Upgrade to Pro — share decks privately, control downloads, hide ads and more …

IT-puls Trondheim 2015 - Dropp sikkerheten - gi brukeren tilgang til alt fra mobilen! - CITRIX

EVRY
May 15, 2015
84

IT-puls Trondheim 2015 - Dropp sikkerheten - gi brukeren tilgang til alt fra mobilen! - CITRIX

Citrix, v/Trond Tømran, XenMobile

EVRY

May 15, 2015
Tweet

More Decks by EVRY

Transcript

  1. © 2014 Citrix. Confidential. Is there a way to make

    everybody happy? IT End Users Business Security Choice Productivity
  2. © 2014 Citrix. Confidential. EMM Enterprise Mobility Management Productivity and

    Collaboration Data Management App Management Device Management
  3. © 2014 Citrix. Confidential. Why Enterprise Mobility Management? Device and

    platform diversity Multiple Use Cases/Multiple Needs Enterprise-ready app availability Data security concerns End user privacy concerns Generational changes Workforce Mobility Flex-Work BYOD App Stores Mobile Workstyles Security & Compliance Business Continuity Next Gen Workplace s
  4. © 2014 Citrix. Confidential. 7 16% 22% 35% 42% Rogue

    App Rogue Service Rogue Purchase Personal Equipment Employees just want to be productive “Which of the following activities, if any, have you done in the past year in your job?” Shadow IT BYOD Forrester Research, Inc’s Business Technographics Workforce Employee Survey,
  5. © 2014 Citrix. Confidential. Feature rich MDM with freedom of

    choice Productivity and Collaboration Data Management App Management Device Management
  6. © 2014 Citrix. Confidential. XenMobile - MDM Mobile lifecycle management

    Start here Gain visibility to devices (BYOD or CL) Push policies (WiFi, VPN, Passcode etc.) Provision apps automatically Manage users through AD groups Monitor and manage compliance Notify users Support end-users remotely Remotely lock or selectively wipe Device agnostic – iOS, Android, Windows Phone
  7. © 2014 Citrix. Confidential. 10 Automated Device Compliance Passcode policy

    AD changes to user Jailbroken device Unmanaged device Data Roaming Geo-fencing App Blacklist App Whitelist Compliance Engine Initiate compliance actions based on a variety of triggers Lock device Modify policy set Block network access Selective wipe Full wipe Revoke Send notification Set out of compliance
  8. © 2014 Citrix. Confidential. Secure and manage mobile applications simply

    and easily Productivity and Collaboration Data Management App Management Device Management
  9. © 2014 Citrix. Confidential. “” Mobile security breaches are –

    and will continue to be – the result of misconfiguration and misuse (by the user) on an app level, rather than the outcome of deeply technical attacks on mobile devices Dionisio Zumerle Gartner, Principal Research Analyst, 2014 75% by 2017 App Security should be managed by IT Source: Gartner Press Release, May 29, 2014: http://www.gartner.com/newsroom/id/2753017
  10. © 2014 Citrix. Confidential. 15 • Secure app containers •

    Inter-app controls • On-demand micro VPN • Conditional access policies • App lock and wipe • SSO
  11. © 2014 Citrix. Confidential. EMM is more than just checking

    your email Productivity and Collaboration Data Management App Management Device Management
  12. © 2014 Citrix. Confidential. Ready for teams Ready for integration

    Ready for mobile A seamless end-user experience
  13. © 2014 Citrix. Confidential. Experience productivity through application integration Productivity

    and Collaboration Data Management App Management Device Management
  14. © 2014 Citrix. Confidential. 19 XenMobile – Worx Productivity Apps

    o Secure browser o Internal web access o URL BL/WL o Mail, calendar, contacts o Enterprise class o Better than native o Secure VDI like access to physical desktop o Access work files and apps o Offline content edit o Review , comment and collaborate on documents o Secure notes o Team notebooks o Email and calendar integration o Secure EFSS o Mobile content editing o SharePoint & network files
  15. © 2014 Citrix. Confidential. 20 Users Demand Instant access from

    any device File sharing with anyone Easy and familiar user experience IT Requires Security Control No data leakage ShareFile – Solve the “DropBox Problem”
  16. © 2014 Citrix. Confidential. 21 XenMobile – Worx Productivity Apps

    o Secure browser o Internal web access o URL BL/WL o Mail, calendar, contacts o Enterprise class o Better than native o Secure VDI like access to physical desktop o Access work files and apps o Offline content edit o Review , comment and collaborate on documents o Secure notes o Team notebooks o Email and calendar integration o Secure EFSS o Mobile content editing o SharePoint & network files
  17. © 2014 Citrix. Confidential. Enterprise Architecture XenMobile Enterprise DMZ Any

    App ISV NetScaler Gateway Worx App Controller Device Manager Storage Zone ShareFile Control Plane XD/XA
  18. © 2014 Citrix. Confidential. Mobile Device Management Sandboxed Mail and

    Web Mobile App Security Secure Mobile Data Sharing Mobile Network Control SSO and Identity Management Desktop and App Virtualization Collaboration Mobile Value-on-Investment Any app, any device, anywhere App Dev Tools GoToMeeting Podio NetScaler ShareFile XD SDK / App DNA XenMobile Complete Enterprise Mobility Management XD/XA Sandboxed Email & Web Mobile Device Management
  19. © 2014 Citrix. Confidential. XenMobile delivers the only complete mobile

    workspace Data Desktops Collaboration Apps Personal Productivity and Collaboration Data Management App Management Device Management