IGEL Endpoints and Citrix XenDesktop
Components and hypervisors
XenDesktop also contains Citrix XenApp for publishing (shared desktop) and virtualizing applications. For mobile use, the Citrix portfolio includes the XenClient offline solution as well as the easy and affordable all-in-one VDI-in-a-Box solution. In addition to Citrix XenServer, Citrix XenDesktop also supports the Microsoft Hyper-V and VMware ESX hypervisors.
Citrix Receivers, Citrix Ready and HDX Ready
Communication with end devices typically occurs by means of the Citrix Receivers protocol. The “Citrix Ready” label certifies that a device is compatible with the Citrix Receiver software client used to access content. The “HDX Ready” designation verifies that a device is compatible with the more stringent set of features contained in the “High Definition User Experience” (HDX) technology. These capabilities start with support for USB and multi-monitor setups, continue on to multimedia streaming including flash, and extend all the way to real-time teamwork by means of VoIP and webcams as well as delivery of 3D graphics applications such as CAD/CAM.
Support from IGEL software and hardware
Citrix Ready: All IGEL Universal Desktop solutions, including IGEL’s Universal Desktop Converter software, support Citrix Receiver in conjunction with all available operating systems. In fact, starting with the IGEL firmware package, all IGEL Universal Desktop solutions are certified as HDX Ready. Furthermore, the firmware versions also support Citrix Secure Access Gateway.
Your benefits with IGEL and Citrix XenDesktop Compatible Endpoints:
- A long-standing partnership of many years between IGEL and Citrix: latest versions of ICA clients and full integration of Citrix features, such as the Secure Access Gateway client
- Good scalability: efficient delivery of individual applications and desktops over LAN and WAN systems
- Excellent user experience: Citrix HDX for USB redirection, rich media; VoIP and 3D applications, etc.
- High security: integrated encryption technology and comprehensive “Secure-by-Design” security model