Archive

Posts Tagged ‘Mobility’

Top 10 #CitrixSynergy sessions…watch them today!

Have a look at the 10 most popular Citrix synergy sessions! They are now uploaded and ready for you to see:

  • SYN501: Geek Speak Tonight! (Desktop Virtualization panel) & SYN501 (Mobility panel)
  • SYN415: Advanced best practices for migrating from Web Interface to StoreFront
  • SYN321: Next-generation desktop and app delivery with XenDesktop 7, Microsoft System Center 2012
  • SYN334: What’s new in XenDesktop and XenApp Platinum
  • SYN320: XenDesktop 7: what you should know about FlexCast management architecture and XenApp migration
  • SYN299: One Step Beyond – An audience with the Citrix CTO’s
  • SYN322: XenDesktop 7: reinventing HDX for mobile, 3D graphics and beyond
  • SYN222: Architecting a global XenApp farm with regional users using NetScaler and StoreFront
  • SYN404: Introducing the Citrix Diagnostic Toolkit
  • SYN206: What’s new in ShareFile Enterprise

Continue reading here!

//Richard

Citrix Worx Apps announced! – part 2, #CitrixSynergy, #BYOD

Hi again,

Ok, yesterday I posted that Citrix announces the Worx apps which I think is a GREAT story and it looks as the killer apps!

Citrix Worx Apps announced! #CitrixSynergy, #BYOD

I got you excited I guess, but this is of course also not something that we’ll see released in May! The first release now in June will release the Worx Enroll and Worx Home apps, but Worx Home will only be the “store” for Mobile and Web apps. The XenDesktop/XenApp integration comes in the next release so until then the Receiver is still the client for that type of delivery.

I got to play around with Worx Home a bit yesterday and I really liked the way it displays the apps and how they easily can be sorted in a groups by type or folder structure. And then when you get XA/XD items in there and they are placed right next to all the other apps on your mobile device and you can launch Excel from you iPad directly instead of going through and opening the Worx Home or Receiver app the integration is really user friendly. But then again; don’t we still for the majority of the use cases think that XA/XD are “legacy” solutions? wouldn’t we rather strive to get into a complete SaaS model instead of adding these expensive hosted solutions? I know it won’t go away and there are great use cases for XA and XD but I would still say it’s legacy, park it and contain it and work on your strategy to change the model and become future ready! 😉

And for those that don’t go off and purchase the Mobile Solution Bundle in the future can continue to use the Receiver for their “legacy” XenApp/XenDesktop service delivery. The question is how this will be evolving though, I foresee a risk that to much of the focus in the future will be agains the Worx apps and that is something that may lead to longer release cycles of fixes and updates of the Receiver. That my of course not be an issue either though many companies today are struggling with that Citrix “goes to fast” and it’s hard to keep up (and Citrix has a hard time keeping up as well).

Stay tuned for a more complete update after Synergy!

//Richard

Citrix Worx Apps announced! #CitrixSynergy, #BYOD

“Worx Enroll” and “Worx Home” apps announced to support the MDM, MAM, Web, Saas and Win apps/desktop (XA/XD) from ONE STORE!!

This is something that we all have been waiting for!! Finally a one-stop-shop/app in where an end user can use their personal devices and consume MAM, MIM and WaaS (Windows as a Service) deliverables without enrolling to a full MDM service. And those devices that are corporate assets enables you to do the same delivery and add the MDM capabilities needed (e.g: geofencing, pass code and other policies and asset mgmt) with the same end user UI!!!

I want to see this in action and get my hands on it NOW! 😉

//Richard

#BYOD: From optional to mandatory by 2017, says #Gartner

I agree with this great article and the analysis made by Gartner.

Bring-your-own-device (BYOD) has for some time been gaining traction in the workplace, as not only a way of freeing up IT costs but also liberalizing workers from being virtually chained, clunky, aging machines at their desks.

But latest research from Gartner suggests that by 2017, half of employers may impose a mandatory BYOD policy — requiring staffs to bring their own laptop, tablet and smartphone to work.

As an optional policy, workplaces still have an IT fallback option, but many are choosing to bring their own tablets and smartphones to work in order to work more effectively using the technology they feel more comfortable with.

Some interesting tidbits from the research:

  • 38 percent of companies expect to stop providing workplace devices to staff by 2016. (PCs, such as desktops and laptops, are included in the definition of BYOD.)
  • BYOD is most prevalent in midsize and larger enterprises, often generating between $500m-$5bn in revenue per year, with 2,500-5,000 employees on the roster.
  • BRIC nations, such as India, China, and Brazil, will most likely already be using a personal device — typically a “standard mobile phone” — at work.
  • Meanwhile, companies in the U.S. are more likely to allow BYOD than those in Europe (likely due to stronger data protection rules, see below).
  • Around half of all BYOD programs provide a partial reimbursement, while full reimbursement costs “will become rare.”
  • Gartner vice president David Willis says companies should “subsidize only the service plan on a smartphone.”

But there’s a problem within. Those who have yet to adopt a BYOD policy often generally cite one of two good reasons (or both): interoperability and…

Continue reading here!

//Richard

Enable Enterprise #Mobility and Secure Android, iOS and Windows Devices – #BYOD

This is a good blog post from Christopher Campbell that also has links to Citrix BYOD Solutions and Citrix BYOD Starter Kit

Lots of devices with many different operating systems. Lots of users bringing Android, iOS and Windows mobile devices into the workplace. Securing all these devices and the apps and data they’re accessing can make enabling Enterprise Mobility an intimidating task. Is it going to be BYOD, COPE, MDM, MAM, MIM or a combination? One size doesn’t fit all and addressing these challenges can be painful if you’re deploying a multiple vendor solution stack.

Some of the top mobile threats now include but are not limited to:

  1. Data loss from lost and stolen devices
  2. Information stealing mobile malware
  3. Vulnerabilities from device, OS and 3rd party apps
  4. Insecure Wi-Fi, network access and rogue access points
  5. Insufficient management tools and capabilities

Join Citrix Chief Security Strategist Kurt Roemer to find out how IT can maintain control and protect business information accessed from Android, iOS and Windows tablets and smartphones.

Watch Now and you will learn:

  • Security considerations and risk mitigation options when supporting BYOD
  • The architecture required to support tablets and smartphones accessing sensitive business information
  • How Citrix BYOD solutions enable secure access to enterprise desktops, apps and files from any device
  • Best practices for IT to maintain control over Android, Apple iOS and Windows tablets and smartphones used in the workplace

WATCH ON-DEMAND TODAY and learn how to make a complete end-to-end, fully integrated Enterprise Mobility solution work for the business, user and IT…

Continue reading here

//Richard

Report: Android malware doubled in 2012, infecting 33M devices

Malware attacks on devices running Google’s (NASDAQ:GOOG) open-source Android mobile operating system more than doubled in 2012, security solutions firm NQ Mobile reports.

NQ Mobile - Malware by Year
NQ Mobile saw a year-over-year increase of malware of 163 percent.

NQ Mobile discovered 65,227 new pieces of mobile malware in 2012 compared to 24,794 in 2011, a year-over-year increase of 163 percent. Among all new malware discovered last year, 94.8 percent of threats were designed to attack Android, compared to just 4 percent targeting rival open-source platform Symbian. In all, more than 32.8 million Android devices were infected in 2012, up from 10.8 million in 2011, representing an increase of more than 200 percent.

Chinese devices accounted for 25.5 percent of infected Android devices, followed by India (19.4 percent), Russia (17.9 percent), the United States (9.8 percent) and Saudi Arabia (9.6 percent). Fifty-three percent of U.S. Android owners have installed a mobile security app on their device, NQ Mobile adds.

Sixty-five percent of mobile malware discovered in 2012 falls into the category of Potentially Unwanted Programs–e.g., root exploits, spyware, pervasive adware and Trojans (surveillance hacks). Twenty-eight percent was designed to collect and profit from a user’s personal data, and 7 percent was built to prevent the user’s device from functioning properly.

The primary methods for delivering malware in 2012 included App Repackaging (adding lines of malicious code into a legitimate app and reloading it onto a third-party marketplace), Smishing (asking consumers to click on a fraudulent link, triggering a malicious app download or directing their browser to a rogue website) and Malicious URLs (redirecting the browser from genuine websites to clone sites intended to collect personal data).

Critics maintain Google has failed to sufficiently police its Google Play digital storefront, making it easy for attackers to distribute malware via Android applications. Google has made strides to reduce Android threats, however: In early 2012, it unveiled Bouncer, which scans Google Play for malicious apps, and its Android 4.2 OS update, a.k.a. Jelly Bean, bakes in application verification tools.

The NQ Mobile report…

Continue reading here!

//Richard

Do you develop your own mobile apps? – #Mobility

April 4, 2013 1 comment

Ok, this is a pretty hot topic! Mobility is here to stay for a while, everyone speaks about Enterprise Mobility Management (EMM), MDM, MAM, MIM etc….

But how are business tackling this need to support business processes and functions for todays mobile workforce? And how do you out there build your mobile apps that are to support your users and business?

Do you outsource your app development, or do you do it in-house? Do you use any of the “cloud services” to build your apps like the following examples?

Snappii

ManMade

Here are some really interesting blog posts/articles on the subject!

THE BEST WAY TO DEVELOP MOBILE APPS? DON’T DEVELOP MOBILE APPS! – via Jeffrey Hammond

Mobile app dev: Outsource or in-house?

This is an interesting mobile world we live in, but how shall all business adopt to it the best way? 😉

Please share your view if you want!

//Richard

Enterprise Mobility Report – Lessons from the Mobile Cloud – #Citrix, #BYOD

Here is a good report done by Citrix, not that much that I didn’t expect but great to get some input!

We just released our quarterly enterprise mobility cloud report. Every quarter, we look out across our enterprise mobility customers deployed in the cloud and try to understand common practices by reviewing aggregate data on deployed apps, app blacklisting and whitelisting practices, policy deployments, and OS deployments by region and vertical industry. So here’s a small taste of what we saw in Q412.

Things we expected:

  • iOS led in the enterprise. Definitely something we already knew.
  • Industries like retail and restaurants – whose use cases involve direct one-on-one customer engagement, were  iOS- (and iPad-) heavy. Makes sense.
  • Industries with mobile field service organizations went for Android. Given the platform’s lower replacement cost, control-ability, and ubiquity, that makes sense.
  • Facebook and Dropbox made the blacklist. Productivity and data security are major concerns, especially for corporate-issued devices.

Things we didn’t expect:

  • Android gained in EMEA. Android gained eleven percentage points in Europe, the Middle East, and Africa in a quarter. Anecdotally, we know several organizations there that deployed big Android-based mobile line-of-business initiatives last quarter, but is there a bigger trend? Tell us what you think!
  • Healthcare went for Android. 85% of deployed devices in our cloud in healthcare were Android. But healthcare organizations we talk to are standardizing on iOS, so it doesn’t add up! But remember: this is the cloud report. Most of our large healthcare customers have deployed our solution on-premise and those seem to be mostly iOS today. The cloud healthcare companies are really mobile themselves – usually home healthcare organizations like traveling nurses and therapists and hospice care workers who deliver end of life care to patients in their homes. It makes sense that these organizations would be big users of the cloud given the highly distributed nature of the business and the fact that there are some common HIPAA-compliant mobile apps that have developed for the Android platform.
  • Dropbox was on the blacklist, but was also one of the most heavily-recommended apps from enterprise IT (in the enterprise app catalog). This juxtaposition speaks to Dropbox’s simultaneous usefulness and risk! Organizations can’t decide! Many of our customers talk to us about the “Dropbox dilemma” and most agree that if they could provide data sharing in a secure, enterprise-grade way, users would go for it.

Download the complete report here!

//Richard

Are you, or wanna become a Mobility or Networking guru? – #EnvokeIT, #Citrix, #XenMobile, #BYOD

Then you might be the one that we’re looking for!!

EnvokeIT is expanding and are looking for people with the following areas of expertise:

Mobility

Are you currently working within the mobility area or with any of the major Mobile Device Management products out there (MDM, MAM, MIM etc.)? Then we’d love to talk to you! We strongly believe in this area and are focusing on it and would like to have you onboard on this journey! And of course we’re focusing on the Citrix product portfolio but are mainly looking for people with experience within the area and not exclusively on the Citrix XenMobile/Zenprise products. And Enterprise Mobility Management is here to stay, it’s the future work-/play-ground!

Networking

Wow, this is an area that is exploding! And I must agree that I’m not the expert within this area, but there are so many new capabilities being developed right now and we and our customers see the business value here. We’re talking about everything from traditional old school SSL VPN to supporting the latest mobility, application and cloud delivery solutions out there! So if you have experience on the Citrix NetScaler product or are a current Cisco, F5 or Riverbed person; contact us to hear more on what we have to offer!

Contact us – EnvokeIT (form page),or if you rather contact me or Mathias directly:

Richard Egenas – CTO

Email: richard-at-envokeit-.-com

Phone: +46 (0) 768 81 01 62

Mathias Törnblom – CEO

Email: mathias-at-envokeit-.-com

Phone: +46 (0) 8 587 633 10

Thanks for taking your time reading this and I hope that you will join us on this journey!! 🙂

//Richard

VDI Smackdown: Head-to-head analysis of Citrix XenDesktop, Microsoft etc… via @rpruijt

Great work!!!! 🙂 Continue reading!!!

by Ruben Spruijt 

Are you looking for an independent overview of desktop virtualization solutions and curious about the different strategy questions? Do you want detailed information about the features and functions each desktop virtualization vendor is offering!? If so the VDI Smackdown you definitely must read!
In the current market there is an increasing demand for unbiased information about desktop virtualization solutions. This white paper is focused on solutions that are anticipated to have an important role in desktop virtualization deployments. An overview of available features of each solution has been created to allow an understanding and comparison of capabilities.

The latest solutions included in the feature matrix are: Citrix XenDesktop 5.6FP1, Citrix VDI-in-a-Box 5.2, Dell vWorkspace 7.6, Microsoft RDVH Windows8/Server 2012 and VMware View 5.2; The English whitepaper can be downloaded here. The Japanese version will be available as soon as possible.

Empowering the end-user by giving access to Windows, Web and Mobile applications so he can access data and information systems from both private and public datacenters regardless of the device or location is the ultimate strategic objective.
The delivery of the classic (Windows) desktop interface can be divided in two segments:

  • the classic desktop and laptop, running Windows, Linux or Mac OS X;
  • the virtual desktop running in the datacenter or local on the classic workstation.

In essence “desktop virtualization” is the de-coupling of the desktop, operating system and the applications from the underlying endpoint or device. This kind of virtualization can be subdivided into two types:

  • With the first type applications are executed remotely, server hosted, and presented at the endpoint via a remote display protocol.
  • With the second type applications are executed at the endpoint, client-side and presented locally.

Making Windows, Web and Mobile applications available to the end-user, regardless of the technology being used, is an important strategic objective of an advanced IT infrastructure. The Virtual Desktop (vDesktop) is an essential component in the range of Application and Desktop delivery solutions and in essence, it provides the following functions:

  • Flexibility: Detach the vDesktop from the endpoint; Several vDesktops can be used next to one another
  • BYO: enables delivery of applications and desktops for BYO scenario’s;
  • Access: vDesktop works independently of location, endpoint and network;
  • Security: Server Hosted – VDI; data in the computing center;
  • Freedom: Every user can have his own desktop with administrator privileges when needed;
  • Management: Centrally managed and hardware independent;
  • Legacy: It is simple to offer legacy applications on a state-of-the-art platform;
  • Sustainability: Power Management, handling the necessary resources in an efficient manner

The transition to a dynamic and optimized desktop is causing many IT organizations to reevaluate traditional IT operations, deployment, delivery, packaging, support, and management methods.
Desktop virtualization is a key component in the optimized desktop. It’s important to have a Vision and Strategy around application and desktop delivery and enterprise mobility. Designing, building, managing and maintaining the desktop virtualization…

Continue reading here!

//Richard