What s Missing from Your BYOD Strategy?

Similar documents
White Paper. Protecting Mobile Apps with Citrix XenMobile and MDX. citrix.com

Mobilize with Enterprise-Grade Security and a Great Experience

The Office Reinvented: Mobile Workspaces are the Future of Work

Enabling mobile workstyles with an end-to-end enterprise mobility management solution.

The fastest, most secure path to mobile employee productivity

Comprehensive Enterprise Mobile Management for ios 8

White Paper. Secure Mobile Collaboration with Citrix XenMobile and ShareFile. citrix.com

ShareFile for enterprises

The Always-on Enterprise: Business Continuity Scenarios that Work

White Paper. The Value Add of Citrix Enterprise Mobility Management over App Configuration for the Enterprise. citrix.com

Citrix Lifecycle Management

Secure Data Sharing in the Enterprise

Five Reasons Why Customers Choose Citrix XenMobile Over the Competition

Enterprise mobility management: Embracing BYOD through secure app and data delivery

Powering Real-Time Mobile Access to Critical Information With Citrix ShareFile

White Paper. Securing Mobile Applications and Data with Citrix XenMobile EMM. citrix.com

Powering real-time mobile access to critical information with ShareFile

10 Essential Elements for a Secure Enterprise Mobility Strategy

Design and deliver cloudbased apps and data for flexible, on-demand IT

Microsoft Dynamics CRM 2015 with NetScaler for Global Server Load Balancing

Enterprise- Grade MDM

Bring your own device freedom

Citrix Solutions. Overview

Modernize your business with Citrix XenApp 7.6

Safeguard Protected Health Information With Citrix ShareFile

Guide to Deploying Microsoft Exchange 2013 with Citrix NetScaler

Solution Guide for Citrix NetScaler and Cisco APIC EM

White Paper. Workplace transformation: Unleash innovation and lower costs with new technologies and work environments. citrix.com

Top Three Reasons to Deliver Web Apps with App Virtualization

Deploying NetScaler Gateway in ICA Proxy Mode

icrosoft TMG Replacement with NetScaler

Citrix NetScaler and Microsoft SharePoint 2013 Hybrid Deployment Guide

Mobile Application Management with XenMobile and the Worx App SDK

Citrix ShareFile Enterprise technical overview

Advanced Service Desk Security

Solutions Guide. Deploying Citrix NetScaler with Microsoft Exchange 2013 for GSLB. citrix.com

Single Sign On for ShareFile with NetScaler. Deployment Guide

Citrix Workspace Cloud Apps and Desktop Service with an on-premises Resource Reference Architecture

How To Get Cloud Services To Work For You

Trend Micro InterScan Web Security and Citrix NetScaler SDX Platform Overview

Maximizing Flexibility and Productivity for Mobile MacBook Users

ShareFile Enterprise technical overview

Solutions Guide. Deploying Citrix NetScaler for Global Server Load Balancing of Microsoft Lync citrix.com

Microsoft SharePoint 2013 with Citrix NetScaler

Citrix desktop virtualization and Microsoft System Center 2012: better together

Secure remote access

Mobility and cloud transform access and delivery of apps, desktops and data

Taking Windows Mobile on Any Device

Citrix ShareFile Enterprise: a technical overview citrix.com

How To Use Netscaler As An Afs Proxy

BlueCat Networks Adonis and Proteus on Citrix NetScaler SDX Platform Overview

Three ways companies are slashing IT costs with VDI

Securing Outlook Web Access (OWA) 2013 with NetScaler AppFirewall

Productive and Secure Enterprise Mobility with Cisco and Citrix

5 Reasons Why GoToAssist Remote Support and Service Desk Go Better Together

Using Vasco IDENTIKEY Server with NetScaler

Citrix Support and Maintenance Services

Cisco and Citrix: Building Application Centric, ADC-enabled Data Centers

A Secure, IT-approved Alternative to Personal File Sharing Services in the Enterprise

Optimizing service assurance for XenServer virtual infrastructures with Xangati

Solutions Brief. Citrix Solutions for Healthcare and HIPAA Compliance. citrix.com/healthcare

Solution Guide. Optimizing Microsoft SharePoint 2013 with Citrix NetScaler. citrix.com

The falling cost and rising value of desktop virtualization

Virtual desktops in hospitals: streamlining clinical workflows

MDM and beyond: Rethinking mobile security in a BYOD world

BlueCat IPAM, DNS and DHCP Solutions on Citrix NetScaler SDX Platform Overview

Run Skype for Business as a Secure Virtual App with a Great User Experience

Cisco and Citrix: Building Application Centric, ADC-enabled Data Centers

Fullerton India enhances its employee productivity and efficiency with Citrix XenDesktop

Trend Micro Cloud Security for Citrix CloudPlatform

Secure SSL, Fast SSL

Secure remote access

RSA Adaptive Authentication and Citrix NetScaler SDX Platform Overview

Configuring Citrix NetScaler for IBM WebSphere Application Services

The Trainer s Guide to Using Video Streaming, Video Conferencing and On-Demand Video

Data Center Consolidation for Federal Government

Desktop virtualization for all

Provisioning ShareFile on Microsoft Azure Storage

Deploying NetScaler with Microsoft Exchange 2016

Windows XP Application Migration Checklist

Websense Data Security Gateway and Citrix NetScaler SDX Platform Overview

Desktop virtualization for all

Mobile app containers with Citrix MDX

Ensure VoIP and Skype for Business Call Quality and Reliability with NetScaler SD-WAN

Solve the application visibility challenge with NetScaler Insight Center

Citrix Ready Solutions Brief. CA Single Sign-On and Citrix NetScaler: Quickly Adapt to Your Dynamic Authentication Demands. citrix.

Transcription:

White Paper What s Missing from Your BYOD Strategy? for BYOD, CYOD or COPE

In the early days of mobility, companies rushed to embrace bring-your-own-device (BYOD) programs, which allowed employees to use personal devices within the workplace. This helped attract a younger, more tech-savvy workforce that was comfortable working from anywhere. It also transferred basic IT problem solving and troubleshooting responsibilities to these millennial employees. Bring Your Own Device By offloading some device, management and data transfer costs to users, companies aimed to achieve significant cost savings and eliminate the need for IT to maintain a fleet of companyowned devices. Unfortunately, enterprise BYOD programs introduced complex, and often unexpected challenges that adopters struggled to overcome. BYOD Challenges The number and variety of devices quickly overwhelmed IT organizations, and grew beyond their ability to manage. Employees were suddenly consuming a vast number of unapproved applications from their mobile devices and using consumer apps for business purposes. This exposed company assets to external threats and in some cases compromised sensitive data. For many adopters, BYOD was the catalyst for a new form of shadow IT that put data integrity at risk, and left IT scrambling for management solutions. Base: 2,709 North American information workers from SMB and Enterprise companies Source: Foresights Workforce Employee Survey, Q4 2013. A recent study shows that, in an effort to be most productive, employees will use unsanctioned applications and services if not provided with comparable functionality from corporate IT. 2

Need for Management To maintain security and data integrity, IT organizations realized that all devices, both personal and company-owned, required the same level of management. To gain control over employee-owned devices, IT started to implement mobile device management (MDM) solutions along with their BYOD programs. MDM not only centralized device management, it gave IT the ability to perform remote configurations and updates, and easily deliver applications and data to mobile end points. MDM helped IT organizations overcome early BYOD challenges, such as onboarding and large-scale management. But at the same time, MDM-only solutions created new problems for both users and IT organizations. MDM Limitations MDM was instrumental in helping IT gain control, but its limitations have had a significant impact on user experience, privacy, security and cost efficiency. MDM also left IT struggling to manage non-compliant devices, such as those with forbidden apps or noncompliant passwords, or those missing company-mandated applications. Poor User Experience Some MDM solutions significantly impact battery performance, which can fundamentally restrict employee productivity. Others force users to type in corporate passwords for their own device, even to make personal calls or to access personal apps. Sometimes they are only given access to a limited number of business apps, which may be more secure, but are frustrating in practice. If a user temporarily misplaces their device or it falls out of compliance for example, they download unapproved apps or choose a non-compliant password IT can remotely wipe the entire device. Erasing corporate data may be important for security, but creates strong dissatisfaction for users when they lose personal data. Ultimately, BYOD users feel they are denied the autonomy that comes from owning and using a personal device within a work context. Privacy Concerns MDM gives IT complete visibility into data and applications, and draws no distinctions between a personal and corporate context, making employees vulnerable to corporate inspection and prying eyes. IT can use GPS capabilities to track users whereabouts even when they are offsite or off the clock. Some MDM solutions also enable website tracking. This helps IT enforce productivity, but it conveys the impression that Big Brother is watching at all times. After opting in to corporate BYOD programs and registering their devices, many users become concerned about privacy and control. Some simply choose not to register their devices at all, foregoing mobile access to company IT services and resources in order to ensure privacy. 3

Security Risks Hackers continue to find new attack vectors related to BYOD vulnerabilities. They are gaining access to mobile devices, then viewing unencrypted email attachments and data that is transmitted and stored by the device. Some employees even store passwords on their mobile device, providing hackers easy access to other corporate IT services. Many consumer mobile apps, such as storage and messaging applications, are purpose-built for sharing information, which creates problems in a more restrictive work environment. Similarly, corporate applications may inadvertently share data with insecure or compromised consumer apps. MDM provides security at the device level but does little to prevent this type of data loss since it does not control the application data itself. Companies are realizing that MDM doesn t solve their DropBox problem, where employees store and share sensitive corporate assets using consumer storage services, exposing them to external threats and obfuscating IT s ability to manage applications and data in a centralized, secure manner. MDM also lacks a mechanism to secure email attachments, which are often unencrypted and distributed across multiple mailboxes and mobile endpoints. Ballooning Costs Rather than reducing costs, some IT organizations are seeing their expenses increase with BYOD. A 2012 Dimension Data survey of telecommunications professionals in the U.S. found that 24% of enterprises that had adopted BYOD saw increased expenditures. For many of these IT organizations, MDM doesn t provide a cost-effective foundation for BYOD. Extra security solutions are required to deliver the right level of application and data protection, forcing IT to buy a complex array of point solutions that fail to centralize operations and result in ever-increasing costs. Additionally, new support requirements drive increased training expenses for security and help desk staff. MDM Is Not Enough MDM alone doesn t overcome the core BYOD challenges and it creates some new challenges of its own. As a result, more companies are choosing not to adopt BYOD. A 2014 CompTia survey found that as many as 51% of respondents at large companies were not doing BYOD at all. To completely embrace the mobile paradigm, IT must consider new approaches to device management and ownership. Beyond BYOD and MDM Companies are now doing two things to overcome BYOD and MDM limitations. They are adopting new device programs to address fundamental issues with BYOD, and they are shifting toward a new, comprehensive management approach more aligned with user expectations and enterprise requirements. 4

New Device Programs Choose your own device (CYOD) and company-owned/personally-enabled (COPE) programs are quickly gaining popularity within the enterprise. These programs are essentially the same thing. Instead of using personally owned devices, employees choose from a company-approved catalog. CYOD/COPE attempt to address core BYOD challenges, and on the surface they appear to make an ideal compromise between privacy and control. IT owns and controls the device and data but can allow users to use their personal apps and data within certain constraints. However, CYOD/COPE don t necessarily address user-experience issues. Adam Ely, Founder and COO of BlueBox, recently shared his insight on these shortcomings: The feeling of control that CYOD/COPE offers is an illusion. Even if organizations provide users with the newest and best devices, if they don t give users the freedom to choose and use their own, the users will simply bring their own. The result: shadow IT. The advantages of an enterprise BYOD or CYOD/COPE program can t be realized unless IT organizations move beyond MDM. Enterprise mobility management (EMM) is the key to managing personal devices in a corporate setting at scale without impacting user experience, and without inflating costs or introducing security risks. Regardless of which device management program an organization chooses, they need the additional benefits provided by an EMM solution Citrix XenMobile Citrix XenMobile is a complete EMM solution that combines MDM with mobile application management (MAM) and mobile content and data management. XenMobile helps companies overcome the challenges of any device ownership program including BYOD and CYOD/COPE. 5

User Satisfaction, Privacy and Productivity To meet expectations for BYOD and CYOD/COPE, IT must deliver a powerful, satisfying user experience without sacrificing control. This means keeping users happy and productive, while respecting their privacy. Based on industry-leading technology, XenMobile meets all these objectives and provides additional unique benefits: XenMobile app management can restrict IT visibility into the personal applications and content users have on their devices, as well as the Web sites they browse on personal time. Some EMM solutions divide the device into personal and enterprise workspaces and force users to switch between them constantly. Citrix XenMobile uses containerization to allow users to access secure enterprise mobile apps the same way they access their personal apps, by simply clicking on the application icon. XenMobile integration with XenDesktop gives users access to all their business apps mobile, Windows desktop, SaaS, Web, and more. User s can access all their business apps through Active Directory or by using a simple PIN. Either way, they also get single sign-on capabilities. The user self-service portal gives users full control over locking and wiping their devices in the event of theft or loss. GPS tracking can be turned off so users don t feel like they re being constantly watched. XenMobile also has minimal impact on mobile device battery performance. Consumer email and productivity apps have largely contributed to the poor BYOD experience. IT must provide easy-to-use options that also meet enterprise security requirements. Only XenMobile provides the most secure, integrated productivity apps that save users time and deliver an engaging experience. XenMobile productivity apps include: WorxMail provides push email, email prioritization, and file attachments for meeting invites; users can even join online meetings via GoToMeeting, Webex or Microsoft Lync directly from Worx Mail. WorxNotes provides a secure note taking and sharing app with email and calendar integration, as well as integration with Microsoft Outlook. WorxDesktop - lets users access their Windows desktops from their mobile devices, and provides access to files and apps on other devices. WorxEdit delivers a powerful Office document viewer and editor that allow users to edit and collaborate on documents, spreadsheets, and presentations. Worx App Gallery includes a breadth of third party Worx- enabled applications that Citrix customers can download. 6

Enterprise-Grade Protection When assessing device management programs, IT must provide and enforce the right security. XenMobile application management provides app-level protection, including FIPS compliant encryption, and DLP policies that prevent users from leaking sensitive information via cut-andpaste, printing, editing, forwarding or saving content to mobile devices. To achieve enterprise-grade protection across mobile end points, IT needs a secure alternative to email attachments. XenMobile users can eliminate vulnerabilities by including links to Citrix ShareFile a secure file share and synchronization tool that enables remote collaboration between users instead of attaching files to email. IT must also enable secure, user-friendly browsing experiences on a variety of mobile devices. WorxWeb a XenMobile business app provides a consumer-like mobile browser that gives users access to Internet and Intranet sites via secure, encrypted micro VPN s. Users can safely open links in WorxWeb on their mobile devices without compromising data. IT can also require that email attachments and web links sent from WorxWeb be replaced with links to ShareFile. Finally, IT must enable secure network connectivity for all mobile devices. Integration with Citrix Netscaler secures network access and provides micro-app VPN protection. Only XenMobile with NetScaler provides end-to-end secure data access and delivery protection by encrypting data on the device and over the air, and mitigating threats with a secure network gateway firewall. 7

Lower Mobility Costs Most enterprises anticipate cost savings when they adopt a BYOD program, but whether or not they succeed is highly dependent on the management solution they implement. Only Citrix delivers an integrated mobility solution combining EMM with file share and sync, a secure network access gateway, and secure delivery of mobile apps, Windows desktops, SaaS, and web apps. XenMobile includes the most securely integrated productivity apps for the enterprise, reducing operating costs and TCO. IT no longer needs to purchase and manage multiple mobility management products, which helps them eliminate siloed security operations and minimize training requirements. The scalable, highly available XenMobile architecture provides a futureproof platform for enterprises to grow their mobile business. Control Without Compromise Mobile device programs, including BYOD and CYOD/COPE, will continue to play an important role in enabling enterprise mobility, but success hinges on whether enterprises can look beyond MDM to EMM solutions. 8

XenMobile delivers the full breadth of EMM capabilities. In fact, only Citrix delivers a single integrated solution to manage BYOD and CYOD/COPE programs across all devices, mobile apps, desktops and desktop applications. This integrated approach helps IT further reduce costs by leveraging the same architecture, hardware and devices for end-to-end application and data delivery. XenMobile facilitates positive, engaging user experiences that improve productivity and help eliminate shadow IT, while ensuring employee privacy and providing enterprise-grade protection for corporate data and assets. Citrix XenMobile offers control without compromise something every device management program needs to succeed. With XenMobile, IT can overcome the challenges of BYOD and CYOD/ COPE to deliver a powerful, secure enterprise mobility experience. Corporate Headquarters Fort Lauderdale, FL, USA India Development Center Bangalore, India Latin America Headquarters Coral Gables, FL, USA Silicon Valley Headquarters Santa Clara, CA, USA Online Division Headquarters Santa Barbara, CA, USA UK Development Center Chalfont, United Kingdom EMEA Headquarters Schaffhausen, Switzerland Pacific Headquarters Hong Kong, China About Citrix Citrix (NASDAQ:CTXS) is leading the transition to software-defining the workplace, uniting virtualization, mobility management, networking and SaaS solutions to enable new ways for businesses and people to work better. Citrix solutions power business mobility through secure, mobile workspaces that provide people with instant access to apps, desktops, data and communications on any device, over any network and cloud. With annual revenue in 2014 of $3.14 billion, Citrix solutions are in use at more than 330,000 organizations and by over 100 million users globally. Learn more at www. Copyright 2015 Citrix Systems, Inc. All rights reserved. Citrix, XenMobile, WorxMail, GoToMeeting, WorxNotes, WorxDesktop, WorxEdit, ShareFile, WorxWeb, NetScaler are trademarks of Citrix Systems, Inc. and/or one of its subsidiaries, and may be registered in the U.S. and other countries. Other product and company names mentioned herein may be trademarks of their respective companies. 0315/PDF 9