SlideShare una empresa de Scribd logo
1 de 68
April 24, 2014
Taking Your Business, and
Users, to the Cloud!
VTUG: Spring Ahead 2014
Todd Smith – Citrix
© 2014 Citrix | Confidential – Do Not Distribute
© 2014 Citrix | Confidential – Do Not Distribute
© 2014 Citrix | Confidential – Do Not Distribute
© 2014 Citrix | Confidential – Do Not Distribute
© 2014 Citrix | Confidential – Do Not Distribute
© 2014 Citrix | Confidential – Do Not Distribute
© 2014 Citrix | Confidential – Do Not Distribute
© 2014 Citrix | Confidential – Do Not Distribute
Workplace
Redesign
Mobile
Workstyles
Workforce
Mobility
Workflow
Optimization
© 2014 Citrix | Confidential – Do Not Distribute
A Mobile
Workstyle
makes people
happier and more
productive
© 2014 Citrix | Confidential – Do Not Distribute
© 2014 Citrix | Confidential – Do Not Distribute
Collaboration
& Sharing
Access &
Data Security
App & Desktop
Virtualization
Enterprise Mobility
Management
App Networking &
Cloud Orchestration
© 2014 Citrix | Confidential – Do Not Distribute© 2013 Citrix | Confidential – Do Not Distribute
Tablets expected to soon
overtake PC sales*
3+ devices per employee
1.5 M Android devices
activated daily
BYOD
Revolution
* IDC, 2013
© 2014 Citrix | Confidential – Do Not Distribute
Mobility vs. Security
• Too many ways to lose data on mobile
devices
• Mobile networks becoming the norm vs.
WAN
• Data too big to move
• Confidentiality, compliance and IP
protection more complex
*Wireless Intelligence report, 1, 2013
© 2014 Citrix | Confidential – Do Not Distribute
Infinite Complexity of Management
Across apps, devices and locations
© 2014 Citrix | Confidential – Do Not Distribute
16
Business Concerns
Device
Configuration
App
Configuration
and Delivery
Content Support
End User Experience
Security, Integration, Vendor Consolidation, Value on Investment
© 2014 Citrix | Confidential – Do Not Distribute
17
XenMobile Enterprise
The Citrix Solution
Device
Configuration
XenMobile
MDM
App
Configuration
and Delivery
XenMobile
MAM
Content
XenMobile
ShareFile
Support
Remote
Support and
GoToAssist
Integrate and Leverage Existing Citrix Investment
Enable User Productivity While Maintaining Security
© 2014 Citrix | Confidential – Do Not Distribute
Citrix – The Most Complete Mobile Portfolio
Any app, any device, anywhere
Mobile ROI
Mobile Device
Management
Sandboxed
Mail and Web
Mobile
App Security
Secure Mobile
Data Sharing
Mobile
Network Control
SSO & Identity
Management
Desktop & App
Virtualization
Social & Web
Collaboration
© 2014 Citrix | Confidential – Do Not Distribute
MobileROI
Device
Management
Sandboxed mail
and web
Mobile network
control
Mobile app
security
MDM Enterprise Mobility Management
Citrix - The Most Comprehensive Solution
SSO &
Id Mgmt
Secure data
control
Desktop & App
Virtualization
Collaboration
GoToMeeting
GoToAssist
Podio
MDM Edition Enterprise
Citrix – Competitive Position
© 2014 Citrix | Confidential – Do Not Distribute
Recognized as a “Leader” by Gartner; Winner at Interop
Magic Quadrant Critical Capabilities
Source: Gartner report, Magic Quadrant for Mobile Device Management Software, May 23, 2013, Phillip Redman, John Girard, Terrence Cosgrove, Monica Basso
Source: Gartner report, Critical Capabilities for Mobile Device Management Software, May 23, 2013, Phillip Redman
© 2013 Gartner, Inc. and/or its affiliates. All rights reserved. Gartner is a registered trademark of Gartner, Inc. or its affiliates. For more information, e-mail info@gartner.com or visit gartner.com. Used with permission.
© 2014 Citrix | Confidential – Do Not Distribute
Mobile, Simple, Secure
© 2014 Citrix | Confidential – Do Not Distribute
What Do We Know?
© 2014 Citrix | Confidential – Do Not Distribute
Entire desktopJust the apps
Windows apps and data secured and
delivered… Within a virtual desktop
Optimized for:
• Large Screen Footprint - Multi-window
• Keyboard and mouse
• Persistent workspace
Windows apps and data secured and
delivered…
Optimized for:
• Smaller screen, mobile
• Touch interface
• Non-persistent workspace
Apps and Desktops with Ease
Seamless Transitions
© 2014 Citrix | Confidential – Do Not Distribute
Central or local execution
FlexCast delivery technology
Physical PCs
Apps and Desktops
HDX 3D Pro-enabled
workstations or Remote
PC access technology
Central Management
Image management | Application management | User data profiles | Access policies
Central Execution Local Execution
Hosted VDI
Apps and desktops
Dedicated or pooled
desktop virtual
machines
Hosted Shared
Apps and Desktops
Windows Server
session-based desktop
or apps
Local Hypervisor
Desktops
Type 1 Hypervisor for
PCs and Laptops with
XenClient
Synchronizer
© 2014 Citrix | Confidential – Do Not Distribute
Desktops and Apps as-a-Service
© 2014 Citrix | Confidential – Do Not Distribute
XenDesktop 7
Single Site
Director 2.1
Site A Site B Site C
Help Desk and Troubleshooting / Environment health
Director
© 2014 Citrix | Confidential – Do Not Distribute
EdgeSight Performance management
Director and EdgeSight
XenDesktop 7
Site A Site B Site C
Director
Historical Trends and Analytics
Managing and optimizing capacity
TM
TM
TM
© 2014 Citrix | Confidential – Do Not Distribute
EdgeSight Network analysis
Director and EdgeSight
XenDesktop 7
Site A Site B Site C
HDX Insight
Isolating and managing network performance
Network - Deep Packet Analysis
TM
TM
© 2014 Citrix | Confidential – Do Not Distribute
Let’s Go Mobile!
© 2014 Citrix | Confidential – Do Not Distribute
ShareFile
• SSO to all MDX apps
• User support for MDX apps
• Integrated email, contacts and calendar
• Designed for work
• Internet and intranet browsing
• Supports file download
• All your files available anywhere
• Sharing integrated into other MDX apps
WorxMail
WorxWeb
WorxHome
© 2014 Citrix | Confidential – Do Not Distribute
System Overview
Access Gateway
App Controller
Device Manager
ShareFile
WorxStore
StorageZone
ShareFile
ControlPlane
XenMobile
Enterprise
© 2014 Citrix | Confidential – Do Not Distribute
User authorization required
Mobile device access
Allow local storage
Offline access allowed
Restrict document sharing
Printing allowed
Edit data
SmartAccess
Policy Controls
Enrollment & App Store
© 2014 Citrix | Confidential – Do Not Distribute
Unified Corporate App Store
• Available on 3B+ devices
• Mobile apps native on device
• Seamless delivery of Windows,
datacenter and web apps
• Any device – smartphone, tablet,
PC and Mac
© 2014 Citrix | Confidential – Do Not Distribute
Authentication
Authentication and SSO
• Strongly authenticates users
o NetScaler Gateway is primary authentication point
o Permits combinations of AD credentials with certificates,
tokens, and other second factors
• Registers devices to users
o Permits lock and wipe of corporate data/apps on selected
devices
• Serves as access manager for MDX managed apps
o Strongly identifies managed apps
o Determines app entitlements and policies for authenticated
users
o Brokers permitted data exchanges between managed apps
WorxHome
© 2014 Citrix | Confidential – Do Not Distribute
Single Sign-On
Authentication and SSO
• SSO for all managed apps
o Hosted HDX apps and desktops
o Web/SaaS apps
o MDX managed mobile apps
 Various online and offline modes selected by app policy
• MDX apps can use derived credentials
o Gateway tickets for micro-VPN access
o Automatic HTTP auth challenge responses
(NTLM today, Kerberos coming soon)
o Certificates for PKI protected web sites
o Specialty credentials eg
(SAML token for Sharefile access)
WorxHome
© 2014 Citrix | Confidential – Do Not Distribute
WorxMail
Mail, calendar, contacts
Enterprise class security
Beautiful native experience
Full inter-app integration
MDX-secured
• Secure email body and attachment
• “Open in” control to provide data leak
protection
• No Exchange server exposure to internet
• Send email with ShareFile attachments
• Integrated calendars and Exchange GAL
© 2014 Citrix | Confidential – Do Not Distribute
Sandboxed Email, Calendar and Contacts App
• Secure email app with a great
user experience
• Attach files to emails and save
attachments
• Full calendar with access to
free/busy information
• Directly opens web links to any
site, including intranet sites
© 2014 Citrix | Confidential – Do Not Distribute
Secure Document Sharing, Sync & Editing
• Both cloud and on-premises data
storage options
• Capable of accessing SharePoint
and network drives
• “Open-in” capabilities can be
restricted to other Worx-enabled
apps
© 2014 Citrix | Confidential – Do Not Distribute
WorxWeb
42
Secure browser
Internal web app access
Full inter-app integration
Consumer experience
MDX-secured
• iOS and Android device intranet web
browsing
o Easy access to SharePoint, Intranet Portal etc
• Similar look/ feel as native browser
o Safari on iOS; Chrome on Android
• Single sign-on via NetScaler
o Respond to HTTP 401
© 2014 Citrix | Confidential – Do Not Distribute
Secure Mobile Web Browser
• Full-featured consumer-like
browser
• Secure access to internal,
external and HTML5 web apps
• URL whitelisting and blacklisting
• Access to enterprise resources
with a Micro VPN
© 2014 Citrix | Confidential – Do Not Distribute
ShareFile Platform
Storage Zones
Network Shares
SharePoint
ShareFile.com
© 2014 Citrix | Confidential – Do Not Distribute
Follow-me data with ShareFile
• Enables file sharing with anyone
• Syncs data across all devices
• Online file sharing spaces for virtual teams
• Selective offline access on mobile devices
• Data protection
ᵒ Encryption
ᵒ Device lock
ᵒ Remote wipe
ᵒ Poison-pill
Secure
© 2014 Citrix | Confidential – Do Not Distribute
ShareFile Enables Mobile Workstyles
• Access, share and sync files from any device
• Apps for mobile devices
• Mobile-optimized ShareFile web site
• Access data residing in existing network shares & SharePoint*
• Offline access and editing
• Built-in mobile editor for rich content editing on-the-go
• PDF annotation
© 2014 Citrix | Confidential – Do Not Distribute
Mobile
content
editor for
Microsoft
Office
© 2014 Citrix | Confidential – Do Not Distribute
Workflow Integration with Microsoft Outlook
Attachment
conversion
Unclog mail servers
Overcome
file size
restrictions
Better control
and visibility
Request large
files
© 2014 Citrix | Confidential – Do Not Distribute
ShareFile with StorageZones
Citrix-managed StorageZone (AWS)
Customer-managed StorageZone (example)
• Choose where your data is stored
• Designated zones in public clouds
• Manage StorageZones on-premises
© 2014 Citrix | Confidential – Do Not Distribute
On-Demand Sync
+
Data Optimized for Virtual Desktops
Instant access, share and sync Reduce storage costs
MDX Technology
© 2014 Citrix | Confidential – Do Not Distribute
AppApp App
MDX Technologies
• Encrypted local storage
• Micro (app specific) VPN
• App specific lock and wipe
• Inter-app communication
• Conditional access policies
• Federated identity and SSO
App
App PreparationTool
© 2014 Citrix | Confidential – Do Not Distribute
Information Containment
• Control data exchange with other
apps and devices:
ᵒ Cut/Copy/Paste
ᵒ Document exchange (Open-In)
ᵒ Inter-app communications
ᵒ Network APIs
QuickLook EvernoteMail
Facebook OfficeHDBox
QuickLook OfficeHD
without containment with containment
What happens in MDX apps stays in MDX apps….
© 2014 Citrix | Confidential – Do Not Distribute
Secure inter-app communication
• Restricted – Allow only trusted apps to
share data with one another
• Unrestricted – No controls, “Open In”
shows all apps registered to handle that
file type
• Blocked – No way to share that app’s
data with anything else
app one app two
mobile OS
Open-In
© 2014 Citrix | Confidential – Do Not Distribute
private data
CitrixReceiver
MDX InterApp
MDXVault
XenMobile
NativeMobile
Apps
Deny SMS
Disable iCloud
Disable screenshots
Force authentication
Block jailbroken device
MDXPolicies
duringapp
wrapping
app private
data vault
app private
data vault
© 2014 Citrix | Confidential – Do Not Distribute
Enterprise-enable any mobile app with the
Worx App SDK
• Simple and powerful SDK
• Enabled through a single line of code
• Apps can be wrapped post-development
• Controls like:
ᵒ Data encryption
ᵒ Authentication
ᵒ Secure lock and wipe
ᵒ Inter-app policies
ᵒ Micro VPNs
Any app can be a Worx app
© 2014 Citrix | Confidential – Do Not Distribute
App Behavior Restrictions
• Block mobile OS API sets and features
ᵒ Printing
ᵒ iCloud
ᵒ Email and SMS compose
ᵒ Inter-app URL dispatch and scheme handlers (iOS)
ᵒ Intent launch and content providers (Android)
• Block access to sensitive device hardware
ᵒ Camera, microphone, location services, etc.
• All controls are applied at run-time based on
app policies
© 2014 Citrix | Confidential – Do Not Distribute
App Access Controls
• Block/permit app access based on policy
• User authentication (how and when)
ᵒ Online versus offline, re-authentication period,
max offline time
• Device security posture
ᵒ Jail-broken or rooted
ᵒ PIN/passcode enabled
ᵒ Hardware enforced encryption
ᵒ MDM enrolled vs unmanaged
• Network state
ᵒ Internal network or external
ᵒ Specific internal wifi networks
ᵒ Wifi Only
System Architecture
© 2014 Citrix | Confidential – Do Not Distribute
XenMobile Infrastructure Dependencies
Network & Information Systems Infrastructure
CORE SERVICES:
Active Directory / LDAP
NTP, and DNS services ready
HOST NAMES:
Create FQDN’s for XenMobile Device
Manager & WorxHome VIP Addresses
FIREWALL RULES:
Configure for device connections &
XenMobile servers
(XDM, XAC, NetScaler)
IP Addresses:
(Public & Internal)
Must have the static IP’s mapped for
External NATs, NSIP, SNIPs, and VIPs
that are used by the NetScaler, XDM,
XAC and other services.
Server Environment:
Physical & Virtual (DMZ vs. Corporate
LAN placement of servers)
IT Security:
Internal PKI, external certificate
services, and Identity Management
services
© 2014 Citrix | Confidential – Do Not Distribute
Create Base Policies
The Must Haves
“Magic 5” MDM Policies
• End-User Terms &
Conditions
• Device Passcode
• Software Inventory
(where allowed / privacy
concerns)
• Company WiFi (setup a
secure network)
• ActiveSync Mail
Regional or User/Device
Specific Policies
• Device Restrictions
• Location Services
• VPN
• PKI / User Identity
Certificates
• App Push
• App Store
• Device Platform Specific
(iOS 7, Samsung
SAFE/KNOX)
Worx App Policies
• Clipboard (Copy & Paste)
• Documents (Open In)
• Device Restrictions
• Login Security
• mVPN Tunneling vs. Open
Networking
• Network WiFi Control
© 2014 Citrix | Confidential – Do Not Distribute
Citrix – The Most Complete Mobile Portfolio
Any app, any device, anywhere
Mobile ROI
Mobile Device
Management
Sandboxed
Mail and Web
Mobile
App Security
Secure Mobile
Data Sharing
Mobile
Network Control
SSO & Identity
Management
Desktop & App
Virtualization
Social & Web
Collaboration
© 2014 Citrix | Confidential – Do Not Distribute
Mobile, Simple, Secure
© 2014 Citrix | Confidential – Do Not Distribute
Questions?
•Todd Smith – Sales Engineering Manager
ᵒ Todd.smith2@citrix.com
•www.citrix.com
© 2014 Citrix | Confidential – Do Not Distribute
Want something for Free?
• The Free 350 page soup-to-nuts 'How To: BYOD Project Volume 1' e-book
will teach you:
• How to install and configure Citrix DesktopPlayer for Mac 1.1, soup-to-nuts...
• How to install and configure Citrix XenClient Enterprise Synchronizer 5.1.1.
• How to install and configure Microsoft Windows Server 2012 R2
• How to install and configure Hyper-V for use with the Citrix Synchronizer.
• How to prepare the environment for installation.
• How to train end-users to use the new DesktopPlayer for Mac solutions.
• Detailed Citrix Synchronizer Policies section.
• Detailed Citrix Synchronizer administration tasks explained.
• Citrix Synchronizer backup and recovery explained.
• How to create & maintain Synchronizer virtual machines.
• 350 pages of step-by-step, soup-to-nuts, and easy as 1,2,3!
• http://docs.dabcc.com
Work better. Live better.

Más contenido relacionado

La actualidad más candente

Windows 10 Enterprise E3 - Best in Class Security and Control - Presented by ...
Windows 10 Enterprise E3 - Best in Class Security and Control - Presented by ...Windows 10 Enterprise E3 - Best in Class Security and Control - Presented by ...
Windows 10 Enterprise E3 - Best in Class Security and Control - Presented by ...
David J Rosenthal
 
Microsoft Enterprise Mobility Suite Presented by Atidan
Microsoft Enterprise Mobility Suite Presented by AtidanMicrosoft Enterprise Mobility Suite Presented by Atidan
Microsoft Enterprise Mobility Suite Presented by Atidan
David J Rosenthal
 
Getting started with the Enterprise Mobility Suite (EMS)
Getting started with the Enterprise Mobility Suite (EMS)Getting started with the Enterprise Mobility Suite (EMS)
Getting started with the Enterprise Mobility Suite (EMS)
Ronni Pedersen
 
Cortado Corporate Server 7.2 - EN
Cortado Corporate Server 7.2 - ENCortado Corporate Server 7.2 - EN
Cortado Corporate Server 7.2 - EN
olivier lussac
 
Empower Enterprise Mobility- Maximize Mobile Control- Presented by Atidan
Empower Enterprise Mobility- Maximize Mobile Control- Presented by AtidanEmpower Enterprise Mobility- Maximize Mobile Control- Presented by Atidan
Empower Enterprise Mobility- Maximize Mobile Control- Presented by Atidan
David J Rosenthal
 

La actualidad más candente (20)

Chalkline Microsoft Webinar about Windows Virtual Desktop
Chalkline Microsoft Webinar about Windows Virtual DesktopChalkline Microsoft Webinar about Windows Virtual Desktop
Chalkline Microsoft Webinar about Windows Virtual Desktop
 
Byod+ +bring+your+own+device
Byod+ +bring+your+own+device Byod+ +bring+your+own+device
Byod+ +bring+your+own+device
 
VMworld 2013: Directions in VMware EUC & the Multi-Device, Virtual Workspace
VMworld 2013: Directions in VMware EUC & the Multi-Device, Virtual WorkspaceVMworld 2013: Directions in VMware EUC & the Multi-Device, Virtual Workspace
VMworld 2013: Directions in VMware EUC & the Multi-Device, Virtual Workspace
 
Microsoft Enterprise Mobility Suite Launch Presentation - Atidan
Microsoft Enterprise Mobility Suite Launch Presentation - AtidanMicrosoft Enterprise Mobility Suite Launch Presentation - Atidan
Microsoft Enterprise Mobility Suite Launch Presentation - Atidan
 
Windows 10 and EMS better together @ Windows 10 Partner Technical Bootcamp Mi...
Windows 10 and EMS better together @ Windows 10 Partner Technical Bootcamp Mi...Windows 10 and EMS better together @ Windows 10 Partner Technical Bootcamp Mi...
Windows 10 and EMS better together @ Windows 10 Partner Technical Bootcamp Mi...
 
Windows 10 Enterprise E3 - Best in Class Security and Control - Presented by ...
Windows 10 Enterprise E3 - Best in Class Security and Control - Presented by ...Windows 10 Enterprise E3 - Best in Class Security and Control - Presented by ...
Windows 10 Enterprise E3 - Best in Class Security and Control - Presented by ...
 
MMS 2015: What is ems and how to configure it
MMS 2015: What is ems and how to configure itMMS 2015: What is ems and how to configure it
MMS 2015: What is ems and how to configure it
 
Microsoft Enterprise Mobility Suite | Getting started....
Microsoft Enterprise Mobility Suite | Getting started....Microsoft Enterprise Mobility Suite | Getting started....
Microsoft Enterprise Mobility Suite | Getting started....
 
Agile IT EMS webinar series, session 1
Agile IT EMS webinar series, session 1Agile IT EMS webinar series, session 1
Agile IT EMS webinar series, session 1
 
Microsoft Enterprise Mobility Suite Presented by Atidan
Microsoft Enterprise Mobility Suite Presented by AtidanMicrosoft Enterprise Mobility Suite Presented by Atidan
Microsoft Enterprise Mobility Suite Presented by Atidan
 
Getting started with the Enterprise Mobility Suite (EMS)
Getting started with the Enterprise Mobility Suite (EMS)Getting started with the Enterprise Mobility Suite (EMS)
Getting started with the Enterprise Mobility Suite (EMS)
 
Cortado Corporate Server 7.2 - EN
Cortado Corporate Server 7.2 - ENCortado Corporate Server 7.2 - EN
Cortado Corporate Server 7.2 - EN
 
Enterprise Mobility (Admin)
Enterprise Mobility (Admin)Enterprise Mobility (Admin)
Enterprise Mobility (Admin)
 
Citrix Cloud Services: Total Economic Benefits Assessment Guide
Citrix Cloud Services: Total Economic Benefits Assessment GuideCitrix Cloud Services: Total Economic Benefits Assessment Guide
Citrix Cloud Services: Total Economic Benefits Assessment Guide
 
Leveraging Identity to Manage Change and Complexity
Leveraging Identity to Manage Change and ComplexityLeveraging Identity to Manage Change and Complexity
Leveraging Identity to Manage Change and Complexity
 
Empower Enterprise Mobility- Maximize Mobile Control- Presented by Atidan
Empower Enterprise Mobility- Maximize Mobile Control- Presented by AtidanEmpower Enterprise Mobility- Maximize Mobile Control- Presented by Atidan
Empower Enterprise Mobility- Maximize Mobile Control- Presented by Atidan
 
Remote Working Webinar (Episode 4)
Remote Working Webinar (Episode 4)Remote Working Webinar (Episode 4)
Remote Working Webinar (Episode 4)
 
CIS14: Mobilize Your Workforce with Secure Identity Services
CIS14: Mobilize Your Workforce with Secure Identity ServicesCIS14: Mobilize Your Workforce with Secure Identity Services
CIS14: Mobilize Your Workforce with Secure Identity Services
 
Remote Worker Series (Episode 1)
Remote Worker Series (Episode 1) Remote Worker Series (Episode 1)
Remote Worker Series (Episode 1)
 
Windows Intune webinar
Windows Intune webinarWindows Intune webinar
Windows Intune webinar
 

Similar a Sprin VTUG citrix Solutions

Digicomp Citrix Day 2015 : Keynote
Digicomp Citrix Day 2015 : KeynoteDigicomp Citrix Day 2015 : Keynote
Digicomp Citrix Day 2015 : Keynote
Digicomp Academy Suisse Romande SA
 

Similar a Sprin VTUG citrix Solutions (20)

Digicomp Citrix Day 2015 : Keynote
Digicomp Citrix Day 2015 : KeynoteDigicomp Citrix Day 2015 : Keynote
Digicomp Citrix Day 2015 : Keynote
 
Synergy 2014 day_1_keynote_-_ppt_version
Synergy 2014 day_1_keynote_-_ppt_versionSynergy 2014 day_1_keynote_-_ppt_version
Synergy 2014 day_1_keynote_-_ppt_version
 
Citrix Workspace Suite
Citrix Workspace SuiteCitrix Workspace Suite
Citrix Workspace Suite
 
Presentation citrix receiver road
Presentation   citrix receiver roadPresentation   citrix receiver road
Presentation citrix receiver road
 
Enterprise Mobility: Microsoft Cloud OS Roadshow
Enterprise Mobility: Microsoft Cloud OS RoadshowEnterprise Mobility: Microsoft Cloud OS Roadshow
Enterprise Mobility: Microsoft Cloud OS Roadshow
 
Business Continuity and app Security
Business Continuity and app Security Business Continuity and app Security
Business Continuity and app Security
 
SYN002: General Session
SYN002: General SessionSYN002: General Session
SYN002: General Session
 
Designing your xen desktop 7.5 environment with training guide
Designing your xen desktop 7.5 environment with training guideDesigning your xen desktop 7.5 environment with training guide
Designing your xen desktop 7.5 environment with training guide
 
Atelier Poste de travail - FWT15 Paris Citrix
Atelier Poste de travail - FWT15 Paris CitrixAtelier Poste de travail - FWT15 Paris Citrix
Atelier Poste de travail - FWT15 Paris Citrix
 
Embracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and CentrifyEmbracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and Centrify
 
Securing SaaS/Web and Windows Apps in a Hybrid Cloud World (SEC314-S) - AWS r...
Securing SaaS/Web and Windows Apps in a Hybrid Cloud World (SEC314-S) - AWS r...Securing SaaS/Web and Windows Apps in a Hybrid Cloud World (SEC314-S) - AWS r...
Securing SaaS/Web and Windows Apps in a Hybrid Cloud World (SEC314-S) - AWS r...
 
Mobilize your workforce with secure identity services
Mobilize your workforce with secure identity servicesMobilize your workforce with secure identity services
Mobilize your workforce with secure identity services
 
Citrix Mforum 2014 m104 JonathanWade
Citrix Mforum 2014 m104 JonathanWadeCitrix Mforum 2014 m104 JonathanWade
Citrix Mforum 2014 m104 JonathanWade
 
Pizzasessie SSO en Thin Clients: presentatie Citrix
Pizzasessie SSO en Thin Clients: presentatie CitrixPizzasessie SSO en Thin Clients: presentatie Citrix
Pizzasessie SSO en Thin Clients: presentatie Citrix
 
5 Key Elements Of A Complete Virtual Desktop Solution
5 Key Elements Of A Complete Virtual Desktop Solution5 Key Elements Of A Complete Virtual Desktop Solution
5 Key Elements Of A Complete Virtual Desktop Solution
 
XenMobile Datasheet
XenMobile DatasheetXenMobile Datasheet
XenMobile Datasheet
 
Througwave Day 2015 - VMware Software-Defined Techtrend Event
Througwave Day 2015 - VMware Software-Defined Techtrend EventThrougwave Day 2015 - VMware Software-Defined Techtrend Event
Througwave Day 2015 - VMware Software-Defined Techtrend Event
 
Three Keys to Building a Secure Mobile Infrastructure in Government Environments
Three Keys to Building a Secure Mobile Infrastructure in Government EnvironmentsThree Keys to Building a Secure Mobile Infrastructure in Government Environments
Three Keys to Building a Secure Mobile Infrastructure in Government Environments
 
Mobilizing windows-apps
Mobilizing windows-appsMobilizing windows-apps
Mobilizing windows-apps
 
Mobile secure workplace briefing presentation
Mobile secure workplace briefing presentationMobile secure workplace briefing presentation
Mobile secure workplace briefing presentation
 

Más de csharney

VMware Vsan vtug 2014
VMware Vsan vtug 2014VMware Vsan vtug 2014
VMware Vsan vtug 2014
csharney
 
Vtug spring ahead Microsoft Storage Spaces by dan stolts (it pro-guru)
Vtug spring ahead Microsoft Storage Spaces by dan stolts (it pro-guru)Vtug spring ahead Microsoft Storage Spaces by dan stolts (it pro-guru)
Vtug spring ahead Microsoft Storage Spaces by dan stolts (it pro-guru)
csharney
 

Más de csharney (14)

VMware Vsan vtug 2014
VMware Vsan vtug 2014VMware Vsan vtug 2014
VMware Vsan vtug 2014
 
Vtug spring ahead Microsoft Storage Spaces by dan stolts (it pro-guru)
Vtug spring ahead Microsoft Storage Spaces by dan stolts (it pro-guru)Vtug spring ahead Microsoft Storage Spaces by dan stolts (it pro-guru)
Vtug spring ahead Microsoft Storage Spaces by dan stolts (it pro-guru)
 
V Mworld 2010 Lab Cloud
V Mworld 2010 Lab CloudV Mworld 2010 Lab Cloud
V Mworld 2010 Lab Cloud
 
Exchange 2010 New England Vmug
Exchange 2010 New England VmugExchange 2010 New England Vmug
Exchange 2010 New England Vmug
 
Nevmug Vizioncore V Foglight Jan 2009
Nevmug   Vizioncore V Foglight Jan 2009Nevmug   Vizioncore V Foglight Jan 2009
Nevmug Vizioncore V Foglight Jan 2009
 
Nevmug Pano Logic January 2009
Nevmug   Pano Logic   January 2009Nevmug   Pano Logic   January 2009
Nevmug Pano Logic January 2009
 
Nevmug Martins Point Health Care J Anuary 2009
Nevmug   Martins Point Health Care   J Anuary 2009Nevmug   Martins Point Health Care   J Anuary 2009
Nevmug Martins Point Health Care J Anuary 2009
 
Nevmug Lighthouse Automation7.1
Nevmug   Lighthouse   Automation7.1Nevmug   Lighthouse   Automation7.1
Nevmug Lighthouse Automation7.1
 
Nevmug Focus Ti V Mware Networking January 2009
Nevmug   Focus Ti V Mware Networking   January 2009Nevmug   Focus Ti V Mware Networking   January 2009
Nevmug Focus Ti V Mware Networking January 2009
 
Nevmug Emc January 2009
Nevmug   Emc January 2009Nevmug   Emc January 2009
Nevmug Emc January 2009
 
Nevmug Amd January 2009
Nevmug   Amd January 2009 Nevmug   Amd January 2009
Nevmug Amd January 2009
 
Nevmug Left Hand Tower Publishing January 2009
Nevmug  Left Hand  Tower Publishing January 2009Nevmug  Left Hand  Tower Publishing January 2009
Nevmug Left Hand Tower Publishing January 2009
 
Vm Ware Presentation Key Note
Vm Ware Presentation Key NoteVm Ware Presentation Key Note
Vm Ware Presentation Key Note
 
Nevmug Green Pages Cisco Nexus January 2009
Nevmug   Green Pages Cisco   Nexus January 2009Nevmug   Green Pages Cisco   Nexus January 2009
Nevmug Green Pages Cisco Nexus January 2009
 

Último

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 

Último (20)

🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 

Sprin VTUG citrix Solutions

  • 1. April 24, 2014 Taking Your Business, and Users, to the Cloud! VTUG: Spring Ahead 2014 Todd Smith – Citrix
  • 2. © 2014 Citrix | Confidential – Do Not Distribute
  • 3. © 2014 Citrix | Confidential – Do Not Distribute
  • 4. © 2014 Citrix | Confidential – Do Not Distribute
  • 5. © 2014 Citrix | Confidential – Do Not Distribute
  • 6. © 2014 Citrix | Confidential – Do Not Distribute
  • 7. © 2014 Citrix | Confidential – Do Not Distribute
  • 8. © 2014 Citrix | Confidential – Do Not Distribute
  • 9. © 2014 Citrix | Confidential – Do Not Distribute Workplace Redesign Mobile Workstyles Workforce Mobility Workflow Optimization
  • 10. © 2014 Citrix | Confidential – Do Not Distribute A Mobile Workstyle makes people happier and more productive
  • 11. © 2014 Citrix | Confidential – Do Not Distribute
  • 12. © 2014 Citrix | Confidential – Do Not Distribute Collaboration & Sharing Access & Data Security App & Desktop Virtualization Enterprise Mobility Management App Networking & Cloud Orchestration
  • 13. © 2014 Citrix | Confidential – Do Not Distribute© 2013 Citrix | Confidential – Do Not Distribute Tablets expected to soon overtake PC sales* 3+ devices per employee 1.5 M Android devices activated daily BYOD Revolution * IDC, 2013
  • 14. © 2014 Citrix | Confidential – Do Not Distribute Mobility vs. Security • Too many ways to lose data on mobile devices • Mobile networks becoming the norm vs. WAN • Data too big to move • Confidentiality, compliance and IP protection more complex *Wireless Intelligence report, 1, 2013
  • 15. © 2014 Citrix | Confidential – Do Not Distribute Infinite Complexity of Management Across apps, devices and locations
  • 16. © 2014 Citrix | Confidential – Do Not Distribute 16 Business Concerns Device Configuration App Configuration and Delivery Content Support End User Experience Security, Integration, Vendor Consolidation, Value on Investment
  • 17. © 2014 Citrix | Confidential – Do Not Distribute 17 XenMobile Enterprise The Citrix Solution Device Configuration XenMobile MDM App Configuration and Delivery XenMobile MAM Content XenMobile ShareFile Support Remote Support and GoToAssist Integrate and Leverage Existing Citrix Investment Enable User Productivity While Maintaining Security
  • 18. © 2014 Citrix | Confidential – Do Not Distribute Citrix – The Most Complete Mobile Portfolio Any app, any device, anywhere Mobile ROI Mobile Device Management Sandboxed Mail and Web Mobile App Security Secure Mobile Data Sharing Mobile Network Control SSO & Identity Management Desktop & App Virtualization Social & Web Collaboration
  • 19. © 2014 Citrix | Confidential – Do Not Distribute MobileROI Device Management Sandboxed mail and web Mobile network control Mobile app security MDM Enterprise Mobility Management Citrix - The Most Comprehensive Solution SSO & Id Mgmt Secure data control Desktop & App Virtualization Collaboration GoToMeeting GoToAssist Podio MDM Edition Enterprise Citrix – Competitive Position
  • 20. © 2014 Citrix | Confidential – Do Not Distribute Recognized as a “Leader” by Gartner; Winner at Interop Magic Quadrant Critical Capabilities Source: Gartner report, Magic Quadrant for Mobile Device Management Software, May 23, 2013, Phillip Redman, John Girard, Terrence Cosgrove, Monica Basso Source: Gartner report, Critical Capabilities for Mobile Device Management Software, May 23, 2013, Phillip Redman © 2013 Gartner, Inc. and/or its affiliates. All rights reserved. Gartner is a registered trademark of Gartner, Inc. or its affiliates. For more information, e-mail info@gartner.com or visit gartner.com. Used with permission.
  • 21. © 2014 Citrix | Confidential – Do Not Distribute Mobile, Simple, Secure
  • 22. © 2014 Citrix | Confidential – Do Not Distribute What Do We Know?
  • 23. © 2014 Citrix | Confidential – Do Not Distribute Entire desktopJust the apps Windows apps and data secured and delivered… Within a virtual desktop Optimized for: • Large Screen Footprint - Multi-window • Keyboard and mouse • Persistent workspace Windows apps and data secured and delivered… Optimized for: • Smaller screen, mobile • Touch interface • Non-persistent workspace Apps and Desktops with Ease Seamless Transitions
  • 24. © 2014 Citrix | Confidential – Do Not Distribute Central or local execution FlexCast delivery technology Physical PCs Apps and Desktops HDX 3D Pro-enabled workstations or Remote PC access technology Central Management Image management | Application management | User data profiles | Access policies Central Execution Local Execution Hosted VDI Apps and desktops Dedicated or pooled desktop virtual machines Hosted Shared Apps and Desktops Windows Server session-based desktop or apps Local Hypervisor Desktops Type 1 Hypervisor for PCs and Laptops with XenClient Synchronizer
  • 25. © 2014 Citrix | Confidential – Do Not Distribute Desktops and Apps as-a-Service
  • 26. © 2014 Citrix | Confidential – Do Not Distribute XenDesktop 7 Single Site Director 2.1 Site A Site B Site C Help Desk and Troubleshooting / Environment health Director
  • 27. © 2014 Citrix | Confidential – Do Not Distribute EdgeSight Performance management Director and EdgeSight XenDesktop 7 Site A Site B Site C Director Historical Trends and Analytics Managing and optimizing capacity TM TM TM
  • 28. © 2014 Citrix | Confidential – Do Not Distribute EdgeSight Network analysis Director and EdgeSight XenDesktop 7 Site A Site B Site C HDX Insight Isolating and managing network performance Network - Deep Packet Analysis TM TM
  • 29. © 2014 Citrix | Confidential – Do Not Distribute Let’s Go Mobile!
  • 30. © 2014 Citrix | Confidential – Do Not Distribute ShareFile • SSO to all MDX apps • User support for MDX apps • Integrated email, contacts and calendar • Designed for work • Internet and intranet browsing • Supports file download • All your files available anywhere • Sharing integrated into other MDX apps WorxMail WorxWeb WorxHome
  • 31. © 2014 Citrix | Confidential – Do Not Distribute System Overview Access Gateway App Controller Device Manager ShareFile WorxStore StorageZone ShareFile ControlPlane XenMobile Enterprise
  • 32. © 2014 Citrix | Confidential – Do Not Distribute User authorization required Mobile device access Allow local storage Offline access allowed Restrict document sharing Printing allowed Edit data SmartAccess Policy Controls
  • 34. © 2014 Citrix | Confidential – Do Not Distribute Unified Corporate App Store • Available on 3B+ devices • Mobile apps native on device • Seamless delivery of Windows, datacenter and web apps • Any device – smartphone, tablet, PC and Mac
  • 35. © 2014 Citrix | Confidential – Do Not Distribute Authentication Authentication and SSO • Strongly authenticates users o NetScaler Gateway is primary authentication point o Permits combinations of AD credentials with certificates, tokens, and other second factors • Registers devices to users o Permits lock and wipe of corporate data/apps on selected devices • Serves as access manager for MDX managed apps o Strongly identifies managed apps o Determines app entitlements and policies for authenticated users o Brokers permitted data exchanges between managed apps WorxHome
  • 36. © 2014 Citrix | Confidential – Do Not Distribute Single Sign-On Authentication and SSO • SSO for all managed apps o Hosted HDX apps and desktops o Web/SaaS apps o MDX managed mobile apps  Various online and offline modes selected by app policy • MDX apps can use derived credentials o Gateway tickets for micro-VPN access o Automatic HTTP auth challenge responses (NTLM today, Kerberos coming soon) o Certificates for PKI protected web sites o Specialty credentials eg (SAML token for Sharefile access) WorxHome
  • 37.
  • 38. © 2014 Citrix | Confidential – Do Not Distribute WorxMail Mail, calendar, contacts Enterprise class security Beautiful native experience Full inter-app integration MDX-secured • Secure email body and attachment • “Open in” control to provide data leak protection • No Exchange server exposure to internet • Send email with ShareFile attachments • Integrated calendars and Exchange GAL
  • 39. © 2014 Citrix | Confidential – Do Not Distribute Sandboxed Email, Calendar and Contacts App • Secure email app with a great user experience • Attach files to emails and save attachments • Full calendar with access to free/busy information • Directly opens web links to any site, including intranet sites
  • 40. © 2014 Citrix | Confidential – Do Not Distribute Secure Document Sharing, Sync & Editing • Both cloud and on-premises data storage options • Capable of accessing SharePoint and network drives • “Open-in” capabilities can be restricted to other Worx-enabled apps
  • 41.
  • 42. © 2014 Citrix | Confidential – Do Not Distribute WorxWeb 42 Secure browser Internal web app access Full inter-app integration Consumer experience MDX-secured • iOS and Android device intranet web browsing o Easy access to SharePoint, Intranet Portal etc • Similar look/ feel as native browser o Safari on iOS; Chrome on Android • Single sign-on via NetScaler o Respond to HTTP 401
  • 43. © 2014 Citrix | Confidential – Do Not Distribute Secure Mobile Web Browser • Full-featured consumer-like browser • Secure access to internal, external and HTML5 web apps • URL whitelisting and blacklisting • Access to enterprise resources with a Micro VPN
  • 44.
  • 45. © 2014 Citrix | Confidential – Do Not Distribute ShareFile Platform Storage Zones Network Shares SharePoint ShareFile.com
  • 46. © 2014 Citrix | Confidential – Do Not Distribute Follow-me data with ShareFile • Enables file sharing with anyone • Syncs data across all devices • Online file sharing spaces for virtual teams • Selective offline access on mobile devices • Data protection ᵒ Encryption ᵒ Device lock ᵒ Remote wipe ᵒ Poison-pill Secure
  • 47. © 2014 Citrix | Confidential – Do Not Distribute ShareFile Enables Mobile Workstyles • Access, share and sync files from any device • Apps for mobile devices • Mobile-optimized ShareFile web site • Access data residing in existing network shares & SharePoint* • Offline access and editing • Built-in mobile editor for rich content editing on-the-go • PDF annotation
  • 48. © 2014 Citrix | Confidential – Do Not Distribute Mobile content editor for Microsoft Office
  • 49. © 2014 Citrix | Confidential – Do Not Distribute Workflow Integration with Microsoft Outlook Attachment conversion Unclog mail servers Overcome file size restrictions Better control and visibility Request large files
  • 50. © 2014 Citrix | Confidential – Do Not Distribute ShareFile with StorageZones Citrix-managed StorageZone (AWS) Customer-managed StorageZone (example) • Choose where your data is stored • Designated zones in public clouds • Manage StorageZones on-premises
  • 51. © 2014 Citrix | Confidential – Do Not Distribute On-Demand Sync + Data Optimized for Virtual Desktops Instant access, share and sync Reduce storage costs
  • 53. © 2014 Citrix | Confidential – Do Not Distribute AppApp App MDX Technologies • Encrypted local storage • Micro (app specific) VPN • App specific lock and wipe • Inter-app communication • Conditional access policies • Federated identity and SSO App App PreparationTool
  • 54. © 2014 Citrix | Confidential – Do Not Distribute Information Containment • Control data exchange with other apps and devices: ᵒ Cut/Copy/Paste ᵒ Document exchange (Open-In) ᵒ Inter-app communications ᵒ Network APIs QuickLook EvernoteMail Facebook OfficeHDBox QuickLook OfficeHD without containment with containment What happens in MDX apps stays in MDX apps….
  • 55. © 2014 Citrix | Confidential – Do Not Distribute Secure inter-app communication • Restricted – Allow only trusted apps to share data with one another • Unrestricted – No controls, “Open In” shows all apps registered to handle that file type • Blocked – No way to share that app’s data with anything else app one app two mobile OS Open-In
  • 56. © 2014 Citrix | Confidential – Do Not Distribute private data CitrixReceiver MDX InterApp MDXVault XenMobile NativeMobile Apps Deny SMS Disable iCloud Disable screenshots Force authentication Block jailbroken device MDXPolicies duringapp wrapping app private data vault app private data vault
  • 57. © 2014 Citrix | Confidential – Do Not Distribute Enterprise-enable any mobile app with the Worx App SDK • Simple and powerful SDK • Enabled through a single line of code • Apps can be wrapped post-development • Controls like: ᵒ Data encryption ᵒ Authentication ᵒ Secure lock and wipe ᵒ Inter-app policies ᵒ Micro VPNs Any app can be a Worx app
  • 58. © 2014 Citrix | Confidential – Do Not Distribute App Behavior Restrictions • Block mobile OS API sets and features ᵒ Printing ᵒ iCloud ᵒ Email and SMS compose ᵒ Inter-app URL dispatch and scheme handlers (iOS) ᵒ Intent launch and content providers (Android) • Block access to sensitive device hardware ᵒ Camera, microphone, location services, etc. • All controls are applied at run-time based on app policies
  • 59. © 2014 Citrix | Confidential – Do Not Distribute App Access Controls • Block/permit app access based on policy • User authentication (how and when) ᵒ Online versus offline, re-authentication period, max offline time • Device security posture ᵒ Jail-broken or rooted ᵒ PIN/passcode enabled ᵒ Hardware enforced encryption ᵒ MDM enrolled vs unmanaged • Network state ᵒ Internal network or external ᵒ Specific internal wifi networks ᵒ Wifi Only
  • 61.
  • 62. © 2014 Citrix | Confidential – Do Not Distribute XenMobile Infrastructure Dependencies Network & Information Systems Infrastructure CORE SERVICES: Active Directory / LDAP NTP, and DNS services ready HOST NAMES: Create FQDN’s for XenMobile Device Manager & WorxHome VIP Addresses FIREWALL RULES: Configure for device connections & XenMobile servers (XDM, XAC, NetScaler) IP Addresses: (Public & Internal) Must have the static IP’s mapped for External NATs, NSIP, SNIPs, and VIPs that are used by the NetScaler, XDM, XAC and other services. Server Environment: Physical & Virtual (DMZ vs. Corporate LAN placement of servers) IT Security: Internal PKI, external certificate services, and Identity Management services
  • 63. © 2014 Citrix | Confidential – Do Not Distribute Create Base Policies The Must Haves “Magic 5” MDM Policies • End-User Terms & Conditions • Device Passcode • Software Inventory (where allowed / privacy concerns) • Company WiFi (setup a secure network) • ActiveSync Mail Regional or User/Device Specific Policies • Device Restrictions • Location Services • VPN • PKI / User Identity Certificates • App Push • App Store • Device Platform Specific (iOS 7, Samsung SAFE/KNOX) Worx App Policies • Clipboard (Copy & Paste) • Documents (Open In) • Device Restrictions • Login Security • mVPN Tunneling vs. Open Networking • Network WiFi Control
  • 64. © 2014 Citrix | Confidential – Do Not Distribute Citrix – The Most Complete Mobile Portfolio Any app, any device, anywhere Mobile ROI Mobile Device Management Sandboxed Mail and Web Mobile App Security Secure Mobile Data Sharing Mobile Network Control SSO & Identity Management Desktop & App Virtualization Social & Web Collaboration
  • 65. © 2014 Citrix | Confidential – Do Not Distribute Mobile, Simple, Secure
  • 66. © 2014 Citrix | Confidential – Do Not Distribute Questions? •Todd Smith – Sales Engineering Manager ᵒ Todd.smith2@citrix.com •www.citrix.com
  • 67. © 2014 Citrix | Confidential – Do Not Distribute Want something for Free? • The Free 350 page soup-to-nuts 'How To: BYOD Project Volume 1' e-book will teach you: • How to install and configure Citrix DesktopPlayer for Mac 1.1, soup-to-nuts... • How to install and configure Citrix XenClient Enterprise Synchronizer 5.1.1. • How to install and configure Microsoft Windows Server 2012 R2 • How to install and configure Hyper-V for use with the Citrix Synchronizer. • How to prepare the environment for installation. • How to train end-users to use the new DesktopPlayer for Mac solutions. • Detailed Citrix Synchronizer Policies section. • Detailed Citrix Synchronizer administration tasks explained. • Citrix Synchronizer backup and recovery explained. • How to create & maintain Synchronizer virtual machines. • 350 pages of step-by-step, soup-to-nuts, and easy as 1,2,3! • http://docs.dabcc.com
  • 68. Work better. Live better.