Archive
Finally – Citrix Workspace Cloud is GA! – #Citrix, #WorkSpaceCloud, #DaaS, #SaaS, @EnvokeIT
This is something that we at EnvokeIT have been trying out for quite a while and really enjoy, it’s a great service that will simplify a lot for many service providers and customers. Contact us at EnvokeIT if you have any questions or if you need assistance on your journey to the cloud!
Now your business can take advantage of Citrix Workspace Cloud, the fastest and easiest way for IT to enable business productivity with secure apps, data, device management and more.
I’m pleased to announce the general availability of Citrix Workspace Cloud, the industry’s simplest way to build and deliver a complete workspace without compromise.
Now, you can easily combine virtual apps and desktops, mobile apps and device policies and data – securely delivered from any cloud or infrastructure you choose – whether on-premises, off-premises or both in a hybrid model.
Workspace Cloud is Revolutionary
Over the past 18 months, the team has been busy engaging with customers, partners, industry analysts, media, Citrix Technology Professionals, ISVs and alliance partners around the world as we built Workspace Cloud.
The general reaction has been consistent: Workspace Cloud is unlike anything else and comprehensively addresses the biggest challenges in workspace management.
The cloud-based management and control plane accelerates deployments. The choice of infrastructure locations provides the flexibility partners and customer’s demand, and the comprehensive set of workspace services that are always up to date ensure you can meet the broad set of IT use cases.
A single unified, global, and multi-tenant SaaS platform to create complete workspaces
People do their best work when they have immediate access to their work resources – the people, apps, and files they need at any specific moment or context.
While other vendors offer a ‘workspace’ that is nothing more than virtual desktops offered in their own cloud, Workspace Cloud makes it easy to deliver a people-centric, modern workspace located on-premises, off-premises or both in a hybrid model.
Easily compose workspaces containing apps, desktops, mobile and data. Workspace management allows you to use existing corporate Active Directory domains to add, remove or change the resources from one place once and on-demand – everyone and every resource in the workspace is updated.
Stay in control and retain choice for your infrastructure and cloud selections
Want to run your contractor applications out of Amazon, your productivity apps in Azure to be near their Office 365 data, and desktops on-premises? No problem. Workspace Cloud provides the only solution that allows you to select the best infrastructure combinations based on economics, performance, existing capacity, sovereignty, and expertise. This means the selection can be made on a per-service basis. This choice extends not only to your applications and desktops, but also to your data.
Workspace Cloud accelerates deployment and management through a SaaS-based control plane and securely communicates with your infrastructure through a simple cloud connector. Driven by a simple stateless, zero-touch management architecture. After a simple installation the connector is ready to provision resources, enumerate users from Microsoft Active Directory domains, and launch session requests.
Comprehensive portfolio of workspace services available as a subscription
Workspace Cloud subscriptions contains services that address the core use cases customers face every day and are available today. Start with one offering but easily add more based upon your expanding business needs.
The core services we’re announcing today include:
- Applications and Desktops Service – Deliver secure virtual apps and desktops to any device, and leave the product installation, setup, configuration, upgrades and monitoring to Citrix based on industry-leading XenApp and XenDesktop technology.
- Mobility Service – Provide cloud-based, comprehensive enterprise mobility management (EMM) — including mobile device management (MDM), mobile application management, and enterprise-grade productivity apps — for a secure user experience on BYOD or corporate devices based on XenMobile technology.
- Secure Document Service – Meet the mobility and collaboration needs of employees and the data security requirements of the enterprise with this secure enterprise file sync and sharing service based on ShareFile technology.
- Lifecycle Management Service – Accelerate and automate the design, deployment, and ongoing management of Citrix enterprise workloads with comprehensive lifecycle management. The service provides standardized, repeatable automation technology with a catalog of blueprints – assembled scripts that capture configurations, settings and other complex details into a single repeatable solution. Read more about this new technology here.
Continue reading more here!
//Richard
#XenMobile and the #Citrix Mobile Workspaces Architecture – #BYOD
This is a great blog post by Christopher Campbell and good picture to show the overall capabilities and architecture of the Citrix offering!
You’ve heard us talk about Mobile Workspaces and if you’re a techie you’re probably wondering if Citrix really has the architectural components (a complete, comprehensive and fully integrated architecture) that can deliver any app and data to any user on any device over any network?
Well let’s first identify a few of the market leading technologies that make up the Citrix Mobile Workspaces solution:
- XenApp mobilizes and secures Windows apps on any device
- XenDesktop securely delivers virtual Windows desktops and apps on any device
- XenMobile manages and secures mobile, web and SaaS apps on mobile devices
- GoToMeeting empowers people to meet and collaborate with anyone, anywhere
- ShareFile shares and syncs corporate data securely from any location
- NetScaler optimizes and secures app delivery and on any network
- CloudPlatform orchestrates and provisions apps, desktops and IT services from any cloud
OK, OK. We know you have the products but do they really integrate?
Yes. Don’t believe me? Well as they say a picture is worth a thousand words. This is what the Mobile Workspace Architecture looks like.
OK. I get it. You have the architecture but that doesn’t necessarily translate to a seamless user experience.
Still don’t believe huh? Well this is what the user experience looks like.
XenMobile is a key ingredient in delivering a mobile workspace. Along with XenApp and XenDesktop it allows organizations to deliver on giving users access to any app from any device. In fact, if you’re an existing XenApp or XenDesktop customer, XenMobile seamlessly plugs into your existing architecture.
If you’re a XenDesktop or XenApp customer this is what your environment probably looks like.
Now this is what you need to enable EMM for BYO and COPE (Corporate Owned, Personally Enabled) devices and add that MDM, MAM, Secure Email, Secure Data…
Continue reading here!
//Richard
#Rackspace launches high performance cloud servers – #IaaS via @ldignan
Rackspace on Tuesday rolled out new high performance cloud servers with all solid-state storage, more memory and the latest Intel processors.
The company aims to take its high performance cloud servers and pitch them to companies focused on big data workloads. Rackspace’s performance cloud servers are available immediately in the company’s Northern Virginia region and will come online in Dallas, Chicago and London this month. Sydney and Hong Kong regions will launch in the first half of 2014.
Among the key features:
- The public cloud servers have RAID 10-protected solid state drives;
- Intel Xeon E5 processors;
- Up to 120 Gigabytes of RAM;
- 40 Gigabits per second of network throughput.
Overall, the public cloud servers, which run on OpenStack, provide a healthy performance boost of Rackspace’s previous offering. The performance cloud servers are optimized for Rackspace’s cloud block storage.
Rackspace said it will offer the performance cloud servers as part of a hybrid data center package.
Continue reading here!
//Richard
#BYOD + #Messaging + #Collaboration + #Data securely = How??
Yes, how do you solve this?
I’m running into this topic lately with a lot of people and customers….
It’s around the whole BYOD and unmanaged devices and how useful they are in an enterprise world and all the capabilities and way of working that you’re used to in a secure and still cost effective way (and let’s not forget in a USER FRIENDLY way)!
One question that I’ve not yet found an answer to is:
How do we have all offline capabilities needed for an “Office” worker on a BYOD in our enterprise landscape? How do we ensure that you can use our Messaging, Collaboration and Data/Info services on this totally unmanaged device in a SECURE way?
This is a tough challenge! I guess that most of your users are used to using the Office suite locally on their managed device where they can use Outlook offline, work with data/files in Excel and Word etc offline. But what happens if you tell them to use an unmanaged device or their own personal device of their choice?
All of a sudden there is no real good way of providing them with offline messaging and collaboration (Outlook Anywhere and Lync for instance) capabilities in a secure manner. This BYOD/unmanaged device is not a part of your AD, you have no control and cannot enforce anything! So Outlook that is installed on it may use your Outlook Anywhere service but then its data sits on that unmanaged device unencrypted and unsecured!
Think of the picture above (yes I know it’s a mess but I just want to illustrate the issue), you have BYOD devices that are running Windows 7, XP, 8 etc and also Mac OS X. What if you open up your Outlook anywhere service to those devices, then all your emails etc. will be unsecured on them!
Citrix and others are focusing on providing this email capability in a secure manner on all mobile OS’s like iOS and Android etc through it’s Citrix Worx apps for mail and also the newly announced Hosted MobileMail. But these are more or less just targeted against mobile devices (smartphones and tablets), but what about the standard laptop users!?!?! They need something as well!
And Windows RMS and other solutions just wont fit very well here… Citrix XenVault was something that could have worked to enable offline support for corporate Messaging services but it’s not there… I’d like to run corporate apps locally on the device offline in a secure and controllable container!!
The same issue you have with Data!!!
ShareFile doesn’t support encryption on Windows or OS X!!!
But it does on mobile devices.. I guess you have to trust your users and BYOD devices that they are encrypted using BitLocker or FileVault etc…. but can you?
So please enlighten me here what the missing puzzle piece is!! Because I have a hard time taking away a managed device form a user and tell them that they on their BYOD device HAVE TO BE ONLINE TO WORK! It’s a step back from a usability and productiveness point of view… but it may be a cost saver though… but is a BYOD/unmanaged device and a VDI or Hosted Shared Desktop always a good option to provide business apps to that laptop? NO! I guess everyone have understood that making business apps and functions web-based or mobile app based is good and a lot of focus is there, but we cannot forget the traditional productive device that the laptop is!
If you know the magic solution to these challenges please let me know! 🙂
Cheers!
//Richard
#Windows #Azure Active Directory steps out of the shadows
I’ve blogged about this release before with some info but here is another good article about how it can assist you in managing user authentication in the cloud.
Microsoft recently announced the general availability of Windows Azure Active Directory, a cloud-based service that lets admins manage multiple user identities and access. Although it’s been lurking in the background of other Microsoft products for some time — and still requires work to make it a fully useful tool — it’s a step in the right direction.
At its core, Windows Azure Active Directory is essentially a copy of Active Directory held in the cloud that provides basic authorization and authentication when users access cloud services. Ideally, admins use it to centralize the database of authorized users for cloud services, which then lets them authorize employees and contractors to work in certain applications. This allowance includes both Microsoft and third-party applications that accept authentication through common industry standards.
Through synchronization with an on-premises Active Directory deployment, you can also deploy single sign-on, so users don’t have to remember multiple passwords or enter them more than once to access cloud applications. More importantly, it provides a better way to remove access to cloud services for users who have left the company — a previous weak link in the cloud identity management story.
Windows Azure Active Directory: Not exactly new
True to Microsoft’s history of dogfooding its own products, Windows Azure Active Directory had been in use for nearly a year before its current general release. Few actually knew that all Office 365 accounts have been using a preview release of Windows Azure Active Directory for some time. Users of the general Windows Azure service, Dynamics CRM andWindows Intune also have their details stored in private Windows Azure Active Directory accounts.
According to Microsoft, since just after the beginning of the 2013 calendar year, “Windows Azure AD has processed over 65 billion authentication requests while maintaining 99.97% or better monthly availability.” Windows Azure Active Directory is a distributed service running across 14 of Microsoft’s data centers all over the globe.
User interface improvements
One improvement that happened between the preview release of Windows Azure Active Directory and the Web version release is the user interface, which was basically nonexistent before. Now you can access a clean section of the modern-looking Windows Azure control panel to create and manage instances of Windows Azure Active Directory (Figure 1).
You can add these instances to your Windows Azure subscription by logging into your Microsoft account, which…
Continue reading here!
//Richard
Report: Android malware doubled in 2012, infecting 33M devices
Malware attacks on devices running Google’s (NASDAQ:GOOG) open-source Android mobile operating system more than doubled in 2012, security solutions firm NQ Mobile reports.
![]() |
NQ Mobile saw a year-over-year increase of malware of 163 percent. |
NQ Mobile discovered 65,227 new pieces of mobile malware in 2012 compared to 24,794 in 2011, a year-over-year increase of 163 percent. Among all new malware discovered last year, 94.8 percent of threats were designed to attack Android, compared to just 4 percent targeting rival open-source platform Symbian. In all, more than 32.8 million Android devices were infected in 2012, up from 10.8 million in 2011, representing an increase of more than 200 percent.
Chinese devices accounted for 25.5 percent of infected Android devices, followed by India (19.4 percent), Russia (17.9 percent), the United States (9.8 percent) and Saudi Arabia (9.6 percent). Fifty-three percent of U.S. Android owners have installed a mobile security app on their device, NQ Mobile adds.
Sixty-five percent of mobile malware discovered in 2012 falls into the category of Potentially Unwanted Programs–e.g., root exploits, spyware, pervasive adware and Trojans (surveillance hacks). Twenty-eight percent was designed to collect and profit from a user’s personal data, and 7 percent was built to prevent the user’s device from functioning properly.
The primary methods for delivering malware in 2012 included App Repackaging (adding lines of malicious code into a legitimate app and reloading it onto a third-party marketplace), Smishing (asking consumers to click on a fraudulent link, triggering a malicious app download or directing their browser to a rogue website) and Malicious URLs (redirecting the browser from genuine websites to clone sites intended to collect personal data).
Critics maintain Google has failed to sufficiently police its Google Play digital storefront, making it easy for attackers to distribute malware via Android applications. Google has made strides to reduce Android threats, however: In early 2012, it unveiled Bouncer, which scans Google Play for malicious apps, and its Android 4.2 OS update, a.k.a. Jelly Bean, bakes in application verification tools.
The NQ Mobile report…
Continue reading here!
//Richard
It all ADDS up with #BYOD (Assess + Design + Deploy + Support = Success)
Below you can read about a couple of webinars coming up on Citrix’s view on how to get your BYOD strategy up and running!
Cowboy consumerization is here…and it’s here to stay. You may not want to admit it, but you already have a few “outlaws” in your organization who are using their own devices, regardless of whether you allow them to or not. In fact, you probably have entire departments accessing email, apps and data on devices and through services that are not secure. The consumerization of IT is here to stay, so you may as well embrace it.
When business information is accessed by user-owned, consumer-grade devices, the right technology foundation is essential to ensure IT control. The question is where to begin. What are the business, user and IT benefits of enabling bring-your-own device (BYOD)?
The business wants to make employees more productive yet remain compliant. Users want access to all their enterprise apps and data from their many devices and IT wants to ensure security and control in a way that’s simple to manage.
Before you begin a BYOD initiative, it’s important to understand the underlying products that will become a part of your BYOD solution and their functionality and feature sets. One size does not fit all and, even though a BYOD solution may seem complex, it’s important to realize that it all boils down to addressing four key things:
- Multiple Devices – Employees are bringing their own devices (on average 3) into the workplace – whether you like it or not.
- Lots of Apps – IT have lots of them and different types (Windows, Web, SaaS and Mobile) that everyone want access to from their device.
- Unmanaged Data – Employees are..
Continue reading here!
//Richard