Citrix Workspace Features
Authentication Options (6)
Authentication User experience
Based on 23 Citrix Workspace reviews. Process of providing credentials and logging into multiple systems is easy and intuitive for users
Supports Required Authentication systems
Based on 23 Citrix Workspace reviews. Supports required 3rd party Authentication Technologies. Example systems: bioMetric, passwords, key cards, token based systems, etc.
Multi-Factor Authentication
As reported in 22 Citrix Workspace reviews. Provides support for Multi-Factor authentication, so users are required to provide multiple factors to authenticate. For example, something they know, Something they have or something they are.
Supports Required Authentication Methods/Protocols
As reported in 21 Citrix Workspace reviews. Support SSO via Web agents, proxy agents, agent-less, SAML or oAuth and WS-Federation authentication and authorization Web services depending upon the application and business use case
Federation/SAML support (idp)
Can serve as the identity provider to external service providers so that when the user logs into a service, instead of providing credentials to the service provider, the service provider trusts the identity provider to validate the credentials. This feature was mentioned in 20 Citrix Workspace reviews.
Federation/SAML support (sp)
Can serve as the Service provider from an external service so that when the user logs in externally they have seamless SSO to internal applications from a service provider. 19 reviewers of Citrix Workspace have provided feedback on this feature.
Access Control Types (5)
Endpoint access
Based on 22 Citrix Workspace reviews. Provides ability to control access to PC's, Mobile devices, and other endpoint devices.
Local Access
Controls access to legacy applications, web based applications, network resources and servers while employees are on the companies local area network. 21 reviewers of Citrix Workspace have provided feedback on this feature.
Remote Access
Controls access to legacy applications, web based applications, networks resources while employees are outside the local area network. This feature was mentioned in 23 Citrix Workspace reviews.
Partner Access
As reported in 19 Citrix Workspace reviews. Controls access to users that are not company employees that are either within the companies local area network or outside the network
Supports BYOD users
Based on 21 Citrix Workspace reviews. Enables users to use their own device to access company applications.
Administration (8)
Ease of installation on server
Installation process is easy and flexible. 21 reviewers of Citrix Workspace have provided feedback on this feature.
Password Policy Enforcement
As reported in 20 Citrix Workspace reviews. Options for resetting and enforcing password policies
Administration Console
Provides Administration tools/console that are easy to use and learn for routine maintenance tasks 21 reviewers of Citrix Workspace have provided feedback on this feature.
Ease of connecting applications
Easily provisions new systems, platforms or applications using configuration and not customization. 22 reviewers of Citrix Workspace have provided feedback on this feature.
Self Service Password Administration
Based on 21 Citrix Workspace reviews. Users can set, change passwords without interaction from IT staff
Network Segmentation
Allows administrative control over network components, mapping, and segmentation.
Scalability
Provides features to allow scaling for large organizations and user bases.
Global Access
Extends SDP network access to users regardless of their physical location.
Platform (7)
Multiple Operating system support
Supports Endpoint access control to multiple operating systems This feature was mentioned in 21 Citrix Workspace reviews.
Multi-Domain Support
Allows user authentication to be honored by all the hosts in two or more domains This feature was mentioned in 17 Citrix Workspace reviews.
Cross Browser support
Support access to browser based applications across required browser types 19 reviewers of Citrix Workspace have provided feedback on this feature.
Fail over protection
Based on 19 Citrix Workspace reviews. Provides required failover mechanisms to ensure if one server, network, etc fails users are still able able to authenticate
Reporting
Contains pre-built and custom reporting tools to required to manage business 19 reviewers of Citrix Workspace have provided feedback on this feature.
Auditing
Based on 19 Citrix Workspace reviews. Provides mechanism for auditing authentication for trouble shooting purposes.
Third Party Web Services support
Can call and pass credentials to third party web services. 18 reviewers of Citrix Workspace have provided feedback on this feature.
Network Management (4)
Network Segmentation
Allows administrative control over network components, mapping, and segmentation.
Network Mapping
Allows visual display of networks segmented components and their connected resources.
Security Analytics
Utilizes behavioral analysis to improve security procedures and documentation.
API/Integrations
Application Programming Interface - Specification for how the application communicates with other software. API's typically enable integration of data, logic, objects, etc. with other software applications.
Security (8)
Security Automation
Allows administrative control over automated security tasks. 10 reviewers of Citrix Workspace have provided feedback on this feature.
Application Security
As reported in 11 Citrix Workspace reviews. Protects application access and data. Prompts additional authentication for suspicious users.
Workload Protection
Protects computing resources across a network. Prompts additional authentication for suspicious users. This feature was mentioned in 10 Citrix Workspace reviews.
Data Protection
Protects informatin stored on premises and in the cloud. Prompts additional authentication for suspicious users. 10 reviewers of Citrix Workspace have provided feedback on this feature.
Governance
Allows users to create, edit, and relinquish user access privileges. 15 reviewers of Citrix Workspace have provided feedback on this feature.
Data loss Prevention
Stores data securely either on premise or in an adjacent cloud database to prevent loss of data at rest. 15 reviewers of Citrix Workspace have provided feedback on this feature.
Data Encryption/Security
As reported in 15 Citrix Workspace reviews. Manages policies for user data access and data encryption.
Access Control
Supports LDAP Protocol to enable access control and governance. This feature was mentioned in 16 Citrix Workspace reviews.
Identity Management (3)
Adaptive Access Control
Provides a risk-based approcach to determining trust within the network. This feature was mentioned in 10 Citrix Workspace reviews.
Identity Scoring
Calculates risk based on user behavior, permissions, and requests. 10 reviewers of Citrix Workspace have provided feedback on this feature.
User Monitoring
As reported in 10 Citrix Workspace reviews. Monitors users attempting unauthorized access to databases, applicaitons, and othe network components.
Analysis (3)
User Analytics
Allows for reporting and documentation of individual user behavior and privileges. 15 reviewers of Citrix Workspace have provided feedback on this feature.
Cloud Gap Analytics
As reported in 14 Citrix Workspace reviews. Analyzes data associated with denied entries and policy enforcement, giving information of better authentication and security protocols.
Anomoly Detection
Monitors acivity related to user behavior and compares activity to benchmarked patterns. 14 reviewers of Citrix Workspace have provided feedback on this feature.
Functionality (3)
SSO
Based on 15 Citrix Workspace reviews. Provides a single access point for users to access multiple cloud products without multiple logins.
Cloud Registry
Details SaaS products the cloud security product can integrate with and provide security for. This feature was mentioned in 15 Citrix Workspace reviews.
Mobile Device Mangement
Offers the ability to set standards for types of mobile devices and networks capable of accessing data. This feature was mentioned in 15 Citrix Workspace reviews.
Protection (4)
Policy Enforcement
Allows administrators to set policies for security and governance.
Security Audit
Allows for deep examination into network-connected devices, policies, and protocols.
Access Control
Supports LDAP Protocol to enable access control and governance.
User Authentication
Authenticates users prior to granting access to networks, applciations, and systems.
Monitoring (4)
Compliance Monitoring
Monitors data and compliance requirements. Sends alerts based on violations or misuse.
Vulnerability Monitoring
Monitors networks, applications, and systems to identify misconfigurations and access points that can be easily compromised.
Configuration Monitoring
Monitors configuration rule sets and policy enforcement measures and document changes to maintain compliance.
Observability
Generate insights across IT systems utilizing event metrics, logging, traces, and metadata.
Generative AI (2)
AI Text Summarization
Condenses long documents or text into a brief summary.
AI Text Generation
Allows users to generate text based on a text prompt.
You’re seeing this ad based on the product’s relevance to this page. Sponsored content does not receive preferential treatment in any of G2’s ratings.


