Information Risk Management Case Study: Penetration Test - Citrix

Download Now Free registration required

Executive Summary

Citrix deployments are often utilised to provide restricted-functionality environments to internal staff and third-party organisations, including contractors and external consultants. If not adequately secured these environments provide a wealth of opportunity for the 'Interested' or malicious user to gain elevated levels of access to networked systems. IRM identifies the security and business risks present within a Citrix environment to enable financial institutions to mitigate those risks to an acceptable level. IRM adds value to the penetration testing process by providing deeply technical business consultants who deliver findings in terms of the necessary business impact analysis to the information security managers who demand it.

  • Format: PDF
  • Size: 0 KB