Zero Trust M&A Strategy: Apps and Desktop Access


With our zero trust mergers and acquisition strategy, we’ve seen how Workspace can integrate multiple identity providers across multiple organizations to create a unified application library. Now that the user is authenticated and authorized, we can now look at how we provide them access to apps and desktops.

The first part is to verify the user’s identity with their original, primary identity provider, which we can easily do with adaptive authentication.

The second part we used the user’s primary identity to create a unified list of authorized resources.

In part three, let’s discuss Zero Trust Network Access (ZTNA) for

  1. Private web apps
  2. Windows/Linux apps
  3. Windows/Linux desktops

What is ZTNA

First, what do we mean by Zero Trust Network Access (ZTNA)?  This is an industry term that has quickly gained in popularity. 

In the simplest terms, ZTNA provides users with an isolated, secure connection to an internal resource.

  1. The user’s device is never allowed unrestricted access to the internal network. The device can only access the defined resource.
  2. The private app is never exposed to the internet.

And this is the strategy we use for mergers and acquisitions. A user from one company will often need access to an app from another company. Even though these two companies are essentially one company, we still should not trust the devices. We don’t know what security standards each company has put into place to protect our infrastructure.

How does ZTNA work

To make ZTNA work, we deploy connectors on the internal network.  The connectors create outbound connections to different Citrix cloud services (Secure Private Access and Virtual Apps and Desktops services).

When a user requests access to a private web app, a virtual app or a desktop, the cloud service routes the user’s request to the connector, which makes the final connection to the private resource.

ZTNA for M&A

For a mergers and acquisition strategy, ZTNA allows our IT team to easily provide secure and constrained access to private resources.

  1. Agent-less: Users can access ZTNA resources without installing agents on their endpoints
  2. Restricted Access: Users can only access the authorized resource
  3. Simple: Admins simply deploy connectors avoiding firewall changes
  4. Web and Virtual: Users can access multiple types of authorized resources, including web apps, virtual apps, virtual desktops and physical desktops.

Remember to take a look at the following pieces of content

In Part 3 of the #ZeroTrust #Mergers and #Acquisition strategy, learn how #ZTNA provides simple, isolated access for private web apps, virtual apps, and desktops from multiple companies. All with #Citrix

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

This site uses Akismet to reduce spam. Learn how your comment data is processed.