Citrix Workspace Features
What are the features of Citrix Workspace?
Authentication Options
- Authentication User experience
- Supports Required Authentication systems
- Multi-Factor Authentication
- Supports Required Authentication Methods/Protocols
- Federation/SAML support (idp)
Access Control Types
- Endpoint access
- Local Access
- Remote Access
- Supports BYOD users
Administration
- Ease of installation on server
- Password Policy Enforcement
- Administration Console
- Ease of connecting applications
- Self Service Password Administration
Platform
- Multiple Operating system support
Top Rated Citrix Workspace Alternatives
(29)
4.4 out of 5
Visit Website
Sponsored
Citrix Workspace Categories on G2
Filter for Features
Authentication Options
Authentication User experience | As reported in 23 Citrix Workspace reviews. Process of providing credentials and logging into multiple systems is easy and intuitive for users | 90% (Based on 23 reviews) | |
Supports Required Authentication systems | Supports required 3rd party Authentication Technologies. Example systems: bioMetric, passwords, key cards, token based systems, etc. This feature was mentioned in 23 Citrix Workspace reviews. | 88% (Based on 23 reviews) | |
Multi-Factor Authentication | As reported in 22 Citrix Workspace reviews. Provides support for Multi-Factor authentication, so users are required to provide multiple factors to authenticate. For example, something they know, Something they have or something they are. | 88% (Based on 22 reviews) | |
Supports Required Authentication Methods/Protocols | Support SSO via Web agents, proxy agents, agent-less, SAML or oAuth and WS-Federation authentication and authorization Web services depending upon the application and business use case 21 reviewers of Citrix Workspace have provided feedback on this feature. | 87% (Based on 21 reviews) | |
Federation/SAML support (idp) | Based on 20 Citrix Workspace reviews. Can serve as the identity provider to external service providers so that when the user logs into a service, instead of providing credentials to the service provider, the service provider trusts the identity provider to validate the credentials. | 87% (Based on 20 reviews) | |
Federation/SAML support (sp) | As reported in 19 Citrix Workspace reviews. Can serve as the Service provider from an external service so that when the user logs in externally they have seamless SSO to internal applications from a service provider. | 87% (Based on 19 reviews) |
Access Control Types
Endpoint access | Provides ability to control access to PC's, Mobile devices, and other endpoint devices. 22 reviewers of Citrix Workspace have provided feedback on this feature. | 91% (Based on 22 reviews) | |
Local Access | Controls access to legacy applications, web based applications, network resources and servers while employees are on the companies local area network. 21 reviewers of Citrix Workspace have provided feedback on this feature. | 92% (Based on 21 reviews) | |
Remote Access | Controls access to legacy applications, web based applications, networks resources while employees are outside the local area network. This feature was mentioned in 23 Citrix Workspace reviews. | 93% (Based on 23 reviews) | |
Partner Access | Based on 19 Citrix Workspace reviews. Controls access to users that are not company employees that are either within the companies local area network or outside the network | 87% (Based on 19 reviews) | |
Supports BYOD users | As reported in 21 Citrix Workspace reviews. Enables users to use their own device to access company applications. | 88% (Based on 21 reviews) |
Administration
Ease of installation on server | Installation process is easy and flexible. This feature was mentioned in 21 Citrix Workspace reviews. | 86% (Based on 21 reviews) | |
Password Policy Enforcement | Options for resetting and enforcing password policies 20 reviewers of Citrix Workspace have provided feedback on this feature. | 90% (Based on 20 reviews) | |
Administration Console | Based on 21 Citrix Workspace reviews. Provides Administration tools/console that are easy to use and learn for routine maintenance tasks | 86% (Based on 21 reviews) | |
Ease of connecting applications | Easily provisions new systems, platforms or applications using configuration and not customization. This feature was mentioned in 22 Citrix Workspace reviews. | 86% (Based on 22 reviews) | |
Self Service Password Administration | Users can set, change passwords without interaction from IT staff This feature was mentioned in 21 Citrix Workspace reviews. | 85% (Based on 21 reviews) | |
Network Segmentation | Allows administrative control over network components, mapping, and segmentation. | Not enough data | |
Scalability | Provides features to allow scaling for large organizations and user bases. | Not enough data | |
Global Access | Extends SDP network access to users regardless of their physical location. | Not enough data |
Platform
Multiple Operating system support | Supports Endpoint access control to multiple operating systems 21 reviewers of Citrix Workspace have provided feedback on this feature. | 87% (Based on 21 reviews) | |
Multi-Domain Support | As reported in 17 Citrix Workspace reviews. Allows user authentication to be honored by all the hosts in two or more domains | 88% (Based on 17 reviews) | |
Cross Browser support | Based on 19 Citrix Workspace reviews. Support access to browser based applications across required browser types | 89% (Based on 19 reviews) | |
Fail over protection | Provides required failover mechanisms to ensure if one server, network, etc fails users are still able able to authenticate This feature was mentioned in 19 Citrix Workspace reviews. | 84% (Based on 19 reviews) | |
Reporting | Based on 19 Citrix Workspace reviews. Contains pre-built and custom reporting tools to required to manage business | 89% (Based on 19 reviews) | |
Auditing | Provides mechanism for auditing authentication for trouble shooting purposes. This feature was mentioned in 19 Citrix Workspace reviews. | 84% (Based on 19 reviews) | |
Third Party Web Services support | Can call and pass credentials to third party web services. This feature was mentioned in 18 Citrix Workspace reviews. | 87% (Based on 18 reviews) |
Network Management
Network Segmentation | Allows administrative control over network components, mapping, and segmentation. | Not enough data | |
Network Mapping | Allows visual display of networks segmented components and their connected resources. | Not enough data | |
Security Analytics | Utilizes behavioral analysis to improve security procedures and documentation. | Not enough data | |
API/Integrations | Application Programming Interface - Specification for how the application communicates with other software. API's typically enable integration of data, logic, objects, etc. with other software applications. | Not enough data |
Security
Security Automation | Allows administrative control over automated security tasks. | Not enough data | |
Application Security | Protects application access and data. Prompts additional authentication for suspicious users. | Not enough data | |
Workload Protection | Protects computing resources across a network. Prompts additional authentication for suspicious users. | Not enough data | |
Data Protection | Protects informatin stored on premises and in the cloud. Prompts additional authentication for suspicious users. | Not enough data | |
Governance | As reported in 12 Citrix Workspace reviews. Allows users to create, edit, and relinquish user access privileges. | 86% (Based on 12 reviews) | |
Data loss Prevention | Stores data securely either on premise or in an adjacent cloud database to prevent loss of data at rest. 12 reviewers of Citrix Workspace have provided feedback on this feature. | 85% (Based on 12 reviews) | |
Data Encryption/Security | Manages policies for user data access and data encryption. This feature was mentioned in 11 Citrix Workspace reviews. | 79% (Based on 11 reviews) | |
Access Control | Supports LDAP Protocol to enable access control and governance. This feature was mentioned in 12 Citrix Workspace reviews. | 89% (Based on 12 reviews) |
Identity Management
Adaptive Access Control | Provides a risk-based approcach to determining trust within the network. | Not enough data | |
Identity Scoring | Calculates risk based on user behavior, permissions, and requests. | Not enough data | |
User Monitoring | Monitors users attempting unauthorized access to databases, applicaitons, and othe network components. | Not enough data |
Analysis
User Analytics | As reported in 12 Citrix Workspace reviews. Allows for reporting and documentation of individual user behavior and privileges. | 85% (Based on 12 reviews) | |
Cloud Gap Analytics | As reported in 11 Citrix Workspace reviews. Analyzes data associated with denied entries and policy enforcement, giving information of better authentication and security protocols. | 86% (Based on 11 reviews) | |
Anomoly Detection | Monitors acivity related to user behavior and compares activity to benchmarked patterns. This feature was mentioned in 11 Citrix Workspace reviews. | 86% (Based on 11 reviews) |
Functionality
SSO | Provides a single access point for users to access multiple cloud products without multiple logins. This feature was mentioned in 12 Citrix Workspace reviews. | 88% (Based on 12 reviews) | |
Cloud Registry | Details SaaS products the cloud security product can integrate with and provide security for. 12 reviewers of Citrix Workspace have provided feedback on this feature. | 85% (Based on 12 reviews) | |
Mobile Device Mangement | As reported in 12 Citrix Workspace reviews. Offers the ability to set standards for types of mobile devices and networks capable of accessing data. | 85% (Based on 12 reviews) |
Protection
Policy Enforcement | Allows administrators to set policies for security and governance. | Not enough data | |
Security Audit | Allows for deep examination into network-connected devices, policies, and protocols. | Not enough data | |
Access Control | Supports LDAP Protocol to enable access control and governance. | Not enough data | |
User Authentication | Authenticates users prior to granting access to networks, applciations, and systems. | Not enough data |
Monitoring
Compliance Monitoring | Monitors data and compliance requirements. Sends alerts based on violations or misuse. | Not enough data | |
Vulnerability Monitoring | Monitors networks, applications, and systems to identify misconfigurations and access points that can be easily compromised. | Not enough data | |
Configuration Monitoring | Monitors configuration rule sets and policy enforcement measures and document changes to maintain compliance. | Not enough data | |
Observability | Generate insights across IT systems utilizing event metrics, logging, traces, and metadata. | Not enough data |