product-logo

128 Technology Identity Context Driver

See all products by this partner 

128 Technology Identity Context Driver is a Windows application that extends the benefits of 128 Technology's Secure Vector Routing all the way to the desktop.

Request Information

Compatibility

  • down-arrow Citrix DaaS
    Citrix DaaS

Product Details

The 128 Technology Identity Context Driver or ICD adds contextual signaling information (security identifier, username, domain name/type, process name/trust-level, device ID) to the first packet of each session. The metadata is digitally encrypted, forwarded to an upstream 128T Session Smart Router, and used to establish a secure end-to-end path across an extended network, automatically steering traffic based on real-time conditions and policies.

Screenshots

screenshot

Advantages

What are the target markets and use cases for ICD?

  • ICD is applicable to just about any customer regardless of industry, size, or geography.

Typical use cases include:

  • Optimizing VDI performance. Prioritizing Virtual Desktop Infrastructure traffic over other application traffic to eliminate network performance bottlenecks.
  • Optimizing QoE for latency-sensitive or business-critical apps. For example, ensuring delay-sensitive traffic like Citrix Virtual Apps and Desktops traffic is prioritized over other traffic.
  • Implementing identity-based access controls for shared computers. For example, in a hospital setting providing role-based network access controls and service assurances for nurses and doctors sharing Windows-based point-of-care terminals.
  • Blocking rogue users or applications. Automatically rejecting or quarantining suspicious application traffic or illicit users to strengthen security and mitigate attacks.

What customer benefits does ICD provide?

ICD helps customers:

  • Improve user experiences and worker productivity by ensuring high service quality for business-critical and latency-sensitive apps.
  • Reduce operating expenses by optimizing WAN bandwidth utilization and avoiding overprovisioning.
  • Reduce risk by protecting data privacy and defending IT infrastructure against attacks.