Securing a remote workforce with a zero-trust strategy

Citrix logo

The sudden surge in remote work and direct-to-cloud consumption of SaaS applications are putting pressure on the role of the physical security perimeter to business applications. Users need access to on-premises applications from multiple locations, and IT and cyber security teams have an imperative to provide secure access to these critical resources across a hybrid cloud environment.

With this challenge comes the need to reevaluate existing approaches to and controls of the perimeter. Organisations are moving away from the traditional method of using Virtual Private Networks (VPNs) because the way VPNs require a connection between the corporate network and the individual’s device allows for threats to be introduced through unmanaged devices.

This whitepaper champions zero-trust as the perfect approach for securing access while also providing operational efficiency. It can secure both cloud and on-premises applications with its improved mobility, threat detection, and data-loss prevention. Download this whitepaper for a framework to successfully implement a zero-trust strategy.


ITPro is a global business technology website providing the latest news, analysis, and business insight for IT decision-makers. Whether it's cyber security, cloud computing, IT infrastructure, or business strategy, we aim to equip leaders with the data they need to make informed IT investments.

For regular updates delivered to your inbox and social feeds, be sure to sign up to our daily newsletter and follow on us LinkedIn and Twitter.