Citrix, a business unit of Cloud Software Group, announced the strategic acquisitions of deviceTRUST and Strong Network.
The transactions are expected to help it expand the security capabilities of the Citrix platform, enabling it to isolate and protect access to mission-critical applications that are deployed across on-premise and cloud-based environments while providing cloud development environment access for developers. With these additions, Citrix can empower companies to streamline zero-trust access to meet diverse user needs in hybrid application deployments, while reducing the data loss risk.
“As businesses continue to evolve to support hybrid work, the demand for cyber resilience has only intensified,” said Sridhar Mullapudi, EVP and GM, Citrix. “We are proud to welcome the deviceTRUST and Strong Network teams to the Citrix family. By integrating their secure access technologies into the Citrix platform, we’re providing greater value for our customers and helping them meet the diverse needs of their users.”
deviceTRUST technology introduces a new layer of control, enabling real-time contextual access for VDI and DaaS environments. This capability allows organizations to monitor and respond to changes in device posture and user location, strengthening data security, managing application access, and reducing endpoint risk. By continuously assessing device attestation, the Citrix platform enables IT leaders to grant or revoke access based on real-time security conditions, offering organizations greater control over their network access.
The Strong Network platform’s secure cloud development environments help businesses build, launch and access mission-critical applications more efficiently and cost-effectively. Strong Network protects against data breaches with features such as data loss prevention and patented data infiltration detection, which guard against phishing, malware and credential theft. Designed for BYOD setups, the Strong Network platform’s secure cloud development environments also ensure compliance with security standards such as NIST and ISO, while providing clear visibility and control throughout the application lifecycle.