Gemalto Adds Strong ID to Citrix Access Gateway

Gemalto adds strong identity protection to Citrix Access Gateway

Dark Reading Staff, Dark Reading

December 11, 2007

1 Min Read
Dark Reading logo in a gray background | Dark Reading

AUSTIN, Texas -- Gemalto, the world leader in digital security, today announced its strong authentication platform is verified as Citrix Ready™ for use with the Citrix Access Gateway™ line of SSL VPN appliances, including its Standard, Advanced and Enterprise editions. The Gemalto platform—which includes an authentication server and a family of convenient, personal, portable security devices—addresses the security risks of static passwords by adding two-factor identity protection to Citrix Access Gateway, a key component in the Citrix application delivery infrastructure.

The strong authentication platform is available through Protiva™, Gemalto’s packaged, end-to-end secure network identity solution that is optimized for easy deployment in organizations of all sizes and offered through Gemalto’s channel partners. It supports a range of two-factor devices and authentication technologies, including one time password (OTP) based on the OATH standard and Gemalto .NET technology for certificate-based authentication.

Citrix and Gemalto have collaborated to ensure that Protiva solutions easily integrate with Citrix Access Gateway to add multi-factor user authentication for users who require secure application access to IT applications and resources.

“As a packaged solution, Protiva provides organizations with a convenient way to add an additional level of identity protection to Citrix Access Gateway,” said Jerome Denis, Gemalto’s global marketing director for identity and access management. “It strongly protects access at both the client and the server while preserving the full capabilities of the Citrix application delivery infrastructure.”

Citrix Systems Inc. (Nasdaq: CTXS)

Gemalto

About the Author

Dark Reading Staff

Dark Reading

Dark Reading is a leading cybersecurity media site.

Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.

You May Also Like


More Insights