Armored Client for Citrix provides missing link in virtualisation security

SentryBay has announced the launch of Armored Client for Citrix which securely “wraps” the Citrix receiver – providing key endpoint and browser security for connections  to XenDesktop and XenApp installations. The solution overcomes existing security threats such as keylogging, browser vulnerabilities, DNS poisoning and session hijacking.

The endpoint software, which can be deployed alongside or post Citrix installation, ensures the security integrity of the endpoint – helping overcome key security and compliance issues.

The Armored Client launches a separate secure desktop using a one-time random user and a locked-down “armored” web client – within which the Citrix Receiver operates. No other software (including malware) is able to run within this browser session, and it also overcomes kernel-based malware threats.

Multi-level keylogging protection scrambles keystrokes, prevents screenshots and denies malware access, protecting the entry of login credentials into the Citrix Receiver. The protection operates throughout the Citrix session, securing data entry into all enterprise applications and web services. The dedicated session then leaves no trace when closed. 

Version 1 applies to HTML5-based versions of the Windows receiver, with the Citrix ReceiverWeb application versions due out shortly.  A mobile version of the solution is currently in development and will be ready to launch in 2016. This version does not require a corporate device or any MDM solution to be operating to provide the necessary endpoint and browser security. 

Deployment of the Armored Client is far more economical for enterprises than issuing corporate managed devices for remote access via Citrix.

Key technology within the solution is patented to SentryBay, meaning the blend of technologies cannot be provided by other vendors.

The technology is applicable to other virtualised clients such as VMware, Microsoft including RDP, Oracle & others.

For more information visit

+ posts


Related articles

SMEs: The Move from Legacy to the Cloud

Digital transformation is clearly a mainstream strategy, and the cloud has certainly shown its value in recent times more than ever before.

Don’t lose sight of SAP on Cloud operational excellence

Digital transformation projects can often become complex with twists and turns, which can lead organisations to focus solely on the migration itself.

Need to reduce software TCO? Focus on people

Investing in software is undoubtedly important for enterprises to stay ahead. However, the process is rarely a simple task for CIOs and IT leaders.

The future of cloud and edge optimisation

As more enterprises use multi-cloud and hybrid infrastructures, the danger of cost overruns and loss of control increases.

Here is how to stage a public cloud migration

As the relationships between CSPs and cloud providers are deepening, CSPs need to develop a clear strategy on how they add value to customer relationships.


Please enter your comment!
Please enter your name here

Subscribe to our Newsletter