Archive
#XenMobile, #MobileSolutions – Is this what we’ve been waiting for? – #Citrix, #ZenPrise, #BYOD
Ok, so Citrix has now presented their new offering after merging Zenprise into their product portfolio. And is this what you have been waiting for?
My personal answer to that is probably yes, now you have all the capabilities (almost) out there to get your BYOx program/strategy and architecture in place or if you just want to add additional capabilities to your existing service offerings.
I must say though that the packaging is compelling and VERY interesting!
Citrix Mobile Solutions Bundle
The Citrix Mobile Solutions Bundle, which is comprised of XenMobile MDMand CloudGateway, offers a complete enterprise mobility management solution that enables IT to manage and secure devices, apps, and data.
XenMobile MDM Edition
XenMobile MDM Edition offers market leading mobile device management capabilities that deliver role-based management, configuration and security of corporate and employee-owned devices.
What I’d like to see is a roadmap where Citrix becomes an even more complete provider of technology in the Mobility segment. I still believe that Mobility is not only about smartphones and tablets and all the apps that you shall deliver to those devices and non-managed and non-corporate owned devices. There is still a need to provide device management of corporate assets that are not smartphones and tablets! And why should you have to implement another device management service/product for those.
So please Citrix = add Windows 7/8, OS X and Linux device capabilities as well in your almost complete Enterprise Mobile Management offering!
The offering is of course also today an early release where the former Zenprise product and CloudGateway is provided under the same marketing and price bundle but I’m waiting for when we have one (1) enterprise app store! And all capabilities from one technical architecture and product that you enable each capability on a need basis and are licensed accordingly.
But this is a great step for Citrix and I must say that I’m looking forward to see where this is going, I mean the feature set is pretty awesome!
Compare Features |
XenMobile MDM Edition |
Mobile Solutions Bundle |
| Enterprise MDM | ||
| Device management | ![]() |
![]() |
| Configure policies | ![]() |
![]() |
| Security and compliance | ![]() |
![]() |
| Scalability and high-availability | ![]() |
![]() |
| Ease of administration | ![]() |
![]() |
| Provisioning and self-service enrollment | ![]() |
![]() |
| Enterprise integration | ![]() |
![]() |
| Monitor and support | ![]() |
![]() |
| Decommission devices | ![]() |
![]() |
| Secure email, browser and data sharing apps | ||
| @WorkMail | ![]() |
|
| Email attachment encryption | ![]() |
|
| @WorkWeb | ![]() |
|
| ShareFile integration | ![]() |
|
| Microsoft SharePoint integration | ![]() |
|
| Mobile app containers | ||
| Mobile application management | ![]() |
|
| MDX Vault | ![]() |
|
| MDX Interapp | ![]() |
|
| MDX Access | ![]() |
|
| App wrapping | ![]() |
|
| Unified app store | ||
| Enterprise app store | ![]() |
|
| Follow-me apps | ![]() |
|
| Identity management, single sign-on and scenario-based access control | ||
| Active Directory integration | ![]() |
|
| Instant application and data provisioning | ![]() |
|
| Single sign-on to apps and data | ![]() |
|
| App requests | ![]() |
|
| Instant application and data de-provisioning | ![]() |
|
| Strong authentication | ![]() |
|
| Secure remote access | ![]() |
|
| Policy enforcement | ![]() |
|
More information about the technologies have also been added to eDocs!
Of course also made their competition table:
Compare the Mobile Solutions Bundle to other enterprise mobility solutions
These are exciting times and I’m looking forward to play around with the whole bundle!
Read more about XenMobile/Mobile Solutions here!
//Richard
It all ADDS up with #BYOD (Assess + Design + Deploy + Support = Success)
Below you can read about a couple of webinars coming up on Citrix’s view on how to get your BYOD strategy up and running!
Cowboy consumerization is here…and it’s here to stay. You may not want to admit it, but you already have a few “outlaws” in your organization who are using their own devices, regardless of whether you allow them to or not. In fact, you probably have entire departments accessing email, apps and data on devices and through services that are not secure. The consumerization of IT is here to stay, so you may as well embrace it.
When business information is accessed by user-owned, consumer-grade devices, the right technology foundation is essential to ensure IT control. The question is where to begin. What are the business, user and IT benefits of enabling bring-your-own device (BYOD)?
The business wants to make employees more productive yet remain compliant. Users want access to all their enterprise apps and data from their many devices and IT wants to ensure security and control in a way that’s simple to manage.
Before you begin a BYOD initiative, it’s important to understand the underlying products that will become a part of your BYOD solution and their functionality and feature sets. One size does not fit all and, even though a BYOD solution may seem complex, it’s important to realize that it all boils down to addressing four key things:
- Multiple Devices – Employees are bringing their own devices (on average 3) into the workplace – whether you like it or not.
- Lots of Apps – IT have lots of them and different types (Windows, Web, SaaS and Mobile) that everyone want access to from their device.
- Unmanaged Data – Employees are..
Continue reading here!
//Richard
1st Test of Webroot SecureAnywhere – #Webroot, #SecureAnywhere, #BYOD – via @WeCloud
It’s not very often that I test endpoint protection, antivirus or antimalware software. But tonight I started to have a look at Webroot and I must say that I’m really liking it!
There are some parts in particular that I like about it:
- It’s “cloud” based, so you don’t need your own costly infrastructure!
- It takes seconds to deploy to a new Windows instance
- It scanned the XenDesktop controller that I installed it on in 42 SECONDS! Wow! That’s amazing! 😀

- The footprint is close to NOTHING!
- The installer is just a couple of MB!!
- It fits into the BYOD model
First of I just started a new trial, which was really easy! Just log on to the webpage and register, then after entering your info you’re all set and ready do deploy your “agents”.
My first thought was that this is really great for environments where you’d like low footprint, quick installation and low maintenance efforts of your antivirus software. And the way that Webroot does the scanning of the files etc. is so great and makes the software so quick and neat!
This must be perfect for XenDesktop and XenApp environments is my thought!! I’ll try it our more and will let you know! And why not provide this as an option in your BYOD program?
Here are some reviews that I was given by WeCloud, and they pretty much (or actually more) confirm that this is some good software!
“Easy-to-use and excellently-designed malware protection with powerful central management and deployment features, and which should appeal to a wide range of businesses”.
Read the review here!
AV Wars (RescuTechs LLC)
“No antivirus program we tested performed better at detection and removal of rootkits and scareware.”
Read the review here!
AV Test (Independent IT-Security Institute)
“100% Protection against 0-day malware attacks, inclusive of web and e-mail threats (Real-World Testing)”
Read the review here!
[Announcing] #ShareFile 2.0 for Android – #Citrix, #BYOD
Ok, Citrix has now also released an updated version of the ShareFile app for Android to incorporate the new security features there as well!
NICE!!!! 😀
Read the Citrix blog post below for more info and source link!
I’m pleased to announce the new version of the ShareFile application for Android tablets and phones. ShareFile for Android enables secure mobile work styles by providing users with a rich follow-me-data experience while offering IT the management and control needed to ensure sensitive corporate data is secure at all times. By 2020, the workplace will evolve to the point where there will be 7 desks for every 10 office workers, with each person accessing their company’s IT network from an average of 6 different devices.
According to a new report from Forrester, an estimated 258 million workers around the world choose their own laptops and 129 million buy their own smartphones. Currently 37% of all BYOD smartphones run on Google’s Android platform. The Citrix mobile application suite balances connectivity and personal freedom, allowing employees to access everything they need to securely conduct business regardless of whether they are working from home or on the road.
New Features
Another security feature added to this release is local device encryption for improved security of sensitive data.
ShareFile in action
The Salinas Police Department Deputy….
Continue reading here!
Native vs HTML5 – Which option is best?? – #Mobility via @appcelerator and @r0bsterry
This was a really good presentation from Appcelerator Inc!!
Check it out!!
New security threat at work: Bring-your-own-network
Computerworld – Even as IT pros wrestle with the bring-your-own-device (BYOD) trend, corporate security is being further complicated by another emerging trend: bring your own network (BYON).
BYON is a by-product of increasingly common technology that allows users to create their own mobile networks, usually through mobile wireless hotspots. Security professionals say BYON requires a new approach to security because some internal networks may now be as insecure as consumer devices.
Jim Kunick, an attorney with the Chicago law firm Much Shelist, said BYON represents a more dangerous threat to data security than employees who bring their own smartphones or tablets into the office. “The network thing blows this up completely, because it takes the data out of the network the company protects,” he said. “There’s no way to ensure the security of that data. People are running corporate apps and processing corporate and client data using networks that may or may not be secure.
“I mean, no one is sure the Boingo network is secure,” he said.
Continue reading here…
//Richard
Mastering the BYOD trend: The ultimate guide
Have a look at this BYOD guide and get inspired! 😉
“Let’s face it: The BYOD trend is a big deal.
IT admins have questions about the influx of personal smartphones and tablets in the enterprise. They worry about it. And they often need help figuring out what to do about bring your own device (BYOD) management, security and application delivery.
It takes a combination of technology, policy and organization-wide strategy to maximize the benefits of a BYOD program and minimize the risks. This comprehensive guide explains the basics and offers helpful, in-depth tips for admins stuck at any level of a BYOD program.”
Continue reading here!
//Richard
Microsoft Security Newsletter – September 2012
Ok, didn’t have the time to search where online the newsletter is located so I just copied some of it into this post. I think that there where some interesting posts/articles around “BYO”, Cloud etc. So browse and enjoy! 😉
| Welcome to September’s Security Newsletter! |
This month’s newsletter focuses on personal devices in the workplace, often times referred to as “Bring Your Own Device,” or BYOD. BYOD is a very hot topic these days as organizations grapple with the challenge of managing the risks involved in allowing corporate data to be placed on personal devices such as smart phones. At face value, BYOD has the potential to be a win-win proposition. However, depending on how BYOD is implemented and managed, it could be a Pandora’s box.The primary challenge is that some of the devices employees decide to bring to work may not have basic security or management capabilities. This challenge is compounded by the risks associated with connecting to social networks and by the diverse ways organizations and people are choosing to connect and share data today – such as the utilization of cloud services. We recently conducted a study to find out more about how personal devices are being used in the business environment. Our study found that:
BYOD does have distinct advantages. From the standpoint of the IT department, BYOD is generally seen as a cost-cutting measure because the burden of supplying the equipment is shifted to the employees. Some organizations subsidize BYOD policies with a per diem to offset the costs for users, but it still results in lower costs for the organization by relieving IT of its traditional role of maintenance and support. Another advantage of BYOD is that individuals tend to upgrade and embrace new platforms and technologies much faster than businesses. The organization benefits from being able to take advantage of cutting edge tools and features without the pain of deploying new hardware to the entire company. From the user’s perspective, BYOD means using devices and applications that are more familiar. Empowering users with the ability to choose which hardware and platforms they use creates more satisfied and productive workers. It also allows them to carry a single mobile device instead of one for work and another for personal use. The list of smart personal devices capable of connecting to private and public networks is rapidly and constantly expanding. For chief information security officers (CISOs) and chief security officers (CSOs), managing an ever growing list of devices and applications isn’t a sustainable model. Some of the security professionals I have talked to are shifting their focus to managing the data instead of the devices. They have concluded that device security is only a proxy for data security; if they can’t effectively manage the security of the devices that employees bring to work, they will focus on managing the security of the data itself. I think the industry recognizes the importance of securing personal devices and are making steps toward better management controls in the future. If you are interested in learning more about BYOD, I encourage you to read these blog posts recently published on the topic:
|
BYOD = reality or just a vision? – Part 2
Ok, where did we end part 1.. yes, it was around my personal view around why it’s not that easy for enterprises to adopt a BYOD concept similar to what we at EnvokeIT have.
(If you haven’t read part 1 you can do that here.)
So why can we work this way and not the enterprises, well there are many answers to that question. One reason may be that they have IPR etc that is important to protect and a legacy IT environment that has been around since the mainframe era with a lot of in-house developed apps, it’s a legacy that we newcomers don’t have! And they also have a much more complex organization with difference roles and requirements. It’s sometimes hard to tell a developer to work on any device with no development tools installed locally and only work in a remote desktop which requires him/her to be online. These users would perhaps want to be able to perform their development work from their vacation cabin up north with limited connectivity or wherever they can’t be connected. And the whole world doesn’t have the connectivity that we in europe are used to.
BYOD = reality or just a vision? – Part 1
BYOD – Bring Your Own Device – Part 1
Consumerization of IT, BYOD, BYOC and all the fuzz about that we shall and already have started to use our personal devices at work, or that our employer doesn’t provide us with a company asset anymore. So many definitions and models, it’s like asking someone what the definition of Cloud is. You’ll get all the different answers about what a ‘Private’, ‘Public’ and ‘Personal’ Cloud is etc. But where are we really?












