SlideShare a Scribd company logo
1 of 6
Download to read offline
Secure application delivery for a mobile workforce White Paper
citrix.com
Secure application
delivery for a
mobile workforce
Empowering people to use
Windows applications and
native mobile apps on any type
of device—with full security
2
citrix.com
Secure application delivery for a mobile workforce White Paper
Mobility has given people new freedom to work
anywhere, at any time—but it has also brought
endless complications for IT. Instead of relying solely
on Windows applications running on Windows-based
devices, people now use native mobile apps for work
as well, and they need access to both types on any
type of device, from Windows-based and Mac laptops
to tablets and smartphones.
Mobile apps have introduced user experience
challenges. Unlike client-server applications, mobile
apps distance the client from the back-end database,
introducing user experience challenges—as does the
tendency of mobile apps to work differently on different
mobile platforms. Application management and delivery
has become more complex as well; how do you get
the latest applications to mobile employees on all their
devices? As people roam across locations and devices,
can you ensure strict security for the most sensitive
enterprise content, while allowing more flexibility for less
sensitive data?
Citrix XenApp empowers new levels of enterprise mobility and productivity by
providing a streamlined way to deliver Windows applications and data securely on
any device, anywhere people choose to work, with a great user experience. Citrix
XenMobile complements XenApp with security and control for native mobile apps and
data on any device. Providing a complete, end-to-end mobility solution, the solution
lets you manage any device people choose—corporate-owned or personal—as well
as the applications and data they use.
Delivering the applications people need, the way they need them
When people need to get work done, it’s all about the applications. In less mobile
times, IT could simply deploy enterprise applications on desktop computers to
provide people with all the tools their productivity depended on. Now enterprise
applications are only part of the picture—and the devices people use come in more
shapes and platforms than ever. To address the broader requirements of today’s
mobile workforce, it’s important to begin with a clear understanding of the evolving
application landscape.
3
citrix.com
Secure application delivery for a mobile workforce White Paper
Traditional enterprise applications still play a vital role in most organizations,
of course. While they support a variety of business processes and use cases,
they share certain core attributes. Built for a Windows operating system, they
provide a broad set of functionality and a robust user interface to interact with
large data sets—often including highly sensitive business information. They require
an available network connection between the client and a back-end database.
Most importantly, these are powerful, mission-critical applications that drive the
business—think SAP and Siebel.
Enterprise mobile apps are, as the name suggests, enterprise applications
designed to run on mobile devices such as tablets and smartphones—but their
distinctions from traditional apps go further. Enterprise mobile apps often exist in
multiple versions, each built for a different mobile platform such as Apple iOS or
Android. Smaller than enterprise applications, they offer more narrowly defined
functionality and manipulate a limited set of data. Instead of offering a sprawling,
Windows-style interface, they are optimized for a small screen, with quick access
to the most popular functions. Touch-screen controls take the place of track pad
or two-button mouse inputs. Usually lightweight in design, an enterprise mobile
app either pulls a small data set across the mobile network to the mobile device or
sends commands over the mobile network to a backend database. Depending on
how it handles data, a mobile app may also be usable offline.
Enterprise mobile apps come in two forms:
Mobilized Windows applications—versions of traditional enterprise
applications adapted by IT for use on mobile devices
Native mobile apps—mobile apps built, often by third party vendors, explicitly
and exclusively for use on mobile platforms
To enable full enterprise mobility, IT needs to be able to mobilize Windows apps
securely and efficiently—as well as to secure native mobile apps for use within
the enterprise.
Mobilizing Windows applications with Citrix XenApp
Your organization has invested vast resources procuring and developing Windows
applications to support every aspect of your business; now, you need a simple,
efficient way to mobilize them. That means addressing challenges in several areas.
Development – Mobilizing the huge number of Windows applications in your
environment would be challenging enough if you only had to do it for one
platform—but as bring-your-own device (BYOD) becomes the norm, you need
to ensure full compatibility with a proliferating variety of device types and mobile
operating systems. To enable full productivity, you need to give people a native
mobile-like experience with Windows applications, including touch-screen inputs
and an interface optimized for smaller displays. You also need to ensure that the
custom applications you develop in the future will be fully mobile, accessible and
optimized for any-device productivity.
4
citrix.com
Secure application delivery for a mobile workforce White Paper
Management and delivery – Mobility is supposed to enable seamless,
convenient access across devices and locations—not confuse people with
multiple methods for accessing the latest applications depending on the type of
application or device they’re using. IT needs a single, unified channel to make the
full range of applications available on any device people choose.
Security – While some types of information need to remain secure in the
datacenter to meet compliance or risk management mandates, other types,
such as Microsoft Exchange account data used to access email through a local
client, can be allowed to reside on mobile devices for offline use—provided it can
be stored securely. Your mobility strategy should provide the flexibility to handle
different types of mobile data differently.
User experience – Windows applications were designed to run best in a
traditional enterprise environment—not on mobile devices where packets may
have to travel over mobile networks and connections of varying quality to reach
the datacenter. Poor Windows application performance on mobile devices can
quickly disillusion users about the effectiveness of your mobility strategy.
XenApp helped power the last transformation of IT by enabling on-demand
delivery of centrally managed applications to any computer in the enterprise. Now,
as mobility and BYOD bring new requirements for IT, XenApp helps enterprises
transform their application environment once more to let people access the
applications they need on any type of device—including their own personal tablets
and smartphones.
Mobilize Windows-based enterprise applications
XenApp makes it simple to mobilize Windows applications for use on smartphones
and tablets. Instead of writing new mobile versions of your enterprise applications,
you can use Citrix HDX Mobile technologies to tweak their interfaces to act like
native mobile apps on mobile devices—without having to touch their back-end
code. An optimized mobile look and feel includes a touch interface, multi-touch
gestures, native menu controls, camera and GPS support. A smaller subset of
functions fits mobile use cases more efficiently than the full-fledged enterprise
application version. By using a single, centrally managed application to support
users on any type of device—desktop, laptop, thin client, tablet or smartphone—
you can dramatically reduce development cycles while making new applications
available in every usage scenario simultaneously.
Simplify application management and delivery on any device
For your workforce, XenApp makes accessing Windows applications on mobile
devices as easy as it would be on a traditional computer. Citrix Receiver provides
a single point of access to every kind of application in your environment—Windows
or native mobile—on any kind of device.
5
citrix.com
Secure application delivery for a mobile workforce White Paper
Secure sensitive data while allowing user flexibility
Instead of transferring data to the device, as mobile apps do, XenApp provides remote
access to centrally managed content. Although devices—and the people who use
them—are mobile, the data itself stays secure and protected within the datacenter.
Ensure a native-like user experience for mobilized Windows applications
Because a XenApp-powered Windows application runs in the datacenter,
alongside its database, it delivers better performance than a locally installed
mobile app sending queries across mobile networks. XenApp further enhances the
performance of Windows applications accessed on mobile devices by intelligently
coping with the variability and packet loss of mobile networks and improving
graphics and multimedia with hardware acceleration on tablets and smartphones.
Managing, securing and deploying native mobile apps with Citrix
XenMobile
XenApp provides a simple and efficient solution to mobilize Windows
applications—but what about native mobile apps? These aren’t just wildly popular
with consumers; they’re quickly catching on in the enterprise as well. As lines
between corporate and consumer technology continue to blur, people may
prefer—or insist on—using an increasing variety of apps on a variety of different
devices. To allow people to work more productively, IT needs a way to enforce
enterprise security for any kind of app, as well as its data, on any kind of device.
This means ensuring the security of the device itself: has it been jailbroken? What
password protections have been applied? Can you be sure that local enterprise
data will be protected effectively?
Citrix XenMobile completes your enterprise mobility strategy by complementing the
Windows application mobilization provided by XenApp with capabilities to manage,
secure and deploy native mobile apps.
Management – Secure device push and wipe processes make it much simpler
to provision and remove apps from mobile devices. IT can push a set of enterprise
mobile apps to any device to fully equip a new BYO device or to speed onboarding
for a new employee without the need to navigate an app store and download them
one by one. When an employee leaves the company, IT can remotely wipe all
enterprise content from the device without touching any personal apps or data it
contains.
Security – XenMobile enhances security for any native mobile app by letting
you apply more than 60 different policies, including passwords, PINs, camera
disablement and more, without disrupting the apps native code. A micro-VPN
connects the mobile app to the back-end database for secure data access. For
any data transferred to the mobile device—whether for a mobilized Windows app
as permitted by XenApp policy, or a native mobile app—XenMobile allows full
encryption at rest and in motion. Enterprise mobile apps can be containerized
to separate them from personal apps on the same device and prevent data
transfer. Comprehensive mobile device management (MDM) features let you
enforce password protection, restrict corporate network access from jailbroken
devices and lock or wipe data selectively on lost or stolen devices.
About Citrix
Citrix (NASDAQ:CTXS) is a leader in virtualization, networking and cloud infrastructure to enable new ways for people to work better. Citrix
solutions help IT and service providers to build, manage and secure, virtual and mobile workspaces that seamlessly deliver apps, desktops,
data and services to anyone, on any device, over any network or cloud. This year Citrix is celebrating 25 years of innovation, making IT simpler
and people more productive with mobile workstyles. With annual revenue in 2013 of $2.9 billion, Citrix solutions are in use at more than 330,000
organizations and by over 100 million people globally. Learn more at www.citrix.com.
Copyright © 2014 Citrix Systems, Inc. All rights reserved. Citrix, XenApp, XenMobile, HDX and Citrix Receiver are trademarks of Citrix Systems,
Inc. and/or one of its subsidiaries, and may be registered in the U.S. and other countries. Other product and company names mentioned herein
may be trademarks of their respective companies.
citrix.com0214/PDF
6
Corporate Headquarters
Fort Lauderdale, FL, USA
Silicon Valley Headquarters
Santa Clara, CA, USA
EMEA Headquarters
Schaffhausen, Switzerland
India Development Center
Bangalore, India
Online Division Headquarters
Santa Barbara, CA, USA
Pacific Headquarters
Hong Kong, China
Latin America Headquarters
Coral Gables, FL, USA
UK Development Center
Chalfont, United Kingdom
Secure application delivery for a mobile workforce White Paper
User experience – In the past, early mobility adopters often carried two
different smartphones: one, a corporate-owned device provisioned and locked-
down by IT and another for personal use with all their favorite apps. With
XenMobile, people can experience the best of both worlds with BYOD, using
the same device for both work and personal life. IT can fully control and secure
enterprise apps and data on the device without interfering with personal content.
In the event of device loss or theft, remote lock and wipe capabilities let IT
selectively wipe business content on BYOD devices while leaving personal data
and apps untouched.
Together, XenApp and XenMobile provide a single, integrated solution to mobilize
your workforce and enable BYOD.
Conclusion
Citrix XenApp transforms your organization by supporting the mobile workstyles
people rely on to get their work done wherever they can be most productive.
XenApp provides complete tools to securely mobilize any Windows application
to provide an optimal experience on any type of device. Citrix XenMobile
complements XenApp with capabilities to manage, secure and deploy native
mobile apps—through the same, integrated solution. Designed to help people
become as productive as possible, with full freedom of choice for both devices and
applications, the solution empowers full workforce mobility without compromising
on security.
For more information
•	 XenApp
•	 XenMobile

More Related Content

More from Citrix

Manage Risk by Protecting the Apps and Data That Drive Business Productivity
Manage Risk by Protecting the Apps and Data That Drive Business ProductivityManage Risk by Protecting the Apps and Data That Drive Business Productivity
Manage Risk by Protecting the Apps and Data That Drive Business ProductivityCitrix
 
How do Organizations Plan to Assure Application Delivery in a Multi-Cloud World?
How do Organizations Plan to Assure Application Delivery in a Multi-Cloud World?How do Organizations Plan to Assure Application Delivery in a Multi-Cloud World?
How do Organizations Plan to Assure Application Delivery in a Multi-Cloud World?Citrix
 
Workforce Flexibility Can Drive Greater Engagement & Productivity
Workforce Flexibility Can Drive Greater Engagement & ProductivityWorkforce Flexibility Can Drive Greater Engagement & Productivity
Workforce Flexibility Can Drive Greater Engagement & ProductivityCitrix
 
Citrix Cloud Services: Total Economic Benefits Assessment Guide
Citrix Cloud Services: Total Economic Benefits Assessment GuideCitrix Cloud Services: Total Economic Benefits Assessment Guide
Citrix Cloud Services: Total Economic Benefits Assessment GuideCitrix
 
The Growing U.S. IT Productivity Gap
The Growing U.S. IT Productivity GapThe Growing U.S. IT Productivity Gap
The Growing U.S. IT Productivity GapCitrix
 
Citrix Cloud Services: Total Economic Benefits Assessment Guide
Citrix Cloud Services: Total Economic Benefits Assessment GuideCitrix Cloud Services: Total Economic Benefits Assessment Guide
Citrix Cloud Services: Total Economic Benefits Assessment GuideCitrix
 
Citrix Synergy 2017: Technology Keynote Sketch Notes
Citrix Synergy 2017: Technology Keynote Sketch NotesCitrix Synergy 2017: Technology Keynote Sketch Notes
Citrix Synergy 2017: Technology Keynote Sketch NotesCitrix
 
Citrix Synergy 2017: Malcolm Gladwell Innovation Super Session Sketch Notes
Citrix Synergy 2017: Malcolm Gladwell Innovation Super Session Sketch NotesCitrix Synergy 2017: Malcolm Gladwell Innovation Super Session Sketch Notes
Citrix Synergy 2017: Malcolm Gladwell Innovation Super Session Sketch NotesCitrix
 
Synergy 2017: Colin Powell Innovation Super Session Sketch Notes
Synergy 2017: Colin Powell Innovation Super Session Sketch NotesSynergy 2017: Colin Powell Innovation Super Session Sketch Notes
Synergy 2017: Colin Powell Innovation Super Session Sketch NotesCitrix
 
Who Are Citrix Customers?
Who Are Citrix Customers?Who Are Citrix Customers?
Who Are Citrix Customers?Citrix
 
Manage risk by protecting apps, data and usage
Manage risk by protecting apps, data and usageManage risk by protecting apps, data and usage
Manage risk by protecting apps, data and usageCitrix
 
Enterprise Case Study: Enabling a More Mobile Way of Working
Enterprise Case Study: Enabling a More Mobile Way of Working Enterprise Case Study: Enabling a More Mobile Way of Working
Enterprise Case Study: Enabling a More Mobile Way of Working Citrix
 
Life in the Digital Workspace
Life in the Digital WorkspaceLife in the Digital Workspace
Life in the Digital WorkspaceCitrix
 
Comparing traditional workspaces to digital workspaces
Comparing traditional workspaces to digital workspacesComparing traditional workspaces to digital workspaces
Comparing traditional workspaces to digital workspacesCitrix
 
4 Ways to Ensure a Smooth Windows 10 Migration
4 Ways to Ensure a Smooth Windows 10 Migration4 Ways to Ensure a Smooth Windows 10 Migration
4 Ways to Ensure a Smooth Windows 10 MigrationCitrix
 
Citrix Paddington
Citrix PaddingtonCitrix Paddington
Citrix PaddingtonCitrix
 
The Security Compliance Countdown: How to Get Ahead of the GDPR [Infographic]
The Security Compliance Countdown: How to Get Ahead of the GDPR [Infographic]The Security Compliance Countdown: How to Get Ahead of the GDPR [Infographic]
The Security Compliance Countdown: How to Get Ahead of the GDPR [Infographic]Citrix
 
Transforming Business with Citrix: Customers Share Their Stories.
Transforming Business with Citrix: Customers Share Their Stories.Transforming Business with Citrix: Customers Share Their Stories.
Transforming Business with Citrix: Customers Share Their Stories.Citrix
 
Citrix & Canalys: Northern European Channel Partners in a State of Transforma...
Citrix & Canalys: Northern European Channel Partners in a State of Transforma...Citrix & Canalys: Northern European Channel Partners in a State of Transforma...
Citrix & Canalys: Northern European Channel Partners in a State of Transforma...Citrix
 
Secure Remote Browser
Secure Remote BrowserSecure Remote Browser
Secure Remote BrowserCitrix
 

More from Citrix (20)

Manage Risk by Protecting the Apps and Data That Drive Business Productivity
Manage Risk by Protecting the Apps and Data That Drive Business ProductivityManage Risk by Protecting the Apps and Data That Drive Business Productivity
Manage Risk by Protecting the Apps and Data That Drive Business Productivity
 
How do Organizations Plan to Assure Application Delivery in a Multi-Cloud World?
How do Organizations Plan to Assure Application Delivery in a Multi-Cloud World?How do Organizations Plan to Assure Application Delivery in a Multi-Cloud World?
How do Organizations Plan to Assure Application Delivery in a Multi-Cloud World?
 
Workforce Flexibility Can Drive Greater Engagement & Productivity
Workforce Flexibility Can Drive Greater Engagement & ProductivityWorkforce Flexibility Can Drive Greater Engagement & Productivity
Workforce Flexibility Can Drive Greater Engagement & Productivity
 
Citrix Cloud Services: Total Economic Benefits Assessment Guide
Citrix Cloud Services: Total Economic Benefits Assessment GuideCitrix Cloud Services: Total Economic Benefits Assessment Guide
Citrix Cloud Services: Total Economic Benefits Assessment Guide
 
The Growing U.S. IT Productivity Gap
The Growing U.S. IT Productivity GapThe Growing U.S. IT Productivity Gap
The Growing U.S. IT Productivity Gap
 
Citrix Cloud Services: Total Economic Benefits Assessment Guide
Citrix Cloud Services: Total Economic Benefits Assessment GuideCitrix Cloud Services: Total Economic Benefits Assessment Guide
Citrix Cloud Services: Total Economic Benefits Assessment Guide
 
Citrix Synergy 2017: Technology Keynote Sketch Notes
Citrix Synergy 2017: Technology Keynote Sketch NotesCitrix Synergy 2017: Technology Keynote Sketch Notes
Citrix Synergy 2017: Technology Keynote Sketch Notes
 
Citrix Synergy 2017: Malcolm Gladwell Innovation Super Session Sketch Notes
Citrix Synergy 2017: Malcolm Gladwell Innovation Super Session Sketch NotesCitrix Synergy 2017: Malcolm Gladwell Innovation Super Session Sketch Notes
Citrix Synergy 2017: Malcolm Gladwell Innovation Super Session Sketch Notes
 
Synergy 2017: Colin Powell Innovation Super Session Sketch Notes
Synergy 2017: Colin Powell Innovation Super Session Sketch NotesSynergy 2017: Colin Powell Innovation Super Session Sketch Notes
Synergy 2017: Colin Powell Innovation Super Session Sketch Notes
 
Who Are Citrix Customers?
Who Are Citrix Customers?Who Are Citrix Customers?
Who Are Citrix Customers?
 
Manage risk by protecting apps, data and usage
Manage risk by protecting apps, data and usageManage risk by protecting apps, data and usage
Manage risk by protecting apps, data and usage
 
Enterprise Case Study: Enabling a More Mobile Way of Working
Enterprise Case Study: Enabling a More Mobile Way of Working Enterprise Case Study: Enabling a More Mobile Way of Working
Enterprise Case Study: Enabling a More Mobile Way of Working
 
Life in the Digital Workspace
Life in the Digital WorkspaceLife in the Digital Workspace
Life in the Digital Workspace
 
Comparing traditional workspaces to digital workspaces
Comparing traditional workspaces to digital workspacesComparing traditional workspaces to digital workspaces
Comparing traditional workspaces to digital workspaces
 
4 Ways to Ensure a Smooth Windows 10 Migration
4 Ways to Ensure a Smooth Windows 10 Migration4 Ways to Ensure a Smooth Windows 10 Migration
4 Ways to Ensure a Smooth Windows 10 Migration
 
Citrix Paddington
Citrix PaddingtonCitrix Paddington
Citrix Paddington
 
The Security Compliance Countdown: How to Get Ahead of the GDPR [Infographic]
The Security Compliance Countdown: How to Get Ahead of the GDPR [Infographic]The Security Compliance Countdown: How to Get Ahead of the GDPR [Infographic]
The Security Compliance Countdown: How to Get Ahead of the GDPR [Infographic]
 
Transforming Business with Citrix: Customers Share Their Stories.
Transforming Business with Citrix: Customers Share Their Stories.Transforming Business with Citrix: Customers Share Their Stories.
Transforming Business with Citrix: Customers Share Their Stories.
 
Citrix & Canalys: Northern European Channel Partners in a State of Transforma...
Citrix & Canalys: Northern European Channel Partners in a State of Transforma...Citrix & Canalys: Northern European Channel Partners in a State of Transforma...
Citrix & Canalys: Northern European Channel Partners in a State of Transforma...
 
Secure Remote Browser
Secure Remote BrowserSecure Remote Browser
Secure Remote Browser
 

Recently uploaded

Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfhans926745
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdfChristopherTHyatt
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 

Recently uploaded (20)

Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 

Whitepaper: Secure application delivery for a mobile workforce

  • 1. Secure application delivery for a mobile workforce White Paper citrix.com Secure application delivery for a mobile workforce Empowering people to use Windows applications and native mobile apps on any type of device—with full security
  • 2. 2 citrix.com Secure application delivery for a mobile workforce White Paper Mobility has given people new freedom to work anywhere, at any time—but it has also brought endless complications for IT. Instead of relying solely on Windows applications running on Windows-based devices, people now use native mobile apps for work as well, and they need access to both types on any type of device, from Windows-based and Mac laptops to tablets and smartphones. Mobile apps have introduced user experience challenges. Unlike client-server applications, mobile apps distance the client from the back-end database, introducing user experience challenges—as does the tendency of mobile apps to work differently on different mobile platforms. Application management and delivery has become more complex as well; how do you get the latest applications to mobile employees on all their devices? As people roam across locations and devices, can you ensure strict security for the most sensitive enterprise content, while allowing more flexibility for less sensitive data? Citrix XenApp empowers new levels of enterprise mobility and productivity by providing a streamlined way to deliver Windows applications and data securely on any device, anywhere people choose to work, with a great user experience. Citrix XenMobile complements XenApp with security and control for native mobile apps and data on any device. Providing a complete, end-to-end mobility solution, the solution lets you manage any device people choose—corporate-owned or personal—as well as the applications and data they use. Delivering the applications people need, the way they need them When people need to get work done, it’s all about the applications. In less mobile times, IT could simply deploy enterprise applications on desktop computers to provide people with all the tools their productivity depended on. Now enterprise applications are only part of the picture—and the devices people use come in more shapes and platforms than ever. To address the broader requirements of today’s mobile workforce, it’s important to begin with a clear understanding of the evolving application landscape.
  • 3. 3 citrix.com Secure application delivery for a mobile workforce White Paper Traditional enterprise applications still play a vital role in most organizations, of course. While they support a variety of business processes and use cases, they share certain core attributes. Built for a Windows operating system, they provide a broad set of functionality and a robust user interface to interact with large data sets—often including highly sensitive business information. They require an available network connection between the client and a back-end database. Most importantly, these are powerful, mission-critical applications that drive the business—think SAP and Siebel. Enterprise mobile apps are, as the name suggests, enterprise applications designed to run on mobile devices such as tablets and smartphones—but their distinctions from traditional apps go further. Enterprise mobile apps often exist in multiple versions, each built for a different mobile platform such as Apple iOS or Android. Smaller than enterprise applications, they offer more narrowly defined functionality and manipulate a limited set of data. Instead of offering a sprawling, Windows-style interface, they are optimized for a small screen, with quick access to the most popular functions. Touch-screen controls take the place of track pad or two-button mouse inputs. Usually lightweight in design, an enterprise mobile app either pulls a small data set across the mobile network to the mobile device or sends commands over the mobile network to a backend database. Depending on how it handles data, a mobile app may also be usable offline. Enterprise mobile apps come in two forms: Mobilized Windows applications—versions of traditional enterprise applications adapted by IT for use on mobile devices Native mobile apps—mobile apps built, often by third party vendors, explicitly and exclusively for use on mobile platforms To enable full enterprise mobility, IT needs to be able to mobilize Windows apps securely and efficiently—as well as to secure native mobile apps for use within the enterprise. Mobilizing Windows applications with Citrix XenApp Your organization has invested vast resources procuring and developing Windows applications to support every aspect of your business; now, you need a simple, efficient way to mobilize them. That means addressing challenges in several areas. Development – Mobilizing the huge number of Windows applications in your environment would be challenging enough if you only had to do it for one platform—but as bring-your-own device (BYOD) becomes the norm, you need to ensure full compatibility with a proliferating variety of device types and mobile operating systems. To enable full productivity, you need to give people a native mobile-like experience with Windows applications, including touch-screen inputs and an interface optimized for smaller displays. You also need to ensure that the custom applications you develop in the future will be fully mobile, accessible and optimized for any-device productivity.
  • 4. 4 citrix.com Secure application delivery for a mobile workforce White Paper Management and delivery – Mobility is supposed to enable seamless, convenient access across devices and locations—not confuse people with multiple methods for accessing the latest applications depending on the type of application or device they’re using. IT needs a single, unified channel to make the full range of applications available on any device people choose. Security – While some types of information need to remain secure in the datacenter to meet compliance or risk management mandates, other types, such as Microsoft Exchange account data used to access email through a local client, can be allowed to reside on mobile devices for offline use—provided it can be stored securely. Your mobility strategy should provide the flexibility to handle different types of mobile data differently. User experience – Windows applications were designed to run best in a traditional enterprise environment—not on mobile devices where packets may have to travel over mobile networks and connections of varying quality to reach the datacenter. Poor Windows application performance on mobile devices can quickly disillusion users about the effectiveness of your mobility strategy. XenApp helped power the last transformation of IT by enabling on-demand delivery of centrally managed applications to any computer in the enterprise. Now, as mobility and BYOD bring new requirements for IT, XenApp helps enterprises transform their application environment once more to let people access the applications they need on any type of device—including their own personal tablets and smartphones. Mobilize Windows-based enterprise applications XenApp makes it simple to mobilize Windows applications for use on smartphones and tablets. Instead of writing new mobile versions of your enterprise applications, you can use Citrix HDX Mobile technologies to tweak their interfaces to act like native mobile apps on mobile devices—without having to touch their back-end code. An optimized mobile look and feel includes a touch interface, multi-touch gestures, native menu controls, camera and GPS support. A smaller subset of functions fits mobile use cases more efficiently than the full-fledged enterprise application version. By using a single, centrally managed application to support users on any type of device—desktop, laptop, thin client, tablet or smartphone— you can dramatically reduce development cycles while making new applications available in every usage scenario simultaneously. Simplify application management and delivery on any device For your workforce, XenApp makes accessing Windows applications on mobile devices as easy as it would be on a traditional computer. Citrix Receiver provides a single point of access to every kind of application in your environment—Windows or native mobile—on any kind of device.
  • 5. 5 citrix.com Secure application delivery for a mobile workforce White Paper Secure sensitive data while allowing user flexibility Instead of transferring data to the device, as mobile apps do, XenApp provides remote access to centrally managed content. Although devices—and the people who use them—are mobile, the data itself stays secure and protected within the datacenter. Ensure a native-like user experience for mobilized Windows applications Because a XenApp-powered Windows application runs in the datacenter, alongside its database, it delivers better performance than a locally installed mobile app sending queries across mobile networks. XenApp further enhances the performance of Windows applications accessed on mobile devices by intelligently coping with the variability and packet loss of mobile networks and improving graphics and multimedia with hardware acceleration on tablets and smartphones. Managing, securing and deploying native mobile apps with Citrix XenMobile XenApp provides a simple and efficient solution to mobilize Windows applications—but what about native mobile apps? These aren’t just wildly popular with consumers; they’re quickly catching on in the enterprise as well. As lines between corporate and consumer technology continue to blur, people may prefer—or insist on—using an increasing variety of apps on a variety of different devices. To allow people to work more productively, IT needs a way to enforce enterprise security for any kind of app, as well as its data, on any kind of device. This means ensuring the security of the device itself: has it been jailbroken? What password protections have been applied? Can you be sure that local enterprise data will be protected effectively? Citrix XenMobile completes your enterprise mobility strategy by complementing the Windows application mobilization provided by XenApp with capabilities to manage, secure and deploy native mobile apps. Management – Secure device push and wipe processes make it much simpler to provision and remove apps from mobile devices. IT can push a set of enterprise mobile apps to any device to fully equip a new BYO device or to speed onboarding for a new employee without the need to navigate an app store and download them one by one. When an employee leaves the company, IT can remotely wipe all enterprise content from the device without touching any personal apps or data it contains. Security – XenMobile enhances security for any native mobile app by letting you apply more than 60 different policies, including passwords, PINs, camera disablement and more, without disrupting the apps native code. A micro-VPN connects the mobile app to the back-end database for secure data access. For any data transferred to the mobile device—whether for a mobilized Windows app as permitted by XenApp policy, or a native mobile app—XenMobile allows full encryption at rest and in motion. Enterprise mobile apps can be containerized to separate them from personal apps on the same device and prevent data transfer. Comprehensive mobile device management (MDM) features let you enforce password protection, restrict corporate network access from jailbroken devices and lock or wipe data selectively on lost or stolen devices.
  • 6. About Citrix Citrix (NASDAQ:CTXS) is a leader in virtualization, networking and cloud infrastructure to enable new ways for people to work better. Citrix solutions help IT and service providers to build, manage and secure, virtual and mobile workspaces that seamlessly deliver apps, desktops, data and services to anyone, on any device, over any network or cloud. This year Citrix is celebrating 25 years of innovation, making IT simpler and people more productive with mobile workstyles. With annual revenue in 2013 of $2.9 billion, Citrix solutions are in use at more than 330,000 organizations and by over 100 million people globally. Learn more at www.citrix.com. Copyright © 2014 Citrix Systems, Inc. All rights reserved. Citrix, XenApp, XenMobile, HDX and Citrix Receiver are trademarks of Citrix Systems, Inc. and/or one of its subsidiaries, and may be registered in the U.S. and other countries. Other product and company names mentioned herein may be trademarks of their respective companies. citrix.com0214/PDF 6 Corporate Headquarters Fort Lauderdale, FL, USA Silicon Valley Headquarters Santa Clara, CA, USA EMEA Headquarters Schaffhausen, Switzerland India Development Center Bangalore, India Online Division Headquarters Santa Barbara, CA, USA Pacific Headquarters Hong Kong, China Latin America Headquarters Coral Gables, FL, USA UK Development Center Chalfont, United Kingdom Secure application delivery for a mobile workforce White Paper User experience – In the past, early mobility adopters often carried two different smartphones: one, a corporate-owned device provisioned and locked- down by IT and another for personal use with all their favorite apps. With XenMobile, people can experience the best of both worlds with BYOD, using the same device for both work and personal life. IT can fully control and secure enterprise apps and data on the device without interfering with personal content. In the event of device loss or theft, remote lock and wipe capabilities let IT selectively wipe business content on BYOD devices while leaving personal data and apps untouched. Together, XenApp and XenMobile provide a single, integrated solution to mobilize your workforce and enable BYOD. Conclusion Citrix XenApp transforms your organization by supporting the mobile workstyles people rely on to get their work done wherever they can be most productive. XenApp provides complete tools to securely mobilize any Windows application to provide an optimal experience on any type of device. Citrix XenMobile complements XenApp with capabilities to manage, secure and deploy native mobile apps—through the same, integrated solution. Designed to help people become as productive as possible, with full freedom of choice for both devices and applications, the solution empowers full workforce mobility without compromising on security. For more information • XenApp • XenMobile