Archive

Archive for the ‘BYOD’ Category

#XenMobile, #MobileSolutions – Is this what we’ve been waiting for? – #Citrix, #ZenPrise, #BYOD

February 25, 2013 Leave a comment

Ok, so Citrix has now presented their new offering after merging Zenprise into their product portfolio. And is this what you have been waiting for?

My personal answer to that is probably yes, now you have all the capabilities (almost) out there to get your BYOx program/strategy and architecture in place or if you just want to add additional capabilities to your existing service offerings.

I must say though that the packaging is compelling and VERY interesting!

Citrix Mobile Solutions Bundle

The Citrix Mobile Solutions Bundle, which is comprised of XenMobile MDMand CloudGateway, offers a complete enterprise mobility management solution that enables IT to manage and secure devices, apps, and data.

XenMobile MDM Edition

XenMobile MDM Edition offers market leading mobile device management capabilities that deliver role-based management, configuration and security of corporate and employee-owned devices.

What I’d like to see is a roadmap where Citrix becomes an even more complete provider of technology in the Mobility segment. I still believe that Mobility is not only about smartphones and tablets and all the apps that you shall deliver to those devices and non-managed and non-corporate owned devices. There is still a need to provide device management of corporate assets that are not smartphones and tablets! And why should you have to implement another device management service/product for those.

So please Citrix = add Windows 7/8, OS X and Linux device capabilities as well in your almost complete Enterprise Mobile Management offering!

The offering is of course also today an early release where the former Zenprise product and CloudGateway is provided under the same marketing and price bundle but I’m waiting for when we have one (1) enterprise app store! And all capabilities from one technical architecture and product that you enable each capability on a need basis and are licensed accordingly.

But this is a great step for Citrix and I must say that I’m looking forward to see where this is going, I mean the feature set is pretty awesome!

Compare Features

XenMobile MDM Edition

Mobile Solutions Bundle

Enterprise MDM
Device management
Configure policies
Security and compliance
Scalability and high-availability
Ease of administration
Provisioning and self-service enrollment
Enterprise integration
Monitor and support
Decommission devices
Secure email, browser and data sharing apps
@WorkMail
Email attachment encryption
@WorkWeb
ShareFile integration
Microsoft SharePoint integration
Mobile app containers
Mobile application management
MDX Vault
MDX Interapp
MDX Access
App wrapping
Unified app store
Enterprise app store
Follow-me apps
Identity management, single sign-on and scenario-based access control
Active Directory integration
Instant application and data provisioning
Single sign-on to apps and data
App requests
Instant application and data de-provisioning
Strong authentication
Secure remote access
Policy enforcement

More information about the technologies have also been added to eDocs!

MobileSolutions_Citrix_edocs

 

Of course also made their competition table:

Compare the Mobile Solutions Bundle to other enterprise mobility solutions

These are exciting times and I’m looking forward to play around with the whole bundle!

Read more about XenMobile/Mobile Solutions here!

//Richard

It all ADDS up with #BYOD (Assess + Design + Deploy + Support = Success)

February 21, 2013 Leave a comment

Below you can read about a couple of webinars coming up on Citrix’s view on how to get your BYOD strategy up and running!

Cowboy consumerization is here…and it’s here to stay.  You may not want to admit it, but you already have a few “outlaws” in your organization who are using their own devices, regardless of whether you allow them to or not. In fact, you probably have entire departments accessing email, apps and data on devices and through services that are not secure. The consumerization of IT is here to stay, so you may as well embrace it.

When business information is accessed by user-owned, consumer-grade devices, the right technology foundation is essential to ensure IT control. The question is where to begin. What are the business, user and IT benefits of enabling bring-your-own device (BYOD)?

The business wants to make employees more productive yet remain compliant. Users want access to all their enterprise apps and data from their many devices and IT wants to ensure security and control in a way that’s simple to manage.

Before you begin a BYOD initiative, it’s important to understand the underlying products that will become a part of your BYOD solution and their functionality and feature sets. One size does not fit all and, even though a BYOD solution may seem complex, it’s important to realize that it all boils down to addressing four key things:

  • Multiple Devices – Employees are bringing their own devices (on average 3) into the workplace – whether you like it or not.
  • Lots of Apps – IT have lots of them and different types (Windows, Web, SaaS and Mobile) that everyone want access to from their device.
  • Unmanaged Data – Employees are..

Continue reading here!

//Richard

1st Test of Webroot SecureAnywhere – #Webroot, #SecureAnywhere, #BYOD – via @WeCloud

February 12, 2013 2 comments

It’s not very often that I test endpoint protection, antivirus or antimalware software. But tonight I started to have a look at Webroot and I must say that I’m really liking it!

There are some parts in particular that I like about it:

  1. It’s “cloud” based, so you don’t need your own costly infrastructure! 
  2. It takes seconds to deploy to a new Windows instance
  3. It scanned the XenDesktop controller that I installed  it on in 42 SECONDS! Wow! That’s amazing! 😀
    Scan_Time_42_seconds_wow
  4. The footprint is close to NOTHING!
  5. The installer is just a couple of MB!!
  6. It fits into the BYOD model

First of I just started a new trial, which was really easy! Just log on to the webpage and register, then after entering your info you’re all set and ready do deploy your “agents”.

My first thought was that this is really great for environments where you’d like low footprint, quick installation and low maintenance efforts of your antivirus software. And the way that Webroot does the scanning of the files etc. is so great and makes the software so quick and neat!

This must be perfect for XenDesktop and XenApp environments is my thought!! I’ll try it our more and will let you know! And why not provide this as an option in your BYOD program?

Here are some reviews that I was given by WeCloud, and they pretty much (or actually more) confirm that this is some good software!

PC Mag Review –  SecureAnywhere Antivirus
“Installer and program are incredibly tiny”
“Perfect score in my malware-blocking test”
 Read the review here!
 V3 Test & Review – Secure Anywhere

“Easy-to-use and excellently-designed malware protection with powerful central management and deployment features, and which should appeal to a wide range of businesses”. 
Read the review here!

AV Wars (RescuTechs LLC)
“No antivirus program we tested performed better at detection and removal of rootkits and scareware.”
Read the review here!

AV Test (Independent IT-Security Institute)
“100% Protection against 0-day malware attacks, inclusive of web and e-mail threats (Real-World Testing)” 
Read the review here!

//Richard

[Announcing] #ShareFile 2.0 for Android – #Citrix, #BYOD

February 12, 2013 Leave a comment

Ok, Citrix has now also released an updated version of the ShareFile app for Android to incorporate the new security features there as well!

NICE!!!! 😀

Read the Citrix blog post below for more info and source link!

I’m pleased to announce the new version of the ShareFile application for Android tablets and phones. ShareFile for Android enables secure mobile work styles by providing users with a rich follow-me-data experience while offering IT the management and control needed to ensure sensitive corporate data is secure at all times. By 2020, the workplace will evolve to the point where there will be 7 desks for every 10 office workers, with each person accessing their company’s IT network from an average of 6 different devices.

According to a new report from Forrester, an estimated 258 million workers around the world choose their own laptops and 129 million buy their own smartphones. Currently 37% of all BYOD smartphones run on Google’s Android platform. The Citrix mobile application suite balances connectivity and personal freedom, allowing employees to access everything they need to securely conduct business regardless of whether they are working from home or on the road.

New Features

Pin Passcode

Jail Break Detection

Gives users easier access to their data instead of having to type their password every time they start the application. Allows administrators to prevent their users from accessing their ShareFile data from jail broken devices.

Another security feature added to this release is local device encryption for improved security of sensitive data.

ShareFile in action

The Salinas Police Department Deputy….

Continue reading here!

Native vs HTML5 – Which option is best?? – #Mobility via @appcelerator and @r0bsterry

February 6, 2013 Leave a comment

New security threat at work: Bring-your-own-network

October 12, 2012 Leave a comment

Computerworld – Even as IT pros wrestle with the bring-your-own-device (BYOD) trend, corporate security is being further complicated by another emerging trend: bring your own network (BYON).

BYON is a by-product of increasingly common technology that allows users to create their own mobile networks, usually through mobile wireless hotspots. Security professionals say BYON requires a new approach to security because some internal networks may now be as insecure as consumer devices.

Jim Kunick, an attorney with the Chicago law firm Much Shelist, said BYON represents a more dangerous threat to data security than employees who bring their own smartphones or tablets into the office. “The network thing blows this up completely, because it takes the data out of the network the company protects,” he said. “There’s no way to ensure the security of that data. People are running corporate apps and processing corporate and client data using networks that may or may not be secure.

“I mean, no one is sure the Boingo network is secure,” he said.

Continue reading here

//Richard

Mastering the BYOD trend: The ultimate guide

Have a look at this BYOD guide and get inspired! 😉

“Let’s face it: The BYOD trend is a big deal.

IT admins have questions about the influx of personal smartphones and tablets in the enterprise. They worry about it. And they often need help figuring out what to do about bring your own device (BYOD) management, security and application delivery.

It takes a combination of technology, policy and organization-wide strategy to maximize the benefits of a BYOD program and minimize the risks. This comprehensive guide explains the basics and offers helpful, in-depth tips for admins stuck at any level of a BYOD program.” 

Continue reading here!

//Richard

Microsoft Security Newsletter – September 2012

September 21, 2012 Leave a comment

Ok, didn’t have the time to search where online the newsletter is located so I just copied some of it into this post. I think that there where some interesting posts/articles around “BYO”, Cloud etc. So browse and enjoy! 😉

Welcome to September’s Security Newsletter!
This month’s newsletter focuses on personal devices in the workplace, often times referred to as “Bring Your Own Device,” or BYOD. BYOD is a very hot topic these days as organizations grapple with the challenge of managing the risks involved in allowing corporate data to be placed on personal devices such as smart phones. At face value, BYOD has the potential to be a win-win proposition. However, depending on how BYOD is implemented and managed, it could be a Pandora’s box.The primary challenge is that some of the devices employees decide to bring to work may not have basic security or management capabilities. This challenge is compounded by the risks associated with connecting to social networks and by the diverse ways organizations and people are choosing to connect and share data today – such as the utilization of cloud services. We recently conducted a study to find out more about how personal devices are being used in the business environment. Our study found that:

  • 67% of people are using personal devices in the workplace whether it’s officially sanctioned by the organization or not.
  • 53% of organizations officially condone BYOD in some way, but only 22% of organizations support them through their IT department.
  • Cost savings resulting from employees using their own PCs and mobile devices is often a driving factor to BYOD. Less than half of organizations provide any financial subsidy for users who supply their own equipment.
  • A majority of companies are somewhat or very concerned about the risk of data breaches or intellectual property leaks.

BYOD does have distinct advantages. From the standpoint of the IT department, BYOD is generally seen as a cost-cutting measure because the burden of supplying the equipment is shifted to the employees. Some organizations subsidize BYOD policies with a per diem to offset the costs for users, but it still results in lower costs for the organization by relieving IT of its traditional role of maintenance and support.

Another advantage of BYOD is that individuals tend to upgrade and embrace new platforms and technologies much faster than businesses. The organization benefits from being able to take advantage of cutting edge tools and features without the pain of deploying new hardware to the entire company.

From the user’s perspective, BYOD means using devices and applications that are more familiar. Empowering users with the ability to choose which hardware and platforms they use creates more satisfied and productive workers. It also allows them to carry a single mobile device instead of one for work and another for personal use.

The list of smart personal devices capable of connecting to private and public networks is rapidly and constantly expanding. For chief information security officers (CISOs) and chief security officers (CSOs), managing an ever growing list of devices and applications isn’t a sustainable model. Some of the security professionals I have talked to are shifting their focus to managing the data instead of the devices. They have concluded that device security is only a proxy for data security; if they can’t effectively manage the security of the devices that employees bring to work, they will focus on managing the security of the data itself. I think the industry recognizes the importance of securing personal devices and are making steps toward better management controls in the future.

If you are interested in learning more about BYOD, I encourage you to read these blog posts recently published on the topic:

Read more…

BYOD = reality or just a vision? – Part 2

September 7, 2012 Leave a comment

Ok, where did we end part 1.. yes, it was around my personal view around why it’s not that easy for enterprises to adopt a BYOD concept similar to what we at EnvokeIT have.

(If you haven’t read part 1 you can do that here.)

So why can we work this way and not the enterprises, well there are many answers to that question. One reason may be that they have IPR etc that is important to protect and a legacy IT environment that has been around since the mainframe era with a lot of in-house developed apps, it’s a legacy that we newcomers don’t have! And they also have a much more complex organization with difference roles and requirements. It’s sometimes hard to tell a developer to work on any device with no development tools installed locally and only work in a remote desktop which requires him/her to be online. These users would perhaps want to be able to perform their development work from their vacation cabin up north with limited connectivity or wherever they can’t be connected. And the whole world doesn’t have the connectivity that we in europe are used to.

Read more…

Categories: All, BYOD, Citrix Tags: , ,

BYOD = reality or just a vision? – Part 1

September 5, 2012 1 comment

BYOD – Bring Your Own Device – Part 1

Consumerization of IT, BYOD, BYOC and all the fuzz about that we shall and already have started to use our personal devices at work, or that our employer doesn’t provide us with a company asset anymore. So many definitions and models, it’s like asking someone what the definition of Cloud is. You’ll get all the different answers about what a ‘Private’, ‘Public’ and ‘Personal’ Cloud is etc. But where are we really?

Read more…