What Integrates with Citrix SD-WAN?

Find out what Citrix SD-WAN integrations exist in 2024. Learn what software and services currently integrate with Citrix SD-WAN, and sort them by reviews, cost, features, and more. Below is a list of products that Citrix SD-WAN currently integrates with:

  • 1
    TraitWare Reviews

    TraitWare

    TraitWare

    $3 per month
    1 Rating
    TraitWare is a Real Passwordless Multifactor Authentication (MFA) that allows for True Zero Trust Access. TraitWare's plug-and-play, enterprise-class, patented solution combines Passwordless MFA (Multi-factor authentication) and SSO. This eliminates the need for usernames or passwords, reduces friction, and increases security for your company. You'll also save up to 60% on support budgets. Our QR solution can eliminate the need to create a username. Our software is easy to use and virtually eliminates the vulnerabilities associated with password logins and usernames. We eliminate the possibility of phishing usernames and passwords by replacing them. Our QR scan or Direct login ties a user directly to the login, eliminating credential sharing or theft.
  • 2
    Thru Reviews
    Thru is the leader in cloud-native secure file transfers solutions. We have been providing market-first technologies that solve the most complex and demanding file transfer problems since 2002. MFT systems installed on-premises cannot scale with your needs and can require hours of maintenance. Migration to the cloud will significantly reduce IT overhead and costs. An EiPaaS can be powerful, but does not offer MFT functionality. Our connectors can extend your EiPaaS's capabilities. They add persistence and guarantee delivery. One company saved 40% on total operational costs over three years, and partner onboarding times were reduced from weeks to minutes with our automated file transfer service. With our help, hundreds have seen an increase in partner communication and IT productivity. Thru's hybrid architecture allows secure file exchanges between trading partners and internal applications. Thru integrates tightly with multiple integration platforms to assist businesses in achieving their goals.
  • 3
    LoginTC Reviews

    LoginTC

    Cyphercor

    $3/month/user
    Cyphercor is a two factor authentication provider that offers a best-in-class solution that's effortless, intuitive, and cost-effective called "LoginTC". LoginTC adds an additional layer of security to your systems and applications including VPNs, Firewalls, remote desktop, active directory, and more. LoginTC offers a wide range of two factor options for end-users to authenticate, including SMS, email, push notifications, hardware tokens, U2F, OTP, bypass codes, and more. LoginTC can help you reduce your insurance costs and meet compliance regulations with ease.
  • 4
    Barracuda SSL VPN Reviews
    Your remote workers and road warriors require a fast, flexible, reliable, and completely secure way of connecting to your internal enterprise applications, information, and network resources. They want to be able to access this information from anywhere in the world, from any device, at any time. The Barracuda SSL VPN provides connectivity and security to allow this access via any web browser or mobile device. Remote users can access files and applications with the Barracuda VPN. The Barracuda VPN is not like other VPN technologies. It does not require any additional client software. Logging in from the road or home requires only a web browser, and an Internet connection. After logging in, users will be presented with a portal that includes file shares and web applications. Java users can access more advanced applications such as Remote Desktop Services and Citrix XenApp.
  • 5
    Citrix Workspace Reviews
    An intelligent workspace will improve employee experience. Work smarter and more flexible. You have hired the best. Let them be the best. Citrix Workspace redefines what it means to be productive. Simpler IT can increase employee productivity and engagement. You can simplify the way you manage, secure, and administer apps, devices, users, networks, so that you can provide the best employee experience. Easily return employees to the office. Your cloud strategy can be used to its full potential. Replace traditional VPNs by a zero trust approach.
  • 6
    StructionSite Reviews
    Automated site documentation that converts daily project updates into actionable insights. These tools leverage the power of StructionSite to transform how you manage resources, document jobsites, and impress your clients. Make Jobsite capture a differentiator and not a time-waster. StructionSite empowers your team and impresses your clients. Today, tracking work on the jobsite is a slow, incongruous, and inaccurate process. What happens when you need to have photo data to support a change order or delay claim. How can we simultaneously track work and capture site conditions in an automated manner? Intelligent Project Tracking is a new type of construction software called StructionSite. It combines cameras and AI to track the installed work and back it up with a photographic record. Construction project documentation simplified.
  • 7
    Nutanix AOS Reviews
    Standardize on powerful, software defined HCI to deliver all services, applications, and data at any scale. This will allow you to focus on your most difficult business challenges. Replacing legacy infrastructure is possible. You can deploy resources in a matter of hours and provide applications the same day to meet your business needs. AOS delivers apps with the fastest possible performance and manages all your data. It also self heals to create a truly invisible infrastructure. Subscription-based software that runs on standard hardware supports all types of applications across data centers and remote locations. Your applications, data, and services require consistent performance and resilience at all scales. Nutanix HCI is the best solution for your digital services. AOS simplifies IT operations and reduces budget pressures. It integrates storage, networking, compute, and other services into one solution that can be managed by IT specialists.
  • 8
    Omnis Cyber Investigator Reviews
    Omnis™, Cyber Investigator is an enterprise-wide network risk and threat investigation platform that allows security teams to quickly detect, validate, investigate, and respond to cyber threats. An analytics system that integrates with popular Security Information and Event Management platforms (SIEM) helps to reduce cyberthreats. Omnis Cyber Investigator's cloud first approach helps companies manage risks across increasingly complex digital infrastructures that have been affected by application cloud migrations to environments like Amazon AWS. Omnis Cyber Investigator's agentless, packet access can be combined with AWS-resident virtual instrumentsation to give enterprise users seamless access to AWS. Your cyber security team will be more productive with guided or unguided investigations. Cyber threat security is possible with visibility across both physical and hybrid-cloud infrastructure.
  • 9
    SolidPass Reviews
    SolidPass is a leader for next-generation strong authentication. It protects customers and enterprises from fraud, digital attacks and information theft with advanced security software. Solidpass converts desktop applications, mobile phones, and internet browsers into secure security tokens. SolidPass eliminates the need for hardware tokens and provides the highest level of security without the hassle and cost of traditional two-factor authentication tokens. SolidPass bridges the traditional trade-off between security and usability. It incorporates advances such as barcode scanning to make Challenge-Response and Transaction Data Signing (TDS), simple to use. Barcode scanning-based authentication is possible for both Challenge-Response and Transaction Data Signing. Barcode scanning is convenient and easy.
  • 10
    AuthControl Sentry Reviews
    AuthControl Sentry®, which has been deployed in more than 54 countries and is used by enterprises across finance, government, education, manufacturing, and healthcare, provides true multi-factor authentication (MFA) for organisations. It provides an intelligent solution to prevent unauthorised data and applications access. AuthControl Sentry®, which supports a variety of architectural requirements, has the flexibility to be used in a variety of ways and can ensure maximum adoption due to its many authentication factors. Patented PINsafe®, technology for maximum security. Supports both cloud and on-premise for a flexible architecture. Optimized customization is possible with a single tenancy and a single-tiered cloud service. Single sign-on and risk-based authentication are standard. Integrates seamlessly with hundreds if not thousands of applications. With a wide range of authenticators, you can ensure maximum adoption.
  • Previous
  • You're on page 1
  • Next