SlideShare a Scribd company logo
1 of 71
Download to read offline
JoergVosse 
Senior Systems Engineer -Citrix ShareFile –CEE 
joerg.vosse@citrix.com 
ShareFile 
Technical Presentation
ShareFile Enterprise 
Architecture Overview
ShareFile “Document Cloud” 
ShareFile.com 
ShareFile.eu 
SaaSapplication 
Clients 
Documents
ShareFile “Document Cloud” 
ShareFile.com 
ShareFile.eu 
SaaSapplication 
•Business logic 
•Web application 
•Reporting 
Clients 
•Mobile, Windows, Outlook, OS X, Web 
•XenDesktop / XenApp 
•Mobile Office Editor 
•XenMobile DLP Policies 
Documents 
•Citrix-managed 
•Customer-managed 
•Existing repositories
ShareFile “Document Cloud” Architecture 
Authorization 
Authorization 
SaaSApplication 
•USA or Europe 
•Business Logic 
•Web Application 
•Reporting 
Document Storage 
•Citrix-Managed 
•Customer-Managed 
•Existing Repositories 
Authentication 
•Sharefileintegrated 
•SAML 2.0 IdP 
Clients
ShareFile Enterprise 
ClienttoolsOverview
Files & Folders available on any device
ShareFileWeb User Interface
ShareFileWindows Synctool(Explorer)
ShareFileMac Synctool(Finder)
ShareFile Outlook Plug-in 
Send or request files from Outlook using ShareFile plug-in 
Control attachment policy, link expiration, and access
ShareFile Mobile Client 
Personal Folders 
Shared Folders 
Favorite Folders 
Network Drives (R/W) 
SharePoint Document Libraries (R/W)
ShareFile Mobile Client (new design)
Built-in Mobile Content Editor
Microsoft Office Web Apps Integration 
HTML rendering of Microsoft Office and Adobe PDF documents 
•Supported with Citrix- managed StorageZones(only) today 
•Rich file interaction without requiring download 
•Leverages Microsoft web app viewer 
ᵒPowerPoint animations 
ᵒExcel calculations 
ᵒMS Word & PDF rendering
ShareFile Enterprise 
In Virtual Environments
Use Citrix Receiver to access published application or desktop 
XenDesktop / XenApp integration 
Open ShareFile documents from a published application
Use Citrix Receiver to access published application or desktop 
XenDesktop / XenApp integration 
Open ShareFile documents from a published desktop
Without On-Demand Sync 
Every login to non-persistent desktop 
•Full file download of 
ᵒMy Files & Folders 
ᵒShared Folders (if configured) 
•Likely to cause a capacity issue on PVS or MCS differencing disk 
•Increased write IO during sync
With On-Demand Sync 
Designed for XenDesktopand XenApp 
•Same look & feel as “normal” Windows Sync 
•4 KB placeholder for each file 
•Only brings over files when required 
ᵒCopy 
ᵒOpening/editing in application 
•Files are uploaded when changed 
•During next login the locally sync’d files are deleted
Before & After On-Demand Sync 
Without On-Demand Sync -20 MB 
With On-Demand Sync –4 KB
ShareFile Enterprise 
Secure File Sharing
Anonymous -Download
Contact Info Request -Download
Require Client Login -Download
ShareFile Enterprise 
Enterprise Security Controls
ShareFile Mobile Device Security 
•Encryption at rest / in-transit 
•Offline / Online access to files 
•Device Restrictions 
•File Self Destruct (Poison Pill) 
•Passcode / Pin Code 
•Modified Device Detection 
•External Applications
ShareFile Mobile Device Security 
Provided by ShareFile 
PoisonPill 
Require password 
Data retention 
Encrypt files at rest 
Passcode lock 
Device lock 
Jail-break detection 
Remote wipe 
Wipe status and auditing 
Disable external applications 
Secure Sharing 
Network IP restrictions 
Session inactivity timeout 
Encryption at rest 
•Requires passcode 
Poison Pill 
•Lost device protection / data expiration 
Remote Wipe 
•Wipes only ShareFileapp data 
Disable External Applications 
•Prevent “Open In” 3rd party apps
Mobile DLP Controls with XenMobile 
Provided by ShareFile 
Disable download 
Require password 
Data retention 
Encrypt files at rest 
Passcode lock 
Device lock 
Jail-break detection 
Remote wipe 
Wipe status and auditing 
Disable external applications 
Secure Sharing 
Network IP restrictions 
Session inactivity timeout 
Provided by MDX Wrapping 
Constrain clipboard cut and copy 
Define maximum offline period 
Constrain clipboard paste 
Require regular re-authentication 
Constrain external applications 
Wipe data after security event 
Constrain URL Schemes 
Online access only 
Block camera 
Constrain Wi-Fi networks 
Block microphone 
Require internal network 
Block screen capture 
Constrain network access 
Block email compose 
App update grace period 
Disable print 
Require device encryption 
Require Citrix Worx Homeauthentication 
Require device pattern screen lock
Mobile Device Deployment 
Public App Store 
Mobile Application Management (MAM) 
Mobile Device Management (MDM)
Mobile Device Deployment 
Public App Store 
Mobile Application Management (MAM) 
Mobile Device Management (MDM)
Windows / OS X Device Registration 
•Restricts login to devices only with a valid access key
Sharing Controls 
Blacklist / Whitelist 
•Prohibit sharing with specific email domains 
•Restrict sharing to only specific email domains 
Require Client Login 
•Disables anonymous sharing of documents 
•Restricts ability for recipients to forward shared documents to someone else 
Client 2-step verification 
•2-step verification on untrusted devices using SMS messages, Google Authenticator
ShareFile Enterprise 
Storage Zones
ShareFilewith StorageZones 
Choose where your data is stored 
Meet compliance & security requirements 
Best economics, most elastic 
Cloud 
On-Prem
ShareFilewith StorageZones 
Choose where your data is stored 
Meet compliance & security requirements 
Best economics, most elastic 
Cloud 
On-Prem 
Existing 
Systems 
StorageZone Connectors 
Mobile productivity with existing data sources
ShareFilewith Citrix-managed StorageZones 
Object Store 
ShareFile.com
ShareFilewith customer-managed StorageZones 
Object Store
ShareFile StorageZones 
Object Store 
ShareFile.com 
Citrix-managed 
Customer-managed 
Network 
Shares 
StorageZone Connectors 
Existing Systems
ShareFile StorageZoneoptions 
Object Store 
Existing Systems 
•Cloud-optimized storage technology 
•Either Citrix-managed or customer-managed 
•Full ShareFile feature set (Sync, Send/Share, retention, versioning, etc.) 
•Network shares, SharePoint 
•Typically in customer datacenter 
•Feature set determined by repositories capabilities
ShareFile Enterprise 
Authentication Options
Authentication Options 
ShareFile Managed 
•Uses email address and a ShareFile password 
•Passwords are stored hashed in the ShareFile Control Plane 
•Admin portal supports password policy management 
•Unified storefront for all applications, data and services 
•Instant user provisioning and de- provisioning 
•Single sign-on with Citrix Worx 
•Real-time SaaS application monitoring 
•Comprehensive access control policies 
Customer IdP 
•Requires customer provided and configured SAML 2.0 identity provider 
•Supports Forms, Basic, and Windows Integrated protocols 
•Tested with ADFS 2.0, PingFederate, SiteMinder, Okta 
•Supported only with ‘Enterprise’ tools
SAML Authentication 
•Employee account is still required in ShareFile 
•Folder Access Control 
•Licensing 
•Employees will be matched by email address 
•Employee password will never be sent to SaaS Application Tier 
•ShareFile Authentication can be blocked for Employee users 
•Basic, Integrated Windows Authentication, and Forms are supported for all Enterprise clients
7 
8 
9 
1 
2 
3 
Service Provider 
(sharefile.com) 
Identity Provider 
(e.g. XenMobile, 
ADFS) 
4 
5 
6 
1 
Client requests ShareFile SSO login URL 
2 
Client discovers identity provider 
3 
Client redirected to identify provider 
4 
Client requests identity provider URL 
5 
Identity Provider identifies the user 
6 
User is authenticated and is redirected to Assertion Consumer Service URL with SAML response 
7 
User agent requests ACS URL 
8 
ACS validates SAML response and redirects user agent to ShareFile URL 
9 
User agent requests ShareFile URL 
User has access 
SAML 
How it works 
Client
IdP / SP Authentication 
ShareFile.com Customer Active 
Directory 
Rights 
SAML 
Service 
Provider 
(SP) 
SAML 
Identity 
Provider 
(IdP) 
Trust 
Claims 
LDAP 
Signed
So how do we get the Identity? 
•<NameIDFormat="urn:oasis:names:tc:SAML:1.1:nameid- format:emailAddress">joel.stocker@citrix.com</NameID>... 
Attribute Store 
(AD) 
Rule 
Transform 
Claims
SAML: IDP-Initiated Sign-On 
SAML Identity 
Provider 
(IDP) 
ShareFile.com 
Service Provier 
(SP) 
Go to sharefile.com 
302 + Claims 
https://account.sharefile.com/saml/acs + Claims
SAML: SP-Initiated Sign-On 
SAML Identity 
Provider 
(IDP) 
ShareFile.com 
Service Provider 
(SP) 
../adfs/ls + 
302 + Request 
https://account.sharefile.com/saml/acs + Claims 
https://account.sharefile.com/saml/login 
Request 
401(Auth Challenge) 
../adfs/ls + R e q u e s t + 
302 + Claims
ShareFile Enterprise 
User Provisioning
Manual
Bulk Import
User Management Tool
XenMobileAppController
ShareFile Enterprise 
API
Solutions Through Platforms 
ShareFile 
Clients 
Platform 
Partners 
Connectors SDK (Data Sources) 
V3 API
ShareFilePlatform 
Connectors SDK 
RESTfulAPI 
PowerShell SDK 
.NET SDK 
Desktop Apps 
Web 
Mobile Apps 
Java 
SDK 
Objective-C SDK 
JavascriptSDK 
Personal Cloud 
SharePoint 
Network Shares 
ShareFile
ShareFileDeveloper
ShareFile Enterprise 
Communications & Diagrams
Client Communication 
SZC 
ShareFile.com 
SaaS Application Tier 
•*.sharefile.com 
•*.sharefile.eu 
Documents 
•StorageZonesController 
•Amazon, Azure, on-premises 
SAML IdP 
•XenMobile 
•Microsoft ADFS v2 
•CA SiteMinder 
•PingFederate/Identity 
Clients 
•Mobile, Windows, Outlook, OS X, Web 
•XenDesktop / XenApp 
173.199.5.0/24 
78.108.127.0/24
StorageZonesController Req& Communication 
StorageZonesController 
•Windows Server 2008 R2 or 2012 R2 
•IIS Services with ASP.NET 
•.NET Framework 4.5 
•2 vCPU, 4GB RAM 
•Public IP address with DNS 
•Public SSL certificate 
SZC 
SZC 
ShareFile.com 
SaaS Application Tier 
•*.sharefile.com173.199.5.0/24 
•*.sharefile.eu78.108.127.0/24 
Object Store 
Network 
Shares 
ShareFile Data 
•CIFS/SMB file share 
•Service account 
SharePoint 
•http/https 
Network Shares 
•CIFS/SMB 
Internal
External Firewall 
Internal Firewall 
Port 80on localhost health check 
Port 80on localhost health check 
Port 443 
Port80 or 443 (recommended) 
Inbound from * on Port 443 
FQDN on External DNS with valid Public SSL cert 
Outbound to 
*.sharefile.com 173.199.5.0/24 
*.sharefile.eu78.108.127.0/24 
Port 443 
DMZ Proxy 
(e.g. NetScaler) 
ShareFIle StorageZone Controller(s) 
(physical or virtual) 
ShareFile StorageZones Networking Diagram
ShareFile 
Client 
NetScaler 
App Controller 
Device Manager 
DMZ 
Port 80 or 443 
SZC.company.com 
StorageZone 
Controller 
Internet & Remote Users 
Internal Network 
Port 443 
Port 443 
App Controller 
User Provisioning 
Worx Web 
Worx Mail 
Worx Home 
SharePoint 
File Server 
Active Directory 
Port 443 
Port 443 
Port 389 or 636 
Port 80 or 443 
SMB 
Port 389 or 636 
Optional 
Optional 
Citrix-Managed 
Customer-Managed
ShareFile 
NetScaler 
DMZ 
Port 80 or 443 
SZC.company.com 
StorageZone 
Controller 
Internet & Remote Users 
Internal Network 
Port 80 or 443 
Port 443 
App Controller 
User Provisioning 
SharePoint 
File Server 
Active Directory 
Port 443 
Port 443 
Port 389 or 636 
Port 80 or 443 
SMB 
Port 389 or 636 
Optional 
Optional 
IdP 
Citrix-Managed 
Customer-Managed
DMZ 
App Communication 
SZC 
SZC 
Data / 
Connectors 
Identity Provider 
StorageZone 
Controller 
ShareFile.com 
NetScaler 
SSO 
/saml/login SSO URL 
Download / Upload URL 
Internal Network 
Internet
AppController 
Netscaler 
____ 
____ 
____ 
ShareFile Docs 
____ 
____ 
____ 
ShareFile_SAML_SP 
.mdx 
ShareFile& XenMobileAppController
StorageZonesControllers 
NetScaler 
Inserting NetScaler 
Content Switching vServer 
Load Balancing vServer 
/ 
/cifs 
/sp 
ShareFile.com 
Load Balancing vServer w/auth 
StorageZone request 
CIFS/SharePoint request 
StorageZone request 
SharePoint request 
CIFS request 
Hash Validation 
Authentication 
LDAP
StorageZoneControllers 
NetScaler 
NetScaler ShareFile Data Flow 
Content Switching vServer 
Load Balancing vServer 
/ 
ShareFile.com 
StorageZone request 
StorageZone request 
Hash Validation
StorageZoneControllers 
NetScaler 
NetScaler ShareFile Data Flow 
Content Switching vServer 
Load Balancing vServer 
ShareFile.com 
CIFS or SharePoint request 
LDAP 
AAA Authentication 
/sp 
/cifs 
CIFS request 
SharePoint request
Q & A
Work better. Live better.

More Related Content

What's hot

Cloudciti Enterprise File Share Services
Cloudciti Enterprise File Share ServicesCloudciti Enterprise File Share Services
Cloudciti Enterprise File Share ServicesPT Datacomm Diangraha
 
Agile IT EMS webinar series, session 1
Agile IT EMS webinar series, session 1Agile IT EMS webinar series, session 1
Agile IT EMS webinar series, session 1AgileIT
 
ITPROCEED_TransformTheDatacenter_ten most common mistakes when deploying adfs...
ITPROCEED_TransformTheDatacenter_ten most common mistakes when deploying adfs...ITPROCEED_TransformTheDatacenter_ten most common mistakes when deploying adfs...
ITPROCEED_TransformTheDatacenter_ten most common mistakes when deploying adfs...ITProceed
 
PingOne IDaaS: What You Need to Know
PingOne IDaaS: What You Need to KnowPingOne IDaaS: What You Need to Know
PingOne IDaaS: What You Need to KnowCloudIDSummit
 
SMBStream™ Office to Office File Acceleration | Solution Brief
SMBStream™ Office to Office File Acceleration | Solution BriefSMBStream™ Office to Office File Acceleration | Solution Brief
SMBStream™ Office to Office File Acceleration | Solution BriefHybrid Cloud
 
DALIM Software - Solving the challenges of media production through automatio...
DALIM Software - Solving the challenges of media production through automatio...DALIM Software - Solving the challenges of media production through automatio...
DALIM Software - Solving the challenges of media production through automatio...IO Integration
 
Llunitebe2018 ten practical tips to secure your corporate data with microsoft...
Llunitebe2018 ten practical tips to secure your corporate data with microsoft...Llunitebe2018 ten practical tips to secure your corporate data with microsoft...
Llunitebe2018 ten practical tips to secure your corporate data with microsoft...Kenny Buntinx
 
Integrating IBM Connections with ECM using IBM Content Navigator
Integrating IBM Connections with ECM using IBM Content NavigatorIntegrating IBM Connections with ECM using IBM Content Navigator
Integrating IBM Connections with ECM using IBM Content NavigatorElinar
 
Microsoft Cloud Services Licensing
Microsoft Cloud Services Licensing Microsoft Cloud Services Licensing
Microsoft Cloud Services Licensing FlorisKlaver1
 
Private cloud for_partners
Private cloud for_partnersPrivate cloud for_partners
Private cloud for_partnerssolarisyougood
 
Protecting corporate data with Enterprise Mobility Suite
Protecting corporate data with Enterprise Mobility SuiteProtecting corporate data with Enterprise Mobility Suite
Protecting corporate data with Enterprise Mobility SuiteRonny de Jong
 
Adfs Shib Interop Um Oxford
Adfs Shib Interop Um OxfordAdfs Shib Interop Um Oxford
Adfs Shib Interop Um Oxfordguestd9aa5
 
How to Split Your System into Microservices
How to Split Your System into MicroservicesHow to Split Your System into Microservices
How to Split Your System into MicroservicesEberhard Wolff
 
Office 365-single-sign-on-with-adfs
Office 365-single-sign-on-with-adfsOffice 365-single-sign-on-with-adfs
Office 365-single-sign-on-with-adfsamitchachra
 
Office 365 cloud principles
Office 365 cloud principlesOffice 365 cloud principles
Office 365 cloud principlesMotty Ben Atia
 
SYN308: How XenMobile integrates with NetScaler, XenDesktop and XenApp for co...
SYN308: How XenMobile integrates with NetScaler, XenDesktop and XenApp for co...SYN308: How XenMobile integrates with NetScaler, XenDesktop and XenApp for co...
SYN308: How XenMobile integrates with NetScaler, XenDesktop and XenApp for co...Citrix
 
Company and Market Overview
Company and Market OverviewCompany and Market Overview
Company and Market OverviewOkta-Inc
 
Modernize Your Network Shares
Modernize Your Network SharesModernize Your Network Shares
Modernize Your Network SharesAxway
 
Pre-built, Secure Identity Layer for Consumer Websites, B2B Portals and SaaS ...
Pre-built, Secure Identity Layer for Consumer Websites, B2B Portals and SaaS ...Pre-built, Secure Identity Layer for Consumer Websites, B2B Portals and SaaS ...
Pre-built, Secure Identity Layer for Consumer Websites, B2B Portals and SaaS ...Okta-Inc
 
Is Office 365 Right For You? Aptera Software presentation
Is Office 365 Right For You? Aptera Software presentationIs Office 365 Right For You? Aptera Software presentation
Is Office 365 Right For You? Aptera Software presentationAptera Inc
 

What's hot (20)

Cloudciti Enterprise File Share Services
Cloudciti Enterprise File Share ServicesCloudciti Enterprise File Share Services
Cloudciti Enterprise File Share Services
 
Agile IT EMS webinar series, session 1
Agile IT EMS webinar series, session 1Agile IT EMS webinar series, session 1
Agile IT EMS webinar series, session 1
 
ITPROCEED_TransformTheDatacenter_ten most common mistakes when deploying adfs...
ITPROCEED_TransformTheDatacenter_ten most common mistakes when deploying adfs...ITPROCEED_TransformTheDatacenter_ten most common mistakes when deploying adfs...
ITPROCEED_TransformTheDatacenter_ten most common mistakes when deploying adfs...
 
PingOne IDaaS: What You Need to Know
PingOne IDaaS: What You Need to KnowPingOne IDaaS: What You Need to Know
PingOne IDaaS: What You Need to Know
 
SMBStream™ Office to Office File Acceleration | Solution Brief
SMBStream™ Office to Office File Acceleration | Solution BriefSMBStream™ Office to Office File Acceleration | Solution Brief
SMBStream™ Office to Office File Acceleration | Solution Brief
 
DALIM Software - Solving the challenges of media production through automatio...
DALIM Software - Solving the challenges of media production through automatio...DALIM Software - Solving the challenges of media production through automatio...
DALIM Software - Solving the challenges of media production through automatio...
 
Llunitebe2018 ten practical tips to secure your corporate data with microsoft...
Llunitebe2018 ten practical tips to secure your corporate data with microsoft...Llunitebe2018 ten practical tips to secure your corporate data with microsoft...
Llunitebe2018 ten practical tips to secure your corporate data with microsoft...
 
Integrating IBM Connections with ECM using IBM Content Navigator
Integrating IBM Connections with ECM using IBM Content NavigatorIntegrating IBM Connections with ECM using IBM Content Navigator
Integrating IBM Connections with ECM using IBM Content Navigator
 
Microsoft Cloud Services Licensing
Microsoft Cloud Services Licensing Microsoft Cloud Services Licensing
Microsoft Cloud Services Licensing
 
Private cloud for_partners
Private cloud for_partnersPrivate cloud for_partners
Private cloud for_partners
 
Protecting corporate data with Enterprise Mobility Suite
Protecting corporate data with Enterprise Mobility SuiteProtecting corporate data with Enterprise Mobility Suite
Protecting corporate data with Enterprise Mobility Suite
 
Adfs Shib Interop Um Oxford
Adfs Shib Interop Um OxfordAdfs Shib Interop Um Oxford
Adfs Shib Interop Um Oxford
 
How to Split Your System into Microservices
How to Split Your System into MicroservicesHow to Split Your System into Microservices
How to Split Your System into Microservices
 
Office 365-single-sign-on-with-adfs
Office 365-single-sign-on-with-adfsOffice 365-single-sign-on-with-adfs
Office 365-single-sign-on-with-adfs
 
Office 365 cloud principles
Office 365 cloud principlesOffice 365 cloud principles
Office 365 cloud principles
 
SYN308: How XenMobile integrates with NetScaler, XenDesktop and XenApp for co...
SYN308: How XenMobile integrates with NetScaler, XenDesktop and XenApp for co...SYN308: How XenMobile integrates with NetScaler, XenDesktop and XenApp for co...
SYN308: How XenMobile integrates with NetScaler, XenDesktop and XenApp for co...
 
Company and Market Overview
Company and Market OverviewCompany and Market Overview
Company and Market Overview
 
Modernize Your Network Shares
Modernize Your Network SharesModernize Your Network Shares
Modernize Your Network Shares
 
Pre-built, Secure Identity Layer for Consumer Websites, B2B Portals and SaaS ...
Pre-built, Secure Identity Layer for Consumer Websites, B2B Portals and SaaS ...Pre-built, Secure Identity Layer for Consumer Websites, B2B Portals and SaaS ...
Pre-built, Secure Identity Layer for Consumer Websites, B2B Portals and SaaS ...
 
Is Office 365 Right For You? Aptera Software presentation
Is Office 365 Right For You? Aptera Software presentationIs Office 365 Right For You? Aptera Software presentation
Is Office 365 Right For You? Aptera Software presentation
 

Similar to Citrix Day 2014: ShareFile Enterprise

Unified client management session from Microsoft partner boot camp
Unified client management session from Microsoft partner boot campUnified client management session from Microsoft partner boot camp
Unified client management session from Microsoft partner boot campOlav Tvedt
 
MMS 2015: What is ems and how to configure it
MMS 2015: What is ems and how to configure itMMS 2015: What is ems and how to configure it
MMS 2015: What is ems and how to configure itPeter Daalmans
 
Cloud Security Fundamentals - St. Louis O365 Users Group
Cloud Security Fundamentals - St. Louis O365 Users GroupCloud Security Fundamentals - St. Louis O365 Users Group
Cloud Security Fundamentals - St. Louis O365 Users GroupJ.D. Wade
 
Premier Webcast - Identity Management with Windows Azure AD
Premier Webcast - Identity Management with Windows Azure ADPremier Webcast - Identity Management with Windows Azure AD
Premier Webcast - Identity Management with Windows Azure ADuberbaum
 
Collaborating with Extranet Partners on SharePoint 2010 - SharePoint Connecti...
Collaborating with Extranet Partners on SharePoint 2010 - SharePoint Connecti...Collaborating with Extranet Partners on SharePoint 2010 - SharePoint Connecti...
Collaborating with Extranet Partners on SharePoint 2010 - SharePoint Connecti...Michael Noel
 
SharePointFest 2013 Washington DC - SPT 103 - SharePoint 2013 Extranets: How ...
SharePointFest 2013 Washington DC - SPT 103 - SharePoint 2013 Extranets: How ...SharePointFest 2013 Washington DC - SPT 103 - SharePoint 2013 Extranets: How ...
SharePointFest 2013 Washington DC - SPT 103 - SharePoint 2013 Extranets: How ...Brian Culver
 
Mobile code mining for discovery and exploits nullcongoa2013
Mobile code mining for discovery and exploits nullcongoa2013Mobile code mining for discovery and exploits nullcongoa2013
Mobile code mining for discovery and exploits nullcongoa2013Blueinfy Solutions
 
Envision it SharePoint Extranet Webinar Series - Federation and SharePoint On...
Envision it SharePoint Extranet Webinar Series - Federation and SharePoint On...Envision it SharePoint Extranet Webinar Series - Federation and SharePoint On...
Envision it SharePoint Extranet Webinar Series - Federation and SharePoint On...Envision IT
 
DELLEMC - MOZY ENTERPRISE CLOUD DATA PROTECTION
DELLEMC - MOZY ENTERPRISE CLOUD DATA PROTECTIONDELLEMC - MOZY ENTERPRISE CLOUD DATA PROTECTION
DELLEMC - MOZY ENTERPRISE CLOUD DATA PROTECTIONiSAP Solutions Pvt. Ltd.
 
AWS Summit 2013 | India - Extend your Datacenter in the Cloud and achieve Hig...
AWS Summit 2013 | India - Extend your Datacenter in the Cloud and achieve Hig...AWS Summit 2013 | India - Extend your Datacenter in the Cloud and achieve Hig...
AWS Summit 2013 | India - Extend your Datacenter in the Cloud and achieve Hig...Amazon Web Services
 
AWS Webcast - Amazon work spaces public sector webinar
AWS Webcast - Amazon work spaces public sector webinarAWS Webcast - Amazon work spaces public sector webinar
AWS Webcast - Amazon work spaces public sector webinarAmazon Web Services
 
HAD05: Collaborating with Extranet Partners on SharePoint 2010
HAD05: Collaborating with Extranet Partners on SharePoint 2010HAD05: Collaborating with Extranet Partners on SharePoint 2010
HAD05: Collaborating with Extranet Partners on SharePoint 2010Michael Noel
 
Micro Focus Filr - #MFSummit2017
Micro Focus Filr - #MFSummit2017Micro Focus Filr - #MFSummit2017
Micro Focus Filr - #MFSummit2017Micro Focus
 
T28 implementing adfs and hybrid share point
T28   implementing adfs and hybrid share point T28   implementing adfs and hybrid share point
T28 implementing adfs and hybrid share point Thorbjørn Værp
 
Understanding Office 365’s Identity Solutions: Deep Dive - EPC Group
Understanding Office 365’s Identity Solutions: Deep Dive - EPC GroupUnderstanding Office 365’s Identity Solutions: Deep Dive - EPC Group
Understanding Office 365’s Identity Solutions: Deep Dive - EPC GroupEPC Group
 
SharePoint 2013 Admin in the Hybrid World
SharePoint 2013 Admin in the Hybrid WorldSharePoint 2013 Admin in the Hybrid World
SharePoint 2013 Admin in the Hybrid WorldJason Himmelstein
 
O365con14 - moving from on-premises to online, the road to follow
O365con14 - moving from on-premises to online, the road to followO365con14 - moving from on-premises to online, the road to follow
O365con14 - moving from on-premises to online, the road to followNCCOMMS
 
From classification to protection of your data, secure your business with azu...
From classification to protection of your data, secure your business with azu...From classification to protection of your data, secure your business with azu...
From classification to protection of your data, secure your business with azu...Joris Faure
 
Vaultize Cloud Architecture - Enterprise File Sync and Share (EFSS)
Vaultize Cloud Architecture - Enterprise File Sync and Share (EFSS)Vaultize Cloud Architecture - Enterprise File Sync and Share (EFSS)
Vaultize Cloud Architecture - Enterprise File Sync and Share (EFSS)Vaultize
 

Similar to Citrix Day 2014: ShareFile Enterprise (20)

Unified client management session from Microsoft partner boot camp
Unified client management session from Microsoft partner boot campUnified client management session from Microsoft partner boot camp
Unified client management session from Microsoft partner boot camp
 
MMS 2015: What is ems and how to configure it
MMS 2015: What is ems and how to configure itMMS 2015: What is ems and how to configure it
MMS 2015: What is ems and how to configure it
 
Cloud Security Fundamentals - St. Louis O365 Users Group
Cloud Security Fundamentals - St. Louis O365 Users GroupCloud Security Fundamentals - St. Louis O365 Users Group
Cloud Security Fundamentals - St. Louis O365 Users Group
 
Premier Webcast - Identity Management with Windows Azure AD
Premier Webcast - Identity Management with Windows Azure ADPremier Webcast - Identity Management with Windows Azure AD
Premier Webcast - Identity Management with Windows Azure AD
 
Collaborating with Extranet Partners on SharePoint 2010 - SharePoint Connecti...
Collaborating with Extranet Partners on SharePoint 2010 - SharePoint Connecti...Collaborating with Extranet Partners on SharePoint 2010 - SharePoint Connecti...
Collaborating with Extranet Partners on SharePoint 2010 - SharePoint Connecti...
 
SharePointFest 2013 Washington DC - SPT 103 - SharePoint 2013 Extranets: How ...
SharePointFest 2013 Washington DC - SPT 103 - SharePoint 2013 Extranets: How ...SharePointFest 2013 Washington DC - SPT 103 - SharePoint 2013 Extranets: How ...
SharePointFest 2013 Washington DC - SPT 103 - SharePoint 2013 Extranets: How ...
 
Airwatch od VMware
Airwatch od VMwareAirwatch od VMware
Airwatch od VMware
 
Mobile code mining for discovery and exploits nullcongoa2013
Mobile code mining for discovery and exploits nullcongoa2013Mobile code mining for discovery and exploits nullcongoa2013
Mobile code mining for discovery and exploits nullcongoa2013
 
Envision it SharePoint Extranet Webinar Series - Federation and SharePoint On...
Envision it SharePoint Extranet Webinar Series - Federation and SharePoint On...Envision it SharePoint Extranet Webinar Series - Federation and SharePoint On...
Envision it SharePoint Extranet Webinar Series - Federation and SharePoint On...
 
DELLEMC - MOZY ENTERPRISE CLOUD DATA PROTECTION
DELLEMC - MOZY ENTERPRISE CLOUD DATA PROTECTIONDELLEMC - MOZY ENTERPRISE CLOUD DATA PROTECTION
DELLEMC - MOZY ENTERPRISE CLOUD DATA PROTECTION
 
AWS Summit 2013 | India - Extend your Datacenter in the Cloud and achieve Hig...
AWS Summit 2013 | India - Extend your Datacenter in the Cloud and achieve Hig...AWS Summit 2013 | India - Extend your Datacenter in the Cloud and achieve Hig...
AWS Summit 2013 | India - Extend your Datacenter in the Cloud and achieve Hig...
 
AWS Webcast - Amazon work spaces public sector webinar
AWS Webcast - Amazon work spaces public sector webinarAWS Webcast - Amazon work spaces public sector webinar
AWS Webcast - Amazon work spaces public sector webinar
 
HAD05: Collaborating with Extranet Partners on SharePoint 2010
HAD05: Collaborating with Extranet Partners on SharePoint 2010HAD05: Collaborating with Extranet Partners on SharePoint 2010
HAD05: Collaborating with Extranet Partners on SharePoint 2010
 
Micro Focus Filr - #MFSummit2017
Micro Focus Filr - #MFSummit2017Micro Focus Filr - #MFSummit2017
Micro Focus Filr - #MFSummit2017
 
T28 implementing adfs and hybrid share point
T28   implementing adfs and hybrid share point T28   implementing adfs and hybrid share point
T28 implementing adfs and hybrid share point
 
Understanding Office 365’s Identity Solutions: Deep Dive - EPC Group
Understanding Office 365’s Identity Solutions: Deep Dive - EPC GroupUnderstanding Office 365’s Identity Solutions: Deep Dive - EPC Group
Understanding Office 365’s Identity Solutions: Deep Dive - EPC Group
 
SharePoint 2013 Admin in the Hybrid World
SharePoint 2013 Admin in the Hybrid WorldSharePoint 2013 Admin in the Hybrid World
SharePoint 2013 Admin in the Hybrid World
 
O365con14 - moving from on-premises to online, the road to follow
O365con14 - moving from on-premises to online, the road to followO365con14 - moving from on-premises to online, the road to follow
O365con14 - moving from on-premises to online, the road to follow
 
From classification to protection of your data, secure your business with azu...
From classification to protection of your data, secure your business with azu...From classification to protection of your data, secure your business with azu...
From classification to protection of your data, secure your business with azu...
 
Vaultize Cloud Architecture - Enterprise File Sync and Share (EFSS)
Vaultize Cloud Architecture - Enterprise File Sync and Share (EFSS)Vaultize Cloud Architecture - Enterprise File Sync and Share (EFSS)
Vaultize Cloud Architecture - Enterprise File Sync and Share (EFSS)
 

More from Digicomp Academy AG

Becoming Agile von Christian Botta – Personal Swiss Vortrag 2019
Becoming Agile von Christian Botta – Personal Swiss Vortrag 2019Becoming Agile von Christian Botta – Personal Swiss Vortrag 2019
Becoming Agile von Christian Botta – Personal Swiss Vortrag 2019Digicomp Academy AG
 
Swiss IPv6 Council – Case Study - Deployment von IPv6 in einer Container Plat...
Swiss IPv6 Council – Case Study - Deployment von IPv6 in einer Container Plat...Swiss IPv6 Council – Case Study - Deployment von IPv6 in einer Container Plat...
Swiss IPv6 Council – Case Study - Deployment von IPv6 in einer Container Plat...Digicomp Academy AG
 
Innovation durch kollaboration gennex 2018
Innovation durch kollaboration gennex 2018Innovation durch kollaboration gennex 2018
Innovation durch kollaboration gennex 2018Digicomp Academy AG
 
Roger basler meetup_digitale-geschaeftsmodelle-entwickeln_handout
Roger basler meetup_digitale-geschaeftsmodelle-entwickeln_handoutRoger basler meetup_digitale-geschaeftsmodelle-entwickeln_handout
Roger basler meetup_digitale-geschaeftsmodelle-entwickeln_handoutDigicomp Academy AG
 
Roger basler meetup_21082018_work-smarter-not-harder_handout
Roger basler meetup_21082018_work-smarter-not-harder_handoutRoger basler meetup_21082018_work-smarter-not-harder_handout
Roger basler meetup_21082018_work-smarter-not-harder_handoutDigicomp Academy AG
 
Xing expertendialog zu nudge unit x
Xing expertendialog zu nudge unit xXing expertendialog zu nudge unit x
Xing expertendialog zu nudge unit xDigicomp Academy AG
 
Responsive Organisation auf Basis der Holacracy – nur ein Hype oder die Zukunft?
Responsive Organisation auf Basis der Holacracy – nur ein Hype oder die Zukunft?Responsive Organisation auf Basis der Holacracy – nur ein Hype oder die Zukunft?
Responsive Organisation auf Basis der Holacracy – nur ein Hype oder die Zukunft?Digicomp Academy AG
 
IPv6 Security Talk mit Joe Klein
IPv6 Security Talk mit Joe KleinIPv6 Security Talk mit Joe Klein
IPv6 Security Talk mit Joe KleinDigicomp Academy AG
 
Agiles Management - Wie geht das?
Agiles Management - Wie geht das?Agiles Management - Wie geht das?
Agiles Management - Wie geht das?Digicomp Academy AG
 
Gewinnen Sie Menschen und Ziele - Referat von Andi Odermatt
Gewinnen Sie Menschen und Ziele - Referat von Andi OdermattGewinnen Sie Menschen und Ziele - Referat von Andi Odermatt
Gewinnen Sie Menschen und Ziele - Referat von Andi OdermattDigicomp Academy AG
 
Querdenken mit Kreativitätsmethoden – XING Expertendialog
Querdenken mit Kreativitätsmethoden – XING ExpertendialogQuerdenken mit Kreativitätsmethoden – XING Expertendialog
Querdenken mit Kreativitätsmethoden – XING ExpertendialogDigicomp Academy AG
 
Xing LearningZ: Digitale Geschäftsmodelle entwickeln
Xing LearningZ: Digitale Geschäftsmodelle entwickelnXing LearningZ: Digitale Geschäftsmodelle entwickeln
Xing LearningZ: Digitale Geschäftsmodelle entwickelnDigicomp Academy AG
 
Swiss IPv6 Council: The Cisco-Journey to an IPv6-only Building
Swiss IPv6 Council: The Cisco-Journey to an IPv6-only BuildingSwiss IPv6 Council: The Cisco-Journey to an IPv6-only Building
Swiss IPv6 Council: The Cisco-Journey to an IPv6-only BuildingDigicomp Academy AG
 
UX – Schlüssel zum Erfolg im Digital Business
UX – Schlüssel zum Erfolg im Digital BusinessUX – Schlüssel zum Erfolg im Digital Business
UX – Schlüssel zum Erfolg im Digital BusinessDigicomp Academy AG
 
Die IPv6 Journey der ETH Zürich
Die IPv6 Journey der ETH Zürich Die IPv6 Journey der ETH Zürich
Die IPv6 Journey der ETH Zürich Digicomp Academy AG
 
Xing LearningZ: Die 10 + 1 Trends im (E-)Commerce
Xing LearningZ: Die 10 + 1 Trends im (E-)CommerceXing LearningZ: Die 10 + 1 Trends im (E-)Commerce
Xing LearningZ: Die 10 + 1 Trends im (E-)CommerceDigicomp Academy AG
 
Zahlen Battle: klassische werbung vs.online-werbung-somexcloud
Zahlen Battle: klassische werbung vs.online-werbung-somexcloudZahlen Battle: klassische werbung vs.online-werbung-somexcloud
Zahlen Battle: klassische werbung vs.online-werbung-somexcloudDigicomp Academy AG
 
General data protection regulation-slides
General data protection regulation-slidesGeneral data protection regulation-slides
General data protection regulation-slidesDigicomp Academy AG
 

More from Digicomp Academy AG (20)

Becoming Agile von Christian Botta – Personal Swiss Vortrag 2019
Becoming Agile von Christian Botta – Personal Swiss Vortrag 2019Becoming Agile von Christian Botta – Personal Swiss Vortrag 2019
Becoming Agile von Christian Botta – Personal Swiss Vortrag 2019
 
Swiss IPv6 Council – Case Study - Deployment von IPv6 in einer Container Plat...
Swiss IPv6 Council – Case Study - Deployment von IPv6 in einer Container Plat...Swiss IPv6 Council – Case Study - Deployment von IPv6 in einer Container Plat...
Swiss IPv6 Council – Case Study - Deployment von IPv6 in einer Container Plat...
 
Innovation durch kollaboration gennex 2018
Innovation durch kollaboration gennex 2018Innovation durch kollaboration gennex 2018
Innovation durch kollaboration gennex 2018
 
Roger basler meetup_digitale-geschaeftsmodelle-entwickeln_handout
Roger basler meetup_digitale-geschaeftsmodelle-entwickeln_handoutRoger basler meetup_digitale-geschaeftsmodelle-entwickeln_handout
Roger basler meetup_digitale-geschaeftsmodelle-entwickeln_handout
 
Roger basler meetup_21082018_work-smarter-not-harder_handout
Roger basler meetup_21082018_work-smarter-not-harder_handoutRoger basler meetup_21082018_work-smarter-not-harder_handout
Roger basler meetup_21082018_work-smarter-not-harder_handout
 
Xing expertendialog zu nudge unit x
Xing expertendialog zu nudge unit xXing expertendialog zu nudge unit x
Xing expertendialog zu nudge unit x
 
Responsive Organisation auf Basis der Holacracy – nur ein Hype oder die Zukunft?
Responsive Organisation auf Basis der Holacracy – nur ein Hype oder die Zukunft?Responsive Organisation auf Basis der Holacracy – nur ein Hype oder die Zukunft?
Responsive Organisation auf Basis der Holacracy – nur ein Hype oder die Zukunft?
 
IPv6 Security Talk mit Joe Klein
IPv6 Security Talk mit Joe KleinIPv6 Security Talk mit Joe Klein
IPv6 Security Talk mit Joe Klein
 
Agiles Management - Wie geht das?
Agiles Management - Wie geht das?Agiles Management - Wie geht das?
Agiles Management - Wie geht das?
 
Gewinnen Sie Menschen und Ziele - Referat von Andi Odermatt
Gewinnen Sie Menschen und Ziele - Referat von Andi OdermattGewinnen Sie Menschen und Ziele - Referat von Andi Odermatt
Gewinnen Sie Menschen und Ziele - Referat von Andi Odermatt
 
Querdenken mit Kreativitätsmethoden – XING Expertendialog
Querdenken mit Kreativitätsmethoden – XING ExpertendialogQuerdenken mit Kreativitätsmethoden – XING Expertendialog
Querdenken mit Kreativitätsmethoden – XING Expertendialog
 
Xing LearningZ: Digitale Geschäftsmodelle entwickeln
Xing LearningZ: Digitale Geschäftsmodelle entwickelnXing LearningZ: Digitale Geschäftsmodelle entwickeln
Xing LearningZ: Digitale Geschäftsmodelle entwickeln
 
Swiss IPv6 Council: The Cisco-Journey to an IPv6-only Building
Swiss IPv6 Council: The Cisco-Journey to an IPv6-only BuildingSwiss IPv6 Council: The Cisco-Journey to an IPv6-only Building
Swiss IPv6 Council: The Cisco-Journey to an IPv6-only Building
 
UX – Schlüssel zum Erfolg im Digital Business
UX – Schlüssel zum Erfolg im Digital BusinessUX – Schlüssel zum Erfolg im Digital Business
UX – Schlüssel zum Erfolg im Digital Business
 
Minenfeld IPv6
Minenfeld IPv6Minenfeld IPv6
Minenfeld IPv6
 
Was ist design thinking
Was ist design thinkingWas ist design thinking
Was ist design thinking
 
Die IPv6 Journey der ETH Zürich
Die IPv6 Journey der ETH Zürich Die IPv6 Journey der ETH Zürich
Die IPv6 Journey der ETH Zürich
 
Xing LearningZ: Die 10 + 1 Trends im (E-)Commerce
Xing LearningZ: Die 10 + 1 Trends im (E-)CommerceXing LearningZ: Die 10 + 1 Trends im (E-)Commerce
Xing LearningZ: Die 10 + 1 Trends im (E-)Commerce
 
Zahlen Battle: klassische werbung vs.online-werbung-somexcloud
Zahlen Battle: klassische werbung vs.online-werbung-somexcloudZahlen Battle: klassische werbung vs.online-werbung-somexcloud
Zahlen Battle: klassische werbung vs.online-werbung-somexcloud
 
General data protection regulation-slides
General data protection regulation-slidesGeneral data protection regulation-slides
General data protection regulation-slides
 

Recently uploaded

Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Kaya Weers
 
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...Jeffrey Haguewood
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Nikki Chapple
 
Landscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdfLandscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdfAarwolf Industries LLC
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesManik S Magar
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
A Glance At The Java Performance Toolbox
A Glance At The Java Performance ToolboxA Glance At The Java Performance Toolbox
A Glance At The Java Performance ToolboxAna-Maria Mihalceanu
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructureitnewsafrica
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
All These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFAll These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFMichael Gough
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationKnoldus Inc.
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integrationmarketing932765
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 

Recently uploaded (20)

Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)
 
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
 
Landscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdfLandscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdf
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
A Glance At The Java Performance Toolbox
A Glance At The Java Performance ToolboxA Glance At The Java Performance Toolbox
A Glance At The Java Performance Toolbox
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
All These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFAll These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDF
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog Presentation
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 

Citrix Day 2014: ShareFile Enterprise

  • 1. JoergVosse Senior Systems Engineer -Citrix ShareFile –CEE joerg.vosse@citrix.com ShareFile Technical Presentation
  • 3. ShareFile “Document Cloud” ShareFile.com ShareFile.eu SaaSapplication Clients Documents
  • 4. ShareFile “Document Cloud” ShareFile.com ShareFile.eu SaaSapplication •Business logic •Web application •Reporting Clients •Mobile, Windows, Outlook, OS X, Web •XenDesktop / XenApp •Mobile Office Editor •XenMobile DLP Policies Documents •Citrix-managed •Customer-managed •Existing repositories
  • 5. ShareFile “Document Cloud” Architecture Authorization Authorization SaaSApplication •USA or Europe •Business Logic •Web Application •Reporting Document Storage •Citrix-Managed •Customer-Managed •Existing Repositories Authentication •Sharefileintegrated •SAML 2.0 IdP Clients
  • 7. Files & Folders available on any device
  • 11. ShareFile Outlook Plug-in Send or request files from Outlook using ShareFile plug-in Control attachment policy, link expiration, and access
  • 12. ShareFile Mobile Client Personal Folders Shared Folders Favorite Folders Network Drives (R/W) SharePoint Document Libraries (R/W)
  • 13. ShareFile Mobile Client (new design)
  • 15. Microsoft Office Web Apps Integration HTML rendering of Microsoft Office and Adobe PDF documents •Supported with Citrix- managed StorageZones(only) today •Rich file interaction without requiring download •Leverages Microsoft web app viewer ᵒPowerPoint animations ᵒExcel calculations ᵒMS Word & PDF rendering
  • 16. ShareFile Enterprise In Virtual Environments
  • 17. Use Citrix Receiver to access published application or desktop XenDesktop / XenApp integration Open ShareFile documents from a published application
  • 18. Use Citrix Receiver to access published application or desktop XenDesktop / XenApp integration Open ShareFile documents from a published desktop
  • 19. Without On-Demand Sync Every login to non-persistent desktop •Full file download of ᵒMy Files & Folders ᵒShared Folders (if configured) •Likely to cause a capacity issue on PVS or MCS differencing disk •Increased write IO during sync
  • 20. With On-Demand Sync Designed for XenDesktopand XenApp •Same look & feel as “normal” Windows Sync •4 KB placeholder for each file •Only brings over files when required ᵒCopy ᵒOpening/editing in application •Files are uploaded when changed •During next login the locally sync’d files are deleted
  • 21. Before & After On-Demand Sync Without On-Demand Sync -20 MB With On-Demand Sync –4 KB
  • 24. Contact Info Request -Download
  • 25. Require Client Login -Download
  • 26. ShareFile Enterprise Enterprise Security Controls
  • 27. ShareFile Mobile Device Security •Encryption at rest / in-transit •Offline / Online access to files •Device Restrictions •File Self Destruct (Poison Pill) •Passcode / Pin Code •Modified Device Detection •External Applications
  • 28. ShareFile Mobile Device Security Provided by ShareFile PoisonPill Require password Data retention Encrypt files at rest Passcode lock Device lock Jail-break detection Remote wipe Wipe status and auditing Disable external applications Secure Sharing Network IP restrictions Session inactivity timeout Encryption at rest •Requires passcode Poison Pill •Lost device protection / data expiration Remote Wipe •Wipes only ShareFileapp data Disable External Applications •Prevent “Open In” 3rd party apps
  • 29. Mobile DLP Controls with XenMobile Provided by ShareFile Disable download Require password Data retention Encrypt files at rest Passcode lock Device lock Jail-break detection Remote wipe Wipe status and auditing Disable external applications Secure Sharing Network IP restrictions Session inactivity timeout Provided by MDX Wrapping Constrain clipboard cut and copy Define maximum offline period Constrain clipboard paste Require regular re-authentication Constrain external applications Wipe data after security event Constrain URL Schemes Online access only Block camera Constrain Wi-Fi networks Block microphone Require internal network Block screen capture Constrain network access Block email compose App update grace period Disable print Require device encryption Require Citrix Worx Homeauthentication Require device pattern screen lock
  • 30. Mobile Device Deployment Public App Store Mobile Application Management (MAM) Mobile Device Management (MDM)
  • 31. Mobile Device Deployment Public App Store Mobile Application Management (MAM) Mobile Device Management (MDM)
  • 32. Windows / OS X Device Registration •Restricts login to devices only with a valid access key
  • 33. Sharing Controls Blacklist / Whitelist •Prohibit sharing with specific email domains •Restrict sharing to only specific email domains Require Client Login •Disables anonymous sharing of documents •Restricts ability for recipients to forward shared documents to someone else Client 2-step verification •2-step verification on untrusted devices using SMS messages, Google Authenticator
  • 35. ShareFilewith StorageZones Choose where your data is stored Meet compliance & security requirements Best economics, most elastic Cloud On-Prem
  • 36. ShareFilewith StorageZones Choose where your data is stored Meet compliance & security requirements Best economics, most elastic Cloud On-Prem Existing Systems StorageZone Connectors Mobile productivity with existing data sources
  • 37. ShareFilewith Citrix-managed StorageZones Object Store ShareFile.com
  • 39. ShareFile StorageZones Object Store ShareFile.com Citrix-managed Customer-managed Network Shares StorageZone Connectors Existing Systems
  • 40. ShareFile StorageZoneoptions Object Store Existing Systems •Cloud-optimized storage technology •Either Citrix-managed or customer-managed •Full ShareFile feature set (Sync, Send/Share, retention, versioning, etc.) •Network shares, SharePoint •Typically in customer datacenter •Feature set determined by repositories capabilities
  • 41.
  • 43. Authentication Options ShareFile Managed •Uses email address and a ShareFile password •Passwords are stored hashed in the ShareFile Control Plane •Admin portal supports password policy management •Unified storefront for all applications, data and services •Instant user provisioning and de- provisioning •Single sign-on with Citrix Worx •Real-time SaaS application monitoring •Comprehensive access control policies Customer IdP •Requires customer provided and configured SAML 2.0 identity provider •Supports Forms, Basic, and Windows Integrated protocols •Tested with ADFS 2.0, PingFederate, SiteMinder, Okta •Supported only with ‘Enterprise’ tools
  • 44. SAML Authentication •Employee account is still required in ShareFile •Folder Access Control •Licensing •Employees will be matched by email address •Employee password will never be sent to SaaS Application Tier •ShareFile Authentication can be blocked for Employee users •Basic, Integrated Windows Authentication, and Forms are supported for all Enterprise clients
  • 45. 7 8 9 1 2 3 Service Provider (sharefile.com) Identity Provider (e.g. XenMobile, ADFS) 4 5 6 1 Client requests ShareFile SSO login URL 2 Client discovers identity provider 3 Client redirected to identify provider 4 Client requests identity provider URL 5 Identity Provider identifies the user 6 User is authenticated and is redirected to Assertion Consumer Service URL with SAML response 7 User agent requests ACS URL 8 ACS validates SAML response and redirects user agent to ShareFile URL 9 User agent requests ShareFile URL User has access SAML How it works Client
  • 46. IdP / SP Authentication ShareFile.com Customer Active Directory Rights SAML Service Provider (SP) SAML Identity Provider (IdP) Trust Claims LDAP Signed
  • 47. So how do we get the Identity? •<NameIDFormat="urn:oasis:names:tc:SAML:1.1:nameid- format:emailAddress">joel.stocker@citrix.com</NameID>... Attribute Store (AD) Rule Transform Claims
  • 48. SAML: IDP-Initiated Sign-On SAML Identity Provider (IDP) ShareFile.com Service Provier (SP) Go to sharefile.com 302 + Claims https://account.sharefile.com/saml/acs + Claims
  • 49. SAML: SP-Initiated Sign-On SAML Identity Provider (IDP) ShareFile.com Service Provider (SP) ../adfs/ls + 302 + Request https://account.sharefile.com/saml/acs + Claims https://account.sharefile.com/saml/login Request 401(Auth Challenge) ../adfs/ls + R e q u e s t + 302 + Claims
  • 56. Solutions Through Platforms ShareFile Clients Platform Partners Connectors SDK (Data Sources) V3 API
  • 57. ShareFilePlatform Connectors SDK RESTfulAPI PowerShell SDK .NET SDK Desktop Apps Web Mobile Apps Java SDK Objective-C SDK JavascriptSDK Personal Cloud SharePoint Network Shares ShareFile
  • 60. Client Communication SZC ShareFile.com SaaS Application Tier •*.sharefile.com •*.sharefile.eu Documents •StorageZonesController •Amazon, Azure, on-premises SAML IdP •XenMobile •Microsoft ADFS v2 •CA SiteMinder •PingFederate/Identity Clients •Mobile, Windows, Outlook, OS X, Web •XenDesktop / XenApp 173.199.5.0/24 78.108.127.0/24
  • 61. StorageZonesController Req& Communication StorageZonesController •Windows Server 2008 R2 or 2012 R2 •IIS Services with ASP.NET •.NET Framework 4.5 •2 vCPU, 4GB RAM •Public IP address with DNS •Public SSL certificate SZC SZC ShareFile.com SaaS Application Tier •*.sharefile.com173.199.5.0/24 •*.sharefile.eu78.108.127.0/24 Object Store Network Shares ShareFile Data •CIFS/SMB file share •Service account SharePoint •http/https Network Shares •CIFS/SMB Internal
  • 62. External Firewall Internal Firewall Port 80on localhost health check Port 80on localhost health check Port 443 Port80 or 443 (recommended) Inbound from * on Port 443 FQDN on External DNS with valid Public SSL cert Outbound to *.sharefile.com 173.199.5.0/24 *.sharefile.eu78.108.127.0/24 Port 443 DMZ Proxy (e.g. NetScaler) ShareFIle StorageZone Controller(s) (physical or virtual) ShareFile StorageZones Networking Diagram
  • 63. ShareFile Client NetScaler App Controller Device Manager DMZ Port 80 or 443 SZC.company.com StorageZone Controller Internet & Remote Users Internal Network Port 443 Port 443 App Controller User Provisioning Worx Web Worx Mail Worx Home SharePoint File Server Active Directory Port 443 Port 443 Port 389 or 636 Port 80 or 443 SMB Port 389 or 636 Optional Optional Citrix-Managed Customer-Managed
  • 64. ShareFile NetScaler DMZ Port 80 or 443 SZC.company.com StorageZone Controller Internet & Remote Users Internal Network Port 80 or 443 Port 443 App Controller User Provisioning SharePoint File Server Active Directory Port 443 Port 443 Port 389 or 636 Port 80 or 443 SMB Port 389 or 636 Optional Optional IdP Citrix-Managed Customer-Managed
  • 65. DMZ App Communication SZC SZC Data / Connectors Identity Provider StorageZone Controller ShareFile.com NetScaler SSO /saml/login SSO URL Download / Upload URL Internal Network Internet
  • 66. AppController Netscaler ____ ____ ____ ShareFile Docs ____ ____ ____ ShareFile_SAML_SP .mdx ShareFile& XenMobileAppController
  • 67. StorageZonesControllers NetScaler Inserting NetScaler Content Switching vServer Load Balancing vServer / /cifs /sp ShareFile.com Load Balancing vServer w/auth StorageZone request CIFS/SharePoint request StorageZone request SharePoint request CIFS request Hash Validation Authentication LDAP
  • 68. StorageZoneControllers NetScaler NetScaler ShareFile Data Flow Content Switching vServer Load Balancing vServer / ShareFile.com StorageZone request StorageZone request Hash Validation
  • 69. StorageZoneControllers NetScaler NetScaler ShareFile Data Flow Content Switching vServer Load Balancing vServer ShareFile.com CIFS or SharePoint request LDAP AAA Authentication /sp /cifs CIFS request SharePoint request
  • 70. Q & A
  • 71. Work better. Live better.