Archive

Posts Tagged ‘Mobility’

#Citrix Nails Its Enterprise Mobility Strategy – #XenMobile, #BYOD – via @ekhnaser

Read this great article and see if you agree! 😉

Citrix Nails Its Enterprise Mobility Strategy

I have been very pleased with the strategy, execution and the road map that Citrix has developed around Enterprise Mobility. With the announcement of XenMobile MDM and the Mobile Solutions bundle, I can very easily say that the Citrix solution is the most complete and feature-rich offering on the market today.

XenMobile MDM is simply a name change for Zenprise, which Citrix acquired a few months earlier. I expected Citrix to simply change the “Z” to “X” and keep the name, but I guess Citrix marketing did not find that as amusing. That is not the only change that occurred: A new version of “Zenprise” also accompanies this release, and XenMobile MDM now brings it to version 8.0.1.

Many customers and colleagues have asked me why Citrix acquired an MDM provider — what are the value-adds and isn’t the world moving towards MAM anyway? To answer, we have to make a clear distinction between the use cases. I agree and concur that for BYOD initiatives, MAM is a better, cleaner way of doing this things and that MDM is not the ideal solution.

That being said, there are plenty of use cases where MDM is the only solution that makes sense and I will give you real-world examples. Have you heard of the “Belly” card? It is a customer recognition and rewards program from a company HQ’ed in Chicago that offers merchants a locked down iPad for display in their place of business. Customers can come in and scan their mobile phones on the iPad provided and after a certain number of check-ins they are offered a reward for their loyalty. In this case, belly would have very little use for MAM; they need an MDM solution to manage the thousands of iPads they have deployed.

Another example: United Airlines and American Airlines allow customers to use mobile devices in the cabin to purchase goods in-flight. Obviously, the airlines don’t want the flight attendants to use their own device for this, MDM shines again here.

Finally, what about financial institutions that want to continue to issue corporate-managed devices of different flavors? It’d be for security reasons, obviously. In this case, MDM shines.

When I see bloggers and analysts disqualify MDM, they are not thinking beyond BYOD, where the business world could have a use case built around an application they issue on a mobile device.

Did Citrix strike gold with its acquisition of Zenprise? I will say this much: It was one of the best acquisitions the company has ever made. The natural follow-up question is, what about CloudGateway? And my answer is, it is the glue that holds everything together and is the most important product in the Citrix solution today. Everything will go through CloudGateway moving forward and at version 2.5 has the following features:

  • Enterprise app store with identity management capabilities for a single sign-on like experience
  • Windows Applications and Desktops through XenApp and XenDesktop
  • Mobile applications integration, provisioning, etc.
  • SaaS applications integration, provisioning, etc
  • Integration with Citrix ShareFile for enterprise DropBox functionality

CloudGateway also has a connector for Citrix Podio, and here I’ll be critical of Citrix the same way I’m critical of VMware for not integrating SocialCast. Why Citrix doesn’t make Podio…

Continue reading here!

//Richard

Surprising Stats About Mobile Security

February 28, 2013 Leave a comment

Another good article!!

Surprising Stats About Mobile Security

IT security and data protection are the top ranked challenges faced by many mobile IT asset managers. This was certainly brought to light in Mobile Enterprise’s IT headaches executive survey, and recent research from the International Association of IT Asset Managers (IAITAM) brings this to light as well.

When IAITAM asked: how do organizations handle mobility and security? Fifty five percent of respondents access the enterprise from a remote location during off hours and the same number can access enterprise information from any BYOD device. Yet only 60% of organizations track how, how long or who is accessing remotely.
Out of those employees who do access the enterprise remotely, slightly more than half use a secure key or digital pass, while 49% use a login name and password on a secure site. A little more than half (53%) of organizations surveyed have an intrusion protection system for deployed mobile units.

Lost/Stolen Devices Covered
Nearly 90% of respondents have a mobile device policy and process in place for lost, misplaced or stolen mobile devices. At the same time, little more than a quarter have real-time location system tracking on any/all mobile devices. Still, 56% say they are able to perform a remote wipe of all data.
Less than half (43%) will automatically replace a lost, misplaced or stolen device within a 24 to 48 hour period. Eighty-four percent of companies have a firm policy that employees leaving the company must surrender their mobile device(s).
Tracking software downloaded on devices and preventing software downloads came in third and fourth as the most challenging issues, respectively, but with the predicted growth of mobile malware, this number could change going forward.

Asset Tracking?
Nearly 60% believe that they are managing mobile security adequately, but nearly 75% surveyed felt that licensing and management of mobile device assets is a challenge; 52% track their assets using an automated tool, while 36% still use spreadsheets. Another 12% are not tracking mobile assets at all. Members of the Mobile Enterprise Editorial Advisory recently had few things to say about this topic.
The main software programs accessed through a mobile handheld device or smartphone are Microsoft (85%), Google (52%) and Adobe (26%). Many of these same software publishers aggressively protect their intellectual property through software audits.

BYOD
Fifty-one percent of organizations surveyed had a BYOD or BYOT [technology] program that allows employees to use their personal mobile devices for work purposes. Surprisingly, 60% who took advantage of a BYOD program only accounted for 25% or less of employees who brought in their personal devices. 
 
More than three-quarters (77%) allow their employees…
Continue reading here!
//Richard

#Citrix #BYOD Architecture overview – #XenMobile, #Mobility

February 28, 2013 Leave a comment

I must say that this blog post is of course Citrix “twisted”, but I really like it! And it shows how Citrix provides a pretty complete offering in order to deliver Mobility- and BYO-compliant services.

The Citrix blog written by Christopher Campbell makes sense and I also agree that a picture is worth a thousand words! 🙂

I’m going to make this real easy and simple. As my grandfather would say “A picture is worth a thousand words”.

If you’re a XenDesktop or XenApp customer this is what your environment probably looks like.

Now this is what you need to enable BYOD and add that MAM, MDM, MIM (Data) and overall EMM functionality you’re looking for.

This is what your environment looks like after you enable BYOD.

Didn’t get that? OK, here is what BYOD looks like with multiple vendors.

Now, here is what BYOD looks like with Citrix.

Got it?

Read the whole blog post here!

//Richard

#Citrix #AppController 2.6 released as part of #MobileSolutions #Bundle #BYOD

February 25, 2013 Leave a comment

As a part of the Mobile Solutions Bundle that now is available on MyCitrix you can find a new version of AppController.

AppController 2.6 supports the following new features:

  • Certificate support. When you configure AppController for the first time in the web-based management console, you can add or create certificates on the Active Directory settings page.
  • Microsoft Hyper-V support. You can install the AppController 2.6 virtual machine on Windows Server 2012 with Hyper-V enabled or on Microsoft Hyper-V Server 2012.
  • Migration support to AppController 2.6. You can upgrade to AppController 2.6 from AppController 2.0 or from AppController 2.5.
  • Mobile store support. You can upload mobile apps from the Apple App Store or Google Play to AppController. You can use the Citrix App Preparation Tool to wrap iOS and Android apps from the Apple App Store or Google Play. When you wrap the app, you can secure access and enforce policies. When you upload the app to AppController, you can configure the policies. You can also upload an app from the App Store or Google Play to AppController without using the App Preparation Tool.
  • Secure connections to Active Directory. You can configure secure connections to Active Directory when you configure AppController 2.6 for the first time.
  • ShareFile updates. In previous AppController versions, when you configured ShareFile, the domain sharefile.com was automatically appended to the domain name. In this release, the domain sharefile.com does not automatically append to the ShareFile domain name. You must enter the entire ShareFile domain name.
  • Support for mobile links. You can configure mobile links to retrieve the name and description of apps automatically from the Apple App Store. For apps available through the Google Play Store, you enter the name, description and URL of the app. When you configure mobile links, links appear in Receiver with the Play Store or App Store name.
  •  Web proxy user name format. When you configure the web proxy, you can use either the SAMAccount format or the User Principal Name (UPN) as the user name.

Read more about it here!

//Richard

It all ADDS up with #BYOD (Assess + Design + Deploy + Support = Success)

February 21, 2013 Leave a comment

Below you can read about a couple of webinars coming up on Citrix’s view on how to get your BYOD strategy up and running!

Cowboy consumerization is here…and it’s here to stay.  You may not want to admit it, but you already have a few “outlaws” in your organization who are using their own devices, regardless of whether you allow them to or not. In fact, you probably have entire departments accessing email, apps and data on devices and through services that are not secure. The consumerization of IT is here to stay, so you may as well embrace it.

When business information is accessed by user-owned, consumer-grade devices, the right technology foundation is essential to ensure IT control. The question is where to begin. What are the business, user and IT benefits of enabling bring-your-own device (BYOD)?

The business wants to make employees more productive yet remain compliant. Users want access to all their enterprise apps and data from their many devices and IT wants to ensure security and control in a way that’s simple to manage.

Before you begin a BYOD initiative, it’s important to understand the underlying products that will become a part of your BYOD solution and their functionality and feature sets. One size does not fit all and, even though a BYOD solution may seem complex, it’s important to realize that it all boils down to addressing four key things:

  • Multiple Devices – Employees are bringing their own devices (on average 3) into the workplace – whether you like it or not.
  • Lots of Apps – IT have lots of them and different types (Windows, Web, SaaS and Mobile) that everyone want access to from their device.
  • Unmanaged Data – Employees are..

Continue reading here!

//Richard

[Announcing] #ShareFile 2.0 for Android – #Citrix, #BYOD

February 12, 2013 Leave a comment

Ok, Citrix has now also released an updated version of the ShareFile app for Android to incorporate the new security features there as well!

NICE!!!! 😀

Read the Citrix blog post below for more info and source link!

I’m pleased to announce the new version of the ShareFile application for Android tablets and phones. ShareFile for Android enables secure mobile work styles by providing users with a rich follow-me-data experience while offering IT the management and control needed to ensure sensitive corporate data is secure at all times. By 2020, the workplace will evolve to the point where there will be 7 desks for every 10 office workers, with each person accessing their company’s IT network from an average of 6 different devices.

According to a new report from Forrester, an estimated 258 million workers around the world choose their own laptops and 129 million buy their own smartphones. Currently 37% of all BYOD smartphones run on Google’s Android platform. The Citrix mobile application suite balances connectivity and personal freedom, allowing employees to access everything they need to securely conduct business regardless of whether they are working from home or on the road.

New Features

Pin Passcode

Jail Break Detection

Gives users easier access to their data instead of having to type their password every time they start the application. Allows administrators to prevent their users from accessing their ShareFile data from jail broken devices.

Another security feature added to this release is local device encryption for improved security of sensitive data.

ShareFile in action

The Salinas Police Department Deputy….

Continue reading here!

Faster, more secure access to business files on the go – #Citrix, #ShareFile,

January 28, 2013 Leave a comment

Very interesting update to ShareFile apps or iOS! Especially the encryption on the devices by the pin-protection! This is something that I know companies have been waiting for! Thanks for a great blog post Peter Schulz!

Announcing all new updates to ShareFile for iPhone and iPad!

We hope you’ve had a chance to check out the ShareFile for iPhone and iPad apps – available for download from the Apple App Store. Today, we are excited to announce new features across both apps that address two major customer needs: 1) security and 2) access. These features include:

  • Passcode support with local encryption – The ShareFile apps now allow the user to select a PIN to assign to an account in ShareFile. This provides a simpler means of accessing your account without having to type in your account password each time.
  • Jailbreak Detection – This feature allows account administrators  to block account access from devices that are detected to be jailbroken.
  • Support for StorageZone Connectors – StorageZone Connectors let you connect existing file shares to ShareFile and access the data remotely on your iOS device. Customers have shared that they want easy access to their data wherever it’s stored across their organization. We built StorageZone Connectors with this in mind, allowing users to view data stored beyond ShareFile.

 

Each of these updates improves the mobile file sharing experience by making it easier and safer to access your data from anywhere. For everyday use, my personal favorite is passcode support with local encryption.

When I use my iPad, I don’t want to bother with setting up a device passcode for normal use, but I still want to protect my ShareFile data from anyone who might pick up the device. On the other hand, I don’t want to type in my (fairly long) password each time I launch the app. With this update, I can set a 4 digit PIN just for my ShareFile account. Where does the local encryption come in? ShareFile always flags your data for device encryption, but iOS will only enable that when you have a device passcode set. When you turn on the ShareFile PIN, we will encrypt your data using AES 256-bit encryption even though the iOS protection isn’t enabled…

Continue reading here!

//Richard

The Business Case for Mobility Services – #Mobility, #BYOD, #Citrix, #Gartner

January 28, 2013 Leave a comment

I must agree that all these mobile devices and BYOD etc. are putting challenges as well as opportunities on businesses. But there are not many out there with a clear strategy and business view on how to grasp the opportunities and WHY. Do you have a clear strategy on how to address for instance BYOD?

This video explores the business case for adopting and integrating Mobility Services into a Solution Provider’s deliverables.

And what’s also interesting in this topic of discussion is the Gartner Hype Cycle of Innovation.

This was the hype cycle for year 2012

Image Source :Givinginadigitalworld

//Richard

#EnvokeIT is expanding – looking for a new exciting career? #Mobility, #Networking, #Citrix

January 15, 2013 Leave a comment

It’s exciting! EnvokeIT continues to expand and we are looking for new colleagues within the Mobility, Networking and Virtualization areas. It doesn’t matter if you currently are a Junior or Senior consultant! It doesn’t matter, just as long as you have the will to grow! Come join us on our exciting journey!

CV with keyboard 320

We are looking for someone who wants to grow with us!

EnvokeIT are confident that our employees are our most important assets. Employees who are happy and like to go to work makes a difference. Our continued success is based on finding, retaining and developing talents that understands customers’ business processes and future IT needs. As a consultant with EnvokeIT you are employed by us but you work with one of our clients. Assignments can be for longer or shorter periods depending on what you are working with, what customers need and your personal preferences. You build on your resume with new experiences and skills, while contributing to customer business activities with your knowledge and skills.

We want to be one of the best and most exciting employers in the IT industry. As an employee of EnvokeIT you are given a unique opportunity to participate in the company’s further development. Periodically, you will be invited to consultant meetings where you get the chance to meet your peers that are working on various assignments on EnvokeITs behalf. Sometimes we organize lectures that will be a part..

Continue reading and apply here!

//Richard

New Citrix Access Gateway Release – #AG, #SmartAccess, #Receiver, #Citrix

Ok, just as we expected there is now a new release of Access Gateway that goes hand in hand with the new Receivers as I wrote about in the following posts:

#Citrix #Receiver 3.4 and 11.7 = is the #SmartAccess story more real now? – #CloudGateway, #AGEE, #NetScaler, #StoreFront

Receiver for Windows 3.4 released

Receiver for Mac 11.7 Released

And of course as you could read in the first post above there are great improvements of the end-user experience when accessing resources, now you have ONE login for both the Receiver and to the Access Gateway plugin. And as that posts also highlights is the support for host check (EPA scans) on Receiver use cases as well! Finally! 😉

More info on the new Access Gateway release 10.0.71.6014.e below:

With the release of Citrix CloudGateway 2.5, comes the release of Citrix Access Gateway 10.0.71.6014.e. Citrix CloudGateway as you are aware, is the Citrix Enterprise Mobility offering, complete with Citrix Receiver running enterprise applications on the end point, Citrix Storefront running your enterprise app store, Citrix AppController running your mobile policy management and Citrix Access Gateway providing remote access to all this infrastructure.

With every CloudGateway release, Access Gateway continues to build incredible integration and smart abilities, which makes it the de-facto remote access solution for your CloudGateway deployments. Access Gateway is the only remote access solution today, which can offer seamless Receiver configuration using Email based discovery and provide intelligent integration with Storefront and AppController, to provide single sign-on to all your enterprise applications.

With this new release, Citrix Access Gateway will be able to provide the following value additions in your CloudGateway deployments:

  1. Seamless Desktop Receiver experience: With this release of Access Gateway, end users will no longer have to sign into their Access Gateway plug-ins as a manual step, to access apps / sites that require a full SSL tunnel. Receivers automatically launch a SSL VPN session via Access Gateway as needed. Result is – end user just deals with Citrix Receiver and Receiver internally (and automatically) deals with Access Gateway on user’s behalf.
  2. EPA with ICAProxy / CVPN: Receivers can now seamlessly launch AG plug-ins to connect to an Access Gateway vServer configured with End Point Analysis policies, in ICAProxy and CVPN modes as well. Earlier, this was supported only for Full Tunnel access.
  3. Session Sharing: Receiver and AG plug-in have always been two separate entities, and because of that, they establish two parallel sessions with Access Gateway. With this release, we have added the smarts in our Receiver and Access Gateway integration, to understand each other, and be able to share the same session with Access Gateway appliance. Good News – this now leads to simplified access from end user perspective, and optimal session/license consumption from Administrator perspective.
  4.  Device Wipe/Lock support for AppController: With CloudGateway 2.5, AppController is launching the ability to register and track mobile devices via AppController. These registered mobile devices can then be locked / wiped, if the..

Continue reading here!

//Richard