A common question I receive as Security Product Manager for XenApp and XenDesktop is “what information is left behind after the Citrix ICA client executes?” This happens most often for PCI DSS and HIPAA audits and the question is normally


  

Related Stories

Share →