Sprin VTUG citrix Solutions

  • 303 views
Uploaded on

 

More in: Technology
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Be the first to comment
    Be the first to like this
No Downloads

Views

Total Views
303
On Slideshare
0
From Embeds
0
Number of Embeds
1

Actions

Shares
Downloads
15
Comments
0
Likes
0

Embeds 0

No embeds

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
    No notes for slide

Transcript

  • 1. April 24, 2014 Taking Your Business, and Users, to the Cloud! VTUG: Spring Ahead 2014 Todd Smith – Citrix
  • 2. © 2014 Citrix | Confidential – Do Not Distribute
  • 3. © 2014 Citrix | Confidential – Do Not Distribute
  • 4. © 2014 Citrix | Confidential – Do Not Distribute
  • 5. © 2014 Citrix | Confidential – Do Not Distribute
  • 6. © 2014 Citrix | Confidential – Do Not Distribute
  • 7. © 2014 Citrix | Confidential – Do Not Distribute
  • 8. © 2014 Citrix | Confidential – Do Not Distribute
  • 9. © 2014 Citrix | Confidential – Do Not Distribute Workplace Redesign Mobile Workstyles Workforce Mobility Workflow Optimization
  • 10. © 2014 Citrix | Confidential – Do Not Distribute A Mobile Workstyle makes people happier and more productive
  • 11. © 2014 Citrix | Confidential – Do Not Distribute
  • 12. © 2014 Citrix | Confidential – Do Not Distribute Collaboration & Sharing Access & Data Security App & Desktop Virtualization Enterprise Mobility Management App Networking & Cloud Orchestration
  • 13. © 2014 Citrix | Confidential – Do Not Distribute© 2013 Citrix | Confidential – Do Not Distribute Tablets expected to soon overtake PC sales* 3+ devices per employee 1.5 M Android devices activated daily BYOD Revolution * IDC, 2013
  • 14. © 2014 Citrix | Confidential – Do Not Distribute Mobility vs. Security • Too many ways to lose data on mobile devices • Mobile networks becoming the norm vs. WAN • Data too big to move • Confidentiality, compliance and IP protection more complex *Wireless Intelligence report, 1, 2013
  • 15. © 2014 Citrix | Confidential – Do Not Distribute Infinite Complexity of Management Across apps, devices and locations
  • 16. © 2014 Citrix | Confidential – Do Not Distribute 16 Business Concerns Device Configuration App Configuration and Delivery Content Support End User Experience Security, Integration, Vendor Consolidation, Value on Investment
  • 17. © 2014 Citrix | Confidential – Do Not Distribute 17 XenMobile Enterprise The Citrix Solution Device Configuration XenMobile MDM App Configuration and Delivery XenMobile MAM Content XenMobile ShareFile Support Remote Support and GoToAssist Integrate and Leverage Existing Citrix Investment Enable User Productivity While Maintaining Security
  • 18. © 2014 Citrix | Confidential – Do Not Distribute Citrix – The Most Complete Mobile Portfolio Any app, any device, anywhere Mobile ROI Mobile Device Management Sandboxed Mail and Web Mobile App Security Secure Mobile Data Sharing Mobile Network Control SSO & Identity Management Desktop & App Virtualization Social & Web Collaboration
  • 19. © 2014 Citrix | Confidential – Do Not Distribute MobileROI Device Management Sandboxed mail and web Mobile network control Mobile app security MDM Enterprise Mobility Management Citrix - The Most Comprehensive Solution SSO & Id Mgmt Secure data control Desktop & App Virtualization Collaboration GoToMeeting GoToAssist Podio MDM Edition Enterprise Citrix – Competitive Position
  • 20. © 2014 Citrix | Confidential – Do Not Distribute Recognized as a “Leader” by Gartner; Winner at Interop Magic Quadrant Critical Capabilities Source: Gartner report, Magic Quadrant for Mobile Device Management Software, May 23, 2013, Phillip Redman, John Girard, Terrence Cosgrove, Monica Basso Source: Gartner report, Critical Capabilities for Mobile Device Management Software, May 23, 2013, Phillip Redman © 2013 Gartner, Inc. and/or its affiliates. All rights reserved. Gartner is a registered trademark of Gartner, Inc. or its affiliates. For more information, e-mail info@gartner.com or visit gartner.com. Used with permission.
  • 21. © 2014 Citrix | Confidential – Do Not Distribute Mobile, Simple, Secure
  • 22. © 2014 Citrix | Confidential – Do Not Distribute What Do We Know?
  • 23. © 2014 Citrix | Confidential – Do Not Distribute Entire desktopJust the apps Windows apps and data secured and delivered… Within a virtual desktop Optimized for: • Large Screen Footprint - Multi-window • Keyboard and mouse • Persistent workspace Windows apps and data secured and delivered… Optimized for: • Smaller screen, mobile • Touch interface • Non-persistent workspace Apps and Desktops with Ease Seamless Transitions
  • 24. © 2014 Citrix | Confidential – Do Not Distribute Central or local execution FlexCast delivery technology Physical PCs Apps and Desktops HDX 3D Pro-enabled workstations or Remote PC access technology Central Management Image management | Application management | User data profiles | Access policies Central Execution Local Execution Hosted VDI Apps and desktops Dedicated or pooled desktop virtual machines Hosted Shared Apps and Desktops Windows Server session-based desktop or apps Local Hypervisor Desktops Type 1 Hypervisor for PCs and Laptops with XenClient Synchronizer
  • 25. © 2014 Citrix | Confidential – Do Not Distribute Desktops and Apps as-a-Service
  • 26. © 2014 Citrix | Confidential – Do Not Distribute XenDesktop 7 Single Site Director 2.1 Site A Site B Site C Help Desk and Troubleshooting / Environment health Director
  • 27. © 2014 Citrix | Confidential – Do Not Distribute EdgeSight Performance management Director and EdgeSight XenDesktop 7 Site A Site B Site C Director Historical Trends and Analytics Managing and optimizing capacity TM TM TM
  • 28. © 2014 Citrix | Confidential – Do Not Distribute EdgeSight Network analysis Director and EdgeSight XenDesktop 7 Site A Site B Site C HDX Insight Isolating and managing network performance Network - Deep Packet Analysis TM TM
  • 29. © 2014 Citrix | Confidential – Do Not Distribute Let’s Go Mobile!
  • 30. © 2014 Citrix | Confidential – Do Not Distribute ShareFile • SSO to all MDX apps • User support for MDX apps • Integrated email, contacts and calendar • Designed for work • Internet and intranet browsing • Supports file download • All your files available anywhere • Sharing integrated into other MDX apps WorxMail WorxWeb WorxHome
  • 31. © 2014 Citrix | Confidential – Do Not Distribute System Overview Access Gateway App Controller Device Manager ShareFile WorxStore StorageZone ShareFile ControlPlane XenMobile Enterprise
  • 32. © 2014 Citrix | Confidential – Do Not Distribute User authorization required Mobile device access Allow local storage Offline access allowed Restrict document sharing Printing allowed Edit data SmartAccess Policy Controls
  • 33. Enrollment & App Store
  • 34. © 2014 Citrix | Confidential – Do Not Distribute Unified Corporate App Store • Available on 3B+ devices • Mobile apps native on device • Seamless delivery of Windows, datacenter and web apps • Any device – smartphone, tablet, PC and Mac
  • 35. © 2014 Citrix | Confidential – Do Not Distribute Authentication Authentication and SSO • Strongly authenticates users o NetScaler Gateway is primary authentication point o Permits combinations of AD credentials with certificates, tokens, and other second factors • Registers devices to users o Permits lock and wipe of corporate data/apps on selected devices • Serves as access manager for MDX managed apps o Strongly identifies managed apps o Determines app entitlements and policies for authenticated users o Brokers permitted data exchanges between managed apps WorxHome
  • 36. © 2014 Citrix | Confidential – Do Not Distribute Single Sign-On Authentication and SSO • SSO for all managed apps o Hosted HDX apps and desktops o Web/SaaS apps o MDX managed mobile apps  Various online and offline modes selected by app policy • MDX apps can use derived credentials o Gateway tickets for micro-VPN access o Automatic HTTP auth challenge responses (NTLM today, Kerberos coming soon) o Certificates for PKI protected web sites o Specialty credentials eg (SAML token for Sharefile access) WorxHome
  • 37. © 2014 Citrix | Confidential – Do Not Distribute WorxMail Mail, calendar, contacts Enterprise class security Beautiful native experience Full inter-app integration MDX-secured • Secure email body and attachment • “Open in” control to provide data leak protection • No Exchange server exposure to internet • Send email with ShareFile attachments • Integrated calendars and Exchange GAL
  • 38. © 2014 Citrix | Confidential – Do Not Distribute Sandboxed Email, Calendar and Contacts App • Secure email app with a great user experience • Attach files to emails and save attachments • Full calendar with access to free/busy information • Directly opens web links to any site, including intranet sites
  • 39. © 2014 Citrix | Confidential – Do Not Distribute Secure Document Sharing, Sync & Editing • Both cloud and on-premises data storage options • Capable of accessing SharePoint and network drives • “Open-in” capabilities can be restricted to other Worx-enabled apps
  • 40. © 2014 Citrix | Confidential – Do Not Distribute WorxWeb 42 Secure browser Internal web app access Full inter-app integration Consumer experience MDX-secured • iOS and Android device intranet web browsing o Easy access to SharePoint, Intranet Portal etc • Similar look/ feel as native browser o Safari on iOS; Chrome on Android • Single sign-on via NetScaler o Respond to HTTP 401
  • 41. © 2014 Citrix | Confidential – Do Not Distribute Secure Mobile Web Browser • Full-featured consumer-like browser • Secure access to internal, external and HTML5 web apps • URL whitelisting and blacklisting • Access to enterprise resources with a Micro VPN
  • 42. © 2014 Citrix | Confidential – Do Not Distribute ShareFile Platform Storage Zones Network Shares SharePoint ShareFile.com
  • 43. © 2014 Citrix | Confidential – Do Not Distribute Follow-me data with ShareFile • Enables file sharing with anyone • Syncs data across all devices • Online file sharing spaces for virtual teams • Selective offline access on mobile devices • Data protection ᵒ Encryption ᵒ Device lock ᵒ Remote wipe ᵒ Poison-pill Secure
  • 44. © 2014 Citrix | Confidential – Do Not Distribute ShareFile Enables Mobile Workstyles • Access, share and sync files from any device • Apps for mobile devices • Mobile-optimized ShareFile web site • Access data residing in existing network shares & SharePoint* • Offline access and editing • Built-in mobile editor for rich content editing on-the-go • PDF annotation
  • 45. © 2014 Citrix | Confidential – Do Not Distribute Mobile content editor for Microsoft Office
  • 46. © 2014 Citrix | Confidential – Do Not Distribute Workflow Integration with Microsoft Outlook Attachment conversion Unclog mail servers Overcome file size restrictions Better control and visibility Request large files
  • 47. © 2014 Citrix | Confidential – Do Not Distribute ShareFile with StorageZones Citrix-managed StorageZone (AWS) Customer-managed StorageZone (example) • Choose where your data is stored • Designated zones in public clouds • Manage StorageZones on-premises
  • 48. © 2014 Citrix | Confidential – Do Not Distribute On-Demand Sync + Data Optimized for Virtual Desktops Instant access, share and sync Reduce storage costs
  • 49. MDX Technology
  • 50. © 2014 Citrix | Confidential – Do Not Distribute AppApp App MDX Technologies • Encrypted local storage • Micro (app specific) VPN • App specific lock and wipe • Inter-app communication • Conditional access policies • Federated identity and SSO App App PreparationTool
  • 51. © 2014 Citrix | Confidential – Do Not Distribute Information Containment • Control data exchange with other apps and devices: ᵒ Cut/Copy/Paste ᵒ Document exchange (Open-In) ᵒ Inter-app communications ᵒ Network APIs QuickLook EvernoteMail Facebook OfficeHDBox QuickLook OfficeHD without containment with containment What happens in MDX apps stays in MDX apps….
  • 52. © 2014 Citrix | Confidential – Do Not Distribute Secure inter-app communication • Restricted – Allow only trusted apps to share data with one another • Unrestricted – No controls, “Open In” shows all apps registered to handle that file type • Blocked – No way to share that app’s data with anything else app one app two mobile OS Open-In
  • 53. © 2014 Citrix | Confidential – Do Not Distribute private data CitrixReceiver MDX InterApp MDXVault XenMobile NativeMobile Apps Deny SMS Disable iCloud Disable screenshots Force authentication Block jailbroken device MDXPolicies duringapp wrapping app private data vault app private data vault
  • 54. © 2014 Citrix | Confidential – Do Not Distribute Enterprise-enable any mobile app with the Worx App SDK • Simple and powerful SDK • Enabled through a single line of code • Apps can be wrapped post-development • Controls like: ᵒ Data encryption ᵒ Authentication ᵒ Secure lock and wipe ᵒ Inter-app policies ᵒ Micro VPNs Any app can be a Worx app
  • 55. © 2014 Citrix | Confidential – Do Not Distribute App Behavior Restrictions • Block mobile OS API sets and features ᵒ Printing ᵒ iCloud ᵒ Email and SMS compose ᵒ Inter-app URL dispatch and scheme handlers (iOS) ᵒ Intent launch and content providers (Android) • Block access to sensitive device hardware ᵒ Camera, microphone, location services, etc. • All controls are applied at run-time based on app policies
  • 56. © 2014 Citrix | Confidential – Do Not Distribute App Access Controls • Block/permit app access based on policy • User authentication (how and when) ᵒ Online versus offline, re-authentication period, max offline time • Device security posture ᵒ Jail-broken or rooted ᵒ PIN/passcode enabled ᵒ Hardware enforced encryption ᵒ MDM enrolled vs unmanaged • Network state ᵒ Internal network or external ᵒ Specific internal wifi networks ᵒ Wifi Only
  • 57. System Architecture
  • 58. © 2014 Citrix | Confidential – Do Not Distribute XenMobile Infrastructure Dependencies Network & Information Systems Infrastructure CORE SERVICES: Active Directory / LDAP NTP, and DNS services ready HOST NAMES: Create FQDN’s for XenMobile Device Manager & WorxHome VIP Addresses FIREWALL RULES: Configure for device connections & XenMobile servers (XDM, XAC, NetScaler) IP Addresses: (Public & Internal) Must have the static IP’s mapped for External NATs, NSIP, SNIPs, and VIPs that are used by the NetScaler, XDM, XAC and other services. Server Environment: Physical & Virtual (DMZ vs. Corporate LAN placement of servers) IT Security: Internal PKI, external certificate services, and Identity Management services
  • 59. © 2014 Citrix | Confidential – Do Not Distribute Create Base Policies The Must Haves “Magic 5” MDM Policies • End-User Terms & Conditions • Device Passcode • Software Inventory (where allowed / privacy concerns) • Company WiFi (setup a secure network) • ActiveSync Mail Regional or User/Device Specific Policies • Device Restrictions • Location Services • VPN • PKI / User Identity Certificates • App Push • App Store • Device Platform Specific (iOS 7, Samsung SAFE/KNOX) Worx App Policies • Clipboard (Copy & Paste) • Documents (Open In) • Device Restrictions • Login Security • mVPN Tunneling vs. Open Networking • Network WiFi Control
  • 60. © 2014 Citrix | Confidential – Do Not Distribute Citrix – The Most Complete Mobile Portfolio Any app, any device, anywhere Mobile ROI Mobile Device Management Sandboxed Mail and Web Mobile App Security Secure Mobile Data Sharing Mobile Network Control SSO & Identity Management Desktop & App Virtualization Social & Web Collaboration
  • 61. © 2014 Citrix | Confidential – Do Not Distribute Mobile, Simple, Secure
  • 62. © 2014 Citrix | Confidential – Do Not Distribute Questions? •Todd Smith – Sales Engineering Manager ᵒ Todd.smith2@citrix.com •www.citrix.com
  • 63. © 2014 Citrix | Confidential – Do Not Distribute Want something for Free? • The Free 350 page soup-to-nuts 'How To: BYOD Project Volume 1' e-book will teach you: • How to install and configure Citrix DesktopPlayer for Mac 1.1, soup-to-nuts... • How to install and configure Citrix XenClient Enterprise Synchronizer 5.1.1. • How to install and configure Microsoft Windows Server 2012 R2 • How to install and configure Hyper-V for use with the Citrix Synchronizer. • How to prepare the environment for installation. • How to train end-users to use the new DesktopPlayer for Mac solutions. • Detailed Citrix Synchronizer Policies section. • Detailed Citrix Synchronizer administration tasks explained. • Citrix Synchronizer backup and recovery explained. • How to create & maintain Synchronizer virtual machines. • 350 pages of step-by-step, soup-to-nuts, and easy as 1,2,3! • http://docs.dabcc.com
  • 64. Work better. Live better.