SlideShare uma empresa Scribd logo
1 de 52
Baixar para ler offline
© 2014 Citrix. Confidential.1
© 2014 Citrix. Confidential.2
You can tweet about this session!
© 2014 Citrix. Confidential.3
• Assuming basic knowledge of ShareFile
• Address common questions from PoC / Deployment
• Please hold questions to the end, as we’ve got quite a bit to cover
© 2014 Citrix. Confidential.4
• Enterprise IT is in a difficult position
• Consumer devices and solutions evolving quickly
• Consumers are used to finding their own IT solutions
• Enterprise IT can’t keep doing what they’ve been doing an expect to close that gap
• Enterprise IT tasked with supporting 100’s of applications
• Intro: There are many business trends that impact IT. But consumerization is at the top of the
list.
• Key Points:
• Consumerization is being driven by the fact that consumer capabilities are surpassing
that of enterprise IT. The first source of this trend is the new generation of people
entering the workforce--bringing their personal workspaces, habits, and identity with
them. More sophisticated and very popular consumer devices are compounding the
trend. These devices have capabilities that far outreach enterprise IT computing
capabilities from even a few years ago – and they are easily available at low cost from
a variety of retailers.
• This proven by analyst like Gartner that have clearly stated that this is the one trend
that experts agree will drive the most change is the consumerization of IT. The
consensus among analysts is that this trend, which is already underway, will force
significant changes in businesses all over the world.
• Illustration/Anecdotes/Proof: We all see examples in the news these days, and you probably
see many more within your own company…
© 2014 Citrix. Confidential.5
4 pillars of ShareFile ‐ Clients, Authentication, SaaS Application (Control Plane), Document Storage
Clients
• Native client experience across these platforms, while still maintaining consistency
• Clients ‐ OS X, Windows (XenApp / XenDesktop), Mobile clients with mobile editor, Outlook Plug‐in
Authentication
• Not technically part of ShareFile, but important to understand how users are authorized into ShareFile
• Potentially an on‐premises component to that as well
SaaS Application (Control Plane)
• ShareFile.com and ShareFile.eu
• Contains the business logic that drives SF as well as the webUI and reporting
• Deliberately a SaaS application to help you close the gap between the velocity of consumer and 
enterprise IT services
• Speed at which we can evolve features 
© 2014 Citrix. Confidential.6
• Improves response time to address security issues
• 60% of our customers are not on the latest release of the SZC ‐ illustrates the difference between what 
IT thinks they can deliver and what they really can
• With enterprise software the slower you update the more stable and reliable your system is, this 
contrasts with consumer software which the faster you update it the more stable and better the user 
experience is
Document Storage (StorageZone)
• Specifically separate from the rest of the architecture
• By splitting this out it allows us to address business logic separately from the data/documents being 
stored
• By having it be a separate component it allows us to add features to the solution without impacting the 
documents stored
• Cloud, on‐prem, hybrid
• Citrix‐managed, customer‐managed, access to existing repositories
© 2014 Citrix. Confidential.7
© 2014 Citrix. Confidential.8
Deploying the ShareFile mobile apps can take place in 3 ways:
• Via the public app store 
• From an MDM solution ‐ ShareFile apps are available for packaging from other vendors (Airwatch, 
Mobile Iron)
• And of course, as part of an MDX application set with XenMobile
© 2014 Citrix. Confidential.9
• Now, if you’ve chosen to restrict app deployment to an administrator‐pushed model ‐ you want to 
control which mobile devices are allowed to connect to ShareFile.
• By turning off the public app store, IT administrators are now responsible for deployment of the app, 
and can apply rules and policies for distribution.  
• This isn’t a feature exposed via the ShareFile UI, and needs to be requested through ShareFile
support
• User experience for this ‐ we don’t block access to the app store (obviously), but when this option 
is available, and the user tries to log in from an app the downloaded themselves ‐ they are denied 
access
As a security feature ‐ this is an account‐wide setting, and it is all or nothing.  
© 2014 Citrix. Confidential.10
• On windows and mac devices, we have similar controls to restrict unmanaged devices.
• Gives administrators the ability to selectively control which Windows / OSX devices are allowed to 
synchronize content.  Typically this is pushed out as part of your software deployment practices.
• This is somewhat more granular than the mobile device policies, in that the key could be pushed out to 
an individual device.
© 2014 Citrix. Confidential.11
• ShareFile is sold as both a standalone solution as well as bundled with XenMobile
• Features here are available regardless of how ShareFile is purchased / integrated into clients and 
Application Tier
• Encryption ‐ Using AES 256 for the ShareFile application / requires PIN or Passcode to be set for the 
app itself
• Poison pill ‐ allows administrators to set a threshold for access ‐ so that if a device doesn’t check in, 
or if you lose a device after x days ‐ data is wipe
• Remote wipe ‐ only wipes the sharefile container, not a device wipe
• Disabling “open in” ‐ Built‐in Mobile editor, ShareFile can be a fully functional standalone tool ‐
preventing open‐in contains your data inside the ShareFile sandbox
© 2014 Citrix. Confidential.12
If you’re deploying ShareFile as part of XenMobile ‐ the benefits of MDX are that we’re given significantly 
more control
Clipboard ‐ copy and paste
Blocking Screen Capture
Disable Print
Require internal network
© 2014 Citrix. Confidential.13
As a XenMobile administrator ‐ you have signifcantly more control over the restrictions around access to 
ShareFile content on the device
• Sandboxed in ShareFile ‐ Data not allowed to leave the App
• Sandboxed in XenMobile ‐ Data can be exhcanged between ShareFile and other MDX applications 
• Freely accessible ‐ Data can be exchanged between ShareFile and any app on the device
Of course, a XenMobile data wipe will destroy the entire managed container ‐ including the ShareFile
content.
© 2014 Citrix. Confidential.14
• Sometimes the different ways we share content in ShareFile is misunderstood ‐ so we want to clarify 
the 3 different ways you can share a file with someone else and the controls around that.
© 2014 Citrix. Confidential.15
• In the most basic scenario, we have Anonymous sharing
• This is almost the email model of a file share
• I send you a link
• You can download or view the content ‐ if you don’t have a locally installed application, you can 
view it online (with Microsoft Office Web Apps)
• The OWA viewer is going to have the most hi‐fidelity rendering of that document, because hey, 
it’s Microsoft
• As the user ‐ I *can* get confirmation of downloads ‐ as administrator ‐ I can track IP address of the 
recipients, timestamps, etc.
• Users and administrators can also expire links after they are sent
© 2014 Citrix. Confidential.16
• Moving on ‐ I can send file anonymously, but with Request Contact Info enabled
• This is the most common way *I* send files ‐ and while it is still an anonymous download, key pieces 
of information are requested from the recipient ‐ and in 95% of the cases, I get valid information 
back. 
• People often ask “but can’t you just fill that out with nonsense?” ‐ of course ‐ but from real world use 
of the product, almost everyone puts real information into these fields
• This information is auditable ‐ and we’ll track name, email addr, timestamp, IP.  So you can tell if the 
link has been sent on to more than your intended recipients, and of course you can always retract 
links you’ve sent.
© 2014 Citrix. Confidential.17
• The most secure method of sharing with ShareFile is Requiring a Client login.
• In this model, I send you a link
• As the recipient, you get an email from ShareFile asking you to activate your client account and 
choose a password
• After setting the password you can download or view the file
• Subsequent shared documents will require the user to login as a client using their password prior to 
being taken to the download page
© 2014 Citrix. Confidential.18
Additional controls around sharing which can be defined account‐wide:
• If you NEVER want your users to share documents anonymously ‐ ShareFile can be configured to 
require client logins for ALL links shared
• Once you’ve gone to that step ‐ required client logins for sharing ‐ Blacklisting or whitelisting can be 
configured to only allow your users to share content with specific external parties.  For instance, you 
could use blacklist to block out sharing to competitor domains ‐ or whitelist to enabling sharing with 
your suppliers.  This is also an all‐or‐nothing configuration.
• To enhance security for your clients ‐ we have 2‐step verification with SMS so that your users can opt‐in 
to provide an additional layer of security for their logins.
© 2014 Citrix. Confidential.19
• Enterprises want to use Active Directory.  They don’t want to have to have another set of passwords to 
manage.   You’ve heard us talk about Employees and Clients ‐ Employees are licensed users, who are 
entitled to use all the features of ShareFile ‐ and then we have “clients,” users external to your 
organization who have been granted access to files.  Provisioning is specifically about setting up those 
accounts for Employee users, and utilizing your AD infrastructure to populate your user set.
© 2014 Citrix. Confidential.20
• Provisioning is the process of bringing your AD user accounts into sharefile.
ShareFile creates an ‘employee record’ which contains firstname, lastname, and email address based off 
the information stored in your AD.  Of course, we can also gather group data for bulk management of 
access ‐ you can take your existing AD groups and their memberships, and use them effectively within 
ShareFile.
No additional AD attributes are shared ‐ the actual provisoining process is only capturing a very speicfic 
subset of data ‐ there is no impact on your existing AD infrastructure, no extention of AD, etc.
© 2014 Citrix. Confidential.21
• Provisoining can take place 1 of 3 ways.  We’re really only focusing on one in this session.
• First ‐ Provisioning can take place manually, entering it into our admin console or importing to ShareFile 
via CSV file
• XenMobile App Control is another option ‐ which gives you complete management of user accounts 
from the XenMobile admin interface
• But our focus in this section ‐ will be via the User Management Tool, which gives you the most 
flexibility for user configuration, and is constantly updated to take advantage of new ShareFile 
functionality.
© 2014 Citrix. Confidential.22
• The user management tool is a lightweight windows application run on your local network by one of 
your ShareFile account administrators.  
• The tool needs no special permissions to access your active directory ‐ and will process a set of rules 
you define:
• Provision Users
• Create Groups
• Update group membership
• Disabling user access
22
© 2014 Citrix. Confidential.23
• Rules to provision employee accounts contain configuration options
• Each rule can have different options
• Options include: StorageZone, Quotas, and ShareFile permissions (create root folders, manage clients, 
etc)
• Rules can be run on‐demand from the User Management Tool console or can be run on a scheduled 
basis via the Windows Scheduler, we expect rules will be scheduled after the initial PoC
23
© 2014 Citrix. Confidential.24
• Once employee accounts have been created within your ShareFile account 
© 2014 Citrix. Confidential.25
Now that we have taken a deeper look at user provisioning, let’s take a look at the authentication 
methods that are available. 
• ShareFile Managed – allows the user to login using an email address and password that are stored in 
the ShareFile application tier ‐ this is the quickest way to get up and running in a proof of concept, but 
we expect that most enterprises will want to integrate with their existing AD.
• Customer ‐Managed IDP – solutions such as ADFS, PingFederate, SiteMinder, Okta ‐ where we can 
support all the common authentication methods: Forms, Basic, and Windows Integrated.  These are 
the supported solutions ‐ we conform to the Saml 2.0 standard, however as with most standards, 
we’ve found significant variance between vendors.
• XenMobile ‐ The XenMobile App Controller is a SAML 2.0 provider ‐ and if you are deploying ShareFile 
as part of a XenMobile deployment, this is the best option.  In this configuration, no additional IdP is 
required, and XenMobile provides everything you need.
• Note: All users are configured with a password in the ShareFile control plane, but there is an option to 
block user logins with password when you configure SAML. 
25
© 2014 Citrix. Confidential.26
• So why do we use SAML?
• The problem that SAML resolves is trust.  ShareFile and its applications are not, and should not be 
treated as, trusted entities inside your domain.  Similarly, we at ShareFile don't want to assume 
management and security of your Active Directory username and password.
• Sometimes people ask us ‐ why don't you just take my credentials, and perform some sort of secure 
tunnel back to my Active Directory to validate my password?  The short answer here is that you should 
never give your AD username and password to a 3rd party.  But you knew that.  There's a better model 
for managing this ‐ SAML is an industry standard for maintaining trusts specifically for the purpose of 
validating credentials.
• In this model, by configuring a SAML server in your enterprise, you create that 3rd party which 
ShareFile can interface with.
• Through your configuration, your Active Directory Trusts the Identity Provider.  ShareFile trusts the 
Identity Provider.  Therefore ‐ if the IDP validates your credentials for us, we can treat that as a reliable 
source.
© 2014 Citrix. Confidential.27
• There are 3 components to the system.  The Service Provider, in this case ShareFile.com ‐ we are the 
service provider, which is outside of your environment.
<click>
• In the process of authenticating to the service provider, the user provides his username and password 
to the IDP. 
<click>
• If the authentication was successful, the IDP provides a signed claim back to the user ‐ in our case, the 
claim contains a name ID in the form of an email address.
<click>
• The user then passes that claim (signed by the IDP) back to ShareFile.  ShareFile trusts the signed claim, 
and uses the email address supplied to tie this back to a ShareFile employee user.  
© 2014 Citrix. Confidential.28
© 2014 Citrix. Confidential.29
© 2014 Citrix. Confidential.30
• Client requests ShareFile SSO login URL
• Client discovers IDP
• Client redirected to IDP
• Client requests IDP URL
• IDP authenticates the user
• User is redirected to the ACS URL with the SAML response
• User request ACS URL and presents the SAML token
• ACS validates the SAML token and generates an OAuth token for client access
• ShareFile client provides OAuth token as part of https requests to ShareFile API server
• OAuth, that’s something new we haven’t talked about
© 2014 Citrix. Confidential.31
• Client requests ShareFile SSO login URL
• Client discovers IDP
• Client redirected to IDP
• Client requests IDP URL
• IDP authenticates the user
• User is redirected to the ACS URL with the SAML response
• User request ACS URL and presents the SAML token
• ACS validates the SAML token and generates an OAuth token for client access
• ShareFile client provides OAuth token as part of https requests to ShareFile API server
• OAuth, that’s something new we haven’t talked about
© 2014 Citrix. Confidential.32
• Client requests ShareFile SSO login URL
• Client discovers IDP
• Client redirected to IDP
• Client requests IDP URL
• IDP authenticates the user
• User is redirected to the ACS URL with the SAML response
• User request ACS URL and presents the SAML token
• ACS validates the SAML token and generates an OAuth token for client access
• ShareFile client provides OAuth token as part of https requests to ShareFile API server
• OAuth, that’s something new we haven’t talked about
© 2014 Citrix. Confidential.33
• Client requests ShareFile SSO login URL
• Client discovers IDP
• Client redirected to IDP
• Client requests IDP URL
• IDP authenticates the user
• User is redirected to the ACS URL with the SAML response
• User request ACS URL and presents the SAML token
• ACS validates the SAML token and generates an OAuth token for client access
• ShareFile client provides OAuth token as part of https requests to ShareFile API server
• OAuth, that’s something new we haven’t talked about
© 2014 Citrix. Confidential.34
• Client requests ShareFile SSO login URL
• Client discovers IDP
• Client redirected to IDP
• Client requests IDP URL
• IDP authenticates the user
• User is redirected to the ACS URL with the SAML response
• User request ACS URL and presents the SAML token
• ACS validates the SAML token and generates an OAuth token for client access
• ShareFile client provides OAuth token as part of https requests to ShareFile API server
• OAuth, that’s something new we haven’t talked about
© 2014 Citrix. Confidential.35
• Client requests ShareFile SSO login URL
• Client discovers IDP
• Client redirected to IDP
• Client requests IDP URL
• IDP authenticates the user
• User is redirected to the ACS URL with the SAML response
• User request ACS URL and presents the SAML token
• ACS validates the SAML token and generates an OAuth token for client access
• ShareFile client provides OAuth token as part of https requests to ShareFile API server
• OAuth, that’s something new we haven’t talked about
© 2014 Citrix. Confidential.36
• Client requests ShareFile SSO login URL
• Client discovers IDP
• Client redirected to IDP
• Client requests IDP URL
• IDP authenticates the user
• User is redirected to the ACS URL with the SAML response
• User request ACS URL and presents the SAML token
• ACS validates the SAML token and generates an OAuth token for client access
• ShareFile client provides OAuth token as part of https requests to ShareFile API server
• OAuth, that’s something new we haven’t talked about
© 2014 Citrix. Confidential.37
• Client requests ShareFile SSO login URL
• Client discovers IDP
• Client redirected to IDP
• Client requests IDP URL
• IDP authenticates the user
• User is redirected to the ACS URL with the SAML response
• User request ACS URL and presents the SAML token
• ACS validates the SAML token and generates an OAuth token for client access
• ShareFile client provides OAuth token as part of https requests to ShareFile API server
• OAuth, that’s something new we haven’t talked about
© 2014 Citrix. Confidential.38
• Client requests ShareFile SSO login URL
• Client discovers IDP
• Client redirected to IDP
• Client requests IDP URL
• IDP authenticates the user
• User is redirected to the ACS URL with the SAML response
• User request ACS URL and presents the SAML token
• ACS validates the SAML token and generates an OAuth token for client access
• ShareFile client provides OAuth token as part of https requests to ShareFile API server
• OAuth, that’s something new we haven’t talked about
© 2014 Citrix. Confidential.39
• We’ve described the process of authentication between an IdP and SP so why do we use OAuth?
• An OAuth token is a long‐life authorication that allows us to authorize the client without re‐prompting 
for authentication
• This is especially important for the Sync clients that need to constantly be checking for new document 
updates when you are away from your computer
• OAuth is an industry standard for long‐lived authorization requests and prevents us from having to 
store credentials on a machine
• OAuth tokens can be configured to automatically expire NEVER, or every 1,7,30 days. They can also be 
manually revoked 
• When an OAuth token expires or is revoked ShareFile requires the user to reauthenticate to the 
Identity Provider
• Disabling a ShareFile employee account immediately revokes all of the OAuth tokens associated to 
their account
© 2014 Citrix. Confidential.40
• Recapping ShareFile authentication with our Architecture
• ShareFile clients talk to the IDP, we get a claim back
© 2014 Citrix. Confidential.41
• StorageZone Connectors (which we haven’t talked about yet) are handled differently because in this 
case we are authenticating to a resource that exists on your network.
• Since we don’t have those credentials we prompt the user for their Active Directory credentials when 
accessing StorageZone Connectors. The username and password are transferred over a HTTPS 
connection only to an on‐prem Customer‐Managed StorageZone Controller.
• The StorageZone Controller uses those credentials to impersonate the user when accessing the 
resources on the network
© 2014 Citrix. Confidential.42
• Storage is a key part of the ShareFile architecture, and we have a number of different options to 
discuss.
© 2014 Citrix. Confidential.43
• With StorageZones, we can host “ShareFile Data” in either Citrix‐Managed, or Customer‐Managed 
repositories.  This can be cloud based, either in Amazon or Azure, or on‐premises in your own 
datacenter.  Based on our flexible architecture, you can mix and match these types in your account, for 
instance allowing one group of users to use cheaper cloud storage, while storing another set of users’ 
sensitive data in an on‐prem Zone.
• Additionally – we offer Connectors – which gives access to existing data types.  It is important to 
remember that Connectors content does not include the full sync and share experience ‐ and instead it 
is focused on bringing a single access point to your users.
© 2014 Citrix. Confidential.44
• If you choose a Citrix‐Managed Zone for your account, that is fully managed by ShareFile.  That means 
you have the benefits of our data reliability with either Amazon or Azure, and our operations team 
focused on keeping the system up and running at all times.  This is the traditional SaaS model that 
ShareFile was built on, and has been evolving since its beginnings.
• In this model, ShareFile runs the “StorageZone Controllers” and hosts them in the geographic region 
most convenient for your cloud storage.
• Of course, all our data is encrypted in transit and at rest with AES‐256 bit encryption.
• There are additional benefits – Citrix‐Managed Zones are the most fully featured option we have, and 
include functionality like FTP and AV scanning that again, is managed entirely by our team.  This takes a 
lot of pressure off your administrators and makes for a system that can be set up very quickly – if you 
requested an account right now, it could be ready to go within the hour.
© 2014 Citrix. Confidential.45
We also offer customer‐managed StorageZones.  Typically our customers choose this model for one of 
two reasons:
• Performance – By physically locating your data repository near your users, you can ensure a fast 
connection to data.
• Compliance – For data sovereignty regulations or other compliance needs, a customer‐managed 
Zone keeps file contents under your control at all times
Our on‐prem solution is very straightforward – called the StorageZone Controller, it is a web service that 
runs on a server inside your datacenter.  Because it is really a data pump – it can scale up or out; of 
course we recommend a minimum deployment to be a load balanced pair and suggest that you assess 
capacity in your environment and add capacity as needed.
In this model you hold the encryption keys, and you hold the data.   The only information that passes 
through ShareFile servers is file metadata – filenames, foldernames, and ACLs – but never the contents 
of your sensitive documents.
© 2014 Citrix. Confidential.46
• Talking a bit about our architecture, it is important to understand the distinction between what we call 
file data, and file metadata.  In native ShareFile storage, we save every revision of a file you make as a 
new object – and reference that object with a UUID.  If you were to look into one of our on‐prem (or 
even cloud) repositories, you’d see a directory listing much like this – with a different UUID for every 
file you upload.
• This is part of our “object store” heritage and frankly we believe it is the model more and more of your 
data will follow over the next 5‐10 years.  The simplicity of an object store is that it decouples the 
mundane task of storing files from the useful stuff – the actual consumption and distribution of those 
bits.  That’s very important, because it means that we can define a very simple model for storing your 
data – and leave it intact for years and years – while continuously adding new functionality.  This is very 
different from, say, an NTFS share – where the directory structure itself contains both file information 
(such as name) and also access rights and permissions.  
• By using object stores and having this “split” between where we store your file contents and your file 
metadata – we gain a tremendous amount of flexibility and future‐proofing.  The fact that we use the 
same model anywhere you store ShareFile data allows us to mix‐and‐match, giving you as the 
administrator many options for where your files live.
© 2014 Citrix. Confidential.47
• StorageZone Connectors, on the other hand – are all about mobilizing existing data, either from your 
datacenter or from other cloud services.
• On‐prem, we have fully functional solutions for read/write access to Network File Shares, as well as 
check‐in/out access to SharePoint 2010 and 2013.   This gives your users a single place to go when they 
want to access data – whether it is content that has been on your corporate R: drive for the last 10 
years, or a document someone just edited on our ipad app.   To get to your on‐prem environment, we 
use that same StorageZone Controller – so there is only one point of entry on your network and a 
simple service to maintain.  For Connectors, we always impersonate the user accessing content – so all 
of your existing permissions, auditing information, etc are still valid.
• We’re putting a lot of effort into connectors, and you’ll see continued evolution here as well as new 
document repository sources being added by Citrix and our Partners.  We’ve recently published our 
Connectors SDK, and we’re getting great interest in that as a way to take what have traditionally been 
on‐prem content management systems and quickly making them available on mobile devices.
© 2014 Citrix. Confidential.48
• In summary, when you’re talking about ShareFile and the content it can serve up – these are the 
important concepts.  ShareFile Data – fully featured, sync and share, versioning, retention policies, all 
of the benefits that ShareFile can get you.  This can live in the cloud or on‐prem, and you can choose to 
manage that yourself or take a fully hands‐off approach.
• Connectors, on the other hand – limited to the permissions and functionality their original back ends 
supported – so that’s read/write, check‐in/out.  In many cases those repositories have been in use for 
years, or even decades – we don’t want to re‐architect the security on all that data you’ve already got.  
So we’ll honor all the existing permissions, and appear to those sources as if the user were connecting 
natively on the desktop.  This is a great feature and brings these documents to ios and Android quickly 
and easily, without a lot of new infrastructure and with zero messy conversion of data.
© 2014 Citrix. Confidential.49
© 2014 Citrix. Confidential.50
© 2014 Citrix. Confidential.51
© 2014 Citrix. Confidential.52

Mais conteúdo relacionado

Mais procurados

Microsoft Cloud Services Licensing
Microsoft Cloud Services Licensing Microsoft Cloud Services Licensing
Microsoft Cloud Services Licensing FlorisKlaver1
 
DALIM Software - Solving the challenges of media production through automatio...
DALIM Software - Solving the challenges of media production through automatio...DALIM Software - Solving the challenges of media production through automatio...
DALIM Software - Solving the challenges of media production through automatio...IO Integration
 
VMworld 2015: Conversation with the VMware CIO Suggestions on being an IT Leader
VMworld 2015: Conversation with the VMware CIO Suggestions on being an IT LeaderVMworld 2015: Conversation with the VMware CIO Suggestions on being an IT Leader
VMworld 2015: Conversation with the VMware CIO Suggestions on being an IT LeaderVMworld
 
Sprin VTUG citrix Solutions
Sprin VTUG citrix SolutionsSprin VTUG citrix Solutions
Sprin VTUG citrix Solutionscsharney
 
VDISecurity.org Overview
VDISecurity.org OverviewVDISecurity.org Overview
VDISecurity.org OverviewPatrick Coble
 
Cloudciti Enterprise File Share Services
Cloudciti Enterprise File Share ServicesCloudciti Enterprise File Share Services
Cloudciti Enterprise File Share ServicesPT Datacomm Diangraha
 
VDI/ VMware Horizon View
VDI/ VMware Horizon ViewVDI/ VMware Horizon View
VDI/ VMware Horizon ViewSumeraHangi
 
Virtual desktops-VMWare
Virtual desktops-VMWareVirtual desktops-VMWare
Virtual desktops-VMWarencceconnect
 
DerbyCon 7 - Hacking VDI, Recon and Attack Methods
DerbyCon 7 - Hacking VDI, Recon and Attack MethodsDerbyCon 7 - Hacking VDI, Recon and Attack Methods
DerbyCon 7 - Hacking VDI, Recon and Attack MethodsPatrick Coble
 
SYN002: General Session
SYN002: General SessionSYN002: General Session
SYN002: General SessionCitrix
 
DaaS/IaaS Forum Moscow - Chris Rogers
DaaS/IaaS Forum Moscow - Chris RogersDaaS/IaaS Forum Moscow - Chris Rogers
DaaS/IaaS Forum Moscow - Chris RogersDenis Gundarev
 
Throughwave Day 2015 - Throughwave Next Generation Enterprise IT Infrastructure
Throughwave Day 2015 - Throughwave Next Generation Enterprise IT InfrastructureThroughwave Day 2015 - Throughwave Next Generation Enterprise IT Infrastructure
Throughwave Day 2015 - Throughwave Next Generation Enterprise IT InfrastructureAruj Thirawat
 
DaaS/IaaS Forum Moscow - Najat Messaoud
DaaS/IaaS Forum Moscow - Najat MessaoudDaaS/IaaS Forum Moscow - Najat Messaoud
DaaS/IaaS Forum Moscow - Najat MessaoudDenis Gundarev
 
Video Encoding in the Cloud A Key Strategy for 2011
Video Encoding in the Cloud A Key Strategy for 2011Video Encoding in the Cloud A Key Strategy for 2011
Video Encoding in the Cloud A Key Strategy for 2011RightScale
 
Migrating to the Cloud: Lessons Learned from Federal Agencies
Migrating to the Cloud: Lessons Learned from Federal AgenciesMigrating to the Cloud: Lessons Learned from Federal Agencies
Migrating to the Cloud: Lessons Learned from Federal AgenciesVMware
 
eFolder webinar — Killer App Cage Match: Three Partners Share Their File Sync...
eFolder webinar — Killer App Cage Match: Three Partners Share Their File Sync...eFolder webinar — Killer App Cage Match: Three Partners Share Their File Sync...
eFolder webinar — Killer App Cage Match: Three Partners Share Their File Sync...eFolder
 

Mais procurados (20)

Microsoft Cloud Services Licensing
Microsoft Cloud Services Licensing Microsoft Cloud Services Licensing
Microsoft Cloud Services Licensing
 
DALIM Software - Solving the challenges of media production through automatio...
DALIM Software - Solving the challenges of media production through automatio...DALIM Software - Solving the challenges of media production through automatio...
DALIM Software - Solving the challenges of media production through automatio...
 
Private Cloud for Dummies
Private Cloud for DummiesPrivate Cloud for Dummies
Private Cloud for Dummies
 
Vdi overview
Vdi overviewVdi overview
Vdi overview
 
VMworld 2015: Conversation with the VMware CIO Suggestions on being an IT Leader
VMworld 2015: Conversation with the VMware CIO Suggestions on being an IT LeaderVMworld 2015: Conversation with the VMware CIO Suggestions on being an IT Leader
VMworld 2015: Conversation with the VMware CIO Suggestions on being an IT Leader
 
Sprin VTUG citrix Solutions
Sprin VTUG citrix SolutionsSprin VTUG citrix Solutions
Sprin VTUG citrix Solutions
 
VDISecurity.org Overview
VDISecurity.org OverviewVDISecurity.org Overview
VDISecurity.org Overview
 
Cloudciti Enterprise File Share Services
Cloudciti Enterprise File Share ServicesCloudciti Enterprise File Share Services
Cloudciti Enterprise File Share Services
 
vDesk Overview
vDesk OverviewvDesk Overview
vDesk Overview
 
VDI/ VMware Horizon View
VDI/ VMware Horizon ViewVDI/ VMware Horizon View
VDI/ VMware Horizon View
 
Virtual desktops-VMWare
Virtual desktops-VMWareVirtual desktops-VMWare
Virtual desktops-VMWare
 
DerbyCon 7 - Hacking VDI, Recon and Attack Methods
DerbyCon 7 - Hacking VDI, Recon and Attack MethodsDerbyCon 7 - Hacking VDI, Recon and Attack Methods
DerbyCon 7 - Hacking VDI, Recon and Attack Methods
 
SYN002: General Session
SYN002: General SessionSYN002: General Session
SYN002: General Session
 
DaaS/IaaS Forum Moscow - Chris Rogers
DaaS/IaaS Forum Moscow - Chris RogersDaaS/IaaS Forum Moscow - Chris Rogers
DaaS/IaaS Forum Moscow - Chris Rogers
 
Throughwave Day 2015 - Throughwave Next Generation Enterprise IT Infrastructure
Throughwave Day 2015 - Throughwave Next Generation Enterprise IT InfrastructureThroughwave Day 2015 - Throughwave Next Generation Enterprise IT Infrastructure
Throughwave Day 2015 - Throughwave Next Generation Enterprise IT Infrastructure
 
DaaS/IaaS Forum Moscow - Najat Messaoud
DaaS/IaaS Forum Moscow - Najat MessaoudDaaS/IaaS Forum Moscow - Najat Messaoud
DaaS/IaaS Forum Moscow - Najat Messaoud
 
Video Encoding in the Cloud A Key Strategy for 2011
Video Encoding in the Cloud A Key Strategy for 2011Video Encoding in the Cloud A Key Strategy for 2011
Video Encoding in the Cloud A Key Strategy for 2011
 
Migrating to the Cloud: Lessons Learned from Federal Agencies
Migrating to the Cloud: Lessons Learned from Federal AgenciesMigrating to the Cloud: Lessons Learned from Federal Agencies
Migrating to the Cloud: Lessons Learned from Federal Agencies
 
Acronis presentation
Acronis presentationAcronis presentation
Acronis presentation
 
eFolder webinar — Killer App Cage Match: Three Partners Share Their File Sync...
eFolder webinar — Killer App Cage Match: Three Partners Share Their File Sync...eFolder webinar — Killer App Cage Match: Three Partners Share Their File Sync...
eFolder webinar — Killer App Cage Match: Three Partners Share Their File Sync...
 

Semelhante a SYN310: Deep dive into ShareFile Enterprise functionality

Novell Strategy Update June 2013
Novell Strategy Update June 2013Novell Strategy Update June 2013
Novell Strategy Update June 2013Werner Luetkemeier
 
Security For Business: Are You And Your Customers Safe
Security For Business:  Are You And Your Customers SafeSecurity For Business:  Are You And Your Customers Safe
Security For Business: Are You And Your Customers Safewoodsy01
 
DevOps for Enterprise Systems : Innovate like a Startup
DevOps for Enterprise Systems : Innovate like a StartupDevOps for Enterprise Systems : Innovate like a Startup
DevOps for Enterprise Systems : Innovate like a StartupDevOps for Enterprise Systems
 
Elastic's recommendation on keeping services up and running with real-time vi...
Elastic's recommendation on keeping services up and running with real-time vi...Elastic's recommendation on keeping services up and running with real-time vi...
Elastic's recommendation on keeping services up and running with real-time vi...FaithWestdorp
 
July webinar slides industry 4.0 view from the front lines
July webinar slides industry 4.0  view  from the front linesJuly webinar slides industry 4.0  view  from the front lines
July webinar slides industry 4.0 view from the front linesInductive Automation
 
Bridging the Cloud Sign-On Gap
Bridging the Cloud Sign-On GapBridging the Cloud Sign-On Gap
Bridging the Cloud Sign-On GapOracleIDM
 
Securing your digital world - Cybersecurity for SBEs
Securing your digital world - Cybersecurity for SBEsSecuring your digital world - Cybersecurity for SBEs
Securing your digital world - Cybersecurity for SBEsSonny Hashmi
 
Securing your digital world cybersecurity for sb es
Securing your digital world   cybersecurity for sb esSecuring your digital world   cybersecurity for sb es
Securing your digital world cybersecurity for sb esSonny Hashmi
 
CIS13: Beyond the Building: Secure Identity Services for Mobile and Cloud Apps
CIS13: Beyond the Building: Secure Identity Services for Mobile and Cloud AppsCIS13: Beyond the Building: Secure Identity Services for Mobile and Cloud Apps
CIS13: Beyond the Building: Secure Identity Services for Mobile and Cloud AppsCloudIDSummit
 
201306 The Enterprise of the Future. IT perspective
201306 The Enterprise of the Future. IT perspective201306 The Enterprise of the Future. IT perspective
201306 The Enterprise of the Future. IT perspectiveFrancisco Calzado
 
Brighttalk understanding the promise of sde - final
Brighttalk   understanding the promise of sde - finalBrighttalk   understanding the promise of sde - final
Brighttalk understanding the promise of sde - finalAndrew White
 
The Top 7 Trends Revolutionising IT
The Top 7 Trends Revolutionising IT The Top 7 Trends Revolutionising IT
The Top 7 Trends Revolutionising IT hSo
 
Mayfield CXO Survey: Post COVID-19 Impacts to IT
Mayfield CXO Survey: Post COVID-19 Impacts to ITMayfield CXO Survey: Post COVID-19 Impacts to IT
Mayfield CXO Survey: Post COVID-19 Impacts to ITNavin Chaddha
 
4 Keys to Removing Friction in Your Industrial Organization
4 Keys to Removing Friction in Your Industrial Organization4 Keys to Removing Friction in Your Industrial Organization
4 Keys to Removing Friction in Your Industrial OrganizationInductive Automation
 
Building an intelligent enterprise through the Cloud | Accountex 2015
Building an intelligent enterprise through the Cloud | Accountex 2015Building an intelligent enterprise through the Cloud | Accountex 2015
Building an intelligent enterprise through the Cloud | Accountex 2015Sageukofficial
 
Proven Practices for Office 365 Deployment, Security and Management
Proven Practices for Office 365 Deployment, Security and ManagementProven Practices for Office 365 Deployment, Security and Management
Proven Practices for Office 365 Deployment, Security and ManagementPerficient, Inc.
 
Concept of Hybrid Applications
Concept of Hybrid ApplicationsConcept of Hybrid Applications
Concept of Hybrid ApplicationsSkytap Cloud
 
4 Keys to Removing Friction in Your Industrial Organization
4 Keys to Removing Friction in Your Industrial Organization4 Keys to Removing Friction in Your Industrial Organization
4 Keys to Removing Friction in Your Industrial OrganizationInductive Automation
 
State of the Cloud and Data Centers 2014
State of the Cloud and Data Centers 2014State of the Cloud and Data Centers 2014
State of the Cloud and Data Centers 2014Digital Realty
 

Semelhante a SYN310: Deep dive into ShareFile Enterprise functionality (20)

Cloud technology for msme sector sujit panigrahi v2
Cloud technology for msme sector   sujit panigrahi v2Cloud technology for msme sector   sujit panigrahi v2
Cloud technology for msme sector sujit panigrahi v2
 
Novell Strategy Update June 2013
Novell Strategy Update June 2013Novell Strategy Update June 2013
Novell Strategy Update June 2013
 
Security For Business: Are You And Your Customers Safe
Security For Business:  Are You And Your Customers SafeSecurity For Business:  Are You And Your Customers Safe
Security For Business: Are You And Your Customers Safe
 
DevOps for Enterprise Systems : Innovate like a Startup
DevOps for Enterprise Systems : Innovate like a StartupDevOps for Enterprise Systems : Innovate like a Startup
DevOps for Enterprise Systems : Innovate like a Startup
 
Elastic's recommendation on keeping services up and running with real-time vi...
Elastic's recommendation on keeping services up and running with real-time vi...Elastic's recommendation on keeping services up and running with real-time vi...
Elastic's recommendation on keeping services up and running with real-time vi...
 
July webinar slides industry 4.0 view from the front lines
July webinar slides industry 4.0  view  from the front linesJuly webinar slides industry 4.0  view  from the front lines
July webinar slides industry 4.0 view from the front lines
 
Bridging the Cloud Sign-On Gap
Bridging the Cloud Sign-On GapBridging the Cloud Sign-On Gap
Bridging the Cloud Sign-On Gap
 
Securing your digital world - Cybersecurity for SBEs
Securing your digital world - Cybersecurity for SBEsSecuring your digital world - Cybersecurity for SBEs
Securing your digital world - Cybersecurity for SBEs
 
Securing your digital world cybersecurity for sb es
Securing your digital world   cybersecurity for sb esSecuring your digital world   cybersecurity for sb es
Securing your digital world cybersecurity for sb es
 
CIS13: Beyond the Building: Secure Identity Services for Mobile and Cloud Apps
CIS13: Beyond the Building: Secure Identity Services for Mobile and Cloud AppsCIS13: Beyond the Building: Secure Identity Services for Mobile and Cloud Apps
CIS13: Beyond the Building: Secure Identity Services for Mobile and Cloud Apps
 
201306 The Enterprise of the Future. IT perspective
201306 The Enterprise of the Future. IT perspective201306 The Enterprise of the Future. IT perspective
201306 The Enterprise of the Future. IT perspective
 
Brighttalk understanding the promise of sde - final
Brighttalk   understanding the promise of sde - finalBrighttalk   understanding the promise of sde - final
Brighttalk understanding the promise of sde - final
 
The Top 7 Trends Revolutionising IT
The Top 7 Trends Revolutionising IT The Top 7 Trends Revolutionising IT
The Top 7 Trends Revolutionising IT
 
Mayfield CXO Survey: Post COVID-19 Impacts to IT
Mayfield CXO Survey: Post COVID-19 Impacts to ITMayfield CXO Survey: Post COVID-19 Impacts to IT
Mayfield CXO Survey: Post COVID-19 Impacts to IT
 
4 Keys to Removing Friction in Your Industrial Organization
4 Keys to Removing Friction in Your Industrial Organization4 Keys to Removing Friction in Your Industrial Organization
4 Keys to Removing Friction in Your Industrial Organization
 
Building an intelligent enterprise through the Cloud | Accountex 2015
Building an intelligent enterprise through the Cloud | Accountex 2015Building an intelligent enterprise through the Cloud | Accountex 2015
Building an intelligent enterprise through the Cloud | Accountex 2015
 
Proven Practices for Office 365 Deployment, Security and Management
Proven Practices for Office 365 Deployment, Security and ManagementProven Practices for Office 365 Deployment, Security and Management
Proven Practices for Office 365 Deployment, Security and Management
 
Concept of Hybrid Applications
Concept of Hybrid ApplicationsConcept of Hybrid Applications
Concept of Hybrid Applications
 
4 Keys to Removing Friction in Your Industrial Organization
4 Keys to Removing Friction in Your Industrial Organization4 Keys to Removing Friction in Your Industrial Organization
4 Keys to Removing Friction in Your Industrial Organization
 
State of the Cloud and Data Centers 2014
State of the Cloud and Data Centers 2014State of the Cloud and Data Centers 2014
State of the Cloud and Data Centers 2014
 

Mais de Citrix

Building The Digital Workplace
Building The Digital WorkplaceBuilding The Digital Workplace
Building The Digital WorkplaceCitrix
 
Maximize your Investment in Microsoft Office 365 with Citrix Workspace
Maximize your Investment in Microsoft Office 365 with Citrix Workspace Maximize your Investment in Microsoft Office 365 with Citrix Workspace
Maximize your Investment in Microsoft Office 365 with Citrix Workspace Citrix
 
XenApp on Google Cloud Deployment Guide
XenApp on Google Cloud Deployment GuideXenApp on Google Cloud Deployment Guide
XenApp on Google Cloud Deployment GuideCitrix
 
Deploying Citrix XenApp & XenDesktop Service on Google Cloud Platform
Deploying Citrix XenApp & XenDesktop Service on Google Cloud PlatformDeploying Citrix XenApp & XenDesktop Service on Google Cloud Platform
Deploying Citrix XenApp & XenDesktop Service on Google Cloud PlatformCitrix
 
Manage Risk by Protecting the Apps and Data That Drive Business Productivity
Manage Risk by Protecting the Apps and Data That Drive Business ProductivityManage Risk by Protecting the Apps and Data That Drive Business Productivity
Manage Risk by Protecting the Apps and Data That Drive Business ProductivityCitrix
 
How do Organizations Plan to Assure Application Delivery in a Multi-Cloud World?
How do Organizations Plan to Assure Application Delivery in a Multi-Cloud World?How do Organizations Plan to Assure Application Delivery in a Multi-Cloud World?
How do Organizations Plan to Assure Application Delivery in a Multi-Cloud World?Citrix
 
Workforce Flexibility Can Drive Greater Engagement & Productivity
Workforce Flexibility Can Drive Greater Engagement & ProductivityWorkforce Flexibility Can Drive Greater Engagement & Productivity
Workforce Flexibility Can Drive Greater Engagement & ProductivityCitrix
 
Citrix Cloud Services: Total Economic Benefits Assessment Guide
Citrix Cloud Services: Total Economic Benefits Assessment GuideCitrix Cloud Services: Total Economic Benefits Assessment Guide
Citrix Cloud Services: Total Economic Benefits Assessment GuideCitrix
 
The Growing U.S. IT Productivity Gap
The Growing U.S. IT Productivity GapThe Growing U.S. IT Productivity Gap
The Growing U.S. IT Productivity GapCitrix
 
Citrix Cloud Services: Total Economic Benefits Assessment Guide
Citrix Cloud Services: Total Economic Benefits Assessment GuideCitrix Cloud Services: Total Economic Benefits Assessment Guide
Citrix Cloud Services: Total Economic Benefits Assessment GuideCitrix
 
Citrix Synergy 2017: Technology Keynote Sketch Notes
Citrix Synergy 2017: Technology Keynote Sketch NotesCitrix Synergy 2017: Technology Keynote Sketch Notes
Citrix Synergy 2017: Technology Keynote Sketch NotesCitrix
 
Citrix Synergy 2017: Malcolm Gladwell Innovation Super Session Sketch Notes
Citrix Synergy 2017: Malcolm Gladwell Innovation Super Session Sketch NotesCitrix Synergy 2017: Malcolm Gladwell Innovation Super Session Sketch Notes
Citrix Synergy 2017: Malcolm Gladwell Innovation Super Session Sketch NotesCitrix
 
Synergy 2017: Colin Powell Innovation Super Session Sketch Notes
Synergy 2017: Colin Powell Innovation Super Session Sketch NotesSynergy 2017: Colin Powell Innovation Super Session Sketch Notes
Synergy 2017: Colin Powell Innovation Super Session Sketch NotesCitrix
 
Who Are Citrix Customers?
Who Are Citrix Customers?Who Are Citrix Customers?
Who Are Citrix Customers?Citrix
 
Manage risk by protecting apps, data and usage
Manage risk by protecting apps, data and usageManage risk by protecting apps, data and usage
Manage risk by protecting apps, data and usageCitrix
 
Enterprise Case Study: Enabling a More Mobile Way of Working
Enterprise Case Study: Enabling a More Mobile Way of Working Enterprise Case Study: Enabling a More Mobile Way of Working
Enterprise Case Study: Enabling a More Mobile Way of Working Citrix
 
Life in the Digital Workspace
Life in the Digital WorkspaceLife in the Digital Workspace
Life in the Digital WorkspaceCitrix
 
Comparing traditional workspaces to digital workspaces
Comparing traditional workspaces to digital workspacesComparing traditional workspaces to digital workspaces
Comparing traditional workspaces to digital workspacesCitrix
 
4 Ways to Ensure a Smooth Windows 10 Migration
4 Ways to Ensure a Smooth Windows 10 Migration4 Ways to Ensure a Smooth Windows 10 Migration
4 Ways to Ensure a Smooth Windows 10 MigrationCitrix
 
Citrix Paddington
Citrix PaddingtonCitrix Paddington
Citrix PaddingtonCitrix
 

Mais de Citrix (20)

Building The Digital Workplace
Building The Digital WorkplaceBuilding The Digital Workplace
Building The Digital Workplace
 
Maximize your Investment in Microsoft Office 365 with Citrix Workspace
Maximize your Investment in Microsoft Office 365 with Citrix Workspace Maximize your Investment in Microsoft Office 365 with Citrix Workspace
Maximize your Investment in Microsoft Office 365 with Citrix Workspace
 
XenApp on Google Cloud Deployment Guide
XenApp on Google Cloud Deployment GuideXenApp on Google Cloud Deployment Guide
XenApp on Google Cloud Deployment Guide
 
Deploying Citrix XenApp & XenDesktop Service on Google Cloud Platform
Deploying Citrix XenApp & XenDesktop Service on Google Cloud PlatformDeploying Citrix XenApp & XenDesktop Service on Google Cloud Platform
Deploying Citrix XenApp & XenDesktop Service on Google Cloud Platform
 
Manage Risk by Protecting the Apps and Data That Drive Business Productivity
Manage Risk by Protecting the Apps and Data That Drive Business ProductivityManage Risk by Protecting the Apps and Data That Drive Business Productivity
Manage Risk by Protecting the Apps and Data That Drive Business Productivity
 
How do Organizations Plan to Assure Application Delivery in a Multi-Cloud World?
How do Organizations Plan to Assure Application Delivery in a Multi-Cloud World?How do Organizations Plan to Assure Application Delivery in a Multi-Cloud World?
How do Organizations Plan to Assure Application Delivery in a Multi-Cloud World?
 
Workforce Flexibility Can Drive Greater Engagement & Productivity
Workforce Flexibility Can Drive Greater Engagement & ProductivityWorkforce Flexibility Can Drive Greater Engagement & Productivity
Workforce Flexibility Can Drive Greater Engagement & Productivity
 
Citrix Cloud Services: Total Economic Benefits Assessment Guide
Citrix Cloud Services: Total Economic Benefits Assessment GuideCitrix Cloud Services: Total Economic Benefits Assessment Guide
Citrix Cloud Services: Total Economic Benefits Assessment Guide
 
The Growing U.S. IT Productivity Gap
The Growing U.S. IT Productivity GapThe Growing U.S. IT Productivity Gap
The Growing U.S. IT Productivity Gap
 
Citrix Cloud Services: Total Economic Benefits Assessment Guide
Citrix Cloud Services: Total Economic Benefits Assessment GuideCitrix Cloud Services: Total Economic Benefits Assessment Guide
Citrix Cloud Services: Total Economic Benefits Assessment Guide
 
Citrix Synergy 2017: Technology Keynote Sketch Notes
Citrix Synergy 2017: Technology Keynote Sketch NotesCitrix Synergy 2017: Technology Keynote Sketch Notes
Citrix Synergy 2017: Technology Keynote Sketch Notes
 
Citrix Synergy 2017: Malcolm Gladwell Innovation Super Session Sketch Notes
Citrix Synergy 2017: Malcolm Gladwell Innovation Super Session Sketch NotesCitrix Synergy 2017: Malcolm Gladwell Innovation Super Session Sketch Notes
Citrix Synergy 2017: Malcolm Gladwell Innovation Super Session Sketch Notes
 
Synergy 2017: Colin Powell Innovation Super Session Sketch Notes
Synergy 2017: Colin Powell Innovation Super Session Sketch NotesSynergy 2017: Colin Powell Innovation Super Session Sketch Notes
Synergy 2017: Colin Powell Innovation Super Session Sketch Notes
 
Who Are Citrix Customers?
Who Are Citrix Customers?Who Are Citrix Customers?
Who Are Citrix Customers?
 
Manage risk by protecting apps, data and usage
Manage risk by protecting apps, data and usageManage risk by protecting apps, data and usage
Manage risk by protecting apps, data and usage
 
Enterprise Case Study: Enabling a More Mobile Way of Working
Enterprise Case Study: Enabling a More Mobile Way of Working Enterprise Case Study: Enabling a More Mobile Way of Working
Enterprise Case Study: Enabling a More Mobile Way of Working
 
Life in the Digital Workspace
Life in the Digital WorkspaceLife in the Digital Workspace
Life in the Digital Workspace
 
Comparing traditional workspaces to digital workspaces
Comparing traditional workspaces to digital workspacesComparing traditional workspaces to digital workspaces
Comparing traditional workspaces to digital workspaces
 
4 Ways to Ensure a Smooth Windows 10 Migration
4 Ways to Ensure a Smooth Windows 10 Migration4 Ways to Ensure a Smooth Windows 10 Migration
4 Ways to Ensure a Smooth Windows 10 Migration
 
Citrix Paddington
Citrix PaddingtonCitrix Paddington
Citrix Paddington
 

Último

Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 

Último (20)

Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 

SYN310: Deep dive into ShareFile Enterprise functionality

  • 1. © 2014 Citrix. Confidential.1
  • 2. © 2014 Citrix. Confidential.2 You can tweet about this session!
  • 3. © 2014 Citrix. Confidential.3 • Assuming basic knowledge of ShareFile • Address common questions from PoC / Deployment • Please hold questions to the end, as we’ve got quite a bit to cover
  • 4. © 2014 Citrix. Confidential.4 • Enterprise IT is in a difficult position • Consumer devices and solutions evolving quickly • Consumers are used to finding their own IT solutions • Enterprise IT can’t keep doing what they’ve been doing an expect to close that gap • Enterprise IT tasked with supporting 100’s of applications • Intro: There are many business trends that impact IT. But consumerization is at the top of the list. • Key Points: • Consumerization is being driven by the fact that consumer capabilities are surpassing that of enterprise IT. The first source of this trend is the new generation of people entering the workforce--bringing their personal workspaces, habits, and identity with them. More sophisticated and very popular consumer devices are compounding the trend. These devices have capabilities that far outreach enterprise IT computing capabilities from even a few years ago – and they are easily available at low cost from a variety of retailers. • This proven by analyst like Gartner that have clearly stated that this is the one trend that experts agree will drive the most change is the consumerization of IT. The consensus among analysts is that this trend, which is already underway, will force significant changes in businesses all over the world. • Illustration/Anecdotes/Proof: We all see examples in the news these days, and you probably see many more within your own company…
  • 5. © 2014 Citrix. Confidential.5 4 pillars of ShareFile ‐ Clients, Authentication, SaaS Application (Control Plane), Document Storage Clients • Native client experience across these platforms, while still maintaining consistency • Clients ‐ OS X, Windows (XenApp / XenDesktop), Mobile clients with mobile editor, Outlook Plug‐in Authentication • Not technically part of ShareFile, but important to understand how users are authorized into ShareFile • Potentially an on‐premises component to that as well SaaS Application (Control Plane) • ShareFile.com and ShareFile.eu • Contains the business logic that drives SF as well as the webUI and reporting • Deliberately a SaaS application to help you close the gap between the velocity of consumer and  enterprise IT services • Speed at which we can evolve features 
  • 6. © 2014 Citrix. Confidential.6 • Improves response time to address security issues • 60% of our customers are not on the latest release of the SZC ‐ illustrates the difference between what  IT thinks they can deliver and what they really can • With enterprise software the slower you update the more stable and reliable your system is, this  contrasts with consumer software which the faster you update it the more stable and better the user  experience is Document Storage (StorageZone) • Specifically separate from the rest of the architecture • By splitting this out it allows us to address business logic separately from the data/documents being  stored • By having it be a separate component it allows us to add features to the solution without impacting the  documents stored • Cloud, on‐prem, hybrid • Citrix‐managed, customer‐managed, access to existing repositories
  • 7. © 2014 Citrix. Confidential.7
  • 8. © 2014 Citrix. Confidential.8 Deploying the ShareFile mobile apps can take place in 3 ways: • Via the public app store  • From an MDM solution ‐ ShareFile apps are available for packaging from other vendors (Airwatch,  Mobile Iron) • And of course, as part of an MDX application set with XenMobile
  • 9. © 2014 Citrix. Confidential.9 • Now, if you’ve chosen to restrict app deployment to an administrator‐pushed model ‐ you want to  control which mobile devices are allowed to connect to ShareFile. • By turning off the public app store, IT administrators are now responsible for deployment of the app,  and can apply rules and policies for distribution.   • This isn’t a feature exposed via the ShareFile UI, and needs to be requested through ShareFile support • User experience for this ‐ we don’t block access to the app store (obviously), but when this option  is available, and the user tries to log in from an app the downloaded themselves ‐ they are denied  access As a security feature ‐ this is an account‐wide setting, and it is all or nothing.  
  • 10. © 2014 Citrix. Confidential.10 • On windows and mac devices, we have similar controls to restrict unmanaged devices. • Gives administrators the ability to selectively control which Windows / OSX devices are allowed to  synchronize content.  Typically this is pushed out as part of your software deployment practices. • This is somewhat more granular than the mobile device policies, in that the key could be pushed out to  an individual device.
  • 11. © 2014 Citrix. Confidential.11 • ShareFile is sold as both a standalone solution as well as bundled with XenMobile • Features here are available regardless of how ShareFile is purchased / integrated into clients and  Application Tier • Encryption ‐ Using AES 256 for the ShareFile application / requires PIN or Passcode to be set for the  app itself • Poison pill ‐ allows administrators to set a threshold for access ‐ so that if a device doesn’t check in,  or if you lose a device after x days ‐ data is wipe • Remote wipe ‐ only wipes the sharefile container, not a device wipe • Disabling “open in” ‐ Built‐in Mobile editor, ShareFile can be a fully functional standalone tool ‐ preventing open‐in contains your data inside the ShareFile sandbox
  • 12. © 2014 Citrix. Confidential.12 If you’re deploying ShareFile as part of XenMobile ‐ the benefits of MDX are that we’re given significantly  more control Clipboard ‐ copy and paste Blocking Screen Capture Disable Print Require internal network
  • 13. © 2014 Citrix. Confidential.13 As a XenMobile administrator ‐ you have signifcantly more control over the restrictions around access to  ShareFile content on the device • Sandboxed in ShareFile ‐ Data not allowed to leave the App • Sandboxed in XenMobile ‐ Data can be exhcanged between ShareFile and other MDX applications  • Freely accessible ‐ Data can be exchanged between ShareFile and any app on the device Of course, a XenMobile data wipe will destroy the entire managed container ‐ including the ShareFile content.
  • 14. © 2014 Citrix. Confidential.14 • Sometimes the different ways we share content in ShareFile is misunderstood ‐ so we want to clarify  the 3 different ways you can share a file with someone else and the controls around that.
  • 15. © 2014 Citrix. Confidential.15 • In the most basic scenario, we have Anonymous sharing • This is almost the email model of a file share • I send you a link • You can download or view the content ‐ if you don’t have a locally installed application, you can  view it online (with Microsoft Office Web Apps) • The OWA viewer is going to have the most hi‐fidelity rendering of that document, because hey,  it’s Microsoft • As the user ‐ I *can* get confirmation of downloads ‐ as administrator ‐ I can track IP address of the  recipients, timestamps, etc. • Users and administrators can also expire links after they are sent
  • 16. © 2014 Citrix. Confidential.16 • Moving on ‐ I can send file anonymously, but with Request Contact Info enabled • This is the most common way *I* send files ‐ and while it is still an anonymous download, key pieces  of information are requested from the recipient ‐ and in 95% of the cases, I get valid information  back.  • People often ask “but can’t you just fill that out with nonsense?” ‐ of course ‐ but from real world use  of the product, almost everyone puts real information into these fields • This information is auditable ‐ and we’ll track name, email addr, timestamp, IP.  So you can tell if the  link has been sent on to more than your intended recipients, and of course you can always retract  links you’ve sent.
  • 17. © 2014 Citrix. Confidential.17 • The most secure method of sharing with ShareFile is Requiring a Client login. • In this model, I send you a link • As the recipient, you get an email from ShareFile asking you to activate your client account and  choose a password • After setting the password you can download or view the file • Subsequent shared documents will require the user to login as a client using their password prior to  being taken to the download page
  • 18. © 2014 Citrix. Confidential.18 Additional controls around sharing which can be defined account‐wide: • If you NEVER want your users to share documents anonymously ‐ ShareFile can be configured to  require client logins for ALL links shared • Once you’ve gone to that step ‐ required client logins for sharing ‐ Blacklisting or whitelisting can be  configured to only allow your users to share content with specific external parties.  For instance, you  could use blacklist to block out sharing to competitor domains ‐ or whitelist to enabling sharing with  your suppliers.  This is also an all‐or‐nothing configuration. • To enhance security for your clients ‐ we have 2‐step verification with SMS so that your users can opt‐in  to provide an additional layer of security for their logins.
  • 19. © 2014 Citrix. Confidential.19 • Enterprises want to use Active Directory.  They don’t want to have to have another set of passwords to  manage.   You’ve heard us talk about Employees and Clients ‐ Employees are licensed users, who are  entitled to use all the features of ShareFile ‐ and then we have “clients,” users external to your  organization who have been granted access to files.  Provisioning is specifically about setting up those  accounts for Employee users, and utilizing your AD infrastructure to populate your user set.
  • 20. © 2014 Citrix. Confidential.20 • Provisioning is the process of bringing your AD user accounts into sharefile. ShareFile creates an ‘employee record’ which contains firstname, lastname, and email address based off  the information stored in your AD.  Of course, we can also gather group data for bulk management of  access ‐ you can take your existing AD groups and their memberships, and use them effectively within  ShareFile. No additional AD attributes are shared ‐ the actual provisoining process is only capturing a very speicfic  subset of data ‐ there is no impact on your existing AD infrastructure, no extention of AD, etc.
  • 21. © 2014 Citrix. Confidential.21 • Provisoining can take place 1 of 3 ways.  We’re really only focusing on one in this session. • First ‐ Provisioning can take place manually, entering it into our admin console or importing to ShareFile  via CSV file • XenMobile App Control is another option ‐ which gives you complete management of user accounts  from the XenMobile admin interface • But our focus in this section ‐ will be via the User Management Tool, which gives you the most  flexibility for user configuration, and is constantly updated to take advantage of new ShareFile  functionality.
  • 22. © 2014 Citrix. Confidential.22 • The user management tool is a lightweight windows application run on your local network by one of  your ShareFile account administrators.   • The tool needs no special permissions to access your active directory ‐ and will process a set of rules  you define: • Provision Users • Create Groups • Update group membership • Disabling user access 22
  • 23. © 2014 Citrix. Confidential.23 • Rules to provision employee accounts contain configuration options • Each rule can have different options • Options include: StorageZone, Quotas, and ShareFile permissions (create root folders, manage clients,  etc) • Rules can be run on‐demand from the User Management Tool console or can be run on a scheduled  basis via the Windows Scheduler, we expect rules will be scheduled after the initial PoC 23
  • 24. © 2014 Citrix. Confidential.24 • Once employee accounts have been created within your ShareFile account 
  • 25. © 2014 Citrix. Confidential.25 Now that we have taken a deeper look at user provisioning, let’s take a look at the authentication  methods that are available.  • ShareFile Managed – allows the user to login using an email address and password that are stored in  the ShareFile application tier ‐ this is the quickest way to get up and running in a proof of concept, but  we expect that most enterprises will want to integrate with their existing AD. • Customer ‐Managed IDP – solutions such as ADFS, PingFederate, SiteMinder, Okta ‐ where we can  support all the common authentication methods: Forms, Basic, and Windows Integrated.  These are  the supported solutions ‐ we conform to the Saml 2.0 standard, however as with most standards,  we’ve found significant variance between vendors. • XenMobile ‐ The XenMobile App Controller is a SAML 2.0 provider ‐ and if you are deploying ShareFile  as part of a XenMobile deployment, this is the best option.  In this configuration, no additional IdP is  required, and XenMobile provides everything you need. • Note: All users are configured with a password in the ShareFile control plane, but there is an option to  block user logins with password when you configure SAML.  25
  • 26. © 2014 Citrix. Confidential.26 • So why do we use SAML? • The problem that SAML resolves is trust.  ShareFile and its applications are not, and should not be  treated as, trusted entities inside your domain.  Similarly, we at ShareFile don't want to assume  management and security of your Active Directory username and password. • Sometimes people ask us ‐ why don't you just take my credentials, and perform some sort of secure  tunnel back to my Active Directory to validate my password?  The short answer here is that you should  never give your AD username and password to a 3rd party.  But you knew that.  There's a better model  for managing this ‐ SAML is an industry standard for maintaining trusts specifically for the purpose of  validating credentials. • In this model, by configuring a SAML server in your enterprise, you create that 3rd party which  ShareFile can interface with. • Through your configuration, your Active Directory Trusts the Identity Provider.  ShareFile trusts the  Identity Provider.  Therefore ‐ if the IDP validates your credentials for us, we can treat that as a reliable  source.
  • 27. © 2014 Citrix. Confidential.27 • There are 3 components to the system.  The Service Provider, in this case ShareFile.com ‐ we are the  service provider, which is outside of your environment. <click> • In the process of authenticating to the service provider, the user provides his username and password  to the IDP.  <click> • If the authentication was successful, the IDP provides a signed claim back to the user ‐ in our case, the  claim contains a name ID in the form of an email address. <click> • The user then passes that claim (signed by the IDP) back to ShareFile.  ShareFile trusts the signed claim,  and uses the email address supplied to tie this back to a ShareFile employee user.  
  • 28. © 2014 Citrix. Confidential.28
  • 29. © 2014 Citrix. Confidential.29
  • 30. © 2014 Citrix. Confidential.30 • Client requests ShareFile SSO login URL • Client discovers IDP • Client redirected to IDP • Client requests IDP URL • IDP authenticates the user • User is redirected to the ACS URL with the SAML response • User request ACS URL and presents the SAML token • ACS validates the SAML token and generates an OAuth token for client access • ShareFile client provides OAuth token as part of https requests to ShareFile API server • OAuth, that’s something new we haven’t talked about
  • 31. © 2014 Citrix. Confidential.31 • Client requests ShareFile SSO login URL • Client discovers IDP • Client redirected to IDP • Client requests IDP URL • IDP authenticates the user • User is redirected to the ACS URL with the SAML response • User request ACS URL and presents the SAML token • ACS validates the SAML token and generates an OAuth token for client access • ShareFile client provides OAuth token as part of https requests to ShareFile API server • OAuth, that’s something new we haven’t talked about
  • 32. © 2014 Citrix. Confidential.32 • Client requests ShareFile SSO login URL • Client discovers IDP • Client redirected to IDP • Client requests IDP URL • IDP authenticates the user • User is redirected to the ACS URL with the SAML response • User request ACS URL and presents the SAML token • ACS validates the SAML token and generates an OAuth token for client access • ShareFile client provides OAuth token as part of https requests to ShareFile API server • OAuth, that’s something new we haven’t talked about
  • 33. © 2014 Citrix. Confidential.33 • Client requests ShareFile SSO login URL • Client discovers IDP • Client redirected to IDP • Client requests IDP URL • IDP authenticates the user • User is redirected to the ACS URL with the SAML response • User request ACS URL and presents the SAML token • ACS validates the SAML token and generates an OAuth token for client access • ShareFile client provides OAuth token as part of https requests to ShareFile API server • OAuth, that’s something new we haven’t talked about
  • 34. © 2014 Citrix. Confidential.34 • Client requests ShareFile SSO login URL • Client discovers IDP • Client redirected to IDP • Client requests IDP URL • IDP authenticates the user • User is redirected to the ACS URL with the SAML response • User request ACS URL and presents the SAML token • ACS validates the SAML token and generates an OAuth token for client access • ShareFile client provides OAuth token as part of https requests to ShareFile API server • OAuth, that’s something new we haven’t talked about
  • 35. © 2014 Citrix. Confidential.35 • Client requests ShareFile SSO login URL • Client discovers IDP • Client redirected to IDP • Client requests IDP URL • IDP authenticates the user • User is redirected to the ACS URL with the SAML response • User request ACS URL and presents the SAML token • ACS validates the SAML token and generates an OAuth token for client access • ShareFile client provides OAuth token as part of https requests to ShareFile API server • OAuth, that’s something new we haven’t talked about
  • 36. © 2014 Citrix. Confidential.36 • Client requests ShareFile SSO login URL • Client discovers IDP • Client redirected to IDP • Client requests IDP URL • IDP authenticates the user • User is redirected to the ACS URL with the SAML response • User request ACS URL and presents the SAML token • ACS validates the SAML token and generates an OAuth token for client access • ShareFile client provides OAuth token as part of https requests to ShareFile API server • OAuth, that’s something new we haven’t talked about
  • 37. © 2014 Citrix. Confidential.37 • Client requests ShareFile SSO login URL • Client discovers IDP • Client redirected to IDP • Client requests IDP URL • IDP authenticates the user • User is redirected to the ACS URL with the SAML response • User request ACS URL and presents the SAML token • ACS validates the SAML token and generates an OAuth token for client access • ShareFile client provides OAuth token as part of https requests to ShareFile API server • OAuth, that’s something new we haven’t talked about
  • 38. © 2014 Citrix. Confidential.38 • Client requests ShareFile SSO login URL • Client discovers IDP • Client redirected to IDP • Client requests IDP URL • IDP authenticates the user • User is redirected to the ACS URL with the SAML response • User request ACS URL and presents the SAML token • ACS validates the SAML token and generates an OAuth token for client access • ShareFile client provides OAuth token as part of https requests to ShareFile API server • OAuth, that’s something new we haven’t talked about
  • 39. © 2014 Citrix. Confidential.39 • We’ve described the process of authentication between an IdP and SP so why do we use OAuth? • An OAuth token is a long‐life authorication that allows us to authorize the client without re‐prompting  for authentication • This is especially important for the Sync clients that need to constantly be checking for new document  updates when you are away from your computer • OAuth is an industry standard for long‐lived authorization requests and prevents us from having to  store credentials on a machine • OAuth tokens can be configured to automatically expire NEVER, or every 1,7,30 days. They can also be  manually revoked  • When an OAuth token expires or is revoked ShareFile requires the user to reauthenticate to the  Identity Provider • Disabling a ShareFile employee account immediately revokes all of the OAuth tokens associated to  their account
  • 40. © 2014 Citrix. Confidential.40 • Recapping ShareFile authentication with our Architecture • ShareFile clients talk to the IDP, we get a claim back
  • 41. © 2014 Citrix. Confidential.41 • StorageZone Connectors (which we haven’t talked about yet) are handled differently because in this  case we are authenticating to a resource that exists on your network. • Since we don’t have those credentials we prompt the user for their Active Directory credentials when  accessing StorageZone Connectors. The username and password are transferred over a HTTPS  connection only to an on‐prem Customer‐Managed StorageZone Controller. • The StorageZone Controller uses those credentials to impersonate the user when accessing the  resources on the network
  • 42. © 2014 Citrix. Confidential.42 • Storage is a key part of the ShareFile architecture, and we have a number of different options to  discuss.
  • 43. © 2014 Citrix. Confidential.43 • With StorageZones, we can host “ShareFile Data” in either Citrix‐Managed, or Customer‐Managed  repositories.  This can be cloud based, either in Amazon or Azure, or on‐premises in your own  datacenter.  Based on our flexible architecture, you can mix and match these types in your account, for  instance allowing one group of users to use cheaper cloud storage, while storing another set of users’  sensitive data in an on‐prem Zone. • Additionally – we offer Connectors – which gives access to existing data types.  It is important to  remember that Connectors content does not include the full sync and share experience ‐ and instead it  is focused on bringing a single access point to your users.
  • 44. © 2014 Citrix. Confidential.44 • If you choose a Citrix‐Managed Zone for your account, that is fully managed by ShareFile.  That means  you have the benefits of our data reliability with either Amazon or Azure, and our operations team  focused on keeping the system up and running at all times.  This is the traditional SaaS model that  ShareFile was built on, and has been evolving since its beginnings. • In this model, ShareFile runs the “StorageZone Controllers” and hosts them in the geographic region  most convenient for your cloud storage. • Of course, all our data is encrypted in transit and at rest with AES‐256 bit encryption. • There are additional benefits – Citrix‐Managed Zones are the most fully featured option we have, and  include functionality like FTP and AV scanning that again, is managed entirely by our team.  This takes a  lot of pressure off your administrators and makes for a system that can be set up very quickly – if you  requested an account right now, it could be ready to go within the hour.
  • 45. © 2014 Citrix. Confidential.45 We also offer customer‐managed StorageZones.  Typically our customers choose this model for one of  two reasons: • Performance – By physically locating your data repository near your users, you can ensure a fast  connection to data. • Compliance – For data sovereignty regulations or other compliance needs, a customer‐managed  Zone keeps file contents under your control at all times Our on‐prem solution is very straightforward – called the StorageZone Controller, it is a web service that  runs on a server inside your datacenter.  Because it is really a data pump – it can scale up or out; of  course we recommend a minimum deployment to be a load balanced pair and suggest that you assess  capacity in your environment and add capacity as needed. In this model you hold the encryption keys, and you hold the data.   The only information that passes  through ShareFile servers is file metadata – filenames, foldernames, and ACLs – but never the contents  of your sensitive documents.
  • 46. © 2014 Citrix. Confidential.46 • Talking a bit about our architecture, it is important to understand the distinction between what we call  file data, and file metadata.  In native ShareFile storage, we save every revision of a file you make as a  new object – and reference that object with a UUID.  If you were to look into one of our on‐prem (or  even cloud) repositories, you’d see a directory listing much like this – with a different UUID for every  file you upload. • This is part of our “object store” heritage and frankly we believe it is the model more and more of your  data will follow over the next 5‐10 years.  The simplicity of an object store is that it decouples the  mundane task of storing files from the useful stuff – the actual consumption and distribution of those  bits.  That’s very important, because it means that we can define a very simple model for storing your  data – and leave it intact for years and years – while continuously adding new functionality.  This is very  different from, say, an NTFS share – where the directory structure itself contains both file information  (such as name) and also access rights and permissions.   • By using object stores and having this “split” between where we store your file contents and your file  metadata – we gain a tremendous amount of flexibility and future‐proofing.  The fact that we use the  same model anywhere you store ShareFile data allows us to mix‐and‐match, giving you as the  administrator many options for where your files live.
  • 47. © 2014 Citrix. Confidential.47 • StorageZone Connectors, on the other hand – are all about mobilizing existing data, either from your  datacenter or from other cloud services. • On‐prem, we have fully functional solutions for read/write access to Network File Shares, as well as  check‐in/out access to SharePoint 2010 and 2013.   This gives your users a single place to go when they  want to access data – whether it is content that has been on your corporate R: drive for the last 10  years, or a document someone just edited on our ipad app.   To get to your on‐prem environment, we  use that same StorageZone Controller – so there is only one point of entry on your network and a  simple service to maintain.  For Connectors, we always impersonate the user accessing content – so all  of your existing permissions, auditing information, etc are still valid. • We’re putting a lot of effort into connectors, and you’ll see continued evolution here as well as new  document repository sources being added by Citrix and our Partners.  We’ve recently published our  Connectors SDK, and we’re getting great interest in that as a way to take what have traditionally been  on‐prem content management systems and quickly making them available on mobile devices.
  • 48. © 2014 Citrix. Confidential.48 • In summary, when you’re talking about ShareFile and the content it can serve up – these are the  important concepts.  ShareFile Data – fully featured, sync and share, versioning, retention policies, all  of the benefits that ShareFile can get you.  This can live in the cloud or on‐prem, and you can choose to  manage that yourself or take a fully hands‐off approach. • Connectors, on the other hand – limited to the permissions and functionality their original back ends  supported – so that’s read/write, check‐in/out.  In many cases those repositories have been in use for  years, or even decades – we don’t want to re‐architect the security on all that data you’ve already got.   So we’ll honor all the existing permissions, and appear to those sources as if the user were connecting  natively on the desktop.  This is a great feature and brings these documents to ios and Android quickly  and easily, without a lot of new infrastructure and with zero messy conversion of data.
  • 49. © 2014 Citrix. Confidential.49
  • 50. © 2014 Citrix. Confidential.50
  • 51. © 2014 Citrix. Confidential.51
  • 52. © 2014 Citrix. Confidential.52