SlideShare a Scribd company logo
1 of 34
Director – Systems Engineering, US Public Sector
Faisal.Iqbal@citrix.com
@virtfaisal
Future of Fed Mobility
Enabling productivity through
Mobility, Telework, BYOD and DCC
Faisal Iqbal
State of Federal Mobility
BYO
55%
Employees
Basic Security
1/3
Employees
Unsecured Data
42%
Employees
Productivity
28B
Source: MWE Digital Dilemma 2013 Report
Driving towards Federal Mobility
DOD Mobility Strategy and Implementation Plan
“Establish a mobile device management service”
“Promote the Development and use of DOD Mobile and
Web-enabled Applications”
“Provide an enterprise mobile application environment”
DGS Milestone 9.1
Develop government-wide mobile and wireless security baseline
(includes security reference architectures.)
DHS/DoD/NIST
OPM 2012 Telework Status Report
http://www.telework.gov
• All 87 agencies participating in the
Data Call had established telework
policies
• Approximately 32 percent of all
federal employees deemed eligible
• 27 percent of teleworkers worked
remotely three or more days per
week
“Not all managers are comfortable directing employees who telework”
Fed CIO Council’s BYOD Toolkit
http://www.whitehouse.gov/digitalgov/bring-your-own-device
“…guidance based on lessons learned from successful BYOD programs launched
at forward-leaning agencies. ”
Enterprise
Mobility
Telework
Next Gen
Workplaces
BYOD
App Stores
Federal
Mobile
Workstyles
Disaster
COOP
Office
Security &
Compliance
App + Desktop Virtualization
Delivering hosted Windows Apps and Desktops
SSL 011010 SSL 1011011010 SSL 1011011010 SSL 1011011010 SSL 1011011010 SSL 101101 SSL SSL 1011011010 SSL
APPS
DATA
USER PROFILE
OS
Any networkUniversal
client
Any Datacenter
or Cloud
FIPS 140-2
SSL DMZ Proxy
People-centric and use case driven
Mobilizing
Windows
Apps
GIS and
3D
workloads
BYO
laptop and
device
Remote
Access
Thin/Zero
Client
Computing
Telework Case Study
Virtualization
• “Home Use” Program
• 28,000 users worldwide
• Mission Productivity and COOP
BYOD Case Study
Virtualization
• ~80% telecommuting
• $2 million – typical GFE HW costs
• $1.2 million in savings
Remote PC Access
Secure Remote access to your work computer
SSL 011010 SSL 1011011010 SSL 1011011010 SSL 1011011010 SSL 1011011010 SSL 101101 SSL 1011011010 SSL 101101101
Any networkUniversal
client
Any Thick PCFIPS 140-2
SSL DMZ Proxy
• Platform unification
• HDX Mobile
• Integrated Monitoring
• Unified App Store
• Fully PIV-compatible
2 purpose-built consoles
Studio
• Automated workload
provisioning
• Automatic app publishing
• Custom delegated
administration
Director
• Real-time assessment
• Site health and performance
• EdgeSightTM User Experience
Analytics
High definition experience on any device
Efficient bandwidth utilization
Advanced quality of service
Cross-continent latency tolerance
Industry leading peripheral support
Real-time voice and multimedia
optimization
Point to point unified communications
Virtualized 3D workstation
GPU accelerated 3D graphics
15
• Industry First vGPU solution
• Full OpenGL and DirectX Support
• Fluid experience with full screen
3D apps
• 50% reduction in bandwidth
requirements
Demo
XenDesktop 7
Delivering Windows apps & desktops
as a cloud service
Citrix
Project Avalon
How Federal Mobility Feels Today
IA Perspective
Mobile makes security and
compliance harder. Too many
tools are required to manage it.
User Perspective
Mobile can do so much for
my life, why can’t it do more
for my agency?
Federal Mobile Security
• "Specifically, the Army CIO did not
appropriately track CMDs and was
unaware of more than 14,000 CMDs
used throughout the Army”
• ”Army also failed to ensure its
commands properly configured
devices to store protected
information and to use a mobile
device management application to
do so.”
• Balance security with mobility access
• Government data leakage
• Delivery to multiple mobile platforms
• Secure authentication (smartcard, two-factor)
• BYOD, GOPE…security, compliance, mgmt
• Dual Persona
Federal Mobility Challenges
A complete stack for
managing and
securing apps, data,
and devices
App Management
Device Management
Data Management
Recognized as a “Leader” by Gartner; Winner at Interop
Magic Quadrant Critical Capabilities
Source: Gartner report, Magic Quadrant for Mobile Device Management Software, May 23, 2013, Phillip Redman, John Girard, Terrence Cosgrove, Monica Basso
Source: Gartner report, Critical Capabilities for Mobile Device Management Software, May 23, 2013, Phillip Redman
© 2013 Gartner, Inc. and/or its affiliates. All rights reserved. Gartner is a registered trademark of Gartner, Inc. or its affiliates. For more information, e-mail info@gartner.com or visit gartner.com. Used with permission.
MDX
App Vault
Secure container
that enables app and
data containment,
wipe and lock
MDX
Access
Secure access to
Intranet resources
via Micro-VPN
MDX
InterApp
Trusted application
communication
fabric
Container-Based Mobile App Management
• Secure mobile browser
• Internal web app access
• URL black/whitelists
• Mail, calendar, contacts
• Enterprise class security
• Beautiful native-like experience
• Secure file sharing & sync
• Mobile content editing
• SharePoint & network files
Sandboxed email, browser and document
sharing apps
Enterprise-enable any mobile app with the
Worx App SDK
• Simple and powerful SDK
• Enabled through a single line of code
• Apps can be wrapped post-development
• Controls like:
ᵒData encryption
ᵒAuthentication
ᵒSecure lock and wipe
ᵒInter-app policies
ᵒMicro VPNs
Any app can be a Worx app
Demo
XenMobile
Data Center Consolidation
Data Center Consolidation Case Study
Server Virtualization
• Reduced Power consumption by 83%
• $472k annual operational savings
• Improved capacity and performance
by 300%
Building an “Open” Data Center
Server Virtualization and Cloud
Network Appliance Consolidation
SDX
SDN Platform
1010SL1010101SSL01
Seamless
Experience
Cloud
Solutions
Secure
Access
Client Gateway
Data
Mobile & Web Apps
Collaboration
Windows Apps & Desktops
AppStore
Networking & Cloud Infrastructure
1010SL1010101SSL01
Seamless
Experience
Cloud
Solutions
Secure
Access
Resources
Citrix.com/USGovernment
• Whitepapers
• Solution Guides
• Govt References accounts
Follow us @CitrixPublicSec
Work better. Live better.

More Related Content

What's hot

Symantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec
 
Best practices of mobile technology leaders: Airwatch Connect 2013
Best practices of mobile technology leaders: Airwatch Connect 2013Best practices of mobile technology leaders: Airwatch Connect 2013
Best practices of mobile technology leaders: Airwatch Connect 2013Chris Pepin
 
Mobile Devices & BYOD Security – Deployment & Best Practices
Mobile Devices & BYOD Security – Deployment & Best PracticesMobile Devices & BYOD Security – Deployment & Best Practices
Mobile Devices & BYOD Security – Deployment & Best PracticesCisco Canada
 
Roadmap to Healthcare HIPAA Compliance and Mobile Security for BYOD
Roadmap to Healthcare HIPAA Compliance and Mobile Security for BYODRoadmap to Healthcare HIPAA Compliance and Mobile Security for BYOD
Roadmap to Healthcare HIPAA Compliance and Mobile Security for BYODSierraware
 
SierraVMI Virtual Mobile Infrastructure (VMI). Android-based VDI.
SierraVMI Virtual Mobile Infrastructure (VMI). Android-based VDI.SierraVMI Virtual Mobile Infrastructure (VMI). Android-based VDI.
SierraVMI Virtual Mobile Infrastructure (VMI). Android-based VDI.Sierraware
 
Adopting A Zero-Trust Model. Google Did It, Can You?
Adopting A Zero-Trust Model. Google Did It, Can You?Adopting A Zero-Trust Model. Google Did It, Can You?
Adopting A Zero-Trust Model. Google Did It, Can You?Zscaler
 
Mobile Device Management and Mobile Security Strategy - a presentation by Rap...
Mobile Device Management and Mobile Security Strategy - a presentation by Rap...Mobile Device Management and Mobile Security Strategy - a presentation by Rap...
Mobile Device Management and Mobile Security Strategy - a presentation by Rap...RapidValue
 
Ivanti remote worker ds
Ivanti remote worker   dsIvanti remote worker   ds
Ivanti remote worker dsIvanti
 
Mobile Device Management
Mobile Device ManagementMobile Device Management
Mobile Device ManagementJohn Rhoton
 
Securing the Mobile enterprise
Securing the Mobile enterpriseSecuring the Mobile enterprise
Securing the Mobile enterpriseIBM Danmark
 
Rethinking Cybersecurity for the Digital Transformation Era
Rethinking Cybersecurity for the Digital Transformation EraRethinking Cybersecurity for the Digital Transformation Era
Rethinking Cybersecurity for the Digital Transformation EraZscaler
 
Cyber Threat Intelligence: Highlights and Trends for 2020
Cyber Threat Intelligence: Highlights and Trends for 2020Cyber Threat Intelligence: Highlights and Trends for 2020
Cyber Threat Intelligence: Highlights and Trends for 2020DevOps.com
 
A Primer on iOS Management and What's Changing
A Primer on iOS Management and What's ChangingA Primer on iOS Management and What's Changing
A Primer on iOS Management and What's ChangingIvanti
 
Three ways-zero-trust-security-redefines-partner-access-v8
Three ways-zero-trust-security-redefines-partner-access-v8Three ways-zero-trust-security-redefines-partner-access-v8
Three ways-zero-trust-security-redefines-partner-access-v8Zscaler
 
What Comes After VPN?
What Comes After VPN?What Comes After VPN?
What Comes After VPN?Zscaler
 
SmartDevCon - Katowice - 2013
SmartDevCon - Katowice - 2013SmartDevCon - Katowice - 2013
SmartDevCon - Katowice - 2013Petr Dvorak
 
3 reasons-sdp-is-replacing-vpn-in-2019
3 reasons-sdp-is-replacing-vpn-in-20193 reasons-sdp-is-replacing-vpn-in-2019
3 reasons-sdp-is-replacing-vpn-in-2019Zscaler
 
Mobile Security for Banking and Finance
Mobile Security for Banking and FinanceMobile Security for Banking and Finance
Mobile Security for Banking and FinanceSierraware
 
Faster, simpler, more secure remote access to apps in aws
Faster, simpler, more secure remote access to apps in awsFaster, simpler, more secure remote access to apps in aws
Faster, simpler, more secure remote access to apps in awsZscaler
 

What's hot (20)

Symantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec Mobile Security Webinar
Symantec Mobile Security Webinar
 
Best practices of mobile technology leaders: Airwatch Connect 2013
Best practices of mobile technology leaders: Airwatch Connect 2013Best practices of mobile technology leaders: Airwatch Connect 2013
Best practices of mobile technology leaders: Airwatch Connect 2013
 
Mobile Devices & BYOD Security – Deployment & Best Practices
Mobile Devices & BYOD Security – Deployment & Best PracticesMobile Devices & BYOD Security – Deployment & Best Practices
Mobile Devices & BYOD Security – Deployment & Best Practices
 
Roadmap to Healthcare HIPAA Compliance and Mobile Security for BYOD
Roadmap to Healthcare HIPAA Compliance and Mobile Security for BYODRoadmap to Healthcare HIPAA Compliance and Mobile Security for BYOD
Roadmap to Healthcare HIPAA Compliance and Mobile Security for BYOD
 
SierraVMI Virtual Mobile Infrastructure (VMI). Android-based VDI.
SierraVMI Virtual Mobile Infrastructure (VMI). Android-based VDI.SierraVMI Virtual Mobile Infrastructure (VMI). Android-based VDI.
SierraVMI Virtual Mobile Infrastructure (VMI). Android-based VDI.
 
Adopting A Zero-Trust Model. Google Did It, Can You?
Adopting A Zero-Trust Model. Google Did It, Can You?Adopting A Zero-Trust Model. Google Did It, Can You?
Adopting A Zero-Trust Model. Google Did It, Can You?
 
Mobile Device Management and Mobile Security Strategy - a presentation by Rap...
Mobile Device Management and Mobile Security Strategy - a presentation by Rap...Mobile Device Management and Mobile Security Strategy - a presentation by Rap...
Mobile Device Management and Mobile Security Strategy - a presentation by Rap...
 
Ivanti remote worker ds
Ivanti remote worker   dsIvanti remote worker   ds
Ivanti remote worker ds
 
Mobile Device Management
Mobile Device ManagementMobile Device Management
Mobile Device Management
 
Securing the Mobile enterprise
Securing the Mobile enterpriseSecuring the Mobile enterprise
Securing the Mobile enterprise
 
Rethinking Cybersecurity for the Digital Transformation Era
Rethinking Cybersecurity for the Digital Transformation EraRethinking Cybersecurity for the Digital Transformation Era
Rethinking Cybersecurity for the Digital Transformation Era
 
Security Development Life Cycle
Security Development Life CycleSecurity Development Life Cycle
Security Development Life Cycle
 
Cyber Threat Intelligence: Highlights and Trends for 2020
Cyber Threat Intelligence: Highlights and Trends for 2020Cyber Threat Intelligence: Highlights and Trends for 2020
Cyber Threat Intelligence: Highlights and Trends for 2020
 
A Primer on iOS Management and What's Changing
A Primer on iOS Management and What's ChangingA Primer on iOS Management and What's Changing
A Primer on iOS Management and What's Changing
 
Three ways-zero-trust-security-redefines-partner-access-v8
Three ways-zero-trust-security-redefines-partner-access-v8Three ways-zero-trust-security-redefines-partner-access-v8
Three ways-zero-trust-security-redefines-partner-access-v8
 
What Comes After VPN?
What Comes After VPN?What Comes After VPN?
What Comes After VPN?
 
SmartDevCon - Katowice - 2013
SmartDevCon - Katowice - 2013SmartDevCon - Katowice - 2013
SmartDevCon - Katowice - 2013
 
3 reasons-sdp-is-replacing-vpn-in-2019
3 reasons-sdp-is-replacing-vpn-in-20193 reasons-sdp-is-replacing-vpn-in-2019
3 reasons-sdp-is-replacing-vpn-in-2019
 
Mobile Security for Banking and Finance
Mobile Security for Banking and FinanceMobile Security for Banking and Finance
Mobile Security for Banking and Finance
 
Faster, simpler, more secure remote access to apps in aws
Faster, simpler, more secure remote access to apps in awsFaster, simpler, more secure remote access to apps in aws
Faster, simpler, more secure remote access to apps in aws
 

Viewers also liked

May 2013 Federal Cloud Computing Summit Presentation
May 2013 Federal Cloud Computing Summit PresentationMay 2013 Federal Cloud Computing Summit Presentation
May 2013 Federal Cloud Computing Summit PresentationTim Harvey
 
May 2013 Federal Cloud Computing Summit Welcome by Dr. David McClure
May 2013 Federal Cloud Computing Summit Welcome by Dr. David McClureMay 2013 Federal Cloud Computing Summit Welcome by Dr. David McClure
May 2013 Federal Cloud Computing Summit Welcome by Dr. David McClureTim Harvey
 
Speaker Presention by Adam Porter of the University of Maryland | December 17...
Speaker Presention by Adam Porter of the University of Maryland | December 17...Speaker Presention by Adam Porter of the University of Maryland | December 17...
Speaker Presention by Adam Porter of the University of Maryland | December 17...Tim Harvey
 
Recap of MITRE Cloud Collaboration Sessions by Justin Brunelle of MITRE | Dec...
Recap of MITRE Cloud Collaboration Sessions by Justin Brunelle of MITRE | Dec...Recap of MITRE Cloud Collaboration Sessions by Justin Brunelle of MITRE | Dec...
Recap of MITRE Cloud Collaboration Sessions by Justin Brunelle of MITRE | Dec...Tim Harvey
 
Visionary Keynote by Bill Schlough of the San Francisco Giants | December 17,...
Visionary Keynote by Bill Schlough of the San Francisco Giants | December 17,...Visionary Keynote by Bill Schlough of the San Francisco Giants | December 17,...
Visionary Keynote by Bill Schlough of the San Francisco Giants | December 17,...Tim Harvey
 
Progam slides | December 17, 2013 | Federal Cloud Computing Summit
Progam slides | December 17, 2013 | Federal Cloud Computing SummitProgam slides | December 17, 2013 | Federal Cloud Computing Summit
Progam slides | December 17, 2013 | Federal Cloud Computing SummitTim Harvey
 
May 2013 Federal Cloud Computing Summit Keynote by David Cearly
May 2013 Federal Cloud Computing Summit Keynote by David CearlyMay 2013 Federal Cloud Computing Summit Keynote by David Cearly
May 2013 Federal Cloud Computing Summit Keynote by David CearlyTim Harvey
 
Speaker Presention by Irena Bojanova of the University of Maryland University...
Speaker Presention by Irena Bojanova of the University of Maryland University...Speaker Presention by Irena Bojanova of the University of Maryland University...
Speaker Presention by Irena Bojanova of the University of Maryland University...Tim Harvey
 

Viewers also liked (8)

May 2013 Federal Cloud Computing Summit Presentation
May 2013 Federal Cloud Computing Summit PresentationMay 2013 Federal Cloud Computing Summit Presentation
May 2013 Federal Cloud Computing Summit Presentation
 
May 2013 Federal Cloud Computing Summit Welcome by Dr. David McClure
May 2013 Federal Cloud Computing Summit Welcome by Dr. David McClureMay 2013 Federal Cloud Computing Summit Welcome by Dr. David McClure
May 2013 Federal Cloud Computing Summit Welcome by Dr. David McClure
 
Speaker Presention by Adam Porter of the University of Maryland | December 17...
Speaker Presention by Adam Porter of the University of Maryland | December 17...Speaker Presention by Adam Porter of the University of Maryland | December 17...
Speaker Presention by Adam Porter of the University of Maryland | December 17...
 
Recap of MITRE Cloud Collaboration Sessions by Justin Brunelle of MITRE | Dec...
Recap of MITRE Cloud Collaboration Sessions by Justin Brunelle of MITRE | Dec...Recap of MITRE Cloud Collaboration Sessions by Justin Brunelle of MITRE | Dec...
Recap of MITRE Cloud Collaboration Sessions by Justin Brunelle of MITRE | Dec...
 
Visionary Keynote by Bill Schlough of the San Francisco Giants | December 17,...
Visionary Keynote by Bill Schlough of the San Francisco Giants | December 17,...Visionary Keynote by Bill Schlough of the San Francisco Giants | December 17,...
Visionary Keynote by Bill Schlough of the San Francisco Giants | December 17,...
 
Progam slides | December 17, 2013 | Federal Cloud Computing Summit
Progam slides | December 17, 2013 | Federal Cloud Computing SummitProgam slides | December 17, 2013 | Federal Cloud Computing Summit
Progam slides | December 17, 2013 | Federal Cloud Computing Summit
 
May 2013 Federal Cloud Computing Summit Keynote by David Cearly
May 2013 Federal Cloud Computing Summit Keynote by David CearlyMay 2013 Federal Cloud Computing Summit Keynote by David Cearly
May 2013 Federal Cloud Computing Summit Keynote by David Cearly
 
Speaker Presention by Irena Bojanova of the University of Maryland University...
Speaker Presention by Irena Bojanova of the University of Maryland University...Speaker Presention by Irena Bojanova of the University of Maryland University...
Speaker Presention by Irena Bojanova of the University of Maryland University...
 

Similar to Future of Fed Mobility | Citrix Technical Exchange hosted by AMARC | Faisal Iqbal

Embracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and CentrifyEmbracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and CentrifySumana Mehta
 
Smarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst ServicesSmarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst ServicesChris Pepin
 
Soluções F5 Networks - FORENSE Tecnologia
Soluções F5 Networks - FORENSE TecnologiaSoluções F5 Networks - FORENSE Tecnologia
Soluções F5 Networks - FORENSE TecnologiaDeivid Toledo
 
Enterprise Mobility: Microsoft Cloud OS Roadshow
Enterprise Mobility: Microsoft Cloud OS RoadshowEnterprise Mobility: Microsoft Cloud OS Roadshow
Enterprise Mobility: Microsoft Cloud OS RoadshowRichard Harbridge
 
Mobile secure workplace briefing presentation
Mobile secure workplace briefing presentationMobile secure workplace briefing presentation
Mobile secure workplace briefing presentationsolarisyourep
 
Mobile Workspaces Go Where You Go [Infographic]
Mobile Workspaces Go Where You Go [Infographic]Mobile Workspaces Go Where You Go [Infographic]
Mobile Workspaces Go Where You Go [Infographic]Citrix
 
Citrix MDX Technologies Feature Brief
Citrix MDX Technologies Feature BriefCitrix MDX Technologies Feature Brief
Citrix MDX Technologies Feature BriefNuno Alves
 
IBM Partner Jam - 10th April 2013
IBM Partner Jam - 10th April 2013IBM Partner Jam - 10th April 2013
IBM Partner Jam - 10th April 2013Arrow ECS UK
 
Three Keys to Building a Secure Mobile Infrastructure in Government Environments
Three Keys to Building a Secure Mobile Infrastructure in Government EnvironmentsThree Keys to Building a Secure Mobile Infrastructure in Government Environments
Three Keys to Building a Secure Mobile Infrastructure in Government EnvironmentsVMware
 
Government and Education Webinar: Conquering Remote Work IT Challenges
Government and Education Webinar: Conquering Remote Work IT Challenges Government and Education Webinar: Conquering Remote Work IT Challenges
Government and Education Webinar: Conquering Remote Work IT Challenges SolarWinds
 
Mobile Enterprise Application Platform
Mobile Enterprise Application PlatformMobile Enterprise Application Platform
Mobile Enterprise Application PlatformNugroho Gito
 
Ibm fiberlink analyst presentation nov 13 final
Ibm fiberlink analyst presentation nov 13 finalIbm fiberlink analyst presentation nov 13 final
Ibm fiberlink analyst presentation nov 13 finalCleophas Kipruto
 
Achieving Secure BYOD in Government Agencies
Achieving Secure BYOD in Government AgenciesAchieving Secure BYOD in Government Agencies
Achieving Secure BYOD in Government AgenciesProofpoint
 
Bring Your Own Device - DesktopDirect by Array Networks
 Bring Your Own Device - DesktopDirect by Array Networks Bring Your Own Device - DesktopDirect by Array Networks
Bring Your Own Device - DesktopDirect by Array NetworksIntellicomp GmbH
 
IBM Endpoint Manager for Mobile Devices (Overview)
IBM Endpoint Manager for Mobile Devices (Overview)IBM Endpoint Manager for Mobile Devices (Overview)
IBM Endpoint Manager for Mobile Devices (Overview)Kimber Spradlin
 
IBM Announce Intent to Acquire Fiberlink Analyst Presentation
IBM Announce Intent to Acquire Fiberlink Analyst PresentationIBM Announce Intent to Acquire Fiberlink Analyst Presentation
IBM Announce Intent to Acquire Fiberlink Analyst PresentationRon Favali
 
Market Study on Mobile Authentication
Market Study on Mobile AuthenticationMarket Study on Mobile Authentication
Market Study on Mobile AuthenticationFIDO Alliance
 
Transforming Risky Mobile Apps into Self Defending Apps
Transforming Risky Mobile Apps into Self Defending AppsTransforming Risky Mobile Apps into Self Defending Apps
Transforming Risky Mobile Apps into Self Defending AppsBlueboxer2014
 

Similar to Future of Fed Mobility | Citrix Technical Exchange hosted by AMARC | Faisal Iqbal (20)

Embracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and CentrifyEmbracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and Centrify
 
Smarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst ServicesSmarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst Services
 
Soluções F5 Networks - FORENSE Tecnologia
Soluções F5 Networks - FORENSE TecnologiaSoluções F5 Networks - FORENSE Tecnologia
Soluções F5 Networks - FORENSE Tecnologia
 
Enterprise Mobility: Microsoft Cloud OS Roadshow
Enterprise Mobility: Microsoft Cloud OS RoadshowEnterprise Mobility: Microsoft Cloud OS Roadshow
Enterprise Mobility: Microsoft Cloud OS Roadshow
 
Mobile secure workplace briefing presentation
Mobile secure workplace briefing presentationMobile secure workplace briefing presentation
Mobile secure workplace briefing presentation
 
Mobile Workspaces Go Where You Go [Infographic]
Mobile Workspaces Go Where You Go [Infographic]Mobile Workspaces Go Where You Go [Infographic]
Mobile Workspaces Go Where You Go [Infographic]
 
Citrix MDX Technologies Feature Brief
Citrix MDX Technologies Feature BriefCitrix MDX Technologies Feature Brief
Citrix MDX Technologies Feature Brief
 
IBM Partner Jam - 10th April 2013
IBM Partner Jam - 10th April 2013IBM Partner Jam - 10th April 2013
IBM Partner Jam - 10th April 2013
 
Three Keys to Building a Secure Mobile Infrastructure in Government Environments
Three Keys to Building a Secure Mobile Infrastructure in Government EnvironmentsThree Keys to Building a Secure Mobile Infrastructure in Government Environments
Three Keys to Building a Secure Mobile Infrastructure in Government Environments
 
Government and Education Webinar: Conquering Remote Work IT Challenges
Government and Education Webinar: Conquering Remote Work IT Challenges Government and Education Webinar: Conquering Remote Work IT Challenges
Government and Education Webinar: Conquering Remote Work IT Challenges
 
Mobile Enterprise Application Platform
Mobile Enterprise Application PlatformMobile Enterprise Application Platform
Mobile Enterprise Application Platform
 
Ibm fiberlink analyst presentation nov 13 final
Ibm fiberlink analyst presentation nov 13 finalIbm fiberlink analyst presentation nov 13 final
Ibm fiberlink analyst presentation nov 13 final
 
Achieving Secure BYOD in Government Agencies
Achieving Secure BYOD in Government AgenciesAchieving Secure BYOD in Government Agencies
Achieving Secure BYOD in Government Agencies
 
MobileFirst
MobileFirstMobileFirst
MobileFirst
 
Bring Your Own Device - DesktopDirect by Array Networks
 Bring Your Own Device - DesktopDirect by Array Networks Bring Your Own Device - DesktopDirect by Array Networks
Bring Your Own Device - DesktopDirect by Array Networks
 
Blackberry in Government
Blackberry in GovernmentBlackberry in Government
Blackberry in Government
 
IBM Endpoint Manager for Mobile Devices (Overview)
IBM Endpoint Manager for Mobile Devices (Overview)IBM Endpoint Manager for Mobile Devices (Overview)
IBM Endpoint Manager for Mobile Devices (Overview)
 
IBM Announce Intent to Acquire Fiberlink Analyst Presentation
IBM Announce Intent to Acquire Fiberlink Analyst PresentationIBM Announce Intent to Acquire Fiberlink Analyst Presentation
IBM Announce Intent to Acquire Fiberlink Analyst Presentation
 
Market Study on Mobile Authentication
Market Study on Mobile AuthenticationMarket Study on Mobile Authentication
Market Study on Mobile Authentication
 
Transforming Risky Mobile Apps into Self Defending Apps
Transforming Risky Mobile Apps into Self Defending AppsTransforming Risky Mobile Apps into Self Defending Apps
Transforming Risky Mobile Apps into Self Defending Apps
 

More from Tim Harvey

Complete Presentation | Federal Mobile Computing Summit | July 9, 2013
Complete Presentation | Federal Mobile Computing Summit | July 9, 2013Complete Presentation | Federal Mobile Computing Summit | July 9, 2013
Complete Presentation | Federal Mobile Computing Summit | July 9, 2013Tim Harvey
 
Mobile Security Project | Visionary Keynote by Marilyn Rose | Federal Mobile ...
Mobile Security Project | Visionary Keynote by Marilyn Rose | Federal Mobile ...Mobile Security Project | Visionary Keynote by Marilyn Rose | Federal Mobile ...
Mobile Security Project | Visionary Keynote by Marilyn Rose | Federal Mobile ...Tim Harvey
 
CAPI the NASS Way | Pam Hird | Federal Mobile Computing Summit | July 9, 2013
CAPI the NASS Way | Pam Hird | Federal Mobile Computing Summit | July 9, 2013CAPI the NASS Way | Pam Hird | Federal Mobile Computing Summit | July 9, 2013
CAPI the NASS Way | Pam Hird | Federal Mobile Computing Summit | July 9, 2013Tim Harvey
 
Lessons from mHealth | Dr. David Rogers | Federal Mobile Computing Summit | J...
Lessons from mHealth | Dr. David Rogers | Federal Mobile Computing Summit | J...Lessons from mHealth | Dr. David Rogers | Federal Mobile Computing Summit | J...
Lessons from mHealth | Dr. David Rogers | Federal Mobile Computing Summit | J...Tim Harvey
 
Mobile Broadband Performance | Visionary Keynote by Walter Johnston | Federal...
Mobile Broadband Performance | Visionary Keynote by Walter Johnston | Federal...Mobile Broadband Performance | Visionary Keynote by Walter Johnston | Federal...
Mobile Broadband Performance | Visionary Keynote by Walter Johnston | Federal...Tim Harvey
 
Mobility in the Federal Government -- What's Next? | Kevin Cox, Mark Norton &...
Mobility in the Federal Government -- What's Next? | Kevin Cox, Mark Norton &...Mobility in the Federal Government -- What's Next? | Kevin Cox, Mark Norton &...
Mobility in the Federal Government -- What's Next? | Kevin Cox, Mark Norton &...Tim Harvey
 

More from Tim Harvey (6)

Complete Presentation | Federal Mobile Computing Summit | July 9, 2013
Complete Presentation | Federal Mobile Computing Summit | July 9, 2013Complete Presentation | Federal Mobile Computing Summit | July 9, 2013
Complete Presentation | Federal Mobile Computing Summit | July 9, 2013
 
Mobile Security Project | Visionary Keynote by Marilyn Rose | Federal Mobile ...
Mobile Security Project | Visionary Keynote by Marilyn Rose | Federal Mobile ...Mobile Security Project | Visionary Keynote by Marilyn Rose | Federal Mobile ...
Mobile Security Project | Visionary Keynote by Marilyn Rose | Federal Mobile ...
 
CAPI the NASS Way | Pam Hird | Federal Mobile Computing Summit | July 9, 2013
CAPI the NASS Way | Pam Hird | Federal Mobile Computing Summit | July 9, 2013CAPI the NASS Way | Pam Hird | Federal Mobile Computing Summit | July 9, 2013
CAPI the NASS Way | Pam Hird | Federal Mobile Computing Summit | July 9, 2013
 
Lessons from mHealth | Dr. David Rogers | Federal Mobile Computing Summit | J...
Lessons from mHealth | Dr. David Rogers | Federal Mobile Computing Summit | J...Lessons from mHealth | Dr. David Rogers | Federal Mobile Computing Summit | J...
Lessons from mHealth | Dr. David Rogers | Federal Mobile Computing Summit | J...
 
Mobile Broadband Performance | Visionary Keynote by Walter Johnston | Federal...
Mobile Broadband Performance | Visionary Keynote by Walter Johnston | Federal...Mobile Broadband Performance | Visionary Keynote by Walter Johnston | Federal...
Mobile Broadband Performance | Visionary Keynote by Walter Johnston | Federal...
 
Mobility in the Federal Government -- What's Next? | Kevin Cox, Mark Norton &...
Mobility in the Federal Government -- What's Next? | Kevin Cox, Mark Norton &...Mobility in the Federal Government -- What's Next? | Kevin Cox, Mark Norton &...
Mobility in the Federal Government -- What's Next? | Kevin Cox, Mark Norton &...
 

Recently uploaded

“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdfMuhammad Subhan
 
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...FIDO Alliance
 
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...FIDO Alliance
 
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdfSimplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdfFIDO Alliance
 
Vector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptxVector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptxjbellis
 
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Skynet Technologies
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc
 
Google I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGoogle I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGDSC PJATK
 
Event-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingEvent-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingScyllaDB
 
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdfLinux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdfFIDO Alliance
 
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsContinuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsLeah Henrickson
 
JavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuideJavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuidePixlogix Infotech
 
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...FIDO Alliance
 
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdfHow Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdfFIDO Alliance
 
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The InsideCollecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The InsideStefan Dietze
 
AI mind or machine power point presentation
AI mind or machine power point presentationAI mind or machine power point presentation
AI mind or machine power point presentationyogeshlabana357357
 
ADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxFIDO Alliance
 
Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxIntro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxFIDO Alliance
 
How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfSrushith Repakula
 
Portal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russePortal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russe中 央社
 

Recently uploaded (20)

“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
 
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
 
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
 
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdfSimplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
 
Vector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptxVector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptx
 
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
 
Google I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGoogle I/O Extended 2024 Warsaw
Google I/O Extended 2024 Warsaw
 
Event-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingEvent-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream Processing
 
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdfLinux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
 
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsContinuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
 
JavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuideJavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate Guide
 
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
 
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdfHow Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
 
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The InsideCollecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
 
AI mind or machine power point presentation
AI mind or machine power point presentationAI mind or machine power point presentation
AI mind or machine power point presentation
 
ADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptx
 
Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxIntro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptx
 
How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdf
 
Portal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russePortal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russe
 

Future of Fed Mobility | Citrix Technical Exchange hosted by AMARC | Faisal Iqbal

  • 1. Director – Systems Engineering, US Public Sector Faisal.Iqbal@citrix.com @virtfaisal Future of Fed Mobility Enabling productivity through Mobility, Telework, BYOD and DCC Faisal Iqbal
  • 2. State of Federal Mobility BYO 55% Employees Basic Security 1/3 Employees Unsecured Data 42% Employees Productivity 28B Source: MWE Digital Dilemma 2013 Report
  • 3. Driving towards Federal Mobility DOD Mobility Strategy and Implementation Plan “Establish a mobile device management service” “Promote the Development and use of DOD Mobile and Web-enabled Applications” “Provide an enterprise mobile application environment” DGS Milestone 9.1 Develop government-wide mobile and wireless security baseline (includes security reference architectures.) DHS/DoD/NIST
  • 4. OPM 2012 Telework Status Report http://www.telework.gov • All 87 agencies participating in the Data Call had established telework policies • Approximately 32 percent of all federal employees deemed eligible • 27 percent of teleworkers worked remotely three or more days per week “Not all managers are comfortable directing employees who telework”
  • 5. Fed CIO Council’s BYOD Toolkit http://www.whitehouse.gov/digitalgov/bring-your-own-device “…guidance based on lessons learned from successful BYOD programs launched at forward-leaning agencies. ”
  • 7. App + Desktop Virtualization Delivering hosted Windows Apps and Desktops SSL 011010 SSL 1011011010 SSL 1011011010 SSL 1011011010 SSL 1011011010 SSL 101101 SSL SSL 1011011010 SSL APPS DATA USER PROFILE OS Any networkUniversal client Any Datacenter or Cloud FIPS 140-2 SSL DMZ Proxy
  • 8. People-centric and use case driven Mobilizing Windows Apps GIS and 3D workloads BYO laptop and device Remote Access Thin/Zero Client Computing
  • 9. Telework Case Study Virtualization • “Home Use” Program • 28,000 users worldwide • Mission Productivity and COOP
  • 10. BYOD Case Study Virtualization • ~80% telecommuting • $2 million – typical GFE HW costs • $1.2 million in savings
  • 11. Remote PC Access Secure Remote access to your work computer SSL 011010 SSL 1011011010 SSL 1011011010 SSL 1011011010 SSL 1011011010 SSL 101101 SSL 1011011010 SSL 101101101 Any networkUniversal client Any Thick PCFIPS 140-2 SSL DMZ Proxy
  • 12. • Platform unification • HDX Mobile • Integrated Monitoring • Unified App Store • Fully PIV-compatible
  • 13. 2 purpose-built consoles Studio • Automated workload provisioning • Automatic app publishing • Custom delegated administration Director • Real-time assessment • Site health and performance • EdgeSightTM User Experience Analytics
  • 14. High definition experience on any device Efficient bandwidth utilization Advanced quality of service Cross-continent latency tolerance Industry leading peripheral support Real-time voice and multimedia optimization Point to point unified communications
  • 15. Virtualized 3D workstation GPU accelerated 3D graphics 15 • Industry First vGPU solution • Full OpenGL and DirectX Support • Fluid experience with full screen 3D apps • 50% reduction in bandwidth requirements
  • 17. Delivering Windows apps & desktops as a cloud service Citrix Project Avalon
  • 18. How Federal Mobility Feels Today IA Perspective Mobile makes security and compliance harder. Too many tools are required to manage it. User Perspective Mobile can do so much for my life, why can’t it do more for my agency?
  • 19. Federal Mobile Security • "Specifically, the Army CIO did not appropriately track CMDs and was unaware of more than 14,000 CMDs used throughout the Army” • ”Army also failed to ensure its commands properly configured devices to store protected information and to use a mobile device management application to do so.”
  • 20. • Balance security with mobility access • Government data leakage • Delivery to multiple mobile platforms • Secure authentication (smartcard, two-factor) • BYOD, GOPE…security, compliance, mgmt • Dual Persona Federal Mobility Challenges
  • 21. A complete stack for managing and securing apps, data, and devices App Management Device Management Data Management
  • 22. Recognized as a “Leader” by Gartner; Winner at Interop Magic Quadrant Critical Capabilities Source: Gartner report, Magic Quadrant for Mobile Device Management Software, May 23, 2013, Phillip Redman, John Girard, Terrence Cosgrove, Monica Basso Source: Gartner report, Critical Capabilities for Mobile Device Management Software, May 23, 2013, Phillip Redman © 2013 Gartner, Inc. and/or its affiliates. All rights reserved. Gartner is a registered trademark of Gartner, Inc. or its affiliates. For more information, e-mail info@gartner.com or visit gartner.com. Used with permission.
  • 23. MDX App Vault Secure container that enables app and data containment, wipe and lock MDX Access Secure access to Intranet resources via Micro-VPN MDX InterApp Trusted application communication fabric Container-Based Mobile App Management
  • 24. • Secure mobile browser • Internal web app access • URL black/whitelists • Mail, calendar, contacts • Enterprise class security • Beautiful native-like experience • Secure file sharing & sync • Mobile content editing • SharePoint & network files Sandboxed email, browser and document sharing apps
  • 25. Enterprise-enable any mobile app with the Worx App SDK • Simple and powerful SDK • Enabled through a single line of code • Apps can be wrapped post-development • Controls like: ᵒData encryption ᵒAuthentication ᵒSecure lock and wipe ᵒInter-app policies ᵒMicro VPNs Any app can be a Worx app
  • 28. Data Center Consolidation Case Study Server Virtualization • Reduced Power consumption by 83% • $472k annual operational savings • Improved capacity and performance by 300%
  • 29. Building an “Open” Data Center Server Virtualization and Cloud
  • 31. 1010SL1010101SSL01 Seamless Experience Cloud Solutions Secure Access Client Gateway Data Mobile & Web Apps Collaboration Windows Apps & Desktops AppStore Networking & Cloud Infrastructure
  • 33. Resources Citrix.com/USGovernment • Whitepapers • Solution Guides • Govt References accounts Follow us @CitrixPublicSec
  • 34. Work better. Live better.

Editor's Notes

  1. “The primary TTB BYOD lesson learned is to avoid allowing data to touch the personal device. Having all data, settings and processing in a central location and using the BYOD device simply as a viewer significantly simplifies the legal and policy implications”