White Paper. The Value Add of Citrix Enterprise Mobility Management over App Configuration for the Enterprise. citrix.com

Save this PDF as:
 WORD  PNG  TXT  JPG

Size: px
Start display at page:

Download "White Paper. The Value Add of Citrix Enterprise Mobility Management over App Configuration for the Enterprise. citrix.com"

Transcription

1 White Paper The Value Add of Citrix Enterprise Mobility Management over App Configuration for the Enterprise citrix.com

2 App Configuration for Enterprise (ACE) was introduced by AirWatch. AirWatch describes ACE as a standard approach to configuring and securing apps in the enterprise. ACE is endorsed by AirWatch/Socialcast/VMWare, bigtincan, Box, Cisco, Cotap, Deputy, DocuSign, Dropbox, Everbridge, Imprivata, Kony, Lua, MicroStrategy, OnBase, SalesForce, ScrollMotion, ServiceMax, Showpad, Syncplicity, TeleMessage, Webalo, Workday, and Xamarin. What ACE is and what ACE isn t ACE isn t a software offering from AirWatch. Rather, ACE is a proposed standard for how mobile enterprise mobility management (EMM) vendors should secure mobile apps. ACE essentially documents a collection of various configuration and security features that Apple and Google have built into ios and Android. Most EMM vendors, Citrix included, support the features that are documented in ACE. However, none of the other EMM vendors, including Citrix, have endorsed or adopted the ACE standard. On the face of it, ACE is a useful approach for mobile application developers to utilize when creating their products. It provides for a common and good level of security configurations, and it is EMM vendor-neutral which implies customers are not locked into a single EMM solution. For example, a customer could use an EMM solution from Vendor A to manage applications secured using EMM Vendor B s solution. However, a major limitation with ACE is that it only works in a scenario in which mobile devices are under MDM management. All of the capabilities listed in ACE utilize the MDM APIs that Apple and Google built into ios and Android. More often than not, that is a non-starter for Enterprises with a BYOD program given the MDM approach is seen as encroaching on a user s personal space. Ultimately, users rebel, and IT is forced to find a different solution. Another challenge for ACE is that it requires fairly recent versions of device operating systems. Although ios 7 (the minimum ios version required by ACE) runs on most of the ios devices in use today, Android 5 is still fairly early to the market. It is not available for most of the Android devices in use today, and for many existing devices it may never be. In a BYOD scenario, enterprises can t necessarily dictate that employees buy new devices. A similar challenge is also seen in scenarios where we have corporate owned devices. A third major challenge for ACE is that mobile app vendors and enterprise app developers will need to modify their software code to utilize many of the ios and Android features that are documented within the ACE specification. This could delay, or possibly even block, enterprises from fully securing their mobility initiatives. citrix.com 2

3 In contrast to ACE, XenMobile, which is Citrix s EMM solution provides for high security in both enterprise-owned and BYOD scenarios regardless of whether devices are enrolled in MDM or not. XenMobile s approach is much more user friendly, leading to higher adoption, user satisfaction, and lower IT costs (fewer help desk calls). XenMobile supports a Mobile Application Management-only (MAM-only) deployment model in which enterprises don t need to manage the device using MDM features of the operating system. Older devices and their operating systems are supported. And in most cases, mobile application vendors and enterprise developers don t need to modify their software in order to utilize XenMobile MAM features. ACE Pro and Con PRO Security EMM-vendor neutral CON Requires MDM enrollment Requires newest device OS versions Requires app software code changes Deep-dive on ACE and how Citrix XenMobile compares ACE lists five key capabilities in their documentation. These capabilities are 1. App Configuration 2. App Tunnel 3. Single Sign On 4. Access Control 5. Security Policies Let s review each of these and contrast them to the additional value that XenMobile can deliver to the enterprise mobility environment. App Configuration App Configuration capabilities include the various configuration settings that an app requires in order to operate (communication URL, port, protocol, user identity, branding, license, language, etc.). Ordinarily these settings would be entered manually by the user when the app is run for the first time. ACE describes a method to store these configuration values on the EMM server and then push them into the app when it is first run. This eliminates the need for the user to set them themselves, and eliminates errors and support costs caused by incorrect configuration. The caveat is that App Configuration capabilities rely on the app developers to build the necessary API calls into the application. Without these code changes, the app cannot be automatically configured. Also, the mechanisms for communicating the App Configuration settings to the device and pushing them into the app provided by Apple and Google MDM APIs. Therefore, this ACE capability requires MDM citrix.com 3

4 Citrix XenMobile also has the ability to make this configuration information available to an app through MDM enrollment (similar to how ACE describes it). However, XenMobile also provides the flexibility to provide the configuration information to XenMobile MDX-wrapped apps without MDM The result is that, XenMobile can easily and securely provide configuration information to applications, both in MDM and MAM-only environments. XenMobile s value-add over ACE = XenMobile provides more choice and flexibility. App Tunnel App Tunnel describes the operating system capabilities for a per-app VPN that allows individual apps to communicate with resources behind corporate firewalls without giving access to corporate resources to all of the apps installed on the device. Both Android and ios provide this capability natively, but taking advantage of it requires MDM Employee-owned devices that aren t MDM enrolled won t be able to utilize the App Tunnel ACE capability. Given most studies indicate that 65% of companies are adopting BYOD, this is a huge limitation. XenMobile MDX technology provides a per app VPN capability that doesn t require MDM Any mobile device, whether corporate and MDM-enrolled or employee-owned and just MAM-enrolled, can communicate securely with corporate resources using XenMobile. Citrix XenMobile MDX technology provides two sophisticated modes of micro-vpn full-tunnel mode and SecureBrowse mode. The secure browse mode allows the network gateway to see the traffic exchange between the client and the server and accordingly correct or pass the authentication credentials. In the full tunnel mode, the tunnel fully encapsulates the traffic between the client and server with no visibility to the exchange. The enterprise IT admin has the ability to choose which mode to deploy for a specific application, thus giving them the most flexibility. XenMobile s value-add over ACE = XenMobile does not require MDM Single Sign On The Single Sign On ACE capability enables app access back to a corporate identity provider (IDP). It describes several methods for doing so, some of which utilize SAML1 and some of which also utilize certificates. All of the documented approaches have the potential to require app developers to make code changes, and all require the device to be MDM enrolled. As discussed previously, within many enterprises, the requirement to enroll with MDM rules out BYO devices XenMobile supports Single Sign On in a MAM-only environment without the need for code changes and without the need for MDM XenMobile utilizes the NetScaler Gateway to perform Single Sign On for applications that use micro VPN to connect to backend resources, and utilizes Active Directory credentials for authentication. This single-sign-on mechanism is more broadly applicable than the ACE capability and can support basic, NTLM2, form-fill and Kerberos3 authentication mechanisms. XenMobile s value-add over ACE = XenMobile provides more choice and flexibility without having to trade-off security and user satisfaction. citrix.com 4

5 Access Control ACE Access Control restricts application access to users on devices that are in compliance with corporate policies. This capability as described by ACE requires MDM Citrix XenMobile MDX Technology can ensure the security of corporate apps and data without requiring MDM enrollment, by using a XenMobile container PIN for security and controlling access to containerized apps on the device. This PIN is configurable on a per-app basis for providing flexibility in balancing security and user experience. The admin can also control how quickly users have to upgrade to the latest versions of the apps deployed on their devices. Another XenMobile-provided access control feature is the use of an alternate or high-security NetScaler gateway for certain high-security apps. XenMobile s value-add over ACE = XenMobile provides a per app PIN to balance security and user experience without having to enroll the device. Security Policies The ACE Security Policies capabilities address areas such as encryption of stored data, data leakage protection (restriction of Open In, copy/paste, etc.), browser and settings among others. A number of approaches for accomplishing these capabilities are described by ACE. Each requires devices to be MDM-enrolled, and many require app developers to make code changes. Citrix XenMobile supports additional security, over and above the MDM capabilities described in ACE. XenMobile MDX encrypts all data stored by the application on device with FIPS-compliant, AES-256 algorithms. In addition, MDX can deny access to the application if the device is offline and not connected securely to the corporate network. The application can also be configured to only connect to specific white-listed WiFi networks that are predetermined as secure. All of these are available without the need for application code changes and MDM XenMobile s value-add over ACE = XenMobile provides the flexibility of applying security policies at the application level using U.S. federal standards-based encryption and without device Additional value Citrix XenMobile delivers with its secure MAM As mentioned above, all ACE capabilities require MDM ACE specifications will not support a MAM-only mode. In contrast, XenMobile supports both scenarios that are MDM and MAM enrolled. Further, XenMobile provides additional levels of functionality and security as follows without requiring a device to be enrolled: Single Sign On capabilities enabled by MDX and NetScaler Gateway Choice of MDX micro-vpn in full-tunnel and SecureBrowse modes Strong MDX encryption of the data at rest on the device even without device enrollment citrix.com 5

6 Container PIN security at the application level for controlling access and managing containerized apps on the device Optionally require an online connection of the app to the gateway and Xenmobile service In addition, XenMobile also supports these security and access control mechanisms: ios keychain encryption Block jailbroken or rooted devices App update policies and enable control of how quickly apps are updated by users Cut, copy, paste restrictions for non-mdm enrolled devices Document exchange restrictions for non-mdm enrolled devices Block system facilities like camera, microphone, location services, and 3rd-party backup and keyboard options. Require WiFi and white-listed corporate WiFi networks Limited industry support continues to be a challenge for ACE Due to the current limitations, only a handful of mobile application vendors support ACE. In contrast, mobile applications vendors that support XenMobile enjoy the benefit of stronger security, flexibility and user satisfaction. The Citrix Worx Gallery currently contains 80+ apps that are certified as Worx-ready and new apps are being certified every day. Summary While the intent of ACE is to simplify mobility management for customers through an EMM vendor-netural standard, customers that adopt ACE have to settle for less security, flexibility, and higher BYOD user dissatisfaction. In contrast, XenMobile supports equivalent capabilities documented in ACE, but does so without the need for device management. As a result, XenMobile provides better security, flexibility, and higher BYOD user satisfaction. citrix.com 6

7 Appendix A: Quick Reference ACE Capability How ACE Implements It Citrix EMM value-add over ACE App Configuration App Tunnel Single Sign On Access Control Security Policies Uses MDM APIs to communicate configuration settings from EMM server to apps. MDM enrollment required. App code changes required to implement. Uses OS per-app VPN. MDM enrollment required. Enables app signon using a corporate identity provider. Requires app code changes and MDM Restricts app access to users on compliant, MDM-enrolled devices. Provides for a variety of security-oriented capabilities such as data encryption, copy/paste restriction, etc. using primarily device OS MDM features. Requires app code changes and MDM Citrix XenMobile can implement app configuration policies without MDM Citrix XenMobile supports multiple micro- VPN options. And, it doesn t require MDM Citrix XenMobile doesn t require app code changes or MDM enrollment and supports a broader set of authentication mechanisms. Citrix XenMobile ensures app and data security without requiring MDM enrollment by utilizing a secure container approach. Citrix XenMobile provides a wider array of security policies and protection, all without the need for MDM enrollment and app code changes. *** 1. Security Assertion Markup Language(SAML) is an XML-based, open-standard data format for exchanging authentication and authorization data between parties. It allows a user to log on once for affiliated but separate Web sites. 2. In a Windows network, NT LAN Manager (NTLM) is a suite of Microsoft security protocols that provides authentication, integrity, and confidentiality to users. 3. Kerberos is a secure method for authenticating a request for a service in a computer network. It works on the basis of tickets to allow nodes communicating over a non-secure network to prove their identity to one another in a secure manner. Corporate Headquarters Fort Lauderdale, FL, USA Silicon Valley Headquarters Santa Clara, CA, USA EMEA Headquarters Schaffhausen, Switzerland India Development Center Bangalore, India Online Division Headquarters Santa Barbara, CA, USA Pacific Headquarters Hong Kong, China Latin America Headquarters Coral Gables, FL, USA UK Development Center Chalfont, United Kingdom About Citrix Citrix (NASDAQ:CTXS) is leading the transition to software-defining the workplace, uniting virtualization, mobility management, networking and SaaS solutions to enable new ways for businesses and people to work better. Citrix solutions power business mobility through secure, mobile workspaces that provide people with instant access to apps, desktops, data and communications on any device, over any network and cloud. With annual revenue in 2014 of $3.14 billion, Citrix solutions are in use at more than 330,000 organizations and by over 100 million users globally. Learn more at Copyright 2015 Citrix Systems, Inc. All rights reserved. Citrix and XenMobile are trademarks of Citrix Systems, Inc. and/or one of its subsidiaries, and may be registered in the U.S. and other countries. Other product and company names mentioned herein may be trademarks of their respective companies. 0915/PDF citrix.com 7

White Paper. Protecting Mobile Apps with Citrix XenMobile and MDX. citrix.com

White Paper. Protecting Mobile Apps with Citrix XenMobile and MDX. citrix.com Protecting Mobile Apps with Citrix XenMobile and MDX citrix.com Mobility is a top priority for organizations as more employees demand access to the apps and data that will make them productive. Employees

More information

White Paper. XenApp, XenDesktop, and XenMobile Integration for A Comprehensive Mobility Solution. citrix.com

White Paper. XenApp, XenDesktop, and XenMobile Integration for A Comprehensive Mobility Solution. citrix.com XenApp, XenDesktop, and XenMobile Integration for A Comprehensive Mobility Solution citrix.com Desktop and application virtualization have enhanced mobility everywhere, allowing users to access their Windows

More information

From BlackBerry to BYOD, CYOD or COPE

From BlackBerry to BYOD, CYOD or COPE White Paper From BlackBerry to BYOD, CYOD or COPE Learn how Citrix XenMobile can empower your organization to move from traditional corporate issued BlackBerry consumer devices without sacrificing security.

More information

Comprehensive Enterprise Mobile Management for ios 8

Comprehensive Enterprise Mobile Management for ios 8 Comprehensive Enterprise Mobile Management for ios 8 Citrix XenMobile enhances the new iphone and ipad operating system to give mobile users increased functionality and enterprises greater management and

More information

Deploying NetScaler Gateway in ICA Proxy Mode

Deploying NetScaler Gateway in ICA Proxy Mode Deploying NetScaler Gateway in ICA Proxy Mode Deployment Guide This deployment guide defines the configuration required for using the NetScaler Gateway in ICA Proxy Mode. Table of Contents Introduction

More information

icrosoft TMG Replacement with NetScaler

icrosoft TMG Replacement with NetScaler icrosoft TMG Replacement with NetScaler Replacing Microsoft Forefront TMG with NetScaler for secure VPN access Table of contents Introduction 3 Configuration details 3 NetScaler features to be enabled

More information

Citrix NetScaler and Microsoft SharePoint 2013 Hybrid Deployment Guide

Citrix NetScaler and Microsoft SharePoint 2013 Hybrid Deployment Guide Citrix NetScaler and Microsoft SharePoint 2013 Hybrid Deployment Guide 2013 Deployment Guide Table of Contents Overview 3 SharePoint Hybrid Deployment Overview 3 Workflow 4 Step by Step Configuration on

More information

Enabling mobile workstyles with an end-to-end enterprise mobility management solution.

Enabling mobile workstyles with an end-to-end enterprise mobility management solution. Mobile workstyles White Paper Enabling mobile workstyles with an end-to-end enterprise mobility management solution. 2 The evolution of mobile workstyles has made it increasingly important for professionals

More information

The Office Reinvented: Mobile Workspaces are the Future of Work

The Office Reinvented: Mobile Workspaces are the Future of Work The Office Reinvented: Mobile Workspaces are the Future of Work How Citrix, Google and Samsung enable secure business mobility. Business mobility empowers people with a convenient and complete work experience

More information

Citrix Workspace Cloud Apps and Desktop Service with an on-premises Resource Reference Architecture

Citrix Workspace Cloud Apps and Desktop Service with an on-premises Resource Reference Architecture Citrix Workspace Cloud Apps and Desktop Service with an on-premises Resource Reference Architecture Produced by Citrix Solutions Lab This guide walks you through an example of how to use Citrix Workspace

More information

Microsoft Dynamics CRM 2015 with NetScaler for Global Server Load Balancing

Microsoft Dynamics CRM 2015 with NetScaler for Global Server Load Balancing Microsoft Dynamics CRM 2015 with NetScaler for Global Server Load Balancing Solution Guide This solution guide focuses on defining the deployment process for Microsoft Dynamics CRM with Citrix NetScaler.

More information

Design and deliver cloudbased apps and data for flexible, on-demand IT

Design and deliver cloudbased apps and data for flexible, on-demand IT Design and deliver cloudbased apps and data for flexible, on-demand IT Discover the fastest and easiest way for IT to enable business productivity using cloud-based management and delivery of complete

More information

Enterprise- Grade MDM

Enterprise- Grade MDM Enterprise- Grade MDM This brief describes a foundational strategic feature of the Citrix enterprise mobility offering, enterprise-grade MDM. 2 While the transition of mobile phones into computers has

More information

Single Sign On for ShareFile with NetScaler. Deployment Guide

Single Sign On for ShareFile with NetScaler. Deployment Guide Single Sign On for ShareFile with NetScaler Deployment Guide This deployment guide focuses on defining the process for enabling Single Sign On into Citrix ShareFile with Citrix NetScaler. Table of Contents

More information

Mobilize Email with Enterprise-Grade Security and a Great Experience

Mobilize Email with Enterprise-Grade Security and a Great Experience White Paper Mobilize Email with Enterprise-Grade Security and a Great Experience Data protection for your business. Flexibility for IT. Seamless productivity for your workforce. People need to be able

More information

White Paper. Secure Mobile Collaboration with Citrix XenMobile and ShareFile. citrix.com

White Paper. Secure Mobile Collaboration with Citrix XenMobile and ShareFile. citrix.com White Paper Secure Mobile Collaboration with Citrix XenMobile and ShareFile Mobile devices and BYOD have brought unprecedented agility to the enterprise, allowing users to collaborate, access information

More information

White Paper. Securing Mobile Applications and Data with Citrix XenMobile EMM. citrix.com

White Paper. Securing Mobile Applications and Data with Citrix XenMobile EMM. citrix.com White Paper Securing Mobile Applications and Data with Citrix XenMobile EMM As enterprises transition from corporate owned and managed laptops, tablets and smartphones to Bring Your Own Device (BYOD) and

More information

Citrix Lifecycle Management

Citrix Lifecycle Management Citrix Lifecycle Management Comprehensive cloud-based service lifecycle management solution IT administrators are realizing that application deployments are getting more complex and error-prone than ever

More information

Guide to Deploying NetScaler as an Active Directory Federation Services Proxy

Guide to Deploying NetScaler as an Active Directory Federation Services Proxy Deployment Guide Guide to Deploying NetScaler as an Active Directory Federation Services Proxy Enabling seamless authentication for Office 365 use cases Table of Contents Introduction 3 ADFS proxy deployment

More information

What s Missing from Your BYOD Strategy?

What s Missing from Your BYOD Strategy? White Paper What s Missing from Your BYOD Strategy? for BYOD, CYOD or COPE In the early days of mobility, companies rushed to embrace bring-your-own-device (BYOD) programs, which allowed employees to use

More information

The fastest, most secure path to mobile employee productivity

The fastest, most secure path to mobile employee productivity The fastest, most secure path to mobile employee productivity 2 If your organization lacks a bring-your-own-device (BYOD) strategy, you may be in danger of losing employees who are unhappy because they

More information

Enabling EPA and Access Control with NetScaler Gateway for ADFS and other applications

Enabling EPA and Access Control with NetScaler Gateway for ADFS and other applications Enabling EPA and Access Control with NetScaler Gateway for ADFS and other applications Enterprise Use Case Guidelines Table of Contents Introduction 3 Solution Description 3 NetScaler Configuration 5 Conclusion

More information

Microsoft SharePoint 2013 with Citrix NetScaler

Microsoft SharePoint 2013 with Citrix NetScaler Deployment Guide Microsoft SharePoint 2013 with Citrix NetScaler Deployment Guide citrix.com Table of contents Introduction 3 NetScaler value-add to SharePoint 4 Product versions and prerequisites 4 Deploying

More information

Mobile Application Management with XenMobile and the Worx App SDK

Mobile Application Management with XenMobile and the Worx App SDK Mobile Application Management with XenMobile and the Worx App SDK 2 Enterprises of every size and across every industry have made mobility an important IT initiative. While most mobility strategies started

More information

Top Three Reasons to Deliver Web Apps with App Virtualization

Top Three Reasons to Deliver Web Apps with App Virtualization Top Three Reasons to Deliver Web Apps with App Virtualization Improve manageability, security and performance for browser-based apps. Web browsers can cause many of the same headaches as any other Windows

More information

Solutions Guide. Deploying Citrix NetScaler for Global Server Load Balancing of Microsoft Lync 2013. citrix.com

Solutions Guide. Deploying Citrix NetScaler for Global Server Load Balancing of Microsoft Lync 2013. citrix.com Solutions Guide Deploying Citrix NetScaler for Global Server Load Balancing of Microsoft Lync 2013 Table of Contents Introduction 3 Overview of Microsoft Lync 2013 3 Why NetScaler GSLB Solution for Lync

More information

Citrix XenMobile and Windows 10

Citrix XenMobile and Windows 10 White Paper Citrix XenMobile and Windows 10 Unified Endpoint Management in a Mobile, Cloud Enabled World With version 10, Windows has moved the once desktop operating system firmly into the era of the

More information

10 Essential Elements for a Secure Enterprise Mobility Strategy

10 Essential Elements for a Secure Enterprise Mobility Strategy 10 Essential Elements for a Secure Enterprise Mobility Strategy Best practices for protecting sensitive business information while making people productive from anywhere Mobility and bring-your-own device

More information

Eight steps to fill the enterprise mobile application gap

Eight steps to fill the enterprise mobile application gap Eight steps to fill the enterprise mobile application gap are quickly becoming as important and widespread in the enterprise as PCs and traditional business apps. Thanks to the consumerization of IT and

More information

Solution Guide for Citrix NetScaler and Cisco APIC EM

Solution Guide for Citrix NetScaler and Cisco APIC EM Solution Guide for Citrix NetScaler and Cisco APIC EM Orchestrating Network QoS policy for delivering enhanced video experience to XenDesktop users Table of contents Solution Overview 3 Executive Summary

More information

How four Citrix customers solved the enterprise mobility challenge

How four Citrix customers solved the enterprise mobility challenge How four Citrix customers solved the enterprise mobility challenge Managing mobile devices, data and all types of apps Windows, datacenter, web and native mobile through a single solution 2 Enterprise

More information

Modernize your business with Citrix XenApp 7.6

Modernize your business with Citrix XenApp 7.6 Modernize your business with Citrix XenApp 7.6 Avoid non-compliance issues and keep your business running smoothly by upgrading your SAP environment to run on top of the latest Citrix and Microsoft technologies

More information

Guide to Deploying Microsoft Exchange 2013 with Citrix NetScaler

Guide to Deploying Microsoft Exchange 2013 with Citrix NetScaler Deployment Guide Guide to Deploying Microsoft Exchange 2013 with Citrix NetScaler Extensive guide covering details of NetScaler ADC deployment with Microsoft Exchange 2013. Table of Contents Introduction

More information

Leading Application Innovators Commit to App Development Standards to Drive Business Mobility

Leading Application Innovators Commit to App Development Standards to Drive Business Mobility Leading Application Innovators Commit to App Development Standards to Drive Business Mobility bigtincan, Deputy, DocuSign, Dropbox, Everbridge, Imprivata, Kony, Lua, MicroStrategy, OnBase by Hyland, ScrollMotion,

More information

Solutions Guide. Deploying Citrix NetScaler with Microsoft Exchange 2013 for GSLB. citrix.com

Solutions Guide. Deploying Citrix NetScaler with Microsoft Exchange 2013 for GSLB. citrix.com Deploying Citrix NetScaler with Microsoft Exchange 2013 for GSLB Table of Contents Introduction 3 Overview of Microsoft Exchange 2013 3 Why NetScaler GSLB for Exchange 2013? 3 Topology 3 Single Namespace

More information

Bring-Your-Own-Device Freedom

Bring-Your-Own-Device Freedom Bring-Your-Own-Device Freedom Solutions for federal, state, and local governments Increasingly, IT organizations in federal, state, and local agencies are embracing consumerization with the understanding

More information

Enterprise mobility management: Embracing BYOD through secure app and data delivery

Enterprise mobility management: Embracing BYOD through secure app and data delivery Enterprise mobility management: Embracing BYOD through secure app and data delivery Why Citrix XenMobile is the best approach 2 Introduction The transformation of computing through mobility, consumerisation,

More information

Powering Real-Time Mobile Access to Critical Information With Citrix ShareFile

Powering Real-Time Mobile Access to Critical Information With Citrix ShareFile Powering Real-Time Mobile Access to Critical Information With Citrix ShareFile An enterprise file sync and sharing solution built for the needs of the energy, oil and gas industry to provide employee and

More information

ShareFile for enterprises

ShareFile for enterprises Product Overview ShareFile for enterprises Secure, sync and share enterprise files everywhere ShareFile is a secure enterprise file sync and sharing service that meets the mobility and collaboration needs

More information

Mobile app containers with Citrix MDX

Mobile app containers with Citrix MDX Mobile app containers with Citrix MDX 2 Enterprises of every size and across every industry have made mobility an important IT initiative. While most mobility strategies started with mobile device management

More information

Cisco and Citrix: Building Application Centric, ADC-enabled Data Centers

Cisco and Citrix: Building Application Centric, ADC-enabled Data Centers : Building Application Centric, ADC-enabled Data Centers Cisco Application Centric Infrastructure (ACI) integrates Citrix NetScaler Application Delivery Controller (ADC) appliances to reduce deployment

More information

White Paper. SDN 101: An Introduction to Software Defined Networking. citrix.com

White Paper. SDN 101: An Introduction to Software Defined Networking. citrix.com SDN 101: An Introduction to Software Defined Networking citrix.com Over the last year, the hottest topics in networking have been software defined networking (SDN) and Network ization (NV). There is, however,

More information

Using Vasco IDENTIKEY Server with NetScaler

Using Vasco IDENTIKEY Server with NetScaler Using Vasco IDENTIKEY Server with NetScaler Deployment Guide This deployment guide describes the process for deploying Vasco IDENTIKEY server with NetScaler to enable secure authentication for application

More information

Citrix ShareFile Enterprise technical overview

Citrix ShareFile Enterprise technical overview Citrix ShareFile Enterprise technical overview 2 The role of IT organizations is changing rapidly as the forces of consumerization pose new challenges. IT is transitioning from the sole provider of user

More information

Citrix CloudPortal Business Manager

Citrix CloudPortal Business Manager Product Overview Citrix CloudPortal Business Manager Unified cloud services delivery and business management platform Enterprises and cloud providers have focused most of their initial cloud strategies

More information

Securing Outlook Web Access (OWA) 2013 with NetScaler AppFirewall

Securing Outlook Web Access (OWA) 2013 with NetScaler AppFirewall Solution Guide Securing Outlook Web Access (OWA) 2013 with NetScaler AppFirewall Solution Guide This solution guide provides guidelines for securing Exchange 2013 Outlook Web Access (OWA) with NetScaler

More information

Taking Windows Mobile on Any Device

Taking Windows Mobile on Any Device Taking Windows Mobile on Any Device As the adoption of mobile devices continues to expand, IT organizations are challenged to keep up with the mobile demands of today s fast-paced workforce and at the

More information

Solution Guide. Optimizing Microsoft SharePoint 2013 with Citrix NetScaler. citrix.com

Solution Guide. Optimizing Microsoft SharePoint 2013 with Citrix NetScaler. citrix.com Solution Guide Optimizing Microsoft SharePoint 2013 with Citrix NetScaler Table of Contents Overview of SharePoint 2013 3 Why NetScaler Optimization Solution for SharePoint 2013? 3 Product Versions and

More information

Deploying XenApp on a Microsoft Azure cloud

Deploying XenApp on a Microsoft Azure cloud Deploying XenApp on a Microsoft Azure cloud The scalability and economics of XenApp services on-demand citrix.com Given business dynamics seasonal peaks, mergers, acquisitions, and changing business priorities

More information

Advanced Service Desk Security

Advanced Service Desk Security Advanced Service Desk Security Robust end-to-end security measures have been built into the GoToAssist Service Desk architecture to ensure the privacy and integrity of all data. gotoassist.com Many service

More information

Configuring Citrix NetScaler for IBM WebSphere Application Services

Configuring Citrix NetScaler for IBM WebSphere Application Services White Paper Configuring Citrix NetScaler for IBM WebSphere Application Services A deployment guide for configuring NetScaler load balancing and content switching When deploying IBM WebSphere Application

More information

Cisco and Citrix: Building Application Centric, ADC-enabled Data Centers

Cisco and Citrix: Building Application Centric, ADC-enabled Data Centers Solutions Brief : Building Application Centric, ADC-enabled Data Centers Cisco Application Centric Infrastructure (ACI) integrates Citrix NetScaler Application Delivery Controller (ADC) appliances to reduce

More information

Powering real-time mobile access to critical information with ShareFile

Powering real-time mobile access to critical information with ShareFile Powering real-time mobile access to critical information with ShareFile An enterprise file sync and sharing solution built for the needs of the energy, oil and gas industry to provide employee and third-party

More information

NetScaler for the best XenApp/XenDesktop access and mobile experience

NetScaler for the best XenApp/XenDesktop access and mobile experience NetScaler for the best XenApp/XenDesktop access and mobile experience Discover 10 reasons NetScaler is the best way to futureproof your infrastructure As you refresh your network, it s important to understand

More information

The Always-on Enterprise: Business Continuity Scenarios that Work

The Always-on Enterprise: Business Continuity Scenarios that Work Solutions Brief The Always-on Enterprise: Business Continuity Scenarios that Work How mobility solutions from Citrix, Google and Samsung ensure continuous productivity. Business continuity keeps CIOs up

More information

ShareFile Enterprise technical overview

ShareFile Enterprise technical overview Overview Guide ShareFile Enterprise technical overview Secure data sync and sharing services ShareFile empowers users to securely share files with anyone and to sync files across all of their devices The

More information

Five Reasons Why Customers Choose Citrix XenMobile Over the Competition

Five Reasons Why Customers Choose Citrix XenMobile Over the Competition Five Reasons Why Customers Choose Citrix Over the Competition wins head-to-head on key enterprise mobility management criteria When it comes to the most important criteria for enterprise mobility management

More information

Fullerton India enhances its employee productivity and efficiency with Citrix XenDesktop

Fullerton India enhances its employee productivity and efficiency with Citrix XenDesktop Fullerton India enhances its employee productivity and efficiency with Citrix XenDesktop 2 As a result of implementing Citrix XenDesktop, the number of our help desk tickets has fallen significantly. The

More information

Citrix ShareFile Enterprise: a technical overview citrix.com

Citrix ShareFile Enterprise: a technical overview citrix.com Citrix ShareFile Enterprise: a technical overview White Paper Citrix ShareFile Enterprise: a technical overview 2 The role of IT organizations is changing rapidly as the forces of consumerization pose

More information

Optimizing service assurance for XenServer virtual infrastructures with Xangati

Optimizing service assurance for XenServer virtual infrastructures with Xangati Solutions Brief Optimizing service assurance for XenServer virtual infrastructures with Xangati As IT organizations adopt application, desktop and server virtualization solutions as the primary method

More information

Single Sign On for GoToMeeting with NetScaler

Single Sign On for GoToMeeting with NetScaler Deployment Guide Single Sign On for GoToMeeting with NetScaler Deployment Guide This deployment guide focuses on defining the process for enabling Single Sign On into GoToMeeting with Citrix NetScaler.

More information

Virtual desktops in hospitals: streamlining clinical workflows

Virtual desktops in hospitals: streamlining clinical workflows Virtual desktops in hospitals: streamlining clinical workflows How providers leverage Citrix and Imprivata solutions to optimize clinical workflows improving quality of care, while complying with industry

More information

NetScaler carriergrade network

NetScaler carriergrade network White Paper NetScaler carriergrade network address translation Preserve IPv4 network investments, consolidate application delivery control in one platform and lower capex and opex Protect your investment

More information

Bring your own device freedom

Bring your own device freedom Bring your own device freedom BYOD solutions for federal government enterprises The Digital Government Strategy, issued by Federal Chief Information Officer (CIO) Steven VanRoekel on May 23, 2012, called

More information

Defend hidden mobile web properties

Defend hidden mobile web properties Defend hidden mobile web properties Is your mobile micro app concealing a complex web property? 2 We ve all used mobile micro apps to check the weather, stocks and news or to interact via social media

More information

Secure SSL, Fast SSL

Secure SSL, Fast SSL Citrix NetScaler and Thales nshield work together to protect encryption keys and accelerate SSL traffic With growing use of cloud-based, virtual, and multi-tenant services, customers want to utilize virtual

More information

Secure Data Sharing in the Enterprise

Secure Data Sharing in the Enterprise Secure Data Sharing in the Enterprise 2 Follow-me data and productivity for users with security and manageability for IT Productivity today depends on the ability of workers to access and share their data

More information

ByteMobile Internet Radio Optimization

ByteMobile Internet Radio Optimization ByteMobile Internet Radio Optimization 2 Mobile audio now generates a significant portion of overall mobile traffic volume, adding to the mobile network operator s challenge to maintain agile and robust

More information

Safeguard Protected Health Information With Citrix ShareFile

Safeguard Protected Health Information With Citrix ShareFile Safeguard Protected Health Information With Citrix ShareFile This enterprise file sync and sharing solution supports HIPAA compliance, boosts security and mobilizes data access Citrix ShareFile helps healthcare

More information

5 Reasons Why GoToAssist Remote Support and Service Desk Go Better Together

5 Reasons Why GoToAssist Remote Support and Service Desk Go Better Together 5 Reasons Why GoToAssist Remote Support and Service Desk Go Better Together Improve your customer support experience with the integrated GoToAssist toolset. GoToAssist Remote Support makes it easy to help

More information

Citrix Enterprise Mobility Report

Citrix Enterprise Mobility Report Citrix Enterprise Mobility Report Plus 5 Steps to Building an Enterprise Mobility Strategy A survey of 510 IT Directors, CIOs, and Architects on the state of mobile applications, data, and devices in the

More information

Provisioning ShareFile on Microsoft Azure Storage

Provisioning ShareFile on Microsoft Azure Storage ShareFile StorageZones Provisioning ShareFile on Microsoft Azure Storage This document provides a technical overview of how ShareFile can be provisioned on customermanaged, Microsoft Azure cloud storage

More information

Solution Brief. Deliver Production Grade OpenStack LBaaS with Citrix NetScaler. citrix.com

Solution Brief. Deliver Production Grade OpenStack LBaaS with Citrix NetScaler. citrix.com Solution Brief Deliver Production Grade OpenStack LBaaS with Citrix NetScaler Enterprises are increasingly turning to private cloud architectures for increased agility and greater operational efficiency

More information

Redefining IT for federal healthcare agencies

Redefining IT for federal healthcare agencies Redefining IT for federal healthcare agencies Redefining IT for federal healthcare agencies Virtualization solutions for clinicians and patients: Anytime, anywhere, on any device Executive summary These

More information

X1 StoreFront and Receiver X1 for Web Tech Preview. Getting Started Guide

X1 StoreFront and Receiver X1 for Web Tech Preview. Getting Started Guide X1 StoreFront and Receiver X1 for Web Tech Preview Getting Started Guide March 2015 Contents Introduction to X1... 1 Who is the tech preview for?... 2 About the tech preview release... 2 Pre-requisites

More information

Maximizing Flexibility and Productivity for Mobile MacBook Users

Maximizing Flexibility and Productivity for Mobile MacBook Users Citrix DesktopPlayer for Mac White Paper Maximizing Flexibility and Productivity for Mobile MacBook Users Windows virtual desktops to go for corporate and BYO Macs 2 Executive Overview The popularity of

More information

Citrix Product Documentation Demo walk-through

Citrix Product Documentation Demo walk-through Citrix Product Documentation Demo walk-through The Citrix Information Experience team is pleased to bring you this preview of what you can expect in the reimagined edocs experience. The site was redesigned

More information

Single Sign On for ZenDesk with NetScaler. Deployment Guide

Single Sign On for ZenDesk with NetScaler. Deployment Guide Deployment Guide Single Sign On for ZenDesk with NetScaler Deployment Guide This deployment guide focuses on defining the process for enabling Single Sign On into ZenDesk with Citrix NetScaler. Table of

More information

What is an application delivery controller?

What is an application delivery controller? What is an application delivery controller? ADCs have gained traction within the last decade, largely due to increased demand for legacy load balancing appliances to handle more advanced application delivery

More information

Citrix desktop virtualization and Microsoft System Center 2012: better together

Citrix desktop virtualization and Microsoft System Center 2012: better together Citrix desktop virtualization and Microsoft System Center 2012: better together 2 Delivery of applications and data to users is an integral part of IT services today. But delivery can t happen without

More information

NetScaler: A comprehensive replacement for Microsoft Forefront Threat Management Gateway

NetScaler: A comprehensive replacement for Microsoft Forefront Threat Management Gateway NetScaler: A comprehensive replacement for Microsoft Forefront Threat Management Gateway 2 Microsoft s Forefront Threat Management Gateway (TMG) is a network security and protection solution for enterprise

More information

Secure remote access

Secure remote access Secure remote access Technical Solutions Brief Secure remote access Simple, secure access to apps and desktops from anywhere. Secure remote access Technical Solutions Brief 2 Today s fast-paced business

More information

Supporting your mobile workers

Supporting your mobile workers White Paper Supporting your mobile workers How HR can help employees and managers get the most from their digital workplace Workshifting, flexworking, smart working whatever it is called, working 9-5 at

More information

Deploying NetScaler with Microsoft Exchange 2016

Deploying NetScaler with Microsoft Exchange 2016 Deployment Guide Deploying NetScaler with Microsoft Exchange 2016 Deployment Guide Load balancing Microsoft Exchange 2016 with NetScaler Table of Contents Introduction 3 Configuration 5 NetScaler features

More information

RSA Adaptive Authentication and Citrix NetScaler SDX Platform Overview

RSA Adaptive Authentication and Citrix NetScaler SDX Platform Overview RSA Adaptive Authentication and Citrix NetScaler SDX Platform Overview 2 RSA and Citrix have a long history of partnership based upon integration between RSA Adaptive Authentication and Citrix NetScaler

More information

Windows XP Application Migration Checklist

Windows XP Application Migration Checklist Windows XP Application Migration Checklist Accelerate XP migration planning 2 Whether just beginning a Microsoft Windows XP application migration project or moving forward on an existing project, it s

More information

Microsoft TMG Replacement with NetScaler

Microsoft TMG Replacement with NetScaler Microsoft TMG Replacement with NetScaler Replacing Microsoft Forefront TMG with NetScaler for Optimization This deployment guide focuses on replacing Microsoft Forefront Threat Management Gateway (TMG)

More information

Trend Micro InterScan Web Security and Citrix NetScaler SDX Platform Overview

Trend Micro InterScan Web Security and Citrix NetScaler SDX Platform Overview Trend Micro InterScan Web Security and Citrix NetScaler SDX Platform Overview 2 Trend Micro and Citrix have a long history of partnership based upon integration between InterScan Web Security and Citrix

More information

Put the IoT to Work in Your Store

Put the IoT to Work in Your Store Put the IoT to Work in Your Store IoT adds a personal touch to retail that keeps customers coming back. Your store still has time to be on the leading edge of retail IoT and to create an even more personalized

More information

Solutions Brief. Citrix Solutions for Healthcare and HIPAA Compliance. citrix.com/healthcare

Solutions Brief. Citrix Solutions for Healthcare and HIPAA Compliance. citrix.com/healthcare Solutions Brief Citrix Solutions for Healthcare and HIPAA Compliance citrix.com/healthcare While most people are well aware of the repercussions of losing personal or organizational data from identity

More information

A Secure, IT-approved Alternative to Personal File Sharing Services in the Enterprise

A Secure, IT-approved Alternative to Personal File Sharing Services in the Enterprise A Secure, IT-approved Alternative to Personal File Sharing Services in the Enterprise Protect business data. Gain secure IT oversight. Provide single point of access to enterprise data for mobile workforces.

More information

Citrix CloudBridge Product Overview

Citrix CloudBridge Product Overview Product Overview Businesses rely on branch offices to serve customers, to be near partners and suppliers and to expand into new markets. As server and desktop virtualization increase and applications move

More information

VDI and Beyond: Addressing Top IT Challenges to Drive Agility and Growth

VDI and Beyond: Addressing Top IT Challenges to Drive Agility and Growth VDI and Beyond: Addressing Top IT Challenges to Drive Agility and Growth Citrix XenDesktop with FlexCast mobilizes the modern workforce App and Desktop virtualization can be a powerful driver of business

More information

XenApp and XenDesktop 7.8 AppDisk & AppDNA for AppDisk technology

XenApp and XenDesktop 7.8 AppDisk & AppDNA for AppDisk technology Citrix Frequently Asked Questions White Paper XenApp and XenDesktop 7.8 AppDisk & AppDNA for AppDisk technology Frequently Asked Questions February 2016 Prepared by: Citrix Windows App Delivery Product

More information

The Trainer s Guide to Using Video Streaming, Video Conferencing and On-Demand Video

The Trainer s Guide to Using Video Streaming, Video Conferencing and On-Demand Video The Trainer s Guide to Using Video Streaming, Video Conferencing and On-Demand Video How to effectively add video into elearning Integrating video into online learning is an undeniably hot topic, but determining

More information

White Paper. Optimizing the video experience for XenApp and XenDesktop deployments with CloudBridge. citrix.com

White Paper. Optimizing the video experience for XenApp and XenDesktop deployments with CloudBridge. citrix.com Optimizing the video experience for XenApp and XenDesktop deployments with CloudBridge Video content usage within the enterprise is growing significantly. In fact, Gartner forecasted that by 2016, large

More information

Solve the application visibility challenge with NetScaler Insight Center

Solve the application visibility challenge with NetScaler Insight Center Citrix NetScaler Solve the application visibility challenge with NetScaler Insight Center 2 Executive Summary The ability to observe, diagnose, and subsequently improve the performance of business-critical

More information

Desktop virtualization for all

Desktop virtualization for all Desktop virtualization for all 2 Desktop virtualization for all Today s organizations encompass a diverse range of users, from road warriors using laptops and mobile devices as well as power users working

More information

XenMobile Technology Overview

XenMobile Technology Overview XenMobile Technology Overview Mobility is a top priority for organizations. Why? Because more employees than ever before are demanding access to the apps and data that will make them productive on the

More information