A unified endpoint management solution that enables wealth management firms to securely deliver applications, desktops, and data to any device. Features include micro-VPN technology for secure connections, containerization of financial applications, adaptive authentication, secure content collaboration, and granular policy controls for regulatory compliance.
Tablets and smartphones with enhanced security features allowing advisors to access client information and financial planning tools while meeting with clients outside the office.
More Secure Mobile Devices
More Wealth Management ...
Multi-Factor Authentication (MFA) Requires users to provide multiple forms of identification before granting access. |
Product description references adaptive authentication including support for multi-factor authentication (MFA). | |
Biometric Authentication Supports authentication via fingerprint, facial recognition, or iris scanning. |
Biometric authentication is supported within Citrix Endpoint Management for device security on iOS and Android. | |
Single Sign-On (SSO) Allows users to use one set of login credentials across multiple related systems. |
Single Sign-On (SSO) support is available as part of Citrix's suite; this is commonly available for enterprise managed apps. | |
Role-Based Access Control (RBAC) Grants access based on user roles, limiting exposure to sensitive features and data. |
Role-based access is a core policy management feature for Citrix Endpoint Management. | |
Time-based Access Restrictions Restricts platform access to set periods for added security and oversight. |
Supports time-based access restrictions through centralized policy controls. | |
Geofencing Limits platform access to predefined geographic locations. |
Geofencing is part of Citrix Endpoint Management's policy capabilities for contextual access. | |
Session Timeout Automatically logs out users after a period of inactivity. |
No information available | |
Device Registration Allows only registered and approved devices to access sensitive information. |
Device registration is required for enrollment before accessing protected corporate resources. | |
Jailbreak/Root Detection Detects devices with compromised operating systems and restricts access. |
Jailbreak/root detection is specifically called out as a security feature for Citrix Endpoint Management. | |
Remote Lock/Wipe Ability to lock or erase device data remotely if lost or stolen. |
Remote lock/wipe is a foundational MDM/EMM feature provided by Citrix Endpoint Management. | |
Customizable Password Policies Enforces complexity and frequency rules for password creation and updates. |
Customizable password policies are covered through policy controls in Citrix Endpoint Management. | |
User Activity Logging Tracks user actions on the platform for accountability and investigation. |
User activity logging is available for managed devices and applications, for compliance and monitoring. | |
Access Approval Workflow Requires admin approval before granting user or device access. |
Access approval workflow can be established through device enrollment and admin approval processes. |
End-to-End Encryption Encrypts data at rest and in transit between devices and servers. |
End-to-End Encryption is enforced utilizing containerization and encrypted communications for app data and transport. | |
On-Device Data Encryption Secures stored data locally on the mobile device using encryption. |
On-Device Data Encryption is included as a security measure for managed corporate data. | |
Secure Backup Backs up data securely in compliance with privacy standards. |
Secure backup/restore procedures available as part of secure workspace solutions. | |
Encrypted Communications Ensures all messaging, calls, and file transfers are encrypted. |
Encrypted communications between devices and Citrix backend are a fundamental offering (micro-VPN and SSL/TLS). | |
Secure Key Management Safeguards encryption keys with restricted access and best practices. |
Citrix provides secure key management as part of app/container security best practices. | |
Data Masking Masks sensitive financial data displayed on screens to prevent exposure. |
No information available | |
Granular Encryption Levels Allows different levels of encryption for different data types. |
Granular encryption levels are supported through per-app and per-policy configurations. | |
Privacy Policy Transparency Displays clear information about data collection, use, and sharing. |
Citrix maintains clear privacy policies about data usage and storage; available publicly for transparency. | |
Compliance with GDPR/CCPA Adheres to data privacy regulations such as GDPR or CCPA. |
Citrix designs its services to comply with GDPR and CCPA; compliance statements are public. | |
Audit Logging Maintains logs of all access and changes to client data for auditing. |
Audit logging is a key capability for all configuration changes and access to data in Citrix Endpoint Management. | |
Secure Cache Management Automatically clears or encrypts application cache to prevent data leaks. |
Secure cache management (containerization auto-clears or encrypts cache for protected apps). |
MDM Integration Offers compatibility with leading MDM solutions for device oversight. |
Citrix is compatible with leading third-party MDM solutions. | |
Device Inventory Tracking Tracks all approved devices accessing financial systems. |
Device inventory and posture tracking are available via admin portal. | |
App Whitelisting/Blacklisting Prevents installation or use of non-approved applications. |
App whitelisting/blacklisting is configurable as part of device policy. | |
Mobile Threat Detection Continuously monitors for malware, phishing, or other threats. |
Mobile threat detection (against malware etc.) is included, with alerts for compromised devices. | |
Patch & Update Management Ensures devices and apps are running the latest secure versions. |
Patch/update management for devices and managed apps is core to endpoint management. | |
VPN Enforcement Requires VPN connections for external or remote access. |
VPN enforcement is referenced as Citrix micro-VPN, required for secure external app connections. | |
Compliance Reporting Generates reports on device compliance with security policies. |
Compliance reporting available as part of dashboards and policy enforcement. | |
Remote Configuration Centrally manages security settings and configurations across devices. |
Remote configuration is offered to manage settings and policies centrally. | |
Lost Device Tracking Allows real-time location and status tracking of lost devices. |
Lost device tracking (last known location) is available for managed devices. | |
Security Incident Alerts Automatically notifies administrators of security breaches or risks. |
Security incident alerts are a staple of the product’s compliance and security dashboard. | |
Usage Analytics Provides analytics on device engagement and usage by advisors. |
No information available |
Intuitive Navigation Easy-to-use interface for advisors and clients. |
Citrix is widely regarded for its usability, and interface is designed for ease of use. | |
Customizable Dashboard Allows users to personalize information and shortcuts. |
Customizable dashboards for IT/admins are available in the admin console. | |
Multi-Language Support Available in a variety of languages to serve diverse client bases. |
No information available | |
Accessibility Features Supports screen readers, high contrast mode, and large text. |
Accessibility features are included, such as compatibility with OS-level accessibility settings. | |
Offline Mode Limited functionality without network connection for emergencies. |
Offline mode is supported for certain managed/synced content (e.g., secure content collaboration). | |
In-App Notifications Provides timely alerts and updates to users inside the app. |
In-app notifications can be configured for managed mobile apps. | |
Seamless Document Upload/Download Secure and easy handling of financial documents. |
Secure document upload/download is a primary feature of Citrix content collaboration. | |
Dedicated Client/Advisor Portal Separate portal areas for advisors and clients with tailored functions. |
Portals can be separated by user roles (admin, IT, user) for tailored functions. | |
Voice Assistant Integration Integrates with voice assistants for hands-free operation. |
No information available | |
Search Functionality Advanced search tools for transactions, documents, and contacts. |
Search for files, devices, users and settings available from the management portal. | |
Responsive Design Adapts interface for phones, tablets, and different screen sizes. |
Responsive design is implemented for device-agnostic management and app access. |
Transaction Approvals Requires one or more approvals before large or sensitive transactions proceed. |
Transaction approval workflows are supported via policy (device/app access, not financial transactions). | |
Real-Time Transaction Monitoring Monitors and flags potentially suspicious activity as it happens. |
Real-time activity monitoring is a key part of security monitoring. | |
Limits on Transaction Amounts Configurable maximums for transactions approved via mobile. |
No information available | |
Automated Fraud Detection AI-based detection and prevention of fraudulent transactions. |
No information available | |
Transaction Notifications Instant alerts for every transaction initiated or completed. |
Notifications for device and policy events, and optionally app activity, can be set for users/admins. | |
Dual Authorization Two users must independently authorize critical transactions. |
No information available | |
Audit Trail of Transactions Comprehensive log of all transaction details and authorizations. |
Comprehensive audit trail for device, app and administrative actions is standard. | |
Regulatory Compliance Checks Automated screening of transactions for regulatory compliance. |
Automated compliance checks are part of regulatory compliance capabilities. | |
Transaction Reversal Tools Ability to reverse incorrect or fraudulent transactions swiftly. |
Reversal/remediation tools for device/app security incidents are available; financial transaction reversal not directly supported. | |
User Permissions for Transaction Types Administrator control to restrict types of transactions by user. |
User/role permissions for device/app access and policies can be set and managed. |
API Access Robust, secure API for integrating with other platforms and services. |
API access is provided for integration and automation with other IT, identity, and monitoring systems. | |
Data Import/Export Allows seamless transfer of financial information to and from other systems. |
Data import/export for device inventory and policy configurations is possible. | |
CRM Integration Integrates with Client Relationship Management software. |
Integrates with leading CRM systems for device/user info. | |
Portfolio Management Integration Works with third-party portfolio management and analytics tools. |
No information available | |
Bank Connection Aggregation Aggregates holdings and balances from multiple banks and custodians. |
No information available | |
Document Management Integration Connects with document storage and e-signature platforms. |
Integrates with document management platforms (Citrix ShareFile/Content Collaboration, e-signature). | |
Secure Open Banking Support Supports open banking APIs with OAuth2 and PSD2 compliance. |
Open banking APIs are supported in Citrix Workspace for financial workflows; OAuth2 support included. | |
Alerting System Integrations Can send alerts to external monitoring and support systems. |
No information available | |
App Marketplace Compatibility Supports plug-ins and third-party apps from curated marketplaces. |
Marketplace integration for plug-ins available via Citrix Cloud. | |
Single Data Format Standardization Uses open standards for financial data for easier interoperability. |
Supports standard data formats for device, application and reporting interoperability. |
Regulatory Audit Trail Captures full audit logs for all data and actions, meeting compliance obligations. |
Regulatory audit logging for all device, authentication and policy events is available. | |
Real-Time Compliance Alerts Instantly flags actions or transactions that may breach compliance rules. |
Real-time compliance alerts provided via admin dashboard and notifications. | |
Scheduled Compliance Reporting Automatically generates and distributes compliance reports. |
Scheduled compliance and activity reports are customizable and can be automated. | |
Role-Based Compliance Controls Compliance checks vary based on user roles and access. |
Role-based compliance controls configured via policy settings. | |
e-Discovery Support Facilitates discovery of electronic records for legal/audit review. |
No information available | |
Customizable Policy Engine Policy rules can be tailored to organizational and regulatory needs. |
Customizable policy engines allow admins to tailor controls to organizational needs. | |
Conflict of Interest Monitoring Detects and reports potential advisor conflicts. |
No information available | |
Transaction Reporting Standards Supports formats (e.g., SWIFT, FIX) required for external reporting. |
No information available | |
Automated Record Retention Automatically applies record retention/destruction based on policy. |
Automated record retention for device and event logs were referenced in product documentation. | |
Data Residency Awareness Ensures data is stored in approved jurisdictions. |
Citrix Endpoint Management offers data residency controls and awareness as required for compliance. |
Secure In-App Messaging Enables end-to-end encrypted communication between users. |
Secure in-app messaging is available in Citrix Workspace (Teams integration, etc.). | |
Document Sharing and Signatures Securely share, collaborate and sign important documents. |
Document sharing/signature features offered through Citrix Content Collaboration. | |
Client Scheduling Tools Integrates calendars and scheduling for advisor-client meetings. |
No information available | |
Group Chat Capability Supports group discussions among teams or family members. |
No information available | |
Push Notification Channel Provides immediate client/advisor updates and reminders. |
Push notifications (alerts, reminders) available to devices and admins. | |
Voice and Video Communication Enables secure audio and video calls through the app. |
Secure voice/video conferencing is available as part of Citrix integrations, although would rely on third party tools. | |
Audit Logging of Communications Maintains logs for all advisor-client communications for compliance. |
No information available | |
Conversation Archival and Search Archives all chat and call transcripts and allows keyword searching. |
No information available | |
Automated Meeting Summaries Records and summarizes client meetings for audit and convenience. |
No information available | |
Integration with Email/Other Channels Can synchronize communications with email, SMS, or third-party chat. |
Integration with email and other channels (such as Teams and Slack) available for communication. |
99.99% Uptime SLA Guaranteed uptime or availability level for the application. |
No information available | |
Real-Time Performance Monitoring Tracks system performance metrics for rapid issue detection. |
Real-time performance monitoring available via admin console. | |
Scalability Supports growing users or device numbers without service degradation. |
Citrix is designed for enterprise scalability, supporting large user/device populations. | |
Load Balancing Balances traffic across servers for optimal responsiveness. |
Full load balancing is standard in Citrix architecture. | |
Disaster Recovery Plan Comprehensive plan and backup for service continuity after outage. |
Disaster recovery planning and service continuity included in enterprise plans. | |
Auto Failover Seamlessly switches users to backup systems in case of primary failure. |
Auto-failover support is built into the cloud-based Citrix platform. | |
Response Time Average time for screen or transaction to load/process. |
No information available | |
Regular Maintenance Scheduling Planned maintenance that does not interrupt critical user activity. |
Maintenance schedules are managed with user notification and failover to minimize impact. | |
Bug Reporting & Resolution SLA Defined timelines for responding to and fixing reported bugs. |
No information available | |
User Feedback Loop Allows real users to report issues and suggest improvements. |
User feedback mechanisms are included for administrators and end users. |
Guided Onboarding Step-by-step instructions for initial setup for users and administrators. |
Guided onboarding is provided for both users and administrators. | |
In-App Tutorials & Help Embedded resources to assist new or returning users. |
In-app tutorials and contextual help are available in the admin and user portal. | |
24/7 Help Desk Support Continuous support by phone, chat, or web. |
24/7 help desk support is available for enterprise clients. | |
Knowledge Base Online repository of FAQs, guides and troubleshooting tips. |
A comprehensive knowledge base is provided online. | |
Dedicated Account Manager Assigned specialist for organizational needs and issue escalation. |
Dedicated account managers are offered for enterprise/regulated industry customers. | |
Flexible Deployment Options Supports cloud, on-premises, or hybrid deployment models. |
Supports cloud, on-premises, and hybrid deployments as stated in product documentation. | |
User Role Training Programs Custom training by user function (advisor, admin, client). |
Training modules exist for different user roles (admin, IT, general users). | |
API Documentation Complete documentation for developers integrating the platform. |
Full public API documentation provided online. | |
Test/Sandbox Environment Safe environment for testing new features/configurations. |
Test/sandbox environments available for admins to validate policy changes. | |
Feedback & Feature Request System Enables users to submit suggestions and requests for enhancements. |
Feature request and feedback channels are available for customers. |
This data was generated by an AI system. Please check
with the supplier. While you are talking to them, remind them that they need
to update their entry.