SlideShare une entreprise Scribd logo
1  sur  49
Télécharger pour lire hors ligne
1 © 2016 Citrix
Session Number/Session Title:
SYN321: Securing the published browser
Session Description:
Browsers are the most common published application in virtualized environments—and also
the most exposed to security issues, as they’ve historically been one of the most vulnerable
pieces of software on any end point. The security concerns with browsers are legendary and
involve complex settings, third-party plugins, active content, Flash, JAVA and other
components that must be kept under strict control. XenApp and XenDesktop provide unique
methods to fine-tune browser security and protect sensitive data across web applications,
compliance environments, administrative portals, email and the cloud. Join this session for a
discussion of “when bad things happen to good browsers” including demos of common
security problems and their solutions.
In this session, you will learn:
• How to lock down browsers at the end point for accessing both virtualized and web
environments
• Guidance for hardening published browsers, including group policy and PowerShell
configuration of security policies
• How to tune browser components to be application-specific and further minimize the
attack surface
2 © 2016 Citrix
Session Date-Time/Location:
5/24/2016, 2:00 p.m. – 3:30 p.m. / Murano 3304
Session Track: Desktop & App Delivery, Security
Session Level: Technical - Advanced
Session Owner: Calvin Hsu
(Contact with any questions regarding session content and direction)
Image source:
http://www.bing.com/images/search?q=browser&view=detailv2&qft=+filterui%3alicense-
L2_L3&id=E6F8E72F843D7D4187ED4FDBB88C61EB4DDF034A&selectedIndex=1&ccid=b%2bj
OseF4&simid=608051161184536293&thid=OIP.M6fe8ceb1e178b94805643ce78575472do0&
ajaxhist=0
(License selected: Free to modify, share and use commercially)
3 © 2016 Citrix
@JHNord @CitrixSecurity @atofunk
4 © 2016 Citrix
5 © 2016 Citrix
Source: https://cis.citrix.com/insights/#/product-insights/xenapp-and-xendesktop
6 © 2016 Citrix
[Kurt]
7 © 2016 Citrix
[Kurt]
• We’re addressing local browsers for access to virtualization resources, as well as
datacenter and cloud-hosted browsers. Reverse seamless???
• The guidance provided is appropriate for corporate, home and third-parties
• Plugins include Flash player, Silverlight, JAVA, Acrobat, etc.
• The goal is a “browser enclave”, where a problem with the browser/content is contained
• Througout this conversation, we will be discussing the tradeoffs between security and
functionality, along with those between anonymity and auditing.
• Introducing the Securing the Published Browser Whitepaper
8 © 2016 Citrix
Eric Beiers is a solution architect that works with the largest enterprises of Canada
to help develop and realize their virtualization, cloud and networking strategies and vision.
Eric was the previous technical lead of Citrix Consulting Canada, as the Enterprise Architect
for the country where he architected many large global deployments of Citrix, with high
security kept at top of mind.
Joseph Nord is Security Product Manager for Citrix where he authors the XenApp and
XenDesktop product requirements for security and authentication features and manages the
completion of certifications and compliance including Common Criteria, FIPS, PCI and HIPAA.
Joe works with customers, partners and Citrix sales teams to help customers achieve their
security goals.
As Chief Security Strategist for Citrix, Kurt Roemer leads security, compliance, risk and privacy
strategies for Citrix products. As a member of the Citrix CTO and Strategy Office, Roemer
drives ideation, innovation and technical direction for products and solutions that advance
business productivity while ensuring information governance.
An information services veteran with more than 30 years experience, his credentials include
the Certified Information Systems Security Professional (CISSP) designation. He also served
as Commissioner for the US public-sector CLOUD2 initiative and led efforts to develop the PCI
Security Standards Council Virtualization Guidance Information Supplement while serving on
the Board of Advisors.
9 © 2016 Citrix
[Kurt, Joe, Eric]
Image Source:
http://atom.smasher.org/vegas/?l1=Tonight+Only%21&l2=Eric%2C+Joe+and+Kurt&l3=&l4=Ju
st+Browsing
10 © 2016 Citrix
[Eric]
DEMO
(1) Corporate site, going to the bad place on the network + secure browser - Why should we
care?
Show an example of launching a webpage from a local computer
No restrictions, all wide open, user can go to the bad places on the Internet and accept the
warnings
Not centrally managed, and no technical policy to enforce corporate policy
Launch a secure browser site, show the idea that if you have a current generation browser,
you can launch a browser, from within another browser
11 © 2016 Citrix
12 © 2016 Citrix
13 © 2016 Citrix
14 © 2016 Citrix
[Joe, Kurt]
Image Source:
http://www.bing.com/images/search?q=scared&view=detailv2&qft=+filterui%3alicense-
L2_L3&id=5EDE5975BAE94FA5D3220CE607E8E2A89B00108B&selectedIndex=15&ccid=%2b4
zu3HEl&simid=608021049168429905&thid=OIP.Mfb8ceedc7125e5beeb3003b20b442c4fo0&
ajaxhist=0
(License selected: Free to modify, share and use commercially)
15 © 2016 Citrix
• Integrated browsers, installable browsers, browser appliances
• Local browser access with URL redirection. Remote PC.
• Persistent and non-persistent
Image Source:
http://www.amazon.com/HP-Chromebook-14-Celeron-14-
inch/dp/B0172GUW4I/ref=sr_1_7?s=pc&ie=UTF8&qid=1463513119&sr=1-
7&keywords=hp+chromebook
16 © 2016 Citrix
[Joe, Kurt]
Value of running hosted, things to lock down, ability to restrict clipboard (one-way) and
format limiting, turn off client drive mapping, printing…everything you don’t need
Trash Can – disposable browser
Goal is a desired state that’s reproducable through configuration
Can use PowerShell to validate
chrome://policy/
Chromebook
TLS 1.2
17 © 2016 Citrix
Image Source:
http://www.bing.com/images/search?q=browser+security&view=detailv2&qft=+filterui%3alic
ense-
L2_L3&id=BE5DEFEF0C048783BA227F05923AD344BDDD79E2&selectedIndex=41&ccid=AuIvj
mdB&simid=608044065901576378&thid=OIP.M02e22f8e6741ea58c447277ba237d4eco0&aj
axhist=0
(License selected: Free to modify, share and use commercially)
18 © 2016 Citrix
[MZ] This is a big deal. Do you want to force all your users to use legacy version of browser
just because you have one application that requires it? Wouldn’t it be nice if you could
choose which browser you want to use with each of the critical applications?
19 © 2016 Citrix
[MZ] This is a big deal. Do you want to force all your users to use legacy version of browser
just because you have one application that requires it? Wouldn’t it be nice if you could
choose which browser you want to use with each of the critical applications?
20 © 2016 Citrix
Level 1, 2
Green, Yellow, Red [high-level data sensitivity classification]
Sensitive apps
Options
PCI
Enterprise mode – compatibility setting in IE11 (configure for IE8 compatibility)
Lockdown vs. relaxation
21 © 2016 Citrix
Tradeoffs?
Forbes
Turn off address bar
Enterprise mode – compatibility setting in IE11 (configure for IE8 compatibility)
Be aware of site-specific policies, such as preference for HTML5 over Flash
Persistence
Redirects
Whitelisting and blacklisting? (domains, plugins, active content)
22 © 2016 Citrix
DEMO - Build and harden the OS
(2) Building the OS image (powershell creation) + How to add applications
(powershell/vbs/mcs) - We need to build and harden the OS
Explain the idea of consistency of images, and you need some way to automate, since if you
do this a few times by hand, it will never be the same
Want to build the system by installing certain services, disabling some services,
Demonstrate installing applications using powershell
Explain the idea of converting the image to a gold image for use in MCS or PVS, and having a
non-persistent image allows us to reboot, and go back to a known clean state (no demo, just
console?)
23 © 2016 Citrix
24 © 2016 Citrix
25 © 2016 Citrix
Image source:
http://www.bing.com/images/search?q=under+construction&view=detailv2&qft=+filterui%3
alicense-
L2_L3&id=05B56A181A55837CEDFD8E8E4F905E62CC877603&selectedIndex=9&ccid=3e6v8Z
qr&simid=608034458058622883&thid=OIP.Mddeeaff19aab382d52bbea2fb0ac844bo0&ajaxh
ist=0
(License selected: Free to modify, share and use commercially)
26 © 2016 Citrix
27 © 2016 Citrix
(3) How to configure/lock down browser (GPO/GUI) - We need to configure and harden the
browser (part 1)
Review of the GUI of the browser, talk through some of the key settings
Show how to configure IE11, using group policy
Show how to install an ADMX template (or skip but explain), and then use that template to
configure Chrome and Firefox
(4 or merge with 3) Enterprise Mode/trusted sites configuraiton/proxy configuration - We
need to configure and harden the browser (part 2)
When configuring a browser, certain sites might require compatibility viewing, or a lessened
security posture.
Demonstrate using GPOs to configure the trusted sites configuration
Demonstrate configuration of the proxy (several ways to do this, GUI/GPO/PowerShell/WPAD
(choose one)
Demonstrate creating an enterprise mode list in XML (https://technet.microsoft.com/en-
us/itpro/internet-explorer/ie11-deploy-guide/add-multiple-sites-to-enterprise-mode-site-list-
using-the-version-1-schema-and-enterprise-mode-tool,
https://technet.microsoft.com/en-us/itpro/internet-explorer/ie11-deploy-guide/turn-on-
enterprise-mode-and-use-a-site-list)
28 © 2016 Citrix
[Joe, Kurt]
29 © 2016 Citrix
30 © 2016 Citrix
31 © 2016 Citrix
32 © 2016 Citrix
33 © 2016 Citrix
34 © 2016 Citrix
35 © 2016 Citrix
36 © 2016 Citrix
37 © 2016 Citrix
38 © 2016 Citrix
39 © 2016 Citrix
40 © 2016 Citrix
41 © 2016 Citrix
42 © 2016 Citrix
43 © 2016 Citrix
Storefront, workflow, tab for each browser…
Colors
3 different Chrome, 3 different background colors
Use cases – protection of cloud-based apps
DEMO
(5) Launch and customize applications (Colours, switches, vbs wrapper) IE8/9/10/Chrome -
We need to tailor the requirements for the usage scenario
Customize a launch of a browser by providing a URL
Customize a launch of a browser by providing additional parameters (kiosk mode, incognito,
disable features)
Customize the appearance of a browser (Red/Blue/Green)
Customize the browser using a .vbs script wrapper, to disable specific controls
(6) Secure Enclave (proxy/av/ids/ips) - We control the placement now! We need to harden
the Network
Demonstrate a restricted browser, getting blocked going to a site (current lab has
NS/IDS/IPS/Firewall/AntiVirus/Proxy/DNS&IP reputation lists)
--- I'm not really sure if showing these other components helps, but I like this demo, since you
can put an ad blocker at the network level, instead of the application level (defence in depth)
44 © 2016 Citrix
Q&A
45 © 2016 Citrix
References:
Citrix Security and Compliance
• http://www.citrix.com/security
Citrix Common Criteria Resources
• http://www.citrix.com/about/legal/security-compliance/common-criteria.html
NetScaler Security Best Practices: Secure Deployment Guide for NetScaler MPX, VPX, and
SDX Appliances
• http://support.citrix.com/article/CTX129514
Payment Card Industry (PCI) and Citrix XenApp and XenDesktop Deployment Scenarios
• http://www.citrix.com/content/dam/citrix/en_us/documents/support/payment-card-industry-
and-citrix-xenapp-and-xendesktop-deployment-scenarios.pdf
Citrix solutions for Healthcare and Compliance
• https://www.citrix.com/content/dam/citrix/en_us/documents/products-solutions/citrix-solutions-
for-healthcare-and-hipaa-compliance.pdf
Citrix XenApp and XenDesktop FIPS 140-2 Sample Deployments
• https://www.citrix.com/content/dam/citrix/en_us/documents/about/citrix-xenapp-and-
xendesktop-76-fips-140-2-sample-deployments.pdf
46 © 2016 Citrix
47 © 2016 Citrix
You might be wondering how much we know about your experience with our products, and
what we’re doing to improve product quality and make your experience better.
Our product supportability efforts are the result of paying attention to the issues and
concerns you raise when engaging with our Support teams as well as the feedback you
provide to our Sales and Consulting groups.
The details you see here speak to some of the work we’ve done already, and where we’re
currently focused.
For more details on supportability efforts, visit: www.citrix.com/supportability
48 © 2016 Citrix
49 © 2016 Citrix

Contenu connexe

Tendances

Arrow VMware NSX Infographic
Arrow VMware NSX Infographic Arrow VMware NSX Infographic
Arrow VMware NSX Infographic SolutionStation
 
Delivering Business Agility through Datacenter Automation with Citrix NetScal...
Delivering Business Agility through Datacenter Automation with Citrix NetScal...Delivering Business Agility through Datacenter Automation with Citrix NetScal...
Delivering Business Agility through Datacenter Automation with Citrix NetScal...Citrix
 
Cisco Connect 2018 Thailand - Next generation hyperconverged infrastructure-s...
Cisco Connect 2018 Thailand - Next generation hyperconverged infrastructure-s...Cisco Connect 2018 Thailand - Next generation hyperconverged infrastructure-s...
Cisco Connect 2018 Thailand - Next generation hyperconverged infrastructure-s...NetworkCollaborators
 
Cloud Security: challenges and perspectives.
Cloud Security: challenges and perspectives.Cloud Security: challenges and perspectives.
Cloud Security: challenges and perspectives.EUBrasilCloudFORUM .
 
Jak využít cloudu pro zvýšení bezpečnosti vašeho IT
Jak využít cloudu pro zvýšení bezpečnosti vašeho ITJak využít cloudu pro zvýšení bezpečnosti vašeho IT
Jak využít cloudu pro zvýšení bezpečnosti vašeho ITMarketingArrowECS_CZ
 
Web Performance Without Sacrificing Security: Featuring Forrester Guest Speaker
Web Performance Without Sacrificing Security: Featuring Forrester Guest SpeakerWeb Performance Without Sacrificing Security: Featuring Forrester Guest Speaker
Web Performance Without Sacrificing Security: Featuring Forrester Guest SpeakerCloudflare
 
What's New with ATTACK for Cloud?
What's New with ATTACK for Cloud?What's New with ATTACK for Cloud?
What's New with ATTACK for Cloud?MITRE - ATT&CKcon
 
2012 10 cloud security architecture
2012 10 cloud security architecture2012 10 cloud security architecture
2012 10 cloud security architectureVladimir Jirasek
 
BASIC CONCEPTS OF CLOUD COMPUTING
BASIC CONCEPTS OF CLOUD COMPUTINGBASIC CONCEPTS OF CLOUD COMPUTING
BASIC CONCEPTS OF CLOUD COMPUTINGpoonam rana
 
How to Select a Security Visibility Solution
How to Select a Security Visibility SolutionHow to Select a Security Visibility Solution
How to Select a Security Visibility SolutionNETSCOUT
 
Final cloud computing
Final cloud computingFinal cloud computing
Final cloud computingJuber Mangure
 
John Merline - How make your cloud SASE
John Merline - How make your cloud SASE John Merline - How make your cloud SASE
John Merline - How make your cloud SASE AWS Chicago
 
Serverless Security Workflows - cyber talks - 19th nov 2019
Serverless  Security Workflows - cyber talks - 19th nov 2019Serverless  Security Workflows - cyber talks - 19th nov 2019
Serverless Security Workflows - cyber talks - 19th nov 2019Dinis Cruz
 
Windows 10: The Unavoidable Upgrade
Windows 10: The Unavoidable UpgradeWindows 10: The Unavoidable Upgrade
Windows 10: The Unavoidable UpgradeCitrix
 
Glasswall - Safety and Integrity Through Trusted Files
Glasswall - Safety and Integrity Through Trusted FilesGlasswall - Safety and Integrity Through Trusted Files
Glasswall - Safety and Integrity Through Trusted FilesDinis Cruz
 
Enterprise Networks: No Tool Left Behind
Enterprise Networks: No Tool Left BehindEnterprise Networks: No Tool Left Behind
Enterprise Networks: No Tool Left BehindNETSCOUT
 
Modern security using graphs, automation and data science
Modern security using graphs, automation and data scienceModern security using graphs, automation and data science
Modern security using graphs, automation and data scienceDinis Cruz
 
12 Reasons #EveryoneUsesCitrix
12 Reasons #EveryoneUsesCitrix12 Reasons #EveryoneUsesCitrix
12 Reasons #EveryoneUsesCitrixCitrix
 
C-Level tools for Cloud security
C-Level tools for Cloud securityC-Level tools for Cloud security
C-Level tools for Cloud securityVladimir Jirasek
 

Tendances (20)

Arrow VMware NSX Infographic
Arrow VMware NSX Infographic Arrow VMware NSX Infographic
Arrow VMware NSX Infographic
 
Delivering Business Agility through Datacenter Automation with Citrix NetScal...
Delivering Business Agility through Datacenter Automation with Citrix NetScal...Delivering Business Agility through Datacenter Automation with Citrix NetScal...
Delivering Business Agility through Datacenter Automation with Citrix NetScal...
 
Cisco Connect 2018 Thailand - Next generation hyperconverged infrastructure-s...
Cisco Connect 2018 Thailand - Next generation hyperconverged infrastructure-s...Cisco Connect 2018 Thailand - Next generation hyperconverged infrastructure-s...
Cisco Connect 2018 Thailand - Next generation hyperconverged infrastructure-s...
 
Cloud Security: challenges and perspectives.
Cloud Security: challenges and perspectives.Cloud Security: challenges and perspectives.
Cloud Security: challenges and perspectives.
 
Jak využít cloudu pro zvýšení bezpečnosti vašeho IT
Jak využít cloudu pro zvýšení bezpečnosti vašeho ITJak využít cloudu pro zvýšení bezpečnosti vašeho IT
Jak využít cloudu pro zvýšení bezpečnosti vašeho IT
 
Web Performance Without Sacrificing Security: Featuring Forrester Guest Speaker
Web Performance Without Sacrificing Security: Featuring Forrester Guest SpeakerWeb Performance Without Sacrificing Security: Featuring Forrester Guest Speaker
Web Performance Without Sacrificing Security: Featuring Forrester Guest Speaker
 
What's New with ATTACK for Cloud?
What's New with ATTACK for Cloud?What's New with ATTACK for Cloud?
What's New with ATTACK for Cloud?
 
2012 10 cloud security architecture
2012 10 cloud security architecture2012 10 cloud security architecture
2012 10 cloud security architecture
 
BASIC CONCEPTS OF CLOUD COMPUTING
BASIC CONCEPTS OF CLOUD COMPUTINGBASIC CONCEPTS OF CLOUD COMPUTING
BASIC CONCEPTS OF CLOUD COMPUTING
 
Cloud by dev
Cloud by devCloud by dev
Cloud by dev
 
How to Select a Security Visibility Solution
How to Select a Security Visibility SolutionHow to Select a Security Visibility Solution
How to Select a Security Visibility Solution
 
Final cloud computing
Final cloud computingFinal cloud computing
Final cloud computing
 
John Merline - How make your cloud SASE
John Merline - How make your cloud SASE John Merline - How make your cloud SASE
John Merline - How make your cloud SASE
 
Serverless Security Workflows - cyber talks - 19th nov 2019
Serverless  Security Workflows - cyber talks - 19th nov 2019Serverless  Security Workflows - cyber talks - 19th nov 2019
Serverless Security Workflows - cyber talks - 19th nov 2019
 
Windows 10: The Unavoidable Upgrade
Windows 10: The Unavoidable UpgradeWindows 10: The Unavoidable Upgrade
Windows 10: The Unavoidable Upgrade
 
Glasswall - Safety and Integrity Through Trusted Files
Glasswall - Safety and Integrity Through Trusted FilesGlasswall - Safety and Integrity Through Trusted Files
Glasswall - Safety and Integrity Through Trusted Files
 
Enterprise Networks: No Tool Left Behind
Enterprise Networks: No Tool Left BehindEnterprise Networks: No Tool Left Behind
Enterprise Networks: No Tool Left Behind
 
Modern security using graphs, automation and data science
Modern security using graphs, automation and data scienceModern security using graphs, automation and data science
Modern security using graphs, automation and data science
 
12 Reasons #EveryoneUsesCitrix
12 Reasons #EveryoneUsesCitrix12 Reasons #EveryoneUsesCitrix
12 Reasons #EveryoneUsesCitrix
 
C-Level tools for Cloud security
C-Level tools for Cloud securityC-Level tools for Cloud security
C-Level tools for Cloud security
 

En vedette

Transforming Business with Citrix: Customers Share Their Stories.
Transforming Business with Citrix: Customers Share Their Stories.Transforming Business with Citrix: Customers Share Their Stories.
Transforming Business with Citrix: Customers Share Their Stories.Citrix
 
Citrix CTO Perspective: The Application Delivery Continuum
Citrix CTO Perspective: The Application Delivery ContinuumCitrix CTO Perspective: The Application Delivery Continuum
Citrix CTO Perspective: The Application Delivery ContinuumCitrix
 
SYN 208: Power HDX 3D Applications with Intel and NVIDIA GPUs.
SYN 208: Power HDX 3D Applications with Intel and NVIDIA GPUs. SYN 208: Power HDX 3D Applications with Intel and NVIDIA GPUs.
SYN 208: Power HDX 3D Applications with Intel and NVIDIA GPUs. Citrix
 
Citrix Customer Story: Franciscan Missionaries of Our Lady Health System
Citrix Customer Story: Franciscan Missionaries of Our Lady Health SystemCitrix Customer Story: Franciscan Missionaries of Our Lady Health System
Citrix Customer Story: Franciscan Missionaries of Our Lady Health SystemCitrix
 
SYN303: Receiver + StoreFront + Gateway
SYN303: Receiver + StoreFront + GatewaySYN303: Receiver + StoreFront + Gateway
SYN303: Receiver + StoreFront + GatewayCitrix
 
SYN 214: Linux Virtual Desktop Capabilities, Use Cases, Architecture, and Dep...
SYN 214: Linux Virtual Desktop Capabilities, Use Cases, Architecture, and Dep...SYN 214: Linux Virtual Desktop Capabilities, Use Cases, Architecture, and Dep...
SYN 214: Linux Virtual Desktop Capabilities, Use Cases, Architecture, and Dep...Citrix
 
„So nutzen Sie Xing & Co für Ihren Vertriebserfolg“
„So nutzen Sie Xing & Co für Ihren Vertriebserfolg“„So nutzen Sie Xing & Co für Ihren Vertriebserfolg“
„So nutzen Sie Xing & Co für Ihren Vertriebserfolg“Citrix
 
Citrix Mobile Analytics Report September 2014: Mobile subscriber data usage t...
Citrix Mobile Analytics Report September 2014: Mobile subscriber data usage t...Citrix Mobile Analytics Report September 2014: Mobile subscriber data usage t...
Citrix Mobile Analytics Report September 2014: Mobile subscriber data usage t...Citrix
 
SYN002: General Session
SYN002: General SessionSYN002: General Session
SYN002: General SessionCitrix
 
SYN 103: Learn What’s New with XenServer
SYN 103: Learn What’s New with XenServerSYN 103: Learn What’s New with XenServer
SYN 103: Learn What’s New with XenServerCitrix
 
12 Game Changing Ways to Mobilize Teaching and Learning
12 Game Changing Ways to Mobilize Teaching and Learning12 Game Changing Ways to Mobilize Teaching and Learning
12 Game Changing Ways to Mobilize Teaching and LearningCitrix
 
Perché la DISTRIBUZIONE DELLE APPLICAZIONI conta nell'economia digitale
Perché la DISTRIBUZIONE DELLE APPLICAZIONI conta nell'economia digitalePerché la DISTRIBUZIONE DELLE APPLICAZIONI conta nell'economia digitale
Perché la DISTRIBUZIONE DELLE APPLICAZIONI conta nell'economia digitaleCitrix
 
How to Build an All-Star Virtualization Team
How to Build an All-Star Virtualization TeamHow to Build an All-Star Virtualization Team
How to Build an All-Star Virtualization TeamCitrix
 
Waarom APPLICATION DELIVERY belangrijk is in de digitale economie
Waarom APPLICATION DELIVERY belangrijk is in de digitale economieWaarom APPLICATION DELIVERY belangrijk is in de digitale economie
Waarom APPLICATION DELIVERY belangrijk is in de digitale economieCitrix
 
Почему ДОСТАВКА ПРИЛОЖЕНИЙ так важна в цифровой экономике?
Почему ДОСТАВКА ПРИЛОЖЕНИЙ так важна в цифровой экономике?Почему ДОСТАВКА ПРИЛОЖЕНИЙ так важна в цифровой экономике?
Почему ДОСТАВКА ПРИЛОЖЕНИЙ так важна в цифровой экономике?Citrix
 
Pourquoi la MISE A DISPOSITION D’APPLICATIONS joue un rôle important dans l’é...
Pourquoi la MISE A DISPOSITION D’APPLICATIONS joue un rôle important dans l’é...Pourquoi la MISE A DISPOSITION D’APPLICATIONS joue un rôle important dans l’é...
Pourquoi la MISE A DISPOSITION D’APPLICATIONS joue un rôle important dans l’é...Citrix
 
15 Tips for Citrix Synergy First Timers
15 Tips for Citrix Synergy First Timers15 Tips for Citrix Synergy First Timers
15 Tips for Citrix Synergy First TimersCitrix
 

En vedette (17)

Transforming Business with Citrix: Customers Share Their Stories.
Transforming Business with Citrix: Customers Share Their Stories.Transforming Business with Citrix: Customers Share Their Stories.
Transforming Business with Citrix: Customers Share Their Stories.
 
Citrix CTO Perspective: The Application Delivery Continuum
Citrix CTO Perspective: The Application Delivery ContinuumCitrix CTO Perspective: The Application Delivery Continuum
Citrix CTO Perspective: The Application Delivery Continuum
 
SYN 208: Power HDX 3D Applications with Intel and NVIDIA GPUs.
SYN 208: Power HDX 3D Applications with Intel and NVIDIA GPUs. SYN 208: Power HDX 3D Applications with Intel and NVIDIA GPUs.
SYN 208: Power HDX 3D Applications with Intel and NVIDIA GPUs.
 
Citrix Customer Story: Franciscan Missionaries of Our Lady Health System
Citrix Customer Story: Franciscan Missionaries of Our Lady Health SystemCitrix Customer Story: Franciscan Missionaries of Our Lady Health System
Citrix Customer Story: Franciscan Missionaries of Our Lady Health System
 
SYN303: Receiver + StoreFront + Gateway
SYN303: Receiver + StoreFront + GatewaySYN303: Receiver + StoreFront + Gateway
SYN303: Receiver + StoreFront + Gateway
 
SYN 214: Linux Virtual Desktop Capabilities, Use Cases, Architecture, and Dep...
SYN 214: Linux Virtual Desktop Capabilities, Use Cases, Architecture, and Dep...SYN 214: Linux Virtual Desktop Capabilities, Use Cases, Architecture, and Dep...
SYN 214: Linux Virtual Desktop Capabilities, Use Cases, Architecture, and Dep...
 
„So nutzen Sie Xing & Co für Ihren Vertriebserfolg“
„So nutzen Sie Xing & Co für Ihren Vertriebserfolg“„So nutzen Sie Xing & Co für Ihren Vertriebserfolg“
„So nutzen Sie Xing & Co für Ihren Vertriebserfolg“
 
Citrix Mobile Analytics Report September 2014: Mobile subscriber data usage t...
Citrix Mobile Analytics Report September 2014: Mobile subscriber data usage t...Citrix Mobile Analytics Report September 2014: Mobile subscriber data usage t...
Citrix Mobile Analytics Report September 2014: Mobile subscriber data usage t...
 
SYN002: General Session
SYN002: General SessionSYN002: General Session
SYN002: General Session
 
SYN 103: Learn What’s New with XenServer
SYN 103: Learn What’s New with XenServerSYN 103: Learn What’s New with XenServer
SYN 103: Learn What’s New with XenServer
 
12 Game Changing Ways to Mobilize Teaching and Learning
12 Game Changing Ways to Mobilize Teaching and Learning12 Game Changing Ways to Mobilize Teaching and Learning
12 Game Changing Ways to Mobilize Teaching and Learning
 
Perché la DISTRIBUZIONE DELLE APPLICAZIONI conta nell'economia digitale
Perché la DISTRIBUZIONE DELLE APPLICAZIONI conta nell'economia digitalePerché la DISTRIBUZIONE DELLE APPLICAZIONI conta nell'economia digitale
Perché la DISTRIBUZIONE DELLE APPLICAZIONI conta nell'economia digitale
 
How to Build an All-Star Virtualization Team
How to Build an All-Star Virtualization TeamHow to Build an All-Star Virtualization Team
How to Build an All-Star Virtualization Team
 
Waarom APPLICATION DELIVERY belangrijk is in de digitale economie
Waarom APPLICATION DELIVERY belangrijk is in de digitale economieWaarom APPLICATION DELIVERY belangrijk is in de digitale economie
Waarom APPLICATION DELIVERY belangrijk is in de digitale economie
 
Почему ДОСТАВКА ПРИЛОЖЕНИЙ так важна в цифровой экономике?
Почему ДОСТАВКА ПРИЛОЖЕНИЙ так важна в цифровой экономике?Почему ДОСТАВКА ПРИЛОЖЕНИЙ так важна в цифровой экономике?
Почему ДОСТАВКА ПРИЛОЖЕНИЙ так важна в цифровой экономике?
 
Pourquoi la MISE A DISPOSITION D’APPLICATIONS joue un rôle important dans l’é...
Pourquoi la MISE A DISPOSITION D’APPLICATIONS joue un rôle important dans l’é...Pourquoi la MISE A DISPOSITION D’APPLICATIONS joue un rôle important dans l’é...
Pourquoi la MISE A DISPOSITION D’APPLICATIONS joue un rôle important dans l’é...
 
15 Tips for Citrix Synergy First Timers
15 Tips for Citrix Synergy First Timers15 Tips for Citrix Synergy First Timers
15 Tips for Citrix Synergy First Timers
 

Similaire à SYN 321: Securing the Published Browser

Cistera Networks Q and A
Cistera Networks Q and ACistera Networks Q and A
Cistera Networks Q and AJim Romeo
 
Enterprise Desktops Well Served - a technical perspective on virtual desktops
Enterprise Desktops Well Served - a technical perspective on virtual desktopsEnterprise Desktops Well Served - a technical perspective on virtual desktops
Enterprise Desktops Well Served - a technical perspective on virtual desktopsMolten Technologies
 
Security and Virtualization in the Data Center
Security and Virtualization in the Data CenterSecurity and Virtualization in the Data Center
Security and Virtualization in the Data CenterCisco Canada
 
Windows 7 Feature Overview It Academic Day 2009
Windows 7 Feature Overview   It Academic Day 2009Windows 7 Feature Overview   It Academic Day 2009
Windows 7 Feature Overview It Academic Day 2009Tobias Koprowski
 
Securing your Windows Network with the Microsoft Security Baselines
Securing your Windows Network with the Microsoft Security BaselinesSecuring your Windows Network with the Microsoft Security Baselines
Securing your Windows Network with the Microsoft Security BaselinesFrank Lesniak
 
Highway to heaven - Microservices Meetup Dublin
Highway to heaven - Microservices Meetup DublinHighway to heaven - Microservices Meetup Dublin
Highway to heaven - Microservices Meetup DublinChristian Deger
 
The Best of Microsoft Tech Days 2013, following the Cape Town sessions
The Best of Microsoft Tech Days 2013, following the Cape Town sessionsThe Best of Microsoft Tech Days 2013, following the Cape Town sessions
The Best of Microsoft Tech Days 2013, following the Cape Town sessionsBluegrass Digital
 
What is ThousandEyes Webinar
What is ThousandEyes WebinarWhat is ThousandEyes Webinar
What is ThousandEyes WebinarThousandEyes
 
Top 3 Reasons to Deliver Web Apps with Application Virtualization
Top 3 Reasons to Deliver Web Apps with Application VirtualizationTop 3 Reasons to Deliver Web Apps with Application Virtualization
Top 3 Reasons to Deliver Web Apps with Application VirtualizationCitrix
 
EMEA What is ThousandEyes? Webinar
EMEA What is ThousandEyes? WebinarEMEA What is ThousandEyes? Webinar
EMEA What is ThousandEyes? WebinarThousandEyes
 
Windows 7 for IT Professionals
Windows 7 for IT ProfessionalsWindows 7 for IT Professionals
Windows 7 for IT ProfessionalsRishu Mehra
 
Citrix Virtual Desktop Handbook
Citrix Virtual Desktop HandbookCitrix Virtual Desktop Handbook
Citrix Virtual Desktop HandbookNuno Alves
 
IT488_JaySexton_Week5GP
IT488_JaySexton_Week5GPIT488_JaySexton_Week5GP
IT488_JaySexton_Week5GPJay T Sexton
 
Citrix Synergy: Opening Keynote with CEO Mark Templeton
Citrix Synergy: Opening Keynote with CEO Mark TempletonCitrix Synergy: Opening Keynote with CEO Mark Templeton
Citrix Synergy: Opening Keynote with CEO Mark TempletonCitrix
 
Building Microservices in the cloud at AutoScout24
Building Microservices in the cloud at AutoScout24Building Microservices in the cloud at AutoScout24
Building Microservices in the cloud at AutoScout24Christian Deger
 
Conquering Disaster Recovery Challenges and Out-of-Control Data with the Hybr...
Conquering Disaster Recovery Challenges and Out-of-Control Data with the Hybr...Conquering Disaster Recovery Challenges and Out-of-Control Data with the Hybr...
Conquering Disaster Recovery Challenges and Out-of-Control Data with the Hybr...actualtechmedia
 
Meet the BYOD, ‘Computing Anywhere’ Challenge—Planning and License Management...
Meet the BYOD, ‘Computing Anywhere’ Challenge—Planning and License Management...Meet the BYOD, ‘Computing Anywhere’ Challenge—Planning and License Management...
Meet the BYOD, ‘Computing Anywhere’ Challenge—Planning and License Management...Flexera
 

Similaire à SYN 321: Securing the Published Browser (20)

Windows 7
Windows 7Windows 7
Windows 7
 
Cistera Networks Q and A
Cistera Networks Q and ACistera Networks Q and A
Cistera Networks Q and A
 
Enterprise Desktops Well Served - a technical perspective on virtual desktops
Enterprise Desktops Well Served - a technical perspective on virtual desktopsEnterprise Desktops Well Served - a technical perspective on virtual desktops
Enterprise Desktops Well Served - a technical perspective on virtual desktops
 
Security and Virtualization in the Data Center
Security and Virtualization in the Data CenterSecurity and Virtualization in the Data Center
Security and Virtualization in the Data Center
 
Windows 7 Feature Overview It Academic Day 2009
Windows 7 Feature Overview   It Academic Day 2009Windows 7 Feature Overview   It Academic Day 2009
Windows 7 Feature Overview It Academic Day 2009
 
Securing your Windows Network with the Microsoft Security Baselines
Securing your Windows Network with the Microsoft Security BaselinesSecuring your Windows Network with the Microsoft Security Baselines
Securing your Windows Network with the Microsoft Security Baselines
 
Highway to heaven - Microservices Meetup Dublin
Highway to heaven - Microservices Meetup DublinHighway to heaven - Microservices Meetup Dublin
Highway to heaven - Microservices Meetup Dublin
 
The Best of Microsoft Tech Days 2013, following the Cape Town sessions
The Best of Microsoft Tech Days 2013, following the Cape Town sessionsThe Best of Microsoft Tech Days 2013, following the Cape Town sessions
The Best of Microsoft Tech Days 2013, following the Cape Town sessions
 
What is ThousandEyes Webinar
What is ThousandEyes WebinarWhat is ThousandEyes Webinar
What is ThousandEyes Webinar
 
Top 3 Reasons to Deliver Web Apps with Application Virtualization
Top 3 Reasons to Deliver Web Apps with Application VirtualizationTop 3 Reasons to Deliver Web Apps with Application Virtualization
Top 3 Reasons to Deliver Web Apps with Application Virtualization
 
EMEA What is ThousandEyes? Webinar
EMEA What is ThousandEyes? WebinarEMEA What is ThousandEyes? Webinar
EMEA What is ThousandEyes? Webinar
 
Windows 7 for IT Professionals
Windows 7 for IT ProfessionalsWindows 7 for IT Professionals
Windows 7 for IT Professionals
 
Citrix Virtual Desktop Handbook
Citrix Virtual Desktop HandbookCitrix Virtual Desktop Handbook
Citrix Virtual Desktop Handbook
 
IT488_JaySexton_Week5GP
IT488_JaySexton_Week5GPIT488_JaySexton_Week5GP
IT488_JaySexton_Week5GP
 
Gajendra kumar
Gajendra kumar Gajendra kumar
Gajendra kumar
 
Understanding the Cloud
Understanding the CloudUnderstanding the Cloud
Understanding the Cloud
 
Citrix Synergy: Opening Keynote with CEO Mark Templeton
Citrix Synergy: Opening Keynote with CEO Mark TempletonCitrix Synergy: Opening Keynote with CEO Mark Templeton
Citrix Synergy: Opening Keynote with CEO Mark Templeton
 
Building Microservices in the cloud at AutoScout24
Building Microservices in the cloud at AutoScout24Building Microservices in the cloud at AutoScout24
Building Microservices in the cloud at AutoScout24
 
Conquering Disaster Recovery Challenges and Out-of-Control Data with the Hybr...
Conquering Disaster Recovery Challenges and Out-of-Control Data with the Hybr...Conquering Disaster Recovery Challenges and Out-of-Control Data with the Hybr...
Conquering Disaster Recovery Challenges and Out-of-Control Data with the Hybr...
 
Meet the BYOD, ‘Computing Anywhere’ Challenge—Planning and License Management...
Meet the BYOD, ‘Computing Anywhere’ Challenge—Planning and License Management...Meet the BYOD, ‘Computing Anywhere’ Challenge—Planning and License Management...
Meet the BYOD, ‘Computing Anywhere’ Challenge—Planning and License Management...
 

Plus de Citrix

Building The Digital Workplace
Building The Digital WorkplaceBuilding The Digital Workplace
Building The Digital WorkplaceCitrix
 
Maximize your Investment in Microsoft Office 365 with Citrix Workspace
Maximize your Investment in Microsoft Office 365 with Citrix Workspace Maximize your Investment in Microsoft Office 365 with Citrix Workspace
Maximize your Investment in Microsoft Office 365 with Citrix Workspace Citrix
 
XenApp on Google Cloud Deployment Guide
XenApp on Google Cloud Deployment GuideXenApp on Google Cloud Deployment Guide
XenApp on Google Cloud Deployment GuideCitrix
 
Deploying Citrix XenApp & XenDesktop Service on Google Cloud Platform
Deploying Citrix XenApp & XenDesktop Service on Google Cloud PlatformDeploying Citrix XenApp & XenDesktop Service on Google Cloud Platform
Deploying Citrix XenApp & XenDesktop Service on Google Cloud PlatformCitrix
 
Manage Risk by Protecting the Apps and Data That Drive Business Productivity
Manage Risk by Protecting the Apps and Data That Drive Business ProductivityManage Risk by Protecting the Apps and Data That Drive Business Productivity
Manage Risk by Protecting the Apps and Data That Drive Business ProductivityCitrix
 
How do Organizations Plan to Assure Application Delivery in a Multi-Cloud World?
How do Organizations Plan to Assure Application Delivery in a Multi-Cloud World?How do Organizations Plan to Assure Application Delivery in a Multi-Cloud World?
How do Organizations Plan to Assure Application Delivery in a Multi-Cloud World?Citrix
 
Workforce Flexibility Can Drive Greater Engagement & Productivity
Workforce Flexibility Can Drive Greater Engagement & ProductivityWorkforce Flexibility Can Drive Greater Engagement & Productivity
Workforce Flexibility Can Drive Greater Engagement & ProductivityCitrix
 
Citrix Cloud Services: Total Economic Benefits Assessment Guide
Citrix Cloud Services: Total Economic Benefits Assessment GuideCitrix Cloud Services: Total Economic Benefits Assessment Guide
Citrix Cloud Services: Total Economic Benefits Assessment GuideCitrix
 
The Growing U.S. IT Productivity Gap
The Growing U.S. IT Productivity GapThe Growing U.S. IT Productivity Gap
The Growing U.S. IT Productivity GapCitrix
 
Citrix Cloud Services: Total Economic Benefits Assessment Guide
Citrix Cloud Services: Total Economic Benefits Assessment GuideCitrix Cloud Services: Total Economic Benefits Assessment Guide
Citrix Cloud Services: Total Economic Benefits Assessment GuideCitrix
 
Citrix Synergy 2017: Technology Keynote Sketch Notes
Citrix Synergy 2017: Technology Keynote Sketch NotesCitrix Synergy 2017: Technology Keynote Sketch Notes
Citrix Synergy 2017: Technology Keynote Sketch NotesCitrix
 
Citrix Synergy 2017: Malcolm Gladwell Innovation Super Session Sketch Notes
Citrix Synergy 2017: Malcolm Gladwell Innovation Super Session Sketch NotesCitrix Synergy 2017: Malcolm Gladwell Innovation Super Session Sketch Notes
Citrix Synergy 2017: Malcolm Gladwell Innovation Super Session Sketch NotesCitrix
 
Synergy 2017: Colin Powell Innovation Super Session Sketch Notes
Synergy 2017: Colin Powell Innovation Super Session Sketch NotesSynergy 2017: Colin Powell Innovation Super Session Sketch Notes
Synergy 2017: Colin Powell Innovation Super Session Sketch NotesCitrix
 
Who Are Citrix Customers?
Who Are Citrix Customers?Who Are Citrix Customers?
Who Are Citrix Customers?Citrix
 
Manage risk by protecting apps, data and usage
Manage risk by protecting apps, data and usageManage risk by protecting apps, data and usage
Manage risk by protecting apps, data and usageCitrix
 
Enterprise Case Study: Enabling a More Mobile Way of Working
Enterprise Case Study: Enabling a More Mobile Way of Working Enterprise Case Study: Enabling a More Mobile Way of Working
Enterprise Case Study: Enabling a More Mobile Way of Working Citrix
 
Life in the Digital Workspace
Life in the Digital WorkspaceLife in the Digital Workspace
Life in the Digital WorkspaceCitrix
 
Comparing traditional workspaces to digital workspaces
Comparing traditional workspaces to digital workspacesComparing traditional workspaces to digital workspaces
Comparing traditional workspaces to digital workspacesCitrix
 
4 Ways to Ensure a Smooth Windows 10 Migration
4 Ways to Ensure a Smooth Windows 10 Migration4 Ways to Ensure a Smooth Windows 10 Migration
4 Ways to Ensure a Smooth Windows 10 MigrationCitrix
 
Citrix Paddington
Citrix PaddingtonCitrix Paddington
Citrix PaddingtonCitrix
 

Plus de Citrix (20)

Building The Digital Workplace
Building The Digital WorkplaceBuilding The Digital Workplace
Building The Digital Workplace
 
Maximize your Investment in Microsoft Office 365 with Citrix Workspace
Maximize your Investment in Microsoft Office 365 with Citrix Workspace Maximize your Investment in Microsoft Office 365 with Citrix Workspace
Maximize your Investment in Microsoft Office 365 with Citrix Workspace
 
XenApp on Google Cloud Deployment Guide
XenApp on Google Cloud Deployment GuideXenApp on Google Cloud Deployment Guide
XenApp on Google Cloud Deployment Guide
 
Deploying Citrix XenApp & XenDesktop Service on Google Cloud Platform
Deploying Citrix XenApp & XenDesktop Service on Google Cloud PlatformDeploying Citrix XenApp & XenDesktop Service on Google Cloud Platform
Deploying Citrix XenApp & XenDesktop Service on Google Cloud Platform
 
Manage Risk by Protecting the Apps and Data That Drive Business Productivity
Manage Risk by Protecting the Apps and Data That Drive Business ProductivityManage Risk by Protecting the Apps and Data That Drive Business Productivity
Manage Risk by Protecting the Apps and Data That Drive Business Productivity
 
How do Organizations Plan to Assure Application Delivery in a Multi-Cloud World?
How do Organizations Plan to Assure Application Delivery in a Multi-Cloud World?How do Organizations Plan to Assure Application Delivery in a Multi-Cloud World?
How do Organizations Plan to Assure Application Delivery in a Multi-Cloud World?
 
Workforce Flexibility Can Drive Greater Engagement & Productivity
Workforce Flexibility Can Drive Greater Engagement & ProductivityWorkforce Flexibility Can Drive Greater Engagement & Productivity
Workforce Flexibility Can Drive Greater Engagement & Productivity
 
Citrix Cloud Services: Total Economic Benefits Assessment Guide
Citrix Cloud Services: Total Economic Benefits Assessment GuideCitrix Cloud Services: Total Economic Benefits Assessment Guide
Citrix Cloud Services: Total Economic Benefits Assessment Guide
 
The Growing U.S. IT Productivity Gap
The Growing U.S. IT Productivity GapThe Growing U.S. IT Productivity Gap
The Growing U.S. IT Productivity Gap
 
Citrix Cloud Services: Total Economic Benefits Assessment Guide
Citrix Cloud Services: Total Economic Benefits Assessment GuideCitrix Cloud Services: Total Economic Benefits Assessment Guide
Citrix Cloud Services: Total Economic Benefits Assessment Guide
 
Citrix Synergy 2017: Technology Keynote Sketch Notes
Citrix Synergy 2017: Technology Keynote Sketch NotesCitrix Synergy 2017: Technology Keynote Sketch Notes
Citrix Synergy 2017: Technology Keynote Sketch Notes
 
Citrix Synergy 2017: Malcolm Gladwell Innovation Super Session Sketch Notes
Citrix Synergy 2017: Malcolm Gladwell Innovation Super Session Sketch NotesCitrix Synergy 2017: Malcolm Gladwell Innovation Super Session Sketch Notes
Citrix Synergy 2017: Malcolm Gladwell Innovation Super Session Sketch Notes
 
Synergy 2017: Colin Powell Innovation Super Session Sketch Notes
Synergy 2017: Colin Powell Innovation Super Session Sketch NotesSynergy 2017: Colin Powell Innovation Super Session Sketch Notes
Synergy 2017: Colin Powell Innovation Super Session Sketch Notes
 
Who Are Citrix Customers?
Who Are Citrix Customers?Who Are Citrix Customers?
Who Are Citrix Customers?
 
Manage risk by protecting apps, data and usage
Manage risk by protecting apps, data and usageManage risk by protecting apps, data and usage
Manage risk by protecting apps, data and usage
 
Enterprise Case Study: Enabling a More Mobile Way of Working
Enterprise Case Study: Enabling a More Mobile Way of Working Enterprise Case Study: Enabling a More Mobile Way of Working
Enterprise Case Study: Enabling a More Mobile Way of Working
 
Life in the Digital Workspace
Life in the Digital WorkspaceLife in the Digital Workspace
Life in the Digital Workspace
 
Comparing traditional workspaces to digital workspaces
Comparing traditional workspaces to digital workspacesComparing traditional workspaces to digital workspaces
Comparing traditional workspaces to digital workspaces
 
4 Ways to Ensure a Smooth Windows 10 Migration
4 Ways to Ensure a Smooth Windows 10 Migration4 Ways to Ensure a Smooth Windows 10 Migration
4 Ways to Ensure a Smooth Windows 10 Migration
 
Citrix Paddington
Citrix PaddingtonCitrix Paddington
Citrix Paddington
 

Dernier

Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 

Dernier (20)

Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 

SYN 321: Securing the Published Browser

  • 1. 1 © 2016 Citrix Session Number/Session Title: SYN321: Securing the published browser Session Description: Browsers are the most common published application in virtualized environments—and also the most exposed to security issues, as they’ve historically been one of the most vulnerable pieces of software on any end point. The security concerns with browsers are legendary and involve complex settings, third-party plugins, active content, Flash, JAVA and other components that must be kept under strict control. XenApp and XenDesktop provide unique methods to fine-tune browser security and protect sensitive data across web applications, compliance environments, administrative portals, email and the cloud. Join this session for a discussion of “when bad things happen to good browsers” including demos of common security problems and their solutions. In this session, you will learn: • How to lock down browsers at the end point for accessing both virtualized and web environments • Guidance for hardening published browsers, including group policy and PowerShell configuration of security policies • How to tune browser components to be application-specific and further minimize the attack surface
  • 2. 2 © 2016 Citrix Session Date-Time/Location: 5/24/2016, 2:00 p.m. – 3:30 p.m. / Murano 3304 Session Track: Desktop & App Delivery, Security Session Level: Technical - Advanced Session Owner: Calvin Hsu (Contact with any questions regarding session content and direction) Image source: http://www.bing.com/images/search?q=browser&view=detailv2&qft=+filterui%3alicense- L2_L3&id=E6F8E72F843D7D4187ED4FDBB88C61EB4DDF034A&selectedIndex=1&ccid=b%2bj OseF4&simid=608051161184536293&thid=OIP.M6fe8ceb1e178b94805643ce78575472do0& ajaxhist=0 (License selected: Free to modify, share and use commercially)
  • 3. 3 © 2016 Citrix @JHNord @CitrixSecurity @atofunk
  • 4. 4 © 2016 Citrix
  • 5. 5 © 2016 Citrix Source: https://cis.citrix.com/insights/#/product-insights/xenapp-and-xendesktop
  • 6. 6 © 2016 Citrix [Kurt]
  • 7. 7 © 2016 Citrix [Kurt] • We’re addressing local browsers for access to virtualization resources, as well as datacenter and cloud-hosted browsers. Reverse seamless??? • The guidance provided is appropriate for corporate, home and third-parties • Plugins include Flash player, Silverlight, JAVA, Acrobat, etc. • The goal is a “browser enclave”, where a problem with the browser/content is contained • Througout this conversation, we will be discussing the tradeoffs between security and functionality, along with those between anonymity and auditing. • Introducing the Securing the Published Browser Whitepaper
  • 8. 8 © 2016 Citrix Eric Beiers is a solution architect that works with the largest enterprises of Canada to help develop and realize their virtualization, cloud and networking strategies and vision. Eric was the previous technical lead of Citrix Consulting Canada, as the Enterprise Architect for the country where he architected many large global deployments of Citrix, with high security kept at top of mind. Joseph Nord is Security Product Manager for Citrix where he authors the XenApp and XenDesktop product requirements for security and authentication features and manages the completion of certifications and compliance including Common Criteria, FIPS, PCI and HIPAA. Joe works with customers, partners and Citrix sales teams to help customers achieve their security goals. As Chief Security Strategist for Citrix, Kurt Roemer leads security, compliance, risk and privacy strategies for Citrix products. As a member of the Citrix CTO and Strategy Office, Roemer drives ideation, innovation and technical direction for products and solutions that advance business productivity while ensuring information governance. An information services veteran with more than 30 years experience, his credentials include the Certified Information Systems Security Professional (CISSP) designation. He also served as Commissioner for the US public-sector CLOUD2 initiative and led efforts to develop the PCI Security Standards Council Virtualization Guidance Information Supplement while serving on the Board of Advisors.
  • 9. 9 © 2016 Citrix [Kurt, Joe, Eric] Image Source: http://atom.smasher.org/vegas/?l1=Tonight+Only%21&l2=Eric%2C+Joe+and+Kurt&l3=&l4=Ju st+Browsing
  • 10. 10 © 2016 Citrix [Eric] DEMO (1) Corporate site, going to the bad place on the network + secure browser - Why should we care? Show an example of launching a webpage from a local computer No restrictions, all wide open, user can go to the bad places on the Internet and accept the warnings Not centrally managed, and no technical policy to enforce corporate policy Launch a secure browser site, show the idea that if you have a current generation browser, you can launch a browser, from within another browser
  • 11. 11 © 2016 Citrix
  • 12. 12 © 2016 Citrix
  • 13. 13 © 2016 Citrix
  • 14. 14 © 2016 Citrix [Joe, Kurt] Image Source: http://www.bing.com/images/search?q=scared&view=detailv2&qft=+filterui%3alicense- L2_L3&id=5EDE5975BAE94FA5D3220CE607E8E2A89B00108B&selectedIndex=15&ccid=%2b4 zu3HEl&simid=608021049168429905&thid=OIP.Mfb8ceedc7125e5beeb3003b20b442c4fo0& ajaxhist=0 (License selected: Free to modify, share and use commercially)
  • 15. 15 © 2016 Citrix • Integrated browsers, installable browsers, browser appliances • Local browser access with URL redirection. Remote PC. • Persistent and non-persistent Image Source: http://www.amazon.com/HP-Chromebook-14-Celeron-14- inch/dp/B0172GUW4I/ref=sr_1_7?s=pc&ie=UTF8&qid=1463513119&sr=1- 7&keywords=hp+chromebook
  • 16. 16 © 2016 Citrix [Joe, Kurt] Value of running hosted, things to lock down, ability to restrict clipboard (one-way) and format limiting, turn off client drive mapping, printing…everything you don’t need Trash Can – disposable browser Goal is a desired state that’s reproducable through configuration Can use PowerShell to validate chrome://policy/ Chromebook TLS 1.2
  • 17. 17 © 2016 Citrix Image Source: http://www.bing.com/images/search?q=browser+security&view=detailv2&qft=+filterui%3alic ense- L2_L3&id=BE5DEFEF0C048783BA227F05923AD344BDDD79E2&selectedIndex=41&ccid=AuIvj mdB&simid=608044065901576378&thid=OIP.M02e22f8e6741ea58c447277ba237d4eco0&aj axhist=0 (License selected: Free to modify, share and use commercially)
  • 18. 18 © 2016 Citrix [MZ] This is a big deal. Do you want to force all your users to use legacy version of browser just because you have one application that requires it? Wouldn’t it be nice if you could choose which browser you want to use with each of the critical applications?
  • 19. 19 © 2016 Citrix [MZ] This is a big deal. Do you want to force all your users to use legacy version of browser just because you have one application that requires it? Wouldn’t it be nice if you could choose which browser you want to use with each of the critical applications?
  • 20. 20 © 2016 Citrix Level 1, 2 Green, Yellow, Red [high-level data sensitivity classification] Sensitive apps Options PCI Enterprise mode – compatibility setting in IE11 (configure for IE8 compatibility) Lockdown vs. relaxation
  • 21. 21 © 2016 Citrix Tradeoffs? Forbes Turn off address bar Enterprise mode – compatibility setting in IE11 (configure for IE8 compatibility) Be aware of site-specific policies, such as preference for HTML5 over Flash Persistence Redirects Whitelisting and blacklisting? (domains, plugins, active content)
  • 22. 22 © 2016 Citrix DEMO - Build and harden the OS (2) Building the OS image (powershell creation) + How to add applications (powershell/vbs/mcs) - We need to build and harden the OS Explain the idea of consistency of images, and you need some way to automate, since if you do this a few times by hand, it will never be the same Want to build the system by installing certain services, disabling some services, Demonstrate installing applications using powershell Explain the idea of converting the image to a gold image for use in MCS or PVS, and having a non-persistent image allows us to reboot, and go back to a known clean state (no demo, just console?)
  • 23. 23 © 2016 Citrix
  • 24. 24 © 2016 Citrix
  • 25. 25 © 2016 Citrix Image source: http://www.bing.com/images/search?q=under+construction&view=detailv2&qft=+filterui%3 alicense- L2_L3&id=05B56A181A55837CEDFD8E8E4F905E62CC877603&selectedIndex=9&ccid=3e6v8Z qr&simid=608034458058622883&thid=OIP.Mddeeaff19aab382d52bbea2fb0ac844bo0&ajaxh ist=0 (License selected: Free to modify, share and use commercially)
  • 26. 26 © 2016 Citrix
  • 27. 27 © 2016 Citrix (3) How to configure/lock down browser (GPO/GUI) - We need to configure and harden the browser (part 1) Review of the GUI of the browser, talk through some of the key settings Show how to configure IE11, using group policy Show how to install an ADMX template (or skip but explain), and then use that template to configure Chrome and Firefox (4 or merge with 3) Enterprise Mode/trusted sites configuraiton/proxy configuration - We need to configure and harden the browser (part 2) When configuring a browser, certain sites might require compatibility viewing, or a lessened security posture. Demonstrate using GPOs to configure the trusted sites configuration Demonstrate configuration of the proxy (several ways to do this, GUI/GPO/PowerShell/WPAD (choose one) Demonstrate creating an enterprise mode list in XML (https://technet.microsoft.com/en- us/itpro/internet-explorer/ie11-deploy-guide/add-multiple-sites-to-enterprise-mode-site-list- using-the-version-1-schema-and-enterprise-mode-tool, https://technet.microsoft.com/en-us/itpro/internet-explorer/ie11-deploy-guide/turn-on- enterprise-mode-and-use-a-site-list)
  • 28. 28 © 2016 Citrix [Joe, Kurt]
  • 29. 29 © 2016 Citrix
  • 30. 30 © 2016 Citrix
  • 31. 31 © 2016 Citrix
  • 32. 32 © 2016 Citrix
  • 33. 33 © 2016 Citrix
  • 34. 34 © 2016 Citrix
  • 35. 35 © 2016 Citrix
  • 36. 36 © 2016 Citrix
  • 37. 37 © 2016 Citrix
  • 38. 38 © 2016 Citrix
  • 39. 39 © 2016 Citrix
  • 40. 40 © 2016 Citrix
  • 41. 41 © 2016 Citrix
  • 42. 42 © 2016 Citrix
  • 43. 43 © 2016 Citrix Storefront, workflow, tab for each browser… Colors 3 different Chrome, 3 different background colors Use cases – protection of cloud-based apps DEMO (5) Launch and customize applications (Colours, switches, vbs wrapper) IE8/9/10/Chrome - We need to tailor the requirements for the usage scenario Customize a launch of a browser by providing a URL Customize a launch of a browser by providing additional parameters (kiosk mode, incognito, disable features) Customize the appearance of a browser (Red/Blue/Green) Customize the browser using a .vbs script wrapper, to disable specific controls (6) Secure Enclave (proxy/av/ids/ips) - We control the placement now! We need to harden the Network Demonstrate a restricted browser, getting blocked going to a site (current lab has NS/IDS/IPS/Firewall/AntiVirus/Proxy/DNS&IP reputation lists) --- I'm not really sure if showing these other components helps, but I like this demo, since you can put an ad blocker at the network level, instead of the application level (defence in depth)
  • 44. 44 © 2016 Citrix Q&A
  • 45. 45 © 2016 Citrix References: Citrix Security and Compliance • http://www.citrix.com/security Citrix Common Criteria Resources • http://www.citrix.com/about/legal/security-compliance/common-criteria.html NetScaler Security Best Practices: Secure Deployment Guide for NetScaler MPX, VPX, and SDX Appliances • http://support.citrix.com/article/CTX129514 Payment Card Industry (PCI) and Citrix XenApp and XenDesktop Deployment Scenarios • http://www.citrix.com/content/dam/citrix/en_us/documents/support/payment-card-industry- and-citrix-xenapp-and-xendesktop-deployment-scenarios.pdf Citrix solutions for Healthcare and Compliance • https://www.citrix.com/content/dam/citrix/en_us/documents/products-solutions/citrix-solutions- for-healthcare-and-hipaa-compliance.pdf Citrix XenApp and XenDesktop FIPS 140-2 Sample Deployments • https://www.citrix.com/content/dam/citrix/en_us/documents/about/citrix-xenapp-and- xendesktop-76-fips-140-2-sample-deployments.pdf
  • 46. 46 © 2016 Citrix
  • 47. 47 © 2016 Citrix You might be wondering how much we know about your experience with our products, and what we’re doing to improve product quality and make your experience better. Our product supportability efforts are the result of paying attention to the issues and concerns you raise when engaging with our Support teams as well as the feedback you provide to our Sales and Consulting groups. The details you see here speak to some of the work we’ve done already, and where we’re currently focused. For more details on supportability efforts, visit: www.citrix.com/supportability
  • 48. 48 © 2016 Citrix
  • 49. 49 © 2016 Citrix