12. Š 2014 Citrix | Confidential â Do Not Distribute
Collaboration
& Sharing
Access &
Data Security
App & Desktop
Virtualization
Enterprise Mobility
Management
App Networking &
Cloud Orchestration
13. Š 2014 Citrix | Confidential â Do Not DistributeŠ 2013 Citrix | Confidential â Do Not Distribute
Tablets expected to soon
overtake PC sales*
3+ devices per employee
1.5 M Android devices
activated daily
BYOD
Revolution
* IDC, 2013
14. Š 2014 Citrix | Confidential â Do Not Distribute
Mobility vs. Security
⢠Too many ways to lose data on mobile
devices
⢠Mobile networks becoming the norm vs.
WAN
⢠Data too big to move
⢠Confidentiality, compliance and IP
protection more complex
*Wireless Intelligence report, 1, 2013
15. Š 2014 Citrix | Confidential â Do Not Distribute
Infinite Complexity of Management
Across apps, devices and locations
16. Š 2014 Citrix | Confidential â Do Not Distribute
16
Business Concerns
Device
Configuration
App
Configuration
and Delivery
Content Support
End User Experience
Security, Integration, Vendor Consolidation, Value on Investment
17. Š 2014 Citrix | Confidential â Do Not Distribute
17
XenMobile Enterprise
The Citrix Solution
Device
Configuration
XenMobile
MDM
App
Configuration
and Delivery
XenMobile
MAM
Content
XenMobile
ShareFile
Support
Remote
Support and
GoToAssist
Integrate and Leverage Existing Citrix Investment
Enable User Productivity While Maintaining Security
18. Š 2014 Citrix | Confidential â Do Not Distribute
Citrix â The Most Complete Mobile Portfolio
Any app, any device, anywhere
Mobile ROI
Mobile Device
Management
Sandboxed
Mail and Web
Mobile
App Security
Secure Mobile
Data Sharing
Mobile
Network Control
SSO & Identity
Management
Desktop & App
Virtualization
Social & Web
Collaboration
19. Š 2014 Citrix | Confidential â Do Not Distribute
MobileROI
Device
Management
Sandboxed mail
and web
Mobile network
control
Mobile app
security
MDM Enterprise Mobility Management
Citrix - The Most Comprehensive Solution
SSO &
Id Mgmt
Secure data
control
Desktop & App
Virtualization
Collaboration
GoToMeeting
GoToAssist
Podio
MDM Edition Enterprise
Citrix â Competitive Position
20. Š 2014 Citrix | Confidential â Do Not Distribute
Recognized as a âLeaderâ by Gartner; Winner at Interop
Magic Quadrant Critical Capabilities
Source: Gartner report, Magic Quadrant for Mobile Device Management Software, May 23, 2013, Phillip Redman, John Girard, Terrence Cosgrove, Monica Basso
Source: Gartner report, Critical Capabilities for Mobile Device Management Software, May 23, 2013, Phillip Redman
Š 2013 Gartner, Inc. and/or its affiliates. All rights reserved. Gartner is a registered trademark of Gartner, Inc. or its affiliates. For more information, e-mail info@gartner.com or visit gartner.com. Used with permission.
21. Š 2014 Citrix | Confidential â Do Not Distribute
Mobile, Simple, Secure
22. Š 2014 Citrix | Confidential â Do Not Distribute
What Do We Know?
23. Š 2014 Citrix | Confidential â Do Not Distribute
Entire desktopJust the apps
Windows apps and data secured and
delivered⌠Within a virtual desktop
Optimized for:
⢠Large Screen Footprint - Multi-window
⢠Keyboard and mouse
⢠Persistent workspace
Windows apps and data secured and
deliveredâŚ
Optimized for:
⢠Smaller screen, mobile
⢠Touch interface
⢠Non-persistent workspace
Apps and Desktops with Ease
Seamless Transitions
24. Š 2014 Citrix | Confidential â Do Not Distribute
Central or local execution
FlexCast delivery technology
Physical PCs
Apps and Desktops
HDX 3D Pro-enabled
workstations or Remote
PC access technology
Central Management
Image management | Application management | User data profiles | Access policies
Central Execution Local Execution
Hosted VDI
Apps and desktops
Dedicated or pooled
desktop virtual
machines
Hosted Shared
Apps and Desktops
Windows Server
session-based desktop
or apps
Local Hypervisor
Desktops
Type 1 Hypervisor for
PCs and Laptops with
XenClient
Synchronizer
25. Š 2014 Citrix | Confidential â Do Not Distribute
Desktops and Apps as-a-Service
26. Š 2014 Citrix | Confidential â Do Not Distribute
XenDesktop 7
Single Site
Director 2.1
Site A Site B Site C
Help Desk and Troubleshooting / Environment health
Director
27. Š 2014 Citrix | Confidential â Do Not Distribute
EdgeSight Performance management
Director and EdgeSight
XenDesktop 7
Site A Site B Site C
Director
Historical Trends and Analytics
Managing and optimizing capacity
TM
TM
TM
28. Š 2014 Citrix | Confidential â Do Not Distribute
EdgeSight Network analysis
Director and EdgeSight
XenDesktop 7
Site A Site B Site C
HDX Insight
Isolating and managing network performance
Network - Deep Packet Analysis
TM
TM
29. Š 2014 Citrix | Confidential â Do Not Distribute
Letâs Go Mobile!
30. Š 2014 Citrix | Confidential â Do Not Distribute
ShareFile
⢠SSO to all MDX apps
⢠User support for MDX apps
⢠Integrated email, contacts and calendar
⢠Designed for work
⢠Internet and intranet browsing
⢠Supports file download
⢠All your files available anywhere
⢠Sharing integrated into other MDX apps
WorxMail
WorxWeb
WorxHome
31. Š 2014 Citrix | Confidential â Do Not Distribute
System Overview
Access Gateway
App Controller
Device Manager
ShareFile
WorxStore
StorageZone
ShareFile
ControlPlane
XenMobile
Enterprise
32. Š 2014 Citrix | Confidential â Do Not Distribute
User authorization required
Mobile device access
Allow local storage
Offline access allowed
Restrict document sharing
Printing allowed
Edit data
SmartAccess
Policy Controls
34. Š 2014 Citrix | Confidential â Do Not Distribute
Unified Corporate App Store
⢠Available on 3B+ devices
⢠Mobile apps native on device
⢠Seamless delivery of Windows,
datacenter and web apps
⢠Any device â smartphone, tablet,
PC and Mac
35. Š 2014 Citrix | Confidential â Do Not Distribute
Authentication
Authentication and SSO
⢠Strongly authenticates users
o NetScaler Gateway is primary authentication point
o Permits combinations of AD credentials with certificates,
tokens, and other second factors
⢠Registers devices to users
o Permits lock and wipe of corporate data/apps on selected
devices
⢠Serves as access manager for MDX managed apps
o Strongly identifies managed apps
o Determines app entitlements and policies for authenticated
users
o Brokers permitted data exchanges between managed apps
WorxHome
36. Š 2014 Citrix | Confidential â Do Not Distribute
Single Sign-On
Authentication and SSO
⢠SSO for all managed apps
o Hosted HDX apps and desktops
o Web/SaaS apps
o MDX managed mobile apps
ď§ Various online and offline modes selected by app policy
⢠MDX apps can use derived credentials
o Gateway tickets for micro-VPN access
o Automatic HTTP auth challenge responses
(NTLM today, Kerberos coming soon)
o Certificates for PKI protected web sites
o Specialty credentials eg
(SAML token for Sharefile access)
WorxHome
37.
38. Š 2014 Citrix | Confidential â Do Not Distribute
WorxMail
Mail, calendar, contacts
Enterprise class security
Beautiful native experience
Full inter-app integration
MDX-secured
⢠Secure email body and attachment
⢠âOpen inâ control to provide data leak
protection
⢠No Exchange server exposure to internet
⢠Send email with ShareFile attachments
⢠Integrated calendars and Exchange GAL
39. Š 2014 Citrix | Confidential â Do Not Distribute
Sandboxed Email, Calendar and Contacts App
⢠Secure email app with a great
user experience
⢠Attach files to emails and save
attachments
⢠Full calendar with access to
free/busy information
⢠Directly opens web links to any
site, including intranet sites
40. Š 2014 Citrix | Confidential â Do Not Distribute
Secure Document Sharing, Sync & Editing
⢠Both cloud and on-premises data
storage options
⢠Capable of accessing SharePoint
and network drives
⢠âOpen-inâ capabilities can be
restricted to other Worx-enabled
apps
41.
42. Š 2014 Citrix | Confidential â Do Not Distribute
WorxWeb
42
Secure browser
Internal web app access
Full inter-app integration
Consumer experience
MDX-secured
⢠iOS and Android device intranet web
browsing
o Easy access to SharePoint, Intranet Portal etc
⢠Similar look/ feel as native browser
o Safari on iOS; Chrome on Android
⢠Single sign-on via NetScaler
o Respond to HTTP 401
43. Š 2014 Citrix | Confidential â Do Not Distribute
Secure Mobile Web Browser
⢠Full-featured consumer-like
browser
⢠Secure access to internal,
external and HTML5 web apps
⢠URL whitelisting and blacklisting
⢠Access to enterprise resources
with a Micro VPN
44.
45. Š 2014 Citrix | Confidential â Do Not Distribute
ShareFile Platform
Storage Zones
Network Shares
SharePoint
ShareFile.com
46. Š 2014 Citrix | Confidential â Do Not Distribute
Follow-me data with ShareFile
⢠Enables file sharing with anyone
⢠Syncs data across all devices
⢠Online file sharing spaces for virtual teams
⢠Selective offline access on mobile devices
⢠Data protection
áľ Encryption
áľ Device lock
áľ Remote wipe
áľ Poison-pill
Secure
47. Š 2014 Citrix | Confidential â Do Not Distribute
ShareFile Enables Mobile Workstyles
⢠Access, share and sync files from any device
⢠Apps for mobile devices
⢠Mobile-optimized ShareFile web site
⢠Access data residing in existing network shares & SharePoint*
⢠Offline access and editing
⢠Built-in mobile editor for rich content editing on-the-go
⢠PDF annotation
48. Š 2014 Citrix | Confidential â Do Not Distribute
Mobile
content
editor for
Microsoft
Office
49. Š 2014 Citrix | Confidential â Do Not Distribute
Workflow Integration with Microsoft Outlook
Attachment
conversion
Unclog mail servers
Overcome
file size
restrictions
Better control
and visibility
Request large
files
50. Š 2014 Citrix | Confidential â Do Not Distribute
ShareFile with StorageZones
Citrix-managed StorageZone (AWS)
Customer-managed StorageZone (example)
⢠Choose where your data is stored
⢠Designated zones in public clouds
⢠Manage StorageZones on-premises
51. Š 2014 Citrix | Confidential â Do Not Distribute
On-Demand Sync
+
Data Optimized for Virtual Desktops
Instant access, share and sync Reduce storage costs
53. Š 2014 Citrix | Confidential â Do Not Distribute
AppApp App
MDX Technologies
⢠Encrypted local storage
⢠Micro (app specific) VPN
⢠App specific lock and wipe
⢠Inter-app communication
⢠Conditional access policies
⢠Federated identity and SSO
App
App PreparationTool
54. Š 2014 Citrix | Confidential â Do Not Distribute
Information Containment
⢠Control data exchange with other
apps and devices:
áľ Cut/Copy/Paste
áľ Document exchange (Open-In)
áľ Inter-app communications
áľ Network APIs
QuickLook EvernoteMail
Facebook OfficeHDBox
QuickLook OfficeHD
without containment with containment
What happens in MDX apps stays in MDX appsâŚ.
55. Š 2014 Citrix | Confidential â Do Not Distribute
Secure inter-app communication
⢠Restricted â Allow only trusted apps to
share data with one another
⢠Unrestricted â No controls, âOpen Inâ
shows all apps registered to handle that
file type
⢠Blocked â No way to share that appâs
data with anything else
app one app two
mobile OS
Open-In
56. Š 2014 Citrix | Confidential â Do Not Distribute
private data
CitrixReceiver
MDX InterApp
MDXVault
XenMobile
NativeMobile
Apps
ďžDeny SMS
ďžDisable iCloud
ďžDisable screenshots
ďžForce authentication
ďžBlock jailbroken device
MDXPolicies
duringapp
wrapping
app private
data vault
app private
data vault
57. Š 2014 Citrix | Confidential â Do Not Distribute
Enterprise-enable any mobile app with the
Worx App SDK
⢠Simple and powerful SDK
⢠Enabled through a single line of code
⢠Apps can be wrapped post-development
⢠Controls like:
áľ Data encryption
áľ Authentication
áľ Secure lock and wipe
áľ Inter-app policies
áľ Micro VPNs
Any app can be a Worx app
58. Š 2014 Citrix | Confidential â Do Not Distribute
App Behavior Restrictions
⢠Block mobile OS API sets and features
áľ Printing
áľ iCloud
áľ Email and SMS compose
áľ Inter-app URL dispatch and scheme handlers (iOS)
áľ Intent launch and content providers (Android)
⢠Block access to sensitive device hardware
áľ Camera, microphone, location services, etc.
⢠All controls are applied at run-time based on
app policies
59. Š 2014 Citrix | Confidential â Do Not Distribute
App Access Controls
⢠Block/permit app access based on policy
⢠User authentication (how and when)
áľ Online versus offline, re-authentication period,
max offline time
⢠Device security posture
áľ Jail-broken or rooted
áľ PIN/passcode enabled
áľ Hardware enforced encryption
áľ MDM enrolled vs unmanaged
⢠Network state
áľ Internal network or external
áľ Specific internal wifi networks
áľ Wifi Only
62. Š 2014 Citrix | Confidential â Do Not Distribute
XenMobile Infrastructure Dependencies
Network & Information Systems Infrastructure
CORE SERVICES:
Active Directory / LDAP
NTP, and DNS services ready
HOST NAMES:
Create FQDNâs for XenMobile Device
Manager & WorxHome VIP Addresses
FIREWALL RULES:
Configure for device connections &
XenMobile servers
(XDM, XAC, NetScaler)
IP Addresses:
(Public & Internal)
Must have the static IPâs mapped for
External NATs, NSIP, SNIPs, and VIPs
that are used by the NetScaler, XDM,
XAC and other services.
Server Environment:
Physical & Virtual (DMZ vs. Corporate
LAN placement of servers)
IT Security:
Internal PKI, external certificate
services, and Identity Management
services
63. Š 2014 Citrix | Confidential â Do Not Distribute
Create Base Policies
The Must Haves
âMagic 5â MDM Policies
⢠End-User Terms &
Conditions
⢠Device Passcode
⢠Software Inventory
(where allowed / privacy
concerns)
⢠Company WiFi (setup a
secure network)
⢠ActiveSync Mail
Regional or User/Device
Specific Policies
⢠Device Restrictions
⢠Location Services
⢠VPN
⢠PKI / User Identity
Certificates
⢠App Push
⢠App Store
⢠Device Platform Specific
(iOS 7, Samsung
SAFE/KNOX)
Worx App Policies
⢠Clipboard (Copy & Paste)
⢠Documents (Open In)
⢠Device Restrictions
⢠Login Security
⢠mVPN Tunneling vs. Open
Networking
⢠Network WiFi Control
64. Š 2014 Citrix | Confidential â Do Not Distribute
Citrix â The Most Complete Mobile Portfolio
Any app, any device, anywhere
Mobile ROI
Mobile Device
Management
Sandboxed
Mail and Web
Mobile
App Security
Secure Mobile
Data Sharing
Mobile
Network Control
SSO & Identity
Management
Desktop & App
Virtualization
Social & Web
Collaboration
65. Š 2014 Citrix | Confidential â Do Not Distribute
Mobile, Simple, Secure
66. Š 2014 Citrix | Confidential â Do Not Distribute
Questions?
â˘Todd Smith â Sales Engineering Manager
áľ Todd.smith2@citrix.com
â˘www.citrix.com
67. Š 2014 Citrix | Confidential â Do Not Distribute
Want something for Free?
⢠The Free 350 page soup-to-nuts 'How To: BYOD Project Volume 1' e-book
will teach you:
⢠How to install and configure Citrix DesktopPlayer for Mac 1.1, soup-to-nuts...
⢠How to install and configure Citrix XenClient Enterprise Synchronizer 5.1.1.
⢠How to install and configure Microsoft Windows Server 2012 R2
⢠How to install and configure Hyper-V for use with the Citrix Synchronizer.
⢠How to prepare the environment for installation.
⢠How to train end-users to use the new DesktopPlayer for Mac solutions.
⢠Detailed Citrix Synchronizer Policies section.
⢠Detailed Citrix Synchronizer administration tasks explained.
⢠Citrix Synchronizer backup and recovery explained.
⢠How to create & maintain Synchronizer virtual machines.
⢠350 pages of step-by-step, soup-to-nuts, and easy as 1,2,3!
⢠http://docs.dabcc.com