced Access Control
Email Servers
Mobile PDA
Firewall
Firewall
Web or App Servers
Internet
- Download and Access Information
- Full download
- Download to memory only
- Access via CPS only
- Preview in HTML only
- Edit and Save Changes
- Save locally
- Save only to network
- Save disabled
- Print
- Print locally
- Print to selected printers only
- Printing disabled
- CPS Applications
Home Computer
File Servers
Desktops Phones
Partner Machine
17Granular Access Controls
- File Download
- Local Edit and Save
- File Upload
- E-mail Sync
- Web E-mail
- Full Presentation Server Access
- Full Presentation Server App Set
- Edit in Memory
- Limited Presentation Server access (read-only
local drive mapping) - Limited Presentation Server application set
- File Preview
- File Upload
- E-mail Sync
- Web E-mail
- File Preview
- Web E-mail
- Controlled Presentation Server Access
18Phased Policy Rollout
- Define a group of trust remote users
- Grant full network access by giving access to the
Entire Network - Restrict full access with end-point scans (if
desired) - Prepare granular policies and roll-out to select
users as desired
19Methodology for Defining Access Policies
- Inventory all IT resources
- Group resources into levels of sensitivity
- Define end user access scenarios
- Associate end user access scenarios with levels
of sensitivity - Validate the policies with a select group using
event logging - Roll policies into full production
20Actions Control Overview
- Designed to prevent inadvertent leakage of
information normally associated with user error.
Example Users forget it is against company
policy to access sensitive information from home
or a kiosk.
21Endpoint AnalysisOverview
Analyze the client machine to identify the device
and determine if it is secured.
- Endpoint Analysis Clients
- ActiveX client for IE browsers (requires Admin or
Power user privileges) - Win32 install (via MSI)
- Netscape plug-in for Netscape and Mozilla
browsers - 3rd party product integration (AV, Personal
Firewall) - Symantec/Norton, McAfee, TrendMicro, Microsoft,
WholeSecurity, Check Point ICS, etc. - Fully customizable via Citrixs EPA SDK
- SDK available on Citrix Developers Network
- SDK is well-integrated with Visual Studio.NET
22Extending Web Interface
Local Users
Advanced Access Control
Web Interface
Firewall
Firewall
Corporate Laptop
Internet
Citrix Presentation Server Farm
Provide users with the best possible Presentation
Server experience
Provide administrators with the strongest level
of control
23Upgrade to Advanced Access Control
Local Users
CPS Applications
Corporate Laptop
Access Gateway
Email Servers
Mobile PDA
Firewall
Firewall
Web or App Servers
Internet
Home Computer
Management Console
File Servers
Desktops Phones
Partner Machine
24Access Gateway and Advanced Access Control 4.2
Access Gateway
Advanced Access Control
Defining a new level of control and access!
25(No Transcript)