128 Technology Identity Context Driver

See all products by this partner 

128 Technology Identity Context Driver is a Windows application that extends the benefits of 128 Technology's Secure Vector Routing all the way to the desktop.

Request Information


  • down-arrow Citrix Virtual Apps and Desktops service (XenApp and XenDesktop service)
    Citrix Virtual Apps and Desktops service

Product Details

The 128 Technology Identity Context Driver or ICD adds contextual signaling information (security identifier, username, domain name/type, process name/trust-level, device ID) to the first packet of each session. The metadata is digitally encrypted, forwarded to an upstream 128T Session Smart Router, and used to establish a secure end-to-end path across an extended network, automatically steering traffic based on real-time conditions and policies.




What are the target markets and use cases for ICD?

  • ICD is applicable to just about any customer regardless of industry, size, or geography.

Typical use cases include:

  • Optimizing VDI performance. Prioritizing Virtual Desktop Infrastructure traffic over other application traffic to eliminate network performance bottlenecks.
  • Optimizing QoE for latency-sensitive or business-critical apps. For example, ensuring delay-sensitive traffic like Citrix Virtual Apps and Desktops traffic is prioritized over other traffic.
  • Implementing identity-based access controls for shared computers. For example, in a hospital setting providing role-based network access controls and service assurances for nurses and doctors sharing Windows-based point-of-care terminals.
  • Blocking rogue users or applications. Automatically rejecting or quarantining suspicious application traffic or illicit users to strengthen security and mitigate attacks.

What customer benefits does ICD provide?

ICD helps customers:

  • Improve user experiences and worker productivity by ensuring high service quality for business-critical and latency-sensitive apps.
  • Reduce operating expenses by optimizing WAN bandwidth utilization and avoiding overprovisioning.
  • Reduce risk by protecting data privacy and defending IT infrastructure against attacks.