IGEL announced new innovations with Citrix, a business unit of Cloud Software Group, which enhance the security and digital work experiences of their mutual customers.
IGEL announced that the IGEL OS will be among the first Linux OSs to deliver support for Citrix® Enterprise Browser, which works in concert with Citrix® Secure Private Access to provide zero trust access across virtual, web, and SaaS applications from a unified platform with common policies and observability. Citrix also announced planned Linux support with Citrix uberAgent®, which IGEL plans to support upon availability, enabling comprehensive endpoint monitoring of their devices.
Through collaborative development and innovation via the IGEL Ready and Citrix Ready™ partner programs, IGEL is delivering support for the following Citrix solutions:
- Citrix Enterprise Browser. Building on IGEL's exclusive Preventative Security Model™ which secures endpoints by design to reduce ransomware risk and support zero trust initiatives, the IGEL OS support for Citrix Enterprise Browser helps users stay productive while mitigating insider and external threats. The locally installed browser accelerates a zero trust strategy with dynamic context awareness and ensures simple, secure VPN-less access from anywhere.
- Citrix Secure Private Access. For organizations that want to keep apps secure and hybrid workforces productive, IGEL has released support for Citrix Secure Private Access. Delivering adaptive access to all IT-sanctioned apps – web, SaaS, and client-server – whether deployed on-premises or in the cloud, Citrix Secure Private Access prevents unauthorized access and eliminates threats from any IGEL OS-powered device. The Citrix Secure Private Access agent for IGEL OS is available now.
- Citrix uberAgent. To improve user experience, the new Citrix uberAgent monitoring agent will deliver rich metrics for IGEL OS clients. Integrated with Splunk Enterprise, Splunk Cloud, and other similar systems, uberAgent offers a variety of use case dashboards for threat detection and enhanced security. IGEL OS is expected to be among the first Linux OSs to support Citrix uberAgent when available.
"IGEL and Citrix are committed to delivering the collaborative innovations that secure and revolutionize how people work," said Jim Airdo, SVP of strategic alliances, IGEL. "Our longstanding partnership, from the development lab to the field, delivers, time and again, the new capabilities our joint customers need to elevate and secure the end user computing experience. We are pleased to once again deliver industry-first innovations for Citrix users, underscoring the depth of our partnership."
The Latest
A recent Rocket Software and Foundry study found that just 28% of organizations fully leverage their mainframe data, a concerning statistic given its critical role in powering AI models, predictive analytics, and informed decision-making ...
What kind of ROI is your organization seeing on its technology investments? If your answer is "it's complicated," you're not alone. According to a recent study conducted by Apptio ... there is a disconnect between enterprise technology spending and organizations' ability to measure the results ...
In today’s data and AI driven world, enterprises across industries are utilizing AI to invent new business models, reimagine business and achieve efficiency in operations. However, enterprises may face challenges like flawed or biased AI decisions, sensitive data breaches and rising regulatory risks ...
In MEAN TIME TO INSIGHT Episode 12, Shamus McGillicuddy, VP of Research, Network Infrastructure and Operations, at EMA discusses purchasing new network observability solutions....
There's an image problem with mobile app security. While it's critical for highly regulated industries like financial services, it is often overlooked in others. This usually comes down to development priorities, which typically fall into three categories: user experience, app performance, and app security. When dealing with finite resources such as time, shifting priorities, and team skill sets, engineering teams often have to prioritize one over the others. Usually, security is the odd man out ...

IT outages, caused by poor-quality software updates, are no longer rare incidents but rather frequent occurrences, directly impacting over half of US consumers. According to the 2024 Software Failure Sentiment Report from Harness, many now equate these failures to critical public health crises ...
In just a few months, Google will again head to Washington DC and meet with the government for a two-week remedy trial to cement the fate of what happens to Chrome and its search business in the face of ongoing antitrust court case(s). Or, Google may proactively decide to make changes, putting the power in its hands to outline a suitable remedy. Regardless of the outcome, one thing is sure: there will be far more implications for AI than just a shift in Google's Search business ...

In today's fast-paced digital world, Application Performance Monitoring (APM) is crucial for maintaining the health of an organization's digital ecosystem. However, the complexities of modern IT environments, including distributed architectures, hybrid clouds, and dynamic workloads, present significant challenges ... This blog explores the challenges of implementing application performance monitoring (APM) and offers strategies for overcoming them ...
Service disruptions remain a critical concern for IT and business executives, with 88% of respondents saying they believe another major incident will occur in the next 12 months, according to a study from PagerDuty ...
IT infrastructure (on-premises, cloud, or hybrid) is becoming larger and more complex. IT management tools need data to drive better decision making and more process automation to complement manual intervention by IT staff. That is why smart organizations invest in the systems and strategies needed to make their IT infrastructure more resilient in the event of disruption, and why many are turning to application performance monitoring (APM) in conjunction with high availability (HA) clusters ...