They allow us to finely tune user permissions and controls in accessing
depending on their access scenario - who they are, where they are, the device they are using, how it is configured, and the connection through which they are accessing
Organizations are faced with a growing number of users, both internal and external, accessing
a mounting number of IT resources and the challenges of supporting secure access for each," said Jonathan Penn, analyst with Forrester Research.
The Citrix(R) Access Platform ensures end-users have the best experience accessing
business-critical information and that IT teams are equipped to deliver enterprise resources to the right people at the right time.
The same granular controls are applied to users whether they are accessing
resources remotely over HTTP, tunneling applications over SSL, over network-level connectivity remotely, or over the local LAN.
enKoo's remote access appliances make it easier and more affordable for SMBs to offer remote employees true freedom and flexibility when securely accessing
email, files and applications from any location.