| 15 August 2012
Protects Citrix Environments against Advanced Persistent Threats and Credential Stealing Malware
BOSTON: Trusteer, the leading provider of endpoint cybercrime prevention solutions, yesterday announced that Trusteer Rapport for Enterprise has been verified as Citrix Ready® for Citrix XenApp(TM), Citrix Receiver™ and Citrix NetScaler®. Trusteer Rapport protects employee endpoints that access Citrix XenApp virtual desktops against advanced malware and advanced persistent threats (APT) that attempt to capture login credentials and sensitive information in the Citrix Receiver client. Trusteer completed a rigorous verification process to ensure seamless compatibility with these Citrix products in enterprise environments.
Click to Tweet: @Trusteer Rapport for Enterprise verified #citrixready http://bit.ly/TcC3Bd
Trusteer Rapport for Enterprise isolates the Citrix session so even if advanced malware takes over the endpoint, it cannot capture data from the running session. The Citrix Ready program makes it easy for customers to identify complementary products and solutions that can enhance Citrix environments. Customers can be confident that Trusteer Rapport for Enterprise has successfully passed a series of tests established by Citrix and works effectively with Citrix XenApp, Citrix Receiver and Citrix NetScaler.
“Employee endpoints were the primary attack vector used in the majority of high profile enterprise data breaches over the past 12 months,” said Yaron Dycian vice president of products for Trusteer. “This Citrix Ready verification validates that Trusteer Rapport for Enterprise integrates with Citrix NetScaler and Citrix XenApp to secure both managed and unmanaged endpoints that access remote desktops from targeted attacks. Trusteer Rapport significantly reduces the risk of malware-driven data breaches by protecting credentials and sensitive data from screen capturing malware and keyloggers.”
Trusteer Rapport for Enterprise protects Citrix XenApp, Citrix Receiver and Citrix NetScaler against advanced malware that bypasses legacy security solutions by preventing:
• Key loggers from capturing a user’s log-in credentials when authenticating to a VPN and enterprise applications via Citrix Receiver
• Advanced Malware like Remote Access Trojans (RATs) from capturing information presented on desktops during Citrix sessions
|< Prev||Next >|