10 Integrations with Citrix SD-WAN

View a list of Citrix SD-WAN integrations and software that integrates with Citrix SD-WAN below. Compare the best Citrix SD-WAN integrations as well as features, ratings, user reviews, and pricing of software that integrates with Citrix SD-WAN. Here are the current Citrix SD-WAN integrations in 2024:

  • 1
    Thru

    Thru

    Thru

    Thru is the leading provider of cloud-native secure file transfer solutions: automated file transfer and ad hoc file sharing. Since 2002, we have offered market-first technologies designed to tackle the most demanding and complex file transfer challenges: - Meet governance and compliance regulations with the help of Thru. Antivirus scanning, end-to-end encryption and a full audit trail are built into every layer. - Significantly reduce IT overhead and costs from on-prem servers: Migrate to our cloud to hand off deployment, maintenance, scaling and more to Thru’s award-winning team of file transfer experts. - Extend integration platform (iPaaS) capabilities with our MFT connectors, which add persistence and guaranteed delivery. - Execute internal or external file transfers with Thru's distributed hybrid architecture: The Thru Node is an MFT agent installed on-premises for internal transfers, orchestrated by the cloud. Contact Thru to discuss your managed file transfer options.
  • 2
    TraitWare

    TraitWare

    TraitWare

    TraitWare is Real Passwordless Multi-factor authentication (MFA) for True Zero Trust Access. TraitWare's enterprise-class, patented, plug-and-play solution combines Passwordless MFA and SSO – eliminating the need for usernames and passwords, while reducing friction for the user, and increasing security for your company. AND, you’ll save 60% or more on support budgets. With our QR solution, we can also eliminate the need for a username. Not only is our software convenient and easy to use, but it virtually eliminates vulnerabilities associated with traditional username and password logins. By replacing usernames and passwords we eliminate the ability to phish them. Leveraging our Direct login or our QR scan ties a user to the login, eliminating credential theft or sharing.
    Starting Price: $3 per month
  • 3
    LoginTC

    LoginTC

    Cyphercor

    Cyphercor is a two factor authentication provider that offers a best-in-class solution that's effortless, intuitive, and cost-effective called "LoginTC". LoginTC adds an additional layer of security to your systems and applications including VPNs, Firewalls, remote desktop, active directory, and more with it's innovative 2fa software. LoginTC offers a wide range of two factor options for end-users to authenticate, including SMS, email, push notifications, hardware tokens, U2F, OTP, bypass codes, and more. LoginTC was built with the principle that administrators are users too, and offers a solution that's not just easy for end users day-to-day, but is also simple for administrators to manage and setup. In fact, if you aren't set-up in one hour, the first month of your subscription is on us. LoginTC can help you reduce your insurance costs and meet compliance regulations with ease.
    Starting Price: $3/month/user
  • 4
    Barracuda SSL VPN

    Barracuda SSL VPN

    Barracuda Networks

    Your army of road warriors and remote workers require a quick, flexible, reliable and completely secure way to connect to your internal enterprise applications, information and network resources. They want to do this from anywhere in the world, at any time and from any suitable device. The Barracuda SSL VPN provides the security and connectivity to deliver this access, via a web browser or virtually any mobile device. The Barracuda SSL VPN makes it easy for remote users to access internal applications and files. Unlike traditional VPN technologies, the Barracuda SSL VPN does not require any additional client software or complicated settings. Logging in from home or the road requires only a web browser and Internet connection. Upon login, users are presented with a portal of internal web applications or file shares. More advanced applications like Remote Desktop Services or Citrix XenApp are available to users running Java.
  • 5
    Citrix Workspace

    Citrix Workspace

    Citrix Systems

    Employee experience is everything—get it right with an intelligent workspace. Power a smarter, more flexible way to work. You hired the best. Let them be their best. Redefine what it means to work better with Citrix Workspace. Increase employee productivity and engagement through simpler IT. Simplify the way you manage and secure apps, devices, users, and networks so you can deliver the best employee experience. Transition employees back to the office seamlessly. Realize the full potential of your cloud strategy. Replace traditional VPNs with a zero trust approach.
  • 6
    StructionSite

    StructionSite

    StructionSite

    Automated site documentation that translates daily project updates into actionable insights. These tools build on StructionSite’s capabilities to transform the way you document jobsites, manage resources, and ultimately, impress your clients. Make Jobsite Capture a Differentiator, Not a Time-Waster. Empower Your Team and Impress your Clients with StructionSite. Tracking work on the jobsite today is a manual, inconsistent, and inaccurate process... it stinks. And what happens when you need photo data to back up that change order or delay claim? How do we track work and capture site conditions at the same time, in an automated fashion? StructionSite is a new category of construction software - Intelligent Project Tracking - that combines cameras and AI to track installed work and back it all up with a photographic record. Streamlined project documentation for Construction.
  • 7
    Nutanix AOS
    Standardize on powerful, software-defined HCI to deliver all applications, services and data at any scale - so you can focus on your toughest business challenges. Replace complex legacy infrastructure. Deploy resources in an hour or two, and provision applications the same day to meet business needs. AOS delivers apps with the fastest possible performance, manages all of your data, and self heals to deliver truly invisible infrastructure. Support all application types across data centers and remote sites with subscription-based software that runs on off-the-shelf hardware. Your applications, data and services need consistent performance and resilience at any scale. See why Nutanix HCI is the only solution in the market that you can trust with your digital services. With one-click simplicity, AOS streamlines IT operations and relieves budget pressures by integrating storage, networking, and compute services into a single solution managed by IT generalists.
  • 8
    Omnis Cyber Investigator
    Omnis™ Cyber Investigator is an enterprise-wide network threat and risk investigation platform that helps security teams easily detect, validate, investigate and respond to threats. Reduce the impact of cyberthreats with an analytics system that also integrates with popular Security Information and Event Management (SIEM) platforms. Omnis Cyber Investigator's cloud-first approach helps companies manage threats across increasingly complex digital infrastructures marked by application cloud migration to environments such as Amazon AWS. By combining Omnis Cyber Investigator’s agentless packet access with AWS-resident virtual instrumentation, enterprise users can seamlessly extend their cyber visibility to AWS. Improve the productivity of your cyber security team with guided contextual or ad hoc unguided investigations. Meet the foundational requirement for cyber threat security with visibility across physical and hybrid-cloud infrastructure.
  • 9
    SolidPass

    SolidPass

    SolidPass

    SolidPass is a leader in next-generation strong authentication, and protects enterprises and their customers from fraud, digital attacks, and information theft through advanced security software. Solidpass converts mobile phones, internet browsers, and desktop applications into robust security tokens. By eliminating the need for hardware tokens, SolidPass brings the highest levels of security at a fraction of the cost, and without the hassle of traditional, physical two-factor authentication tokens. SolidPass has bridged the traditional trade-off between usability and stronger security, and makes Challenge-Response (CR) and Transaction Data Signing (TDS) simple to use by incorporating advancements such as barcode scanning. Barcode scanning-based authentication can be used for Challenge-Response (CR) and Transaction Data Signing (TDS). Barcode scanning adds usability and convenience.
  • 10
    AuthControl Sentry

    AuthControl Sentry

    Swivel Secure

    Deployed in over 54 countries and implemented across enterprises including finance, government, healthcare, education, and manufacturing, AuthControl Sentry® provides organisations with true multi-factor authentication (MFA). It delivers an intelligent solution to prevent unauthorised access to applications and data. AuthControl Sentry® has the flexibility to support a range of architectural requirements and the ability to ensure maximum adoption, thanks to its variety of authentication factors. Patented PINsafe® technology for ultimate security. Supports on-premise and cloud for changeable architecture. A single tenancy and single-tiered cloud solution ensures optimised customization. Risk-based authentication and single sign-on as standard. Integrates seamlessly with hundreds of applications. Ensures maximum adoption with an extensive range of authenticators.
  • Previous
  • You're on page 1
  • Next