Security, privacy and compliance for products and services

Find product and service specific information below.

Citrix Analytics technical security overview

Citrix Analytics technical security overview
Overview of preferred security practices when using Citrix Analytics service and the information Citrix Analytics collects and manages.

Citrix Application Delivery Management

Citrix Application Delivery Management customer content and log handling
This document is intended to communicate the data collected and stored in cloud as part of Citrix Application Delivery Management (ADM) service.

Citrix Cloud services

Citrix Cloud services Data Protection Overview
Overview of data protection practices implemented when providing Citrix Cloud services.

Citrix Cloud services platform secure deployment guide
Overview of preferred security practices when using Citrix Cloud and the information Citrix Cloud collects and manages.

Citrix Content Collaboration

Due diligence for Citrix Content Collaboration
Learn about our security posture and related controls. Review the Shared Assessments Standardized Information Gathering (SIG) self-attestation questionnaire and supporting documentation.

Citrix DaaS (formerly Citrix Virtual Apps and Desktops service)

Citrix DaaS technical security overview
Overview of preferred security practices when using Citrix DaaS and the information Citrix DaaS collects and manages.

Due diligence for Citrix Virtual Apps & Desktops
Learn about our security posture and related controls. Review the Shared Assessments Standardized Information Gathering (SIG) self-attestation questionnaire and supporting documentation.

Endpoint security and antivirus best practices
Guidelines for configuring antivirus software in Citrix DaaS and Citrix Virtual Apps and Desktops environments.

Citrix Endpoint Management

Citrix Endpoint Management security experience guide
Security and user experience guide for Citrix Endpoint Management.

Citrix Gateway

Citrix Gateway technical security overview
Overview of preferred security practices when using Citrix Gateway and the information Citrix Gateway collects and manages.

Citrix Intelligent Traffic Management

Citrix Intelligent Traffic Management customer content and log handling
Review information about Citrix handling of customer content and logs for Citrix Intelligent Traffic Management.

Citrix Remote Browser Isolation (formerly Citrix Secure Browser)

Citrix Secure Browser technical security overview
Overview of preferred security practices when using Citrix Remote Browser Isolation service and the information Citrix Remote Browser Isolation collects and manages.

Citrix SD-WAN

Citrix SD-WAN secure deployment guide
Secure deployment guide for Citrix SD-WAN.

Citrix Secure Private Access (formerly Citrix Secure Workspace Access)

Citrix Secure Private Access technical security overview
Overview of preferred security practices when using Citrix Secure Private Access and the information it collects and manages.

Citrix Workspace

Citrix Workspace Microapps service security overview
Answers to the most common customer questions and overview of our approach to security of the Citrix Workspace Microapps service.

DataSynapse GridServer Manager® Security Guide
Guide to implementing security features for GridServer Manager.

Ibi WebFOCUS® Security and Administration
Deployment options and configuration models.

ibi WebFOCUS® Security and Administration Best Practices
A summary of the best practices to secure an installation of TIBCO WebFOCUS and administer ongoing application development.

JasperReports® Server Security Guide
Overview of JasperReports Server Security including key management, application and user security.

NetScaler secure deployment guide
Security best practices for deploying NetScaler

Networking SSL/TLS best practices
Steps for validating an existing SSL\TLS configuration of vServer running on NetScaler

TIBCO ActiveSpaces® Security Guidelines
Provides details of product connectivity and configuration of security options.

TIBCO® BPM Enterprise Security Guidelines
Security guidelines with recommendations for external communication including communication with the database, and with the end-user interface. 

TIBCO BusinessConnect™ TIBCO ActiveSpaces® Security Guidelines Container Edition Security Guidelines
This document provides details of product connectivity and configuration of security options.

TIBCO BusinessEvents® Enterprise Edition Security Guide
This document discusses access control, secure communication with external components and securing data at rest.

TIBCO Cloud™ API Management - Local Edition Security Guide
This document describes various ways to secure the TIBCO Cloud API Management - Local Edition clusters.

TIBCO Cloud™ Integration Security Overview
Information on TIBCO infrastructure security, on the data center security standards provided by our infrastructure providers, and on the connections into the TIBCO Cloud environment.

TIBCO Statistica® Security Guide
Details security considerations such as product authentication, authorization, and restricting access to sensitive data.

TIBCO Data Virtualization® Security Features Guide
TIBCO Data Virtualization and Business Directory security features.

TIBCO Flogo® Enterprise Security Guide
TIBCO Flogo security features.

TIBCO FTL® Security
This document describes security features and other aspects of internal and external communication including product connectivity and configuration of security options.

TIBCO® Graph Database Security Guidelines
This document describes guidelines to ensure security within the various components of the TIBCO Graph Database, the channels of communication between them, and also secure the data and access within the database.

TIBCO LogLogic® Log Management Intelligence Security Guidelines
Security guidance for TIBCO LogLogic Log Management Intelligence, TIBCO LogLogic Enterprise Virtual Appliance, and TIBCO LogLogic Enterprise Virtual Appliance - Container Edition.

TIBCO® Managed File Transfer Command Center Security Guide
Security-related guidance and recommendations for installation, configuration, and execution of file transfers.

TIBCO® Managed File Transfer Internet Server Security Guide
This document describes guidelines to ensure security within TIBCO Managed File Transfer (MFT) Internet Server. It provides security-related guidance and recommendations for installation, configuration, and execution of file transfers.

TIBCO Scribe Online Security Options
Describes security options and setting security rules within TIBCO Scribe Online.

TIBCO Spotfire® Server and Environment Security
Overview of security considerations including ports and protocols, authentication and authorization, logging, and session management.

TIBCO Statistica® Security Guide
Details security considerations such as product authentication, authorization, and restricting access to sensitive data.