Cloud Vendor Report: Citrix
Citrix Systems (Citrix) is an established IT vendor which started with Terminal Server products in Windows environments, allowing users to access sessions which are running on a Windows Server remotely. Based on the success of these market-leading technology, Citrix has consequently expanded its portfolio over the course of the years to address as well more complex virtualization and “application delivery” issues as well as to enter the emerging Cloud Computing market. In the latter market, Citrix acts as a virtualization and management infrastructure vendor as well as an online service provider with its Citrix Online division.
Citrix is a well-financed, well established vendor who has managed to make the move from their cash-cow business of Terminal Services to virtualization and beyond to solutions which deliver IT environments to the user. Besides this, the company has become a major player in the online services market segment with solutions like GoToMeeting and GoToWebinar.
Based on the current cloud service offerings and the potential of their technology, Citrix is very likely to expand into further areas of the Cloud Computing market. Currently, the C3 approach is new and will and has to be improved significantly. We expect that Citrix will deliver on that.
|Aug 18, 2009||
Cloud Vendor Report: Citrix
Citrix Systems (Citrix) is an established IT vendor which started with Terminal Server products in Windows environments, allowing users to access sessions which are running on a Windows Server remotely. Based on the success of these market-leading technology, Citrix has consequently…
Latest Related Reports
Register now for KuppingerCole Select and get your free 30-day access to a great selection of KuppingerCole research materials and to live trainings.
Security Intelligence Platforms (SIP) are universal and extensible security analytics solutions that offer a holistic approach towards maintaining complete visibility and management of the security posture across the whole organization. Only by correlating both real-time and historical security [...]
Today, the Security Operations Center (SOC) is at the heart of enterprise security management. It is used to monitor and analyze security alerts coming from the various systems across the enterprise and to take actions against detected threats. However, the rapidly growing number and sophistication of modern advanced cyber-attacks make running a SOC an increasingly challenging task even for the largest enterprises with their fat budgets for IT security. The overwhelming number of alerts puts a huge strain even on the best security experts, leaving just minutes for them to decide whether an [...]