1 Powering federal mobility Simplified mobile computing, BYOD and telework through Enterprise Mobility Management
2 Mobility Vision: A highly mobile workforce equipped with secure access to information and computing power anywhere at anytime for greater mission effectiveness. -Department of Defense Mobile Device Strategy Introduction Increasingly, federal workers are moving out from behind the desk whether it be to go across the street or across the country making computing mobility a necessity instead of a luxury. Agencies that optimize to meet the growing trend of staff mobility and architect around services-based computing best position their workforce for the future. For an optimal computing experience, a mobile and services-based design philosophy must balance user experience, total value of ownership (TVO) and governance for protection of valuable information assets. This white paper from Citrix Public Sector describes options for a mobile servicesfocused computing architecture that empowers federal productivity through mobility, telework, consumerization and collaboration. Mobility, telework and BYOD for federal government Mobility plays an increasingly important role in today s federal agency. For many types of workers, always-on and connected is now a core requirement. is no longer enough; full productivity depends upon real-time access to applications and files and the ability to share resources, collaborate or meet from anywhere at any time. Wherever and however they work in the office, at home or on the road federal workers depend upon reliable access to a consistent, high-performance computing experience. At the enterprise level, agencies and processes are being transformed by a move toward mobile computing and telework that shifts work to the optimal location, time and resource. As workplace mobility increases, many workers are now using consumer devices such as smartphones, tablets and laptops to support business productivity a trend called consumerization. Consumerization often involves the use of the same mobile device for personal and business purposes, as well using worker-owned devices in the enterprise, called bring your own device (BYOD) computing. At the crux of BYOD and the consumerization of IT: More and more federal workers want agency technology to keep pace with tech changes outside the office.
3 However, escalating mobility has presented many challenges to agencies and information technology (IT) departments, forcing them to rethink traditional methods of providing computing services, ensuring information security and controlling the use of enterprise technologies. The need to manage risk must be balanced with the demand by highly mobile workers for freedom of choice and personal control over their computing experience. An optimized mobile computing experience, defined through an innovative and evolutionary approach to mobility, can enable federal IT to meet both sets of requirements. Challenges and opportunities of mobility Mobility brings freedom Mobile computing frees federal workers to work from anywhere, frees their agencies to leverage the full value of telework and frees the enterprise from the constraints of inflexible computing. Through consumerization, mobility brings freedom to personalize the computing experience, while empowering federal agency agility, productivity, innovation and work satisfaction. However, some still see the freedoms of mobility as a potential threat opportunity to be exploited by outside parties. Mobility challenges enterprise architectures Is the ipad tablet the enemy? To many IT departments, ipad tablets and other consumer-grade mobile devices present an untenable threat to network security and control, one that unfortunately exists by design. Traditional enterprise networks and security measures were designed around a core assumption: IT maintains full, end-to-end ownership. These traditional architectures required IT to know and approve every device, network, application and usage of computing. In the face of these constraints, though, many workers responded by acquiring their own alternative computing resources, such as personally owned devices, 4G and Wi-Fi networks and rich SaaS applications, all of which bypass IT inflexibility. Recipe for a failed federal mobility initiative Using the same stale practices and tools from the past Treating all apps and data equally Relying on users to accept risks and create policies Attempting to manage what you don t own Ignoring user experience especially for security Agency IT departments that see ipad or Android tablets as the enemy need to realize that the problem isn t the device itself; it s the outdated enterprise computing architecture that fails to support these devices effectively. The forces of consumerization, mobility and telework need to be seen as core design tenets to enable the next era of computing in federal government.
4 Optimizing for mobility: recommendations for federal government IT 1. Enable mobility for workers, apps and data 2. Keep highly sensitive data in the datacenter whenever possible 3. Protect distributed mobile data in an encrypted secure container 4. Enforce policies specifying what should happen under specific contextual circumstances not just at logon 5. Control data distribution and usage through policy 6. Personalize the worker experience for optimal productivity 7. Automate both the desired worker experience and data protection needs 8. Enhance ease of use by unifying the management of accounts, passwords and access for all apps, both internal and external According to federal IT workers, a mobile workforce is more productive, helps to form successful telework programs and enhances staff satisfaction and retention. The wave of change in government computing People are at the center of today s computing experience. However, it hasn t always been this way. In the not-too-distant past, IT controlled what technology was available, maintained end-to-end ownership of the computing environment and called customers users. Over-focusing on technology and under-focusing on the optimal experience, together with traditional IT strategies and methods, often resulted in a miserable and costly computing experience for agency staff. Workers inside and outside government have since gone their own way, bypassing IT to select their own devices, applications and networks, and generally directing their own computing experience. Industry pundits comment that traditional IT has been rendered irrelevant, and this seems especially true in light of the mobile devices now inundating agencies and confounding IT departments across the country. To thrive in today s era of worker-centric computing, federal IT needs to manage mobility but not in the traditional sense. The move to Enterprise Mobility Management (EMM) Enterprise Mobility Management (EMM) is comprised of technology solutions that manage the increasing array of mobile devices, applications, data, secure access to enterprise infrastructure, and related services to enable use of mobile computing in a business context. EMM goes beyond traditional Mobile Device Management (MDM) solutions and expands to all mobile use cases including BYOD, government-furnished equipment (GFE) and government-owned, personalenabled (GOPE). EMM is an evolving trend within the federal enterprise that will only increase in importance as more agency workers adopt smartphone and tablet devices, and seek IT support for them while in the office and working remotely.
5 EMM addresses key federal initiatives including telework and BYOD by empowering agency employees to work from anywhere, at any time using the device of their choice. Further, as the emergence of consumerization has outpaced the ability of federal enterprise systems to deliver IT services to mobile devices, EMM solutions offer secure access to enterprise resources from any device, while ensuring security, compliance and governance. Taking IT mobile: EMM benefits security Successful agencies can achieve greater flexibility and agility by taking advantage of the security benefits of EMM to optimize mobility, embrace consumerization and broaden teleworking programs. The following table outlines key security concerns for federal agencies regarding enterprise-wide mobility adoption: Agency security concerns Protect sensitive data at rest Protect sensitive data in transit Protect sensitive data in use Local security policies Authentication and access How EMM can help Agencies can keep extremely sensitive data in the datacenter. While users can leverage a thin-client approach to access applications and data on their mobile devices. This averts all data-at-rest concerns as only the presentation layer user interface is displayed on the mobile device. For disconnected use, local mobile apps can be deployed and isolated into an encrypted container to ensure separation from personal apps and data. Federal agencies will require a third-party solution that enables FIPS encryption for any data at rest on the mobile device, especially since most devices do not natively meet this encryption standard. Remote wiping for all corporate data at rest is also a key benefit to ensure that data can be remotely managed if the device is lost or stolen. Agencies should enforce FIPS encryption for all data in transit as the majority of mobile data will be riding over unsecured 3G/4G mobile and Wi-Fi networks. Sensitive applications and data should be isolated into a secure encrypted container, thereby keeping enterprise and personal apps on a device separated. The ability to sandbox applications that would otherwise present greater risk and/or security vulnerabilities, such as being able to open in/send to any native app on the device is also critical. Every mobile device has a set of local security policies that agencies are seeking to enforce. Ensuring a complex passcode and denying access due to jailbroken or rooted devices is top of mind. Agencies are evaluating options for authenticating mobile devices into secure networks leveraging HSPD-12 requirements. Several solutions are emerging including Bluetooth-based and sled-based smartcard readers along with NFC and SD-card-based credentials. As new federal requirements emerge for mobile-based strong authentication, ensuring mobile devices can be deployed enterprisewide with a cost-effective strong authentication method will be key. Granular access should be enabled based on multiple access factors, including user credentials, role, device characteristics, location, thresholds, approvals and workflow. Eliminate the risk of a single actor exceeding his access or authority, thereby protecting sensitive transactions and administrative actions.
6 Citrix mobility capabilities Citrix is focused on delivering mobile workstyle solutions through a comprehensive set of EMM capabilities. As more and more of these mobile capabilities are adopted, there is an increasing Employee Productivity ROI that is generated from the mobile infrastructure. This leads to increased IT agility, flexibility and employee satisfaction. This solutions suite enables federal agencies to adopt mobility along a whole spectrum of products focused on delivering a true mobile workstyle solution. Each of the following components of EMM can be deployed together as a comprehensive solution or piecemeal based on agency requirements. The individual components of the Citrix Enterprise Mobility Management suite are detailed below: Mobile Device Management (MDM) MDM can be the basis of an Enterprise Mobility Management solution as it is a way to enforce device-based policies and provide tracking as required by contracts, regulations and governance. Federal agencies are generally drawn to MDM as a first step toward managing mobile GFE devices. This includes ios, Android, Windows 8 and Blackberry platforms. Although device management can be critical in scenarios where peripheral control and complete app lockdown is required, in scenarios where an agency is looking to adopt a BYOD or GOPE initiative, other device-agnostic EMM solutions maybe more appropriate than a traditional MDM solution.
7 Capability Application control Device wipe Data leakage protection Local policy enforcement Device and app inventory Geo-tracking/ geo-fencing Benefit to federal agencies Agencies require the ability to pre-load applications onto devices at enrollment. Blacklisting rogue applications from being installed onto a device is critical. The ability to remotely wipe the entire device, selectively wipe the device or wipe only the contents of the MDX container depending upon ownership of the device (GFE or personal). Give users secure access to their business data, but with governance and control firmly in the hands of the enterprise. Local policy enforcement ensures device security features are enabled such as passcode lock. For compliance and tracking purposes, agencies need the ability to inventory all devices registered as well as applications installed. Advanced policies requiring geo-tracking will be a reality for sensitive agencies. The ability to enforce policy based on geolocation is a critical feature for high-security environments. Sandboxed and browser Native applications for ios and Android devices are seen as inherently insecure due to their open interactions with other applications on the device. Additionally, for mobile enterprise , agencies may choose not to expose OWA servers publicly for security reasons. Agencies will require a secure mobile client that encrypts all messages and attachments locally, while ensuring that all network access is secured. Federal agencies that also wish to grant mobile access to intranet portals or websites are shying away from using standard OS browsers since they do not encrypt cookie, history or cache information. A secure encrypted browser that can be controlled only for enterprise browsing is an alternative to using built-in mobile browsers. Capability Secure , calendar and contacts Secure HTML5 browser Benefit to federal agencies A sandboxed client ensures that all locally stored and attachments are securely encrypted. residing in a secure container ensures that no personal applications can invoke the mailto function and send messages using an enterprise address. Sandboxed calendar and contacts are also encrypted and are completely isolated from the device s native calendar and contacts apps with which personal applications regularly interact. This ensures personal applications cannot gain access to enterprise calendar or contact information. Since device-based web browsers are used for personal browsing, local cache and cookies can present a security risk when using the same browser to access intranet sites. By leveraging a secure browser which resides within an encrypted container, all enterprise web applications can be securely accessed from a policy-controlled enabled browser app.
8 Mobile network control Several agencies leverage their existing network infrastructure to provide device level VPNs enabling enterprise access for mobile devices. This presents a security risk, as all applications on the device would potentially have access to the agency intranet using this solution. Agencies have also leveraged third-party NOC architectures to prevent direct access to their secure network. Ensuring all data in transit is encrypted using FIPS-validated modules is also vital, as mobile devices will often be accessing services over unsecure Wi-Fi or wireless carrier networks. Capability Secure app tunnels (Micro VPN) Network policies Secure intranet browser Benefit to federal agencies By leveraging secure app tunnels (Micro VPNs) at an application level instead of a device level, secure network access can be limited to a secured application based on policy. Additionally, the same access mechanism can be leveraged for remote access from any device. Network policies to enforce corporate Wi-Fi use, limit traffic to specific Wi-Fi networks and control split tunneling of traffic to the intranet. Utilizing the secure app tunnel architecture, a secure browser can enable intranet access from mobile devices without exposing access to any other devices. This solution can provide mobile access to intranet or Sharepoint portals that several agencies have today. Mobile app wrapping Commonly referred to as Mobile App Management (MAM), individual applications are delivered to the device with encrypted wrappers that control access and usage policies. These wrappers allow agency administrators to control application data, with the ability remotely wipe selected enterprise apps and data on demand without impacting personal apps and data. This architecture enables the concept of a dual persona device, with separate apps and data containers for enterprise and personal use. Several agencies are also looking to deploy mobile enterprise app stores within agencies as a way to deploy home-grown ios/android applications and third-party mobile applications as well as a way to recommend apps on existing Apple and Google App stores.
9 Capability Encrypted secure app vault Applicationbased policies App store Benefit to federal agencies By deploying all enterprise mobile applications to a FIPSencrypted container, agencies can ensure all enterprise application data is locally encrypted and can be fully controlled via policy. All applications which are wrapped within a secure container can be controlled using dynamic scenario-based policies that take access, network, info security and app settings into account. App restriction policies can control individual app interaction with native device peripherals and functions including location services, camera, mic and even mail-to/sms-to functions. App interaction policies can limit how applications interact with other native applications including URL whitelisting, Open-In restrictions, and clipboard control. Deploy ios/android, web and Windows-based applications all within a unified app store that has simple look and feel across all mobile devices. Agencies can leverage one interface to deploy existing Windows and web apps as they transition to mobile OS-based apps. Desktop + app virtualization Federal agencies with highly sensitive data are looking to mobilize their enterprise. Windows desktop and app virtualization will allow these agencies to mobilize Windows resources in a thin-client type model with mobile devices ensuring no data at rest. As desktop virtualization can be used for thin clients, thick clients and laptops as well, having mobile-specific technologies which help mobilize existing UIs can help further drive adoption of existing virtualization infrastructures for mobile. Capability Mobility pack for windows Mobile app SDK Benefit to federal agencies By automatically refactoring and re-skinning existing Windows applications and desktops for easier usage on mobile devices, agencies can begin mobilizing existing enterprise applications immediately. Agencies with Windows app development expertise can also leverage the power of mobile device peripherals from those Windows apps. This includes access to the GPS, camera, and accelerometer on the mobile device by the Windows app residing in the datacenter.
10 Secure data control Just as applications are important to mobile, controlling mobile document access is another imperative for enabling the federal worker. Several agencies are grappling with what they call the dropbox problem where sensitive agency data is being placed into cloud storage environments without any IT control. Additionally, several initiatives are investigating how to deploy home-drive as service within federal service provider organizations. This can open the door to several compliance and regulatory issues if not controlled. By enabling these federal workers with a controlled capability, this can prevent the circumvention of enterprise compliance when using cloud-hosted storage offerings. Capability Ubiquitous document access Local encryption Benefit to federal agencies By providing anywhere access to a user s documents, users will be able to preview, download, send, or edit documents on any mobile device as policy permits. All documents can be edited remotely without any data at rest. Policy can also allow documents to be downloaded for offline use in an encrypted container. Citrix s Enterprise Mobility Management platform is focused on delivering applications and data to mobile devices using several different methods. All of these components work in concert to deliver a holistic, enterprise-scale solution to ensure both administrators and users get a seamless simplified experience. The federal government recently announced a game-changing shift in IT operations, mandating a concerted effort to better mesh agency systems with mobile workstyles. Citrix mobility solutions Citrix provides a multi-tiered, secure-by-design approach for Enterprise Mobility Management products spanning the cloud-based SaaS, network and datacenter. Citrix Mobile Solutions Bundle App Management Business Apps Productivity and Collaboration App Management Secure Mail Data Management Device Management
11 In the datacenter Citrix XenMobile TM MDM Citrix XenMobile MDM provides role-based management, configuration and security of agency- and employee-owned devices. Federal IT can enroll and manage any device, blacklist or whitelist apps, detect jailbroken devices and perform a full or selective wipe of a device that is out of compliance. Users can use any device they choose, while IT can ensure compliance of department assets and the security of content on the device. XenMobile MDM edition is available as an on-premise solution or as a cloud-hosted SaaS offering. Citrix Mobile Solutions Bundle The Citrix Mobile Solutions Bundle, which includes XenMobile MDM, is an enterprise mobility management solution that provides mobile device, app and data freedom for employees. Federal employees have quick, single-click access to all mobile, web, datacenter and Windows apps from a unified app store, including beautiful productivity apps that seamlessly integrate to offer a great user experience. Mobile Device Experience (MDX) enables the management, security and control over web and native mobile applications and data. With MDX, corporate apps and data reside in the MDX Vault, completely separated from personal apps and data on the user s mobile device. In this vault, federal IT can secure apps and data with comprehensive policy-based controls over the usage of corporate content, including mobile DLP and the ability to remote lock, wipe and encrypt apps and data. MDX also provides MDX Interapp to ensure that all MDX-enabled apps can interact with each other for a seamless experience and MDX Access to provide granular policy-based management and access controls over all native and HTML5 mobile apps. Citrix also offers two native mobile productivity apps that leverage MDX security controls to better support mobile workers. These apps are part of the mobile app family that combines all the simplicity and user experience employees expect, with the security and control the agency requires. is a native ios and Android , calendar and contacts app. It integrates with other apps and leverages mobile app security features through MDX technologies to offer secure productivity on the go. Using ShareFileTM, federal users can attach, save and open documents and other attachments as well as open web links, including internal sites, is a full-featured, consumer-like mobile browser for ios and Android devices that enables simple, secure access to internal web, external SaaS, and HTML5 web applications. It leverages MDX technologies, such as the MDX Access to create a dedicated VPN tunnel for accessing an agency s internal network and encryption for the browser cache, bookmarks, cookies and history to ensure that users can access all of their websites, including those with sensitive information. The Mobile Solutions Bundle provides identity-based provisioning and control for all apps, data and devices, policy-based controls, such as restriction of application access to authorized users, automatic account de-provisioning for terminated
12 employees and selective wipe of device, apps or data stored on lost devices. With the Mobile Solutions Bundle, IT can give federal users device choice while giving IT the ability to prevent data leakage and protect the internal network from mobile threats. The federal government s move to empower device mobility will be largely achieved by optimizing public applications and services. Citrix XenDesktop Citrix XenDesktop is a desktop virtualization solution that transforms Windows desktops and applications into a secure on-demand service available to any user, anywhere, on any device. With XenDesktop, federal IT can deliver individual Windows, web and SaaS applications, or full virtual desktops, to PCs, Macs, tablets, smartphones, laptops and thin clients with a high-definition user experience. XenDesktop includes all the capabilities required to deliver desktops, apps and data securely to every user in an agency enterprise. Instead of juggling thousands of static desktop images, IT can manage and update the OS and apps once, from one location, then deliver desktops and apps that are customized to meet the performance, security and mobility requirements of each individual worker. In addition, XenDesktop has achieved Common Criteria Certification to assist federal agencies in addressing mandated security accreditations. Citrix Mobility Pack and Mobile Application SDK The XenApp TM 6.5 Mobility Pack enables native device experience and tabletoptimized desktop features, which allow Windows applications delivered by XenApp to take advantage of mobile device capabilities such as auto keyboard pop-up, local selector controls and auto scrolling. The Mobility Pack also makes the unique capabilities of a mobile device, such as GPS, camera and other sensors, available to application developers who may use it in conjunction with the XenApp 6.5 Mobile Application SDK to create custom, mobile-friendly applications hosted by XenApp. On the device Citrix Receiver TM Citrix Receiver acts as the heart of mobility. Available as a free download for leading platforms, it is the most visible Citrix presence on mobile devices. Citrix Receiver coordinates the delivery of applications and data with a detailed knowledge of device characteristics, such as screen dimensions, input methods, local storage and location services. Applications and data accessed by the Citrix Receiver client are sandboxed from applications and data on the device, reducing the chance of data contamination and loss.
13 Citrix Receiver also affords federal users seamless access to Windows, web and mobile business apps, productivity and collaboration, secure mail, and document access all within a self-service focused, seamless user interface accessible from any mobile device. Over the network Citrix NetScaler Citrix NetScaler provides federal government users with a secure hardened network appliance to serve as a gateway for mobile access into the network. It acts as a network control point in the DMZ to help deliver enterprise mobility and enables federal enterprises to securely deliver mobile, web and Windows apps and ShareFile data to any user on any device. NetScaler helps power remote access to several federal agencies today with several federal certifications including JITC, Common Criteria and FIPS Level 2 compliance. IT staff can address an agency s mobility needs by ensuring a simple and secure access experience for users while providing administrators with a high level of control. Users get a secure desktop, application and data access solution that gives IT granular application-level and device-level policy and action controls over access to corporate content, while allowing users to work from anywhere using SmartAccess and MDX Micro VPN technologies. It provides a single point of control and tools to help IT administrators ensure compliance with regulations and protect information with the highest levels of security, both within and outside the enterprise. At the same time, federal employees are empowered with a single point of access optimized for roles, applications, devices and networks to the enterprise applications and data they need. Users get the same rich desktop, application and data experience that they enjoy when connected to the local network. They are automatically and seamlessly reconnected when they change locations and devices or lose connectivity, reducing frustration and improving productivity. Federal workers can access all agency resources from any device while on the go, and no longer need to configure complex and risky network tunnels to access applications and data and are no longer restricted to a single device in a single location. In the cloud Citrix ShareFile Citrix ShareFile is an enterprise follow-me data solution that enables federal IT to deliver a robust data sharing and sync service that meets the mobility and collaboration needs of users and the data security requirements of the enterprise. By making follow-me data a seamless and intuitive part of every user s day, ShareFile enables optimal productivity for today s highly mobile, anywhere, anydevice government workforce. Through the power of EMM, Citrix provides a multi-faceted, secure-by-design approach to optimizing mobile workstyles.
14 EMM: Optimized solutions for mobility to support agency missions, BYOD and telework Federal agencies have been challenged to make mobility and mobile applications a priority to better serve taxpayers and improve department accessibility. The key in this effort is to securely provide mobile government workers with apps and resources that are available anywhere, anytime and on any device an on-the-go workstyle that Citrix can help agencies deliver today. The Citrix Mobile Solutions Bundle with XenMobile MDM is a complete enterprise mobility management solution that enables IT to manage and secure devices, apps and data while empowering users with the freedom to experience work and life their way. It offers a revolutionary new way to mobilize the federal government. As agencies are encouraged to embrace mobility, BYOD and telework across a broad range of use cases, they unlock new forms of business value and gain firsthand experience that can be shared throughout federal government. IT gains reassurance that traditional obstacles and risk factors posed by mobility can now be addressed effectively, and develops new mobile strategies and best practices for supporting agency goals. Far more than an incremental change in enterprise computing, mobility has the potential to transform the way government business is done and open the door to all-new opportunities for productivity, staff retention and cost savings. Helping government realize this potential is now central to IT s mission and a core focus for Citrix Public Sector. Citrix mobility solutions help federal agencies build simpler and more cost-effective environments that deliver IT as a service and make it easy for government staff to work in the most optimal way anytime, anywhere and on any device. For more information on mobility for federal government, visit
15 Public Sector and D.C. Metro Bethesda, MD, USA Corporate Headquarters Fort Lauderdale, FL, USA Silicon Valley Headquarters Santa Clara, CA, USA EMEA Headquarters Schaffhausen, Switzerland India Development Center Bangalore, India Online Division Headquarters Santa Barbara, CA, USA Pacific Headquarters Hong Kong, China Latin America Headquarters Coral Gables, FL, USA UK Development Center Chalfont, United Kingdom About Citrix Citrix Systems, Inc. (NASDAQ:CTXS) transforms how businesses and IT work and people collaborate in the cloud era. With market-leading mobility, cloud, collaboration, networking and virtualization technologies, Citrix powers mobile workstyles and cloud services, making complex enterprise IT simpler and more accessible for 260,000 organizations. Citrix products touch 75 percent of Internet users each day and it partners with more than 10,000 companies in 100 countries. Annual revenue in 2012 was $2.59 billion. Learn more at Citrix Systems, Inc. All rights reserved. Citrix is a trademark of Citrix Systems, Inc. and/or one or more of its subsidiaries, and may be registered in the United States Patent and Trademark Office and in other countries. All other trademarks and registered trademarks are property of their respective owners. 0213
Mobile workstyles White Paper Enabling mobile workstyles with an end-to-end enterprise mobility management solution. 2 The evolution of mobile workstyles has made it increasingly important for professionals
Bring your own device freedom BYOD solutions for federal government enterprises The Digital Government Strategy, issued by Federal Chief Information Officer (CIO) Steven VanRoekel on May 23, 2012, called
Enterprise mobility management: Embracing BYOD through secure app and data delivery Why Citrix XenMobile is the best approach 2 Introduction The transformation of computing through mobility, consumerisation,
Protecting Mobile Apps with Citrix XenMobile and MDX citrix.com Mobility is a top priority for organizations as more employees demand access to the apps and data that will make them productive. Employees
Bring-Your-Own-Device Freedom Solutions for federal, state, and local governments Increasingly, IT organizations in federal, state, and local agencies are embracing consumerization with the understanding
MDM and beyond: Rethinking mobile security in a BYOD world 2013 Citrix and TechTarget Table of Contents Summary.... 3 Introduction... 3 Current business challenges with BYOD... 4 Securing mobile devices
Secure Data Sharing in the Enterprise 2 Follow-me data and productivity for users with security and manageability for IT Productivity today depends on the ability of workers to access and share their data
10 Essential Elements for a Secure Enterprise Mobility Strategy Best practices for protecting sensitive business information while making people productive from anywhere Mobility and bring-your-own device
Product Overview ShareFile for enterprises Secure, sync and share enterprise files everywhere ShareFile is a secure enterprise file sync and sharing service that meets the mobility and collaboration needs
The Office Reinvented: Mobile Workspaces are the Future of Work How Citrix, Google and Samsung enable secure business mobility. Business mobility empowers people with a convenient and complete work experience
The fastest, most secure path to mobile employee productivity 2 If your organization lacks a bring-your-own-device (BYOD) strategy, you may be in danger of losing employees who are unhappy because they
Mobile Application Management with XenMobile and the Worx App SDK 2 Enterprises of every size and across every industry have made mobility an important IT initiative. While most mobility strategies started
Comprehensive Enterprise Mobile Management for ios 8 Citrix XenMobile enhances the new iphone and ipad operating system to give mobile users increased functionality and enterprises greater management and
Mobile app containers with Citrix MDX 2 Enterprises of every size and across every industry have made mobility an important IT initiative. While most mobility strategies started with mobile device management
Citrix ShareFile Enterprise technical overview 2 The role of IT organizations is changing rapidly as the forces of consumerization pose new challenges. IT is transitioning from the sole provider of user
Mobility and cloud transform access and delivery of apps, desktops and data Unified app stores and delivery of all apps (Windows, web, SaaS and mobile) and data to any device, anywhere. 2 The cloud transforms
Redefining IT for federal healthcare agencies Redefining IT for federal healthcare agencies Virtualization solutions for clinicians and patients: Anytime, anywhere, on any device Executive summary These
The falling cost and rising value of desktop virtualization 2 The growing strategic value of desktop virtualization, from a more flexible, productive workforce to lower real estate costs, has made it a
Desktop virtualization for all 2 Desktop virtualization for all Today s organizations encompass a diverse range of users, from road warriors using laptops and mobile devices as well as power users working
Citrix Enterprise Mobility Report Plus 5 Steps to Building an Enterprise Mobility Strategy A survey of 510 IT Directors, CIOs, and Architects on the state of mobile applications, data, and devices in the
Citrix Solutions Citrix solutions empower people to work and collaborate from anywhere, securely accessing apps and data on any of the latest devices, as easily as they would in their own office. As work
Overview Guide ShareFile Enterprise technical overview Secure data sync and sharing services ShareFile empowers users to securely share files with anyone and to sync files across all of their devices The
Solutions Brief The Always-on Enterprise: Business Continuity Scenarios that Work How mobility solutions from Citrix, Google and Samsung ensure continuous productivity. Business continuity keeps CIOs up
Top Three Reasons to Deliver Web Apps with App Virtualization Improve manageability, security and performance for browser-based apps. Web browsers can cause many of the same headaches as any other Windows
The complete solution for enabling BYO Solution Brief The complete solution for enabling BYO www.citrix.com Companies of all sizes are witnessing a transformation in the types of devices entering the workplace,
White Paper Securing Mobile Applications and Data with Citrix XenMobile EMM As enterprises transition from corporate owned and managed laptops, tablets and smartphones to Bring Your Own Device (BYOD) and
White Paper The Value Add of Citrix Enterprise Mobility Management over App Configuration for the Enterprise citrix.com App Configuration for Enterprise (ACE) was introduced by AirWatch. AirWatch describes
Eight steps to fill the enterprise mobile application gap are quickly becoming as important and widespread in the enterprise as PCs and traditional business apps. Thanks to the consumerization of IT and
Desktop virtualization for all 2 Desktop virtualization for all Today s organizations encompass a diverse range of users, from road warriors using laptops and mobile devices as well as power users working
DLA achieves unmatched agility through telework and BYOD strategy White Paper U.S. Department of Defense: Defense Logistics Agency (DLA) achieves unmatched agility through telework and BYOD strategy Redefining
VDI and Beyond: Addressing Top IT Challenges to Drive Agility and Growth Citrix XenDesktop with FlexCast mobilizes the modern workforce App and Desktop virtualization can be a powerful driver of business
Data Center Consolidation for Federal Government Virtual computing transforms IT environments so agencies can cut costs, bolster efficiency and agility, and improve user productivity In a slow economy,
Citrix Lifecycle Management Comprehensive cloud-based service lifecycle management solution IT administrators are realizing that application deployments are getting more complex and error-prone than ever
Powering Real-Time Mobile Access to Critical Information With Citrix ShareFile An enterprise file sync and sharing solution built for the needs of the energy, oil and gas industry to provide employee and
Citrix Enterprise Mobility Management Solutions Achi Lewis email@example.com Regional Manager UK&I XenMobile EMEA How Mobile Feels Today User Needs Freedom to access all their apps and data from any
White Paper Get the Most from Your EMM Deployment with Secure File Sharing A comprehensive overview of 10 popular use cases Citrix XenMobile and Citrix ShareFile deliver the most complete enterprise mobility
A Secure, IT-approved Alternative to Personal File Sharing Services in the Enterprise Protect business data. Gain secure IT oversight. Provide single point of access to enterprise data for mobile workforces.
White Paper Secure Mobile Collaboration with Citrix XenMobile and ShareFile Mobile devices and BYOD have brought unprecedented agility to the enterprise, allowing users to collaborate, access information
Citrix Enterprise Mobility more than just device management (MDM) Fabian.Kienle@citrix.com Manager, Channel Readiness Central Europe The only reason why IT exists: APPLICATIONS! 3 The reality: Customer
Citrix XenMobile technology overview 2 The bring your own (BYO) device movement, the proliferation of smartphones in the workplace, and enterprise tablet initiatives have made mobility a top priority among
Safeguard Protected Health Information With Citrix ShareFile This enterprise file sync and sharing solution supports HIPAA compliance, boosts security and mobilizes data access Citrix ShareFile helps healthcare
Best practices to make BYOD simple and secure A guide to selecting technologies and developing policies for BYOD programs 2 As consumerization continues to transform IT, organizations are moving quickly
Enabling a Mobile Enterprise Mark Holobach Senior Systems Engineer Citrix Mobility Enabling a Mobile Enterprise Your Technical Blueprint To Getting Started Mark Holobach Citrix Systems How Mobile Feels
Citrix DesktopPlayer for Mac White Paper Maximizing Flexibility and Productivity for Mobile MacBook Users Windows virtual desktops to go for corporate and BYO Macs 2 Executive Overview The popularity of
Best practices to enable clinician mobility for patientcentered healthcare Strategies, solutions and realworld examples for transforming healthcare IT without sacrificing security or compliance. 2 Mobility
Powering real-time mobile access to critical information with ShareFile An enterprise file sync and sharing solution built for the needs of the energy, oil and gas industry to provide employee and third-party
Deliver Enterprise Mobility with Citrix XenMobile and Citrix NetScaler 2 Introduction Mobility and the consumerization of IT pose key challenges for IT around scalability, security and application visibility.
White Paper What s Missing from Your BYOD Strategy? for BYOD, CYOD or COPE In the early days of mobility, companies rushed to embrace bring-your-own-device (BYOD) programs, which allowed employees to use
Trend Micro InterScan Web Security and Citrix NetScaler SDX Platform Overview 2 Trend Micro and Citrix have a long history of partnership based upon integration between InterScan Web Security and Citrix
Modernize your business with Citrix XenApp 7.6 Avoid non-compliance issues and keep your business running smoothly by upgrading your SAP environment to run on top of the latest Citrix and Microsoft technologies
Workplace transformation: Unleash innovation and lower costs with new technologies and work environments It matters where and how people work. As companies seek new ways to drive competitive advantage,
Secure mobility with Citrix & Cisco Enterprise IT resources on tablets and smartphones BYOD & Mobile Networks Damjan Mirtic Citrix South East Europe 1.3 Billion Mobile workers by 2015 Mobile Worker Population
WHITE PAPER SECURING TODAY S MOBILE WORKFORCE Connect, Secure, and Manage Mobile Devices and Users with Junos Pulse and the Junos Pulse Mobile Security Suite Copyright 2011, Juniper Networks, Inc. Table
Run Skype for Business as a Secure Virtual App with a Great User Experience Improve security and manageability while avoiding the performance problems of traditional virtual installations. Deliver secure,
Product Overview Citrix CloudPortal Business Manager Unified cloud services delivery and business management platform Enterprises and cloud providers have focused most of their initial cloud strategies
Citrix Workspace Cloud Apps and Desktop Service with an on-premises Resource Reference Architecture Produced by Citrix Solutions Lab This guide walks you through an example of how to use Citrix Workspace
Back to the Future: Securing your Unwired Enterprise By Manoj Kumar Kunta, Global Practice Leader - Security Back to the Future: Securing your Unwired Enterprise The advent of smartphones and tablets has
Microsoft Dynamics CRM 2015 with NetScaler for Global Server Load Balancing Solution Guide This solution guide focuses on defining the deployment process for Microsoft Dynamics CRM with Citrix NetScaler.
XenMobile MDM and The Mobile Solutions Bundle Jaan Feldmann Sergei Sokolov How Mobile Feels Today User Needs Freedom to access all their apps and data from any of their devices For Enterprise IT, mobile
BlueCat Networks Adonis and Proteus on Citrix NetScaler SDX Platform Overview 2 The BlueCat Networks and Citrix partnership is based upon integration between BlueCat Networks DNS, DHCP and IP Address Management
Deploying NetScaler Gateway in ICA Proxy Mode Deployment Guide This deployment guide defines the configuration required for using the NetScaler Gateway in ICA Proxy Mode. Table of Contents Introduction
RSA Adaptive Authentication and Citrix NetScaler SDX Platform Overview 2 RSA and Citrix have a long history of partnership based upon integration between RSA Adaptive Authentication and Citrix NetScaler
Deploying XenApp on a Microsoft Azure cloud The scalability and economics of XenApp services on-demand citrix.com Given business dynamics seasonal peaks, mergers, acquisitions, and changing business priorities
BlueCat IPAM, DNS and DHCP Solutions on Citrix NetScaler SDX Platform Overview 2 The BlueCat and Citrix partnership is based upon integration between BlueCat s DNS, DHCP and IP Address Management (IPAM)
Solutions Brief Safeguard protected health information with ShareFile This enterprise file sync and sharing solution supports HIPAA compliance, boosts security and mobilizes data access ShareFile helps
Solution Overview Cisco Mobile Workspace Solution A Whole New Level of Worker Mobility Basic mobile connectivity for employees using personal devices has been around for a while, bringing both benefits
Deployment Guide Guide to Deploying Microsoft Exchange 2013 with Citrix NetScaler Extensive guide covering details of NetScaler ADC deployment with Microsoft Exchange 2013. Table of Contents Introduction
Simple, secure access to apps and desktops from anywhere Today s fast-paced business world requires IT organizations to supply tools that allow employees to quickly react to the demands of a competitive
White Paper Top Five Requirements for Secure Enterprise File Sync and Sharing Mobilize enterprise data. Empower users anywhere. Maintain security and control. Employees depend on data to be productive.
Citrix XenDesktop with FlexCast technology White Paper Citrix XenDesktop: Desktop Virtualization For All www.citrix.com Today s organizations encompass a diverse range of users, from road warriors using
White Paper Enterprise Mobility Management: To Improve Clinician Workflows and Patient Outcomes, Think Beyond the Device Enable better care with a solution that harnesses the full potential of mobile devices
Hosted Workspaces Demo Guide for Citrix Service Provider Partners Deliver a great hosted workspaces customer demo that includes Desktops-as-a-Service, virtual applications, file sharing and sync and Mobile
The ForeScout Difference Mobile Device Management (MDM) can help IT security managers secure mobile and the sensitive corporate data that is frequently stored on such. However, ForeScout delivers a complete
3 Service desk predictions for 2013 Learn how IT departments will improve process, consolidate systems and reduce budgets. 2 Today, technology touches nearly every aspect of our lives. We still have desktop
Delivering Business Value Through Mobility Secure Mobility Drive Productivity Mobilize Business 1999-2015 Citrix Systems, Inc. All Rights Reserved. Companies are realizing that mobility can deliver value
ShareFile StorageZones Provisioning ShareFile on Microsoft Azure Storage This document provides a technical overview of how ShareFile can be provisioned on customermanaged, Microsoft Azure cloud storage
Solution Guide for Citrix NetScaler and Cisco APIC EM Orchestrating Network QoS policy for delivering enhanced video experience to XenDesktop users Table of contents Solution Overview 3 Executive Summary
Single Sign On for ShareFile with NetScaler Deployment Guide This deployment guide focuses on defining the process for enabling Single Sign On into Citrix ShareFile with Citrix NetScaler. Table of Contents
Citrix XenApp, MDOP, and Configuration Manager White Paper XenApp 6, MDOP, and Configuration Manager Delivering on-demand applications using Citrix XenApp, Microsoft Desktop Optimization Pack 2010, and
CA Single Sign-On and Citrix NetScaler: Quickly Adapt to Your Dynamic Authentication Demands citrix.com/ready CA Technologies and Citrix have partnered to integrate their complementary, industry-leading
Advanced Service Desk Security Robust end-to-end security measures have been built into the GoToAssist Service Desk architecture to ensure the privacy and integrity of all data. gotoassist.com Many service