Submit Search
Upload
Who Are Citrix Customers?
•
Download as PPTX, PDF
•
7 likes
•
8,694 views
Citrix
Follow
A snapshot of Citrix customer facts & figures.
Read less
Read more
Technology
Report
Share
Report
Share
1 of 16
Download now
Recommended
Deconstructing SaaS: A Deep Dive into Building Multi-tenant Solutions on AWS ...
Deconstructing SaaS: A Deep Dive into Building Multi-tenant Solutions on AWS ...
Amazon Web Services
Cloud computing and data security
Cloud computing and data security
Mohammed Fazuluddin
Network Centric to Data Centric Networks (Data Distribution Service)
Network Centric to Data Centric Networks (Data Distribution Service)
Adil Khan
Cloud Security (AWS)
Cloud Security (AWS)
Scott Arveseth
Cloud computing
Cloud computing
pgayatrinaidu
AWS Security Best Practices in a Zero Trust Security Model - DEM08 - Toronto ...
AWS Security Best Practices in a Zero Trust Security Model - DEM08 - Toronto ...
Amazon Web Services
القوى التنافسية لبورتر وسوق الرسائل القصيرة فى المملكة العربية السعودية
القوى التنافسية لبورتر وسوق الرسائل القصيرة فى المملكة العربية السعودية
Mohamed Ali Salem ,MBA,PMP,Scrum
AWS Smart Factory - 이세현, 조이정, 정현아, 김대근, 정창호, 김지선, AWS 솔루션즈 아키텍트 :: AWS Summit...
AWS Smart Factory - 이세현, 조이정, 정현아, 김대근, 정창호, 김지선, AWS 솔루션즈 아키텍트 :: AWS Summit...
Amazon Web Services Korea
Recommended
Deconstructing SaaS: A Deep Dive into Building Multi-tenant Solutions on AWS ...
Deconstructing SaaS: A Deep Dive into Building Multi-tenant Solutions on AWS ...
Amazon Web Services
Cloud computing and data security
Cloud computing and data security
Mohammed Fazuluddin
Network Centric to Data Centric Networks (Data Distribution Service)
Network Centric to Data Centric Networks (Data Distribution Service)
Adil Khan
Cloud Security (AWS)
Cloud Security (AWS)
Scott Arveseth
Cloud computing
Cloud computing
pgayatrinaidu
AWS Security Best Practices in a Zero Trust Security Model - DEM08 - Toronto ...
AWS Security Best Practices in a Zero Trust Security Model - DEM08 - Toronto ...
Amazon Web Services
القوى التنافسية لبورتر وسوق الرسائل القصيرة فى المملكة العربية السعودية
القوى التنافسية لبورتر وسوق الرسائل القصيرة فى المملكة العربية السعودية
Mohamed Ali Salem ,MBA,PMP,Scrum
AWS Smart Factory - 이세현, 조이정, 정현아, 김대근, 정창호, 김지선, AWS 솔루션즈 아키텍트 :: AWS Summit...
AWS Smart Factory - 이세현, 조이정, 정현아, 김대근, 정창호, 김지선, AWS 솔루션즈 아키텍트 :: AWS Summit...
Amazon Web Services Korea
Cloud Computing
Cloud Computing
Naveed Farooq
Fundamental Cloud Security
Fundamental Cloud Security
Mohammed Sajjad Ali
introduction to cloudsim
introduction to cloudsim
Jassika
How to build a FullStack Airline Ticketing Web App.pdf
How to build a FullStack Airline Ticketing Web App.pdf
Amazon Web Services
AWS Journey through the AWS Cloud: Disaster Recovery
AWS Journey through the AWS Cloud: Disaster Recovery
Amazon Web Services
Netwrix Auditor Overview 28 June 2017.pptx
Netwrix Auditor Overview 28 June 2017.pptx
AdrianoSimao6
Cloud computing
Cloud computing
Sreehari820
Amazon SageMaker
Amazon SageMaker
Amazon Web Services
[NEW LAUNCH!] Introducti[NEW LAUNCH!] Introduction to event-driven architectu...
[NEW LAUNCH!] Introducti[NEW LAUNCH!] Introduction to event-driven architectu...
Amazon Web Services
Azure Fundamentals Part 3
Azure Fundamentals Part 3
CCG
AWS Landing Zone Deep Dive (ENT350-R2) - AWS re:Invent 2018
AWS Landing Zone Deep Dive (ENT350-R2) - AWS re:Invent 2018
Amazon Web Services
Cloud Computing Security
Cloud Computing Security
Ninh Nguyen
AWS re:Invent 2016: Get the Most from AWS KMS: Architecting Applications for ...
AWS re:Invent 2016: Get the Most from AWS KMS: Architecting Applications for ...
Amazon Web Services
AWS Simple Storage Service (s3)
AWS Simple Storage Service (s3)
zekeLabs Technologies
Cloud Economics and calculating CTO - AWSome Day Zurich 112016
Cloud Economics and calculating CTO - AWSome Day Zurich 112016
Amazon Web Services
Cloud Security Strategy
Cloud Security Strategy
Capgemini
AWSにおけるセキュリティの考え方
AWSにおけるセキュリティの考え方
morisshi
Cloud computing applications for e health
Cloud computing applications for e health
Hector Martin Garcia
Cloud Computing & CloudStack Open Source
Cloud Computing & CloudStack Open Source
AhmadShah Sultani
Track 5 Session 3_ 迎戰DDoS攻擊的資安最佳實踐.pptx
Track 5 Session 3_ 迎戰DDoS攻擊的資安最佳實踐.pptx
Amazon Web Services
Building The Digital Workplace
Building The Digital Workplace
Citrix
Maximize your Investment in Microsoft Office 365 with Citrix Workspace
Maximize your Investment in Microsoft Office 365 with Citrix Workspace
Citrix
More Related Content
What's hot
Cloud Computing
Cloud Computing
Naveed Farooq
Fundamental Cloud Security
Fundamental Cloud Security
Mohammed Sajjad Ali
introduction to cloudsim
introduction to cloudsim
Jassika
How to build a FullStack Airline Ticketing Web App.pdf
How to build a FullStack Airline Ticketing Web App.pdf
Amazon Web Services
AWS Journey through the AWS Cloud: Disaster Recovery
AWS Journey through the AWS Cloud: Disaster Recovery
Amazon Web Services
Netwrix Auditor Overview 28 June 2017.pptx
Netwrix Auditor Overview 28 June 2017.pptx
AdrianoSimao6
Cloud computing
Cloud computing
Sreehari820
Amazon SageMaker
Amazon SageMaker
Amazon Web Services
[NEW LAUNCH!] Introducti[NEW LAUNCH!] Introduction to event-driven architectu...
[NEW LAUNCH!] Introducti[NEW LAUNCH!] Introduction to event-driven architectu...
Amazon Web Services
Azure Fundamentals Part 3
Azure Fundamentals Part 3
CCG
AWS Landing Zone Deep Dive (ENT350-R2) - AWS re:Invent 2018
AWS Landing Zone Deep Dive (ENT350-R2) - AWS re:Invent 2018
Amazon Web Services
Cloud Computing Security
Cloud Computing Security
Ninh Nguyen
AWS re:Invent 2016: Get the Most from AWS KMS: Architecting Applications for ...
AWS re:Invent 2016: Get the Most from AWS KMS: Architecting Applications for ...
Amazon Web Services
AWS Simple Storage Service (s3)
AWS Simple Storage Service (s3)
zekeLabs Technologies
Cloud Economics and calculating CTO - AWSome Day Zurich 112016
Cloud Economics and calculating CTO - AWSome Day Zurich 112016
Amazon Web Services
Cloud Security Strategy
Cloud Security Strategy
Capgemini
AWSにおけるセキュリティの考え方
AWSにおけるセキュリティの考え方
morisshi
Cloud computing applications for e health
Cloud computing applications for e health
Hector Martin Garcia
Cloud Computing & CloudStack Open Source
Cloud Computing & CloudStack Open Source
AhmadShah Sultani
Track 5 Session 3_ 迎戰DDoS攻擊的資安最佳實踐.pptx
Track 5 Session 3_ 迎戰DDoS攻擊的資安最佳實踐.pptx
Amazon Web Services
What's hot
(20)
Cloud Computing
Cloud Computing
Fundamental Cloud Security
Fundamental Cloud Security
introduction to cloudsim
introduction to cloudsim
How to build a FullStack Airline Ticketing Web App.pdf
How to build a FullStack Airline Ticketing Web App.pdf
AWS Journey through the AWS Cloud: Disaster Recovery
AWS Journey through the AWS Cloud: Disaster Recovery
Netwrix Auditor Overview 28 June 2017.pptx
Netwrix Auditor Overview 28 June 2017.pptx
Cloud computing
Cloud computing
Amazon SageMaker
Amazon SageMaker
[NEW LAUNCH!] Introducti[NEW LAUNCH!] Introduction to event-driven architectu...
[NEW LAUNCH!] Introducti[NEW LAUNCH!] Introduction to event-driven architectu...
Azure Fundamentals Part 3
Azure Fundamentals Part 3
AWS Landing Zone Deep Dive (ENT350-R2) - AWS re:Invent 2018
AWS Landing Zone Deep Dive (ENT350-R2) - AWS re:Invent 2018
Cloud Computing Security
Cloud Computing Security
AWS re:Invent 2016: Get the Most from AWS KMS: Architecting Applications for ...
AWS re:Invent 2016: Get the Most from AWS KMS: Architecting Applications for ...
AWS Simple Storage Service (s3)
AWS Simple Storage Service (s3)
Cloud Economics and calculating CTO - AWSome Day Zurich 112016
Cloud Economics and calculating CTO - AWSome Day Zurich 112016
Cloud Security Strategy
Cloud Security Strategy
AWSにおけるセキュリティの考え方
AWSにおけるセキュリティの考え方
Cloud computing applications for e health
Cloud computing applications for e health
Cloud Computing & CloudStack Open Source
Cloud Computing & CloudStack Open Source
Track 5 Session 3_ 迎戰DDoS攻擊的資安最佳實踐.pptx
Track 5 Session 3_ 迎戰DDoS攻擊的資安最佳實踐.pptx
More from Citrix
Building The Digital Workplace
Building The Digital Workplace
Citrix
Maximize your Investment in Microsoft Office 365 with Citrix Workspace
Maximize your Investment in Microsoft Office 365 with Citrix Workspace
Citrix
XenApp on Google Cloud Deployment Guide
XenApp on Google Cloud Deployment Guide
Citrix
Deploying Citrix XenApp & XenDesktop Service on Google Cloud Platform
Deploying Citrix XenApp & XenDesktop Service on Google Cloud Platform
Citrix
Manage Risk by Protecting the Apps and Data That Drive Business Productivity
Manage Risk by Protecting the Apps and Data That Drive Business Productivity
Citrix
How do Organizations Plan to Assure Application Delivery in a Multi-Cloud World?
How do Organizations Plan to Assure Application Delivery in a Multi-Cloud World?
Citrix
Workforce Flexibility Can Drive Greater Engagement & Productivity
Workforce Flexibility Can Drive Greater Engagement & Productivity
Citrix
Citrix Cloud Services: Total Economic Benefits Assessment Guide
Citrix Cloud Services: Total Economic Benefits Assessment Guide
Citrix
The Growing U.S. IT Productivity Gap
The Growing U.S. IT Productivity Gap
Citrix
Citrix Cloud Services: Total Economic Benefits Assessment Guide
Citrix Cloud Services: Total Economic Benefits Assessment Guide
Citrix
Citrix Synergy 2017: Technology Keynote Sketch Notes
Citrix Synergy 2017: Technology Keynote Sketch Notes
Citrix
Citrix Synergy 2017: Malcolm Gladwell Innovation Super Session Sketch Notes
Citrix Synergy 2017: Malcolm Gladwell Innovation Super Session Sketch Notes
Citrix
Synergy 2017: Colin Powell Innovation Super Session Sketch Notes
Synergy 2017: Colin Powell Innovation Super Session Sketch Notes
Citrix
Manage risk by protecting apps, data and usage
Manage risk by protecting apps, data and usage
Citrix
Enterprise Case Study: Enabling a More Mobile Way of Working
Enterprise Case Study: Enabling a More Mobile Way of Working
Citrix
Life in the Digital Workspace
Life in the Digital Workspace
Citrix
Comparing traditional workspaces to digital workspaces
Comparing traditional workspaces to digital workspaces
Citrix
4 Ways to Ensure a Smooth Windows 10 Migration
4 Ways to Ensure a Smooth Windows 10 Migration
Citrix
Citrix Paddington
Citrix Paddington
Citrix
The Security Compliance Countdown: How to Get Ahead of the GDPR [Infographic]
The Security Compliance Countdown: How to Get Ahead of the GDPR [Infographic]
Citrix
More from Citrix
(20)
Building The Digital Workplace
Building The Digital Workplace
Maximize your Investment in Microsoft Office 365 with Citrix Workspace
Maximize your Investment in Microsoft Office 365 with Citrix Workspace
XenApp on Google Cloud Deployment Guide
XenApp on Google Cloud Deployment Guide
Deploying Citrix XenApp & XenDesktop Service on Google Cloud Platform
Deploying Citrix XenApp & XenDesktop Service on Google Cloud Platform
Manage Risk by Protecting the Apps and Data That Drive Business Productivity
Manage Risk by Protecting the Apps and Data That Drive Business Productivity
How do Organizations Plan to Assure Application Delivery in a Multi-Cloud World?
How do Organizations Plan to Assure Application Delivery in a Multi-Cloud World?
Workforce Flexibility Can Drive Greater Engagement & Productivity
Workforce Flexibility Can Drive Greater Engagement & Productivity
Citrix Cloud Services: Total Economic Benefits Assessment Guide
Citrix Cloud Services: Total Economic Benefits Assessment Guide
The Growing U.S. IT Productivity Gap
The Growing U.S. IT Productivity Gap
Citrix Cloud Services: Total Economic Benefits Assessment Guide
Citrix Cloud Services: Total Economic Benefits Assessment Guide
Citrix Synergy 2017: Technology Keynote Sketch Notes
Citrix Synergy 2017: Technology Keynote Sketch Notes
Citrix Synergy 2017: Malcolm Gladwell Innovation Super Session Sketch Notes
Citrix Synergy 2017: Malcolm Gladwell Innovation Super Session Sketch Notes
Synergy 2017: Colin Powell Innovation Super Session Sketch Notes
Synergy 2017: Colin Powell Innovation Super Session Sketch Notes
Manage risk by protecting apps, data and usage
Manage risk by protecting apps, data and usage
Enterprise Case Study: Enabling a More Mobile Way of Working
Enterprise Case Study: Enabling a More Mobile Way of Working
Life in the Digital Workspace
Life in the Digital Workspace
Comparing traditional workspaces to digital workspaces
Comparing traditional workspaces to digital workspaces
4 Ways to Ensure a Smooth Windows 10 Migration
4 Ways to Ensure a Smooth Windows 10 Migration
Citrix Paddington
Citrix Paddington
The Security Compliance Countdown: How to Get Ahead of the GDPR [Infographic]
The Security Compliance Countdown: How to Get Ahead of the GDPR [Infographic]
Recently uploaded
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
panagenda
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
Neo4j
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
LoriGlavin3
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
Hiroshi SHIBATA
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App Framework
Pixlogix Infotech
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
Mydbops
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
LoriGlavin3
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
BookNet Canada
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
ThousandEyes
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
Wes McKinney
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
LoriGlavin3
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
Manik S Magar
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
itnewsafrica
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
LoriGlavin3
How to write a Business Continuity Plan
How to write a Business Continuity Plan
Databarracks
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
itnewsafrica
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
Inflectra
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)
Kaya Weers
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog Presentation
Knoldus Inc.
A Framework for Development in the AI Age
A Framework for Development in the AI Age
Cprime
Recently uploaded
(20)
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App Framework
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
How to write a Business Continuity Plan
How to write a Business Continuity Plan
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog Presentation
A Framework for Development in the AI Age
A Framework for Development in the AI Age
Who Are Citrix Customers?
1.
1 © 2016
Citrix | Confidential
2.
2 © 2016
Citrix | Confidential
3.
3 © 2016
Citrix | Confidential
4.
4 © 2016
Citrix | Confidential
5.
5 © 2016
Citrix | Confidential
6.
6 © 2016
Citrix | Confidential
7.
7 © 2016
Citrix | Confidential
8.
8 © 2016
Citrix | Confidential
9.
9 © 2016
Citrix | Confidential
10.
10 © 2016
Citrix | Confidential
11.
11 © 2016
Citrix | Confidential
12.
12 © 2016
Citrix | Confidential
13.
13 © 2016
Citrix | Confidential
14.
14 © 2016
Citrix | Confidential
15.
15 © 2016
Citrix | Confidential
16.
Work better. Live
better. 16 © 2016 Citrix | Confidential Visit www.citrix.com/customers to learn more about how our customers use Citrix.
Download now