11 Integrations with Citrix Gateway
View a list of Citrix Gateway integrations and software that integrates with Citrix Gateway below. Compare the best Citrix Gateway integrations as well as features, ratings, user reviews, and pricing of software that integrates with Citrix Gateway. Here are the current Citrix Gateway integrations in 2026:
-
1
BackBox
BackBox
BackBox offers a simple way to intelligently automate the backup, restoration, and management of all devices on a network by providing centralized management of devices such as firewalls, routers, switches, and load balancers. Each of these devices plays a critical role in the availability and security of an organization’s network, and BackBox ensures they all continue to function effectively and effortlessly, streamlining operations for optimal performance. BackBox provides a foundation to harmonize the configuration between multiple devices, enabling seamless integration, and assuring compliance to organization or industry security policies, standards, or guidelines. IT administrators can easily employ BackBox to track configuration changes and see the deviation with the baseline for compliance validation and remediation. -
2
Entrust TLS/SSL Certificates
Entrust
Entrust TLS/SSL Certificates provide validated identity and encryption to secure your websites, users, and data. When your website is secured by an Entrust TLS/SSL Certificate, your visitors can be confident knowing that your organization's identity as been verified and that encryption will keep their data and transactions secure. With an Entrust TLS/SSL Certificate, your visitors never see browser alerts notifying them that your website is “not secure” or that their “connection is not private.” Invest in your reputation and great user experience with an Entrust TLS/SSL Certificate. Entrust is a founding member of the CA Security Council and the CA/Browser Forum, and actively contributes to develop industry standards for TLS/SSL, S/MIME, document signing, mobile device, and code signing certificates, as well as certificate management. Trust your security to a Certification Authority that defines digital security.Starting Price: $199 -
3
AuthPoint
WatchGuard
Our unique multi-factor authentication (MFA) solution not only helps to reduce the likelihood of network disruptions and data breaches arising from lost or stolen credentials, but we deliver this important capability entirely from the Cloud for easy set-up and management. AuthPoint goes beyond traditional 2-Factor Authentication (2FA) by considering innovative ways to positively identify users, and our large ecosystem of 3rd party integrations means that you can use MFA to protect access. Ultimately, WatchGuard AuthPoint is the right solution at the right time to make MFA a reality for the businesses who desperately need it to block attacks. AuthPoint uses a push message, QR code, or one-time password (OTP) as an additional factor proving your identity, and our mobile device DNA matches the authorized user’s phone when granting access to systems and applications. Therefore, any attacker who clones a user’s device in an attempt to access a protected system would be blocked. -
4
Automai provides Robotic Process Automation (RPA) to automate and manage even the most complicated front and back office tasks on any application(s). No scripting. Record your scenario, then edit or build on it with simple commands in the clear interface provided. Automai has the only RPA product that shares a platform with testing and monitoring components allowing scenarios to be built once and utilized in a variety of functions in the same enterprise. With Automai Robotic Process Automation (RPA), you CAN automate those repetitive tasks and processes. We’ve been using and improving our robotic automation technology for a long time, since it we started emulating human behavior for our automated testing solutions in 2000. And it’s the best out there. Our robotic automation intelligently copes with changing variables that human’s process in decision-making every day, learning what’s important to your business, and adapting so you can focus on bigger issues.
-
5
BASIS WMS
Basis Developments
When you choose BASIS, you’re not just choosing a product – you’re choosing a partner! Our BASIS Warehouse Management System monitored the movement of some 25 million items weighing slightly less than 500 million kilograms. BASIS complies with the Government initiated AP E-cert regulations for dairy exports. Since the inception of the first AP E-cert, we have been actively involved in providing industry solutions. Software updates are applied automatically and with constant friendly reminders from our support team to avoid disruption. Our qualified technical experts are available for on-site system support and/or hardware upgrades. Job specific training is available to all of our clients, either at our BASIS facilities, or at yours. Here at BASIS Developments we source the best quality hardware you need to maximize your software functionality. We also stand behind our hardware products with a full service of repairs or maintenance. -
6
ThreatQ
ThreatQuotient
Threat intelligence platform - ThreatQ, to understand and stop threats more effectively and efficiently your existing security infrastructure and people need to work smarter, not harder. ThreatQ can serve as an open and extensible threat intelligence platform that accelerates security operations through streamlined threat operations and management. The integrated, self-tuning threat library, adaptive workbench and open exchange allow you to quickly understand threats, make better decisions and accelerate detection and response. Automatically score and prioritize internal and external threat intelligence based on your parameters. Automate aggregation, operationalization and use of threat intelligence across all systems and teams. Improve effectiveness of existing infrastructure by integrating your tools, teams and workflows. Centralize threat intelligence sharing, analysis and investigation in a threat intelligence platform all teams can access. -
7
SecureIdentity PAM
SecurEnvoy
Our SecureIdentity Platform is a suite of solutions that focuses on user experience and provides verifiable trust in every activity you perform. The suite of solutions together combine to offer an overall solution to protect the identity of the user, the data and the device. Secureldentity PAM provides an interactive broker between users and administrative sessions on protected endpoints. This allows users to gain privileged access to areas they are given permission to access in the Universal Directory, while never actually exposing the credentials to the user at all. SecurEnvoy partners with leading technology platforms and companies to deliver the highest level of security and peace of mind. We have numerous pre-built integrations with many popular business applications and solutions. Read more about specific integrations or contact our technical team to discuss your specific needs. -
8
SecureIdentity IAM
SecurEnvoy
SecureIdentity IAM provides enforcement of access decisions around applications and data repositories. By reading information from the Universal Directory it can make dynamic choices as to what programs a user is allowed to run and what file servers or cloud storage areas they are allowed to access. This is enforced by a client on the endpoints that intercepts requests for access to applications or data areas and vetting them against the configured policy. If the action is allowed, the user experience continues as normal with no overhead. If the action is forbidden then access to the appropriate executable or DLL files is dynamically blocked regardless of how it is invoked. Logs of all events are sent back to the platform’s event database to provide a forensic trail of activity. -
9
SecureIdentity DLP
SecurEnvoy
SecureIdentity DLP is a data protection portfolio of solutions (on-premises, off-premises and the cloud), which prevents the loss of data from malware, insider threat and human error. This can be achieved across multi-channels, regardless of file types, by blocking sensitive data across structured and unstructured data repositories. Our SecureIdentity DLP platform provides the identity of the user, the device and the data they are working on so you can prove exactly who is doing what at any time. With increasing integrations with other parts of the security market, DLP has become essential for protecting organizations when newer technologies are to be adopted. Our DLP solutions are unique from competitors as we address threats from trusted and un-trusted users, through unique intellectual algorithms and fingerprinting features. SecureIdentity DLP conducts real-time inspection of all protocols, even ones that are unknown, and has the ability to stop data loss immediately. -
10
SecureIdentity IRAD
SecurEnvoy
The SecureIdentity Platform allows organizations to provide verifiable trust in every activity they perform. By providing the identity of the user, the device and the data they are working on you can prove exactly who is doing what at any time. SecurEnvoy partners with leading technology platforms and companies to deliver the highest level of security and peace of mind. We have numerous pre-built integrations with many popular business applications and solutions. Read more about specific integrations or contact our technical team to discuss your specific needs. Built upon artificial intelligence, SecureIdentity IRAD evaluates the user as an ongoing process and will detect any unusual activity or interaction in the user’s actions. This provides real time detailed analysis of the user interaction and allows risks. -
11
SecureIdentity MFA
SecurEnvoy
The simple ‘username and password’ approach alone is not strong enough to protect your business’ critical data. Log-ins can be compromised within minutes, making your private data vulnerable to threat. Our SecureIdentity platform provides the identity of the user, the device and the data they are working on, so you can prove exactly who is doing what at any time. MFA is best practice for layered data and privacy security. Our MFA solution integrates seamlessly with Microsoft’s Active Directory and other LDAP solutions, allowing you to reutilize your existing authentication database infrastructure, avoiding the need to re-architect, deploy, backup and manage a secondary user database. We believe users should be able to choose any personal device to be their authentication token, whether it is their mobile phone, tablet, laptop or even their desk phone.
- Previous
- You're on page 1
- Next