The fastest, most secure path to mobile employee productivity

Size: px
Start display at page:

Download "The fastest, most secure path to mobile employee productivity"

Transcription

1 The fastest, most secure path to mobile employee productivity

2 2 If your organization lacks a bring-your-own-device (BYOD) strategy, you may be in danger of losing employees who are unhappy because they can t use the latest, greatest devices, or exposed to unacceptable security vulnerabilities from those same employees bringing in prohibited, unsecured devices for work purposes. The era of tight IT control over mobile work devices, including laptops, smartphones and tablets, is over. As shown in Figure 1, a recent survey of Citrix enterprise customers found that 50 percent of smartphones, 54 percent of tablets and 18 percent of desktop and laptop PCs used for work were also employees personal devices. Gartner predicts that by 2017 half of all employers will require employees to provide their own devices for work. And it s not just one device. Studies show that, on average, employees use three or more devices throughout the workday. 60% A survey of Citrix customers confirm high levels of BYO for mobile devices % devices that are BYO 40% 50% 54% 20% 18% 0% Smartphones Tablets Desktops/ Laptops Figure 1: Citrix survey results for percentage of BYO devices in organizations. Productivity vs. security Organizations facing the BYOD trend must strike a delicate balance between empowering mobile users with the capabilities they need to stay productive and protecting the organization from the multiple risks these personal devices and applications present to network security and sensitive intellectual property.

3 3 What does it take to get employees up, running and productive quickly and securely with their numerous devices? Most organizations turn first to enterprise mobile device management (MDM) platforms. MDM solutions are powerful tools for any BYOD arsenal. However, there are other considerations in a BYOD environment, including secure use of mobile applications, cloud services and enterprise files and information. As shown in Figure 2, there are many point solutions for solving each of these issues, but only Citrix offers a single, comprehensive solution that addresses all of them and allows organizations to empower employees quickly while meeting security and compliance requirements. Any app, any device, anywhere Mobile Value-on-Investment Mobile Device Management XenMobile Sandboxed Mail and Web Mobile App Security ShareFile XD SDK / App DNA Secure Mobile Data Sharing App Dev Tools NetScaler Mobile Network Control SSO and Identity Management XD/XA Windows as a Service GoToMeeting Podio Collaboration Figure 2: The broader mobility market is fragmented. According to our recent Citrix mobility survey, the first and primary application required by most users (almost 90 percent) is enterprise , including calendars and contacts (Fig. 3). That sounds simple enough, but in fact there are many options for providing mobile access to , and each has its own balance of usability, flexibility and risk.

4 4 When it comes to supporting mobility, what are the most important types of mobile applications to your organization? 100% 80% 90% 60% 40% 20% 35% 48% 21% 36% 39% 52% 0% Mobile SharePoint (including access calendar and contacts) Enterprise file sync and share Web conferencing Secure browser Collaboration tools Line of business apps Figure 3: Citrix survey results for mobile applications important to organizations. Native Users are often most comfortable using the client software native to the device and its operating system, and for some organizations that s a perfectly acceptable strategy. However, before allowing employees to use native it s important to understand the management, security and compliance challenges it presents. Perhaps most daunting is the number of different native clients and operating systems IT must track, secure and keep updated with the most current versions and security patches. Most of these clients were created for consumers, not enterprise users, and are only now starting to catch up with the needs of securityconscious enterprise IT departments. IT must take into account the different levels of capability each client offers and the risks it poses to sensitive information. For example, native clients often don t encrypt or attachments stored on the device, which means proprietary information may be accessible in the event the device is lost or stolen or the user leaves the organization. IT can use MDM capabilities to remotely wipe the applications and data on the device. However, different mobile operating systems and versions provide different levels of hooks into MDM software to support that capability. Depending on the client, users may have to, or simply be allowed to, mix corporate and personal in the same account. This means selective wipe of corporate information may be impossible when an employee changes roles or leaves the organization.

5 5 Native client software is often open to sharing information with other applications and functions on the device, which adds the risk that corporate contacts, s and calendar entries could be accessed by other applications, including malicious ones. Most native clients also allow users to open and edit attachments in unprotected or even malicious mobile applications, copy and paste information to other files and forward sensitive information to personal accounts or unauthorized users in violation of company policy. Finally, Microsoft Exchange ActiveSync, used to synchronize between Exchange and mobile applications, often requires deploying some messaging services in the enterprise DMZ, which is not as secure as the internal enterprise network and in some cases can provide hackers a path to corporate information. It s up to your organization to determine if user flexibility, productivity and satisfaction outweigh the risks of native . Sandboxed Another option is specialized sandboxed client software offered by Citrix (WorxMail) and other vendors. Sandboxed keeps work and personal data on the device completely separate by encrypting work information and making work-related applications and information unavailable to personal applications. Many solutions allow assignment of granular enterprise policies restricting the opening, forwarding, editing and saving of files to protect proprietary information. And the containerization of corporate applications and data makes it much simpler to implement selective wiping of corporate applications and data when a user changes roles, leaves the organization or loses the device. However, the interfaces of some sandboxed solutions may not be as familiar or appealing to users as that offered by the device s native application. In contrast, WorxMail delivers a native-like experience. Finally, sandboxing may reduce the flexibility a power mobile user seeks for various functions. Virtual Current users of Citrix XenApp and Citrix XenDesktop virtualization solutions know that either can be harnessed to deliver mobile access to Windows desktop applications, including Microsoft Outlook Virtual is one of the most secure alternatives, since applications and data are stored securely, either in the datacenter or locally in an encrypted file system with powerful enterprise policy enforcement. Thanks to Citrix Receiver, the mobile experience conforms to user expectations for the device and its operating system, including touchscreen capabilities. Such a strategy eliminates most of the security hazards of local native clients and their vulnerable and attachments. Virtual is ideal for employees who prefer to use the same as on their desktop and are able to work offline using their mobile device.

6 6 Web-based Finally, Outlook Web Access provides mobile browser access to Outlook , but only limited offline access. Issues include browser incompatibility as well as an interface that may not be as comfortable, responsive and familiar for the mobile user as the interface of the native client application. Unsecured web browsers also bring their own risks, such as web-based malware. As with Exchange ActiveSync, Outlook Web Access may involve deploying some Exchange services in the enterprise DMZ. In sum, each mobile alternative balances usability and protection of private information. Organizations should consider all these factors when deciding which mobile method to use. They may wish to deploy different strategies for different departments and employees depending on issues involving proprietary information, compliance and security. File sharing Once they re up and running with , BYOD users often seek easy access to the files and other data they need to be productive. Most want to be able to annotate or edit files on their mobile devices. To do this, many currently take advantage of file-sharing and synchronization cloud services such as Box, Dropbox and Google Drive. Unfortunately these services were created for consumers, not the securityconscious enterprise, and pose their own risks. Storing any sensitive information in a third-party cloud service immediately takes it out of the control of the enterprise and may expose it to theft, such as when Mitt Romney s DropBox and Hotmail accounts were hacked during the 2012 presidential election campaign. Some of these services have started to offer encryption and two-factor authentication, but some only encrypt data in transit, rather than at rest, and users often do not take advantage of these capabilities. Since information is stored in the public cloud it is difficult or impossible for IT to exert any control over which information is stored in which account or to wipe sensitive information or block access when users change roles or leave the organization. As with , users may access these files with unprotected devices or applications. A single mobile solution Numerous point solutions address the multiple challenges of managing and securing mobile devices, applications and access in the enterprise. Some focus on MDM, others on securing mobile applications and still others on secure file sharing. Some emphasize IT security and management needs at the expense of user empowerment and flexibility. Only Citrix offers a comprehensive solution spanning all those requirements and the needs of different IT departments and users. With Citrix XenMobile solutions, organizations can be up, running and productive quickly with a BYOD strategy

7 7 that fits their exact needs. As requirements evolve, companies can take advantage of the industry s largest third-party gallery of secure, enterprise-friendly mobile applications and easy, effective tools for securing internally developed software both provided by Citrix. Further, only Citrix offers a single solution for quickly deploying any or every strategy, from the user device s native client software to virtualized and sandboxed . Some XenMobile solutions can even be implemented securely without the use of MDM, eliminating concerns of some users that IT is monitoring their personal devices, applications and location. With a complete, integrated mobile management solution, organizations can quickly enable employees to be productive and continue to expand the scope of their BYOD strategy according to their unique needs, schedule and capabilities. XenMobile MDM Edition XenMobile MDM Edition is a comprehensive enterprise solution that offers role-based management, configuration and security for thousands of enterprise and personal user devices, including laptops, smartphones and tablets, across their lifecycles. With XenMobile MDM Edition, IT configures management servers and user devices quickly via a web-based administrative console and imported Active Directory user groups and accounts. Administrators can also configure XenMobile MDM Edition to make requests to a certificate authority to enable certificate-based authentication for Wi-Fi, VPN and Exchange ActiveSync profiles. Users can self-enroll their devices easily with IT-provisioned policies and applications and download and deploy any or all IT-sanctioned mobile, SaaS and Windows applications from a unified corporate app store. XenMobile MDM Edition also offers mobile application blacklisting and whitelisting; detection and blocking of jailbroken devices for compliance purposes; and full or selective remote wipe of data and applications and data, depending on the capabilities of the mobile operating system. XenMobile MDM Edition provides tight control across the entire device lifecycle by: Configuring device settings and policies, such as device and application restrictions. Provisioning devices via self-service device enrollment and centralized distribution of configurations, policy and application packages and updates. Securing devices, applications, the network and data with authentication and access policies, application and cloud service blacklisting and whitelisting, enforcement of secure application tunneling and deployment of content- and context-aware mobile data loss prevention policies.

8 8 Monitoring devices, infrastructure, service-level and telecom expenses. Supporting users by remotely locating, locking and wiping devices in the event of loss or theft. XenMobile MDM Edition is also one of the few MDM solutions to provide IT with remote user device control and troubleshooting. Decommissioning devices by identifying devices that are inactive and wiping or selectively wiping them upon employee departure. With selective wipe, the corporate profile and all associated applications, including , are removed without affecting the user s personal applications and information. access XenMobile doesn t stop at device management, however. Organizations seeking to make employees productive with access to enterprise will find XenMobile offers every possible solution for access from any user or device. With XenMobile, organizations can even deploy different solutions to different types of users, depending on their risk profiles. For example, for simple content creators, office administrators or other users that fit a low-risk profile, XenMobile MDM Edition can quickly provide Exchange access from a native client, ensuring only approved native and third-party clients and users have access and are kept up-to-date according to role-based restrictions and enterprise policies. For board members, executives or other users with access to more-sensitive data, XenMobile provides its own sandboxed client, WorxMail, which offers a rich, comfortable user experience similar to that of native clients, but adds extensive enterprise visibility and policy creation and enforcement capabilities. With WorxMail, all corporate , contacts and calendar items are stored on the device completely separate from personal applications and information and are inaccessible to them. All and attachments can be encrypted and policies can be enforced to prevent users from opening, editing or saving attachments in unapproved applications, forwarding sensitive information or cutting and pasting confidential company information into other documents. IT can also require secure remote connectivity via a micro VPN. WorxMail integrates tightly with the XenMobile secure browser, WorxWeb, so that all web links are opened in a secure, sandboxed browser environment. WorxMail can also integrate with Worx-enabled enterprise applications and scores of secure third-party applications listed in the Citrix Worx gallery.

9 9 Figure 4: Links clicked in WorxMail, including internal intranet sites, securely open in WorxWeb. WorxMail can even be deployed without any MDM, quelling concerns among executives or other employees that their devices, activities and locations are being tracked at all times. With the use of Citrix NetScaler for secure access, IT no longer has to deploy Exchange ActiveSync servers in the less-secure DMZ. If IT feels these or other users require a highly secure virtual alternative, or simply mobile access to other Windows applications, XenDesktop provides completely virtualized access to Outlook for Windows and other Windows applications, with all applications and data stored centrally in the secure datacenter, or streamed and stored locally in a secured, encrypted file system with powerful enterprise policy enforcement. Citrix Receiver ensures the user experience always fits the mobile device, including the user of touch capabilities.

10 10 Finally, organizations that wish to deploy Outlook Web Access to selected users such as field workers or facilities managers can use NetScaler for a single point of granular remote access control. Citrix also offers the secure, sandboxed WorxWeb browser, which can be required for secure user web access to Outlook Web Access. Citrix ShareFile for file sharing In addition to device management and secure, flexible access, XenMobile can secure file sharing with Citrix ShareFile, a highly secure enterprise alternative to consumer file-sharing and synchronization services such as Dropbox, Box, and Google Drive. ShareFile can synchronize files stored across multiple devices, including PCs, laptops, network servers, smartphones, tablets and even SharePoint repositories. With ShareFile, all user documents are encrypted in transit and at rest. IT can exert tight control with granular policies, similar to those of WorxMail, to prevent leakage of sensitive enterprise information and to wipe devices of sensitive files in the event a device is stolen or a user leaves the organization or changes roles. ShareFile integrates tightly with WorxMail, allowing IT to define policies that limit the size of attachments. If an attachment exceeds the size limit, the message automatically provides ShareFile links instead. This limits global communication costs and the strain placed on the messaging infrastructure by large file attachments. Figure 5: ShareFile integrates with XenMobile Worx-enabled apps, including WorxMail for secure file and document collaboration.

11 11 Finally, aside from WorxMail and WorxWeb, the Worx ecosystem provides an SDK that can add extensive mobile policy definition and enforcement to enterprise or third-party line-of-business applications, including Windows apps, whether they were built originally for mobility or not. Users can access the applications from the unified app store and, thanks to Citrix Receiver, IT can deliver a mobile experience for users while securing apps with policies added by the Worx SDK. Conclusion BYOD is here to stay. If your organization has not yet implemented BYOD, Citrix XenMobile solutions offers a comprehensive, enterprise-level ecosystem for deploying a complete strategy quickly, including devices, applications, enterprise access and secure file sharing. Not only can you get up and running faster with one solution than multiple point solutions, but XenMobile provides unparalleled flexibility for deploying a range of preferred access strategies that balance user satisfaction and flexibility with enterprise management, security and compliance requirements. The comprehensive solution Citrix offers not only gets you going fast, it also allows you to extend your BYOD capabilities according to the needs and constraints of your enterprise. Corporate Headquarters Fort Lauderdale, FL, USA Silicon Valley Headquarters Santa Clara, CA, USA EMEA Headquarters Schaffhausen, Switzerland India Development Center Bangalore, India Online Division Headquarters Santa Barbara, CA, USA Pacific Headquarters Hong Kong, China Latin America Headquarters Coral Gables, FL, USA UK Development Center Chalfont, United Kingdom About Citrix Citrix (NASDAQ:CTXS) is the cloud company that enables mobile workstyles empowering people to work and collaborate from anywhere, easily and securely. With market-leading solutions for mobility, desktop virtualization, cloud networking, cloud platforms, collaboration and data sharing, Citrix helps organizations achieve the speed and agility necessary to succeed in a mobile and dynamic world. Citrix products are in use at more than 260,000 organizations and by over 100 million users globally. Annual revenue in 2012 was $2.59 billion. Learn more at Copyright 2013 Citrix Systems, Inc. All rights reserved. Citrix, XenMobile, XenApp, XenDesktop, NetScaler, NetScaler Gateway, ShareFile, Citrix Receiver, WorxMail and WorxWeb are trademarks of Citrix Systems, Inc. and/or one of its subsidiaries, and may be registered in the U.S. and other countries. Other product and company names mentioned herein may be trademarks of their respective companies. 1013/PDF

How four Citrix customers solved the enterprise mobility challenge

How four Citrix customers solved the enterprise mobility challenge How four Citrix customers solved the enterprise mobility challenge Managing mobile devices, data and all types of apps Windows, datacenter, web and native mobile through a single solution 2 Enterprise

More information

Mobilize Email with Enterprise-Grade Security and a Great Experience

Mobilize Email with Enterprise-Grade Security and a Great Experience White Paper Mobilize Email with Enterprise-Grade Security and a Great Experience Data protection for your business. Flexibility for IT. Seamless productivity for your workforce. People need to be able

More information

Comprehensive Enterprise Mobile Management for ios 8

Comprehensive Enterprise Mobile Management for ios 8 Comprehensive Enterprise Mobile Management for ios 8 Citrix XenMobile enhances the new iphone and ipad operating system to give mobile users increased functionality and enterprises greater management and

More information

Enabling mobile workstyles with an end-to-end enterprise mobility management solution.

Enabling mobile workstyles with an end-to-end enterprise mobility management solution. Mobile workstyles White Paper Enabling mobile workstyles with an end-to-end enterprise mobility management solution. 2 The evolution of mobile workstyles has made it increasingly important for professionals

More information

White Paper. Protecting Mobile Apps with Citrix XenMobile and MDX. citrix.com

White Paper. Protecting Mobile Apps with Citrix XenMobile and MDX. citrix.com Protecting Mobile Apps with Citrix XenMobile and MDX citrix.com Mobility is a top priority for organizations as more employees demand access to the apps and data that will make them productive. Employees

More information

Eight steps to fill the enterprise mobile application gap

Eight steps to fill the enterprise mobile application gap Eight steps to fill the enterprise mobile application gap are quickly becoming as important and widespread in the enterprise as PCs and traditional business apps. Thanks to the consumerization of IT and

More information

Enterprise- Grade MDM

Enterprise- Grade MDM Enterprise- Grade MDM This brief describes a foundational strategic feature of the Citrix enterprise mobility offering, enterprise-grade MDM. 2 While the transition of mobile phones into computers has

More information

White Paper. Secure Mobile Collaboration with Citrix XenMobile and ShareFile. citrix.com

White Paper. Secure Mobile Collaboration with Citrix XenMobile and ShareFile. citrix.com White Paper Secure Mobile Collaboration with Citrix XenMobile and ShareFile Mobile devices and BYOD have brought unprecedented agility to the enterprise, allowing users to collaborate, access information

More information

Citrix ShareFile Enterprise technical overview

Citrix ShareFile Enterprise technical overview Citrix ShareFile Enterprise technical overview 2 The role of IT organizations is changing rapidly as the forces of consumerization pose new challenges. IT is transitioning from the sole provider of user

More information

Enterprise mobility management: Embracing BYOD through secure app and data delivery

Enterprise mobility management: Embracing BYOD through secure app and data delivery Enterprise mobility management: Embracing BYOD through secure app and data delivery Why Citrix XenMobile is the best approach 2 Introduction The transformation of computing through mobility, consumerisation,

More information

Mobile Application Management with XenMobile and the Worx App SDK

Mobile Application Management with XenMobile and the Worx App SDK Mobile Application Management with XenMobile and the Worx App SDK 2 Enterprises of every size and across every industry have made mobility an important IT initiative. While most mobility strategies started

More information

The Office Reinvented: Mobile Workspaces are the Future of Work

The Office Reinvented: Mobile Workspaces are the Future of Work The Office Reinvented: Mobile Workspaces are the Future of Work How Citrix, Google and Samsung enable secure business mobility. Business mobility empowers people with a convenient and complete work experience

More information

Powering Real-Time Mobile Access to Critical Information With Citrix ShareFile

Powering Real-Time Mobile Access to Critical Information With Citrix ShareFile Powering Real-Time Mobile Access to Critical Information With Citrix ShareFile An enterprise file sync and sharing solution built for the needs of the energy, oil and gas industry to provide employee and

More information

Secure Data Sharing in the Enterprise

Secure Data Sharing in the Enterprise Secure Data Sharing in the Enterprise 2 Follow-me data and productivity for users with security and manageability for IT Productivity today depends on the ability of workers to access and share their data

More information

The Always-on Enterprise: Business Continuity Scenarios that Work

The Always-on Enterprise: Business Continuity Scenarios that Work Solutions Brief The Always-on Enterprise: Business Continuity Scenarios that Work How mobility solutions from Citrix, Google and Samsung ensure continuous productivity. Business continuity keeps CIOs up

More information

What s Missing from Your BYOD Strategy?

What s Missing from Your BYOD Strategy? White Paper What s Missing from Your BYOD Strategy? for BYOD, CYOD or COPE In the early days of mobility, companies rushed to embrace bring-your-own-device (BYOD) programs, which allowed employees to use

More information

ShareFile for enterprises

ShareFile for enterprises Product Overview ShareFile for enterprises Secure, sync and share enterprise files everywhere ShareFile is a secure enterprise file sync and sharing service that meets the mobility and collaboration needs

More information

Bring-Your-Own-Device Freedom

Bring-Your-Own-Device Freedom Bring-Your-Own-Device Freedom Solutions for federal, state, and local governments Increasingly, IT organizations in federal, state, and local agencies are embracing consumerization with the understanding

More information

White Paper. Securing Mobile Applications and Data with Citrix XenMobile EMM. citrix.com

White Paper. Securing Mobile Applications and Data with Citrix XenMobile EMM. citrix.com White Paper Securing Mobile Applications and Data with Citrix XenMobile EMM As enterprises transition from corporate owned and managed laptops, tablets and smartphones to Bring Your Own Device (BYOD) and

More information

Citrix desktop virtualization and Microsoft System Center 2012: better together

Citrix desktop virtualization and Microsoft System Center 2012: better together Citrix desktop virtualization and Microsoft System Center 2012: better together 2 Delivery of applications and data to users is an integral part of IT services today. But delivery can t happen without

More information

Top Three Reasons to Deliver Web Apps with App Virtualization

Top Three Reasons to Deliver Web Apps with App Virtualization Top Three Reasons to Deliver Web Apps with App Virtualization Improve manageability, security and performance for browser-based apps. Web browsers can cause many of the same headaches as any other Windows

More information

ShareFile Enterprise technical overview

ShareFile Enterprise technical overview Overview Guide ShareFile Enterprise technical overview Secure data sync and sharing services ShareFile empowers users to securely share files with anyone and to sync files across all of their devices The

More information

10 Essential Elements for a Secure Enterprise Mobility Strategy

10 Essential Elements for a Secure Enterprise Mobility Strategy 10 Essential Elements for a Secure Enterprise Mobility Strategy Best practices for protecting sensitive business information while making people productive from anywhere Mobility and bring-your-own device

More information

Bring your own device freedom

Bring your own device freedom Bring your own device freedom BYOD solutions for federal government enterprises The Digital Government Strategy, issued by Federal Chief Information Officer (CIO) Steven VanRoekel on May 23, 2012, called

More information

Citrix Lifecycle Management

Citrix Lifecycle Management Citrix Lifecycle Management Comprehensive cloud-based service lifecycle management solution IT administrators are realizing that application deployments are getting more complex and error-prone than ever

More information

Design and deliver cloudbased apps and data for flexible, on-demand IT

Design and deliver cloudbased apps and data for flexible, on-demand IT Design and deliver cloudbased apps and data for flexible, on-demand IT Discover the fastest and easiest way for IT to enable business productivity using cloud-based management and delivery of complete

More information

Citrix Solutions. Overview

Citrix Solutions. Overview Citrix Solutions Citrix solutions empower people to work and collaborate from anywhere, securely accessing apps and data on any of the latest devices, as easily as they would in their own office. As work

More information

Secure remote access

Secure remote access Secure remote access Technical Solutions Brief Secure remote access Simple, secure access to apps and desktops from anywhere. Secure remote access Technical Solutions Brief 2 Today s fast-paced business

More information

White Paper. The Value Add of Citrix Enterprise Mobility Management over App Configuration for the Enterprise. citrix.com

White Paper. The Value Add of Citrix Enterprise Mobility Management over App Configuration for the Enterprise. citrix.com White Paper The Value Add of Citrix Enterprise Mobility Management over App Configuration for the Enterprise citrix.com App Configuration for Enterprise (ACE) was introduced by AirWatch. AirWatch describes

More information

Powering real-time mobile access to critical information with ShareFile

Powering real-time mobile access to critical information with ShareFile Powering real-time mobile access to critical information with ShareFile An enterprise file sync and sharing solution built for the needs of the energy, oil and gas industry to provide employee and third-party

More information

Maximizing Flexibility and Productivity for Mobile MacBook Users

Maximizing Flexibility and Productivity for Mobile MacBook Users Citrix DesktopPlayer for Mac White Paper Maximizing Flexibility and Productivity for Mobile MacBook Users Windows virtual desktops to go for corporate and BYO Macs 2 Executive Overview The popularity of

More information

Citrix ShareFile Enterprise: a technical overview citrix.com

Citrix ShareFile Enterprise: a technical overview citrix.com Citrix ShareFile Enterprise: a technical overview White Paper Citrix ShareFile Enterprise: a technical overview 2 The role of IT organizations is changing rapidly as the forces of consumerization pose

More information

Desktop virtualization for all

Desktop virtualization for all Desktop virtualization for all 2 Desktop virtualization for all Today s organizations encompass a diverse range of users, from road warriors using laptops and mobile devices as well as power users working

More information

Microsoft Dynamics CRM 2015 with NetScaler for Global Server Load Balancing

Microsoft Dynamics CRM 2015 with NetScaler for Global Server Load Balancing Microsoft Dynamics CRM 2015 with NetScaler for Global Server Load Balancing Solution Guide This solution guide focuses on defining the deployment process for Microsoft Dynamics CRM with Citrix NetScaler.

More information

A Secure, IT-approved Alternative to Personal File Sharing Services in the Enterprise

A Secure, IT-approved Alternative to Personal File Sharing Services in the Enterprise A Secure, IT-approved Alternative to Personal File Sharing Services in the Enterprise Protect business data. Gain secure IT oversight. Provide single point of access to enterprise data for mobile workforces.

More information

Desktop virtualization for all

Desktop virtualization for all Desktop virtualization for all 2 Desktop virtualization for all Today s organizations encompass a diverse range of users, from road warriors using laptops and mobile devices as well as power users working

More information

Mobile app containers with Citrix MDX

Mobile app containers with Citrix MDX Mobile app containers with Citrix MDX 2 Enterprises of every size and across every industry have made mobility an important IT initiative. While most mobility strategies started with mobile device management

More information

Safeguard Protected Health Information With Citrix ShareFile

Safeguard Protected Health Information With Citrix ShareFile Safeguard Protected Health Information With Citrix ShareFile This enterprise file sync and sharing solution supports HIPAA compliance, boosts security and mobilizes data access Citrix ShareFile helps healthcare

More information

Effective hosted desktops

Effective hosted desktops Effective hosted desktops HP ConvergedSystem 100 for Hosted Desktops with Citrix XenDesktop 2 Driven by strong adoption of mobility technology, effective desktop and application virtualization, hosted

More information

Provisioning ShareFile on Microsoft Azure Storage

Provisioning ShareFile on Microsoft Azure Storage ShareFile StorageZones Provisioning ShareFile on Microsoft Azure Storage This document provides a technical overview of how ShareFile can be provisioned on customermanaged, Microsoft Azure cloud storage

More information

The falling cost and rising value of desktop virtualization

The falling cost and rising value of desktop virtualization The falling cost and rising value of desktop virtualization 2 The growing strategic value of desktop virtualization, from a more flexible, productive workforce to lower real estate costs, has made it a

More information

Deploying NetScaler Gateway in ICA Proxy Mode

Deploying NetScaler Gateway in ICA Proxy Mode Deploying NetScaler Gateway in ICA Proxy Mode Deployment Guide This deployment guide defines the configuration required for using the NetScaler Gateway in ICA Proxy Mode. Table of Contents Introduction

More information

Defend hidden mobile web properties

Defend hidden mobile web properties Defend hidden mobile web properties Is your mobile micro app concealing a complex web property? 2 We ve all used mobile micro apps to check the weather, stocks and news or to interact via social media

More information

MDM and beyond: Rethinking mobile security in a BYOD world

MDM and beyond: Rethinking mobile security in a BYOD world MDM and beyond: Rethinking mobile security in a BYOD world 2013 Citrix and TechTarget Table of Contents Summary.... 3 Introduction... 3 Current business challenges with BYOD... 4 Securing mobile devices

More information

Citrix Enterprise Mobility Report

Citrix Enterprise Mobility Report Citrix Enterprise Mobility Report Plus 5 Steps to Building an Enterprise Mobility Strategy A survey of 510 IT Directors, CIOs, and Architects on the state of mobile applications, data, and devices in the

More information

Mobility and cloud transform access and delivery of apps, desktops and data

Mobility and cloud transform access and delivery of apps, desktops and data Mobility and cloud transform access and delivery of apps, desktops and data Unified app stores and delivery of all apps (Windows, web, SaaS and mobile) and data to any device, anywhere. 2 The cloud transforms

More information

Windows XP Application Migration Checklist

Windows XP Application Migration Checklist Windows XP Application Migration Checklist Accelerate XP migration planning 2 Whether just beginning a Microsoft Windows XP application migration project or moving forward on an existing project, it s

More information

VDI and Beyond: Addressing Top IT Challenges to Drive Agility and Growth

VDI and Beyond: Addressing Top IT Challenges to Drive Agility and Growth VDI and Beyond: Addressing Top IT Challenges to Drive Agility and Growth Citrix XenDesktop with FlexCast mobilizes the modern workforce App and Desktop virtualization can be a powerful driver of business

More information

Solutions Guide. Deploying Citrix NetScaler with Microsoft Exchange 2013 for GSLB. citrix.com

Solutions Guide. Deploying Citrix NetScaler with Microsoft Exchange 2013 for GSLB. citrix.com Deploying Citrix NetScaler with Microsoft Exchange 2013 for GSLB Table of Contents Introduction 3 Overview of Microsoft Exchange 2013 3 Why NetScaler GSLB for Exchange 2013? 3 Topology 3 Single Namespace

More information

Citrix NetScaler and Microsoft SharePoint 2013 Hybrid Deployment Guide

Citrix NetScaler and Microsoft SharePoint 2013 Hybrid Deployment Guide Citrix NetScaler and Microsoft SharePoint 2013 Hybrid Deployment Guide 2013 Deployment Guide Table of Contents Overview 3 SharePoint Hybrid Deployment Overview 3 Workflow 4 Step by Step Configuration on

More information

Taking Windows Mobile on Any Device

Taking Windows Mobile on Any Device Taking Windows Mobile on Any Device As the adoption of mobile devices continues to expand, IT organizations are challenged to keep up with the mobile demands of today s fast-paced workforce and at the

More information

Delivering Business Value Through Mobility

Delivering Business Value Through Mobility Delivering Business Value Through Mobility Secure Mobility Drive Productivity Mobilize Business 1999-2015 Citrix Systems, Inc. All Rights Reserved. Companies are realizing that mobility can deliver value

More information

Modernize your business with Citrix XenApp 7.6

Modernize your business with Citrix XenApp 7.6 Modernize your business with Citrix XenApp 7.6 Avoid non-compliance issues and keep your business running smoothly by upgrading your SAP environment to run on top of the latest Citrix and Microsoft technologies

More information

Advanced Service Desk Security

Advanced Service Desk Security Advanced Service Desk Security Robust end-to-end security measures have been built into the GoToAssist Service Desk architecture to ensure the privacy and integrity of all data. gotoassist.com Many service

More information

Solutions Brief. Citrix Solutions for Healthcare and HIPAA Compliance. citrix.com/healthcare

Solutions Brief. Citrix Solutions for Healthcare and HIPAA Compliance. citrix.com/healthcare Solutions Brief Citrix Solutions for Healthcare and HIPAA Compliance citrix.com/healthcare While most people are well aware of the repercussions of losing personal or organizational data from identity

More information

White Paper. Workplace transformation: Unleash innovation and lower costs with new technologies and work environments. citrix.com

White Paper. Workplace transformation: Unleash innovation and lower costs with new technologies and work environments. citrix.com Workplace transformation: Unleash innovation and lower costs with new technologies and work environments It matters where and how people work. As companies seek new ways to drive competitive advantage,

More information

Solutions Guide. Deploying Citrix NetScaler for Global Server Load Balancing of Microsoft Lync 2013. citrix.com

Solutions Guide. Deploying Citrix NetScaler for Global Server Load Balancing of Microsoft Lync 2013. citrix.com Solutions Guide Deploying Citrix NetScaler for Global Server Load Balancing of Microsoft Lync 2013 Table of Contents Introduction 3 Overview of Microsoft Lync 2013 3 Why NetScaler GSLB Solution for Lync

More information

RSA Adaptive Authentication and Citrix NetScaler SDX Platform Overview

RSA Adaptive Authentication and Citrix NetScaler SDX Platform Overview RSA Adaptive Authentication and Citrix NetScaler SDX Platform Overview 2 RSA and Citrix have a long history of partnership based upon integration between RSA Adaptive Authentication and Citrix NetScaler

More information

Five Reasons Why Customers Choose Citrix XenMobile Over the Competition

Five Reasons Why Customers Choose Citrix XenMobile Over the Competition Five Reasons Why Customers Choose Citrix Over the Competition wins head-to-head on key enterprise mobility management criteria When it comes to the most important criteria for enterprise mobility management

More information

Fullerton India enhances its employee productivity and efficiency with Citrix XenDesktop

Fullerton India enhances its employee productivity and efficiency with Citrix XenDesktop Fullerton India enhances its employee productivity and efficiency with Citrix XenDesktop 2 As a result of implementing Citrix XenDesktop, the number of our help desk tickets has fallen significantly. The

More information

icrosoft TMG Replacement with NetScaler

icrosoft TMG Replacement with NetScaler icrosoft TMG Replacement with NetScaler Replacing Microsoft Forefront TMG with NetScaler for secure VPN access Table of contents Introduction 3 Configuration details 3 NetScaler features to be enabled

More information

XenMobile Technology Overview

XenMobile Technology Overview XenMobile Technology Overview Mobility is a top priority for organizations. Why? Because more employees than ever before are demanding access to the apps and data that will make them productive on the

More information

The top 5 truths behind what the cloud is not

The top 5 truths behind what the cloud is not Citrix Cloud Solutions White Paper The top 5 truths behind what the cloud is not Separating the noise of what cloud is and what it s not 2 It s clear that the cloud represents the biggest technology disruption

More information

How To Use Netscaler As An Afs Proxy

How To Use Netscaler As An Afs Proxy Deployment Guide Guide to Deploying NetScaler as an Active Directory Federation Services Proxy Enabling seamless authentication for Office 365 use cases Table of Contents Introduction 3 ADFS proxy deployment

More information

Deploying XenApp on a Microsoft Azure cloud

Deploying XenApp on a Microsoft Azure cloud Deploying XenApp on a Microsoft Azure cloud The scalability and economics of XenApp services on-demand citrix.com Given business dynamics seasonal peaks, mergers, acquisitions, and changing business priorities

More information

Guide to Deploying Microsoft Exchange 2013 with Citrix NetScaler

Guide to Deploying Microsoft Exchange 2013 with Citrix NetScaler Deployment Guide Guide to Deploying Microsoft Exchange 2013 with Citrix NetScaler Extensive guide covering details of NetScaler ADC deployment with Microsoft Exchange 2013. Table of Contents Introduction

More information

Supporting your mobile workers

Supporting your mobile workers White Paper Supporting your mobile workers How HR can help employees and managers get the most from their digital workplace Workshifting, flexworking, smart working whatever it is called, working 9-5 at

More information

Run Skype for Business as a Secure Virtual App with a Great User Experience

Run Skype for Business as a Secure Virtual App with a Great User Experience Run Skype for Business as a Secure Virtual App with a Great User Experience Improve security and manageability while avoiding the performance problems of traditional virtual installations. Deliver secure,

More information

Subscriber Engagement Suite

Subscriber Engagement Suite Subscriber Engagement Suite 2 The ByteMobile Subscriber Engagement Suite (SES) gives operators new opportunities to enhance their value in the mobile network value chain, allowing them to actively engage

More information

The 10 musthaves for secure. enterprise mobility

The 10 musthaves for secure. enterprise mobility 10 must-haves for secure enterprise mobility White Paper The 10 musthaves for secure enterprise mobility A security framework and evaluators checklist 2 Becoming a mobile enterprise means new opportunities

More information

Trend Micro InterScan Web Security and Citrix NetScaler SDX Platform Overview

Trend Micro InterScan Web Security and Citrix NetScaler SDX Platform Overview Trend Micro InterScan Web Security and Citrix NetScaler SDX Platform Overview 2 Trend Micro and Citrix have a long history of partnership based upon integration between InterScan Web Security and Citrix

More information

Solutions Brief. A tale of three universities: Increasing access, engagement and learning. citrix.com/education

Solutions Brief. A tale of three universities: Increasing access, engagement and learning. citrix.com/education A tale of three universities: Increasing access, Three universities collaborated and designed a mobility strategy utilizing Citrix solutions to modernize their IT platforms and they are transforming the

More information

Best practices to enable clinician mobility for patientcentered

Best practices to enable clinician mobility for patientcentered Best practices to enable clinician mobility for patientcentered healthcare Strategies, solutions and realworld examples for transforming healthcare IT without sacrificing security or compliance. 2 Mobility

More information

Solution Guide for Citrix NetScaler and Cisco APIC EM

Solution Guide for Citrix NetScaler and Cisco APIC EM Solution Guide for Citrix NetScaler and Cisco APIC EM Orchestrating Network QoS policy for delivering enhanced video experience to XenDesktop users Table of contents Solution Overview 3 Executive Summary

More information

Secure remote access

Secure remote access Simple, secure access to apps and desktops from anywhere Today s fast-paced business world requires IT organizations to supply tools that allow employees to quickly react to the demands of a competitive

More information

Citrix Workspace Cloud Apps and Desktop Service with an on-premises Resource Reference Architecture

Citrix Workspace Cloud Apps and Desktop Service with an on-premises Resource Reference Architecture Citrix Workspace Cloud Apps and Desktop Service with an on-premises Resource Reference Architecture Produced by Citrix Solutions Lab This guide walks you through an example of how to use Citrix Workspace

More information

Redefining IT for federal healthcare agencies

Redefining IT for federal healthcare agencies Redefining IT for federal healthcare agencies Redefining IT for federal healthcare agencies Virtualization solutions for clinicians and patients: Anytime, anywhere, on any device Executive summary These

More information

Guidelines for deploying Citrix BYOD solutions

Guidelines for deploying Citrix BYOD solutions Guidelines for deploying Citrix BYOD solutions 2 IT organizations are being challenged as we transition from the PC era to the cloud era because the rules and assumptions have changed. Consumerization

More information

Citrix Support and Maintenance Services

Citrix Support and Maintenance Services Citrix Support and Maintenance Services Optimize your Citrix software and hardware investment throughout its lifecycle Comprehensive support and maintenance services are essential to ensure high availability

More information

NetScaler: A comprehensive replacement for Microsoft Forefront Threat Management Gateway

NetScaler: A comprehensive replacement for Microsoft Forefront Threat Management Gateway NetScaler: A comprehensive replacement for Microsoft Forefront Threat Management Gateway 2 Microsoft s Forefront Threat Management Gateway (TMG) is a network security and protection solution for enterprise

More information

MOBILITY MANAGEMENT SELECTION GUIDE

MOBILITY MANAGEMENT SELECTION GUIDE MOBILITY MANAGEMENT SELECTION GUIDE A range of use cases are emerging for enterprise mobility and IT pros are under the gun to support them while adhering to corporate security standards. To do so, they

More information

Microsoft SharePoint 2013 with Citrix NetScaler

Microsoft SharePoint 2013 with Citrix NetScaler Deployment Guide Microsoft SharePoint 2013 with Citrix NetScaler Deployment Guide citrix.com Table of contents Introduction 3 NetScaler value-add to SharePoint 4 Product versions and prerequisites 4 Deploying

More information

Building success in the cloud

Building success in the cloud Building success in the cloud Citrix customers are recognized in the Gartner Magic Quadrant for Public Cloud Infrastructure-as-a-Service. 2 Cloud computing is the biggest technology disruption in decades

More information

Secure SSL, Fast SSL

Secure SSL, Fast SSL Citrix NetScaler and Thales nshield work together to protect encryption keys and accelerate SSL traffic With growing use of cloud-based, virtual, and multi-tenant services, customers want to utilize virtual

More information

BlueCat Networks Adonis and Proteus on Citrix NetScaler SDX Platform Overview

BlueCat Networks Adonis and Proteus on Citrix NetScaler SDX Platform Overview BlueCat Networks Adonis and Proteus on Citrix NetScaler SDX Platform Overview 2 The BlueCat Networks and Citrix partnership is based upon integration between BlueCat Networks DNS, DHCP and IP Address Management

More information

Trend Micro Cloud Security for Citrix CloudPlatform

Trend Micro Cloud Security for Citrix CloudPlatform Trend Micro Cloud Security for Citrix CloudPlatform Proven Security Solutions for Public, Private and Hybrid Clouds 2 Trend Micro Provides Security for Citrix CloudPlatform Organizations today are embracing

More information

Citrix Enterprise Mobility more than just device management (MDM)

Citrix Enterprise Mobility more than just device management (MDM) Citrix Enterprise Mobility more than just device management (MDM) Fabian.Kienle@citrix.com Manager, Channel Readiness Central Europe The only reason why IT exists: APPLICATIONS! 3 The reality: Customer

More information

Safeguard protected health information with ShareFile

Safeguard protected health information with ShareFile Solutions Brief Safeguard protected health information with ShareFile This enterprise file sync and sharing solution supports HIPAA compliance, boosts security and mobilizes data access ShareFile helps

More information

Get the Most from Your EMM Deployment with Secure File Sharing

Get the Most from Your EMM Deployment with Secure File Sharing White Paper Get the Most from Your EMM Deployment with Secure File Sharing A comprehensive overview of 10 popular use cases Citrix XenMobile and Citrix ShareFile deliver the most complete enterprise mobility

More information

Citrix XenDesktop with FlexCast technology. Citrix XenDesktop: Desktop Virtualization For All. www.citrix.com

Citrix XenDesktop with FlexCast technology. Citrix XenDesktop: Desktop Virtualization For All. www.citrix.com Citrix XenDesktop with FlexCast technology White Paper Citrix XenDesktop: Desktop Virtualization For All www.citrix.com Today s organizations encompass a diverse range of users, from road warriors using

More information

SECURING TODAY S MOBILE WORKFORCE

SECURING TODAY S MOBILE WORKFORCE WHITE PAPER SECURING TODAY S MOBILE WORKFORCE Connect, Secure, and Manage Mobile Devices and Users with Junos Pulse and the Junos Pulse Mobile Security Suite Copyright 2011, Juniper Networks, Inc. Table

More information

Enterprise Mobility Management: To Improve Clinician Workflows and Patient Outcomes, Think Beyond the Device

Enterprise Mobility Management: To Improve Clinician Workflows and Patient Outcomes, Think Beyond the Device White Paper Enterprise Mobility Management: To Improve Clinician Workflows and Patient Outcomes, Think Beyond the Device Enable better care with a solution that harnesses the full potential of mobile devices

More information

Hosted Workspaces Demo Guide for Citrix Service Provider Partners

Hosted Workspaces Demo Guide for Citrix Service Provider Partners Hosted Workspaces Demo Guide for Citrix Service Provider Partners Deliver a great hosted workspaces customer demo that includes Desktops-as-a-Service, virtual applications, file sharing and sync and Mobile

More information

The complete solution for enabling BYO. www.citrix.com

The complete solution for enabling BYO. www.citrix.com The complete solution for enabling BYO Solution Brief The complete solution for enabling BYO www.citrix.com Companies of all sizes are witnessing a transformation in the types of devices entering the workplace,

More information

Citrix Enterprise Mobility Management Solutions

Citrix Enterprise Mobility Management Solutions Citrix Enterprise Mobility Management Solutions Achi Lewis achi.lewis@citrix.com Regional Manager UK&I XenMobile EMEA How Mobile Feels Today User Needs Freedom to access all their apps and data from any

More information

Remote access to enterprise PCs

Remote access to enterprise PCs Remote access to enterprise PCs About FlexCast Services Design Guides Citrix FlexCast Services Design Guides provide an overview of a validated architecture based on many common scenarios. Each design

More information

Single Sign On for ShareFile with NetScaler. Deployment Guide

Single Sign On for ShareFile with NetScaler. Deployment Guide Single Sign On for ShareFile with NetScaler Deployment Guide This deployment guide focuses on defining the process for enabling Single Sign On into Citrix ShareFile with Citrix NetScaler. Table of Contents

More information

Citrix XenMobile technology overview

Citrix XenMobile technology overview Citrix XenMobile technology overview 2 The bring your own (BYO) device movement, the proliferation of smartphones in the workplace, and enterprise tablet initiatives have made mobility a top priority among

More information