Experienced Technology professional with over 15 years of experience in Marketing, Market research, competitive intelligence, Presales, Product roadmap, Product launch and customer engagement. My Experience spans across Cloud Security, Cloud architecture, Internet of Things, Enterprise Mobility and Workspace servicesView the profile
About the talk
Currently, organizations are tasked with Windows 10 migration, Office 365 adoption and securing the numerous endpoints in their environment: mobile, laptops, desktops and IoT. In this session we will explore these use cases to learn how Citrix Endpoint Management (CEM) adds value to the overall Citrix Workspace to help solve top pain points. Learn why customers choose Citrix Endpoint Management as part of the Citrix Workspace.Note: This session will be available for on-demand viewing post-event on Citrix Synergy TV.
Good afternoon, and one of the first actions of this afternoon, thank you for coming out. I hope you had a good lunch. So is my name is on the deed not seen you for a marketing manager and join with your own LeBron. Yeah, my name is showing a senior product marketing manager for Citrix. I started at Citrix five years ago as a sales engineer for mobility and we have one Oak one of our customers and very thankful to him to join us some states today and I will have a nice chat with him as we conclude some of our presentation. So if you don't ask
questions will get to heaven ball quickly. All right. I'll let you join. So first thing supposed to be the the whole non-disclosure agreement. I had to show it so Yeah, I wanted to set the team up like you don't like things how things have changed. So like, you know a long time ago. We just had the you know, if the workspace what's your PCS and the species where where where we would live in which laptops and desktops and then some regular good old Windows 7 on
our Windows version, which I don't remember because I've never used any so all those be used all of those and that was our work space and then you know things changed. What does PC, you know, which the local install apps that we started our day that changed and came the browser-based apps you started having a lot of apps that wear Foundation started moving to the cloud. They were some apps that worsen. You know, he wouldn't run it app, but that bass. Became popular and the qualification. Do you know started? And before you knew they were too many of those to manage
& Final deal was with the Office 365 apps and even the Windows 10 moving to the cloud and now your PC is no longer the center of your work space cuz you got content as well as your identity as well as your apps everything on the cloud and not just plowed its hybrid. So you're all sorts of security and user experience and and visibility controls that you have put into your data center no longer hold as effective because a lot of the things you don't have visibility on now because a lot of disjointed apps living in different
places. So too. That sounds really complex. Only sizing of applications users laptops. How will the tickets workspace? How about yeah, that's that's a good sign way into what I wanted to talk about. Is that these Point products stock from like if you have to manage all sorts on a different devices there are these MDM Solutions out there. If you want to get a look at the identity identity providers out their productivity apps for writers out their application delivery on the network as well. As you know application
delivery and and security on the cloud to secure web gateways to tons of solutions out there which may or may not talk to each other and that causes complexity. So, you know in the business of delivering apps and fixing this, you know complexity but with complexity there are additional challenges challenges to the tune of rising. I see complexity. I'll just leave now. You have to manage a lot of things on Prime and Cloud Rising complexity more time spent just to keep the lights on and increasing business risks as well.
But the user experience doesn't improve because now we have to remember so many logins way to go to this app way to go to that app can help with the help of Puppets workspace Civics networking and analytics the oil type together and we'll walk you through how but I know this session is for how u e m can help and how you William is as part of the workspace can help you deliver that experience and I just typing degraded with Citrix workspace. Do we know all these modules space but within this We believe that the fox won't like vdi that you guys have been using the networking the next
Gaylord Citrus ABC there be using for sometime Access Control analytics content collaboration. You've been using all those Yu-Gi-Oh you believe is also one of the important modules off lifx work space and now we'll dig into how you know a little bit more into how you Liam can be of help to us. Today is David believe that you know, 80% off the main a Fortune 500 companies that actually in the middle of their Office 365 migration still up because of that. They have it a d on Prime video on the cloud and the hybrid mode tons of issues 70% of the Fortune 500 are
also still rolling out windows 10. We haven't completed that project yet. What the population of these mobile devices what kind of don't talk about enough is that these mobile uses are vulnerable they are they are including me I click on more links when I'm on phone, but I'm more cautious on my computer and traffic is really driving the internet Group B. Look at lot of YouTube lot of Netflix a lot of corporate information through our mobile phones in organizations are allowing BYO. This is obviously a phenomenal Denzel
recognized and the number of attacks because the Bad actors also recognize that this is how the traffic is moving. The number of attacks on mobile users are also going in terms of fishing lure or ransomware attacks. This is a recipe for the perfect disaster. If you don't, you know, kill it where it is starting. Yeah, I love makes the case very clearly on how we will provide additional value to the work space. So we talked about how this adds value to the word spatial. Now. Let's have a look which three problems. Our customers are
currently facing and I T has to wear as you sow so one of the biggest Office 365 and using mobility and Apple apps and data codification comes as a good second and third toe Office 365 is not like any other regular Cloud application that we have. So for example, if you have work day or another Cloud application uses will actions the Nativity to the cloud and using the few times a day or a few times a week. But Office 365 is maintaining the number one productivity app that uses hand. So you need to solve the migration to the clouds.
Are you need to do simple assault allegation to get Better using speakers and a mom won't come back to that later on a little bit and you need to secure all y'all corporate State and of course you need to find the balance beams between security and the XP for using so I'm used Mobility. Mobility Drive, mostly by the choice that you just have home devices every user the science which divides he wants you which device he's familiar and securing a management management of the Apes and phones become more and more important in that work space where
corporate data and Prime today that lives next to each other. So she is definitely a thing you need to do. When you go to the modern workplace and security and privacy concerns as I mentioned before needs to be in Balance to provide the back on you use Experian data loss and leakage prevention is of course, one of the things that Union can solve for you in that and you were faced. I don't forget the clouds have strong applications and there is no perimeter to God live everywhere and it's basically just a place where the user
can do his job at PC is no longer the center. Abuse and nothing outfits ability and one place to manage and launch will provide the single Sand Island Access and Security in that action clouds. datapower navigation Thanks. So what do customers missed out by not solving this three items we just talked about you going to pull you was a busy. If you don't provide single sign-on do that new workspace because you need to go into all kinds of Management console to get the same result as you can
do get Whitson workspace currently and you have a lower security posture for all the devices identities applications and data you use in the closet. If you don't do that, you'll probably will be ending up being under attack and devices and users will be compromised. Don't take it another step forward if we look at the pillars of the Citrix workspace and we touched a few of them already. One of them is security one of them is experienced. I want to see Joyce guys into a little bit more on security and I'm on will guide us to the
experience and choice security starts at the endpoint. So device encryption of all the endpoint you have iOS Android Mac OS windows and all the other shoe 10 points that book Common Place needs to be encrypted on the device level. One point management oldies capabilities in the number. One of them as an example is the Windows 10 BitLocker a policy that provides and delivery apps on the iPhone activity on top of them later on. App for Mac. Of course, we have to
five hole policy. And next to security policy what the foul pole and the BitLocker policies. Now, we also provide a lot of user experience policies and think about users that are rolled several offices with several Wi-Fi access points and set the certificates are in place. You don't want to use it to do that manually. So we provide Wi-Fi policy to make the user experience better. And that's the same goes for 3 p.m. Policies or corporate applications that need to be configured. Soda citric
and Pain Management solution also provides corporations with the ability to wrap down line of business applications and we developed a cloud service for. That's cold or MDX service and that will make you available to wrap the line of business applications. We don't MDX policy on two kids and it will give you several levels of security. So micro VPN is one of them and Christian is one of them and about 65, I guess 65 policies to control your applications.
So then it's no Mac or other two you need to be used by the atlas trailer is all in the closet. So very easy and quickly to do on the other hand. If you have developers in your organization that developed in-house applications for on your we have an advocate available and I'm bored at a c k in his development process and he will get the same capabilities NBA 2K so. Much earlier in the development stage of the application that our technology can be on board. Additional to that. We also support and
comfort Community Comfort is a community-driven initiative by all vendors to provide OS level security. So MD MSU require and you can set all these type of conversations for your application. So keep value pair is sent from the same service to the business application that is compatible with the accountant and will provide you with similar functionality. Smart access so we talked about devices we talked about at the patience and we talked about security and now we want to talk about
how you provide some smart access to those applications. And in this case, it's specific to our traditional HDX applications. So secure home or workplace that will a human rights also your fertile apps and desktops what you want to make sure that a given user access those ATX applications that your device is compliance with small boxes and the integration between between Seahawks and 49ers win them stole from you can provide that compliance in check. So if a device is not complying to user is not allowed. Do I start an ACH application?
next to them you want of course, all the data points I can have From your end phone from your user from your application from your network. You want them to be in the central place? And therefore we have citric analytics and management part of the Citrix workspace will feed into safe mode analytics. Phil ultimate actions can be sent into the citric analytics system to execute on specific variables of Grace that you are. So what Citrix and Pain Management also has his own actions available to
use a property's device properties that are available for the administrator to set the control. So think of Alexa Station Service the safety net integration of Samsung and all other Integrations. Important application security at connectivity analytics quickly on how we can provide Ohio level unsecured with all the rides Prudential Insurance Drive conventional. It's just another external identity of trust and that can be implemented on Chapel twice. But at least if a child support in the seat and
the entro variables of that Mike Rudy experience. Thank you. So so we talked about like how Citrix endpoint management, you know is well connected with the Citrix workspace and a few things that the add value or are they are integrated on the security front. So I'm going to walk you through on the experience and of the things the first video I want to play on the integration of the enrollment workflow between Civics in point Management in Citrix workspace. The idea is that if you have a set of books
based, which is the new Citrix Receiver out if you have the Citrix workspace app and you want to actually installed mobile apps on that and say want to get single sign-on on to those apps that requires MDM we can do single sign-on without MDM. So what's the distal enable? Is that why are that's Citrix workspace app you will be Walkthrough of workflow to actually download secure Hub and then get single sign-on on two works or to the secure Hub, which is the anchor of the agent app of office, its endpoint management and vaya. Get access
to secure mail sharefile all of the Celtics apps and even other third-party apps and you can get single sign-on to all of those if you so choose. So hair is the wheel. So as you see you can just launching Citrix workspace app. Going to sing. I'm going to sign in with the first E10 of discovery. Username password can set up multi factual or touch ID in this case. Now I'm inside my workspace and I look at the apps that are assigned to me. I see a couple of mobile apps want to
pause here the prompt that you see it says to access mobile apps and roll into secure Hub rolling to secure Hub. It doesn't mean that you would now be left alone and you have to like get another app from the App Store find out what should be the credentials none of that. So the experience hairless. B will actually give you a single sign-on on to this app. All you have to do. Is there certain problems like on iOS that we cannot take away the user need to click on as soon as you click on those like yes, I want this. Yes. I want the Scooby walk to the single sign-on off.
Secure Hub flip to secure Hub. The credentials are passed on you can just click continue and your device and rolls. And how you see the app secure mail and secure web as well share files that can come down to the device and you can get single sign-on to those as well if you would like. No, this was the workspace app and Roland going to move forward and you want to talk about the integration with into so so as to not protection container, which has all the Office 365 apps. Now this is the
if you have to run our apps in this internet protection container, that means we have to actually in bed this into an SDK into our apps. The idea is that all these apps can work seamlessly with cut copy paste allowed between those now. The other thing is that if you are an engine customer and you want to be able to access intranet or be able to wrap your line of business apps, but still get the micro Bebe incapability, which is by the bay exclusive to Citrix you really need to do that. Then there is an available to embed the Citrix micro VPN the same Michael VPN
into the the Microsoft apps. It was already embedded today with the InTune browser, but you can also rap 3rd party line of business apps that you may have and use the same SDK. So this is another partnership that we have and again to enhance the experience that if you're using Office 365 app on your mobile phones iOS or Android you able to seamlessly move data. And by the way this kind of Integrations already exists on Windows 10, so the windows information protection kind of makes that possible and the integration I just showed you is on IOS and Android and the some of
the pieces of these indications are still exclusive. Moving forward I want to talk a little bit about secure mail. And as we all know that you know email app is the anchor app for a lot of our productivity, you know, it drives a productivity and a lot of work clothes are enabled through Gmail app. So here's a screen that shows you how you know, you get seeds from your manager or Michael. Imagine if you don't like it, it's like I'm checking my email but this is a meals that are coming from my manager or you know, some important meeting invites for the dates like the highlight of
my day today. The other thing we added recently as being able to see the organization structure. So if I want to see if I want to check out on my mobile phone that you know his my colleague who are his peers. What is the reporting hierarchy? We only have to login to Outlook and look into best today. We can just simply open secure mail app, you know tab on the organization top and play. Can I just you can see that you can see You know my manager my direct reports my peers and you can do that for anyone in the organization. If you lost one of my favorites is my
oldest friend. I have to send pictures of sit at the attached multiple attachments. My challenge was that you know, I look into The Gallery at find the picture I need to attach and then after passing one, it will take me back and have to repeat it. So now I can attach all the ones that I want to attach with a single tap and it will attach multiple attachments in one ago, and I don't have to go back and just a small little enhancement but it really helps in driving the use of productivity and basically clubs my urge to like delay my working go back to the desktop and
and start my work flow from there. I can pretty much do everything now that I would have to do on a computer. The last piece of the secure my love you very very excited to talk about its focus in box of focused inbox is like an intelligent and box it is categorizing your emails in a focused as well as other category to view insecure male. It is not changing anything in Outlook for you, but it is the view which is available across all your devices that you have to cure male set up on once you categorize the emails and you don't like one of these catherization you can simply tap on the
email and say they hate I want to move it to the other because this is not as important to me and we will ask you a question to secure Melville ask you a question that why do you think this should be moved from other to stay focused because is it because of the sender or because of the subject or because of the content. So the idea is that I be when I say we eat the secure mail running on your device. This is the day that doesn't get shared with us. This is the device level capabilities. This is not being shared with Citrix like this is on the device. Secure mail for you, and
this is just learning. So this there are algorithms and built into it and them to learn from the user behavior. Is it different for every user to the classifications of the similar emails depending upon the user experience will look different for everyone. And if you don't like it, if it's too annoying you can switch it off as well. All right, last piece on the extreme side is around single sign-on for your which lapse in desktop. So smart accident that occurred devices compliant. You can get access
onto your which Latin desktops. Here's how that access is enabled also through single sign-on. So really it one place on your mobile device. If you have secure Hub installed and you want to launch your witch laughing that stop you have not yet moved to the workspace or Cloud experience. You can experience this thing the single sign-on capability today. Actually, this is the most exciting looks like I have around mobile SSL. So when I say move on mobile single sign-on to Native mobile apps by Bob saw stops in
front of apps hidden example of actually a Cloud app Slack. Play it's alright, so it has a tap on the app and asked me to install says you can see this app is actually not installed on the device yet getting installed. You can see the slack. I'm over here getting installed. As a topic open it will do the last me to enter the you know, the realm or the tenant the reason it is asking right now. Is that going to be running or when this is like this will not ask for this.
It was simply as that. Do you want to sample login and you will get a single sign-on onto this sign in get off these notifications and. Perfect. Hey goes my Slack Key show on the Publix store apps is actually the most trickiest piece Augustine. We have been doing the access to your intranet your car when off Bobby's single sign-on all sorts of samples all games for a long time. But this is new this is brand new just came out coming out. All right to the last pillar of Citrix workspace and how citizen pain
management is deeply tied into it is the choice so we offer the choice of multiple platforms. So all sorts of iOS Android Linux, you know chrome tv OS Mac OS you name it even Alexa for business we support it. In terms of what kind of devices you bring now we talked about the BYOB in organizations allow all sorts of different devices mobile phones tablets different form-factors different kind of ownership you support all of those. We also have a lot of security Partners so we know that
you know specifics Is Not the Only Solution you guys use and we try to integrate today with you know, if you already heard on the states David talking about being a different identity Integrations Cloud hosting Spain Google identity identity you already support Azure from the security part of Sam. We support one there a semantics and Last Tango in Paris from the mobile truck defense side as well as telephone expense. And the idea is that we want all four unified experience on of all your apps and desktops and we will be mobile app
no matter which kind of apple desktop as well as your files at one place where it is not just an aggregation, but it's actually a place where will gets done. So you get the you saw the you know, the keynote today talking about feeds and pasta notification. That is uniform across all platforms. And similarly unified admin experience to Citrix Cloud. You don't actually have to have all your booklets in the cloud. You just you can use file Citrix Cloud today as a control plane without moving all your workloads to the cloud. And this is simply a summary, you know, it's nice chart
of all we discussed today on the security experience in choice. And I'm very excited today to talk about Josh and 100. Welcome. Thanks for having me. Thanks. Everyone gets to see you and you're not kidding behind. All right. How are you doing today. I'm doing alright. Alright. Okay. So we're in the energy industry in Oklahoma are Midstream company that transmits natural gas through pipelines. Basically North Country all the way down to the Gulf of Mexico
the mobile certain point management and Cedric files environment as well as other areas of Citrix. We got a Zen out an appointment with xendesktop. We will use just about every such a product. Wow. Wow, that's great. That's great. So tell us how it fits into your space sure. So Are you a young Journey started with a business your business shoes are bringing a mobile app to us and asking how do we get this to our people? So we started you know, investigating that we already had a strong partnership with
Citrix. And so we began deploying as what started out as a POC and then we built out uem what that turned into is about 3000 Corporate iPads. We've now got up to about 20 custom maps and I'm as well as some Public public store apps that we deploy as well. And and today that that accounts for about two-thirds of our company uses the mobile platform to to do that work. Wow. Wow in general or play other things that you want to share with us. Xenmobile was one piece of RR full client strategy.
Our team is is focused on making the end-user experience really really good and and we had actually you know how to present from is an app for well over a decade that would be presenting those published applications was with our core, you know core utilization of Citrix after we finish our Windows 7 upgrade roll, you know several years ago. We sat down and did a post-mortem and talked about what our big challenges were and are most of our challenges. We're maintaining the user profile essentially. They are there data other settings and
also being able to install their applications on their new operating system. So five five years ago or so. We we made a decision that we weren't going to let that happen when the next operating system rollout took place. So we actually started working with Citrix looking at all the products and the things we had access to we started basically making it Ready to decouple the user from all the components of that experience. So we've been working to to build our application catalog through through through publishing apps are using a CC on for a traditional installs.
We also took our user data and behind-the-scenes that a local folder redirect into their share. Share file account so that if they're hard drive dies or they move to a new computer is in their data follows them do the same thing with the profile management is basically got to the point where now I can walk up to any device that I choose and most of if not all of my stuff is right there ready to go or we'll be within just a short. Of time fishing about David and barking up on the morning management Jenny as well
soon for for Windows 10 and and that excites 10 Caswell there any any Round that. Yes, absolutely. So so right now we're at we're pretty mature and are iOS management. We've also enabled our users to use Android for their personal devices in our store. But we're we're actively looking at modern management for Windows 10 and doing the testing right now as we speak it work cited about that the benefits that we get from changing the way that we image are our devices today every computer lands in one place in our
headquarters and someone manages it images it and then it shipped out to the end user and it works out about the the potential of using autopilot and you know in tandem with with um to not to forget that you can get the user's devices out to him sooner. That's great. Do you have this this is where you Lightning Thief. Do you have any like why some words of wisdom to out that that you've been with Citrix using different products as well as with certain point. You know, I've really got to want one is stay close to your to your sales engineer and we are
ourselves Engineers have have been critical and helping us understand the capabilities and pain in the right direction. The other is to to identify those key stakeholders in in the business. We we've identified those outside of our team with an it as well as Business Leaders throughout the company across multiple practices, you know that are very very diverse group of people and and we actively go to them on a regular basis asking for feedback. I'm at a place where I'm a few tears removed from the everyday phone calls when people have problems. So that's having
having those key people is a good way for me to get direct feedback. Critical feedback to know if if things are going well, or if they're not awesome. Awesome. That's great. Thank you so much, and that's all the content. We had would be like you still have a bunch of time you're happy to take questions and and, you know a diving to like, I've never had this much time left in my sessions on Happy. Do you know talk about any and any questions you guys pick me up? Come on, somebody gets to ask. Not
we getting back. How to go yes, sir. so lost device processes the yes. Okay. Okay. So the question is that if a user loses the device, like what's the process of like either what can be done from the administrative respect it right. So if I get that right, I think you can we can all just me send notifications. You can clear or change. It send a notification for changing the passcode you can wipe the device remotely. You can't even set of factory by your command remote leaks all of that is as possible
over the are there are other things you can do as well, you know Mark the the like block the usage on the identity side. So you're moving outside. The Realms of justification Point management has retired all the products and we know like get on one device you have access to pretty much everything if someone has that unlocked and you know that you know that device is missing literally you can block access to their content as well. Call blocking their which Alaskan desktop second as well. All of that is available today
to accident. Of course to use a first needs to contact you organization at 2. I notified that the device is lost. So there are two options then they call the help desk and those things that information can be populated in the workspace. When can you secure help wherever you want, but you were also has a self-help photo so he can go to the self-help for to unlock the device. I have lost and it can be locked. So maybe the user losses in the house. So that wouldn't be necessary to before fully wipe the device. So
it's temporary locked it and it can unlock a device again when it's been found and you can even send some notifications to it. Don't make it ring or I make a noise so that the user Indica has an indication where is in the house? So that's the basic start of it also mentioned it. Is that every application. It's been wrapped Woodlawn MD HRS DK technology gives you the ability to completely wipe the container of that application. So you have a selective wife instead of a full one with her fully Ambien manage devices. It's mostly a foot wide of device unless you use a
computer applications. You can sweat Collective everything corpora goes away. And the thing is with food wine when somebody recover Shield device, you're not owning the device anymore. So you need to do something with the Google search an option for your account or the Apple options that provides an iCloud service awesome. All right. All right. Felix Felix like the security assessment on the device. So yes, we need to talk further. The device is jailbroken or rooted Mike and
bases that we can block access to everything and he's our automated rules that are already put into the system. Now, there are other things that can go wrong with the device which may not be registered as a jailbroken Arabic, right? So that is like pure security play. So in that region League calling mobile 20 pence get on Citrix partners with the lights off like a one-day Sky tours Imperium recently-launched dissolution call secure web Gateway at Citrix access control,
which is in built into the Citrix workspace app as well. So going forward. It is actually coming natively through the devices as well and it will Look at the traffic that the user to skipping the web traffic, but that capability is not today for mobile phone to this coming so devices the information around jailbroken and routed me to be captured that from the device and we can block access anything beyond that. I'd like some malicious profile has been installed, you know, we connect with Partners which you know, you will need to
have subscription to that service will integrate with them if that's a service tells us that there's something wrong going on Begin Again trailer somewhere close to block access. 2 apps 2 dots on arm the security posture of the of the device we integrate with the mpd's but we also provide whitelisting and blacklisting of application. So you as an organization can the fine with applications are used on a corporate on device? And if you take it even a step further on corporate corporate of personal advice with Android and
price you can shift it into the work profile Orlando. So we have a granddaughter control of which profile you use guard rails that you can push down to prevent certain incidents. So like we will obviously never recommend that you know, you would just unless it is a company on device never recommend that you only push down off-white list of like 10 apps that they use against all because then if they want to use Instagram or if they want to use you to wear anything goes we'll get blocked
you. You stupid you don't have a selective apps that you want to allow and similarly you are a few can also block the use of native browser and ask them to use the Citrix secure web and that way, you know, you can wait list of Blacklist see web apps that they're actually able to fit similarly. You can also block certain Wi-Fi that you're not able to join free Wi-Fi only by fires that are secured so you can do some security guard rails. We can improve the posture of security on on that device, but for like a full-blown like an antivirus
Buy this talk
Access to all the recordings of the event
Buy this video
With ConferenceCast.tv, you get access to our library of the world's best conference talks.