SlideShare uma empresa Scribd logo
1 de 32
Baixar para ler offline
Enterprise Mobility Management

Citrix Receiver & CloudGateway
WE BELIEVE…

• End users will win the battle of choice
• BYO will fundamentally transform IT
• Mobile = Heterogeneity
• Managing heterogeneity will create huge value




                                                  2
User choice is driving heterogeneity of devices & apps


    User
  Choice




Corporate
  Devices

            2000                         2012
                                                     3
Problems Solved by CloudGateway
    Enable BYO by provisioning IT services without
    managing/controlling devices




                                                     Mobilize and deliver all apps SaaS,
                                                     Intranet, HTML 5, native mobile and
                                                     Windows




    Secure corporate data by separating
    business from personal content


                                                                                           4
5
Mobile


  Web & HTML5



    Windows

                Follow-Me
      Data        Data


Gateway
services

                        6
CloudGateway
Features
Self-serve app store

Follow-me data with ShareFile

Secure mobile productivity

Mobile security and control with
MDX

Scenario-based access

Identity-based provisioning

                                   7
Access Your Apps and Desktops From
            Any Device




                                     8
File editing, sync, and share from
                 any mobile device
Follow-Me Data   Seamless experience for apps
                 and documents

                 Role-based access control

                 Remote wipe & lock


                                                      9
@WorkMail
    Native mobile mail, calendar, and contacts
        Attach and save docs to ShareFile
One touch access to internal sites with @WorkWeb
Calendar invites with GoToMeeting using free/busy
      Works with ActiveSync and Exchange
     Encrypted email, attachments, contacts
Available on iPhone, iPad, Android Phone & Tablet


                                                    10
@WorkWeb
   Full-featured consumer-like mobile browser
Simple access to internal sites such as SharePoint
Encrypted cache, bookmarks, cookies, and history
      Accessible from any MDX-enabled app
Available on iPhone, iPad, Android Phone & Tablet




                                                     11
Me@Work
                   mobile app family




@WorkWeb    @WorkMail         ShareFile   GoToMeeting         Podio
  Secure    Email, calendar   Follow-me     Integrated      Social Team
 Browsing     & contacts         Data      Collaboration   Collaboration



                                                                           12
Management, security, and control over native mobile and web apps




       MDX Vault                      MDX Access                        MDX Interapp
   Secure container that        Micro-VPN tunnel to corporate      Control app communications
   enables app and data          resources from mobile apps         with external apps, cloud,
 containment, wipe and lock   along with access control policies       clipboard & devices
                                                                                                 13
14
15
16
• Secure app containers
• Micro VPN
• Lock and wipe
• Inter-app controls
• Conditional access policies




                                17
Sample MDX Vault data protection settings


                   Disable Camera        
                   Disable Open-In       
                   Disable iCloud use    
                   Disable Copy/Paste    
                   Disable sending email 
                   Disable sending SMS 
                   Disable printing      
                   Restrict outbound URL 

                   Encrypt app and data 



                                             18
Provisioning a new hire



On-the-go



Employee status change
                          19
Provisioning
a New Hire
For IT

Adds employee to
Active Directory

Automatically assigns
new hire to job role

Apps are provisioned
based on identity


                        20
Provisioning
a New Hire
               For the end user



               Logs into Receiver’s self-
               serve app store

               Subscribes to apps

               Enterprise cloud storage
               immediately provisioned

                                            21
On-the-go
Access all apps and docs on
any device

Follow-Me Data with ShareFile

Mobile security and control
with MDX technologies




                              22
Scenario-based
controls


User authorization required
     Mobile device access
        Allow local storage
    Offline access allowed
 Restrict document sharing
           Printing allowed
                  Edit data



                              23
Employee Status
Change
Account disabled

App accounts & data access
instantly wiped

3rd party SaaS app licenses
instantly re-claimed for
replacement

                              24
Benefits for IT


• Enable BYO for productivity on any device

• Provide instant access to all business apps

• Deliver secure mobile email

• Mobilize any corporate app securely




                                                25
Seamless
integration
between work
and life



               26
27
Resources
                              Product overview
www.citrix.com/cloudgateway
                              Datasheet
                              “How to” guides
                              Solution Videos
                              Analyst Reports
                              Technology whitepapers




                                                       28
Building an enterprise mobility strategy with Citrix




      Assess                        Design                          Deploy
Assess your unified          Architect enterprise mobility   Start by delivering
storefront requirements:     strategy to easily extend       existing virtual desktops
•Apps to deliver?            your existing Citrix            and apps, then easily
•Devices used to access?     infrastructure to securely      extend it to include web
•Ability to share and sync   deliver all apps and data to    apps, SaaS apps, native
enterprise data?             any device                      mobile apps and
•Security requirements?                                      enterprise data.
                                                                                         29
Citrix Strategies for Mobilizing Enterprise Line of Business Apps

                                                               Existing LoB App
                                                               Existing LoB App




 Citrix Mobility Pack             Citrix Mobile App SDK        Mobilize C/S App                 Pure HTML5 //
                                                                                                 Pure HTML5
                                                                                                                               Native Mobile Apps
 Citrix Mobility Pack             Citrix Mobile App SDK        Mobilize C/S App                 Secure Browser                 Native Mobile Apps
                                                                                                Secure Browser
Virtualized Windows apps         Virtualized Windows apps   New HTML5 mobile web UI       Mobilize existing web apps or      Rewrite app to native iOS
mobilized ‘out-of-the-box’.      modified with mobile UI    leveraging core Windows or    rewrite app to HTML5 with full     (Objective-C) or Android (Java)
                                 through .NET code          Client/Server backend code    mobile web experience and UI.
                                                                                          Secure mobile browser container.




                        Virtualization                                             Mobile Web                                           Native


                                                                                                                                                    30
CloudGateway Deployment - Phased Adoption

                                                                  Citrix
                                                              CloudGateway
                                                                                               Mobile




                                                                                                    Web


                                                NetScaler                      AppController
                                             Access Gateway
                                                               Web Interface                            SaaS
Citrix Receiver
                                                                                                    FMD
                                                                                                  ShareFile
                                                                                Virtual
© 2012 Citrix | Confidential – Do Not Distribute                               Windows
CloudGateway Deployment - Phased Adoption
                                                                  Citrix
                                                              CloudGateway
                                                                                              Mobile




                                                                                                   Web


                                                NetScaler        StoreFront   AppController
                                             Access Gateway
                                                                                                       SaaS
Citrix Receiver
                                                                                                   FMD
                                                                                                 ShareFile
                                                                               Virtual
© 2012 Citrix | Confidential – Do Not Distribute                              Windows

Mais conteúdo relacionado

Mais procurados

Impact of cloud computing to Asian IT Industry
Impact of cloud computing  to Asian IT IndustryImpact of cloud computing  to Asian IT Industry
Impact of cloud computing to Asian IT IndustryThanachart Numnonda
 
Agile IT EMS webinar series, session 1
Agile IT EMS webinar series, session 1Agile IT EMS webinar series, session 1
Agile IT EMS webinar series, session 1AgileIT
 
Microsoft 365 Enterprise Security with E5 Overview
Microsoft 365 Enterprise Security with E5 OverviewMicrosoft 365 Enterprise Security with E5 Overview
Microsoft 365 Enterprise Security with E5 OverviewDavid J Rosenthal
 
Citrix Receiver: the road ahead
Citrix Receiver: the road aheadCitrix Receiver: the road ahead
Citrix Receiver: the road aheadCitrix
 
Introduction to IBM Cloud Private - April 2018
Introduction to IBM Cloud Private - April 2018Introduction to IBM Cloud Private - April 2018
Introduction to IBM Cloud Private - April 2018Michael Elder
 
Thoughts on Utility, Grid, on demand, cloud computing and appliances
Thoughts on Utility, Grid, on demand, cloud computing and appliancesThoughts on Utility, Grid, on demand, cloud computing and appliances
Thoughts on Utility, Grid, on demand, cloud computing and appliancesMark Cathcart
 
Citrix reference architecture for xen mobile 8 5_july2013
Citrix reference architecture for xen mobile 8 5_july2013Citrix reference architecture for xen mobile 8 5_july2013
Citrix reference architecture for xen mobile 8 5_july2013Nuno Alves
 
Integrating IBM Watson IoT Platform IBM Blockchain Lab
Integrating IBM Watson IoT Platform IBM Blockchain LabIntegrating IBM Watson IoT Platform IBM Blockchain Lab
Integrating IBM Watson IoT Platform IBM Blockchain LabRahul Gupta
 
Veriphyr bright talk 20120523
Veriphyr bright talk 20120523Veriphyr bright talk 20120523
Veriphyr bright talk 20120523Accenture
 
Microsoft in the Cloud: Making Migration Easy
Microsoft in the Cloud: Making Migration EasyMicrosoft in the Cloud: Making Migration Easy
Microsoft in the Cloud: Making Migration EasyTechSoup
 
VMworld 2013: Directions in VMware EUC & the Multi-Device, Virtual Workspace
VMworld 2013: Directions in VMware EUC & the Multi-Device, Virtual WorkspaceVMworld 2013: Directions in VMware EUC & the Multi-Device, Virtual Workspace
VMworld 2013: Directions in VMware EUC & the Multi-Device, Virtual WorkspaceVMworld
 
Extending The Enterprise With Office 365 & Azure for the Enterprise
Extending The Enterprise With Office 365 & Azure for the EnterpriseExtending The Enterprise With Office 365 & Azure for the Enterprise
Extending The Enterprise With Office 365 & Azure for the EnterpriseRichard Harbridge
 
Empower Your Organization with Microsoft Power Platform
Empower Your Organization with Microsoft Power PlatformEmpower Your Organization with Microsoft Power Platform
Empower Your Organization with Microsoft Power PlatformDavid J Rosenthal
 
M365 reinvinting digital environment for modern workplace nv
M365 reinvinting digital environment for modern workplace nvM365 reinvinting digital environment for modern workplace nv
M365 reinvinting digital environment for modern workplace nvAhmad Almarzouk
 
Portable Apps across IBM Kubernetes Service and IBM Cloud Private (#Think2019...
Portable Apps across IBM Kubernetes Service and IBM Cloud Private (#Think2019...Portable Apps across IBM Kubernetes Service and IBM Cloud Private (#Think2019...
Portable Apps across IBM Kubernetes Service and IBM Cloud Private (#Think2019...Michael Elder
 
How to use Microsoft Azure Virtual Desktop
How to use Microsoft Azure Virtual DesktopHow to use Microsoft Azure Virtual Desktop
How to use Microsoft Azure Virtual DesktopAbdulghani Alkhateeb
 
Extending Active Directory to Box for Seamless IT Management
Extending Active Directory to Box for Seamless IT ManagementExtending Active Directory to Box for Seamless IT Management
Extending Active Directory to Box for Seamless IT ManagementOkta-Inc
 
Concurrency Modern Workplace 2017
Concurrency Modern Workplace 2017Concurrency Modern Workplace 2017
Concurrency Modern Workplace 2017Jake Borzym
 

Mais procurados (20)

Impact of cloud computing to Asian IT Industry
Impact of cloud computing  to Asian IT IndustryImpact of cloud computing  to Asian IT Industry
Impact of cloud computing to Asian IT Industry
 
WinWire_azure_session
WinWire_azure_sessionWinWire_azure_session
WinWire_azure_session
 
Agile IT EMS webinar series, session 1
Agile IT EMS webinar series, session 1Agile IT EMS webinar series, session 1
Agile IT EMS webinar series, session 1
 
Microsoft 365 Enterprise Security with E5 Overview
Microsoft 365 Enterprise Security with E5 OverviewMicrosoft 365 Enterprise Security with E5 Overview
Microsoft 365 Enterprise Security with E5 Overview
 
Personal Cloud
Personal CloudPersonal Cloud
Personal Cloud
 
Citrix Receiver: the road ahead
Citrix Receiver: the road aheadCitrix Receiver: the road ahead
Citrix Receiver: the road ahead
 
Introduction to IBM Cloud Private - April 2018
Introduction to IBM Cloud Private - April 2018Introduction to IBM Cloud Private - April 2018
Introduction to IBM Cloud Private - April 2018
 
Thoughts on Utility, Grid, on demand, cloud computing and appliances
Thoughts on Utility, Grid, on demand, cloud computing and appliancesThoughts on Utility, Grid, on demand, cloud computing and appliances
Thoughts on Utility, Grid, on demand, cloud computing and appliances
 
Citrix reference architecture for xen mobile 8 5_july2013
Citrix reference architecture for xen mobile 8 5_july2013Citrix reference architecture for xen mobile 8 5_july2013
Citrix reference architecture for xen mobile 8 5_july2013
 
Integrating IBM Watson IoT Platform IBM Blockchain Lab
Integrating IBM Watson IoT Platform IBM Blockchain LabIntegrating IBM Watson IoT Platform IBM Blockchain Lab
Integrating IBM Watson IoT Platform IBM Blockchain Lab
 
Veriphyr bright talk 20120523
Veriphyr bright talk 20120523Veriphyr bright talk 20120523
Veriphyr bright talk 20120523
 
Microsoft in the Cloud: Making Migration Easy
Microsoft in the Cloud: Making Migration EasyMicrosoft in the Cloud: Making Migration Easy
Microsoft in the Cloud: Making Migration Easy
 
VMworld 2013: Directions in VMware EUC & the Multi-Device, Virtual Workspace
VMworld 2013: Directions in VMware EUC & the Multi-Device, Virtual WorkspaceVMworld 2013: Directions in VMware EUC & the Multi-Device, Virtual Workspace
VMworld 2013: Directions in VMware EUC & the Multi-Device, Virtual Workspace
 
Extending The Enterprise With Office 365 & Azure for the Enterprise
Extending The Enterprise With Office 365 & Azure for the EnterpriseExtending The Enterprise With Office 365 & Azure for the Enterprise
Extending The Enterprise With Office 365 & Azure for the Enterprise
 
Empower Your Organization with Microsoft Power Platform
Empower Your Organization with Microsoft Power PlatformEmpower Your Organization with Microsoft Power Platform
Empower Your Organization with Microsoft Power Platform
 
M365 reinvinting digital environment for modern workplace nv
M365 reinvinting digital environment for modern workplace nvM365 reinvinting digital environment for modern workplace nv
M365 reinvinting digital environment for modern workplace nv
 
Portable Apps across IBM Kubernetes Service and IBM Cloud Private (#Think2019...
Portable Apps across IBM Kubernetes Service and IBM Cloud Private (#Think2019...Portable Apps across IBM Kubernetes Service and IBM Cloud Private (#Think2019...
Portable Apps across IBM Kubernetes Service and IBM Cloud Private (#Think2019...
 
How to use Microsoft Azure Virtual Desktop
How to use Microsoft Azure Virtual DesktopHow to use Microsoft Azure Virtual Desktop
How to use Microsoft Azure Virtual Desktop
 
Extending Active Directory to Box for Seamless IT Management
Extending Active Directory to Box for Seamless IT ManagementExtending Active Directory to Box for Seamless IT Management
Extending Active Directory to Box for Seamless IT Management
 
Concurrency Modern Workplace 2017
Concurrency Modern Workplace 2017Concurrency Modern Workplace 2017
Concurrency Modern Workplace 2017
 

Semelhante a Enterprise mobility management customer presentation december scripted

Citrix synergy 2012 debrief
Citrix synergy 2012 debriefCitrix synergy 2012 debrief
Citrix synergy 2012 debriefJason Poyner
 
Executive Alliance Dallas - Accellion Presentation
Executive Alliance Dallas - Accellion PresentationExecutive Alliance Dallas - Accellion Presentation
Executive Alliance Dallas - Accellion PresentationProofpoint
 
Engaging Mobile Apps with IBM® Social Business Solutions and IBM Worklight
Engaging Mobile Apps with IBM® Social Business Solutions and IBM WorklightEngaging Mobile Apps with IBM® Social Business Solutions and IBM Worklight
Engaging Mobile Apps with IBM® Social Business Solutions and IBM WorklightDirk Nicol
 
UK Innovate 2012 mobile keynote
UK Innovate 2012 mobile keynoteUK Innovate 2012 mobile keynote
UK Innovate 2012 mobile keynoteLeigh Williamson
 
Citrix MDX Technologies Feature Brief
Citrix MDX Technologies Feature BriefCitrix MDX Technologies Feature Brief
Citrix MDX Technologies Feature BriefNuno Alves
 
Daniel künzli cloudgateway.next
Daniel künzli cloudgateway.nextDaniel künzli cloudgateway.next
Daniel künzli cloudgateway.nextDigicomp Academy AG
 
Securing Salesforce Mobile SDK Apps with Good Dynamics
Securing Salesforce Mobile SDK Apps with Good DynamicsSecuring Salesforce Mobile SDK Apps with Good Dynamics
Securing Salesforce Mobile SDK Apps with Good DynamicsHerve Danzelaud
 
Bluemix overview - UK WebSphere Integration User Group
Bluemix overview - UK WebSphere Integration User GroupBluemix overview - UK WebSphere Integration User Group
Bluemix overview - UK WebSphere Integration User GroupJon Marshall
 
D-DAY 2015 Hybrid Cloud IBM
D-DAY 2015 Hybrid Cloud IBMD-DAY 2015 Hybrid Cloud IBM
D-DAY 2015 Hybrid Cloud IBMDEVOPS D-DAY
 
Enable Secure Mobile & Cloud Collaboration
Enable Secure Mobile & Cloud CollaborationEnable Secure Mobile & Cloud Collaboration
Enable Secure Mobile & Cloud CollaborationProofpoint
 
(ISC)2 Secure Seattle 2013: Enable Secure and Mobile Cloud Collaboration
(ISC)2 Secure Seattle 2013: Enable Secure and Mobile Cloud Collaboration(ISC)2 Secure Seattle 2013: Enable Secure and Mobile Cloud Collaboration
(ISC)2 Secure Seattle 2013: Enable Secure and Mobile Cloud CollaborationProofpoint
 
Ibm mobile first protect (maas360)
Ibm mobile first protect (maas360)Ibm mobile first protect (maas360)
Ibm mobile first protect (maas360)gule mariam
 
Styr mobile enheder med Mobile Device Management, Martin Vittrup, IBM
Styr mobile enheder med Mobile Device Management, Martin Vittrup, IBMStyr mobile enheder med Mobile Device Management, Martin Vittrup, IBM
Styr mobile enheder med Mobile Device Management, Martin Vittrup, IBMIBM Danmark
 
Ibm fiberlink analyst presentation nov 13 final
Ibm fiberlink analyst presentation nov 13 finalIbm fiberlink analyst presentation nov 13 final
Ibm fiberlink analyst presentation nov 13 finalCleophas Kipruto
 
XenMobile Datasheet
XenMobile DatasheetXenMobile Datasheet
XenMobile DatasheetNuno Alves
 
Hybrid Cloud with IBM Bluemix, Docker and Open Stack
Hybrid Cloud with IBM Bluemix, Docker and Open StackHybrid Cloud with IBM Bluemix, Docker and Open Stack
Hybrid Cloud with IBM Bluemix, Docker and Open Stackgjuljo
 
IBM Announce Intent to Acquire Fiberlink Analyst Presentation
IBM Announce Intent to Acquire Fiberlink Analyst PresentationIBM Announce Intent to Acquire Fiberlink Analyst Presentation
IBM Announce Intent to Acquire Fiberlink Analyst PresentationRon Favali
 

Semelhante a Enterprise mobility management customer presentation december scripted (20)

Citrix synergy 2012 debrief
Citrix synergy 2012 debriefCitrix synergy 2012 debrief
Citrix synergy 2012 debrief
 
Executive Alliance Dallas - Accellion Presentation
Executive Alliance Dallas - Accellion PresentationExecutive Alliance Dallas - Accellion Presentation
Executive Alliance Dallas - Accellion Presentation
 
Engaging Mobile Apps with IBM® Social Business Solutions and IBM Worklight
Engaging Mobile Apps with IBM® Social Business Solutions and IBM WorklightEngaging Mobile Apps with IBM® Social Business Solutions and IBM Worklight
Engaging Mobile Apps with IBM® Social Business Solutions and IBM Worklight
 
UK Innovate 2012 mobile keynote
UK Innovate 2012 mobile keynoteUK Innovate 2012 mobile keynote
UK Innovate 2012 mobile keynote
 
Citrix MDX Technologies Feature Brief
Citrix MDX Technologies Feature BriefCitrix MDX Technologies Feature Brief
Citrix MDX Technologies Feature Brief
 
Daniel künzli cloudgateway.next
Daniel künzli cloudgateway.nextDaniel künzli cloudgateway.next
Daniel künzli cloudgateway.next
 
Securing Salesforce Mobile SDK Apps with Good Dynamics
Securing Salesforce Mobile SDK Apps with Good DynamicsSecuring Salesforce Mobile SDK Apps with Good Dynamics
Securing Salesforce Mobile SDK Apps with Good Dynamics
 
Bluemix overview - UK WebSphere Integration User Group
Bluemix overview - UK WebSphere Integration User GroupBluemix overview - UK WebSphere Integration User Group
Bluemix overview - UK WebSphere Integration User Group
 
D-DAY 2015 Hybrid Cloud IBM
D-DAY 2015 Hybrid Cloud IBMD-DAY 2015 Hybrid Cloud IBM
D-DAY 2015 Hybrid Cloud IBM
 
Enable Secure Mobile & Cloud Collaboration
Enable Secure Mobile & Cloud CollaborationEnable Secure Mobile & Cloud Collaboration
Enable Secure Mobile & Cloud Collaboration
 
(ISC)2 Secure Seattle 2013: Enable Secure and Mobile Cloud Collaboration
(ISC)2 Secure Seattle 2013: Enable Secure and Mobile Cloud Collaboration(ISC)2 Secure Seattle 2013: Enable Secure and Mobile Cloud Collaboration
(ISC)2 Secure Seattle 2013: Enable Secure and Mobile Cloud Collaboration
 
Ibm mobile first protect (maas360)
Ibm mobile first protect (maas360)Ibm mobile first protect (maas360)
Ibm mobile first protect (maas360)
 
IBM Worklight
IBM WorklightIBM Worklight
IBM Worklight
 
Citrix Workspace Suite
Citrix Workspace SuiteCitrix Workspace Suite
Citrix Workspace Suite
 
Styr mobile enheder med Mobile Device Management, Martin Vittrup, IBM
Styr mobile enheder med Mobile Device Management, Martin Vittrup, IBMStyr mobile enheder med Mobile Device Management, Martin Vittrup, IBM
Styr mobile enheder med Mobile Device Management, Martin Vittrup, IBM
 
Ibm fiberlink analyst presentation nov 13 final
Ibm fiberlink analyst presentation nov 13 finalIbm fiberlink analyst presentation nov 13 final
Ibm fiberlink analyst presentation nov 13 final
 
XenMobile Datasheet
XenMobile DatasheetXenMobile Datasheet
XenMobile Datasheet
 
Hybrid Cloud with IBM Bluemix, Docker and Open Stack
Hybrid Cloud with IBM Bluemix, Docker and Open StackHybrid Cloud with IBM Bluemix, Docker and Open Stack
Hybrid Cloud with IBM Bluemix, Docker and Open Stack
 
IBM Announce Intent to Acquire Fiberlink Analyst Presentation
IBM Announce Intent to Acquire Fiberlink Analyst PresentationIBM Announce Intent to Acquire Fiberlink Analyst Presentation
IBM Announce Intent to Acquire Fiberlink Analyst Presentation
 
IBM Bluemix
IBM BluemixIBM Bluemix
IBM Bluemix
 

Mais de Nuno Alves

E g innovations overview
E g innovations overviewE g innovations overview
E g innovations overviewNuno Alves
 
Citrix virtual desktop handbook (7x)
Citrix virtual desktop handbook (7x)Citrix virtual desktop handbook (7x)
Citrix virtual desktop handbook (7x)Nuno Alves
 
Citrix XenServer Design: Designing XenServer Network Configurations
Citrix XenServer Design:  Designing XenServer Network  ConfigurationsCitrix XenServer Design:  Designing XenServer Network  Configurations
Citrix XenServer Design: Designing XenServer Network ConfigurationsNuno Alves
 
Deploying the XenMobile 8.5 Solution
Deploying the XenMobile 8.5 SolutionDeploying the XenMobile 8.5 Solution
Deploying the XenMobile 8.5 SolutionNuno Alves
 
Cloudbridge video delivery
Cloudbridge video deliveryCloudbridge video delivery
Cloudbridge video deliveryNuno Alves
 
XenApp 6.5 - Event Log Messages
XenApp 6.5 - Event Log MessagesXenApp 6.5 - Event Log Messages
XenApp 6.5 - Event Log MessagesNuno Alves
 
Citrix cloud platform 4.2 data sheet
Citrix cloud platform 4.2 data sheetCitrix cloud platform 4.2 data sheet
Citrix cloud platform 4.2 data sheetNuno Alves
 
Cloud portal business manager product overview
Cloud portal business manager product overviewCloud portal business manager product overview
Cloud portal business manager product overviewNuno Alves
 
Reference architecture dir and es - final
Reference architecture   dir and es - finalReference architecture   dir and es - final
Reference architecture dir and es - finalNuno Alves
 
Provisioning server high_availability_considerations2
Provisioning server high_availability_considerations2Provisioning server high_availability_considerations2
Provisioning server high_availability_considerations2Nuno Alves
 
Xd planning guide - storage best practices
Xd   planning guide - storage best practicesXd   planning guide - storage best practices
Xd planning guide - storage best practicesNuno Alves
 
Introduction to storage technologies
Introduction to storage technologiesIntroduction to storage technologies
Introduction to storage technologiesNuno Alves
 
Xen server storage Overview
Xen server storage OverviewXen server storage Overview
Xen server storage OverviewNuno Alves
 
XenDesktop 7 Blueprint
XenDesktop 7 BlueprintXenDesktop 7 Blueprint
XenDesktop 7 BlueprintNuno Alves
 
Citrix virtual desktop handbook (5 x)
Citrix virtual desktop handbook (5 x)Citrix virtual desktop handbook (5 x)
Citrix virtual desktop handbook (5 x)Nuno Alves
 
New eBook! Citrix howto build an all star app desktop virtualization team
New eBook! Citrix howto build an all star app desktop virtualization teamNew eBook! Citrix howto build an all star app desktop virtualization team
New eBook! Citrix howto build an all star app desktop virtualization teamNuno Alves
 
Wp intelli cache_reduction_iops_xd5.6_fp1_xs6.1
Wp intelli cache_reduction_iops_xd5.6_fp1_xs6.1Wp intelli cache_reduction_iops_xd5.6_fp1_xs6.1
Wp intelli cache_reduction_iops_xd5.6_fp1_xs6.1Nuno Alves
 
Citrix Store front planning guide
Citrix Store front planning guideCitrix Store front planning guide
Citrix Store front planning guideNuno Alves
 
Microsoft by the Numbers
Microsoft by the NumbersMicrosoft by the Numbers
Microsoft by the NumbersNuno Alves
 
NetScaler Deployment Guide for XenDesktop7
NetScaler Deployment Guide for XenDesktop7NetScaler Deployment Guide for XenDesktop7
NetScaler Deployment Guide for XenDesktop7Nuno Alves
 

Mais de Nuno Alves (20)

E g innovations overview
E g innovations overviewE g innovations overview
E g innovations overview
 
Citrix virtual desktop handbook (7x)
Citrix virtual desktop handbook (7x)Citrix virtual desktop handbook (7x)
Citrix virtual desktop handbook (7x)
 
Citrix XenServer Design: Designing XenServer Network Configurations
Citrix XenServer Design:  Designing XenServer Network  ConfigurationsCitrix XenServer Design:  Designing XenServer Network  Configurations
Citrix XenServer Design: Designing XenServer Network Configurations
 
Deploying the XenMobile 8.5 Solution
Deploying the XenMobile 8.5 SolutionDeploying the XenMobile 8.5 Solution
Deploying the XenMobile 8.5 Solution
 
Cloudbridge video delivery
Cloudbridge video deliveryCloudbridge video delivery
Cloudbridge video delivery
 
XenApp 6.5 - Event Log Messages
XenApp 6.5 - Event Log MessagesXenApp 6.5 - Event Log Messages
XenApp 6.5 - Event Log Messages
 
Citrix cloud platform 4.2 data sheet
Citrix cloud platform 4.2 data sheetCitrix cloud platform 4.2 data sheet
Citrix cloud platform 4.2 data sheet
 
Cloud portal business manager product overview
Cloud portal business manager product overviewCloud portal business manager product overview
Cloud portal business manager product overview
 
Reference architecture dir and es - final
Reference architecture   dir and es - finalReference architecture   dir and es - final
Reference architecture dir and es - final
 
Provisioning server high_availability_considerations2
Provisioning server high_availability_considerations2Provisioning server high_availability_considerations2
Provisioning server high_availability_considerations2
 
Xd planning guide - storage best practices
Xd   planning guide - storage best practicesXd   planning guide - storage best practices
Xd planning guide - storage best practices
 
Introduction to storage technologies
Introduction to storage technologiesIntroduction to storage technologies
Introduction to storage technologies
 
Xen server storage Overview
Xen server storage OverviewXen server storage Overview
Xen server storage Overview
 
XenDesktop 7 Blueprint
XenDesktop 7 BlueprintXenDesktop 7 Blueprint
XenDesktop 7 Blueprint
 
Citrix virtual desktop handbook (5 x)
Citrix virtual desktop handbook (5 x)Citrix virtual desktop handbook (5 x)
Citrix virtual desktop handbook (5 x)
 
New eBook! Citrix howto build an all star app desktop virtualization team
New eBook! Citrix howto build an all star app desktop virtualization teamNew eBook! Citrix howto build an all star app desktop virtualization team
New eBook! Citrix howto build an all star app desktop virtualization team
 
Wp intelli cache_reduction_iops_xd5.6_fp1_xs6.1
Wp intelli cache_reduction_iops_xd5.6_fp1_xs6.1Wp intelli cache_reduction_iops_xd5.6_fp1_xs6.1
Wp intelli cache_reduction_iops_xd5.6_fp1_xs6.1
 
Citrix Store front planning guide
Citrix Store front planning guideCitrix Store front planning guide
Citrix Store front planning guide
 
Microsoft by the Numbers
Microsoft by the NumbersMicrosoft by the Numbers
Microsoft by the Numbers
 
NetScaler Deployment Guide for XenDesktop7
NetScaler Deployment Guide for XenDesktop7NetScaler Deployment Guide for XenDesktop7
NetScaler Deployment Guide for XenDesktop7
 

Enterprise mobility management customer presentation december scripted

  • 1. Enterprise Mobility Management Citrix Receiver & CloudGateway
  • 2. WE BELIEVE… • End users will win the battle of choice • BYO will fundamentally transform IT • Mobile = Heterogeneity • Managing heterogeneity will create huge value 2
  • 3. User choice is driving heterogeneity of devices & apps User Choice Corporate Devices 2000 2012 3
  • 4. Problems Solved by CloudGateway Enable BYO by provisioning IT services without managing/controlling devices Mobilize and deliver all apps SaaS, Intranet, HTML 5, native mobile and Windows Secure corporate data by separating business from personal content 4
  • 5. 5
  • 6. Mobile Web & HTML5 Windows Follow-Me Data Data Gateway services 6
  • 7. CloudGateway Features Self-serve app store Follow-me data with ShareFile Secure mobile productivity Mobile security and control with MDX Scenario-based access Identity-based provisioning 7
  • 8. Access Your Apps and Desktops From Any Device 8
  • 9. File editing, sync, and share from any mobile device Follow-Me Data Seamless experience for apps and documents Role-based access control Remote wipe & lock 9
  • 10. @WorkMail Native mobile mail, calendar, and contacts Attach and save docs to ShareFile One touch access to internal sites with @WorkWeb Calendar invites with GoToMeeting using free/busy Works with ActiveSync and Exchange Encrypted email, attachments, contacts Available on iPhone, iPad, Android Phone & Tablet 10
  • 11. @WorkWeb Full-featured consumer-like mobile browser Simple access to internal sites such as SharePoint Encrypted cache, bookmarks, cookies, and history Accessible from any MDX-enabled app Available on iPhone, iPad, Android Phone & Tablet 11
  • 12. Me@Work mobile app family @WorkWeb @WorkMail ShareFile GoToMeeting Podio Secure Email, calendar Follow-me Integrated Social Team Browsing & contacts Data Collaboration Collaboration 12
  • 13. Management, security, and control over native mobile and web apps MDX Vault MDX Access MDX Interapp Secure container that Micro-VPN tunnel to corporate Control app communications enables app and data resources from mobile apps with external apps, cloud, containment, wipe and lock along with access control policies clipboard & devices 13
  • 14. 14
  • 15. 15
  • 16. 16
  • 17. • Secure app containers • Micro VPN • Lock and wipe • Inter-app controls • Conditional access policies 17
  • 18. Sample MDX Vault data protection settings Disable Camera  Disable Open-In  Disable iCloud use  Disable Copy/Paste  Disable sending email  Disable sending SMS  Disable printing  Restrict outbound URL  Encrypt app and data  18
  • 19. Provisioning a new hire On-the-go Employee status change 19
  • 20. Provisioning a New Hire For IT Adds employee to Active Directory Automatically assigns new hire to job role Apps are provisioned based on identity 20
  • 21. Provisioning a New Hire For the end user Logs into Receiver’s self- serve app store Subscribes to apps Enterprise cloud storage immediately provisioned 21
  • 22. On-the-go Access all apps and docs on any device Follow-Me Data with ShareFile Mobile security and control with MDX technologies 22
  • 23. Scenario-based controls User authorization required Mobile device access Allow local storage Offline access allowed Restrict document sharing Printing allowed Edit data 23
  • 24. Employee Status Change Account disabled App accounts & data access instantly wiped 3rd party SaaS app licenses instantly re-claimed for replacement 24
  • 25. Benefits for IT • Enable BYO for productivity on any device • Provide instant access to all business apps • Deliver secure mobile email • Mobilize any corporate app securely 25
  • 27. 27
  • 28. Resources Product overview www.citrix.com/cloudgateway Datasheet “How to” guides Solution Videos Analyst Reports Technology whitepapers 28
  • 29. Building an enterprise mobility strategy with Citrix Assess Design Deploy Assess your unified Architect enterprise mobility Start by delivering storefront requirements: strategy to easily extend existing virtual desktops •Apps to deliver? your existing Citrix and apps, then easily •Devices used to access? infrastructure to securely extend it to include web •Ability to share and sync deliver all apps and data to apps, SaaS apps, native enterprise data? any device mobile apps and •Security requirements? enterprise data. 29
  • 30. Citrix Strategies for Mobilizing Enterprise Line of Business Apps Existing LoB App Existing LoB App Citrix Mobility Pack Citrix Mobile App SDK Mobilize C/S App Pure HTML5 // Pure HTML5 Native Mobile Apps Citrix Mobility Pack Citrix Mobile App SDK Mobilize C/S App Secure Browser Native Mobile Apps Secure Browser Virtualized Windows apps Virtualized Windows apps New HTML5 mobile web UI Mobilize existing web apps or Rewrite app to native iOS mobilized ‘out-of-the-box’. modified with mobile UI leveraging core Windows or rewrite app to HTML5 with full (Objective-C) or Android (Java) through .NET code Client/Server backend code mobile web experience and UI. Secure mobile browser container. Virtualization Mobile Web Native 30
  • 31. CloudGateway Deployment - Phased Adoption Citrix CloudGateway Mobile Web NetScaler AppController Access Gateway Web Interface SaaS Citrix Receiver FMD ShareFile Virtual © 2012 Citrix | Confidential – Do Not Distribute Windows
  • 32. CloudGateway Deployment - Phased Adoption Citrix CloudGateway Mobile Web NetScaler StoreFront AppController Access Gateway SaaS Citrix Receiver FMD ShareFile Virtual © 2012 Citrix | Confidential – Do Not Distribute Windows

Notas do Editor

  1. Welcome! My name is <name>, and I’m pleased that you have taken the time to be here today. The Bring Your Own (BYO) movement, the proliferation of cloud services and the increase in workshifting have made mobility the #2 priority among CIOs. But first, we should all understand the forces which have led organizations to adapt to a new reality…
  2. These are Citrix ’s core beliefs related to enterprise mobility, and we are receiving tremendous positive feedback from customers and analysts that we are on the right track with our thinking. We believe end users have pretty much won the battle over choosing their own devices, and IT must now adjust and transform their skills and processes to support an increasingly mobile BYO world. By definition mobility brings forward a great deal of heterogeneity in devices and apps. Heterogeneity drives complexity, and managing that complexity will create huge value for the organization. Let’s take a closer look at how we’ve gotten to this state…
  3. Let ’s start with a quick review of enterprise mobility. If you go back, we’ve been using mobile devices for awhile. First we used them for secure mobile e-mail – many of us were provided Blackberries for e-mail on the go, and that was great. Then came the new wave of smartphones – devices with huge capabilities far beyond mobile e-mail. And what did we do? We tried to apply the same rules to these rich, powerful devices – we literally chained them down with the same techniques we used in the Blackberry world rather than treating them as full-function work devices. The reality is those methods will not work in the new world of BYO. Today we know 70% of tablets will be owned and brought into the workplace by employees – old management methods will not work and will not be accepted by employees on their personal devices. Now it’s all about diversity of devices – a world in which BYO has to be planned in by design, NOT as an exception. While all this is happening with consumerization of devices, there is another trend that is making IT even more complex. That trend is around diversity of apps. The world used to just include Windows and browser-based apps with easy, predictable use case scenarios. That is no longer the case. We are now seeing more and more app heterogeneity. Apps are being written for mobile, for web, for HTML5, and of course still for Windows – and all of them need to be mobilized.
  4. With all that in mind, we designed and built CloudGateway to solve several core mobility issues relevant to IT teams in all industries: *Mobilize and deliver all apps, beyond just MS Windows (which Citrix has been king of providing for 20 years) to web, HTML5 and native mobile apps *Enable BYO by provisioning IT services without being concerned over managing the devices – IT can effectively be device agnostic, enabling users to be as productive on the go as they are in the office while maintaining security and control over their corporate content, which brings us to the final problem solved: *CloudGateway fully segregates the business content our customers care about from users ’ personal content – thus enabling customers to manage and control just the business content and not worry about anything else on the user’s chosen device.
  5. Customers achieve complete enterprise mobility management by deploying 2 Citrix products: Citrix Receiver is our universal end user computing client that allows us to deliver a beautiful, consistent user experience across all platforms – laptops, tablets, smartphones, etc. and all of the common operating systems such as iOS, Android, Windows and Mac. CloudGateway is Citrix ’s enterprise mobility management solution that securely delivers mobile, Web and Windows® apps and data to any device. It delivers enterprise mobility by empowering employees with a self-service enterprise app store that provides access to business apps and data, leveraging the consistent, rich user experience of Citrix Receiver™. CloudGateway also provides identity-based provisioning and control for all apps, data and devices, including employee-owned devices. These capabilities enable IT to protect enterprise apps and data with policy-based controls, such as restriction of application access to authorized users, automatic account de-provisioning for terminated employees and remote wipe for data and apps stored on lost devices.
  6. Here is the CloudGateway infrastructure we ’ve developed to deliver all of these core features. It ’s interesting to note that CloudGateway fully leverages the investments our customers have already made in XenDesktop and XenApp, which in CloudGateway language represent the ‘Windows’ content controller. Our customers leverage Receiver on any device to access XD/XA via an Enterprise App Store for XD/XA published resources, which today is likely Web Interface. Most of these customers are also using NetScaler Access Gateway as the ‘gateway’ service to allow secure remote access to the XD/XA app store. CloudGateway now adds many other content controllers to the existing infrastructure such as web, SaaS, native mobile, HTML5 and ShareFile data controllers. It ’s hard to guess what other types of apps/content will be developed in the future, but we’ve build CloudGateway as a fully extensible platform that can be easily enhanced/expanded with additional content controllers as needed. Finally, on the endpoint devices we have expanded Receiver ’s capabilities to include a secure mobile container for all apps and data – allowing full control including remote lock and wipe on demand in case users lose their devices or leave the organization. These capabilities even apply to locally installed native mobile apps – while the user sees them on their springboard alongside all their personal mobile apps, the business apps delivered via CloudGateway remain hooked into and fully controlled by Receiver.
  7. Self-serve app store. The CloudGateway enterprise app store gives users instant productivity from any device. User can easily self-select their mobile, web and Windows® apps from the corporate approved list and access these apps as they roam between devices. This app store provides IT with a single place to provision, manage and update apps so they no longer have to worry about manual application installations and updates for users . Follow-me data with ShareFile. CloudGateway with ShareFile Enterprise delivers the ultimate productivity for mobile users by providing access to the corporate data they need to get their job done. With this integration, users now have the ability to sync and share files securely from any device and can use their native mobile and virtualized apps to edit documents while they are on the go. Secure mobile productivity. CloudGateway includes two new native mobile productivity apps that leverage MDX security controls to better support mobile workers. @WorkMail is an email, calendar and contacts solution that enables users to attach documents to emails and save attachments back using ShareFile, open attachments and web links with a secure browser, and send calendar invites using the free/busy information of attendees, all while staying inside the MDX Vault where IT has full control. @WorkWeb is a full-featured browser that leverages MDX technologies, such as MDX Access to create a dedicated VPN tunnel for accessing a company ’s internal network and encryption for the browser cache, bookmarks, cookies and history to ensure that users can access all of their websites, including those with sensitive information. Mobile security and control with MDX . CloudGateway powered by MDX enables the management, security and control over web and native mobile applications, including iOS Android , and HTML5. With MDX, corporate apps reside in a secure container, completely separated from personal apps on the user ’s mobile device IT has comprehensive policy-based controls over the usage of corporate apps within the secure container, including the ability to remote lock and wipe. MDX also provides a secure mobile browser and application-specific VPN access to ensure that users have simple, one click access to their internal web, external SaaS and HTML5 mobile web applications. Scenario-based access. With CloudGateway, IT defines comprehensive access and control policies that use endpoint analysis and each user ’s defined ‘role’ to determine which apps and data to deliver and what level of access to content should be provided. By ensuring that the appropriate level of access to apps and data is granted for each scenario, these granular security controls support enforcement of corporate security policies and standards. Identity-based provisioning. CloudGateway leverages Microsoft® Active Directory® and other directory systems to provision, deliver and control how mobile, web and Windows® apps are used based on user identity and role. IT can instantly provision all of a user ’s applications, including ShareFile, as soon as the person is added to Active Directory. Conversely, when users leave the organization access is instantly eliminated and accounts are locked once their Active Directory account is disabled.  
  8. Intro: CloudGateway allows employees to access all their corporate resources on any device, from anywhere. Key Points: Receiver is a client that can be installed on all major platforms and can also be accessed from any web browser on your mobile device.
  9. Citrix ShareFile is an enterprise follow-me-data solution that enables IT to deliver a secure and robust service that meets the mobility and collaboration needs of all users. ShareFile empowers users to securely share files with anyone, and sync files across all of their devices. ShareFile also enables IT to deliver a managed service that meets corporate data policies and compliance requirements. With the integration between CloudGateway and ShareFile, users can easily access both apps and docs from the same unified workspace. IT can automatically provision and de-provision ShareFile accounts based on Active Directory identities and roles. Once accounts are created, IT can manage user access to corporate files in the same console as they manage their apps while allowing users to easily view, edit, sync and share files from any mobile device. Only Citrix ’s enterprise mobility management solution allows full editing capabilities on mobile devices by integrating virtualized apps with ShareFile – users can go beyond simple viewing and actually edit Microsoft docs on iPads or any other mobile device. If users lose devices or leave the organization IT has a single control point to remotely wipe all apps and data.- ensuring security and compliance.
  10. @WorkMail is a beautiful new native iOS and Android email, calendar and contacts app. Citrix @WorkMail integrates with other Me@Work apps and leverages the mobile app security features in CloudGateway through MDX technologies to offer secure productivity on the go. Users can attach docs to emails and save attachments back using ShareFile, open web links, including internal sites, with @WorkWeb, and send calendar invites with GoToMeeting using the free/busy information of attendees provided by @WorkMail all while staying inside the secure container on the mobile device. @WorkMail supports ActiveSync and Exchange and offers security features, such as encryption, for email, attachments and contacts.
  11. @WorkWeb is a full-featured consumer-like mobile browser for iOS and Android devices that enables simple, secure access to internal corporate web, external SaaS, and HTML5 web applications. @WorkWeb leverages MDX technologies, such as the MDX Access to create a dedicated VPN tunnel for accessing a company ’s internal network and encryption for the browser cache, bookmarks, cookies and history to ensure that users can access all of their websites, including those with sensitive information. @WorkWeb offers a seamless user experience in its integration with the Me@Work apps and other MDX-enabled apps to allow users to click on links, such as ‘mailto’ or GoToMeeting, and have the native apps open inside the secure container on the mobile device.
  12. People want and expect to be able to work when and where they need – and on the device of their choice. And it ’s up to IT teams to manage these increasingly unique and diverse work preferences. Businesses that enable mobile workstyles by embracing consumer devices, apps and computing experiences are Mobile Enterprises.  These businesses are better places to work, more resilient to planned or unplanned changes, and run at lower cost and grow at higher velocity. The Citrix Me@Work mobile app family addresses the key functions required to build a mobile enterprise, combining all the simplicity and user experience employees expect, with the security and control the business requires.  In addition to @WorkWeb and @WorkMail, Citrix ’s mobile app family includes ShareFile for secure data management as well as GoToMeeting and Podio for effective collaboration. All of these native mobile apps can easily be delivered to all types of mobile devices with CloudGateway.
  13. Citrix CloudGateway with MDX technologies enable the management, security and control over web and native mobile applications, including iOS, Android, and HTML5. New encryption and mobile DLP technologies have been added to fully secure web and native mobile apps and data. These technologies deliver new levels of security through policies that can encrypt native mobile applications and their associated data as well as provide granular data leak prevention policies that can disable camera, the “open-in” function, iCloud use, copy and paste commands, the sending of emails or SMS, and printing on an app by app basis. The three MDX technologies are Vault, Access, and Interapp. MDX Vault MDX Vault separates corporate mobile apps and data from personal apps on mobile devices in a secure business container. Using MDX Vault, IT is able to manage and control native mobile business apps and data instead of managing an employee’s device. The business apps in MDX Vault can be secured with encryption and mobile DLP technologies and can be remotely locked and wiped by IT. MDX Interapp MDX Interapp ensures that all MDX-enabled apps can interact with each other for a seamless experience. With MDX Interapp, MDX-enabled apps are integrated so that these apps only open other MDX-enabled apps, for example a link clicked in @WorkMail automatically opens @WorkWeb, not Safari. In addition, MDX Interapp controls the communications between apps so that IT can enforce policies around activities such as cut-and-paste between apps, for example allowing cut-and-paste between MDX-enabled apps but not to apps not protected by MDX, or by preventing use of a camera when using a specific MDX-enabled app. MDX Access MDX Access provides granular policy-based management and access controls over all native and HTML5 mobile apps. IT can centrally control and configure policies specific to mobile apps such as the type of device or network that is being used, the device passcode, or upon detection of a jail-broken device. MDX Access also provides the industry’s first application-specific VPN access into a company’s internal network. Using a micro VPN allows businesses to not require a device-wide VPN that can compromise security. Instead, an app-specific VPN tunnel gets created for the mobile and web apps accessing a company’s internal network remotely.
  14. Here is how MDX works. Users who leverage their personal mobile devices to do work end up with two ‘sides’ of their device if you will: the Life side and the Work side. The objective is to allow them to do whatever they want on the Life part of their device while completely securing and isolating the work side. It’s absolutely fine for the Work apps to share data and interact with each other, but you don’t want any communication between the Work apps and the Life apps.
  15. CloudGateway allows IT to manage and secure corporate/work apps while the employee still gets to use personal ones that are not affected or controlled, a separation of work and life. So the employee can still play Angry Birds while also having access to SalesForce on the phone. Apps secured with MDX can only talk with each other, outside or personal apps that aren ’t under IT’s control are completely separate from the work apps and data that is delivered via CloudGateway.
  16. Apps secured with MDX can only talk with each other, outside or personal apps that aren ’t under IT’s control are completely separate from the work apps and data that is delivered via CloudGateway.
  17. CloudGateway wraps each individual app with its own set of security and usage policies. Work apps are of course allowed to use Micro VPN to reach needed resource within the datacenter in a highly secure manner, and IT retains the right to lock and/or wipe Work apps and data if a security risk arises (e.g. the user left their smartphone in a taxi).
  18. Here are some of the MDX Vault settings that can be applied to MDX-enabled apps that have been wrapped with our App Preparation Tool and are delivered by corporate IT. Depending on the sensitivity level you can disable and restrict many different functions to prevent data from leaving the secure work container.
  19. Intro : Let ’s take a look at how CloudGateway really impacts the lives of both IT and end-users by reviewing some common everyday scenarios . The 3 scenarios we will review are frequent across all organizations in every industry. Key Points: A new hire begins work and needs to be provisioned by IT The new-hire goes on the road but still needs to do their job Employees change status, which then needs to propagate across the IT infrastructure and content (e.g. apps and data) Supporting Data and/or Stories: Transition: Let ’s start with what happens when a new-hire is provisioned with CloudGateway in place…
  20. Intro: Here is a common story of a new hire… Let ’s say Mark has just been hired as an account manager covering the East Coast.  Gordon the IT admin is responsible for getting Mark setup with his laptop and needs to give him access to all his apps and data that he’ll need. Key Points: Gordon: Adds Mark to the corporate directory (e.g. Active Directory) and based on his directory group Mark is automatically assigned to the sales role for the East Coast in CloudGateway.  As a member of the sales ‘role’ in CloudGateway, Mark automatically gets his account access provisioned to about a dozen apps, including Salesforce, AMEX for travel, GoToMeeting, Office, an internal expense reporting app connected to SAP, a sales tracking web app, ShareFile and a host of other apps available to the company. Supporting Data and/or Stories: Transition: So from an IT perspective it ’s easy – just add Mark to Active Directory and everything happens automatically. What does it feel like from Mark’s perspective?
  21. Intro: The new hire ’s experience is a great one… Key Points: On Mark ’s first day he simply logs into Receiver using the credentials provided by his manager, and he immediately sees the set of apps appropriate for him in his job role. Mark can then select the specific apps he wants on his screen whenever he logs in, and also has immediate access to the correct cloud-based data that pertains to his team. Compare this to what may happen without CloudGateway – users may search for hours trying to find apps that haven ’t been installed on their PC or laptop as part of the ‘standard corporate image’ and probably end up calling the help desk after experiencing immense frustration about not being productive at all in ramping up. It may take several days of frustration and multiple help desk calls before they get access to all of their apps and data to be fully productive. Supporting Data and/or Stories: Transition: Now let ’s see how CloudGateway benefits both IT and users when faced with mobile scenarios.
  22. Intro: On Day 7 our new hire is on the road. Mark is traveling with just his iPad and iPhone – the laptop is too cumbersome.  Key Points: Before he leaves, he downloads Citrix receiver for both devices. IT already told Mark that he could download Receiver on any of his personal devices and still have access to his apps and data. At the same time, IT has the ability to limit Mark ’s access from personal, untrusted devices if desired to protect sensitive corporate data.
  23. Intro: With Citrix CloudGateway IT can easily enforce corporate-defined security policies. Key Points: When Mark is in the office on his corporate laptop he has full access to all of his apps and data. When he goes outside the secure corporate network and uses his personal devices he still sees the app store but:   He notices that his sales reporting app has restricted access to data while he ’s out in the field and that his ShareFile account doesn’t have access to large files while he’s out. So both users and IT are able to do their jobs regardless of the device, location and network with SmartAccess Policy Controls are in place. Supporting Data and/or Stories: Transition: Now let ’s take a look at how CloudGateway makes employee status changes much easier to manage and reduces risk when employees leave.
  24. Intro: If an employee leaves CloudGateway automates and expedites much of this typically manual process. Key Points: IT immediately disables Active Directory account, and when that happens CloudGateway automatically disables his access to corporate apps and data – even to 3 rd party hosted SaaS services. Supporting Data and/or Stories: We ’ve spoken with several clients in financial and healthcare organizations who have had issues in the past when nobody remembered to disable accounts with 3 rd party SaaS apps such as Salesforce.com – the terminated employee in one case leveraged their administrator-level account to create accounts for his entire new organization – costing the former employer hundreds of thousands of dollars before somebody noticed the rogue charges. Transition: With CloudGateway there is no direct access from the internet – users must authenticate into the corporate directory before they can access any app – whether virtual, web, mobile or SaaS.
  25. Intro: The benefits of CloudGateway for IT are compelling… Key Points: Four of the top benefits that IT managers tell us they want today are simplicity, flexibility, control and agility. With CloudGateway, IT is simpler because there is a single point of delivery and control across all apps, data and devices. Apps and data are protected, with security controls that take into account key context areas such as role, device, location and network. And, because IT can instantly provision and de-provision apps and data, you can stay ahead of changes in people, roles and responsibilities. Supporting Data and/or Stories: Transition:
  26. Citrix CloudGateway is our enterprise mobility solution that allows for a seamless integration between work and life. Letting employees work from anywhere, using the device of their choice.
  27. The growth of mobile devices and cloud apps is leading IT to build siloed solutions that are expensive and complex. We've created Citrix CloudGateway with the industry leading enterprise app store to give end users the mobility and flexibility they crave while providing IT with the security and control they need.
  28. To summarize the business rationale—we’ve found that it is best to embrace consumerization rather than fight it. By empowering employees, providing security and simplifying IT, organizations are able to achieve several important business goals simultaneously.
  29. Which devices will you support? Which users will have access? Who are your key stakeholders? How will you get buy-in? What will your policies/guidelines be? What technologies will you use?
  30. This is an optional slide to be used when customers are looking for direction on how to mobilize their infrastructure. The goal is to show that with Citrix, there are several options for ‘going mobile’ with existing applications.