Page 27 - CCAP-PP-2 (SLTN) - Training Cloud Journey from On-Premise to Cloud with Citrix (focus on Citrix Workspace Services, XenApp Services and XenDesktop Services
P. 27

Citrix Analytics








      Services Options


      • Citrix Analytics






      Common Use Cases Addressed

                                                                                                              Unique advantages as a Service (vs. on-prem)


                      Analytics
      •    Track & model individual User                Data Security Analytics
           behaviors across enterprise                  •   Prevent internal threats & data
      •    Prevent internal threats & data                  exfiltration attacks                         Citrix Analytics aggregates and correlates data from across Citrix
           exfiltration attacks                                                                          products and applies artificial intelligence (AI) and machine
                                                                                                         learning (ML) algorithms to provide deeper insights and predictive
                                                                                                         capabilities with autonomous response




                                                                                                         Uniquely, Citrix has multiple vantage points across users,
                                                        Performance & Operations
        Application Security Analytics                  Analytics                                        endpoints, network traffic, and files to detect threats, enhance
      •    Protect Applications from                        Application Performance                      application performance and improve operations
           external attacks                             •   Anomaly Detection
      •    Suggest mitigation steps to                  •   App, Network & Infrastructure
           enhance security
                                                            Usage Analytics





       © 2016 Engage ESM All Rights Reserved                                                                                                                                            27
   22   23   24   25   26   27   28   29   30   31   32