Archive

Archive for the ‘BYOD’ Category

WOW! – MS readies ‘Mohoro’ Windows desktop as a service – #BYOD, #DaaS – via @brianmadden

What can you say!?!? It wouldn’t surprise me a bit!! Of course Microsoft would come out with an Azure based cloud offerings of Desktops as a Service! I will follow this progress for sure, interesting and NOT so nice for quite a number of partners out there…

SummaryMicrosoft is believed to be building a Windows Azure-hosted desktop virtualization service that could be available on a pay-per-use basis.

In yet another example of its growing emphasis on remaking itself as a devices and services company, Microsoft looks to be developing a pay-per-use “Windows desktop as a service” that will run on Windows Azure.

msdesktopvirtualizationstack

The desktop virtualization service, codenamed Mohoro, is in a very early development phase, from what I’ve heard from sources. I don’t know the final launch target, but I wouldn’t be surprised if it isn’t until the second half of 2014.

Mohoro is a town located on the island of Grande Comore in the Comoros Islands in the Indian Ocean. Given that members of the Microsoft India Development Center may be playing a key role in Mohoro’s development, according to my sources, the codename choice seems appropriate.

Microsoft owns the Mohoro.com and Mohoro.Net domain names.

Mohoro, like another Windows service, Windows Intune, is a product of Microsoft’s Server and Tools unit, I hear. Windows Intune is still not yet hosted on Windows Azure (as far as I know), but supposedly the plan is to move it to Azure at some point. Windows Intune already does make use of Windows Azure Active Directory as its directory and authentication service.

The same way that Windows Intune is the cloud complement to System Center, Mohoro seems to be the cloud version of Remote Desktop/Remote App. 

This is like “Remote App as a hosted service,” said one of my contacts. It could be for companies who want thin clients or to run legacy apps on new PCs. Right now, companies have to have their own servers in the equation to do this, but “with Mohoro, you click a few buttons, deploy your apps, use Intune to push out configuration to all of your company’s devices, and you’re done,” my contact added. 

Microsoft currently offers multiple ways for users to access their Windows desktops remotely via different virtualization technologies and products.

The aforementioned Remote App/Remote Desktop allows Windows users to connect to a remote Windows PC and access resources from it. On the Windows RT front, given that operating system’s restrictions on use of almost any existing Win32 applications, Remote Desktop provides a way for users to continue to use apps they already have on new hardware like the Microsoft Surface RT. Licensing of Remote Desktop and Remote Desktop Services is complex, however, and requires access to server infrastructure on the back-end.

Currently, it is not possible under Microsoft’s licensing terms to run Windows client in virtual machines hosted on Windows Azure. (The new Azure VMs do allow…

Continue to read this great blog post by Mary Jo Foley here!

//Richard

Do you develop your own mobile apps? – #Mobility

April 4, 2013 1 comment

Ok, this is a pretty hot topic! Mobility is here to stay for a while, everyone speaks about Enterprise Mobility Management (EMM), MDM, MAM, MIM etc….

But how are business tackling this need to support business processes and functions for todays mobile workforce? And how do you out there build your mobile apps that are to support your users and business?

Do you outsource your app development, or do you do it in-house? Do you use any of the “cloud services” to build your apps like the following examples?

Snappii

ManMade

Here are some really interesting blog posts/articles on the subject!

THE BEST WAY TO DEVELOP MOBILE APPS? DON’T DEVELOP MOBILE APPS! – via Jeffrey Hammond

Mobile app dev: Outsource or in-house?

This is an interesting mobile world we live in, but how shall all business adopt to it the best way? 😉

Please share your view if you want!

//Richard

#Citrix #XenMobile #MDM Integration With #Cisco ISE for #BYOD

Interesting and a good blog post by Sameer Mehta.

World of BYOD

 Bring your own device (BYOD) initiatives are enabling employees to bring their own personal devices to work and allowing them corporate access to services such as Email. We did a recent audit using our ability to integrate with security incident and event management (SIEM) systems for a customer. The audit provided visibility into their ActiveSync traffic and found devices that belonged to executives that were not under IT management. Here’s a snapshot of their BYO devices.

 

There are several reasons to enable such access – for example, to boost employee productivity or convenience of accessing email from any device. Having said that, as Uncle Ben puts it, “with great power comes great responsibility”, and this responsibility is on the IT administrator from a security point of view. It’s IT’s responsibility to make sure that corporate data is not compromised or leaked in the following scenarios:

  • What happens when this personal device is lost or stolen?
  • What happens if this device is jailbroken or rooted?
  • What happens if this device ends up outside an approved geofence. For example, outside of the US?
  • What happens if the user inadvertently installs an application that has the ability and access to the entire device memory, thereby having unauthorized access to corporate data?

End User’s perspective on Enterprise Mobility

End users want access to corporate services such as email, intranet, ability to share and collaborate over documents, and also use 3rd party applications such as Evernote, Quick Office or GoodReader. With mobile solutions such as XenMobile MDM, CloudGateway, ShareFile and GoToAssist, Citrix provides ubiquity i.e. ‘access any app. from any device’, and a unified view for applications with an enterprise app store, documents via ShareFile. Having said that, since the user is accessing multiple applications; end user experience is a key component of mobility solutions. For example, bootstrap authentication and provide single sign on (SSO) to other applications.

Enterprise IT perspective on BYOD

As IT is providing access to corporate services, the main concern is around data loss prevention (DLP) and protecting corporate content on the mobile device. This means, encrypting data at rest for application data, and documents that are hosted either on Sharepoint, Network File share or Cloud storage. From a DLP perspective, for security conscious organizations, the mobile solutions bundle, which includes XenMobile MDM and CloudGateway…

Continue reading here!

//Richard

VDI Smackdown: Head-to-head analysis of Citrix XenDesktop, Microsoft etc… via @rpruijt

Great work!!!! 🙂 Continue reading!!!

by Ruben Spruijt 

Are you looking for an independent overview of desktop virtualization solutions and curious about the different strategy questions? Do you want detailed information about the features and functions each desktop virtualization vendor is offering!? If so the VDI Smackdown you definitely must read!
In the current market there is an increasing demand for unbiased information about desktop virtualization solutions. This white paper is focused on solutions that are anticipated to have an important role in desktop virtualization deployments. An overview of available features of each solution has been created to allow an understanding and comparison of capabilities.

The latest solutions included in the feature matrix are: Citrix XenDesktop 5.6FP1, Citrix VDI-in-a-Box 5.2, Dell vWorkspace 7.6, Microsoft RDVH Windows8/Server 2012 and VMware View 5.2; The English whitepaper can be downloaded here. The Japanese version will be available as soon as possible.

Empowering the end-user by giving access to Windows, Web and Mobile applications so he can access data and information systems from both private and public datacenters regardless of the device or location is the ultimate strategic objective.
The delivery of the classic (Windows) desktop interface can be divided in two segments:

  • the classic desktop and laptop, running Windows, Linux or Mac OS X;
  • the virtual desktop running in the datacenter or local on the classic workstation.

In essence “desktop virtualization” is the de-coupling of the desktop, operating system and the applications from the underlying endpoint or device. This kind of virtualization can be subdivided into two types:

  • With the first type applications are executed remotely, server hosted, and presented at the endpoint via a remote display protocol.
  • With the second type applications are executed at the endpoint, client-side and presented locally.

Making Windows, Web and Mobile applications available to the end-user, regardless of the technology being used, is an important strategic objective of an advanced IT infrastructure. The Virtual Desktop (vDesktop) is an essential component in the range of Application and Desktop delivery solutions and in essence, it provides the following functions:

  • Flexibility: Detach the vDesktop from the endpoint; Several vDesktops can be used next to one another
  • BYO: enables delivery of applications and desktops for BYO scenario’s;
  • Access: vDesktop works independently of location, endpoint and network;
  • Security: Server Hosted – VDI; data in the computing center;
  • Freedom: Every user can have his own desktop with administrator privileges when needed;
  • Management: Centrally managed and hardware independent;
  • Legacy: It is simple to offer legacy applications on a state-of-the-art platform;
  • Sustainability: Power Management, handling the necessary resources in an efficient manner

The transition to a dynamic and optimized desktop is causing many IT organizations to reevaluate traditional IT operations, deployment, delivery, packaging, support, and management methods.
Desktop virtualization is a key component in the optimized desktop. It’s important to have a Vision and Strategy around application and desktop delivery and enterprise mobility. Designing, building, managing and maintaining the desktop virtualization…

Continue reading here!

//Richard

#Citrix Nails Its Enterprise Mobility Strategy – #XenMobile, #BYOD – via @ekhnaser

Read this great article and see if you agree! 😉

Citrix Nails Its Enterprise Mobility Strategy

I have been very pleased with the strategy, execution and the road map that Citrix has developed around Enterprise Mobility. With the announcement of XenMobile MDM and the Mobile Solutions bundle, I can very easily say that the Citrix solution is the most complete and feature-rich offering on the market today.

XenMobile MDM is simply a name change for Zenprise, which Citrix acquired a few months earlier. I expected Citrix to simply change the “Z” to “X” and keep the name, but I guess Citrix marketing did not find that as amusing. That is not the only change that occurred: A new version of “Zenprise” also accompanies this release, and XenMobile MDM now brings it to version 8.0.1.

Many customers and colleagues have asked me why Citrix acquired an MDM provider — what are the value-adds and isn’t the world moving towards MAM anyway? To answer, we have to make a clear distinction between the use cases. I agree and concur that for BYOD initiatives, MAM is a better, cleaner way of doing this things and that MDM is not the ideal solution.

That being said, there are plenty of use cases where MDM is the only solution that makes sense and I will give you real-world examples. Have you heard of the “Belly” card? It is a customer recognition and rewards program from a company HQ’ed in Chicago that offers merchants a locked down iPad for display in their place of business. Customers can come in and scan their mobile phones on the iPad provided and after a certain number of check-ins they are offered a reward for their loyalty. In this case, belly would have very little use for MAM; they need an MDM solution to manage the thousands of iPads they have deployed.

Another example: United Airlines and American Airlines allow customers to use mobile devices in the cabin to purchase goods in-flight. Obviously, the airlines don’t want the flight attendants to use their own device for this, MDM shines again here.

Finally, what about financial institutions that want to continue to issue corporate-managed devices of different flavors? It’d be for security reasons, obviously. In this case, MDM shines.

When I see bloggers and analysts disqualify MDM, they are not thinking beyond BYOD, where the business world could have a use case built around an application they issue on a mobile device.

Did Citrix strike gold with its acquisition of Zenprise? I will say this much: It was one of the best acquisitions the company has ever made. The natural follow-up question is, what about CloudGateway? And my answer is, it is the glue that holds everything together and is the most important product in the Citrix solution today. Everything will go through CloudGateway moving forward and at version 2.5 has the following features:

  • Enterprise app store with identity management capabilities for a single sign-on like experience
  • Windows Applications and Desktops through XenApp and XenDesktop
  • Mobile applications integration, provisioning, etc.
  • SaaS applications integration, provisioning, etc
  • Integration with Citrix ShareFile for enterprise DropBox functionality

CloudGateway also has a connector for Citrix Podio, and here I’ll be critical of Citrix the same way I’m critical of VMware for not integrating SocialCast. Why Citrix doesn’t make Podio…

Continue reading here!

//Richard

Surprising Stats About Mobile Security

February 28, 2013 Leave a comment

Another good article!!

Surprising Stats About Mobile Security

IT security and data protection are the top ranked challenges faced by many mobile IT asset managers. This was certainly brought to light in Mobile Enterprise’s IT headaches executive survey, and recent research from the International Association of IT Asset Managers (IAITAM) brings this to light as well.

When IAITAM asked: how do organizations handle mobility and security? Fifty five percent of respondents access the enterprise from a remote location during off hours and the same number can access enterprise information from any BYOD device. Yet only 60% of organizations track how, how long or who is accessing remotely.
Out of those employees who do access the enterprise remotely, slightly more than half use a secure key or digital pass, while 49% use a login name and password on a secure site. A little more than half (53%) of organizations surveyed have an intrusion protection system for deployed mobile units.

Lost/Stolen Devices Covered
Nearly 90% of respondents have a mobile device policy and process in place for lost, misplaced or stolen mobile devices. At the same time, little more than a quarter have real-time location system tracking on any/all mobile devices. Still, 56% say they are able to perform a remote wipe of all data.
Less than half (43%) will automatically replace a lost, misplaced or stolen device within a 24 to 48 hour period. Eighty-four percent of companies have a firm policy that employees leaving the company must surrender their mobile device(s).
Tracking software downloaded on devices and preventing software downloads came in third and fourth as the most challenging issues, respectively, but with the predicted growth of mobile malware, this number could change going forward.

Asset Tracking?
Nearly 60% believe that they are managing mobile security adequately, but nearly 75% surveyed felt that licensing and management of mobile device assets is a challenge; 52% track their assets using an automated tool, while 36% still use spreadsheets. Another 12% are not tracking mobile assets at all. Members of the Mobile Enterprise Editorial Advisory recently had few things to say about this topic.
The main software programs accessed through a mobile handheld device or smartphone are Microsoft (85%), Google (52%) and Adobe (26%). Many of these same software publishers aggressively protect their intellectual property through software audits.

BYOD
Fifty-one percent of organizations surveyed had a BYOD or BYOT [technology] program that allows employees to use their personal mobile devices for work purposes. Surprisingly, 60% who took advantage of a BYOD program only accounted for 25% or less of employees who brought in their personal devices. 
 
More than three-quarters (77%) allow their employees…
Continue reading here!
//Richard

Future Workplace Formula = 1 person x 6 devices @ two-thirds of a desk

February 28, 2013 Leave a comment

This was an interesting news/announcement from Citrix, and I must agree with it! We’re moving into a new workplace era!

Get ready for redesigned offices that reduce real estate through fewer desks, redesigned space, increased mobility and use of BYO devices

SANTA CLARA, Calif. » By 2020 organizations are set to reduce office space by almost a fifth (17 percent) according to a new study by Citrix, a leader in mobile and cloud technology. The workplace of the future will provide just seven desks for every ten office workers, with each person accessing the corporate IT network from an average of six different computing devices. The figure for 2020 is as low as six desks for every ten workers in Singapore, the Netherlands, the USA and the UK. Some of the highest desk to worker ratios in 2020 will be in Japan (8.77), South Korea (7.95) and Germany (7.90).

Almost every organization says they will redesign office space to be more appealing. The workplace of the future will foster creativity, be inspiring and encourage collaboration by enabling people to work from wherever, whenever and on whatever device so that work becomes something people do, not a place people go.

The Citrix Workplace of the Future report, which polled 1,900 senior IT decision-makers across 19 countries, shows that a third of people (29 percent) will no longer work from their traditional office. Instead employees will base themselves from various semi-permanent locations including the home (64 percent), field and project sites (60 percent), and customer or partner premises (50 percent). People are also expected to access corporate applications, data and services from locations such as hotels, airports, coffee shops and while in transit.

The trend towards fewer office-based employees – who use multiple computing devices to access corporate apps, data and services from a range of locations outside of the traditional office – is part of a global trend called mobile workstyles. Globally, a quarter (24 percent) of organizations have already fully adopted mobile workstyles. By the middle of 2014, 83 percent of organizations will have embraced mobile workstyles.

Mobile workstyles have been adopted widely and rapidly because it offers a number of benefits.

  • For organizations, workshifting  – where people move work to more optimal times and locations – creates a more flexible, agile workplace (73 percent), lower employee-related costs (53 percent), reduce real estate costs (48 percent) and help attract (47 percent) and retain (44 percent) top talent.
  • Employees benefit from workshifting with more flexibility (65 percent), increased personal productivity (62 percent), less commuting time (61 percent), and abetter work/life balance (55 percent). It also…

Continue reading here!

//Richard

 

#Citrix #BYOD Architecture overview – #XenMobile, #Mobility

February 28, 2013 Leave a comment

I must say that this blog post is of course Citrix “twisted”, but I really like it! And it shows how Citrix provides a pretty complete offering in order to deliver Mobility- and BYO-compliant services.

The Citrix blog written by Christopher Campbell makes sense and I also agree that a picture is worth a thousand words! 🙂

I’m going to make this real easy and simple. As my grandfather would say “A picture is worth a thousand words”.

If you’re a XenDesktop or XenApp customer this is what your environment probably looks like.

Now this is what you need to enable BYOD and add that MAM, MDM, MIM (Data) and overall EMM functionality you’re looking for.

This is what your environment looks like after you enable BYOD.

Didn’t get that? OK, here is what BYOD looks like with multiple vendors.

Now, here is what BYOD looks like with Citrix.

Got it?

Read the whole blog post here!

//Richard

Do you really need a #BYOD policy? – via @GeneMarks

February 27, 2013 Leave a comment

This is a really good article by Gene Marks!

Social media.  Cloud computing.  Gamification.  SaaS.  Social CRM. Virtualization.  Mobile.  Every year we hear of the latest technology issues facing small business owners like me.   And now it’s BYOD (Bring Your Own Device).  Everywhere I read in the tech world it’s BYOD.  That’s because with the proliferation of smartphones, tablets and mini-laptops it’s become the hot tech security issue.  Whitepapers are written.  Seminars are conducted. Roundtables are moderated.  It’s a BYOD year.

I have 10 people in my company.  And a half dozen other contractors.  These people are using smartphones, tablets and laptops to access our data.  We do not have a BYOD policy.  Do I really need one?  Do all businesses, big or small, need to really worry about this?  Or is just another scare tactic from a bunch of IT guys looking to put fear into their clients’ minds and generate additional billable hours.

Hmmm.

The fact that everyone in my company has a different smartphone is of no concern to me.  Why should I care if Sam prefers his iPhone but Josh likes his Droid?  They are using their phones to call clients on Verizon or AT&T or whatever so I’m not exposed to any risk there.  The same with texting.  But uh oh…then there’s email.  Am I exposed to security issues when they send and retrieve email from our server?  No.  That’s because we have a hosted mail server and each employee has their own login to their email account.  They set up their email on their own with instructions we gave them.  Viruses, spam and all the other evil things that could happen via email are (hopefully) controlled by the security software running at the server level.

Read more…

#Citrix #AppController 2.6 released as part of #MobileSolutions #Bundle #BYOD

February 25, 2013 Leave a comment

As a part of the Mobile Solutions Bundle that now is available on MyCitrix you can find a new version of AppController.

AppController 2.6 supports the following new features:

  • Certificate support. When you configure AppController for the first time in the web-based management console, you can add or create certificates on the Active Directory settings page.
  • Microsoft Hyper-V support. You can install the AppController 2.6 virtual machine on Windows Server 2012 with Hyper-V enabled or on Microsoft Hyper-V Server 2012.
  • Migration support to AppController 2.6. You can upgrade to AppController 2.6 from AppController 2.0 or from AppController 2.5.
  • Mobile store support. You can upload mobile apps from the Apple App Store or Google Play to AppController. You can use the Citrix App Preparation Tool to wrap iOS and Android apps from the Apple App Store or Google Play. When you wrap the app, you can secure access and enforce policies. When you upload the app to AppController, you can configure the policies. You can also upload an app from the App Store or Google Play to AppController without using the App Preparation Tool.
  • Secure connections to Active Directory. You can configure secure connections to Active Directory when you configure AppController 2.6 for the first time.
  • ShareFile updates. In previous AppController versions, when you configured ShareFile, the domain sharefile.com was automatically appended to the domain name. In this release, the domain sharefile.com does not automatically append to the ShareFile domain name. You must enter the entire ShareFile domain name.
  • Support for mobile links. You can configure mobile links to retrieve the name and description of apps automatically from the Apple App Store. For apps available through the Google Play Store, you enter the name, description and URL of the app. When you configure mobile links, links appear in Receiver with the Play Store or App Store name.
  •  Web proxy user name format. When you configure the web proxy, you can use either the SAMAccount format or the User Principal Name (UPN) as the user name.

Read more about it here!

//Richard