Securing Citrix XenApp Server in the Enterprise

Nonfiction, Computers, Networking & Communications, Computer Security, Operating Systems, Application Software
Cover of the book Securing Citrix XenApp Server in the Enterprise by Tariq Azad, Elsevier Science
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Tariq Azad ISBN: 9780080569987
Publisher: Elsevier Science Publication: August 8, 2008
Imprint: Syngress Language: English
Author: Tariq Azad
ISBN: 9780080569987
Publisher: Elsevier Science
Publication: August 8, 2008
Imprint: Syngress
Language: English

Citrix Presentation Server allows remote users to work off a network server as if they weren't remote. That means: Incredibly fast access to data and applications for users, no third party VPN connection, and no latency issues. All of these features make Citrix Presentation Server a great tool for increasing access and productivity for remote users. Unfortunately, these same features make Citrix just as dangerous to the network it's running on. By definition, Citrix is granting remote users direct access to corporate servers?..achieving this type of access is also the holy grail for malicious hackers. To compromise a server running Citrix Presentation Server, a hacker need not penetrate a heavily defended corporate or government server. They can simply compromise the far more vulnerable laptop, remote office, or home office of any computer connected to that server by Citrix Presentation Server.
All of this makes Citrix Presentation Server a high-value target for malicious hackers. And although it is a high-value target, Citrix Presentation Servers and remote workstations are often relatively easily hacked, because they are often times deployed by overworked system administrators who haven't even configured the most basic security features offered by Citrix. "The problem, in other words, isn't a lack of options for securing Citrix instances; the problem is that administrators aren't using them." (eWeek, October 2007). In support of this assertion Security researcher Petko D. Petkov, aka "pdp", said in an Oct. 4 posting that his recent testing of Citrix gateways led him to "tons" of "wide-open" Citrix instances, including 10 on government domains and four on military domains.

* The most comprehensive book published for system administrators providing step-by-step instructions for a secure Citrix Presentation Server.
* Special chapter by Security researcher Petko D. Petkov'aka "pdp detailing tactics used by malicious hackers to compromise Citrix Presentation Servers.
* Companion Web site contains custom Citrix scripts for administrators to install, configure, and troubleshoot Citrix Presentation Server.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

Citrix Presentation Server allows remote users to work off a network server as if they weren't remote. That means: Incredibly fast access to data and applications for users, no third party VPN connection, and no latency issues. All of these features make Citrix Presentation Server a great tool for increasing access and productivity for remote users. Unfortunately, these same features make Citrix just as dangerous to the network it's running on. By definition, Citrix is granting remote users direct access to corporate servers?..achieving this type of access is also the holy grail for malicious hackers. To compromise a server running Citrix Presentation Server, a hacker need not penetrate a heavily defended corporate or government server. They can simply compromise the far more vulnerable laptop, remote office, or home office of any computer connected to that server by Citrix Presentation Server.
All of this makes Citrix Presentation Server a high-value target for malicious hackers. And although it is a high-value target, Citrix Presentation Servers and remote workstations are often relatively easily hacked, because they are often times deployed by overworked system administrators who haven't even configured the most basic security features offered by Citrix. "The problem, in other words, isn't a lack of options for securing Citrix instances; the problem is that administrators aren't using them." (eWeek, October 2007). In support of this assertion Security researcher Petko D. Petkov, aka "pdp", said in an Oct. 4 posting that his recent testing of Citrix gateways led him to "tons" of "wide-open" Citrix instances, including 10 on government domains and four on military domains.

* The most comprehensive book published for system administrators providing step-by-step instructions for a secure Citrix Presentation Server.
* Special chapter by Security researcher Petko D. Petkov'aka "pdp detailing tactics used by malicious hackers to compromise Citrix Presentation Servers.
* Companion Web site contains custom Citrix scripts for administrators to install, configure, and troubleshoot Citrix Presentation Server.

More books from Elsevier Science

Cover of the book International Review of Cell and Molecular Biology by Tariq Azad
Cover of the book Substitute Natural Gas from Waste by Tariq Azad
Cover of the book Tufted Carpet by Tariq Azad
Cover of the book Gluten-Free Cereal Products and Beverages by Tariq Azad
Cover of the book Advances in Membrane Technologies for Water Treatment by Tariq Azad
Cover of the book Delivery and Controlled Release of Bioactives in Foods and Nutraceuticals by Tariq Azad
Cover of the book Sterol Regulation of Ion Channels by Tariq Azad
Cover of the book Role of the Mediterranean Diet in the Brain and Neurodegenerative Diseases by Tariq Azad
Cover of the book Serum Pharmacochemistry of Traditional Chinese Medicine by Tariq Azad
Cover of the book Human Growth and Development by Tariq Azad
Cover of the book Handbook of Immunoassay Technologies by Tariq Azad
Cover of the book Annual Reports in Computational Chemistry by Tariq Azad
Cover of the book Stem Cell Culture by Tariq Azad
Cover of the book Silicon Photonics by Tariq Azad
Cover of the book Biophysical Characterization of Proteins in Developing Biopharmaceuticals by Tariq Azad
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy