Más contenido relacionado
La actualidad más candente (20)
Similar a Sprin VTUG citrix Solutions (20)
Sprin VTUG citrix Solutions
- 1. April 24, 2014
Taking Your Business, and
Users, to the Cloud!
VTUG: Spring Ahead 2014
Todd Smith – Citrix
- 9. © 2014 Citrix | Confidential – Do Not Distribute
Workplace
Redesign
Mobile
Workstyles
Workforce
Mobility
Workflow
Optimization
- 10. © 2014 Citrix | Confidential – Do Not Distribute
A Mobile
Workstyle
makes people
happier and more
productive
- 12. © 2014 Citrix | Confidential – Do Not Distribute
Collaboration
& Sharing
Access &
Data Security
App & Desktop
Virtualization
Enterprise Mobility
Management
App Networking &
Cloud Orchestration
- 13. © 2014 Citrix | Confidential – Do Not Distribute© 2013 Citrix | Confidential – Do Not Distribute
Tablets expected to soon
overtake PC sales*
3+ devices per employee
1.5 M Android devices
activated daily
BYOD
Revolution
* IDC, 2013
- 14. © 2014 Citrix | Confidential – Do Not Distribute
Mobility vs. Security
• Too many ways to lose data on mobile
devices
• Mobile networks becoming the norm vs.
WAN
• Data too big to move
• Confidentiality, compliance and IP
protection more complex
*Wireless Intelligence report, 1, 2013
- 15. © 2014 Citrix | Confidential – Do Not Distribute
Infinite Complexity of Management
Across apps, devices and locations
- 16. © 2014 Citrix | Confidential – Do Not Distribute
16
Business Concerns
Device
Configuration
App
Configuration
and Delivery
Content Support
End User Experience
Security, Integration, Vendor Consolidation, Value on Investment
- 17. © 2014 Citrix | Confidential – Do Not Distribute
17
XenMobile Enterprise
The Citrix Solution
Device
Configuration
XenMobile
MDM
App
Configuration
and Delivery
XenMobile
MAM
Content
XenMobile
ShareFile
Support
Remote
Support and
GoToAssist
Integrate and Leverage Existing Citrix Investment
Enable User Productivity While Maintaining Security
- 18. © 2014 Citrix | Confidential – Do Not Distribute
Citrix – The Most Complete Mobile Portfolio
Any app, any device, anywhere
Mobile ROI
Mobile Device
Management
Sandboxed
Mail and Web
Mobile
App Security
Secure Mobile
Data Sharing
Mobile
Network Control
SSO & Identity
Management
Desktop & App
Virtualization
Social & Web
Collaboration
- 19. © 2014 Citrix | Confidential – Do Not Distribute
MobileROI
Device
Management
Sandboxed mail
and web
Mobile network
control
Mobile app
security
MDM Enterprise Mobility Management
Citrix - The Most Comprehensive Solution
SSO &
Id Mgmt
Secure data
control
Desktop & App
Virtualization
Collaboration
GoToMeeting
GoToAssist
Podio
MDM Edition Enterprise
Citrix – Competitive Position
- 20. © 2014 Citrix | Confidential – Do Not Distribute
Recognized as a “Leader” by Gartner; Winner at Interop
Magic Quadrant Critical Capabilities
Source: Gartner report, Magic Quadrant for Mobile Device Management Software, May 23, 2013, Phillip Redman, John Girard, Terrence Cosgrove, Monica Basso
Source: Gartner report, Critical Capabilities for Mobile Device Management Software, May 23, 2013, Phillip Redman
© 2013 Gartner, Inc. and/or its affiliates. All rights reserved. Gartner is a registered trademark of Gartner, Inc. or its affiliates. For more information, e-mail info@gartner.com or visit gartner.com. Used with permission.
- 21. © 2014 Citrix | Confidential – Do Not Distribute
Mobile, Simple, Secure
- 22. © 2014 Citrix | Confidential – Do Not Distribute
What Do We Know?
- 23. © 2014 Citrix | Confidential – Do Not Distribute
Entire desktopJust the apps
Windows apps and data secured and
delivered… Within a virtual desktop
Optimized for:
• Large Screen Footprint - Multi-window
• Keyboard and mouse
• Persistent workspace
Windows apps and data secured and
delivered…
Optimized for:
• Smaller screen, mobile
• Touch interface
• Non-persistent workspace
Apps and Desktops with Ease
Seamless Transitions
- 24. © 2014 Citrix | Confidential – Do Not Distribute
Central or local execution
FlexCast delivery technology
Physical PCs
Apps and Desktops
HDX 3D Pro-enabled
workstations or Remote
PC access technology
Central Management
Image management | Application management | User data profiles | Access policies
Central Execution Local Execution
Hosted VDI
Apps and desktops
Dedicated or pooled
desktop virtual
machines
Hosted Shared
Apps and Desktops
Windows Server
session-based desktop
or apps
Local Hypervisor
Desktops
Type 1 Hypervisor for
PCs and Laptops with
XenClient
Synchronizer
- 25. © 2014 Citrix | Confidential – Do Not Distribute
Desktops and Apps as-a-Service
- 26. © 2014 Citrix | Confidential – Do Not Distribute
XenDesktop 7
Single Site
Director 2.1
Site A Site B Site C
Help Desk and Troubleshooting / Environment health
Director
- 27. © 2014 Citrix | Confidential – Do Not Distribute
EdgeSight Performance management
Director and EdgeSight
XenDesktop 7
Site A Site B Site C
Director
Historical Trends and Analytics
Managing and optimizing capacity
TM
TM
TM
- 28. © 2014 Citrix | Confidential – Do Not Distribute
EdgeSight Network analysis
Director and EdgeSight
XenDesktop 7
Site A Site B Site C
HDX Insight
Isolating and managing network performance
Network - Deep Packet Analysis
TM
TM
- 29. © 2014 Citrix | Confidential – Do Not Distribute
Let’s Go Mobile!
- 30. © 2014 Citrix | Confidential – Do Not Distribute
ShareFile
• SSO to all MDX apps
• User support for MDX apps
• Integrated email, contacts and calendar
• Designed for work
• Internet and intranet browsing
• Supports file download
• All your files available anywhere
• Sharing integrated into other MDX apps
WorxMail
WorxWeb
WorxHome
- 31. © 2014 Citrix | Confidential – Do Not Distribute
System Overview
Access Gateway
App Controller
Device Manager
ShareFile
WorxStore
StorageZone
ShareFile
ControlPlane
XenMobile
Enterprise
- 32. © 2014 Citrix | Confidential – Do Not Distribute
User authorization required
Mobile device access
Allow local storage
Offline access allowed
Restrict document sharing
Printing allowed
Edit data
SmartAccess
Policy Controls
- 34. © 2014 Citrix | Confidential – Do Not Distribute
Unified Corporate App Store
• Available on 3B+ devices
• Mobile apps native on device
• Seamless delivery of Windows,
datacenter and web apps
• Any device – smartphone, tablet,
PC and Mac
- 35. © 2014 Citrix | Confidential – Do Not Distribute
Authentication
Authentication and SSO
• Strongly authenticates users
o NetScaler Gateway is primary authentication point
o Permits combinations of AD credentials with certificates,
tokens, and other second factors
• Registers devices to users
o Permits lock and wipe of corporate data/apps on selected
devices
• Serves as access manager for MDX managed apps
o Strongly identifies managed apps
o Determines app entitlements and policies for authenticated
users
o Brokers permitted data exchanges between managed apps
WorxHome
- 36. © 2014 Citrix | Confidential – Do Not Distribute
Single Sign-On
Authentication and SSO
• SSO for all managed apps
o Hosted HDX apps and desktops
o Web/SaaS apps
o MDX managed mobile apps
Various online and offline modes selected by app policy
• MDX apps can use derived credentials
o Gateway tickets for micro-VPN access
o Automatic HTTP auth challenge responses
(NTLM today, Kerberos coming soon)
o Certificates for PKI protected web sites
o Specialty credentials eg
(SAML token for Sharefile access)
WorxHome
- 38. © 2014 Citrix | Confidential – Do Not Distribute
WorxMail
Mail, calendar, contacts
Enterprise class security
Beautiful native experience
Full inter-app integration
MDX-secured
• Secure email body and attachment
• “Open in” control to provide data leak
protection
• No Exchange server exposure to internet
• Send email with ShareFile attachments
• Integrated calendars and Exchange GAL
- 39. © 2014 Citrix | Confidential – Do Not Distribute
Sandboxed Email, Calendar and Contacts App
• Secure email app with a great
user experience
• Attach files to emails and save
attachments
• Full calendar with access to
free/busy information
• Directly opens web links to any
site, including intranet sites
- 40. © 2014 Citrix | Confidential – Do Not Distribute
Secure Document Sharing, Sync & Editing
• Both cloud and on-premises data
storage options
• Capable of accessing SharePoint
and network drives
• “Open-in” capabilities can be
restricted to other Worx-enabled
apps
- 42. © 2014 Citrix | Confidential – Do Not Distribute
WorxWeb
42
Secure browser
Internal web app access
Full inter-app integration
Consumer experience
MDX-secured
• iOS and Android device intranet web
browsing
o Easy access to SharePoint, Intranet Portal etc
• Similar look/ feel as native browser
o Safari on iOS; Chrome on Android
• Single sign-on via NetScaler
o Respond to HTTP 401
- 43. © 2014 Citrix | Confidential – Do Not Distribute
Secure Mobile Web Browser
• Full-featured consumer-like
browser
• Secure access to internal,
external and HTML5 web apps
• URL whitelisting and blacklisting
• Access to enterprise resources
with a Micro VPN
- 45. © 2014 Citrix | Confidential – Do Not Distribute
ShareFile Platform
Storage Zones
Network Shares
SharePoint
ShareFile.com
- 46. © 2014 Citrix | Confidential – Do Not Distribute
Follow-me data with ShareFile
• Enables file sharing with anyone
• Syncs data across all devices
• Online file sharing spaces for virtual teams
• Selective offline access on mobile devices
• Data protection
ᵒ Encryption
ᵒ Device lock
ᵒ Remote wipe
ᵒ Poison-pill
Secure
- 47. © 2014 Citrix | Confidential – Do Not Distribute
ShareFile Enables Mobile Workstyles
• Access, share and sync files from any device
• Apps for mobile devices
• Mobile-optimized ShareFile web site
• Access data residing in existing network shares & SharePoint*
• Offline access and editing
• Built-in mobile editor for rich content editing on-the-go
• PDF annotation
- 48. © 2014 Citrix | Confidential – Do Not Distribute
Mobile
content
editor for
Microsoft
Office
- 49. © 2014 Citrix | Confidential – Do Not Distribute
Workflow Integration with Microsoft Outlook
Attachment
conversion
Unclog mail servers
Overcome
file size
restrictions
Better control
and visibility
Request large
files
- 50. © 2014 Citrix | Confidential – Do Not Distribute
ShareFile with StorageZones
Citrix-managed StorageZone (AWS)
Customer-managed StorageZone (example)
• Choose where your data is stored
• Designated zones in public clouds
• Manage StorageZones on-premises
- 51. © 2014 Citrix | Confidential – Do Not Distribute
On-Demand Sync
+
Data Optimized for Virtual Desktops
Instant access, share and sync Reduce storage costs
- 53. © 2014 Citrix | Confidential – Do Not Distribute
AppApp App
MDX Technologies
• Encrypted local storage
• Micro (app specific) VPN
• App specific lock and wipe
• Inter-app communication
• Conditional access policies
• Federated identity and SSO
App
App PreparationTool
- 54. © 2014 Citrix | Confidential – Do Not Distribute
Information Containment
• Control data exchange with other
apps and devices:
ᵒ Cut/Copy/Paste
ᵒ Document exchange (Open-In)
ᵒ Inter-app communications
ᵒ Network APIs
QuickLook EvernoteMail
Facebook OfficeHDBox
QuickLook OfficeHD
without containment with containment
What happens in MDX apps stays in MDX apps….
- 55. © 2014 Citrix | Confidential – Do Not Distribute
Secure inter-app communication
• Restricted – Allow only trusted apps to
share data with one another
• Unrestricted – No controls, “Open In”
shows all apps registered to handle that
file type
• Blocked – No way to share that app’s
data with anything else
app one app two
mobile OS
Open-In
- 56. © 2014 Citrix | Confidential – Do Not Distribute
private data
CitrixReceiver
MDX InterApp
MDXVault
XenMobile
NativeMobile
Apps
Deny SMS
Disable iCloud
Disable screenshots
Force authentication
Block jailbroken device
MDXPolicies
duringapp
wrapping
app private
data vault
app private
data vault
- 57. © 2014 Citrix | Confidential – Do Not Distribute
Enterprise-enable any mobile app with the
Worx App SDK
• Simple and powerful SDK
• Enabled through a single line of code
• Apps can be wrapped post-development
• Controls like:
ᵒ Data encryption
ᵒ Authentication
ᵒ Secure lock and wipe
ᵒ Inter-app policies
ᵒ Micro VPNs
Any app can be a Worx app
- 58. © 2014 Citrix | Confidential – Do Not Distribute
App Behavior Restrictions
• Block mobile OS API sets and features
ᵒ Printing
ᵒ iCloud
ᵒ Email and SMS compose
ᵒ Inter-app URL dispatch and scheme handlers (iOS)
ᵒ Intent launch and content providers (Android)
• Block access to sensitive device hardware
ᵒ Camera, microphone, location services, etc.
• All controls are applied at run-time based on
app policies
- 59. © 2014 Citrix | Confidential – Do Not Distribute
App Access Controls
• Block/permit app access based on policy
• User authentication (how and when)
ᵒ Online versus offline, re-authentication period,
max offline time
• Device security posture
ᵒ Jail-broken or rooted
ᵒ PIN/passcode enabled
ᵒ Hardware enforced encryption
ᵒ MDM enrolled vs unmanaged
• Network state
ᵒ Internal network or external
ᵒ Specific internal wifi networks
ᵒ Wifi Only
- 62. © 2014 Citrix | Confidential – Do Not Distribute
XenMobile Infrastructure Dependencies
Network & Information Systems Infrastructure
CORE SERVICES:
Active Directory / LDAP
NTP, and DNS services ready
HOST NAMES:
Create FQDN’s for XenMobile Device
Manager & WorxHome VIP Addresses
FIREWALL RULES:
Configure for device connections &
XenMobile servers
(XDM, XAC, NetScaler)
IP Addresses:
(Public & Internal)
Must have the static IP’s mapped for
External NATs, NSIP, SNIPs, and VIPs
that are used by the NetScaler, XDM,
XAC and other services.
Server Environment:
Physical & Virtual (DMZ vs. Corporate
LAN placement of servers)
IT Security:
Internal PKI, external certificate
services, and Identity Management
services
- 63. © 2014 Citrix | Confidential – Do Not Distribute
Create Base Policies
The Must Haves
“Magic 5” MDM Policies
• End-User Terms &
Conditions
• Device Passcode
• Software Inventory
(where allowed / privacy
concerns)
• Company WiFi (setup a
secure network)
• ActiveSync Mail
Regional or User/Device
Specific Policies
• Device Restrictions
• Location Services
• VPN
• PKI / User Identity
Certificates
• App Push
• App Store
• Device Platform Specific
(iOS 7, Samsung
SAFE/KNOX)
Worx App Policies
• Clipboard (Copy & Paste)
• Documents (Open In)
• Device Restrictions
• Login Security
• mVPN Tunneling vs. Open
Networking
• Network WiFi Control
- 64. © 2014 Citrix | Confidential – Do Not Distribute
Citrix – The Most Complete Mobile Portfolio
Any app, any device, anywhere
Mobile ROI
Mobile Device
Management
Sandboxed
Mail and Web
Mobile
App Security
Secure Mobile
Data Sharing
Mobile
Network Control
SSO & Identity
Management
Desktop & App
Virtualization
Social & Web
Collaboration
- 65. © 2014 Citrix | Confidential – Do Not Distribute
Mobile, Simple, Secure
- 66. © 2014 Citrix | Confidential – Do Not Distribute
Questions?
•Todd Smith – Sales Engineering Manager
ᵒ Todd.smith2@citrix.com
•www.citrix.com
- 67. © 2014 Citrix | Confidential – Do Not Distribute
Want something for Free?
• The Free 350 page soup-to-nuts 'How To: BYOD Project Volume 1' e-book
will teach you:
• How to install and configure Citrix DesktopPlayer for Mac 1.1, soup-to-nuts...
• How to install and configure Citrix XenClient Enterprise Synchronizer 5.1.1.
• How to install and configure Microsoft Windows Server 2012 R2
• How to install and configure Hyper-V for use with the Citrix Synchronizer.
• How to prepare the environment for installation.
• How to train end-users to use the new DesktopPlayer for Mac solutions.
• Detailed Citrix Synchronizer Policies section.
• Detailed Citrix Synchronizer administration tasks explained.
• Citrix Synchronizer backup and recovery explained.
• How to create & maintain Synchronizer virtual machines.
• 350 pages of step-by-step, soup-to-nuts, and easy as 1,2,3!
• http://docs.dabcc.com