SlideShare a Scribd company logo
1 of 5
Download to read offline
1Citrix.com
Unified Endpoint
Management
Security and Productivity
for the Mobile Enterprise
Unified Endpoint Management
2Citrix.com | White Paper | Unified Endpoint Management
The workplace has evolved from stationary
employees working on IT distributed Windows
work desktops and laptops to mobile users
playing and working on personal roaming lap-
tops, tablets and smart phones. Ten years ago
client management tools (CMT) such as Mic-
rosoft SCCM and LANDESK were the enter-
prise choice for managing scores, hundreds or
thousands of IT distributed Windows systems.
In an era of mobility, BYOD and the Internet
of Things (IoT), however, client management
tools (CMT) must evolve.
Instead, for a growing number of IT organi-
zations, the future lies in Unified Endpoint
Management (UEM), which combines CMT
with EMM (Enterprise Mobility Management)
providing a single pane of glass to manage
and secure, devices and operating systems,
whether laptops, smart phones, tablets or
any other device. Increasingly, UEM means
EMM, with the user, rather than the individual
device as the management focus. For users,
UEM helps enable a single unified workspace
with easy, consistent collaboration and infor-
mation access from any device.
In the next few years, many analysts believe
that organizations will employ EMM systems
to manage PC’s and Macs. This means that
EMM has the potential to manage and secure
more than one billion Windows 10 devices
over the next several years as more and more
organizations make the transition to the new
OS. Organizations moving into a more mobile,
global era should consider seriously whether
a partial or total transition from separate CMT
and EMM platforms to a single UEM tool such
as Citrix XenMobile makes sense for them.
In the next few years, organizations will also
need to extend unified management solutions
to cover the emerging enterprise Internet of
Things (IoT), including sensors, beacons and
other similar devices. Luckily, EMM solutions
such as Citrix XenMobile have been moving
forward to encompass IoT devices as well.
Why EMM
There are many reasons why UEM via EMM
makes sense for a lot of organizations.
Symplicity CMT and EMM tools have signifi-
cantly different ways of working, and, for
many organizations, require a separate set of
staff and training for each. It’s a no brainer
that managing all devices from a single pane
of glass makes more logical business sense.
Not only is it less expensive to invest in a
single management tool than two or three but
This means that EMM has the potential to
manage and secure more than one billion
Windows 10 devices over the next sever-
al years as more and more organizations
make the transition to the new OS.
3Citrix.com | White Paper | Unified Endpoint Management
significant operational savings can come in
reduced staff resources and training, allowing
organizations to leverage existing staff for
more strategic purposes.
Consistency in management, security and
usability is important for enterprise user
productivity and information protection. Even
small unintended differences in security and
management policies among devices, appli-
cations and information can expose holes in
the security infrastructure that allow hackers
and malware to penetrate the organization.
Consistency in mobile access to applications
and information is also important for user
productivity. UEM offers consistency in sev-
eral ways:
•It’s inherently easier to implement a single
set of enterprise management and security
policies across all devices and users with a
single UEM solution than with two separate
sets of tools.
•User helpdesk services and system trouble-
shooting are more consistent with a single
management platform, and with operating
systems, such as Windows 10, that are them-
selves have more consistent interfaces across
different types of devices.
•Reporting is obviously easier and more
comprehensive with a single platform, which
can be useful when planning and calculating
the costs of hardware and software upgrades
or refreshes.
•Windows 10 introduces its own consistency
with a common operating system, application
development tools and set of API’s across
desktop and mobile devices. Users can get all
their devices’ applications from a single se-
cure, corporate approved app store and work
with enterprise applications and information
both on their devices and the corporate net-
work in a much more consistent way.
•Microsoft recently announced the Centennial
App Converter, which will convert even legacy
Win32 apps into the Universal Windows
Platform apps, so organizations can add them
to the Windows app store, where they can
be administered by an EMM solution such as
XenMobile.
Mobile Friendly Management Conceived at a
time when devices were stationary, corporate
distributed, and mostly connected to the
enterprise LAN, CMT tools required desktops
and laptops to be LAN connected and joined
to an enterprise domain with a set of group
policy objects for initial configuration and
subsequent management to take place. A
user could not typically connect, configure
and upgrade his or her own device. This was
the job of IT, which acted as the ultimate
super user.
With legacy CMT solutions, IT spends a lot
of time creating one or a few sets of custom
system images and pushing them over the
LAN to a few, scores, or hundreds of network
connected desktops and laptops, or uses an
image deployment service for up to $25 per
system. With such a methodology, bringing
a new device on board or replacing a lost or
stolen laptop with all the requisite appli-
cations are resource and time consuming
processes that hamper user productivity.
CMT application distribution is also IT centric,
requiring complex distribution packages.
By contrast, EMM API’s and tools such as
Citrix XenMobile were designed from day one
to support roaming, wirelessly connected mo-
bile users on their chosen devices. Users can
acquire a device with the vendor configured
operating system and applications and use an
enterprise EMM portal and configuration app
to enroll and configure their device them-
selves over the air according to corporate
settings and policies --all with little to no IT
touch or help.
Users can also use a corporate app store
portal to download and install IT preapproved
applications. Cloud SaaS and virtual appli-
cations have become much more prevalent
in the enterprise, so in many cases applica-
tions don’t have to be downloaded at all. If
necessary, IT can still push out applications
and updates to hundreds of globally roaming
devices.
OS and applications updates were much less
frequent a few years ago and very time and
resource intensive and LAN dependent. Mo-
bile operating systems today tend to run on a
cloud service model with much smaller, more
frequent updates, which makes a lot more
sense for the roaming mobile user.
Containerization One of the ways EMM and
mobile OS API’s enable BYOD and corporate
owned, personally enabled (COPE) workstyles
is through containerization. Using application
wrapping, encryption and other similar meth-
ods, IT can separate corporate and personal
applications and data on the device such
that interactions among them are disabled
or restricted according to enterprise security
policies.
Containerization accomplishes both malware
protection and Data Leakage Prevention
(DLP). Since enterprise and personal appli-
cations and data on the device are walled
off from each other, any malware download-
ed with personal applications or browsing
has no impact on containerized enterprise
applications and cannot be transmitted to the
enterprise network when the device con-
nects. Most EMM solutions such as XenMobile
enforce this separation as well with per app
virtual private network (VPN) connections ac-
tivated automatically when certain enterprise
applications connect to the corporate LAN.
Per app VPN’s connect a single application,
rather than the entire device, shutting out any
malware from personal application use.
Similarly, most operating system API’s and
EMM systems allow IT to configure and en-
force a number of policies that regulate users’
ability to cut and paste data from enterprise
to personal applications, paste or attach
enterprise data or files to personal email
messages, and print files containing sensitive
data.
With Windows 10 laptops, desktops and
EMM, containerization can be accomplished
via digital rights management through the
enforcement of Bitlocker encryption of all
enterprise applications and data. IT can then
leverage policies that prevent users from
4Citrix.com | White Paper | Unified Endpoint Management
cutting and pasting encrypted content into
unmanaged applications not using BitLocker
encryption, including personal email client
software. Any data downloaded from services
such as SharePoint or a shared network are
also encrypted. Thanks to Centennial, con-
tainerization can be accomplished with legacy
Win32 applications as well.
Windows 10 delivers many other critical
enterprise management features IT needs
across devices. IT can push down and enforce
a raft of policies and settings, enforce pass-
word and encryption, enable self-enrollment
of new devices through Azure Active Direc-
tory or a third party EMM solution, manage
corporate provisioned apps separately from
user installed apps, distribute Windows 32
apps via .msi packages, enforce and deploy
updates, and prevent access to dangerous
Web sites, all without having to touch the
device connecting it to the enterprise LAN.
Any Win32 application that can’t be leveraged
this way can be deployed to mobile devices
via desktop virtualization using solutions such
as Citrix XenApp and Xen Desktop. While the
full breadth of management features may not
equal those offered by CMT, the most critical
and widely used management capabilities are
there and will continue to evolve.
Windows 10 Redstone 1 update added new
management features and more will be added
with Redstone 2, due for Spring 2017.
With OS X Lion, Apple also started giving the
desktop operating system most of the same
policy based, self-enrollment management
API’s as iOS and more will come with macOS
Sierra.
The Citrix UEM Solution
Citrix is the only EMM provider with a full,
integrated UEM suite that includes Citrix Xen-
Mobile for UEM across all iOS, Google Android
and Windows 10 devices, including desktops
and notebooks. Citrix also offers XenApp
and Xen Desktop for Windows desktop and
application virtualization; a full IoT integra-
tion, automation and messaging platform via
its Octoblu acquisition; and Podio, a powerful
and highly flexible Web based platform for
organizing mobile collaboration and business
processes across globally dispersed teams.
Citrix XenMobile is providing increasing
support for all operating system enterprise
management API’s as they are introduced and
adds its own unique capabilities that deliver
management consistency across device oper-
ating systems. These include full FIPS 140-2
compliant AES 256-bit encryption, its own
MDX containerization features on top of those
offered by operating system API’s and its own
toolkit and SDK for wrapping individual appli-
cations with the policies and containerization
strategies necessary to protect their associ-
ated sensitive information. This is important
as XenMobile provides a seamless, productive
experience for the user at the same time as it
provides consistent, necessary protections for
the enterprise.
XenMobile also offers its own mobile enter-
prise level Secure applications, such as Secure
Mail and Secure Web, across iOS, Android and
Windows 10 mobile and desktop systems and
devices.
Secure Mail is an enterprise email client and
personal information manager with a user
friendly interface much like those of device
native email client solutions, but with scores
of additional features that enhance security
and usability in an enterprise setting.
With Secure Mail, all corporate email,
contacts, and calendar items are stored
completely separate from the personal
applications on the device. Secure Mail can
be accessed via single sign-on after the user
logs into Secure Hub, and offers multifactor
authentication, remote wipe, and encryption
in transit and at rest. IT can also enforce re-
strictions on email attachments, and printing
and cutting and pasting of information from
other applications into emails.
Secure Mail integrates with organizations’
existing data leakage prevention (DLP) tools,
which monitor and restrict content sent out in
enterprise emails. Secure Mail also offers out-
standing convenience features, such as view-
ing availability of meeting invitees, including
online meetings and phone conference links
in new meeting invitations and joining online
meetings via a single touch.
Secure Mail integrates tightly with XenMo-
bile’s Secure Web mobile app, so that all email
Web links are opened in a secure, sandboxed
web browser environment. Secure Mail also
integrates tightly with Citrix’s own ShareFile
file sharing application, which is discussed
below, so that ShareFile links rather than file
attachments can be embedded in emails for
tighter control over content sharing.
Secure Web is a secure browser alternative
that IT can use to place policies and restric-
tions on Web browsing, particularly when
connecting to the corporate network and
intranet. Organizations can apply policies that
govern which websites users can and cannot
access, what enterprise firewall proxies are
used to access them, and can analyze and
filter URL’s to ensure they’re safe.
ShareFile is XenMobile’s enterprise-class
secure mobile file sync and share application,
which provides the same or better features
and convenience than consumer friendly
Box and DropBox, but with enterprise-lev-
el security and management. Rather than
forcing users to store all information in the
cloud, organizations can leverage ShareFile
Storage Zones to store shared files either
on-premises behind the firewall, in the
Citrix ShareFile cloud service, or in another
public cloud storage service of their choice.
ShareFile can store files on internal CIF
based network storage systems and provides
connectors for Windows network shares and
Microsoft SharePoint so that files don’t have
to be migrated to another service in order to
be shared.
Secure Forms is Citrix’s easy-to-use full-fea-
tured drag and drop solution that novices
can use to create, populate and store mobile
forms-based applications running on a variety
of devices. Secure Forms helps organizations
digitize and automate manual workflows and
processes rapidly and eliminate double data
entry and paperwork in the field. And perhaps
most important, Secure Forms leverages
5Citrix.com | White Paper | Unified Endpoint Management
all the powerful security and management
features of Citrix XenMobile to protect and
secure enterprise data and integrates seam-
lessly with other XenMobile functions and
productivity applications.
Finally, organizations can use Secure Hub
(the XenMobile enterprise app) to provide
access to Secure apps, other mobile apps
(either commercial third-party or enterprise
developed), Web and SaaS services, and even
Windows desktops and applications based on
Active Directory group policies.
Octoblu Citrix is unique in offering an
integrated IoT automation, monitoring and
analysis tool named Octoblu. With Octob-
lu, Citrix extends mobility management to
the emerging IoT enabled workplace where
context-aware environments synthesize data
from many different sources to respond to
the needs of the user, increasing workplace
efficiency and productivity. Octoblu software
can be used to create workplace automation
services such as launching a personalized
desktop when a user approaches a worksta-
tion; adjusting heating, cooling and lighting
and starting GoToMeeting or Skype for Busi-
ness meeting when staff enters a conference
room; and using beacons to connect user
automatically to nearby printers. The IoT
possibilities are limitless.
Podio adds a powerful, free enterprise cloud
based mobile collaboration platform combin-
ing team conversations, processes and con-
tent sharing and integrates tightly with Citrix
XenMobile security and management. Podio
provides equivalent or better collaboration
capabilities than enterprise solutions costing
tens of thousands of dollars.
With Windows 10 and macOS Sierra, Enter-
prise Mobility Management Solutions can
deliver a single Unified Endpoint Management
capability for all mobile users, devices and
applications. Enterprises should examine
these solutions closely to see if UEM can not
only simplify and slash the cost of managing,
securing and simplifying the mobile work-
place, but take the mobile enterprise into the
era of IoT. Only Citrix offers a complete UEM
solution that includes integrated manage-
ment, security, application and desktop virtu-
alization, mobile collaboration and enterprise
IoT enablement. With Citrix solutions, the
enterprise can realize the dream of the single
integrated mobile workspace.
With Windows 10 and macOS Sierra, Enterprise Mobility Manage-
ment Solutions can deliver a single Unified Endpoint Manage-
ment capability for all mobile users, devices and applications.
Enterprise Sales
North America | 800-424-8749
Worldwide | +1 408-790-8000
Locations
Corporate Headquarters | 851 Cypress Creek Road Fort Lauderdale, FL 33309 United States
Silicon Valley | 4988 Great America Parkway Santa Clara, CA 95054 United States
Copyright© 2016 Inc. All rights reserved. Citrix, the Citrix logo, and other marks appearing herein are property of
Citrix Systems, Inc. and/or one or more of its subsidiaries, and may be registered with the U.S. Patent and Trademark
Office and in other countries. All other marks are the property of their respective owner/s.

More Related Content

What's hot

12 Game Changing Ways to Mobilize Teaching and Learning
12 Game Changing Ways to Mobilize Teaching and Learning12 Game Changing Ways to Mobilize Teaching and Learning
12 Game Changing Ways to Mobilize Teaching and LearningCitrix
 
3 Ways Companies Are Slashing IT Costs with VDI
3 Ways Companies Are Slashing IT Costs with VDI3 Ways Companies Are Slashing IT Costs with VDI
3 Ways Companies Are Slashing IT Costs with VDICitrix
 
Redefining Business Mobility and Customer Experience
Redefining Business Mobility and Customer ExperienceRedefining Business Mobility and Customer Experience
Redefining Business Mobility and Customer ExperienceCitrix
 
Desktop Virtualization: Reduce Costs, Improve Efficiencies with Proven VDI So...
Desktop Virtualization: Reduce Costs, Improve Efficiencies with Proven VDI So...Desktop Virtualization: Reduce Costs, Improve Efficiencies with Proven VDI So...
Desktop Virtualization: Reduce Costs, Improve Efficiencies with Proven VDI So...Citrix
 
The Total Economic Impact of Citrix XenApp
The Total Economic Impact of Citrix XenAppThe Total Economic Impact of Citrix XenApp
The Total Economic Impact of Citrix XenAppCitrix
 
Mobile Workspaces Go Where You Go [Infographic]
Mobile Workspaces Go Where You Go [Infographic]Mobile Workspaces Go Where You Go [Infographic]
Mobile Workspaces Go Where You Go [Infographic]Citrix
 
Manage risk by protecting apps, data and usage
Manage risk by protecting apps, data and usageManage risk by protecting apps, data and usage
Manage risk by protecting apps, data and usageCitrix
 
Microsoft Cloud Ecosystem Poster
Microsoft Cloud Ecosystem PosterMicrosoft Cloud Ecosystem Poster
Microsoft Cloud Ecosystem PosterDavid J Rosenthal
 
Enterprise Case Study: Enabling a More Mobile Way of Working
Enterprise Case Study: Enabling a More Mobile Way of Working Enterprise Case Study: Enabling a More Mobile Way of Working
Enterprise Case Study: Enabling a More Mobile Way of Working Citrix
 
Manage Risk By Protecting the Apps and Data Infographic
Manage Risk By Protecting the Apps and Data InfographicManage Risk By Protecting the Apps and Data Infographic
Manage Risk By Protecting the Apps and Data InfographicCitrix
 
Citrix Customer Story: Southcoast Health System
Citrix Customer Story: Southcoast Health SystemCitrix Customer Story: Southcoast Health System
Citrix Customer Story: Southcoast Health SystemCitrix
 
Securing and Managing Offce 365 with XenMobile
Securing and Managing Offce 365 with XenMobileSecuring and Managing Offce 365 with XenMobile
Securing and Managing Offce 365 with XenMobileCitrix
 
Desktop Virtualization Deployment Insights eBook
Desktop Virtualization Deployment Insights eBookDesktop Virtualization Deployment Insights eBook
Desktop Virtualization Deployment Insights eBookCitrix
 
Comparing traditional workspaces to digital workspaces
Comparing traditional workspaces to digital workspacesComparing traditional workspaces to digital workspaces
Comparing traditional workspaces to digital workspacesCitrix
 
There's No Such Thing As "Downtime" In a Hospital
There's No Such Thing As "Downtime" In a HospitalThere's No Such Thing As "Downtime" In a Hospital
There's No Such Thing As "Downtime" In a HospitalNETSCOUT
 
IAITAM ACE 2016, New Orleans - Presentation
IAITAM ACE 2016, New Orleans - PresentationIAITAM ACE 2016, New Orleans - Presentation
IAITAM ACE 2016, New Orleans - PresentationJon Stevens-Hall
 
Every cloud has a silver lining
Every cloud has a silver liningEvery cloud has a silver lining
Every cloud has a silver liningAditya Dashora
 
EMEA10: Trepidation in Moving to the Cloud
EMEA10: Trepidation in Moving to the CloudEMEA10: Trepidation in Moving to the Cloud
EMEA10: Trepidation in Moving to the CloudCompTIA UK
 
Every Cloud Has a Silver Lining
Every Cloud Has a Silver LiningEvery Cloud Has a Silver Lining
Every Cloud Has a Silver LiningJohn Pozadzides
 

What's hot (20)

12 Game Changing Ways to Mobilize Teaching and Learning
12 Game Changing Ways to Mobilize Teaching and Learning12 Game Changing Ways to Mobilize Teaching and Learning
12 Game Changing Ways to Mobilize Teaching and Learning
 
3 Ways Companies Are Slashing IT Costs with VDI
3 Ways Companies Are Slashing IT Costs with VDI3 Ways Companies Are Slashing IT Costs with VDI
3 Ways Companies Are Slashing IT Costs with VDI
 
Redefining Business Mobility and Customer Experience
Redefining Business Mobility and Customer ExperienceRedefining Business Mobility and Customer Experience
Redefining Business Mobility and Customer Experience
 
Desktop Virtualization: Reduce Costs, Improve Efficiencies with Proven VDI So...
Desktop Virtualization: Reduce Costs, Improve Efficiencies with Proven VDI So...Desktop Virtualization: Reduce Costs, Improve Efficiencies with Proven VDI So...
Desktop Virtualization: Reduce Costs, Improve Efficiencies with Proven VDI So...
 
The Total Economic Impact of Citrix XenApp
The Total Economic Impact of Citrix XenAppThe Total Economic Impact of Citrix XenApp
The Total Economic Impact of Citrix XenApp
 
Mobile Workspaces Go Where You Go [Infographic]
Mobile Workspaces Go Where You Go [Infographic]Mobile Workspaces Go Where You Go [Infographic]
Mobile Workspaces Go Where You Go [Infographic]
 
Manage risk by protecting apps, data and usage
Manage risk by protecting apps, data and usageManage risk by protecting apps, data and usage
Manage risk by protecting apps, data and usage
 
Microsoft Cloud Ecosystem Poster
Microsoft Cloud Ecosystem PosterMicrosoft Cloud Ecosystem Poster
Microsoft Cloud Ecosystem Poster
 
Enterprise Case Study: Enabling a More Mobile Way of Working
Enterprise Case Study: Enabling a More Mobile Way of Working Enterprise Case Study: Enabling a More Mobile Way of Working
Enterprise Case Study: Enabling a More Mobile Way of Working
 
Manage Risk By Protecting the Apps and Data Infographic
Manage Risk By Protecting the Apps and Data InfographicManage Risk By Protecting the Apps and Data Infographic
Manage Risk By Protecting the Apps and Data Infographic
 
Citrix Customer Story: Southcoast Health System
Citrix Customer Story: Southcoast Health SystemCitrix Customer Story: Southcoast Health System
Citrix Customer Story: Southcoast Health System
 
Securing and Managing Offce 365 with XenMobile
Securing and Managing Offce 365 with XenMobileSecuring and Managing Offce 365 with XenMobile
Securing and Managing Offce 365 with XenMobile
 
Desktop Virtualization Deployment Insights eBook
Desktop Virtualization Deployment Insights eBookDesktop Virtualization Deployment Insights eBook
Desktop Virtualization Deployment Insights eBook
 
Comparing traditional workspaces to digital workspaces
Comparing traditional workspaces to digital workspacesComparing traditional workspaces to digital workspaces
Comparing traditional workspaces to digital workspaces
 
There's No Such Thing As "Downtime" In a Hospital
There's No Such Thing As "Downtime" In a HospitalThere's No Such Thing As "Downtime" In a Hospital
There's No Such Thing As "Downtime" In a Hospital
 
IAITAM ACE 2016, New Orleans - Presentation
IAITAM ACE 2016, New Orleans - PresentationIAITAM ACE 2016, New Orleans - Presentation
IAITAM ACE 2016, New Orleans - Presentation
 
Every cloud has a silver lining
Every cloud has a silver liningEvery cloud has a silver lining
Every cloud has a silver lining
 
EMEA10: Trepidation in Moving to the Cloud
EMEA10: Trepidation in Moving to the CloudEMEA10: Trepidation in Moving to the Cloud
EMEA10: Trepidation in Moving to the Cloud
 
Every Cloud Has a Silver Lining
Every Cloud Has a Silver LiningEvery Cloud Has a Silver Lining
Every Cloud Has a Silver Lining
 
Facing the Future - Is the cloud right for you?
Facing the Future - Is the cloud right for you?Facing the Future - Is the cloud right for you?
Facing the Future - Is the cloud right for you?
 

Viewers also liked

The Digital Disconnect in South Africa
The Digital Disconnect in South AfricaThe Digital Disconnect in South Africa
The Digital Disconnect in South AfricaCitrix
 
Digital or die? British boardrooms divided on digital transformation
Digital or die? British boardrooms divided on digital transformationDigital or die? British boardrooms divided on digital transformation
Digital or die? British boardrooms divided on digital transformationCitrix
 
SYN 104: Citrix and Nutanix
SYN 104: Citrix and Nutanix SYN 104: Citrix and Nutanix
SYN 104: Citrix and Nutanix Citrix
 
Citrix & Canalys: Northern European Channel Partners in a State of Transforma...
Citrix & Canalys: Northern European Channel Partners in a State of Transforma...Citrix & Canalys: Northern European Channel Partners in a State of Transforma...
Citrix & Canalys: Northern European Channel Partners in a State of Transforma...Citrix
 
Why Citrix beats VMware [Infographic]
Why Citrix beats VMware [Infographic]Why Citrix beats VMware [Infographic]
Why Citrix beats VMware [Infographic]Citrix
 
Lesson 9.0 Activity: A Day in the Life
Lesson 9.0 Activity: A Day in the LifeLesson 9.0 Activity: A Day in the Life
Lesson 9.0 Activity: A Day in the LifeBig History Project
 
SYN 208: Power HDX 3D Applications with Intel and NVIDIA GPUs.
SYN 208: Power HDX 3D Applications with Intel and NVIDIA GPUs. SYN 208: Power HDX 3D Applications with Intel and NVIDIA GPUs.
SYN 208: Power HDX 3D Applications with Intel and NVIDIA GPUs. Citrix
 
Citrix Customer Story: Franciscan Missionaries of Our Lady Health System
Citrix Customer Story: Franciscan Missionaries of Our Lady Health SystemCitrix Customer Story: Franciscan Missionaries of Our Lady Health System
Citrix Customer Story: Franciscan Missionaries of Our Lady Health SystemCitrix
 
SYN111: What's New and Exciting with XenMobile
SYN111: What's New and Exciting with XenMobileSYN111: What's New and Exciting with XenMobile
SYN111: What's New and Exciting with XenMobileCitrix
 
SYN240: Next-Generation Management and Analytics
SYN240: Next-Generation Management and AnalyticsSYN240: Next-Generation Management and Analytics
SYN240: Next-Generation Management and AnalyticsCitrix
 
„So nutzen Sie Xing & Co für Ihren Vertriebserfolg“
„So nutzen Sie Xing & Co für Ihren Vertriebserfolg“„So nutzen Sie Xing & Co für Ihren Vertriebserfolg“
„So nutzen Sie Xing & Co für Ihren Vertriebserfolg“Citrix
 
Citrix CTO Perspective: The Application Delivery Continuum
Citrix CTO Perspective: The Application Delivery ContinuumCitrix CTO Perspective: The Application Delivery Continuum
Citrix CTO Perspective: The Application Delivery ContinuumCitrix
 
SYN 214: Linux Virtual Desktop Capabilities, Use Cases, Architecture, and Dep...
SYN 214: Linux Virtual Desktop Capabilities, Use Cases, Architecture, and Dep...SYN 214: Linux Virtual Desktop Capabilities, Use Cases, Architecture, and Dep...
SYN 214: Linux Virtual Desktop Capabilities, Use Cases, Architecture, and Dep...Citrix
 
SYN303: Receiver + StoreFront + Gateway
SYN303: Receiver + StoreFront + GatewaySYN303: Receiver + StoreFront + Gateway
SYN303: Receiver + StoreFront + GatewayCitrix
 
SYN002: General Session
SYN002: General SessionSYN002: General Session
SYN002: General SessionCitrix
 
Citrix Mobile Analytics Report September 2014: Mobile subscriber data usage t...
Citrix Mobile Analytics Report September 2014: Mobile subscriber data usage t...Citrix Mobile Analytics Report September 2014: Mobile subscriber data usage t...
Citrix Mobile Analytics Report September 2014: Mobile subscriber data usage t...Citrix
 
SYN 321: Securing the Published Browser
SYN 321: Securing the Published BrowserSYN 321: Securing the Published Browser
SYN 321: Securing the Published BrowserCitrix
 
SYN 305: Architecting Citrix on Microsoft Azure
SYN 305: Architecting Citrix on Microsoft AzureSYN 305: Architecting Citrix on Microsoft Azure
SYN 305: Architecting Citrix on Microsoft AzureCitrix
 
SYN 220: XenApp and XenDesktop Security Best Practices
SYN 220: XenApp and XenDesktop Security Best Practices SYN 220: XenApp and XenDesktop Security Best Practices
SYN 220: XenApp and XenDesktop Security Best Practices Citrix
 

Viewers also liked (19)

The Digital Disconnect in South Africa
The Digital Disconnect in South AfricaThe Digital Disconnect in South Africa
The Digital Disconnect in South Africa
 
Digital or die? British boardrooms divided on digital transformation
Digital or die? British boardrooms divided on digital transformationDigital or die? British boardrooms divided on digital transformation
Digital or die? British boardrooms divided on digital transformation
 
SYN 104: Citrix and Nutanix
SYN 104: Citrix and Nutanix SYN 104: Citrix and Nutanix
SYN 104: Citrix and Nutanix
 
Citrix & Canalys: Northern European Channel Partners in a State of Transforma...
Citrix & Canalys: Northern European Channel Partners in a State of Transforma...Citrix & Canalys: Northern European Channel Partners in a State of Transforma...
Citrix & Canalys: Northern European Channel Partners in a State of Transforma...
 
Why Citrix beats VMware [Infographic]
Why Citrix beats VMware [Infographic]Why Citrix beats VMware [Infographic]
Why Citrix beats VMware [Infographic]
 
Lesson 9.0 Activity: A Day in the Life
Lesson 9.0 Activity: A Day in the LifeLesson 9.0 Activity: A Day in the Life
Lesson 9.0 Activity: A Day in the Life
 
SYN 208: Power HDX 3D Applications with Intel and NVIDIA GPUs.
SYN 208: Power HDX 3D Applications with Intel and NVIDIA GPUs. SYN 208: Power HDX 3D Applications with Intel and NVIDIA GPUs.
SYN 208: Power HDX 3D Applications with Intel and NVIDIA GPUs.
 
Citrix Customer Story: Franciscan Missionaries of Our Lady Health System
Citrix Customer Story: Franciscan Missionaries of Our Lady Health SystemCitrix Customer Story: Franciscan Missionaries of Our Lady Health System
Citrix Customer Story: Franciscan Missionaries of Our Lady Health System
 
SYN111: What's New and Exciting with XenMobile
SYN111: What's New and Exciting with XenMobileSYN111: What's New and Exciting with XenMobile
SYN111: What's New and Exciting with XenMobile
 
SYN240: Next-Generation Management and Analytics
SYN240: Next-Generation Management and AnalyticsSYN240: Next-Generation Management and Analytics
SYN240: Next-Generation Management and Analytics
 
„So nutzen Sie Xing & Co für Ihren Vertriebserfolg“
„So nutzen Sie Xing & Co für Ihren Vertriebserfolg“„So nutzen Sie Xing & Co für Ihren Vertriebserfolg“
„So nutzen Sie Xing & Co für Ihren Vertriebserfolg“
 
Citrix CTO Perspective: The Application Delivery Continuum
Citrix CTO Perspective: The Application Delivery ContinuumCitrix CTO Perspective: The Application Delivery Continuum
Citrix CTO Perspective: The Application Delivery Continuum
 
SYN 214: Linux Virtual Desktop Capabilities, Use Cases, Architecture, and Dep...
SYN 214: Linux Virtual Desktop Capabilities, Use Cases, Architecture, and Dep...SYN 214: Linux Virtual Desktop Capabilities, Use Cases, Architecture, and Dep...
SYN 214: Linux Virtual Desktop Capabilities, Use Cases, Architecture, and Dep...
 
SYN303: Receiver + StoreFront + Gateway
SYN303: Receiver + StoreFront + GatewaySYN303: Receiver + StoreFront + Gateway
SYN303: Receiver + StoreFront + Gateway
 
SYN002: General Session
SYN002: General SessionSYN002: General Session
SYN002: General Session
 
Citrix Mobile Analytics Report September 2014: Mobile subscriber data usage t...
Citrix Mobile Analytics Report September 2014: Mobile subscriber data usage t...Citrix Mobile Analytics Report September 2014: Mobile subscriber data usage t...
Citrix Mobile Analytics Report September 2014: Mobile subscriber data usage t...
 
SYN 321: Securing the Published Browser
SYN 321: Securing the Published BrowserSYN 321: Securing the Published Browser
SYN 321: Securing the Published Browser
 
SYN 305: Architecting Citrix on Microsoft Azure
SYN 305: Architecting Citrix on Microsoft AzureSYN 305: Architecting Citrix on Microsoft Azure
SYN 305: Architecting Citrix on Microsoft Azure
 
SYN 220: XenApp and XenDesktop Security Best Practices
SYN 220: XenApp and XenDesktop Security Best Practices SYN 220: XenApp and XenDesktop Security Best Practices
SYN 220: XenApp and XenDesktop Security Best Practices
 

Similar to Unified Endpoint Management: Security & Productivity for the Mobile Enterprise

Ericom Connect datasheet
Ericom Connect datasheet Ericom Connect datasheet
Ericom Connect datasheet Ericom Software
 
Managed Mobility Services: Implementing a true mobile strategie
Managed Mobility Services: Implementing a true mobile strategieManaged Mobility Services: Implementing a true mobile strategie
Managed Mobility Services: Implementing a true mobile strategieCor Ranzijn
 
Development tools : a key driver for the M2M market take-off
Development tools : a key driver for the M2M market take-offDevelopment tools : a key driver for the M2M market take-off
Development tools : a key driver for the M2M market take-offsimon_anyware
 
Microsoft Solves BYOD Using Microsoft System Center Configuration Manager and...
Microsoft Solves BYOD Using Microsoft System Center Configuration Manager and...Microsoft Solves BYOD Using Microsoft System Center Configuration Manager and...
Microsoft Solves BYOD Using Microsoft System Center Configuration Manager and...Microsoft
 
Top 5 IT Challenges resolved by Cloud Desktops
Top 5 IT Challenges resolved by Cloud DesktopsTop 5 IT Challenges resolved by Cloud Desktops
Top 5 IT Challenges resolved by Cloud DesktopsKelly Beardmore
 
Unified Device Management
Unified Device ManagementUnified Device Management
Unified Device ManagementIBM Danmark
 
Why uem-is-the-key-to-enterprise-it-security
Why uem-is-the-key-to-enterprise-it-securityWhy uem-is-the-key-to-enterprise-it-security
Why uem-is-the-key-to-enterprise-it-securityCincoC
 
Enabling Mobile Workstyles Whitepaper with Citrix XenMobile
Enabling Mobile Workstyles Whitepaper with Citrix XenMobileEnabling Mobile Workstyles Whitepaper with Citrix XenMobile
Enabling Mobile Workstyles Whitepaper with Citrix XenMobileNuno Alves
 
What is-cloud-computing
What is-cloud-computingWhat is-cloud-computing
What is-cloud-computingg1vaddi
 
cloud computing in e commerce
cloud computing in e commercecloud computing in e commerce
cloud computing in e commercesteffz
 
The why of a cloud ppt
The why of a cloud pptThe why of a cloud ppt
The why of a cloud pptSana Nasar
 
Industrial Internet of Things and (Machine to Machine) M2M Overview
Industrial Internet of Things and (Machine to Machine) M2M OverviewIndustrial Internet of Things and (Machine to Machine) M2M Overview
Industrial Internet of Things and (Machine to Machine) M2M OverviewBryan Kester
 
IBM Endpoint Manager for Mobile Devices (Overview)
IBM Endpoint Manager for Mobile Devices (Overview)IBM Endpoint Manager for Mobile Devices (Overview)
IBM Endpoint Manager for Mobile Devices (Overview)Kimber Spradlin
 
M2M Interview april may 2015
M2M Interview april may 2015M2M Interview april may 2015
M2M Interview april may 2015Roberto Siagri
 
Solve Employee Experience, Security, and Silo Problems with HCL BigFix Workspace
Solve Employee Experience, Security, and Silo Problems with HCL BigFix WorkspaceSolve Employee Experience, Security, and Silo Problems with HCL BigFix Workspace
Solve Employee Experience, Security, and Silo Problems with HCL BigFix WorkspaceHCLSoftware
 
Comparing Best-in-Class Building Management Systems – Metasys vs. Desigo
Comparing Best-in-Class Building Management Systems – Metasys vs. DesigoComparing Best-in-Class Building Management Systems – Metasys vs. Desigo
Comparing Best-in-Class Building Management Systems – Metasys vs. DesigoEmily Jones
 
Virtualized Web Desktop Towards A Faster Web Cloud Operating System
Virtualized Web Desktop Towards A Faster Web Cloud Operating SystemVirtualized Web Desktop Towards A Faster Web Cloud Operating System
Virtualized Web Desktop Towards A Faster Web Cloud Operating Systemijbuiiir1
 

Similar to Unified Endpoint Management: Security & Productivity for the Mobile Enterprise (20)

Ericom Connect datasheet
Ericom Connect datasheet Ericom Connect datasheet
Ericom Connect datasheet
 
Managed Mobility Services: Implementing a true mobile strategie
Managed Mobility Services: Implementing a true mobile strategieManaged Mobility Services: Implementing a true mobile strategie
Managed Mobility Services: Implementing a true mobile strategie
 
Development tools : a key driver for the M2M market take-off
Development tools : a key driver for the M2M market take-offDevelopment tools : a key driver for the M2M market take-off
Development tools : a key driver for the M2M market take-off
 
Microsoft Solves BYOD Using Microsoft System Center Configuration Manager and...
Microsoft Solves BYOD Using Microsoft System Center Configuration Manager and...Microsoft Solves BYOD Using Microsoft System Center Configuration Manager and...
Microsoft Solves BYOD Using Microsoft System Center Configuration Manager and...
 
Top 5 IT Challenges resolved by Cloud Desktops
Top 5 IT Challenges resolved by Cloud DesktopsTop 5 IT Challenges resolved by Cloud Desktops
Top 5 IT Challenges resolved by Cloud Desktops
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Mobilizing windows-apps
Mobilizing windows-appsMobilizing windows-apps
Mobilizing windows-apps
 
Unified Device Management
Unified Device ManagementUnified Device Management
Unified Device Management
 
Why uem-is-the-key-to-enterprise-it-security
Why uem-is-the-key-to-enterprise-it-securityWhy uem-is-the-key-to-enterprise-it-security
Why uem-is-the-key-to-enterprise-it-security
 
Enabling Mobile Workstyles Whitepaper with Citrix XenMobile
Enabling Mobile Workstyles Whitepaper with Citrix XenMobileEnabling Mobile Workstyles Whitepaper with Citrix XenMobile
Enabling Mobile Workstyles Whitepaper with Citrix XenMobile
 
What is-cloud-computing
What is-cloud-computingWhat is-cloud-computing
What is-cloud-computing
 
cloud computing in e commerce
cloud computing in e commercecloud computing in e commerce
cloud computing in e commerce
 
The why of a cloud ppt
The why of a cloud pptThe why of a cloud ppt
The why of a cloud ppt
 
Industrial Internet of Things and (Machine to Machine) M2M Overview
Industrial Internet of Things and (Machine to Machine) M2M OverviewIndustrial Internet of Things and (Machine to Machine) M2M Overview
Industrial Internet of Things and (Machine to Machine) M2M Overview
 
IBM Endpoint Manager for Mobile Devices (Overview)
IBM Endpoint Manager for Mobile Devices (Overview)IBM Endpoint Manager for Mobile Devices (Overview)
IBM Endpoint Manager for Mobile Devices (Overview)
 
M2M Interview april may 2015
M2M Interview april may 2015M2M Interview april may 2015
M2M Interview april may 2015
 
Solve Employee Experience, Security, and Silo Problems with HCL BigFix Workspace
Solve Employee Experience, Security, and Silo Problems with HCL BigFix WorkspaceSolve Employee Experience, Security, and Silo Problems with HCL BigFix Workspace
Solve Employee Experience, Security, and Silo Problems with HCL BigFix Workspace
 
Comparing Best-in-Class Building Management Systems – Metasys vs. Desigo
Comparing Best-in-Class Building Management Systems – Metasys vs. DesigoComparing Best-in-Class Building Management Systems – Metasys vs. Desigo
Comparing Best-in-Class Building Management Systems – Metasys vs. Desigo
 
Citrix security booklet
Citrix security bookletCitrix security booklet
Citrix security booklet
 
Virtualized Web Desktop Towards A Faster Web Cloud Operating System
Virtualized Web Desktop Towards A Faster Web Cloud Operating SystemVirtualized Web Desktop Towards A Faster Web Cloud Operating System
Virtualized Web Desktop Towards A Faster Web Cloud Operating System
 

More from Citrix

Building The Digital Workplace
Building The Digital WorkplaceBuilding The Digital Workplace
Building The Digital WorkplaceCitrix
 
Maximize your Investment in Microsoft Office 365 with Citrix Workspace
Maximize your Investment in Microsoft Office 365 with Citrix Workspace Maximize your Investment in Microsoft Office 365 with Citrix Workspace
Maximize your Investment in Microsoft Office 365 with Citrix Workspace Citrix
 
XenApp on Google Cloud Deployment Guide
XenApp on Google Cloud Deployment GuideXenApp on Google Cloud Deployment Guide
XenApp on Google Cloud Deployment GuideCitrix
 
Deploying Citrix XenApp & XenDesktop Service on Google Cloud Platform
Deploying Citrix XenApp & XenDesktop Service on Google Cloud PlatformDeploying Citrix XenApp & XenDesktop Service on Google Cloud Platform
Deploying Citrix XenApp & XenDesktop Service on Google Cloud PlatformCitrix
 
Manage Risk by Protecting the Apps and Data That Drive Business Productivity
Manage Risk by Protecting the Apps and Data That Drive Business ProductivityManage Risk by Protecting the Apps and Data That Drive Business Productivity
Manage Risk by Protecting the Apps and Data That Drive Business ProductivityCitrix
 
How do Organizations Plan to Assure Application Delivery in a Multi-Cloud World?
How do Organizations Plan to Assure Application Delivery in a Multi-Cloud World?How do Organizations Plan to Assure Application Delivery in a Multi-Cloud World?
How do Organizations Plan to Assure Application Delivery in a Multi-Cloud World?Citrix
 
Workforce Flexibility Can Drive Greater Engagement & Productivity
Workforce Flexibility Can Drive Greater Engagement & ProductivityWorkforce Flexibility Can Drive Greater Engagement & Productivity
Workforce Flexibility Can Drive Greater Engagement & ProductivityCitrix
 
Citrix Cloud Services: Total Economic Benefits Assessment Guide
Citrix Cloud Services: Total Economic Benefits Assessment GuideCitrix Cloud Services: Total Economic Benefits Assessment Guide
Citrix Cloud Services: Total Economic Benefits Assessment GuideCitrix
 
The Growing U.S. IT Productivity Gap
The Growing U.S. IT Productivity GapThe Growing U.S. IT Productivity Gap
The Growing U.S. IT Productivity GapCitrix
 
Citrix Cloud Services: Total Economic Benefits Assessment Guide
Citrix Cloud Services: Total Economic Benefits Assessment GuideCitrix Cloud Services: Total Economic Benefits Assessment Guide
Citrix Cloud Services: Total Economic Benefits Assessment GuideCitrix
 
Citrix Synergy 2017: Technology Keynote Sketch Notes
Citrix Synergy 2017: Technology Keynote Sketch NotesCitrix Synergy 2017: Technology Keynote Sketch Notes
Citrix Synergy 2017: Technology Keynote Sketch NotesCitrix
 
Citrix Synergy 2017: Malcolm Gladwell Innovation Super Session Sketch Notes
Citrix Synergy 2017: Malcolm Gladwell Innovation Super Session Sketch NotesCitrix Synergy 2017: Malcolm Gladwell Innovation Super Session Sketch Notes
Citrix Synergy 2017: Malcolm Gladwell Innovation Super Session Sketch NotesCitrix
 
Synergy 2017: Colin Powell Innovation Super Session Sketch Notes
Synergy 2017: Colin Powell Innovation Super Session Sketch NotesSynergy 2017: Colin Powell Innovation Super Session Sketch Notes
Synergy 2017: Colin Powell Innovation Super Session Sketch NotesCitrix
 
Who Are Citrix Customers?
Who Are Citrix Customers?Who Are Citrix Customers?
Who Are Citrix Customers?Citrix
 
Citrix Paddington
Citrix PaddingtonCitrix Paddington
Citrix PaddingtonCitrix
 
The Security Compliance Countdown: How to Get Ahead of the GDPR [Infographic]
The Security Compliance Countdown: How to Get Ahead of the GDPR [Infographic]The Security Compliance Countdown: How to Get Ahead of the GDPR [Infographic]
The Security Compliance Countdown: How to Get Ahead of the GDPR [Infographic]Citrix
 
[Infographic] Moving at the Speed of Byte: Ushering the Era of the Digitally ...
[Infographic] Moving at the Speed of Byte: Ushering the Era of the Digitally ...[Infographic] Moving at the Speed of Byte: Ushering the Era of the Digitally ...
[Infographic] Moving at the Speed of Byte: Ushering the Era of the Digitally ...Citrix
 
Manage Risk By Protecting the Apps and Data That Drive Business Productivity
Manage Risk By Protecting the Apps and Data That Drive Business ProductivityManage Risk By Protecting the Apps and Data That Drive Business Productivity
Manage Risk By Protecting the Apps and Data That Drive Business ProductivityCitrix
 

More from Citrix (18)

Building The Digital Workplace
Building The Digital WorkplaceBuilding The Digital Workplace
Building The Digital Workplace
 
Maximize your Investment in Microsoft Office 365 with Citrix Workspace
Maximize your Investment in Microsoft Office 365 with Citrix Workspace Maximize your Investment in Microsoft Office 365 with Citrix Workspace
Maximize your Investment in Microsoft Office 365 with Citrix Workspace
 
XenApp on Google Cloud Deployment Guide
XenApp on Google Cloud Deployment GuideXenApp on Google Cloud Deployment Guide
XenApp on Google Cloud Deployment Guide
 
Deploying Citrix XenApp & XenDesktop Service on Google Cloud Platform
Deploying Citrix XenApp & XenDesktop Service on Google Cloud PlatformDeploying Citrix XenApp & XenDesktop Service on Google Cloud Platform
Deploying Citrix XenApp & XenDesktop Service on Google Cloud Platform
 
Manage Risk by Protecting the Apps and Data That Drive Business Productivity
Manage Risk by Protecting the Apps and Data That Drive Business ProductivityManage Risk by Protecting the Apps and Data That Drive Business Productivity
Manage Risk by Protecting the Apps and Data That Drive Business Productivity
 
How do Organizations Plan to Assure Application Delivery in a Multi-Cloud World?
How do Organizations Plan to Assure Application Delivery in a Multi-Cloud World?How do Organizations Plan to Assure Application Delivery in a Multi-Cloud World?
How do Organizations Plan to Assure Application Delivery in a Multi-Cloud World?
 
Workforce Flexibility Can Drive Greater Engagement & Productivity
Workforce Flexibility Can Drive Greater Engagement & ProductivityWorkforce Flexibility Can Drive Greater Engagement & Productivity
Workforce Flexibility Can Drive Greater Engagement & Productivity
 
Citrix Cloud Services: Total Economic Benefits Assessment Guide
Citrix Cloud Services: Total Economic Benefits Assessment GuideCitrix Cloud Services: Total Economic Benefits Assessment Guide
Citrix Cloud Services: Total Economic Benefits Assessment Guide
 
The Growing U.S. IT Productivity Gap
The Growing U.S. IT Productivity GapThe Growing U.S. IT Productivity Gap
The Growing U.S. IT Productivity Gap
 
Citrix Cloud Services: Total Economic Benefits Assessment Guide
Citrix Cloud Services: Total Economic Benefits Assessment GuideCitrix Cloud Services: Total Economic Benefits Assessment Guide
Citrix Cloud Services: Total Economic Benefits Assessment Guide
 
Citrix Synergy 2017: Technology Keynote Sketch Notes
Citrix Synergy 2017: Technology Keynote Sketch NotesCitrix Synergy 2017: Technology Keynote Sketch Notes
Citrix Synergy 2017: Technology Keynote Sketch Notes
 
Citrix Synergy 2017: Malcolm Gladwell Innovation Super Session Sketch Notes
Citrix Synergy 2017: Malcolm Gladwell Innovation Super Session Sketch NotesCitrix Synergy 2017: Malcolm Gladwell Innovation Super Session Sketch Notes
Citrix Synergy 2017: Malcolm Gladwell Innovation Super Session Sketch Notes
 
Synergy 2017: Colin Powell Innovation Super Session Sketch Notes
Synergy 2017: Colin Powell Innovation Super Session Sketch NotesSynergy 2017: Colin Powell Innovation Super Session Sketch Notes
Synergy 2017: Colin Powell Innovation Super Session Sketch Notes
 
Who Are Citrix Customers?
Who Are Citrix Customers?Who Are Citrix Customers?
Who Are Citrix Customers?
 
Citrix Paddington
Citrix PaddingtonCitrix Paddington
Citrix Paddington
 
The Security Compliance Countdown: How to Get Ahead of the GDPR [Infographic]
The Security Compliance Countdown: How to Get Ahead of the GDPR [Infographic]The Security Compliance Countdown: How to Get Ahead of the GDPR [Infographic]
The Security Compliance Countdown: How to Get Ahead of the GDPR [Infographic]
 
[Infographic] Moving at the Speed of Byte: Ushering the Era of the Digitally ...
[Infographic] Moving at the Speed of Byte: Ushering the Era of the Digitally ...[Infographic] Moving at the Speed of Byte: Ushering the Era of the Digitally ...
[Infographic] Moving at the Speed of Byte: Ushering the Era of the Digitally ...
 
Manage Risk By Protecting the Apps and Data That Drive Business Productivity
Manage Risk By Protecting the Apps and Data That Drive Business ProductivityManage Risk By Protecting the Apps and Data That Drive Business Productivity
Manage Risk By Protecting the Apps and Data That Drive Business Productivity
 

Recently uploaded

Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 

Recently uploaded (20)

Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 

Unified Endpoint Management: Security & Productivity for the Mobile Enterprise

  • 1. 1Citrix.com Unified Endpoint Management Security and Productivity for the Mobile Enterprise Unified Endpoint Management
  • 2. 2Citrix.com | White Paper | Unified Endpoint Management The workplace has evolved from stationary employees working on IT distributed Windows work desktops and laptops to mobile users playing and working on personal roaming lap- tops, tablets and smart phones. Ten years ago client management tools (CMT) such as Mic- rosoft SCCM and LANDESK were the enter- prise choice for managing scores, hundreds or thousands of IT distributed Windows systems. In an era of mobility, BYOD and the Internet of Things (IoT), however, client management tools (CMT) must evolve. Instead, for a growing number of IT organi- zations, the future lies in Unified Endpoint Management (UEM), which combines CMT with EMM (Enterprise Mobility Management) providing a single pane of glass to manage and secure, devices and operating systems, whether laptops, smart phones, tablets or any other device. Increasingly, UEM means EMM, with the user, rather than the individual device as the management focus. For users, UEM helps enable a single unified workspace with easy, consistent collaboration and infor- mation access from any device. In the next few years, many analysts believe that organizations will employ EMM systems to manage PC’s and Macs. This means that EMM has the potential to manage and secure more than one billion Windows 10 devices over the next several years as more and more organizations make the transition to the new OS. Organizations moving into a more mobile, global era should consider seriously whether a partial or total transition from separate CMT and EMM platforms to a single UEM tool such as Citrix XenMobile makes sense for them. In the next few years, organizations will also need to extend unified management solutions to cover the emerging enterprise Internet of Things (IoT), including sensors, beacons and other similar devices. Luckily, EMM solutions such as Citrix XenMobile have been moving forward to encompass IoT devices as well. Why EMM There are many reasons why UEM via EMM makes sense for a lot of organizations. Symplicity CMT and EMM tools have signifi- cantly different ways of working, and, for many organizations, require a separate set of staff and training for each. It’s a no brainer that managing all devices from a single pane of glass makes more logical business sense. Not only is it less expensive to invest in a single management tool than two or three but This means that EMM has the potential to manage and secure more than one billion Windows 10 devices over the next sever- al years as more and more organizations make the transition to the new OS.
  • 3. 3Citrix.com | White Paper | Unified Endpoint Management significant operational savings can come in reduced staff resources and training, allowing organizations to leverage existing staff for more strategic purposes. Consistency in management, security and usability is important for enterprise user productivity and information protection. Even small unintended differences in security and management policies among devices, appli- cations and information can expose holes in the security infrastructure that allow hackers and malware to penetrate the organization. Consistency in mobile access to applications and information is also important for user productivity. UEM offers consistency in sev- eral ways: •It’s inherently easier to implement a single set of enterprise management and security policies across all devices and users with a single UEM solution than with two separate sets of tools. •User helpdesk services and system trouble- shooting are more consistent with a single management platform, and with operating systems, such as Windows 10, that are them- selves have more consistent interfaces across different types of devices. •Reporting is obviously easier and more comprehensive with a single platform, which can be useful when planning and calculating the costs of hardware and software upgrades or refreshes. •Windows 10 introduces its own consistency with a common operating system, application development tools and set of API’s across desktop and mobile devices. Users can get all their devices’ applications from a single se- cure, corporate approved app store and work with enterprise applications and information both on their devices and the corporate net- work in a much more consistent way. •Microsoft recently announced the Centennial App Converter, which will convert even legacy Win32 apps into the Universal Windows Platform apps, so organizations can add them to the Windows app store, where they can be administered by an EMM solution such as XenMobile. Mobile Friendly Management Conceived at a time when devices were stationary, corporate distributed, and mostly connected to the enterprise LAN, CMT tools required desktops and laptops to be LAN connected and joined to an enterprise domain with a set of group policy objects for initial configuration and subsequent management to take place. A user could not typically connect, configure and upgrade his or her own device. This was the job of IT, which acted as the ultimate super user. With legacy CMT solutions, IT spends a lot of time creating one or a few sets of custom system images and pushing them over the LAN to a few, scores, or hundreds of network connected desktops and laptops, or uses an image deployment service for up to $25 per system. With such a methodology, bringing a new device on board or replacing a lost or stolen laptop with all the requisite appli- cations are resource and time consuming processes that hamper user productivity. CMT application distribution is also IT centric, requiring complex distribution packages. By contrast, EMM API’s and tools such as Citrix XenMobile were designed from day one to support roaming, wirelessly connected mo- bile users on their chosen devices. Users can acquire a device with the vendor configured operating system and applications and use an enterprise EMM portal and configuration app to enroll and configure their device them- selves over the air according to corporate settings and policies --all with little to no IT touch or help. Users can also use a corporate app store portal to download and install IT preapproved applications. Cloud SaaS and virtual appli- cations have become much more prevalent in the enterprise, so in many cases applica- tions don’t have to be downloaded at all. If necessary, IT can still push out applications and updates to hundreds of globally roaming devices. OS and applications updates were much less frequent a few years ago and very time and resource intensive and LAN dependent. Mo- bile operating systems today tend to run on a cloud service model with much smaller, more frequent updates, which makes a lot more sense for the roaming mobile user. Containerization One of the ways EMM and mobile OS API’s enable BYOD and corporate owned, personally enabled (COPE) workstyles is through containerization. Using application wrapping, encryption and other similar meth- ods, IT can separate corporate and personal applications and data on the device such that interactions among them are disabled or restricted according to enterprise security policies. Containerization accomplishes both malware protection and Data Leakage Prevention (DLP). Since enterprise and personal appli- cations and data on the device are walled off from each other, any malware download- ed with personal applications or browsing has no impact on containerized enterprise applications and cannot be transmitted to the enterprise network when the device con- nects. Most EMM solutions such as XenMobile enforce this separation as well with per app virtual private network (VPN) connections ac- tivated automatically when certain enterprise applications connect to the corporate LAN. Per app VPN’s connect a single application, rather than the entire device, shutting out any malware from personal application use. Similarly, most operating system API’s and EMM systems allow IT to configure and en- force a number of policies that regulate users’ ability to cut and paste data from enterprise to personal applications, paste or attach enterprise data or files to personal email messages, and print files containing sensitive data. With Windows 10 laptops, desktops and EMM, containerization can be accomplished via digital rights management through the enforcement of Bitlocker encryption of all enterprise applications and data. IT can then leverage policies that prevent users from
  • 4. 4Citrix.com | White Paper | Unified Endpoint Management cutting and pasting encrypted content into unmanaged applications not using BitLocker encryption, including personal email client software. Any data downloaded from services such as SharePoint or a shared network are also encrypted. Thanks to Centennial, con- tainerization can be accomplished with legacy Win32 applications as well. Windows 10 delivers many other critical enterprise management features IT needs across devices. IT can push down and enforce a raft of policies and settings, enforce pass- word and encryption, enable self-enrollment of new devices through Azure Active Direc- tory or a third party EMM solution, manage corporate provisioned apps separately from user installed apps, distribute Windows 32 apps via .msi packages, enforce and deploy updates, and prevent access to dangerous Web sites, all without having to touch the device connecting it to the enterprise LAN. Any Win32 application that can’t be leveraged this way can be deployed to mobile devices via desktop virtualization using solutions such as Citrix XenApp and Xen Desktop. While the full breadth of management features may not equal those offered by CMT, the most critical and widely used management capabilities are there and will continue to evolve. Windows 10 Redstone 1 update added new management features and more will be added with Redstone 2, due for Spring 2017. With OS X Lion, Apple also started giving the desktop operating system most of the same policy based, self-enrollment management API’s as iOS and more will come with macOS Sierra. The Citrix UEM Solution Citrix is the only EMM provider with a full, integrated UEM suite that includes Citrix Xen- Mobile for UEM across all iOS, Google Android and Windows 10 devices, including desktops and notebooks. Citrix also offers XenApp and Xen Desktop for Windows desktop and application virtualization; a full IoT integra- tion, automation and messaging platform via its Octoblu acquisition; and Podio, a powerful and highly flexible Web based platform for organizing mobile collaboration and business processes across globally dispersed teams. Citrix XenMobile is providing increasing support for all operating system enterprise management API’s as they are introduced and adds its own unique capabilities that deliver management consistency across device oper- ating systems. These include full FIPS 140-2 compliant AES 256-bit encryption, its own MDX containerization features on top of those offered by operating system API’s and its own toolkit and SDK for wrapping individual appli- cations with the policies and containerization strategies necessary to protect their associ- ated sensitive information. This is important as XenMobile provides a seamless, productive experience for the user at the same time as it provides consistent, necessary protections for the enterprise. XenMobile also offers its own mobile enter- prise level Secure applications, such as Secure Mail and Secure Web, across iOS, Android and Windows 10 mobile and desktop systems and devices. Secure Mail is an enterprise email client and personal information manager with a user friendly interface much like those of device native email client solutions, but with scores of additional features that enhance security and usability in an enterprise setting. With Secure Mail, all corporate email, contacts, and calendar items are stored completely separate from the personal applications on the device. Secure Mail can be accessed via single sign-on after the user logs into Secure Hub, and offers multifactor authentication, remote wipe, and encryption in transit and at rest. IT can also enforce re- strictions on email attachments, and printing and cutting and pasting of information from other applications into emails. Secure Mail integrates with organizations’ existing data leakage prevention (DLP) tools, which monitor and restrict content sent out in enterprise emails. Secure Mail also offers out- standing convenience features, such as view- ing availability of meeting invitees, including online meetings and phone conference links in new meeting invitations and joining online meetings via a single touch. Secure Mail integrates tightly with XenMo- bile’s Secure Web mobile app, so that all email Web links are opened in a secure, sandboxed web browser environment. Secure Mail also integrates tightly with Citrix’s own ShareFile file sharing application, which is discussed below, so that ShareFile links rather than file attachments can be embedded in emails for tighter control over content sharing. Secure Web is a secure browser alternative that IT can use to place policies and restric- tions on Web browsing, particularly when connecting to the corporate network and intranet. Organizations can apply policies that govern which websites users can and cannot access, what enterprise firewall proxies are used to access them, and can analyze and filter URL’s to ensure they’re safe. ShareFile is XenMobile’s enterprise-class secure mobile file sync and share application, which provides the same or better features and convenience than consumer friendly Box and DropBox, but with enterprise-lev- el security and management. Rather than forcing users to store all information in the cloud, organizations can leverage ShareFile Storage Zones to store shared files either on-premises behind the firewall, in the Citrix ShareFile cloud service, or in another public cloud storage service of their choice. ShareFile can store files on internal CIF based network storage systems and provides connectors for Windows network shares and Microsoft SharePoint so that files don’t have to be migrated to another service in order to be shared. Secure Forms is Citrix’s easy-to-use full-fea- tured drag and drop solution that novices can use to create, populate and store mobile forms-based applications running on a variety of devices. Secure Forms helps organizations digitize and automate manual workflows and processes rapidly and eliminate double data entry and paperwork in the field. And perhaps most important, Secure Forms leverages
  • 5. 5Citrix.com | White Paper | Unified Endpoint Management all the powerful security and management features of Citrix XenMobile to protect and secure enterprise data and integrates seam- lessly with other XenMobile functions and productivity applications. Finally, organizations can use Secure Hub (the XenMobile enterprise app) to provide access to Secure apps, other mobile apps (either commercial third-party or enterprise developed), Web and SaaS services, and even Windows desktops and applications based on Active Directory group policies. Octoblu Citrix is unique in offering an integrated IoT automation, monitoring and analysis tool named Octoblu. With Octob- lu, Citrix extends mobility management to the emerging IoT enabled workplace where context-aware environments synthesize data from many different sources to respond to the needs of the user, increasing workplace efficiency and productivity. Octoblu software can be used to create workplace automation services such as launching a personalized desktop when a user approaches a worksta- tion; adjusting heating, cooling and lighting and starting GoToMeeting or Skype for Busi- ness meeting when staff enters a conference room; and using beacons to connect user automatically to nearby printers. The IoT possibilities are limitless. Podio adds a powerful, free enterprise cloud based mobile collaboration platform combin- ing team conversations, processes and con- tent sharing and integrates tightly with Citrix XenMobile security and management. Podio provides equivalent or better collaboration capabilities than enterprise solutions costing tens of thousands of dollars. With Windows 10 and macOS Sierra, Enter- prise Mobility Management Solutions can deliver a single Unified Endpoint Management capability for all mobile users, devices and applications. Enterprises should examine these solutions closely to see if UEM can not only simplify and slash the cost of managing, securing and simplifying the mobile work- place, but take the mobile enterprise into the era of IoT. Only Citrix offers a complete UEM solution that includes integrated manage- ment, security, application and desktop virtu- alization, mobile collaboration and enterprise IoT enablement. With Citrix solutions, the enterprise can realize the dream of the single integrated mobile workspace. With Windows 10 and macOS Sierra, Enterprise Mobility Manage- ment Solutions can deliver a single Unified Endpoint Manage- ment capability for all mobile users, devices and applications. Enterprise Sales North America | 800-424-8749 Worldwide | +1 408-790-8000 Locations Corporate Headquarters | 851 Cypress Creek Road Fort Lauderdale, FL 33309 United States Silicon Valley | 4988 Great America Parkway Santa Clara, CA 95054 United States Copyright© 2016 Inc. All rights reserved. Citrix, the Citrix logo, and other marks appearing herein are property of Citrix Systems, Inc. and/or one or more of its subsidiaries, and may be registered with the U.S. Patent and Trademark Office and in other countries. All other marks are the property of their respective owner/s.