Securing Citrix XenApp Server in the Enterprise

Securing Citrix XenApp Server in the Enterprise
Author: Tariq Azad
Publsiher: Syngress
Total Pages: 528
Release: 2008-08-08
ISBN: 9780080569987
Category: Computers
Language: EN, FR, DE, ES & NL

Securing Citrix XenApp Server in the Enterprise Book Excerpt:

Citrix Presentation Server allows remote users to work off a network server as if they weren't remote. That means: Incredibly fast access to data and applications for users, no third party VPN connection, and no latency issues. All of these features make Citrix Presentation Server a great tool for increasing access and productivity for remote users. Unfortunately, these same features make Citrix just as dangerous to the network it's running on. By definition, Citrix is granting remote users direct access to corporate servers?..achieving this type of access is also the holy grail for malicious hackers. To compromise a server running Citrix Presentation Server, a hacker need not penetrate a heavily defended corporate or government server. They can simply compromise the far more vulnerable laptop, remote office, or home office of any computer connected to that server by Citrix Presentation Server. All of this makes Citrix Presentation Server a high-value target for malicious hackers. And although it is a high-value target, Citrix Presentation Servers and remote workstations are often relatively easily hacked, because they are often times deployed by overworked system administrators who haven't even configured the most basic security features offered by Citrix. "The problem, in other words, isn't a lack of options for securing Citrix instances; the problem is that administrators aren't using them." (eWeek, October 2007). In support of this assertion Security researcher Petko D. Petkov, aka "pdp", said in an Oct. 4 posting that his recent testing of Citrix gateways led him to "tons" of "wide-open" Citrix instances, including 10 on government domains and four on military domains. * The most comprehensive book published for system administrators providing step-by-step instructions for a secure Citrix Presentation Server. * Special chapter by Security researcher Petko D. Petkov'aka "pdp detailing tactics used by malicious hackers to compromise Citrix Presentation Servers. * Companion Web site contains custom Citrix scripts for administrators to install, configure, and troubleshoot Citrix Presentation Server.

Securing Citrix XenApp Server in the Enterprise

Securing Citrix XenApp Server in the Enterprise
Author: Tariq Azad
Publsiher: Syngress
Total Pages: 528
Release: 2008-07-08
ISBN: 9781597492812
Category: Computers
Language: EN, FR, DE, ES & NL

Securing Citrix XenApp Server in the Enterprise Book Excerpt:

Citrix Presentation Server allows remote users to work off a network server as if they weren't remote. That means: Incredibly fast access to data and applications for users, no third party VPN connection, and no latency issues. All of these features make Citrix Presentation Server a great tool for increasing access and productivity for remote users. Unfortunately, these same features make Citrix just as dangerous to the network it's running on. By definition, Citrix is granting remote users direct access to corporate servers?..achieving this type of access is also the holy grail for malicious hackers. To compromise a server running Citrix Presentation Server, a hacker need not penetrate a heavily defended corporate or government server. They can simply compromise the far more vulnerable laptop, remote office, or home office of any computer connected to that server by Citrix Presentation Server. All of this makes Citrix Presentation Server a high-value target for malicious hackers. And although it is a high-value target, Citrix Presentation Servers and remote workstations are often relatively easily hacked, because they are often times deployed by overworked system administrators who haven't even configured the most basic security features offered by Citrix. "The problem, in other words, isn't a lack of options for securing Citrix instances; the problem is that administrators aren't using them." (eWeek, October 2007). In support of this assertion Security researcher Petko D. Petkov, aka "pdp", said in an Oct. 4 posting that his recent testing of Citrix gateways led him to "tons" of "wide-open" Citrix instances, including 10 on government domains and four on military domains. * The most comprehensive book published for system administrators providing step-by-step instructions for a secure Citrix Presentation Server. * Special chapter by Security researcher Petko D. Petkov'aka "pdp detailing tactics used by malicious hackers to compromise Citrix Presentation Servers. * Companion Web site contains custom Citrix scripts for administrators to install, configure, and troubleshoot Citrix Presentation Server.

The guide to IT contracting

The guide to IT contracting
Author: Samuel Blankson
Publsiher: Lulu.com
Total Pages: 365
Release: 2007-12-01
ISBN: 1905789203
Category: Electronic Book
Language: EN, FR, DE, ES & NL

The guide to IT contracting Book Excerpt:

Deploying Citrix MetaFrame Presentation Server 3 0 with Windows Server 2003 Terminal Services

Deploying Citrix MetaFrame Presentation Server 3 0 with Windows Server 2003 Terminal Services
Author: Melissa Craft
Publsiher: Elsevier
Total Pages: 608
Release: 2005-05-24
ISBN: 9780080488691
Category: Computers
Language: EN, FR, DE, ES & NL

Deploying Citrix MetaFrame Presentation Server 3 0 with Windows Server 2003 Terminal Services Book Excerpt:

Almost 100% of all Fortune 500 and Fortune 1000 companies use Citrix. Deploying Citrix MetaFrame Presentation Server 3.0 with Windows Server 2003 Terminal Services covers the new release to Citrix MetaFrame and how companies can deploy it in their disaster recovery plans. Server Based Computing has been established as a solid networking model for any size business. Why? Because it guarantees cost savings, fast deployment, scalability, performance, security and fast recoverability. Think "mainframe," but updated, pretty, shiny, and effective! Server based computing is the mainframe with a vengeance. Terminal Server and Citrix MetaFrame offer the advantages of the old mainframe coupled with the benefits, gadgets, and appeal of the personal computer. Manage applications from a central location and access them from anywhere Build scalable, flexible, and secure access solutions that reduce computing costs and increase the utility of your network The first book that covers Citrix MetaFrame Presentation Server 3.0 and Windows Server 2003 Terminal Services

Enterprise Single Sign On Design Guide Using IBM Security Access Manager for Enterprise Single Sign On 8 2

Enterprise Single Sign On Design Guide Using IBM Security Access Manager for Enterprise Single Sign On 8 2
Author: Axel Buecker,Nilesh Patel,Dirk Rahnenfuehrer,Joris Van Herzele,IBM Redbooks
Publsiher: IBM Redbooks
Total Pages: 494
Release: 2012-09-11
ISBN: 0738437034
Category: Computers
Language: EN, FR, DE, ES & NL

Enterprise Single Sign On Design Guide Using IBM Security Access Manager for Enterprise Single Sign On 8 2 Book Excerpt:

Everyone feels the pain of too many passwords to remember. Everyone can relate to the security exposure of weak passwords, chosen for convenience. And, everyone can relate to passwords placed in proximity to the workstation for a quick reminder. Unfortunately, that note can allow more than the intended user into the system and network. The average user today often has four or more passwords. And, security policies that focus on password complexity and password-change frequency can cause even more difficulty for users. This IBM® Redbooks® publication introduces IBM Security Access Manager for Enterprise Single Sign-On 8.2, which provides single sign-on to many applications, without a lengthy and complex implementation effort. Whether you are deploying strong authentication, implementing an enterprise-wide identity management initiative, or simply focusing on the sign-on challenges of a specific group of users, this solution can deliver the efficiencies and security that come with a well-crafted and comprehensive single sign-on solution. This book is a valuable resource for security officers, administrators, and architects who want to understand and implement an identity management solution in a medium-scale environment. This book is an update to the existing SG24-7350-01. IMPORTANT: Please note that in the latest version of SAM ESSO, the following two capabilities described in this SAM ESSO Redbooks publication have been removed: -Virtual appliance support -Mobile (iPad) support

Citrix XenAppTM Platinum Edition Advanced Concepts The Official Guide

Citrix XenAppTM Platinum Edition Advanced Concepts  The Official Guide
Author: Citrix Sytems Inc
Publsiher: McGraw Hill Professional
Total Pages: 454
Release: 2008-06-02
ISBN: 007177694X
Category: Computers
Language: EN, FR, DE, ES & NL

Citrix XenAppTM Platinum Edition Advanced Concepts The Official Guide Book Excerpt:

The Only Official Guide to All Components of Citrix XenApp Platinum Edition Citrix XenApp, the new name for Citrix Presentation Server, is an end-to-end Windows application delivery system that offers both client-side and server-side application virtualization, for optimal application performance and flexible delivery options. It's the best access experience for any user. With the secure application architecture, organizations can centralize applications and data in secure data centers, reducing costs of management and support, increasing data security, and ensuring fast, reliable performance. Build and maintain a scalable, cost-effective, and secure enterprise application delivery infrastructure with expert advice from the Citrix Product Development Team. Citrix XenApp Platinum Edition Advanced Concepts: The Official Guide explains how to configure hardware and software and centrally manage enterprise resources. You'll learn to use Citrix Conferencing Manager, Citrix Access Gateway, Citrix Password Manager, and other tools. The book also includes in-depth coverage of advanced troubleshooting techniques, disk and memory tuning methods, and security strategies. Deploy Citrix XenApp across a large enterprise successfully Understand the network bandwidth requirements of server-to-server communication, and communication between Access Management Console and servers Secure remote access with Citrix Access Gateway Administer and customize Citrix Password Manager Maximize the capabilities of Citrix Conferencing Manager Secure Citrix XenApp using certificates, encryption, and smart cards Configure Virtual IP addressing, PDA synchronization, and SpeedScreen browser acceleration Gain insights from Citrix eLabs server load and capacity hardware testing

CITRIX ACCESS SUITE 4 ADVANCED CONCEPTS THE OFFICIAL GUIDE 2 E

CITRIX ACCESS SUITE 4 ADVANCED CONCEPTS  THE OFFICIAL GUIDE  2 E
Author: Steve Kaplan,Andy Jones
Publsiher: McGraw Hill Professional
Total Pages: 641
Release: 2006-02-10
ISBN: 0071501746
Category: Computers
Language: EN, FR, DE, ES & NL

CITRIX ACCESS SUITE 4 ADVANCED CONCEPTS THE OFFICIAL GUIDE 2 E Book Excerpt:

Provides detailed and advanced configuration information for all Access Suite components Covers every installation option and provides in-depth technical information on custom installations Covers the implementation of all four database options: IBM, SQL Server, Oracle, and Access

Information Security and Ethics Concepts Methodologies Tools and Applications

Information Security and Ethics  Concepts  Methodologies  Tools  and Applications
Author: Nemati, Hamid
Publsiher: IGI Global
Total Pages: 4478
Release: 2007-09-30
ISBN: 1599049384
Category: Education
Language: EN, FR, DE, ES & NL

Information Security and Ethics Concepts Methodologies Tools and Applications Book Excerpt:

Presents theories and models associated with information privacy and safeguard practices to help anchor and guide the development of technologies, standards, and best practices. Provides recent, comprehensive coverage of all issues related to information security and ethics, as well as the opportunities, future challenges, and emerging trends related to this subject.

Securing Microsoft Terminal Services

Securing Microsoft Terminal Services
Author: Roddy Rodstein
Publsiher: Lulu.com
Total Pages: 282
Release: 2007-06
ISBN: 061514330X
Category: Computers
Language: EN, FR, DE, ES & NL

Securing Microsoft Terminal Services Book Excerpt:

"Securing Microsoft Terminal Services" shows how to use Enterprise Architecture methodologies, industry standards and best practices, such as ISO17799, CobIT, the National Security Agency (NSA) Guides, and Security Technical Implementation Guides (STIGS) to secure a Terminal Server environment. The bulk of the book is organized as a reference that lists each step to secure your Terminal Server environment. "Securing Microsoft Terminal Services" is the only book to serve as a single point of reference on Terminal Server security. This book gathers all the information into one convenient place. Rather than having to search the Internet or your favorite book store, "Securing Microsoft Terminal Services" puts the answers right at your fingertips, on your desk."

Technology Due Diligence Best Practices for Chief Information Officers Venture Capitalists and Technology Vendors

Technology Due Diligence  Best Practices for Chief Information Officers  Venture Capitalists  and Technology Vendors
Author: Andriole, Stephen J.
Publsiher: IGI Global
Total Pages: 422
Release: 2008-08-31
ISBN: 1605660191
Category: Medical
Language: EN, FR, DE, ES & NL

Technology Due Diligence Best Practices for Chief Information Officers Venture Capitalists and Technology Vendors Book Excerpt:

Due diligence conducted around technology decisions is complex. Done correctly, it has the power to enable outstanding positive outcomes; done poorly, it can wreak havoc on organizations, corporate cultures, and markets. Technology Due Diligence: Best Practices for Chief Information Officers, Venture Capitalists, and Technology Vendors develops a due diligence framework for anyone resolving technology decisions intended to help their business achieve positive results. This essential book contains actual case studies that incorporate the due diligence methodology to assist chief information officers, venture capitalists, and technology vendors who wrestle with technology acquisitions challenges on a daily basis.

Integrated Security Technologies and Solutions Volume II

Integrated Security Technologies and Solutions   Volume II
Author: Aaron Woland,Vivek Santuka,Jamie Sanbower,Chad Mitchell
Publsiher: Cisco Press
Total Pages: 2155
Release: 2019-03-28
ISBN: 0134807677
Category: Computers
Language: EN, FR, DE, ES & NL

Integrated Security Technologies and Solutions Volume II Book Excerpt:

The essential reference for security pros and CCIE Security candidates: identity, context sharing, encryption, secure connectivity and virtualization Integrated Security Technologies and Solutions – Volume II brings together more expert-level instruction in security design, deployment, integration, and support. It will help experienced security and network professionals manage complex solutions, succeed in their day-to-day jobs, and prepare for their CCIE Security written and lab exams. Volume II focuses on the Cisco Identity Services Engine, Context Sharing, TrustSec, Application Programming Interfaces (APIs), Secure Connectivity with VPNs, and the virtualization and automation sections of the CCIE v5 blueprint. Like Volume I, its strong focus on interproduct integration will help you combine formerly disparate systems into seamless, coherent, next-generation security solutions. Part of the Cisco CCIE Professional Development Series from Cisco Press, it is authored by a team of CCIEs who are world-class experts in their Cisco security disciplines, including co-creators of the CCIE Security v5 blueprint. Each chapter starts with relevant theory, presents configuration examples and applications, and concludes with practical troubleshooting. Review the essentials of Authentication, Authorization, and Accounting (AAA) Explore the RADIUS and TACACS+ AAA protocols, and administer devices with them Enforce basic network access control with the Cisco Identity Services Engine (ISE) Implement sophisticated ISE profiling, EzConnect, and Passive Identity features Extend network access with BYOD support, MDM integration, Posture Validation, and Guest Services Safely share context with ISE, and implement pxGrid and Rapid Threat Containment Integrate ISE with Cisco FMC, WSA, and other devices Leverage Cisco Security APIs to increase control and flexibility Review Virtual Private Network (VPN) concepts and types Understand and deploy Infrastructure VPNs and Remote Access VPNs Virtualize leading Cisco Security products Make the most of Virtual Security Gateway (VSG), Network Function Virtualization (NFV), and microsegmentation

The Real Citrix CCA Exam Preparation Kit

The Real Citrix CCA Exam Preparation Kit
Author: Shawn Tooley
Publsiher: Syngress
Total Pages: 632
Release: 2009-05-18
ISBN: 9780080954028
Category: Computers
Language: EN, FR, DE, ES & NL

The Real Citrix CCA Exam Preparation Kit Book Excerpt:

The Citrix Certified Administrator (CCA) credential is the first tier of Citrix certification. The CCA is most often sought out by IT professionals whose networks employ Citrix virtualization technology, and for those IT professionals who are seeking a broad base of general network expertise. The number of CCAs is estimated at between 65 and 70K, up from 45,000 in 2003. Citrix recently released a new version of its most popular product, XenApp (formerly Presentation Server). This new version is fully compatible with Windows Server 2008. To retain their CCA credential, all current CCAs will need to upgrade to the new software. This will be particularly important to those companies enrolled in Citrix partner programs, as current certification is a requirement of the program. When packaged with practice exams, this prep kit will offer an affordable, effective solution for CCA certification and re-certification. Complete exam-prep package includes full coverage of new XenApp 5.0 objectives Authored by a Citrix expert with hundreds of implementations to his credit This preparation kit can also be used as a reference guide for administrators who need to integrate XenApp 5.0 with their networks

Best Practices in Business Technology Management

Best Practices in Business Technology Management
Author: Stephen J. Andriole
Publsiher: CRC Press
Total Pages: 368
Release: 2008-09-26
ISBN: 9781420063349
Category: Computers
Language: EN, FR, DE, ES & NL

Best Practices in Business Technology Management Book Excerpt:

Despite the exponential growth of computing and communications technology, the inertia of old business technology management practices still drives most investment decisions in this area. Companies spend too much money on new technology, while their business models and processes underutilize the resources they already have. Written in a compelling, conversational manner, Best Practices in Business Technology Management advises those who buy, install, and support all types of computing and communications technology, empowering them to optimize their systems in new and innovative ways. Divided into six chapters, the book provides insight into the field, discussing decision-making, trends, alignment, optimization, processes, timing, and other areas. It includes practical hands-on advice that explores organization, the challenges of working with people, acquisition and measurement of technology, operational effectiveness, and strategic effectiveness. The best practices presented are not theoretical or untested. Rather, they are the result of trench warfare and real applications. The insights contained in this volume represent what successful companies have done—and continue to do—to optimize the business technology relationship. A nationally-known business technology veteran, author Stephen J. Andriole has developed a perspective on the optimization of computing and communications technology based on years of experience from government, industry, academia, and the venture capital business. In this book, he demonstrates how those who buy and deploy technology can optimize their technology in a way that saves costs and provides maximum performance.

Secure Telematic Applications for National Scale Projects

Secure Telematic Applications for National Scale Projects
Author: Jean-Guy Fontaine,Mikhail Makhaniok
Publsiher: IOS Press
Total Pages: 205
Release: 2008
ISBN: 1586039342
Category: Computers
Language: EN, FR, DE, ES & NL

Secure Telematic Applications for National Scale Projects Book Excerpt:

"Proceedings of the NATO Advanced Research Workshop on Secure Telematic Applications for National Scale Projects, Minsk, Belarus, 22-25 November 2006."--T.p. verso.

Citrix Access Suite 4 for Windows Server 2003 The Official Guide Third Edition

Citrix Access Suite 4 for Windows Server 2003  The Official Guide  Third Edition
Author: Steve Kaplan,Tim Reeser,Alan Wood
Publsiher: McGraw Hill Professional
Total Pages: 721
Release: 2006-10-16
ISBN: 0072262893
Category: Computers
Language: EN, FR, DE, ES & NL

Citrix Access Suite 4 for Windows Server 2003 The Official Guide Third Edition Book Excerpt:

Containing checklists and technical best practices; this guide explains how to maximize the suite components to enable and manage secure access to applications and data across the Internet; intranets; extranets; and WANs; LANs; and wireless networks. --

Plunkett s Engineering Research Industry Almanac 2008

Plunkett s Engineering   Research Industry Almanac 2008
Author: Jack W. Plunkett
Publsiher: Plunkett Research, Ltd.
Total Pages: 719
Release: 2008-05
ISBN: 159392111X
Category: Business & Economics
Language: EN, FR, DE, ES & NL

Plunkett s Engineering Research Industry Almanac 2008 Book Excerpt:

This reference book is a complete guide to the trends and leading companies in the engineering, research, design, innovation and development business fields: those firms that are dominant in engineering-based design and development, as well leaders in technology-based research and development. We have included companies that are making significant investments in research and development via as many disciplines as possible, whether that research is being funded by internal investment, by fees received from clients or by fees collected from government agencies. In this carefully-researched volume, you'll get all of the data you need on the American Engineering & Research Industry, including: engineering market analysis, complete industry basics, trends, research trends, patents, intellectual property, funding, research and development data, growth companies, investments, emerging technologies, CAD, CAE, CAM, and more. The book also contains major statistical tables covering everything from total U.S. R&D expenditures to the total number of scientists working in various disciplines, to amount of U.S. government grants for research. In addition, you'll get expertly written profiles of nearly 400 top Engineering and Research firms - the largest, most successful corporations in all facets of Engineering and Research, all cross-indexed by location, size and type of business. These corporate profiles include contact names, addresses, Internet addresses, fax numbers, toll-free numbers, plus growth and hiring plans, finances, research, marketing, technology, acquisitions and much more. This book will put the entire Engineering and Research industry in your hands. Purchasers of either the book or PDF version can receive a free copy of the company profiles database on CD-ROM, enabling key word search and export of key information, addresses, phone numbers and executive names with titles for every company profiled.

Plunkett s Infotech Industry Almanac 2008

Plunkett s Infotech Industry Almanac 2008
Author: Jack W. Plunkett
Publsiher: Plunkett Research, Ltd.
Total Pages: 697
Release: 2008-02
ISBN: 1593921047
Category: Business & Economics
Language: EN, FR, DE, ES & NL

Plunkett s Infotech Industry Almanac 2008 Book Excerpt:

Plunkett's InfoTech Industry Almanac presents a complete analysis of the technology business, including the convergence of hardware, software, entertainment and telecommunications. This market research tool includes our analysis of the major trends affecting the industry, from the rebound of the global PC and server market, to consumer and enterprise software, to super computers, open systems such as Linux, web services and network equipment. In addition, we provide major statistical tables covering the industry, from computer sector revenues to broadband subscribers to semiconductor industry production. No other source provides this book's easy-to-understand comparisons of growth, expenditures, technologies, imports/exports, corporations, research and other vital subjects. The corporate profile section provides in-depth, one-page profiles on each of the top 500 InfoTech companies. We have used our massive databases to provide you with unique, objective analysis of the largest and most exciting companies in: Computer Hardware, Computer Software, Internet Services, E-Commerce, Networking, Semiconductors, Memory, Storage, Information Management and Data Processing. We've been working harder than ever to gather data on all the latest trends in information technology. Our research effort includes an exhaustive study of new technologies and discussions with experts at dozens of innovative tech companies. Purchasers of the printed book or PDF version may receive a free CD-ROM database of the corporate profiles, enabling export of vital corporate data for mail merge and other uses.

Plunkett s Infotech Industry Almanac 2009

Plunkett s Infotech Industry Almanac 2009
Author: Plunkett Research Ltd
Publsiher: Plunkett Research, Ltd.
Total Pages: 716
Release: 2009-02
ISBN: 1593921160
Category: Business & Economics
Language: EN, FR, DE, ES & NL

Plunkett s Infotech Industry Almanac 2009 Book Excerpt:

Market research guide to the infotech industry a tool for strategic planning, competitive intelligence, employment searches or financial research. Contains trends, statistical tables, and an industry glossary. Includes one page profiles of infotech industry firms, which provides data such as addresses, phone numbers, executive names.

Agriculture Rural Development Food and Drug Administration and Related Agencies Appropriations for 2008

Agriculture  Rural Development  Food and Drug Administration  and Related Agencies Appropriations for 2008
Author: United States. Congress. House. Committee on Appropriations. Subcommittee on Agriculture, Rural Development, Food and Drug Administration, and Related Agencies
Publsiher: Unknown
Total Pages: 135
Release: 2007
ISBN: 1928374650XXX
Category: Government publications
Language: EN, FR, DE, ES & NL

Agriculture Rural Development Food and Drug Administration and Related Agencies Appropriations for 2008 Book Excerpt:

Citrix XenApp Platinum Edition Advanced Concepts The Official Guide

Citrix XenApp    Platinum Edition Advanced Concepts  The Official Guide
Author: Citrix Sytems Inc
Publsiher: Mcgraw-hill
Total Pages: 454
Release: 2008-05-12
ISBN: 9780071543811
Category: Computers
Language: EN, FR, DE, ES & NL

Citrix XenApp Platinum Edition Advanced Concepts The Official Guide Book Excerpt:

The Only Official Guide to All Components of Citrix XenApp Platinum Edition Citrix XenApp, the new name for Citrix Presentation Server, is an end-to-end Windows application delivery system that offers both client-side and server-side application virtualization, for optimal application performance and flexible delivery options. It's the best access experience for any user. With the secure application architecture, organizations can centralize applications and data in secure data centers, reducing costs of management and support, increasing data security, and ensuring fast, reliable performance. Build and maintain a scalable, cost-effective, and secure enterprise application delivery infrastructure with expert advice from the Citrix Product Development Team. Citrix XenApp Platinum Edition Advanced Concepts: The Official Guide explains how to configure hardware and software and centrally manage enterprise resources. You'll learn to use Citrix Conferencing Manager, Citrix Access Gateway, Citrix Password Manager, and other tools. The book also includes in-depth coverage of advanced troubleshooting techniques, disk and memory tuning methods, and security strategies. Deploy Citrix XenApp across a large enterprise successfully Understand the network bandwidth requirements of server-to-server communication, and communication between Access Management Console and servers Secure remote access with Citrix Access Gateway Administer and customize Citrix Password Manager Maximize the capabilities of Citrix Conferencing Manager Secure Citrix XenApp using certificates, encryption, and smart cards Configure Virtual IP addressing, PDA synchronization, and SpeedScreen browser acceleration Gain insights from Citrix eLabs server load and capacity hardware testing