Protectimus’ 2FA Solution Compatible with Citrix NetScaler Gateway

Protectimus 2FA is Citrix NetScaler Gateway ReadyThe Protectimus Solutions LLP team is happy to announce that our two-factor authentication solution has been successfully integrated with Citrix NetScaler Gateway and that Protectimus has been certified as a Citrix Ready Partner.

The Citrix Ready program exists to verify the compatibility of third-party software solutions with Citrix products. This allows users of Citrix to be confident in the reliability and compatibility of third-party software solutions with their existing systems.

Protectimus’ two-factor authentication solution has demonstrated its compatibility with Citrix NetScaler Gateway 10.1, NetScaler Gateway 10.5, and NetScaler Gateway 11.0. Citrix Access Gateway is a program used for secure remote connection to key applications and data, and for detailed control of these applications.

More often than not, software like this is used in large enterprises with many employees and, sometimes, numerous affiliates. Such companies store large sets of data, such as documentation, important corporate documents, and users’ personal information. Thus, they require hardened security systems.

One crucial element of an advanced and reliable data protection system is two-factor authentication. Protectimus is an expert in this area, offering complex 2FA solution available as both a cloud service and a stand-alone platform, as well as the ability to implement custom solutions at clients’ demand. Protectimus can generate one-time passwords using software or hardware tokens, as well as by distribution through SMS or e-mail. We offer physical tokens working on the TOTP and OCRA algorithms, and also reprogrammable TOTP NFC-compatible tokens.

Protectimus offers its clients additional functionality that may be of interest: data signing or CWYS (Confirm What You See), temporal and geographical filters, and intelligent identification. These possibilities enable us to reach a high level of reliability and protect our clients’ systems from most of today’s known threats – phishing, Trojan viruses and other malware, data breaches, and “man in the middle” attacks.

Subscribe To Our Newsletter

Join our mailing list to receive the latest news and updates from our team.

You have Successfully Subscribed!

Author: Anna

If you have any questions about two-factor authentication and Protectimus products, ask Anna, and you will get an expert answer. She knows everything about one-time passwords, OTP tokens, 2FA applications, OATH algorithms, how two-factor authentication works, and what it protects against. Anna will explain the difference between TOTP, HOTP, and OCRA, help you choose a token for Azure MFA, and tell you how to set up two-factor authentication for Windows or Active Directory. Over the years with Protectimus, Anna has become an expert in cybersecurity and knows all about the Protectimus 2FA solution, so she will advise on any issue. Please, ask your questions in the comments.

Share This Post On

Submit a Comment

Your email address will not be published. Required fields are marked *

Subscribe To Our Newsletter

Subscribe To Our Newsletter

Join our mailing list to receive the latest news and updates from Protectimus blog.

You have successfully subscribed!

Share This