The Changing Security Model: Transitioning from the “Thou Shalt” Model to the “Access Is Allowed If”

IT organizations used to manage security by mandating specific devices and apps, and forcing employees and executives to use only approved resources. Due to the proliferation of personal devices and BYOD, enterprises must embrace a new security model that grants access if key conditions are met to ensure security policies are enforced. Learn more at

Brad Anderson, Corporate Vice President, Enterprise Client & Mobility, Microsoft

From the Citrix-Microsoft live event, August 23, 2016

About The Author
- Citrix (NASDAQ: CTXS) is a leader in mobile workspaces, providing virtualization, mobility management, networking and cloud services to enable new ways to work better. Citrix solutions power business mobility through secure, personal workspaces that provide people with instant access to apps, desktops, data and communications on any device, over any network and cloud. This year Citrix is celebrating 25 years of innovation, making IT simpler and people more productive. With annual revenue in 2013 of $2.9 billion, Citrix solutions are in use at more than 330,000 organizations and by over 100 million users globally.

Tell us what you think...