1 Mobile workstyles White Paper Enabling mobile workstyles with an end-to-end enterprise mobility management solution.
2 2 The evolution of mobile workstyles has made it increasingly important for professionals to be equally as productive on the go as they are in the office. The consumerization of IT is fueled by employee mobility, but also creates complexity for enterprise IT. Bring your own device (BYOD) programs, application proliferation, and consumer file-sharing services are leading to a mix of devices, applications and data that are difficult to control, secure and manage. By powering mobile workstyles with an end-to-end enterprise mobility management solution that includes the Citrix Mobile Solutions Bundle (comprised of Citrix XenMobile MDM and Citrix CloudGateway), Citrix Receiver, and Citrix ShareFile, Citrix is helping to bring order out of this chaos. Consumerization of IT Professionals technology choices are becoming increasingly personal and represent one of many factors driving the consumerization of IT in the enterprise. With the force of this momentum, it is clear that in most business scenarios, users will continue to win the battle of choice for devices, applications, and services. Although there will be exceptions, heterogeneity is here to stay and will be adopted by CIOs as they look to make users as productive on-the-go as in the office. Enabling highly productive mobile workers is a visionary goal, but embracing consumerization as an IT strategy presents significant practical challenges because it creates a broad mix of devices, applications, and data. The following sections present a closer look at the chaos cause by consumerization.
3 3 Application chaos Application management Support Personal productivity User experience Access Device chaos Control Data security Data chaos Figure 1: Device, application, and data chaos Device chaos The ever-increasing range of devices and device platforms that fall under BYOD strategies can create chaos within the enterprise. To avoid it, a simple method is needed to rapidly connect personal and corporate devices to corporate infrastructure, enable users to engage efficiently with the required enterprise applications and data and apply appropriate security controls to devices that employees use for work. Multiple factors influence accessing enterprise IT resources, such as device ownership, user role or status and current location. For example, the resources a contract employee can access from a personal device connected via a public WIFI network should be markedly different from the resources accessible to a permanent employee using a desktop PC on the corporate LAN. For compliance and manageability, IT must be able to configure devices as well as apply policies and actions such as passcodes, app blacklist/whitelist and full or selective wipe of lost devices. A flexible, policy-driven infrastructure that can cope with diversity of devices is critical to managing and securing the IT environment while enabling employee productivity. User experience is also affected by variations in device platforms and form factors. The challenge is to provide a consistently rich experience on all device platforms including Apple ios, Android, RIM, and Microsoft Windows, as well as on devices with different screen sizes and resolutions. To empower employees with full productivity while still ensuring the security of corporate applications and data, IT needs a way to manage devices throughout their entire lifecycle.
4 4 Application Chaos The ever-growing mix of mobile, web, datacenter and Windows applications within enterprises is creating application management and support chaos. With the need to manage all these applications through their entire lifecycle and across a much broader range of devices, challenges abound irrespective of the enterprise application strategy. Organizations embracing native mobile applications suffer from the inefficiencies of developing multiple versions for multiple platforms, as well as the security risks associated with distribution to unsecured devices. Adapting a large base of legacy desktop applications to be suitable for smaller, touch-driven interfaces operating over low-bandwidth, high-latency links is a time-consuming and risky proposition, as not all apps will work well in this new environment. Web applications present their own challenges, notably browser incompatibility and security. Personal apps that users download also present a risk as users may simply mishandle corporate data in these apps or have downloaded a malicious application onto the device. With so many options available, application sprawl is a real problem for IT in terms of manageability and updates as well as security. Current trends are heading away from centralized IT licensing of apps and towards the purchase of SaaS services by departments for line-of-business needs. This trend anticipates more situations where individual applications are brought into the enterprise as a result of BYOD. These trends will create a new wave of application sprawl if steps are not taken to deliver all app types native mobile, web, datacenter, and Windows via a unified infrastructure. Data Chaos The exponential growth of data in the cloud and on devices is creating data management and security chaos. Data chaos occurs at the intersection of access, control, and security. The enterprise needs to make its data available to users while controlling and securing distribution to protect its intellectual property and meet regulatory guidelines regarding user privacy and auditing requirements. The challenges of controlling and securing data arise from multiple, uncontrolled endpoint devices, poorly written and/or malicious applications and readily available consumer data-sharing applications. Also, when it comes to information security attacks, the biggest threats originate within the organization. These attacks are not necessarily malicious and may occur passively through poorly secured devices with no device PINs or data encryption and poor physical access protection. But, with the number of personal devices in the enterprises and cloud data services available, a fine-grained data policy that follows the users as they move between devices becomes a necessity. Citrix enterprise mobility management Citrix offers a solution for controlling all three aspects of chaos with an endto-end enterprise mobility management solution comprised of the Citrix Mobile Solutions Bundle (which includes XenMobile MDM and CloudGateway ), Citrix Receiver, and Citrix ShareFile. The Mobile Solutions Bundle is the centerpiece of this solution, featuring enterprise-grade Mobile Device Management (MDM); stunning mobile productivity apps; mobile app containers via MDX; a unified app store; federated identity & single sign-on and scenario-based access controls.
5 5 Citrix Mobile Solutions Bundle The Citrix Mobile Solutions Bundle enables complete and secure mobile device, app and data freedom. Employees gain quick, single-click access to all their mobile, web, datacenter and Windows apps from a unified app store, including beautiful productivity apps that seamlessly integrate to offer a great user experience. The solution provides identity-based provisioning and control for all apps, data and devices, policy-based controls, such as restriction of application access to authorized users, automatic account de-provisioning for terminated employees and selective wipe of apps and data stored on lost, stolen or out-ofcompliance devices. With the Mobile Solutions Bundle, IT can meet users desire for device choice while preventing data leakage and protecting the internal network from mobile threats. The Citrix Mobile Solutions Bundle delivers the following key features: Enterprise MDM. XenMobile MDM, a key component of the Mobile Solutions Bundle, delivers role-based management, configuration and security for both corporate and employee-owned devices. Users can self-service enroll their devices and IT can provision policies and apps to those devices automatically, blacklist or whitelist apps, detect and protect against jailbroken devices, and wipe or selectively wipe a device that is lost, stolen or out of compliance. Users can use any device they choose, while IT can ensure compliance of corporate assets and secure corporate content on the device. Secure , browser and data sharing apps. The Mobile Solutions Bundle includes key productivity apps from Citrix that users need to get their and ShareFile integration deliver a rich user experience with the management and control that IT requires. Users get , calendar, contacts, a full browser for access to intranet and extranet sites, and data access from anywhere all secured with Citrix MDX technologies. These apps live in a sandboxed container, which ensures corporate data is encrypted and always under IT control. Mobile app containers. Citrix MDX technologies centralize IT management, security and control for any mobile app, whether created by a third party or enterprise IT. With MDX, corporate apps and data reside in a container, separated from personal apps and data on the user s mobile device. This allows IT to set comprehensive policy-based controls, including mobile DLP and the ability to remote lock, wipe and encrypt apps and data. Unified app store. The Citrix Mobile Solutions Bundle includes a unified app store that provides a single place for users to access all of their apps mobile, web, SaaS, and Windows on any device. Users can easily choose the apps they need for their job and have them instantly available on their devices. As they move among their favorite devices, their chosen apps follow them to ensure full productivity in any scenario.
6 6 Identity management, single sign-on and scenario-based access control. The Citrix Mobile Solutions Bundle makes it easy for IT to manage user access and radically simplify the user experience. The solution leverages users identities from the enterprise directory to instantly provision and de-provision app and data access, as well as set granular access controls based on the device and user scenario at any point in time. Through the unified app store, users get single sign-on to all of their approved apps and can easily request access to apps for which they are not currently authorized. Once approval is obtained, they get immediate access. Citrix Receiver Citrix XenMobile Citrix ShareFile Enterprise Any device PC Mac Smartphone Tablet Thin client Any device, app & data Mobile devices Mobile apps Datacenter apps Web apps Windows apps Data Enterprise data Security Account control Provisioning Follow-me-data Access policies Figure 2: A complete enterprise mobility management solution Receiver Receiver and Receiver for Web are a native software client or browser, respectively, that enable employees to access their apps and data delivered through the Mobile Solutions Bundle. Receiver can be installed on any device, allowing employees to use it as a mobile workspace to access their corporate resources on both BYO and corporate-issued devices from anywhere. ShareFile ShareFile underpins the data capabilities of the Citrix Mobile Solution Bundle, giving users the ability to access and share their data from any device or location. ShareFile data is secured on mobile devices using remote data wipe and lock as well as device-based data access policies. In the following diagram, it is the Data component to the XenMobile App Controller.
7 7 Citrix Mobile Solutions Bundle deployment model NetScaler Access Gateway Figure 3: Citrix Mobile Solutions Bundle Architecture The Citrix Mobile Solutions Bundle consists of four backend components: XenMobile App Controller, XenMobile Device Manager, XenMobile Secure Mobile Gateway, and NetScaler Access Gateway. Together, these components address the challenges of device, application, and data chaos that enterprise IT faces from the consumerization of IT. Managing Devices The XenMobile Device Manager and XenMobile Secure Mobile Gateway are the two components that allow IT to manage devices throughout their entire lifecycle with enterprise MDM capabilities. Part of the XenMobile MDM solution, these components allow IT to configure, provision, secure, support, monitor, and decommission any device BYO or corporate-issued. Managing Applications XenMobile App Controller and NetScaler Access Gateway enable IT to wrap any type of app and deliver it to employees through Receiver, based on their role in an organization. Wrapped apps allow IT admins to place policies and controls over them, ensuring that corporate content stays safe and employees don t inadvertently leak sensitive information. Citrix MDX technologies secure the apps that are delivered, allowing IT to apply security policies and encryption on application and data access.
8 8 Managing Data ShareFile integration with the Citrix Mobile Solutions Bundle means IT admins can directly provision and manage ShareFile accounts through the App Controller interface. This provides employees instant access to their ShareFile Enterprise accounts, allowing them so securely access, edit, sync and share files from any device. Conclusion By resolving the device, application and data chaos created by consumerization, Citrix is enabling mobile workstyles for users while providing IT with control and management capabilities. The Mobile Solutions Bundle with Receiver and ShareFile enables quick and effective access to the enterprise resources people need to stay productive on the go from any device, while supporting IT efficiency, information security and regulatory compliance. Corporate Headquarters Fort Lauderdale, FL, USA Silicon Valley Headquarters Santa Clara, CA, USA EMEA Headquarters Schaffhausen, Switzerland India Development Center Bangalore, India Online Division Headquarters Santa Barbara, CA, USA Pacific Headquarters Hong Kong, China Latin America Headquarters Coral Gables, FL, USA UK Development Center Chalfont, United Kingdom About Citrix Citrix (NASDAQ:CTXS) is the cloud computing company that enables mobile workstyles - empowering people to work and collaborate from anywhere, accessing apps and data on any of the latest devices, as easily as they would in their own office simply and securely. Citrix cloud computing solutions help IT and service providers build both private and public clouds - leveraging virtualization and networking technologies to deliver high-performance, elastic and cost-effective services for mobile workstyles. With market leading solutions for mobility, desktop virtualization, cloud networking, cloud platforms, collaboration, and data sharing, Citrix helps organizations of all sizes achieve the kind of speed and agility necessary to succeed in an increasingly mobile and dynamic world. Citrix products are in use at more than 260,000 organizations and by over 100 million users globally. Annual revenue in 2012 was $2.59 billion. Learn more at Citrix Systems, Inc. All rights reserved. Citrix, XenMobile, Access Gateway, Citrix and NetScaler are trademarks or registered trademarks of Citrix Systems, Inc. and/or one or more of its subsidiaries, and may be registered in the United States Patent and Trademark Office and in other countries. All other trademarks and registered trademarks are property of their respective owners. 0213/PDF
10 Essential Elements for a Secure Enterprise Mobility Strategy Best practices for protecting sensitive business information while making people productive from anywhere Mobility and bring-your-own device
10 must-haves for secure enterprise mobility White Paper The 10 musthaves for secure enterprise mobility A security framework and evaluators checklist 2 Becoming a mobile enterprise means new opportunities
Mobile Application Management with XenMobile and the Worx App SDK 2 Enterprises of every size and across every industry have made mobility an important IT initiative. While most mobility strategies started
Overview Guide ShareFile Enterprise technical overview Secure data sync and sharing services ShareFile empowers users to securely share files with anyone and to sync files across all of their devices The
Taking Your Enterprise Mobile: The Mobile opportunities Even though the transition of mobile phones into computers has been a long time coming, the sea change in the past two years is dramatic: Consumer
Introducing XenDesktop, built on the Avalon platform Citrix XenDesktop transforms Windows apps and desktops into a secure, mobile service for any user, any device, anywhere. 2 Citrix XenDesktop enables
Taking Your Enterprise Mobile: The Mobile opportunities Even though the transition of mobile phones into computers has been a long time coming, the sea change in the past two years is dramatic: Consumer
The Future of Mobile Enterprise Security Gearing Up for Ubiquitous Computing August 2014 795 Folsom Street, 1 st Floor San Francisco, CA 94107 Tel.: 415.685.3392 Fax: 415.373.3892 Contents Introduction...
White Paper Securing Today s Mobile Workforce Connect, Protect, and Manage Mobile Devices and Users with Junos Pulse and the Junos Pulse Mobile Security Suite Copyright 2012, Juniper Networks, Inc. 1 Table
Optimizing with Citrix NetScaler White Paper Three keys to building the best front-end network for virtual desktop delivery www.citrix.com Executive summary Motivated by the compelling benefits virtual
G DATA TechPaper #0273 Mobile Device Management G DATA Application Development TechPaper_#0273_2015_04_21 Contents 1. 2. 3. 4. Introduction... 3 Mobile devices in the enterprise... 3 2.1. Benefits... 4
CENTRIFY WHITE PAPER, FEBUARY 2012 Improving Mobile Device Security and Management with Active Directory An overview of mobile device market trends, challenges and approaches to securing and managing smart
Flexible Workstyles and Enterprise IT Supporting the Consumerization of IT with an Intelligent Infrastructure January 2012 www.microsoft.com/workstyle This document is provided as-is. Information and views
1 MOBILITY IN FINANCIAL SERVICES A Checklist Towards Regulatory Compliance Whitepaper Whitepaper Brochure 2 A Checklist Towards Regulatory Compliance Like business leaders in every industry, decision makers
White Paper Secure Network Access for Personal Mobile Devices What You Will Learn People around the globe are enamored with their smartphones and tablet computers, and they feel strongly that they should
SecuRity technologies for mobile and Byod. Executive summary 1.0 the mobile challenges The volume of new malware that is specifically targeting mobile devices is growing at an almost 1.1 increasing threat
Addressing NIST and DOD Requirements for Mobile Device Management Whitepaper 2013 ForeScout Technologies, Inc. All rights reserved. Call Toll-Free: 1.866.377.8771 www.forescout.com Contents 1. OVERVIEW
expanding web single sign-on to cloud and mobile environments agility made possible the world of online business is rapidly evolving In years past, customers once tiptoed cautiously into the realm of online
Kaseya White Paper Managing the Complexity of Today s Hybrid IT Environments There are many factors driving the increasing complexity of IT today. The rapid adoption of cloud computing, big data and mobile
Workplace mobility and the small business Explore the global growth of personal communications devices in the workplace 2 1. Background The following white paper examines the findings of the latest Citrix-commissioned
Citrix XenServer Industry-leading open source platform for cost-effective cloud, server and desktop virtualization. 2 While the core server virtualization market has matured, virtualization itself is seeing
Moving to the Cloud: What Every CIO Should Know CONTACT SALES US: 1.877.734.6983 UK: +44 (0)845.528.0588 www.egnyte.com WHITEPAPER Overview Enterprise data storage needs are growing exponentially, doubling
Enterprise Mobility Management: A Data Security Checklist Executive Summary Secure file sharing, syncing and productivity solutions enable mobile workers to access the files they need from any source at
The Maximum Security Marriage: Mobile File Management is Necessary and Complementary to Mobile Device Management The bring your own device (BYOD) trend in the workplace is at an all-time high, and according