Archive
WOW! – MS readies ‘Mohoro’ Windows desktop as a service – #BYOD, #DaaS – via @brianmadden
What can you say!?!? It wouldn’t surprise me a bit!! Of course Microsoft would come out with an Azure based cloud offerings of Desktops as a Service! I will follow this progress for sure, interesting and NOT so nice for quite a number of partners out there…
Summary: Microsoft is believed to be building a Windows Azure-hosted desktop virtualization service that could be available on a pay-per-use basis.
In yet another example of its growing emphasis on remaking itself as a devices and services company, Microsoft looks to be developing a pay-per-use “Windows desktop as a service” that will run on Windows Azure.

The desktop virtualization service, codenamed Mohoro, is in a very early development phase, from what I’ve heard from sources. I don’t know the final launch target, but I wouldn’t be surprised if it isn’t until the second half of 2014.
Mohoro is a town located on the island of Grande Comore in the Comoros Islands in the Indian Ocean. Given that members of the Microsoft India Development Center may be playing a key role in Mohoro’s development, according to my sources, the codename choice seems appropriate.
Microsoft owns the Mohoro.com and Mohoro.Net domain names.
Mohoro, like another Windows service, Windows Intune, is a product of Microsoft’s Server and Tools unit, I hear. Windows Intune is still not yet hosted on Windows Azure (as far as I know), but supposedly the plan is to move it to Azure at some point. Windows Intune already does make use of Windows Azure Active Directory as its directory and authentication service.
The same way that Windows Intune is the cloud complement to System Center, Mohoro seems to be the cloud version of Remote Desktop/Remote App.
This is like “Remote App as a hosted service,” said one of my contacts. It could be for companies who want thin clients or to run legacy apps on new PCs. Right now, companies have to have their own servers in the equation to do this, but “with Mohoro, you click a few buttons, deploy your apps, use Intune to push out configuration to all of your company’s devices, and you’re done,” my contact added.
Microsoft currently offers multiple ways for users to access their Windows desktops remotely via different virtualization technologies and products.
The aforementioned Remote App/Remote Desktop allows Windows users to connect to a remote Windows PC and access resources from it. On the Windows RT front, given that operating system’s restrictions on use of almost any existing Win32 applications, Remote Desktop provides a way for users to continue to use apps they already have on new hardware like the Microsoft Surface RT. Licensing of Remote Desktop and Remote Desktop Services is complex, however, and requires access to server infrastructure on the back-end.
Currently, it is not possible under Microsoft’s licensing terms to run Windows client in virtual machines hosted on Windows Azure. (The new Azure VMs do allow…
Continue to read this great blog post by Mary Jo Foley here!
//Richard
Do you develop your own mobile apps? – #Mobility
Ok, this is a pretty hot topic! Mobility is here to stay for a while, everyone speaks about Enterprise Mobility Management (EMM), MDM, MAM, MIM etc….
But how are business tackling this need to support business processes and functions for todays mobile workforce? And how do you out there build your mobile apps that are to support your users and business?
Do you outsource your app development, or do you do it in-house? Do you use any of the “cloud services” to build your apps like the following examples?
Here are some really interesting blog posts/articles on the subject!
THE BEST WAY TO DEVELOP MOBILE APPS? DON’T DEVELOP MOBILE APPS! – via Jeffrey Hammond
Mobile app dev: Outsource or in-house?
This is an interesting mobile world we live in, but how shall all business adopt to it the best way? 😉
Please share your view if you want!
//Richard
#Citrix #XenMobile #MDM Integration With #Cisco ISE for #BYOD
Interesting and a good blog post by Sameer Mehta.
World of BYOD
Bring your own device (BYOD) initiatives are enabling employees to bring their own personal devices to work and allowing them corporate access to services such as Email. We did a recent audit using our ability to integrate with security incident and event management (SIEM) systems for a customer. The audit provided visibility into their ActiveSync traffic and found devices that belonged to executives that were not under IT management. Here’s a snapshot of their BYO devices.
There are several reasons to enable such access – for example, to boost employee productivity or convenience of accessing email from any device. Having said that, as Uncle Ben puts it, “with great power comes great responsibility”, and this responsibility is on the IT administrator from a security point of view. It’s IT’s responsibility to make sure that corporate data is not compromised or leaked in the following scenarios:
- What happens when this personal device is lost or stolen?
- What happens if this device is jailbroken or rooted?
- What happens if this device ends up outside an approved geofence. For example, outside of the US?
- What happens if the user inadvertently installs an application that has the ability and access to the entire device memory, thereby having unauthorized access to corporate data?
End User’s perspective on Enterprise Mobility
End users want access to corporate services such as email, intranet, ability to share and collaborate over documents, and also use 3rd party applications such as Evernote, Quick Office or GoodReader. With mobile solutions such as XenMobile MDM, CloudGateway, ShareFile and GoToAssist, Citrix provides ubiquity i.e. ‘access any app. from any device’, and a unified view for applications with an enterprise app store, documents via ShareFile. Having said that, since the user is accessing multiple applications; end user experience is a key component of mobility solutions. For example, bootstrap authentication and provide single sign on (SSO) to other applications.
Enterprise IT perspective on BYOD
As IT is providing access to corporate services, the main concern is around data loss prevention (DLP) and protecting corporate content on the mobile device. This means, encrypting data at rest for application data, and documents that are hosted either on Sharepoint, Network File share or Cloud storage. From a DLP perspective, for security conscious organizations, the mobile solutions bundle, which includes XenMobile MDM and CloudGateway…
Continue reading here!
//Richard
#Citrix Nails Its Enterprise Mobility Strategy – #XenMobile, #BYOD – via @ekhnaser
Read this great article and see if you agree! 😉
Citrix Nails Its Enterprise Mobility Strategy
I have been very pleased with the strategy, execution and the road map that Citrix has developed around Enterprise Mobility. With the announcement of XenMobile MDM and the Mobile Solutions bundle, I can very easily say that the Citrix solution is the most complete and feature-rich offering on the market today.
XenMobile MDM is simply a name change for Zenprise, which Citrix acquired a few months earlier. I expected Citrix to simply change the “Z” to “X” and keep the name, but I guess Citrix marketing did not find that as amusing. That is not the only change that occurred: A new version of “Zenprise” also accompanies this release, and XenMobile MDM now brings it to version 8.0.1.
Many customers and colleagues have asked me why Citrix acquired an MDM provider — what are the value-adds and isn’t the world moving towards MAM anyway? To answer, we have to make a clear distinction between the use cases. I agree and concur that for BYOD initiatives, MAM is a better, cleaner way of doing this things and that MDM is not the ideal solution.
That being said, there are plenty of use cases where MDM is the only solution that makes sense and I will give you real-world examples. Have you heard of the “Belly” card? It is a customer recognition and rewards program from a company HQ’ed in Chicago that offers merchants a locked down iPad for display in their place of business. Customers can come in and scan their mobile phones on the iPad provided and after a certain number of check-ins they are offered a reward for their loyalty. In this case, belly would have very little use for MAM; they need an MDM solution to manage the thousands of iPads they have deployed.
Another example: United Airlines and American Airlines allow customers to use mobile devices in the cabin to purchase goods in-flight. Obviously, the airlines don’t want the flight attendants to use their own device for this, MDM shines again here.
Finally, what about financial institutions that want to continue to issue corporate-managed devices of different flavors? It’d be for security reasons, obviously. In this case, MDM shines.
When I see bloggers and analysts disqualify MDM, they are not thinking beyond BYOD, where the business world could have a use case built around an application they issue on a mobile device.
Did Citrix strike gold with its acquisition of Zenprise? I will say this much: It was one of the best acquisitions the company has ever made. The natural follow-up question is, what about CloudGateway? And my answer is, it is the glue that holds everything together and is the most important product in the Citrix solution today. Everything will go through CloudGateway moving forward and at version 2.5 has the following features:
- Enterprise app store with identity management capabilities for a single sign-on like experience
- Windows Applications and Desktops through XenApp and XenDesktop
- Mobile applications integration, provisioning, etc.
- SaaS applications integration, provisioning, etc
- Integration with Citrix ShareFile for enterprise DropBox functionality
CloudGateway also has a connector for Citrix Podio, and here I’ll be critical of Citrix the same way I’m critical of VMware for not integrating SocialCast. Why Citrix doesn’t make Podio…
Continue reading here!
//Richard
Surprising Stats About Mobile Security
Another good article!!
Surprising Stats About Mobile Security
IT security and data protection are the top ranked challenges faced by many mobile IT asset managers. This was certainly brought to light in Mobile Enterprise’s IT headaches executive survey, and recent research from the International Association of IT Asset Managers (IAITAM) brings this to light as well.
Lost/Stolen Devices Covered
Asset Tracking?
BYOD
Future Workplace Formula = 1 person x 6 devices @ two-thirds of a desk
This was an interesting news/announcement from Citrix, and I must agree with it! We’re moving into a new workplace era!
Get ready for redesigned offices that reduce real estate through fewer desks, redesigned space, increased mobility and use of BYO devices
SANTA CLARA, Calif. » By 2020 organizations are set to reduce office space by almost a fifth (17 percent) according to a new study by Citrix, a leader in mobile and cloud technology. The workplace of the future will provide just seven desks for every ten office workers, with each person accessing the corporate IT network from an average of six different computing devices. The figure for 2020 is as low as six desks for every ten workers in Singapore, the Netherlands, the USA and the UK. Some of the highest desk to worker ratios in 2020 will be in Japan (8.77), South Korea (7.95) and Germany (7.90).
Almost every organization says they will redesign office space to be more appealing. The workplace of the future will foster creativity, be inspiring and encourage collaboration by enabling people to work from wherever, whenever and on whatever device so that work becomes something people do, not a place people go.
The Citrix Workplace of the Future report, which polled 1,900 senior IT decision-makers across 19 countries, shows that a third of people (29 percent) will no longer work from their traditional office. Instead employees will base themselves from various semi-permanent locations including the home (64 percent), field and project sites (60 percent), and customer or partner premises (50 percent). People are also expected to access corporate applications, data and services from locations such as hotels, airports, coffee shops and while in transit.
The trend towards fewer office-based employees – who use multiple computing devices to access corporate apps, data and services from a range of locations outside of the traditional office – is part of a global trend called mobile workstyles. Globally, a quarter (24 percent) of organizations have already fully adopted mobile workstyles. By the middle of 2014, 83 percent of organizations will have embraced mobile workstyles.
Mobile workstyles have been adopted widely and rapidly because it offers a number of benefits.
- For organizations, workshifting – where people move work to more optimal times and locations – creates a more flexible, agile workplace (73 percent), lower employee-related costs (53 percent), reduce real estate costs (48 percent) and help attract (47 percent) and retain (44 percent) top talent.
- Employees benefit from workshifting with more flexibility (65 percent), increased personal productivity (62 percent), less commuting time (61 percent), and abetter work/life balance (55 percent). It also…
Continue reading here!
//Richard
#Citrix #BYOD Architecture overview – #XenMobile, #Mobility
I must say that this blog post is of course Citrix “twisted”, but I really like it! And it shows how Citrix provides a pretty complete offering in order to deliver Mobility- and BYO-compliant services.
The Citrix blog written by Christopher Campbell makes sense and I also agree that a picture is worth a thousand words! 🙂
I’m going to make this real easy and simple. As my grandfather would say “A picture is worth a thousand words”.
If you’re a XenDesktop or XenApp customer this is what your environment probably looks like.
Now this is what you need to enable BYOD and add that MAM, MDM, MIM (Data) and overall EMM functionality you’re looking for.
This is what your environment looks like after you enable BYOD.
Didn’t get that? OK, here is what BYOD looks like with multiple vendors.
Now, here is what BYOD looks like with Citrix.
Got it?
Read the whole blog post here!
//Richard
Do you really need a #BYOD policy? – via @GeneMarks
This is a really good article by Gene Marks!
Social media. Cloud computing. Gamification. SaaS. Social CRM. Virtualization. Mobile. Every year we hear of the latest technology issues facing small business owners like me. And now it’s BYOD (Bring Your Own Device). Everywhere I read in the tech world it’s BYOD. That’s because with the proliferation of smartphones, tablets and mini-laptops it’s become the hot tech security issue. Whitepapers are written. Seminars are conducted. Roundtables are moderated. It’s a BYOD year.
I have 10 people in my company. And a half dozen other contractors. These people are using smartphones, tablets and laptops to access our data. We do not have a BYOD policy. Do I really need one? Do all businesses, big or small, need to really worry about this? Or is just another scare tactic from a bunch of IT guys looking to put fear into their clients’ minds and generate additional billable hours.
Hmmm.
The fact that everyone in my company has a different smartphone is of no concern to me. Why should I care if Sam prefers his iPhone but Josh likes his Droid? They are using their phones to call clients on Verizon or AT&T or whatever so I’m not exposed to any risk there. The same with texting. But uh oh…then there’s email. Am I exposed to security issues when they send and retrieve email from our server? No. That’s because we have a hosted mail server and each employee has their own login to their email account. They set up their email on their own with instructions we gave them. Viruses, spam and all the other evil things that could happen via email are (hopefully) controlled by the security software running at the server level.
#Citrix #AppController 2.6 released as part of #MobileSolutions #Bundle #BYOD
As a part of the Mobile Solutions Bundle that now is available on MyCitrix you can find a new version of AppController.
AppController 2.6 supports the following new features:
- Certificate support. When you configure AppController for the first time in the web-based management console, you can add or create certificates on the Active Directory settings page.
- Microsoft Hyper-V support. You can install the AppController 2.6 virtual machine on Windows Server 2012 with Hyper-V enabled or on Microsoft Hyper-V Server 2012.
- Migration support to AppController 2.6. You can upgrade to AppController 2.6 from AppController 2.0 or from AppController 2.5.
- Mobile store support. You can upload mobile apps from the Apple App Store or Google Play to AppController. You can use the Citrix App Preparation Tool to wrap iOS and Android apps from the Apple App Store or Google Play. When you wrap the app, you can secure access and enforce policies. When you upload the app to AppController, you can configure the policies. You can also upload an app from the App Store or Google Play to AppController without using the App Preparation Tool.
- Secure connections to Active Directory. You can configure secure connections to Active Directory when you configure AppController 2.6 for the first time.
- ShareFile updates. In previous AppController versions, when you configured ShareFile, the domain sharefile.com was automatically appended to the domain name. In this release, the domain sharefile.com does not automatically append to the ShareFile domain name. You must enter the entire ShareFile domain name.
- Support for mobile links. You can configure mobile links to retrieve the name and description of apps automatically from the Apple App Store. For apps available through the Google Play Store, you enter the name, description and URL of the app. When you configure mobile links, links appear in Receiver with the Play Store or App Store name.
- Web proxy user name format. When you configure the web proxy, you can use either the SAMAccount format or the User Principal Name (UPN) as the user name.
Read more about it here!
//Richard










