Best Software for 2025 is now live!
Save to My Lists
Claimed
Claimed

Citrix Workspace Features

What are the features of Citrix Workspace?

Authentication Options

  • Authentication User experience
  • Supports Required Authentication systems
  • Multi-Factor Authentication
  • Supports Required Authentication Methods/Protocols
  • Federation/SAML support (idp)

Access Control Types

  • Endpoint access
  • Local Access
  • Remote Access
  • Supports BYOD users

Administration

  • Ease of installation on server
  • Password Policy Enforcement
  • Administration Console
  • Ease of connecting applications
  • Self Service Password Administration

Platform

  • Multiple Operating system support

Top Rated Citrix Workspace Alternatives

Filter for Features

Authentication Options

Authentication User experience

As reported in 23 Citrix Workspace reviews. Process of providing credentials and logging into multiple systems is easy and intuitive for users
90%
(Based on 23 reviews)

Supports Required Authentication systems

Supports required 3rd party Authentication Technologies. Example systems: bioMetric, passwords, key cards, token based systems, etc. This feature was mentioned in 23 Citrix Workspace reviews.
88%
(Based on 23 reviews)

Multi-Factor Authentication

As reported in 22 Citrix Workspace reviews. Provides support for Multi-Factor authentication, so users are required to provide multiple factors to authenticate. For example, something they know, Something they have or something they are.
88%
(Based on 22 reviews)

Supports Required Authentication Methods/Protocols

Support SSO via Web agents, proxy agents, agent-less, SAML or oAuth and WS-Federation authentication and authorization Web services depending upon the application and business use case 21 reviewers of Citrix Workspace have provided feedback on this feature.
87%
(Based on 21 reviews)

Federation/SAML support (idp)

Based on 20 Citrix Workspace reviews. Can serve as the identity provider to external service providers so that when the user logs into a service, instead of providing credentials to the service provider, the service provider trusts the identity provider to validate the credentials.
87%
(Based on 20 reviews)

Federation/SAML support (sp)

As reported in 19 Citrix Workspace reviews. Can serve as the Service provider from an external service so that when the user logs in externally they have seamless SSO to internal applications from a service provider.
87%
(Based on 19 reviews)

Access Control Types

Endpoint access

Provides ability to control access to PC's, Mobile devices, and other endpoint devices. 22 reviewers of Citrix Workspace have provided feedback on this feature.
91%
(Based on 22 reviews)

Local Access

Controls access to legacy applications, web based applications, network resources and servers while employees are on the companies local area network. 21 reviewers of Citrix Workspace have provided feedback on this feature.
92%
(Based on 21 reviews)

Remote Access

Controls access to legacy applications, web based applications, networks resources while employees are outside the local area network. This feature was mentioned in 23 Citrix Workspace reviews.
93%
(Based on 23 reviews)

Partner Access

Based on 19 Citrix Workspace reviews. Controls access to users that are not company employees that are either within the companies local area network or outside the network
87%
(Based on 19 reviews)

Supports BYOD users

As reported in 21 Citrix Workspace reviews. Enables users to use their own device to access company applications.
88%
(Based on 21 reviews)

Administration

Ease of installation on server

Installation process is easy and flexible. This feature was mentioned in 21 Citrix Workspace reviews.
86%
(Based on 21 reviews)

Password Policy Enforcement

Options for resetting and enforcing password policies 20 reviewers of Citrix Workspace have provided feedback on this feature.
90%
(Based on 20 reviews)

Administration Console

Based on 21 Citrix Workspace reviews. Provides Administration tools/console that are easy to use and learn for routine maintenance tasks
86%
(Based on 21 reviews)

Ease of connecting applications

Easily provisions new systems, platforms or applications using configuration and not customization. This feature was mentioned in 22 Citrix Workspace reviews.
86%
(Based on 22 reviews)

Self Service Password Administration

Users can set, change passwords without interaction from IT staff This feature was mentioned in 21 Citrix Workspace reviews.
85%
(Based on 21 reviews)

Network Segmentation

Allows administrative control over network components, mapping, and segmentation.

Not enough data

Scalability

Provides features to allow scaling for large organizations and user bases.

Not enough data

Global Access

Extends SDP network access to users regardless of their physical location.

Not enough data

Platform

Multiple Operating system support

Supports Endpoint access control to multiple operating systems 21 reviewers of Citrix Workspace have provided feedback on this feature.
87%
(Based on 21 reviews)

Multi-Domain Support

As reported in 17 Citrix Workspace reviews. Allows user authentication to be honored by all the hosts in two or more domains
88%
(Based on 17 reviews)

Cross Browser support

Based on 19 Citrix Workspace reviews. Support access to browser based applications across required browser types
89%
(Based on 19 reviews)

Fail over protection

Provides required failover mechanisms to ensure if one server, network, etc fails users are still able able to authenticate This feature was mentioned in 19 Citrix Workspace reviews.
84%
(Based on 19 reviews)

Reporting

Based on 19 Citrix Workspace reviews. Contains pre-built and custom reporting tools to required to manage business
89%
(Based on 19 reviews)

Auditing

Provides mechanism for auditing authentication for trouble shooting purposes. This feature was mentioned in 19 Citrix Workspace reviews.
84%
(Based on 19 reviews)

Third Party Web Services support

Can call and pass credentials to third party web services. This feature was mentioned in 18 Citrix Workspace reviews.
87%
(Based on 18 reviews)

Network Management

Network Segmentation

Allows administrative control over network components, mapping, and segmentation.

Not enough data

Network Mapping

Allows visual display of networks segmented components and their connected resources.

Not enough data

Security Analytics

Utilizes behavioral analysis to improve security procedures and documentation.

Not enough data

API/Integrations

Application Programming Interface - Specification for how the application communicates with other software. API's typically enable integration of data, logic, objects, etc. with other software applications.

Not enough data

Security

Security Automation

Allows administrative control over automated security tasks.

Not enough data

Application Security

Protects application access and data. Prompts additional authentication for suspicious users.

Not enough data

Workload Protection

Protects computing resources across a network. Prompts additional authentication for suspicious users.

Not enough data

Data Protection

Protects informatin stored on premises and in the cloud. Prompts additional authentication for suspicious users.

Not enough data

Governance

As reported in 12 Citrix Workspace reviews. Allows users to create, edit, and relinquish user access privileges.
86%
(Based on 12 reviews)

Data loss Prevention

Stores data securely either on premise or in an adjacent cloud database to prevent loss of data at rest. 12 reviewers of Citrix Workspace have provided feedback on this feature.
85%
(Based on 12 reviews)

Data Encryption/Security

Manages policies for user data access and data encryption. This feature was mentioned in 11 Citrix Workspace reviews.
79%
(Based on 11 reviews)

Access Control

Supports LDAP Protocol to enable access control and governance. This feature was mentioned in 12 Citrix Workspace reviews.
89%
(Based on 12 reviews)

Identity Management

Adaptive Access Control

Provides a risk-based approcach to determining trust within the network.

Not enough data

Identity Scoring

Calculates risk based on user behavior, permissions, and requests.

Not enough data

User Monitoring

Monitors users attempting unauthorized access to databases, applicaitons, and othe network components.

Not enough data

Analysis

User Analytics

As reported in 12 Citrix Workspace reviews. Allows for reporting and documentation of individual user behavior and privileges.
85%
(Based on 12 reviews)

Cloud Gap Analytics

As reported in 11 Citrix Workspace reviews. Analyzes data associated with denied entries and policy enforcement, giving information of better authentication and security protocols.
86%
(Based on 11 reviews)

Anomoly Detection

Monitors acivity related to user behavior and compares activity to benchmarked patterns. This feature was mentioned in 11 Citrix Workspace reviews.
86%
(Based on 11 reviews)

Functionality

SSO

Provides a single access point for users to access multiple cloud products without multiple logins. This feature was mentioned in 12 Citrix Workspace reviews.
88%
(Based on 12 reviews)

Cloud Registry

Details SaaS products the cloud security product can integrate with and provide security for. 12 reviewers of Citrix Workspace have provided feedback on this feature.
85%
(Based on 12 reviews)

Mobile Device Mangement

As reported in 12 Citrix Workspace reviews. Offers the ability to set standards for types of mobile devices and networks capable of accessing data.
85%
(Based on 12 reviews)

Protection

Policy Enforcement

Allows administrators to set policies for security and governance.

Not enough data

Security Audit

Allows for deep examination into network-connected devices, policies, and protocols.

Not enough data

Access Control

Supports LDAP Protocol to enable access control and governance.

Not enough data

User Authentication

Authenticates users prior to granting access to networks, applciations, and systems.

Not enough data

Monitoring

Compliance Monitoring

Monitors data and compliance requirements. Sends alerts based on violations or misuse.

Not enough data

Vulnerability Monitoring

Monitors networks, applications, and systems to identify misconfigurations and access points that can be easily compromised.

Not enough data

Configuration Monitoring

Monitors configuration rule sets and policy enforcement measures and document changes to maintain compliance.

Not enough data

Observability

Generate insights across IT systems utilizing event metrics, logging, traces, and metadata.

Not enough data