![Citrix receiver for mac download Citrix receiver for mac download](/uploads/1/2/5/5/125598939/505826627.png)
Citrix Receiver Receiver for Mac Subscribe to RSS notifications of new downloads. Receiver for Mac. Receiver 12.9.1 for Mac. We are sorry! The item you are trying to access is restricted and requires additional permissions! Find helpful customer reviews and review ratings for Citrix Receiver at. The Citrix Reciever provides the bridge between my MAC OS and a specific Windows. The applications of our hospital EMR, once inside O2, the user interface is so.
General Information Technologies must be operated and maintained in accordance with Federal and Department security and privacy policies and guidelines. More information on the proper use of the TRM can be found on the. Website: Description: Citrix Receiver is a software that provides secure access to virtual desktops, applications, and Information Technology (IT) services from various platforms and devices. This technology enables users to manage enterprise data, applications, and desktops through secure, centralized deployment to any user device. This entry covers the Desktop Edition of this technology and not any mobile versions. See Category tab/Comparable for the corresponding Mobile entry. Note: The implementation of mobile technology application that operates on Mobile Operating System must be reviewed and approved by the Mobile Technology and Endpoint Security Engineering Team: The TRM decisions in this entry only apply to technologies and versions owned, operated, managed, patched, and version-controlled by VA.
This includes technologies deployed as software on VMs within VA-controlled cloud environments (e.g. VA Enterprise Cloud (VAEC)).
Cloud services provided by the VAEC and those controlled and managed by an external Cloud Service Provider (i.e. SaaS) are not in the purview of the TRM. For more information on the use of cloud services and cloud-based products within VA, including VA private clouds, please see the Enterprise Cloud Solutions Office (ECSO) Portal at: Technology/Standard Usage Requirements: Users must ensure their use of this technology/standard is consistent with VA policies and standards, including, but not limited to, VA Handbooks 6102 and 6500; VA Directives 6004, 6513, and 6517; and National Institute of Standards and Technology (NIST) standards, including Federal Information Processing Standards (FIPS).
Users must ensure sensitive data is properly protected in compliance with all VA regulations. Prior to use of this technology, users should check with their supervisor, Information Security Officer (ISO), Facility Chief Information Officer (CIO), or local Office of Information and Technology (OI&T) representative to ensure that all actions are consistent with current VA policies and procedures prior to implementation. Section 508 Information: This technology has not been assessed by the Section 508 Office. The Implementer of this technology has the responsibility to ensure the version deployed is 508-compliant. Section 508 compliance may be reviewed by the Section 508 Office and appropriate remedial action required if necessary. For additional information or assistance regarding Section 508, please contact the Section 508 Office at [email protected]. Decision: Decision Constraints: Users should check with their supervisor, Information Security Office (ISO) or local OIT representative for permission to download and use this software.
Downloaded software must always be scanned for viruses prior to installation to prevent adware or malware. Freeware may only be downloaded directly from the primary site that the creator of the software has advertised for public download and user or development community engagement.
Users should note, any attempt by the installation process to install any additional, unrelated software is not approved and the user should take the proper steps to decline those installations. Veterans Affairs (VA) users must ensure VA sensitive data is properly protected in compliance with all VA regulations. All instances of deployment using this technology should be reviewed by the local ISO (Information Security Officer) to ensure compliance with. Due to identified security vulnerabilities, extra vigilance should be applied to ensure the versions remain properly patched to mitigate known and future vulnerabilities. The local ISO can provide assistance in reviewing the NIST vulnerabilities. Due to potential information security risks, cloud based technologies may not be used without the approval of the VA Enterprise Cloud Services (ECS) Group. This body is in part responsible for ensuring organizational information, Personally Identifiable Information (PII), Protected Health Information (PHI), and VA sensitive data are not compromised.
(Ref:, and ). Decision Source: TRM Mgmt Group Decision Process: One-VA TRM v18.9 Decision Date: Introduced By: TRM Request Vendor Name. Vendor Release Information The Vendor Release table provides the known releases for the TRMÂ Technology, obtained from the vendor (or from the release source). Note: This list may not be complete.
No component, listed or unlisted, may be used outside of the technology in which it is released. The usage decision for a component is found in the Decision and Decision Constraints. Name Description This module enables users to create enterprise application stores that aggregate resources from XenDesktop, XenApp, and Virtual Desktop Infrastructure (VDI)-in-a-Box in one place. This module provides an auto-update feature for this software. The Web Interface provides users with access to XenApp applications and content and XenDesktop virtual desktops. Users access their resources through a standard Web browser or through the Citrix online plug-in.