Professional Documents
Culture Documents
VeridiumAD and
Citrix Workspace
Replacing tokens with Biometric authentication
VeridiumAD allows organizations to protect the Citrix Workspace as a part
of the Citrix Secure Digital Perimeter. Using strong biometric
authentication, VeridiumAD lets organizations move from insecure
passwords and costly token-based authentication. Beyond what a user
has or knows, biometric authentication factors help validate who a user
actually is, before granting access to corporate resources.
Solutions Brief VeridiumAD and Citrix Workspace
Using only a smartphone, VeridiumAD provides a software-only solution that captures a variety of
biometrics to authenticate into corporate environments and across the entire Citrix Workspace.
Citrix Workspace
VeridiumAD seamlessly integrates with StoreFront™, NetScaler ®, and ShareFile® to eliminate pass-
Only Citrix offers the most complete
and integrated workspace to enable words and/or tokens as a part of a two-factor authentication solution. The solution offers secure data
people to securely access their apps, and application access with a fingerprint, face, or other biometric—including Veridium’s own
desktops, and data from anywhere. 4 Fingers TouchlessID. The result is a convenient and cost-effective alternative to traditional login
Rely on Windows app and desktop methods that actually verifies identity—who a user is—rather than just what they have or what they
delivery from XenApp® and
know.
XenDesktop®, device security from
XenMobile®, secure file sync and
sharing with ShareFile®, and network VeridiumAD—secure biometric authentication for Citrix environments
security with NetScaler ®. Only a Citrix
Identity is the claim a user makes to access information, but making that claim with a username and
Workspace offers you complete
choice of device, cloud and network,
password doesn’t actually prove who is making the access request. Passwords and even tokens only
streamlined for IT control and simple, authorize access, while true authentication is the process of actually verifying the identity claim. Only
secure access for users. biometrics—your face, your voice, your fingerprints—prove you are who you say you are.
1. Microsoft now estimates that it spends over $2M per month in helpdesk calls for password resets.
(http://money.cnn.com/2018/03/18/technology/biometrics-workplace/index.html)
citrixready.citrix.com 2
Solutions Brief VeridiumAD and Citrix Workspace
For legacy smart devices without biometric capabilities, Veridium developed its own biometric tech-
nology that is even more secure than native touch verification. Veridium 4 Fingers TouchlessID offers
secure contactless fingerprint verification with no additional hardware required. The technology sup-
ports all smartphones with a 5 Megapixel rear-facing camera.
4 Fingers TouchlessID has demonstrated an extremely low false rejection rate through independent
testing. Software testing firm iBeta found a false match rate of less than 0.1% at 95% confidence.
Michigan State University also tested the technology in India on subjects with worn fingerprints,
including construction workers, farmers, and the elderly. Their results showed a false rejection rate of
0.34% and a false acceptance rate of 0.1%. The National Institute of Standards and Technology (NIST)
is currently developing a standard for contactless fingerprinting in conjunction with the FBI. Veridium
is the first mobile technology vendor to join the NIST CRADA program to assist them in the develop-
ment of this standard.
Integrations
ENROLL AUTHENTICATE
Biometrics
Figure 1. VeridiumID integrates fully with Citrix Workspace to enroll and authenticate users via strong
biometrics.
citrixready.citrix.com 3
Solutions Brief VeridiumAD and Citrix Workspace
Deploying a patchwork of security point solutions actually only complicates the problem. Separately
managing authentication, single sign-on, endpoint access, and password management can create
additional security vulnerabilities. In fact, many businesses now believe the complexity of their orga-
nizational structures and IT infrastructure is putting their companies at even greater risk of security
breaches. Meanwhile users are left to grapple with a less productive environment.
Citrix Workspace
Only Citrix offers the most complete and integrated workspace to enable users to securely access
their apps, desktops, and data from anywhere.
• App and desktop delivery (XenApp / XenDesktop). Citrix Workspace features XenApp and
XenDesktop—the industry’s leading solutions for application and desktop delivery, with over 100
million users worldwide. Citrix Workspace enables secure, remote access to Windows applications
and desktops as well as Linux, web and SaaS applications from any device, over any network.
• Enterprise mobility management (device security from XenMobile). Using XenMobile technology,
Citrix Workspace delivers full access to mobile device management (MDM), mobile application man-
agement (MAM), mobile content management (MCM), secure network gateway, and
enterprise-grade mobile productivity apps in one comprehensive solution.
• File sync and share (ShareFile). Citrix Workspace offers enterprise-class data services across all
corporate and personal mobile devices, while maintaining total IT control. Using ShareFile, you can
access, sync, and securely share files from any device. Offline access maintains productivity, even
when users are on the go.
citrixready.citrix.com 4
Solutions Brief VeridiumAD and Citrix Workspace
• Branch networking and WAN. Citrix Workspace includes NetScaler™ SD-WAN, a solution that com-
bines real-time path selection, edge routing, stateful firewall, end-to-end QoS, and WAN
optimization.
• Secure remote access. NetScaler Unified Gateway consolidates remote access infrastructure and
provides single sign-on across all applications whether in a datacenter, in a cloud, or delivered as
SaaS.
• Contextual and secure access. Single sign-on and secure access provides end-to-end security to
apps deployed in datacenter, cloud, or SaaS to users accessing from hospital clinics, or remote sites,
on any device.
• Mobile and device security. User productivity is improved by delivering secure access to corporate
apps from both personal and corporate-issued devices.
• User security and malware protection. The Secure Digital Perimeter offers a differentiated and
coordinated approach to protecting against malware and ransomware through multiple
touchpoints.
• Secure collaboration. ShareFile offers easy access and collaboration while Secure Digital Perimeter
protects against data theft, misuse, and loss.
• Governance, risk, and compliance. Organizations can address risk, global compliance standards,
and industry regulations for app, user, and device security.
• Business continuity and app security. Secure Digital Perimeter helps prevent malicious attacks
from affecting business operations while providing network and secure access resilience during
outages, natural disasters, and calamities.
• User behavior analytics and proactive security insights. Citrix Analytics collects data across Citrix
offerings, generating actionable insights that enable administrators to proactively handle user and
app security threats, improve performance, and support continuous operations.
citrixready.citrix.com 5
Solutions Brief VeridiumAD and Citrix Workspace
Citrix solutions provide a foundation of confidentiality, integrity, and availability across all types of on-
premises, hybrid cloud, and public cloud IT environments. Four key design principals make Citrix
solutions ideally suited to aid GDPR readiness:
• Applications are centralized in the datacenter or cloud so that enterprise data is not stored on indi-
vidual user devices.
• When sensitive data must be distributed, mobilized, or utilized offline, it is protected in a secure
container.
• Context-aware policies around identity, device, location, and network connection give IT granular
access control.
• Visibility and user behavior analytics can help detect potential threats to proactively remediate and
mitigate risk.
Conclusion
The combination of VeridiumAD and Citrix allows organizations to protect and secure Citrix
Workspace and provide strong biometric authentication—with seamless StoreFront, NetScaler, and
ShareFile integration. Single sign-on provided by Citrix combined with VeridiumAD helps organiza-
tions make sure that users really are who they say they are. Users can authenticate via the mobile
device they already carry, either using biometrics as a primary factor to eliminate passwords, or as a
secondary factor to eliminate tokens. The result is a vastly more secure and simplified user experi-
ence that helps reduce help desk burden.
Copyright © 2018 Citrix Systems, Inc. All rights reserved. Citrix Ready, NetScaler, NetScaler App Delivery Controller, NetScaler ADC,
NetScaler Unified Gateway, ShareFile, XenApp, XenDesktop, and XenMobile are trademarks of Citrix Systems, Inc. and/or one of its
subsidiaries, and may be registered in the U.S. and other countries. Other product and company names mentioned herein may be trademarks
of their respective companies.
citrixready.citrix.com 6