SlideShare uma empresa Scribd logo
1 de 8
Baixar para ler offline
citrix.com
Mobile workstyles | White Paper
Enabling mobile
workstyles with
an end-to-end
enterprise mobility
management
solution.
2
citrix.com
Mobile workstyles | White Paper
The evolution of mobile workstyles has made it
increasingly important for professionals to be equally
as productive on the go as they are in the office.
The consumerization of IT is fueled by employee
mobility, but also creates complexity for enterprise IT.
Bring your own device (BYOD) programs, application
proliferation, and consumer file-sharing services are
leading to a mix of devices, applications and data
that are difficult to control, secure and manage.
By powering mobile workstyles with an end-to-
end enterprise mobility management solution that
includes Citrix XenMobile, Citrix Worx Home, and
Citrix ShareFile, Citrix is helping to bring order out of
this chaos.
Consumerization of IT
Professionals’ technology choices are becoming increasingly personal and
represent one of many factors driving the consumerization of IT in the enterprise.
With the force of this momentum, it is clear that in most business scenarios, users
will continue to win the battle of choice for devices, applications, and services.
Although there will be exceptions, heterogeneity is here to stay and will be adopted
by CIOs as they look to make users as productive on-the-go as in the office.
Enabling highly productive mobile workers is a visionary goal, but embracing
consumerization as an IT strategy presents significant practical challenges
because it creates a broad mix of devices, applications, and data. The following
sections present a closer look at the chaos cause by consumerization.
3
citrix.com
Mobile workstyles | White Paper
Figure 1: Device, application, and data chaos
Device chaos
The ever-increasing range of devices and device platforms that fall under BYOD
strategies can create chaos within the enterprise. To avoid it, a simple method
is needed to rapidly connect personal and corporate devices to corporate
infrastructure, enable users to engage efficiently with the required enterprise
applications and data and apply appropriate security controls to devices that
employees use for work.
Multiple factors influence accessing enterprise IT resources, such as device
ownership, user role or status and current location. For example, the resources
a contract employee can access from a personal device connected via a public
WIFI network should be markedly different from the resources accessible to a
permanent employee using a desktop PC on the corporate LAN. For compliance
and manageability, IT must be able to configure devices as well as apply policies
and actions such as passcodes, app blacklist/whitelist and full or selective wipe
of lost devices. A flexible, policy-driven infrastructure that can cope with diversity
of devices is critical to managing and securing the IT environment while enabling
employee productivity.
User experience is also affected by variations in device platforms and form factors.
The challenge is to provide a consistently rich experience on all device platforms
including Apple iOS, Android, RIM, and Microsoft Windows, as well as on devices
with different screen sizes and resolutions. To empower employees with full
productivity while still ensuring the security of corporate applications and data, IT
needs a way to manage devices throughout their entire lifecycle.
Applicationcha
os
Devicechaos
Data chaos
User
experience
Support
Application
management
Access
Data
security
Control
Personal
productivity
4
citrix.com
Mobile workstyles | White Paper
Application Chaos
The ever-growing mix of mobile, SaaS and Windows applications within
enterprises is creating application management and support chaos. With the
need to manage all these applications through their entire lifecycle and across a
much broader range of devices, challenges abound irrespective of the enterprise
application strategy.
Organizations embracing native mobile applications suffer from the inefficiencies
of developing multiple versions for multiple platforms, as well as the security risks
associated with distribution to unsecured devices. Adapting a large base of legacy
desktop applications to be suitable for smaller, touch-driven interfaces operating
over low-bandwidth, high-latency links is a time-consuming and risky proposition,
as not all apps will work well in this new environment. Web applications present
their own challenges, notably browser incompatibility and security. Personal apps
that users download also present a risk as users may simply mishandle corporate
data in these apps or have downloaded a malicious application onto the device.
With so many options available, application sprawl is a real problem for IT in terms
of manageability and updates as well as security. Current trends are heading away
from centralized IT licensing of apps and towards the purchase of SaaS services
by departments for line-of-business needs. This trend anticipates more situations
where individual applications are brought into the enterprise as a result of BYOD.
These trends will create a new wave of application sprawl if steps are not taken to
deliver all app types via a unified infrastructure.
Data Chaos
The exponential growth of data in the cloud and on devices is creating data
management and security chaos. Data chaos occurs at the intersection of access,
control, and security. The enterprise needs to make its data available to users
while controlling and securing distribution to protect its intellectual property and
meet regulatory guidelines regarding user privacy and auditing requirements.
The challenges of controlling and securing data arise from multiple, uncontrolled
endpoint devices, poorly written and/or malicious applications and readily available
consumer data-sharing applications. Also, when it comes to information security
attacks, the biggest threats originate within the organization. These attacks are not
necessarily malicious and may occur passively through poorly secured devices
with no device PINs or data encryption and poor physical access protection. But,
with the number of personal devices in the enterprises and cloud data services
available, a fine-grained data policy that follows the users between devices
becomes a necessity.
Citrix enterprise mobility management
Citrix offers a solution for controlling all three aspects of chaos with an end-to-
end enterprise mobility management solution. XenMobile features mobile device
management; mobile app management; sandboxed productivity apps; a unified
corporate app store and multi-factor single sign-on.
5
citrix.com
Mobile workstyles | White Paper
Citrix XenMobile
Citrix XenMobile is a comprehensive solution to manage mobile devices, apps,
and data. Users have single-click access to all of their mobile, SaaS and Windows
apps from a unified corporate app store, including seamlessly-integrated email,
browser, data sharing and support apps. IT gains control over mobile devices
with full configuration, security, provisioning and support capabilities. In addition,
XenMobile securely delivers Worx Mobile Apps, mobile apps built for businesses
using the Worx App SDK and found through the Worx App Gallery. With
XenMobile, IT can meet their compliance and control needs while users get the
freedom to experience work and life their way.
XenMobile delivers the following key features:
Configure, secure, provision and support mobile devices with MDM.
XenMobile delivers enterprise grade MDM with role-based management,
configuration, security and support for corporate and employee-owned devices.
Users enroll their devices, enabling IT to provision policies and apps to those
devices automatically, blacklist or whitelist apps, detect and protect against
jailbroken devices, troubleshoot device and app issues, and wipe or selectively
wipe a device that is lost, stolen or out of compliance. Users can use any device
they choose, while IT can ensure compliance of corporate assets and secure
corporate content on the device.
Mobile app management with the largest ecosystem of apps built for
business. XenMobile securely delivers Worx Mobile Apps, the industry’s largest
collection of apps built for business. Developers leverage the Worx App SDK, a
simple and powerful SDK that provides critical enterprise features into any app.
The SDK leverages Citrix MDX app container technology to add features like data
encryption, password authentication, secure lock and wipe, inter-app policies and
micro VPNs to mobile apps. It comes with a library that can be embedded into any
app with a single line of code. Developers can also opt to wrap their apps post-
development without adding any code to their app. IT can find Worx-enabled apps
in the Worx App Gallery and deliver these apps to devices via XenMobile. ISVs can
use Worx App Gallery to promote their apps.
Sandboxed email, browser and data sharing apps. With XenMobile, IT can
deliver Citrix-developed apps that are built for business. These apps include
WorxMail for secure email, calendar and contact access, WorxWeb for a secure
internet and Intranet access and ShareFile for secure enterprise file synchronization
and sharing. WorxMail, WorxWeb and ShareFile integration deliver a rich user
experience with the management and control that IT requires. These apps take
advantage of capabilities in the Citrix Worx App SDK such as an app-specific VPN
for secure access and a common data platform that ensures corporate data is
encrypted and always under IT control.
Unified corporate app store. XenMobile includes a unified corporate app
store that provides a single place for users to access all of their apps – mobile,
web, SaaS, and Windows – on any device. Users can easily choose the apps
they need for their job and have them instantly available on their devices. As they
move among their favorite devices, their chosen apps follow them to ensure full
productivity in any scenario.
6
citrix.com
Mobile workstyles | White Paper
Multi-factor single sign-on. XenMobile makes it easy for IT to manage user
access and radically simplify the user experience. Through the unified corporate
app store, users are given secure multi-factor single sign-on across their mobile,
web and Windows apps ensuring that they don’t need to remember yet-
another-password.
Citrix
Worx Home
Citrix
XenMobile
Citrix ShareFile
Enterprise
Enterprise data
Security
Account control
Provisioning
Follow-me-data
Access policies
Any device, app & data
Mobile devices
Mobile apps
Datacenter apps
Web apps
Windows apps
Data
Any device
PC
Mac
Smartphone
Tablet
Thin client
Figure 2: A complete enterprise mobility management solution
Worx Home
Available for any mobile device, Worx Home is an app that allows IT to enforce
mobile settings and security while also providing access to a unified app store and
live support services. XenMobile communicates with Worx Home to deliver device-
specific policies and Worx-enabled app policies.
ShareFile
ShareFile underpins the data capabilities of XenMobile, giving users the ability to
access and share their data from any device or location. ShareFile data is secured
on mobile devices using remote data wipe and lock as well as device-based
data access policies. In the following diagram, it is the “Data” component to the
XenMobile App Controller.
NetScaler Gateway
NetScaler Gateway is a secure application and data access solution that provides
administrators granular application and data-level control while empowering
users with remote access from anywhere. It gives IT administrators a single
point to manage access control and limit actions within sessions based on both
user identity and the endpoint device, providing better application security, data
protection, and compliance management.
7
citrix.com
Mobile workstyles | White Paper
Citrix XenMobile deployment model
Figure 3: Citrix XenMobile Architecture
XenMobile consists of three backend components: XenMobile App Controller,
XenMobile Device Manager, and NetScaler Gateway. Together, these components
address the challenges of device, application, and data chaos that enterprise IT
faces from the consumerization of IT.
Managing Devices
The XenMobile Device Manager allows IT to manage devices throughout their
entire lifecycle with enterprise MDM capabilities. These components allow IT to
configure, provision, secure, support, monitor, and decommission any device—
BYO or corporate-issued.
Managing Applications
XenMobile App Controller enables IT to ‘wrap’ any type of app and deliver it to
employees through Worx Home, based on their role in an organization. Wrapped
apps allow IT admins to place policies and controls over them, ensuring that
corporate content stays safe and employees don’t inadvertently leak sensitive
information. Citrix MDX technologies secure the apps that are delivered, allowing IT
to apply security policies and encryption on application and data access.
Managing Data
XenMobile includes ShareFile, allowing IT admins to directly provision and manage
ShareFile accounts through the App Controller interface. This provides employees
instant access to their ShareFile Enterprise accounts, allowing them to securely
access, edit, sync and share files from any device.
Conclusion
By resolving the device, application and data chaos created by consumerization,
Citrix is enabling mobile workstyles for users while providing IT with control and
citrix.com0613/PDF
8
Corporate Headquarters
Fort Lauderdale, FL, USA
Silicon Valley Headquarters
Santa Clara, CA, USA
EMEA Headquarters
Schaffhausen, Switzerland
India Development Center
Bangalore, India
Online Division Headquarters
Santa Barbara, CA, USA
Pacific Headquarters
Hong Kong, China
Latin America Headquarters
Coral Gables, FL, USA
UK Development Center
Chalfont, United Kingdom
Mobile workstyles | White Paper
About Citrix
Citrix (NASDAQ:CTXS) is the cloud company that enables mobile workstyles—empowering people to work and collaborate from anywhere, easily
and securely. With market-leading solutions for mobility, desktop virtualization, cloud networking, cloud platforms, collaboration and data sharing,
Citrix helps organizations achieve the speed and agility necessary to succeed in a mobile and dynamic world. Citrix products are in use at more
than 260,000 organizations and by over 100 million users globally. Annual revenue in 2012 was $2.59 billion. Learn more at www.citrix.com.
Copyright © 2013 Citrix Systems, Inc. All rights reserved. Citrix, XenMobile, NetScaler Gateway, Worx Home, WorxMail, WorxWeb and ShareFile
are trademarks of Citrix Systems, Inc. and/or one of its subsidiaries, and may be registered in the U.S. and other countries. Other product and
company names mentioned herein may be trademarks of their respective companies.
management capabilities. XenMobile with Worx Home and ShareFile enables quick
and effective access to the enterprise resources people need to stay productive
on the go from any device, while supporting IT efficiency, information security and
regulatory compliance.

Mais conteúdo relacionado

Mais procurados

Magic quadrant for enterprise mobility management suites
Magic quadrant for enterprise mobility management suitesMagic quadrant for enterprise mobility management suites
Magic quadrant for enterprise mobility management suitesJorge Gil Peña
 
SecurityWhitepaper 7-1-2015
SecurityWhitepaper 7-1-2015SecurityWhitepaper 7-1-2015
SecurityWhitepaper 7-1-2015Francisco Anes
 
Aerohive whitepaper-byod-and-beyond
Aerohive whitepaper-byod-and-beyondAerohive whitepaper-byod-and-beyond
Aerohive whitepaper-byod-and-beyondJ
 
how_to_balance_security_and_productivity_with_famoc_and_samsung_knox
how_to_balance_security_and_productivity_with_famoc_and_samsung_knoxhow_to_balance_security_and_productivity_with_famoc_and_samsung_knox
how_to_balance_security_and_productivity_with_famoc_and_samsung_knoxMarta Kusinska
 
White Paper - Securing Mobile Access to enterprise data
White Paper - Securing Mobile Access to enterprise dataWhite Paper - Securing Mobile Access to enterprise data
White Paper - Securing Mobile Access to enterprise dataAppear
 
Udløs potentialet i Enterprise Mobility, Vijay Dheap, IBM US
Udløs potentialet i Enterprise Mobility, Vijay Dheap, IBM USUdløs potentialet i Enterprise Mobility, Vijay Dheap, IBM US
Udløs potentialet i Enterprise Mobility, Vijay Dheap, IBM USIBM Danmark
 
Azure Introduction for IT Pros #1 Mobility
Azure Introduction for IT Pros #1 MobilityAzure Introduction for IT Pros #1 Mobility
Azure Introduction for IT Pros #1 MobilityMorgan Simonsen
 
Cortado Corporate Server 7.2 - EN
Cortado Corporate Server 7.2 - ENCortado Corporate Server 7.2 - EN
Cortado Corporate Server 7.2 - ENolivier lussac
 
A security system that changed the world
A security system that changed the worldA security system that changed the world
A security system that changed the worldSTO STRATEGY
 
Windows 10 Enterprise E3 - Best in Class Security and Control - Presented by ...
Windows 10 Enterprise E3 - Best in Class Security and Control - Presented by ...Windows 10 Enterprise E3 - Best in Class Security and Control - Presented by ...
Windows 10 Enterprise E3 - Best in Class Security and Control - Presented by ...David J Rosenthal
 
Microsoft Enterprise Mobility Suite Presented by Atidan
Microsoft Enterprise Mobility Suite Presented by AtidanMicrosoft Enterprise Mobility Suite Presented by Atidan
Microsoft Enterprise Mobility Suite Presented by AtidanDavid J Rosenthal
 
Entrust Enterprise Authentication
Entrust Enterprise AuthenticationEntrust Enterprise Authentication
Entrust Enterprise AuthenticationEntrust Datacard
 
Mobile Device Management for Office 365 - Atidan
Mobile Device Management for Office 365 - AtidanMobile Device Management for Office 365 - Atidan
Mobile Device Management for Office 365 - AtidanDavid J Rosenthal
 
3 Steps to Safely Bringing Your Own Devices (BYOD)
3 Steps to Safely Bringing Your Own Devices (BYOD)3 Steps to Safely Bringing Your Own Devices (BYOD)
3 Steps to Safely Bringing Your Own Devices (BYOD)Motorola Solutions
 
Byod+ +bring+your+own+device
Byod+ +bring+your+own+device Byod+ +bring+your+own+device
Byod+ +bring+your+own+device J
 
Empower Enterprise Mobility- Maximize Mobile Control- Presented by Atidan
Empower Enterprise Mobility- Maximize Mobile Control- Presented by AtidanEmpower Enterprise Mobility- Maximize Mobile Control- Presented by Atidan
Empower Enterprise Mobility- Maximize Mobile Control- Presented by AtidanDavid J Rosenthal
 
Wp byod
Wp byodWp byod
Wp byodJ
 
Beyond BYOD
Beyond BYODBeyond BYOD
Beyond BYODWorksPad
 

Mais procurados (20)

Magic quadrant for enterprise mobility management suites
Magic quadrant for enterprise mobility management suitesMagic quadrant for enterprise mobility management suites
Magic quadrant for enterprise mobility management suites
 
SecurityWhitepaper 7-1-2015
SecurityWhitepaper 7-1-2015SecurityWhitepaper 7-1-2015
SecurityWhitepaper 7-1-2015
 
Aerohive whitepaper-byod-and-beyond
Aerohive whitepaper-byod-and-beyondAerohive whitepaper-byod-and-beyond
Aerohive whitepaper-byod-and-beyond
 
how_to_balance_security_and_productivity_with_famoc_and_samsung_knox
how_to_balance_security_and_productivity_with_famoc_and_samsung_knoxhow_to_balance_security_and_productivity_with_famoc_and_samsung_knox
how_to_balance_security_and_productivity_with_famoc_and_samsung_knox
 
Embracing BYOD
Embracing BYODEmbracing BYOD
Embracing BYOD
 
White Paper - Securing Mobile Access to enterprise data
White Paper - Securing Mobile Access to enterprise dataWhite Paper - Securing Mobile Access to enterprise data
White Paper - Securing Mobile Access to enterprise data
 
MobileIrn Presentation
MobileIrn PresentationMobileIrn Presentation
MobileIrn Presentation
 
Udløs potentialet i Enterprise Mobility, Vijay Dheap, IBM US
Udløs potentialet i Enterprise Mobility, Vijay Dheap, IBM USUdløs potentialet i Enterprise Mobility, Vijay Dheap, IBM US
Udløs potentialet i Enterprise Mobility, Vijay Dheap, IBM US
 
Azure Introduction for IT Pros #1 Mobility
Azure Introduction for IT Pros #1 MobilityAzure Introduction for IT Pros #1 Mobility
Azure Introduction for IT Pros #1 Mobility
 
Cortado Corporate Server 7.2 - EN
Cortado Corporate Server 7.2 - ENCortado Corporate Server 7.2 - EN
Cortado Corporate Server 7.2 - EN
 
A security system that changed the world
A security system that changed the worldA security system that changed the world
A security system that changed the world
 
Windows 10 Enterprise E3 - Best in Class Security and Control - Presented by ...
Windows 10 Enterprise E3 - Best in Class Security and Control - Presented by ...Windows 10 Enterprise E3 - Best in Class Security and Control - Presented by ...
Windows 10 Enterprise E3 - Best in Class Security and Control - Presented by ...
 
Microsoft Enterprise Mobility Suite Presented by Atidan
Microsoft Enterprise Mobility Suite Presented by AtidanMicrosoft Enterprise Mobility Suite Presented by Atidan
Microsoft Enterprise Mobility Suite Presented by Atidan
 
Entrust Enterprise Authentication
Entrust Enterprise AuthenticationEntrust Enterprise Authentication
Entrust Enterprise Authentication
 
Mobile Device Management for Office 365 - Atidan
Mobile Device Management for Office 365 - AtidanMobile Device Management for Office 365 - Atidan
Mobile Device Management for Office 365 - Atidan
 
3 Steps to Safely Bringing Your Own Devices (BYOD)
3 Steps to Safely Bringing Your Own Devices (BYOD)3 Steps to Safely Bringing Your Own Devices (BYOD)
3 Steps to Safely Bringing Your Own Devices (BYOD)
 
Byod+ +bring+your+own+device
Byod+ +bring+your+own+device Byod+ +bring+your+own+device
Byod+ +bring+your+own+device
 
Empower Enterprise Mobility- Maximize Mobile Control- Presented by Atidan
Empower Enterprise Mobility- Maximize Mobile Control- Presented by AtidanEmpower Enterprise Mobility- Maximize Mobile Control- Presented by Atidan
Empower Enterprise Mobility- Maximize Mobile Control- Presented by Atidan
 
Wp byod
Wp byodWp byod
Wp byod
 
Beyond BYOD
Beyond BYODBeyond BYOD
Beyond BYOD
 

Destaque

3. The Software Development Process - Implementation
3. The Software Development Process - Implementation3. The Software Development Process - Implementation
3. The Software Development Process - ImplementationForrester High School
 
Why Application Delivery matters in the Digital economy
Why Application Delivery matters in the Digital economyWhy Application Delivery matters in the Digital economy
Why Application Delivery matters in the Digital economyCitrix
 
Software cost estimation
Software cost estimationSoftware cost estimation
Software cost estimationHaitham Ahmed
 
Estimation techniques and software metrics
Estimation techniques and software metricsEstimation techniques and software metrics
Estimation techniques and software metricsMae Abigail Banquil
 
Remote access service
Remote access serviceRemote access service
Remote access serviceApoorw Pandey
 
Steve jobs power point
Steve jobs power pointSteve jobs power point
Steve jobs power pointclaudiagp96
 
DevOps on AWS: Accelerating Software Delivery with the AWS Developer Tools
DevOps on AWS: Accelerating Software Delivery with the AWS Developer ToolsDevOps on AWS: Accelerating Software Delivery with the AWS Developer Tools
DevOps on AWS: Accelerating Software Delivery with the AWS Developer ToolsAmazon Web Services
 
The software Implementation Process
The software Implementation ProcessThe software Implementation Process
The software Implementation Processrthompson604
 
Software Estimation Techniques
Software Estimation TechniquesSoftware Estimation Techniques
Software Estimation Techniqueskamal
 
Advanced Tools and Techniques for Troubleshooting NetScaler Appliances
Advanced Tools and Techniques for Troubleshooting NetScaler AppliancesAdvanced Tools and Techniques for Troubleshooting NetScaler Appliances
Advanced Tools and Techniques for Troubleshooting NetScaler AppliancesDavid McGeough
 
Software Development Life Cycle (SDLC)
Software Development Life Cycle (SDLC)Software Development Life Cycle (SDLC)
Software Development Life Cycle (SDLC)Angelin R
 
Software cost estimation
Software cost estimationSoftware cost estimation
Software cost estimationdjview
 
Software cost estimation project
Software  cost estimation projectSoftware  cost estimation project
Software cost estimation projectShashank Puppala
 
Google glass glasses presentation ppt
Google glass glasses presentation pptGoogle glass glasses presentation ppt
Google glass glasses presentation pptParth Godhani
 
List of Software Development Model and Methods
List of Software Development Model and MethodsList of Software Development Model and Methods
List of Software Development Model and MethodsRiant Soft
 
6 basic steps of software development process
6 basic steps of software development process6 basic steps of software development process
6 basic steps of software development processRiant Soft
 

Destaque (20)

Enterprise software delivery
Enterprise software deliveryEnterprise software delivery
Enterprise software delivery
 
3. The Software Development Process - Implementation
3. The Software Development Process - Implementation3. The Software Development Process - Implementation
3. The Software Development Process - Implementation
 
Google Glass Breakdown
Google Glass BreakdownGoogle Glass Breakdown
Google Glass Breakdown
 
Why Application Delivery matters in the Digital economy
Why Application Delivery matters in the Digital economyWhy Application Delivery matters in the Digital economy
Why Application Delivery matters in the Digital economy
 
Software cost estimation
Software cost estimationSoftware cost estimation
Software cost estimation
 
Estimation techniques and software metrics
Estimation techniques and software metricsEstimation techniques and software metrics
Estimation techniques and software metrics
 
Remote access service
Remote access serviceRemote access service
Remote access service
 
Software cost estimation
Software cost estimationSoftware cost estimation
Software cost estimation
 
Steve jobs power point
Steve jobs power pointSteve jobs power point
Steve jobs power point
 
DevOps on AWS: Accelerating Software Delivery with the AWS Developer Tools
DevOps on AWS: Accelerating Software Delivery with the AWS Developer ToolsDevOps on AWS: Accelerating Software Delivery with the AWS Developer Tools
DevOps on AWS: Accelerating Software Delivery with the AWS Developer Tools
 
Google glass ppt
Google glass pptGoogle glass ppt
Google glass ppt
 
The software Implementation Process
The software Implementation ProcessThe software Implementation Process
The software Implementation Process
 
Software Estimation Techniques
Software Estimation TechniquesSoftware Estimation Techniques
Software Estimation Techniques
 
Advanced Tools and Techniques for Troubleshooting NetScaler Appliances
Advanced Tools and Techniques for Troubleshooting NetScaler AppliancesAdvanced Tools and Techniques for Troubleshooting NetScaler Appliances
Advanced Tools and Techniques for Troubleshooting NetScaler Appliances
 
Software Development Life Cycle (SDLC)
Software Development Life Cycle (SDLC)Software Development Life Cycle (SDLC)
Software Development Life Cycle (SDLC)
 
Software cost estimation
Software cost estimationSoftware cost estimation
Software cost estimation
 
Software cost estimation project
Software  cost estimation projectSoftware  cost estimation project
Software cost estimation project
 
Google glass glasses presentation ppt
Google glass glasses presentation pptGoogle glass glasses presentation ppt
Google glass glasses presentation ppt
 
List of Software Development Model and Methods
List of Software Development Model and MethodsList of Software Development Model and Methods
List of Software Development Model and Methods
 
6 basic steps of software development process
6 basic steps of software development process6 basic steps of software development process
6 basic steps of software development process
 

Semelhante a Enabling mobile workstyles with enterprise mobility management

10 Reasons to Strengthen Security with App & Desktop Virtualization
10 Reasons to Strengthen Security with App & Desktop Virtualization10 Reasons to Strengthen Security with App & Desktop Virtualization
10 Reasons to Strengthen Security with App & Desktop VirtualizationCitrix
 
Comparing traditional workspaces to digital workspaces
Comparing traditional workspaces to digital workspacesComparing traditional workspaces to digital workspaces
Comparing traditional workspaces to digital workspacesCitrix
 
IDC: Top Five Considerations for Cloud-Based Security
IDC: Top Five Considerations for Cloud-Based SecurityIDC: Top Five Considerations for Cloud-Based Security
IDC: Top Five Considerations for Cloud-Based Securityarms8586
 
MDM is not Enough - Parmelee
MDM is not Enough - Parmelee MDM is not Enough - Parmelee
MDM is not Enough - Parmelee Prolifics
 
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...IBM Security
 
MobileIron's Enterprise Solution for App Security and Management
MobileIron's Enterprise Solution for App Security and ManagementMobileIron's Enterprise Solution for App Security and Management
MobileIron's Enterprise Solution for App Security and ManagementMobileIron
 
XenMobile Datasheet
XenMobile DatasheetXenMobile Datasheet
XenMobile DatasheetNuno Alves
 
IBM InterConnect 2103 - Institute a MobileFirst IT Infrastructure
IBM InterConnect 2103 -  Institute a MobileFirst IT InfrastructureIBM InterConnect 2103 -  Institute a MobileFirst IT Infrastructure
IBM InterConnect 2103 - Institute a MobileFirst IT InfrastructureChris Pepin
 
Smarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst ServicesSmarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst ServicesChris Pepin
 
BlackBerry Unified Endpoint Manager (UEM): Complete Multi-OS Control for Secu...
BlackBerry Unified Endpoint Manager (UEM): Complete Multi-OS Control for Secu...BlackBerry Unified Endpoint Manager (UEM): Complete Multi-OS Control for Secu...
BlackBerry Unified Endpoint Manager (UEM): Complete Multi-OS Control for Secu...BlackBerry
 
Empower Enterprise Mobility with Microsoft EMS
Empower Enterprise Mobility with Microsoft EMSEmpower Enterprise Mobility with Microsoft EMS
Empower Enterprise Mobility with Microsoft EMSKris Wagner
 
Future proof and extend your IAM to Mobile Platforms and any connected device
Future proof and extend your IAM to Mobile Platforms and any connected deviceFuture proof and extend your IAM to Mobile Platforms and any connected device
Future proof and extend your IAM to Mobile Platforms and any connected deviceAldo Pietropaolo
 
Sholove cyren web security - technical datasheet2
Sholove cyren web security  - technical datasheet2Sholove cyren web security  - technical datasheet2
Sholove cyren web security - technical datasheet2SHOLOVE INTERNATIONAL LLC
 
Integrating Enterprise Mobility - an Assessment WHITE PAPER
Integrating Enterprise Mobility - an Assessment WHITE PAPERIntegrating Enterprise Mobility - an Assessment WHITE PAPER
Integrating Enterprise Mobility - an Assessment WHITE PAPERMobiloitte
 
Mobile Workspaces Go Where You Go [Infographic]
Mobile Workspaces Go Where You Go [Infographic]Mobile Workspaces Go Where You Go [Infographic]
Mobile Workspaces Go Where You Go [Infographic]Citrix
 
I Brought My Own Device. Now What?
I Brought My Own Device. Now What?I Brought My Own Device. Now What?
I Brought My Own Device. Now What? Array Networks
 
IBM Announce Intent to Acquire Fiberlink Analyst Presentation
IBM Announce Intent to Acquire Fiberlink Analyst PresentationIBM Announce Intent to Acquire Fiberlink Analyst Presentation
IBM Announce Intent to Acquire Fiberlink Analyst PresentationRon Favali
 
Moving Beyond MDM: Why Legacy Mobile Security Products Don't Work
Moving Beyond MDM: Why Legacy Mobile Security Products Don't WorkMoving Beyond MDM: Why Legacy Mobile Security Products Don't Work
Moving Beyond MDM: Why Legacy Mobile Security Products Don't WorkSierraware
 

Semelhante a Enabling mobile workstyles with enterprise mobility management (20)

10 Reasons to Strengthen Security with App & Desktop Virtualization
10 Reasons to Strengthen Security with App & Desktop Virtualization10 Reasons to Strengthen Security with App & Desktop Virtualization
10 Reasons to Strengthen Security with App & Desktop Virtualization
 
Comparing traditional workspaces to digital workspaces
Comparing traditional workspaces to digital workspacesComparing traditional workspaces to digital workspaces
Comparing traditional workspaces to digital workspaces
 
IDC: Top Five Considerations for Cloud-Based Security
IDC: Top Five Considerations for Cloud-Based SecurityIDC: Top Five Considerations for Cloud-Based Security
IDC: Top Five Considerations for Cloud-Based Security
 
MDM is not Enough - Parmelee
MDM is not Enough - Parmelee MDM is not Enough - Parmelee
MDM is not Enough - Parmelee
 
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...
 
MobileIron's Enterprise Solution for App Security and Management
MobileIron's Enterprise Solution for App Security and ManagementMobileIron's Enterprise Solution for App Security and Management
MobileIron's Enterprise Solution for App Security and Management
 
XenMobile Datasheet
XenMobile DatasheetXenMobile Datasheet
XenMobile Datasheet
 
IBM InterConnect 2103 - Institute a MobileFirst IT Infrastructure
IBM InterConnect 2103 -  Institute a MobileFirst IT InfrastructureIBM InterConnect 2103 -  Institute a MobileFirst IT Infrastructure
IBM InterConnect 2103 - Institute a MobileFirst IT Infrastructure
 
Smarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst ServicesSmarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst Services
 
BlackBerry Unified Endpoint Manager (UEM): Complete Multi-OS Control for Secu...
BlackBerry Unified Endpoint Manager (UEM): Complete Multi-OS Control for Secu...BlackBerry Unified Endpoint Manager (UEM): Complete Multi-OS Control for Secu...
BlackBerry Unified Endpoint Manager (UEM): Complete Multi-OS Control for Secu...
 
Empower Enterprise Mobility with Microsoft EMS
Empower Enterprise Mobility with Microsoft EMSEmpower Enterprise Mobility with Microsoft EMS
Empower Enterprise Mobility with Microsoft EMS
 
Future proof and extend your IAM to Mobile Platforms and any connected device
Future proof and extend your IAM to Mobile Platforms and any connected deviceFuture proof and extend your IAM to Mobile Platforms and any connected device
Future proof and extend your IAM to Mobile Platforms and any connected device
 
Sholove cyren web security - technical datasheet2
Sholove cyren web security  - technical datasheet2Sholove cyren web security  - technical datasheet2
Sholove cyren web security - technical datasheet2
 
Integrating Enterprise Mobility - an Assessment WHITE PAPER
Integrating Enterprise Mobility - an Assessment WHITE PAPERIntegrating Enterprise Mobility - an Assessment WHITE PAPER
Integrating Enterprise Mobility - an Assessment WHITE PAPER
 
Mobile Workspaces Go Where You Go [Infographic]
Mobile Workspaces Go Where You Go [Infographic]Mobile Workspaces Go Where You Go [Infographic]
Mobile Workspaces Go Where You Go [Infographic]
 
I Brought My Own Device. Now What?
I Brought My Own Device. Now What?I Brought My Own Device. Now What?
I Brought My Own Device. Now What?
 
IBM Announce Intent to Acquire Fiberlink Analyst Presentation
IBM Announce Intent to Acquire Fiberlink Analyst PresentationIBM Announce Intent to Acquire Fiberlink Analyst Presentation
IBM Announce Intent to Acquire Fiberlink Analyst Presentation
 
Moving Beyond MDM: Why Legacy Mobile Security Products Don't Work
Moving Beyond MDM: Why Legacy Mobile Security Products Don't WorkMoving Beyond MDM: Why Legacy Mobile Security Products Don't Work
Moving Beyond MDM: Why Legacy Mobile Security Products Don't Work
 
MaaS 360
MaaS 360MaaS 360
MaaS 360
 
Securing mobile apps in a BYOD world
Securing mobile apps in a BYOD worldSecuring mobile apps in a BYOD world
Securing mobile apps in a BYOD world
 

Mais de Nuno Alves

E g innovations overview
E g innovations overviewE g innovations overview
E g innovations overviewNuno Alves
 
Citrix virtual desktop handbook (7x)
Citrix virtual desktop handbook (7x)Citrix virtual desktop handbook (7x)
Citrix virtual desktop handbook (7x)Nuno Alves
 
Citrix XenServer Design: Designing XenServer Network Configurations
Citrix XenServer Design:  Designing XenServer Network  ConfigurationsCitrix XenServer Design:  Designing XenServer Network  Configurations
Citrix XenServer Design: Designing XenServer Network ConfigurationsNuno Alves
 
Deploying the XenMobile 8.5 Solution
Deploying the XenMobile 8.5 SolutionDeploying the XenMobile 8.5 Solution
Deploying the XenMobile 8.5 SolutionNuno Alves
 
Cloudbridge video delivery
Cloudbridge video deliveryCloudbridge video delivery
Cloudbridge video deliveryNuno Alves
 
XenApp 6.5 - Event Log Messages
XenApp 6.5 - Event Log MessagesXenApp 6.5 - Event Log Messages
XenApp 6.5 - Event Log MessagesNuno Alves
 
Citrix cloud platform 4.2 data sheet
Citrix cloud platform 4.2 data sheetCitrix cloud platform 4.2 data sheet
Citrix cloud platform 4.2 data sheetNuno Alves
 
Cloud portal business manager product overview
Cloud portal business manager product overviewCloud portal business manager product overview
Cloud portal business manager product overviewNuno Alves
 
Reference architecture dir and es - final
Reference architecture   dir and es - finalReference architecture   dir and es - final
Reference architecture dir and es - finalNuno Alves
 
Provisioning server high_availability_considerations2
Provisioning server high_availability_considerations2Provisioning server high_availability_considerations2
Provisioning server high_availability_considerations2Nuno Alves
 
Xd planning guide - storage best practices
Xd   planning guide - storage best practicesXd   planning guide - storage best practices
Xd planning guide - storage best practicesNuno Alves
 
Introduction to storage technologies
Introduction to storage technologiesIntroduction to storage technologies
Introduction to storage technologiesNuno Alves
 
Xen server storage Overview
Xen server storage OverviewXen server storage Overview
Xen server storage OverviewNuno Alves
 
XenDesktop 7 Blueprint
XenDesktop 7 BlueprintXenDesktop 7 Blueprint
XenDesktop 7 BlueprintNuno Alves
 
Citrix virtual desktop handbook (5 x)
Citrix virtual desktop handbook (5 x)Citrix virtual desktop handbook (5 x)
Citrix virtual desktop handbook (5 x)Nuno Alves
 
New eBook! Citrix howto build an all star app desktop virtualization team
New eBook! Citrix howto build an all star app desktop virtualization teamNew eBook! Citrix howto build an all star app desktop virtualization team
New eBook! Citrix howto build an all star app desktop virtualization teamNuno Alves
 
Wp intelli cache_reduction_iops_xd5.6_fp1_xs6.1
Wp intelli cache_reduction_iops_xd5.6_fp1_xs6.1Wp intelli cache_reduction_iops_xd5.6_fp1_xs6.1
Wp intelli cache_reduction_iops_xd5.6_fp1_xs6.1Nuno Alves
 
Citrix Store front planning guide
Citrix Store front planning guideCitrix Store front planning guide
Citrix Store front planning guideNuno Alves
 
Microsoft by the Numbers
Microsoft by the NumbersMicrosoft by the Numbers
Microsoft by the NumbersNuno Alves
 
NetScaler Deployment Guide for XenDesktop7
NetScaler Deployment Guide for XenDesktop7NetScaler Deployment Guide for XenDesktop7
NetScaler Deployment Guide for XenDesktop7Nuno Alves
 

Mais de Nuno Alves (20)

E g innovations overview
E g innovations overviewE g innovations overview
E g innovations overview
 
Citrix virtual desktop handbook (7x)
Citrix virtual desktop handbook (7x)Citrix virtual desktop handbook (7x)
Citrix virtual desktop handbook (7x)
 
Citrix XenServer Design: Designing XenServer Network Configurations
Citrix XenServer Design:  Designing XenServer Network  ConfigurationsCitrix XenServer Design:  Designing XenServer Network  Configurations
Citrix XenServer Design: Designing XenServer Network Configurations
 
Deploying the XenMobile 8.5 Solution
Deploying the XenMobile 8.5 SolutionDeploying the XenMobile 8.5 Solution
Deploying the XenMobile 8.5 Solution
 
Cloudbridge video delivery
Cloudbridge video deliveryCloudbridge video delivery
Cloudbridge video delivery
 
XenApp 6.5 - Event Log Messages
XenApp 6.5 - Event Log MessagesXenApp 6.5 - Event Log Messages
XenApp 6.5 - Event Log Messages
 
Citrix cloud platform 4.2 data sheet
Citrix cloud platform 4.2 data sheetCitrix cloud platform 4.2 data sheet
Citrix cloud platform 4.2 data sheet
 
Cloud portal business manager product overview
Cloud portal business manager product overviewCloud portal business manager product overview
Cloud portal business manager product overview
 
Reference architecture dir and es - final
Reference architecture   dir and es - finalReference architecture   dir and es - final
Reference architecture dir and es - final
 
Provisioning server high_availability_considerations2
Provisioning server high_availability_considerations2Provisioning server high_availability_considerations2
Provisioning server high_availability_considerations2
 
Xd planning guide - storage best practices
Xd   planning guide - storage best practicesXd   planning guide - storage best practices
Xd planning guide - storage best practices
 
Introduction to storage technologies
Introduction to storage technologiesIntroduction to storage technologies
Introduction to storage technologies
 
Xen server storage Overview
Xen server storage OverviewXen server storage Overview
Xen server storage Overview
 
XenDesktop 7 Blueprint
XenDesktop 7 BlueprintXenDesktop 7 Blueprint
XenDesktop 7 Blueprint
 
Citrix virtual desktop handbook (5 x)
Citrix virtual desktop handbook (5 x)Citrix virtual desktop handbook (5 x)
Citrix virtual desktop handbook (5 x)
 
New eBook! Citrix howto build an all star app desktop virtualization team
New eBook! Citrix howto build an all star app desktop virtualization teamNew eBook! Citrix howto build an all star app desktop virtualization team
New eBook! Citrix howto build an all star app desktop virtualization team
 
Wp intelli cache_reduction_iops_xd5.6_fp1_xs6.1
Wp intelli cache_reduction_iops_xd5.6_fp1_xs6.1Wp intelli cache_reduction_iops_xd5.6_fp1_xs6.1
Wp intelli cache_reduction_iops_xd5.6_fp1_xs6.1
 
Citrix Store front planning guide
Citrix Store front planning guideCitrix Store front planning guide
Citrix Store front planning guide
 
Microsoft by the Numbers
Microsoft by the NumbersMicrosoft by the Numbers
Microsoft by the Numbers
 
NetScaler Deployment Guide for XenDesktop7
NetScaler Deployment Guide for XenDesktop7NetScaler Deployment Guide for XenDesktop7
NetScaler Deployment Guide for XenDesktop7
 

Último

Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditSkynet Technologies
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesThousandEyes
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 

Último (20)

Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance Audit
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 

Enabling mobile workstyles with enterprise mobility management

  • 1. citrix.com Mobile workstyles | White Paper Enabling mobile workstyles with an end-to-end enterprise mobility management solution.
  • 2. 2 citrix.com Mobile workstyles | White Paper The evolution of mobile workstyles has made it increasingly important for professionals to be equally as productive on the go as they are in the office. The consumerization of IT is fueled by employee mobility, but also creates complexity for enterprise IT. Bring your own device (BYOD) programs, application proliferation, and consumer file-sharing services are leading to a mix of devices, applications and data that are difficult to control, secure and manage. By powering mobile workstyles with an end-to- end enterprise mobility management solution that includes Citrix XenMobile, Citrix Worx Home, and Citrix ShareFile, Citrix is helping to bring order out of this chaos. Consumerization of IT Professionals’ technology choices are becoming increasingly personal and represent one of many factors driving the consumerization of IT in the enterprise. With the force of this momentum, it is clear that in most business scenarios, users will continue to win the battle of choice for devices, applications, and services. Although there will be exceptions, heterogeneity is here to stay and will be adopted by CIOs as they look to make users as productive on-the-go as in the office. Enabling highly productive mobile workers is a visionary goal, but embracing consumerization as an IT strategy presents significant practical challenges because it creates a broad mix of devices, applications, and data. The following sections present a closer look at the chaos cause by consumerization.
  • 3. 3 citrix.com Mobile workstyles | White Paper Figure 1: Device, application, and data chaos Device chaos The ever-increasing range of devices and device platforms that fall under BYOD strategies can create chaos within the enterprise. To avoid it, a simple method is needed to rapidly connect personal and corporate devices to corporate infrastructure, enable users to engage efficiently with the required enterprise applications and data and apply appropriate security controls to devices that employees use for work. Multiple factors influence accessing enterprise IT resources, such as device ownership, user role or status and current location. For example, the resources a contract employee can access from a personal device connected via a public WIFI network should be markedly different from the resources accessible to a permanent employee using a desktop PC on the corporate LAN. For compliance and manageability, IT must be able to configure devices as well as apply policies and actions such as passcodes, app blacklist/whitelist and full or selective wipe of lost devices. A flexible, policy-driven infrastructure that can cope with diversity of devices is critical to managing and securing the IT environment while enabling employee productivity. User experience is also affected by variations in device platforms and form factors. The challenge is to provide a consistently rich experience on all device platforms including Apple iOS, Android, RIM, and Microsoft Windows, as well as on devices with different screen sizes and resolutions. To empower employees with full productivity while still ensuring the security of corporate applications and data, IT needs a way to manage devices throughout their entire lifecycle. Applicationcha os Devicechaos Data chaos User experience Support Application management Access Data security Control Personal productivity
  • 4. 4 citrix.com Mobile workstyles | White Paper Application Chaos The ever-growing mix of mobile, SaaS and Windows applications within enterprises is creating application management and support chaos. With the need to manage all these applications through their entire lifecycle and across a much broader range of devices, challenges abound irrespective of the enterprise application strategy. Organizations embracing native mobile applications suffer from the inefficiencies of developing multiple versions for multiple platforms, as well as the security risks associated with distribution to unsecured devices. Adapting a large base of legacy desktop applications to be suitable for smaller, touch-driven interfaces operating over low-bandwidth, high-latency links is a time-consuming and risky proposition, as not all apps will work well in this new environment. Web applications present their own challenges, notably browser incompatibility and security. Personal apps that users download also present a risk as users may simply mishandle corporate data in these apps or have downloaded a malicious application onto the device. With so many options available, application sprawl is a real problem for IT in terms of manageability and updates as well as security. Current trends are heading away from centralized IT licensing of apps and towards the purchase of SaaS services by departments for line-of-business needs. This trend anticipates more situations where individual applications are brought into the enterprise as a result of BYOD. These trends will create a new wave of application sprawl if steps are not taken to deliver all app types via a unified infrastructure. Data Chaos The exponential growth of data in the cloud and on devices is creating data management and security chaos. Data chaos occurs at the intersection of access, control, and security. The enterprise needs to make its data available to users while controlling and securing distribution to protect its intellectual property and meet regulatory guidelines regarding user privacy and auditing requirements. The challenges of controlling and securing data arise from multiple, uncontrolled endpoint devices, poorly written and/or malicious applications and readily available consumer data-sharing applications. Also, when it comes to information security attacks, the biggest threats originate within the organization. These attacks are not necessarily malicious and may occur passively through poorly secured devices with no device PINs or data encryption and poor physical access protection. But, with the number of personal devices in the enterprises and cloud data services available, a fine-grained data policy that follows the users between devices becomes a necessity. Citrix enterprise mobility management Citrix offers a solution for controlling all three aspects of chaos with an end-to- end enterprise mobility management solution. XenMobile features mobile device management; mobile app management; sandboxed productivity apps; a unified corporate app store and multi-factor single sign-on.
  • 5. 5 citrix.com Mobile workstyles | White Paper Citrix XenMobile Citrix XenMobile is a comprehensive solution to manage mobile devices, apps, and data. Users have single-click access to all of their mobile, SaaS and Windows apps from a unified corporate app store, including seamlessly-integrated email, browser, data sharing and support apps. IT gains control over mobile devices with full configuration, security, provisioning and support capabilities. In addition, XenMobile securely delivers Worx Mobile Apps, mobile apps built for businesses using the Worx App SDK and found through the Worx App Gallery. With XenMobile, IT can meet their compliance and control needs while users get the freedom to experience work and life their way. XenMobile delivers the following key features: Configure, secure, provision and support mobile devices with MDM. XenMobile delivers enterprise grade MDM with role-based management, configuration, security and support for corporate and employee-owned devices. Users enroll their devices, enabling IT to provision policies and apps to those devices automatically, blacklist or whitelist apps, detect and protect against jailbroken devices, troubleshoot device and app issues, and wipe or selectively wipe a device that is lost, stolen or out of compliance. Users can use any device they choose, while IT can ensure compliance of corporate assets and secure corporate content on the device. Mobile app management with the largest ecosystem of apps built for business. XenMobile securely delivers Worx Mobile Apps, the industry’s largest collection of apps built for business. Developers leverage the Worx App SDK, a simple and powerful SDK that provides critical enterprise features into any app. The SDK leverages Citrix MDX app container technology to add features like data encryption, password authentication, secure lock and wipe, inter-app policies and micro VPNs to mobile apps. It comes with a library that can be embedded into any app with a single line of code. Developers can also opt to wrap their apps post- development without adding any code to their app. IT can find Worx-enabled apps in the Worx App Gallery and deliver these apps to devices via XenMobile. ISVs can use Worx App Gallery to promote their apps. Sandboxed email, browser and data sharing apps. With XenMobile, IT can deliver Citrix-developed apps that are built for business. These apps include WorxMail for secure email, calendar and contact access, WorxWeb for a secure internet and Intranet access and ShareFile for secure enterprise file synchronization and sharing. WorxMail, WorxWeb and ShareFile integration deliver a rich user experience with the management and control that IT requires. These apps take advantage of capabilities in the Citrix Worx App SDK such as an app-specific VPN for secure access and a common data platform that ensures corporate data is encrypted and always under IT control. Unified corporate app store. XenMobile includes a unified corporate app store that provides a single place for users to access all of their apps – mobile, web, SaaS, and Windows – on any device. Users can easily choose the apps they need for their job and have them instantly available on their devices. As they move among their favorite devices, their chosen apps follow them to ensure full productivity in any scenario.
  • 6. 6 citrix.com Mobile workstyles | White Paper Multi-factor single sign-on. XenMobile makes it easy for IT to manage user access and radically simplify the user experience. Through the unified corporate app store, users are given secure multi-factor single sign-on across their mobile, web and Windows apps ensuring that they don’t need to remember yet- another-password. Citrix Worx Home Citrix XenMobile Citrix ShareFile Enterprise Enterprise data Security Account control Provisioning Follow-me-data Access policies Any device, app & data Mobile devices Mobile apps Datacenter apps Web apps Windows apps Data Any device PC Mac Smartphone Tablet Thin client Figure 2: A complete enterprise mobility management solution Worx Home Available for any mobile device, Worx Home is an app that allows IT to enforce mobile settings and security while also providing access to a unified app store and live support services. XenMobile communicates with Worx Home to deliver device- specific policies and Worx-enabled app policies. ShareFile ShareFile underpins the data capabilities of XenMobile, giving users the ability to access and share their data from any device or location. ShareFile data is secured on mobile devices using remote data wipe and lock as well as device-based data access policies. In the following diagram, it is the “Data” component to the XenMobile App Controller. NetScaler Gateway NetScaler Gateway is a secure application and data access solution that provides administrators granular application and data-level control while empowering users with remote access from anywhere. It gives IT administrators a single point to manage access control and limit actions within sessions based on both user identity and the endpoint device, providing better application security, data protection, and compliance management.
  • 7. 7 citrix.com Mobile workstyles | White Paper Citrix XenMobile deployment model Figure 3: Citrix XenMobile Architecture XenMobile consists of three backend components: XenMobile App Controller, XenMobile Device Manager, and NetScaler Gateway. Together, these components address the challenges of device, application, and data chaos that enterprise IT faces from the consumerization of IT. Managing Devices The XenMobile Device Manager allows IT to manage devices throughout their entire lifecycle with enterprise MDM capabilities. These components allow IT to configure, provision, secure, support, monitor, and decommission any device— BYO or corporate-issued. Managing Applications XenMobile App Controller enables IT to ‘wrap’ any type of app and deliver it to employees through Worx Home, based on their role in an organization. Wrapped apps allow IT admins to place policies and controls over them, ensuring that corporate content stays safe and employees don’t inadvertently leak sensitive information. Citrix MDX technologies secure the apps that are delivered, allowing IT to apply security policies and encryption on application and data access. Managing Data XenMobile includes ShareFile, allowing IT admins to directly provision and manage ShareFile accounts through the App Controller interface. This provides employees instant access to their ShareFile Enterprise accounts, allowing them to securely access, edit, sync and share files from any device. Conclusion By resolving the device, application and data chaos created by consumerization, Citrix is enabling mobile workstyles for users while providing IT with control and
  • 8. citrix.com0613/PDF 8 Corporate Headquarters Fort Lauderdale, FL, USA Silicon Valley Headquarters Santa Clara, CA, USA EMEA Headquarters Schaffhausen, Switzerland India Development Center Bangalore, India Online Division Headquarters Santa Barbara, CA, USA Pacific Headquarters Hong Kong, China Latin America Headquarters Coral Gables, FL, USA UK Development Center Chalfont, United Kingdom Mobile workstyles | White Paper About Citrix Citrix (NASDAQ:CTXS) is the cloud company that enables mobile workstyles—empowering people to work and collaborate from anywhere, easily and securely. With market-leading solutions for mobility, desktop virtualization, cloud networking, cloud platforms, collaboration and data sharing, Citrix helps organizations achieve the speed and agility necessary to succeed in a mobile and dynamic world. Citrix products are in use at more than 260,000 organizations and by over 100 million users globally. Annual revenue in 2012 was $2.59 billion. Learn more at www.citrix.com. Copyright © 2013 Citrix Systems, Inc. All rights reserved. Citrix, XenMobile, NetScaler Gateway, Worx Home, WorxMail, WorxWeb and ShareFile are trademarks of Citrix Systems, Inc. and/or one of its subsidiaries, and may be registered in the U.S. and other countries. Other product and company names mentioned herein may be trademarks of their respective companies. management capabilities. XenMobile with Worx Home and ShareFile enables quick and effective access to the enterprise resources people need to stay productive on the go from any device, while supporting IT efficiency, information security and regulatory compliance.