Duration 42:05
16+
Play
Video

Citrix Synergy TV - SYN100 - How to get more ROI on your Workspace Investment using Citrix Analytics

Amandeep Nagra
Senior Manager, Product Marketing Cybersecurity at Citrix
  • Video
  • Table of contents
  • Video
Citrix Synergy Atlanta 2019
May 21 2019, Atlanta, GA, United States
Citrix Synergy Atlanta 2019
Video
Citrix Synergy TV - SYN100 - How to get more ROI on your Workspace Investment using Citrix Analytics
Available
In cart
Free
Free
Free
Free
Free
Free
Add to favorites
225
I like 0
I dislike 0
Available
In cart
Free
Free
Free
Free
Free
Free
  • Description
  • Transcript
  • Discussion

About speakers

Experienced Technology professional with over 15 years of experience in Marketing, Market research, competitive intelligence, Presales, Product roadmap, Product launch and customer engagement. My Experience spans across Cloud Security, Cloud architecture, Internet of Things, Enterprise Mobility and Workspace services
Results-driven senior marketing executive with 15+ years of experience delivering enterprise software product marketing solutions within Fortune 500 technology leaders. Proven track record building and executing product marketing strategy that exceeds revenue targets. Draws on emerging data platform knowledge to communicate with developers and enterprise IT teams. Rare expertise in conference keynote presentations and corporate public speaking.

About the talk

Topic: IT

Share

Okay, ladies and gentlemen. Thank you very much for coming out this afternoon. This morning in the Keynotes. He heard a lot about Citrix workspace a 00:04 lot about the new intelligence capabilities that are going in there about user efficiency. And we're trying to drive chords to be 00:13 more productive saving one day per week. I think was David Charles Montreal this morning about Citrix analytics. But in this session 00:23 really what we want to focus on is analytics that you get in work space today. So there's a lot of goodness that's coming from Citrix around 00:33

intelligence and all that stuff. But there's a lot of goodness that's in Citrix workspace today that many of you may not be that familiar with or you 00:43 are and you're not necessarily using it that much. So in this session, we want to really hone in on Citrix analytics and talk about that. I'm Blake 00:52 canal and the director of product marketing for Citrix analytics and joining me on stage is Aman deep. I'm going to be here for Wilkes-Barre Services 01:00 glad to be here with you guys today. So I'm in deep. A lot of technical asks a lot of work space technical videos market 01:10

research analyst meetings and then content creation all the good content coming from 01:20 Amman here in this session. Before we dive in just a couple of logistics if you would all at any point during the session feel 01:29 nauseated by the sound of my voice this room conveniently has two restrooms located right at the entrance. So it's a little bit weird and the doors 01:39 are always open which I find even more weird, but super handy. The other thing we want to do is take a couple of poles in this session. So hopefully 01:47

you all have your mobile devices you can go to this session, which is sin s y n 110-100. Yes. Hopefully it's in your 01:56 saved agenda or you can just do a quick search in the Synergy app and you click on that. It'll bring you to an info screen in this world tab 02:05 at the top. It says polls. So we're to take a test pole here. So we want want How you to indulge us here? So which of these 02:15 do you prefer this is a single answer poll among lives in Toronto Canada. Yes. 02:25

We were cleaning out there. You're probably familiar with this then Tim Hortons. This is famous 02:32 for coffee and donuts X hockey player started a chain of restaurants of sorts based in Toronto, Canada of all 02:42 things. Here in Atlanta Chick-fil-A, of course is really good. Home of Chick-fil-A. I mean that's course. I don't think I've had the sweet tea that 02:52 stuff is liquid gold off of it and then there's a third option for others So this is a quick test pole 03:01

and then the other thing we're going to try to do is show live results. So this is going to be interesting Magic 03:11 Alright, what's Happening Here? All right. It looks like a Tim Horton's bees Chick-fil-A and C is fast food is garbage. My body's a temple. 03:24 Chick-fil-A is we're here for the biscuits man. 03:35 Get you there. 03:39 Okay, so let's get let's get into it. Those are the test results to cover off just for those who are new to this 03:48 Pacific analytics. I'll touch on what the service is and then we'll dive into it a little bit further. Pacific's analytics we've been talking about 03:57

this now for a couple of years really there are three big areas of focus in terms of what the solution is all about. It's a Civic cloud-delivered 04:06 service only available for download and install on premises. So sick of sandals exercise and Citrix cloud in our first big use cases security and 04:15 that's really what we're focused on here in this session primarily is all around the security use gave him. The reason we focus on that one reason 04:24 we're focused on it is because that's what's in Citrix workspace today. That's how you can start to leverage and use Citrix analytics to get more 04:31

valium or return on what you're doing with work space. If you're considering workspace. We really want to encourage you to take a look and analytics 04:38 again. Your field teams will be probably on you a lot about work space. So we really want to highlight what's in there. We have intimated 04:46 all of our portfolio to provide input into Citrix analytics a really spans the entire solution set here at Citrix. So this is really the thing that 04:56 really ties everything together Citrix analytics is really one of the first product is tying everything together and what we're doing is bringing in 05:05

events and information applying machine learning to it and teasing out compelling insights in the case of security that you haven't seen before or as 05:12 announced this morning. We're moving on to the next big huge case in the middle of their performance, which I'll touch on in the end here. So in a 05:20 very fancy PowerPoint slide again ingesting data from our portfolio applying machine learning to it and then importantly being able to take action 05:29 back in those events in the portfolio. So as we find security issues and insights we can then act on those in either an automated or a manual 05:38

fashion. So what do we focus on security so much to lose? 05:48 This is the per capita cost by different Industries for a data breach and just highlighting the first two there many such as customers are in 05:58 in these fields to you and see a lot of healthcare providers using Citrix environments. Certainly Financial Services those the two that have that 06:08 killed the most to lose in the date of breach. So it's very costly these these reaches. The other thing we're seeing is ransomware is another kind of 06:15

security issue. That's just growing exponentially. We do have a way to capture and prevent a form of ransomware in conjunction with our content 06:25 collaboration offering using Citrix analytics. So again, just another day to point the cost of these it's been a really high doesn't the real 06:34 direct impact the business. Financial impacts of business with these security breaches. So we're very focused on trying to help remediate those as 06:43 best we can turn this over now to thank you Blake. So 06:53

all of those can be mitigated feminist Augustine not completely taken out 07:00 to having right schools and systems in place using your without solid cyber security strategy, 07:10 and I know big module of that is security analytics security analytics today. We want to talk about you Eva just use it an entity Behavior 07:20 Analysis and the market definition. Let's start with that. So I don't think solution that bass lines the behavior of uses 07:30 and entities across time and or and Max with other people groups as well. So what this means is that, 07:39

you know, we have a user but user accesses few things through a device access to files. Hue apps to a network has an IP address, 07:48 you know, we from a profile off of using right for you, by the way this data is with you. So I know before I even get into this out a lot of privacy 07:57 concerns and and I went up like say it out loud at the state of only the metadata and and Cloud cleaners with us everything to dress of the beta is 08:06 for the for our fault for you for the admins that uses data. We don't get insights into your data but we use some of that Anonymous data 08:16

to make our machine learning algorithms better. So what does is Biz a profile for the user with gets created using the be 08:26 understanding the behavior of how this user behaved normally so that helps create a baseline that this is the normal user behavior. And then there are 08:35 some activities things that are way far away from the normal behavior of that use it and it's normal behavior is different for every user. 08:44 Have to align, you know, every user is not the same and we get it and that's why we learn the user and then you know Baseline it and then move from 08:54

that base model embedded into our system what that means is that it will continually evaluate. The user real-time 09:04 that uses activities across networks across the files. They are trying to access the data the IP address location be the 09:14 identity and access that they use multi-factor all that they use everything the device Foster everything we look at all of that. And 09:23 we been if there are malicious activities we see if there are deviations and increase the risk in the interests base model 09:33

are a few names up on the screen of some of the players in the same market now, you know, we don't want to confuse them because this is very 09:42 similar. Once they similar but I would say this is an adjustment field to Siem. A lot of you have 09:52 log Management Solutions from Splunk or logrhythm or any of those and that takes me to my next question which is a so that Tim Hortons. 10:02 Was a warm-up and and if you guys be if you guys can be so kind to tell us if you use any of the YouTuber Solutions today, 10:12

not necessarily just elog management fees, but you know, if you use any of these logarithm Splunk uba exabeam 10:22 security not offer any other just to get a sense that you guys even use a solution like this or not. 10:31 All right. Let me maybe switch to ready for the big reveal. cool, so obviously longer than Splunk seem pretty popular 10:41 and I see a lot of others as well and let me walk you through what we offer and and why 10:51 is it an offering which distinguishes itself from the rest? Cific security analytics, we will look at it as a 11:01

three-pronged approach first sense. So we sent what's going on. And if I collecting the data send is like what what are my chances? Where am I getting 11:11 the feeds from? Right? So I'm getting seeds from all sorts of different data points to talk about the feeds where they're coming from and let me 11:21 analyze that data using our machine learning algorithms and correlate the data collection from different Vantage points. So why is it different to 11:28 have different Vantage points? In fact, the whole story is around having Vantage points that are heterogeneous and I'll spread across and using the 11:37

data was collected from a variety of sources around that user on machine learning algorithm would be no further again. Look at the 11:47 Baseline of that user and see what is the deviation of the unique is response. That is the only ones that offer. A 11:57 closed-loop autonomous actions now is easier to say that you're the only one but I would like to show you why they are the only one and why others 12:07 cannot do that in a second. Just also wanted to say that this these analytics capabilities available for your on 12:15

our own frame as well as Cloud customer. So whether you are on any of these hypervisors hosted in any of these Cloud will got your back. So what why 12:25 is Citrix security analytics any different? It's pretty crowded field why we do we feel the a different than the offer more value to you guys. First 12:35 thing is that analyze and just want this guy is very active on the response. So I'm just going to stop him here for a second to 12:45 respond. Like all these three things not all the solutions out there can offer all the three the challenges that there are systems 12:54

that can sense that can do a lot of data digestion and and come to a conclusion shoes with them first 13:04 the date that they are looking at may not be super clean. Right and because the feeds that are coming from there there reading up that day to use a 13:14 speed from social media or you know, the health of the email address and everything with some of it can be garbage. Some of it could be relevant and 13:23 it's tempting through all of that so through the desert Matrix be kind of confidence they have around the the the deductions that 13:31

door Solutions make they're not very firm. And there a lot of false positives and false negatives be able to clean feet of data from our Citrix its 13:41 own product and and response that we can do using surface endpoint management or Citrix files like blocking access to the fires. 13:49 What do identity blocking all your login is something unique to us because we complete the loop the sensor problem by analyzing the data that we 13:59 gathered and then we respond to it as well. So one thing I wanted to talk about I talked about being the 14:08

peppers in your sources multiple Vantage points. So I wanted to make sure that that I make it clear what it actually so have you guys like look that 14:17 different, you know websites that sell cars, you know, you can do a 3D swirl on those like look at the pictures of a look at the picture. 14:27 You just use the tab move around the Waco and you can see a 3D view of the whole car. Now the wait at least like 14:37 10 to 15 different taken from different angles, right and then you get a 360-degree view together and those pictures are 14:47

actually taken from different places. So those are different Vantage points similarly get on Mustafar scene the room probably use a smartphone with 14:57 Touch ID right at ID or some kind of a you know, Fingerprint sensor. So when you tap your finger on it, you know it it shows you that 15:06 hey I got some information about your temper but keep doing that multiple times and do it on the size on the edges. But what it is actually trying to 15:16 do is get information from different angles different Vantage points and perform a complete image around 15:26

that finger and basically get a full impression of your thumb right and that's what we're trying to do about that username is a heterogeneous sources 15:35 that we are trying to build a complete profile about that user from legitimate sources, but also using data versus using very clean feed 15:45 so obviously Citrus has a few of those heterogeneous sources and there are other sources as well. For example, Microsoft graph 15:54 security. So why is sipc sources are listed up here on the top from Virgil apps that stops Collaboration endpoint Management in all these we also 16:04

integrate with Microsoft Services because we realize a lot of you out there also used Microsoft Office 365 or Windows Tech defense. 16:14 So getting a feed from that and then plugging it into the Citrus analytics engine and machine learning. A lot of them takes that into 16:24 account and then takes Action News sources of information coming from different Vantage points, and then gives you 16:34 you know much but your profile and context for that user actions can be taken by a citrus product and a unique pieces all actions 16:44

can also be recommended to the Microsoft site to buy directional kind of a sink with Microsoft graph security Drive. Currently, 16:54 we have Integrations with you know, as you're a d i d production as Windows Ender ATP but very soon. We going to have integration with 17:04 Office 365 and a lot of new stuff which you know, we will be talkin about very soon. So last fall, I promise 17:14 you guys use any Microsoft security offerings, you know today any of these that I list here or one of the reasons 17:23

I asked is that a lot of these are all of these will be integrated into subjects analytics as well. Actually, you know 17:33 on making sure you don't give your Investments and the choices that you may we take care of that and then be able to 17:42 pry you value on top of that. Let's see what we got. Select oh, that's a not a whole lot but 17:51 still about like 40% of maybe more 45% of you use these today. So I need that Family new offerings 18:01 by probably came out like a couple but he three years ago not no more than that and it become public apis now so significant number of you using these 18:11

feet we will be there already integrated. We are already integrated with a few of these and we will be integrating with a lot of these going 18:21 forward. So a lot of talk now I wanted to show you some get all natural devil off of the product going forward. 18:31 So hoping the demagogues like us today, so here we have the 18:42 temperature. 18:49 Play it out and put it in. I would have got support coming 19:04 911 is coming may day may day. nothing exciting as good as probably just 19:13

speaker incompetence 19:24 all I got to remove it from the end show something like that fight. Sleepy's go back and show Are 19:36 you all right? Yeah, that's okay. Are you sure to go back to Safari? 19:46 here Hey we go. 20:02 Thank you. When you send the marketing guy to do the AV check so 20:17 so back to where we were. 20:23 Security so you can you see three tabs here security performance operations back to the initial Slide the Blake showed around in a three different 20:33 cases that we have within the analytics want to secure. The second is around the performance and operations 20:42

today. What is life is security and a performance is in preview as you saw in the state today and later on you fear on operations. Is that okay? 20:52 CCI give me the different profiles a high-res profile. There's a medium risk profile. That is low. I have some users with 21:03 your own watch-list. I can see the uses which are risky and at the top most risky uses blister down there. I can obviously click on Seymour and 21:13 see more of those but let's look at the user Georgina Zoresco race 99 So 21:23

I'm going to look at this using and see what's going on. So first things first, this user had some kind of 21:32 data exfiltration that happened at a pawn that with 10 potential data exfiltration attempts that happened between May 8th 21:42 and they doubles copy printed downloaded sensitive data and I got the logs on each of those like detail logs on what 21:51 files were accessed. What information what kind of five types were accessed during this they were unusual logons applications that she didn't use 22:00

has never used before so back to the point that I made that unusual behavior moving away from the Baseline, but these are still medium-risk 22:10 normal user can click on apps that before right. 22:20 What happened to but excessive access to sensitive files as well? Right? But now bendy look all of these into take all of 22:32 these into consideration right coming from different products different services. This is telling me that yes, all of these in isolation may not be as 22:42

risky or telling me something but then I put all of them together. I definitely see something's going on. I see you choose downloading 22:51 and I'll get a lot of files large downloads EPA failures, you know, a jailbroken or a rooted device. That's a very high risk that so this is coming 23:01 from a moving point management that you know different device IDs that she's trying to authenticate and these devices are already deemed as 23:10 jailbroken. You can see a lot of other things happening. Let me show you some things that a lot of 23:19

Citrix driven data points that you saw your snap here. And now when I look at this user 23:27 I see you again lot of lot of things going on. I don't want to go into all of those but what I really want to see here is 23:37 at sea. Yeah. 23:46 Kevin I think it's the good one for ya. 24:00 Was external ones like the anonymous IP address might be going to be up. There you go and yet you look at this process privilege escalation due to the 24:10 kernel exploit and this is not a Citrix alert section external when I look at it is actually coming from as rating. This is 24:19

anonymous IP address. This is also coming from eyes or atid protection. So this is the third party integration like you're getting sources from other 24:29 places as well. Let me actually now look at the whole user profile see from the map view. This 24:38 user is accessing from all over the world, right? And that's also one of the reasons why I would be watered. Why is this user everywhere, right? 24:48 A look at the devices and then I see you this you just got a couple devices. That's okay. You know, he's downloaded, you know, a few files uploaded a 25:00

few but I can like click of a button take actions on it. Like what I really want to do on this user as a shortcut if I want to look at, you know, 25:10 what are you know, where where the information is coming from? So I talked about Vantage points different heterogeneous sources. So here are all the 25:20 sources that he that the data is coming from. So you see Access Control content collaboration and management Network Gateway virtual 25:30 option. Stop drop security and active directory. These are the external sources that we are currently integrated with see the data export a 25:40

lot of you also use Splunk and logarithms and other Solutions as your Sims for your event management and monitoring and stuff so we 25:50 can also Why do clean feet of data to them as well as well as the 26:00 policies like some of them already exists? You can also create those right that what what could be the 26:09 indicators that that matters you and and you don't want to try colors. But you want to track a few indicators. Similarly. You can also create policies 26:19 here and say I want to create a new policy with a new indicator that I just created and then choose what could be the trigger? Who's 26:27

the very flexible system in how you sent it how you analyze it and how you respond to those tracks? All right. I think that's all I had on the 26:37 democide and then walk us through what's new some of 26:47 the other goodies that we've actually been working on over the last year many of you probably seen some of that demo before and familiar with some of 26:57 the things that we've done in the security side, but there's been a lot of work over the last year in terms of adding some compelling new items. 27:04

So I'll do it for you 27:15 as we saw the Microsoft graph security API integration. So that's ingesting events from Microsoft and those events that you saw 27:24 from the user Kevin Smith. That's the actual Microsoft security alert that comes directly into us that's their virbagen and alert tickets package 27:34 up and we connect through their API and ingest that data and blended into our data to provide a nice rich profile of of in that case Kevin Smith. 27:44 We also mentioned the round trip part be able to take actions back in our portfolio that's available. Today. We're working with Microsoft right now on 27:54

a relatively new area that they announced at the RSA conference this year, which is their actions API so that respectability to as we 28:02 find out things about our users if you want to take action back in the Microsoft portfolio will be using their actions API Are the second part here if 28:12 you hit the click button, we just talked about immigration with Splunk. So a lot of Security operation centers are using Sims. They standardized on 28:20 that. They love to fix analytics. I don't want a new screen in their socks so we can export out our risk indicators packaged up risk indicators into 28:29

the Sim. This is nice for our Splunk user has a lot of my of our customers that come in that you spell I love it. But typically the way that their 28:38 cost structure is that they charge by the amount of data that stored so they don't want us a huge pipe of data coming into Splunk from Citrix 28:47 analytics just a few key risk indicators really helps to reduce sort of the footprint there. And this is something that's brand-new. We talked about 28:54 it this morning, but the third big wheels all this on the security front is integration with identity providers specifically with Ping Identity 29:03

and I were talking about this says we were rehearsing for the session at first. I know what you're thinking did these guys actually 29:12 rehearse this we were actually rehearsing in Amman you had a good point which is the identity providers have all the Machinery to do authentication 29:22 that and the mechanics actually log people in what they're missing though iskcon text. So if I'm a brand new user and I'm logging in they don't know 29:31 anything about me. If we can actually take those risks scores from Citrix analytics and bring them into an identity provider. Now, they have some 29:40

contacts about who the user is and based on that contact based on that risk indicator, you know, the people who scored 9200 those really high risk 29:49 folks. Maybe we'll have the identity provider like Ping go through add additional barriers to entry fee will maybe multi-factor authentication for 29:59 Blake Canal because he looks a little sketchy based on his risk or so adding that contextual access is really really interesting. So, I think it's 30:08 really relatively new or a recent development here with Citrix Analytics. In terms of immigration integration. We saw this on the slide, but 30:18

one of the nice things about Civics analytics as I always tell people this is not a big data project. This is not I need to really dig into Hadoop and 30:27 learn all about that and then start coding in R. And in that this is not that if that's what you're looking for. Frankly Citrix analytics is not that 30:36 is really just trying to make this really easy turn these things on and deliver results. So turning on the the Splunk integration is as simple as 30:44 adding another data resource in analytics, you toggle the on-off dataflow button and if you hit the the down button here we bring you through a quick 30:50

three-step wizard that sets up the process in terms of being able to export out to Splunk in the format that they need some python script or something 31:00 that gets developed here and is a very common practice on this blunt side of how they do integration the really easy to set that up. Now what I said 31:08 that we don't do a lot of your heavy are coding and you're doing your own analysis here people still want to do a little bit of customization. So 31:17 we've added some self-service analytics and search into Citrix analytics. So you have access to all of the sort of different widgets. If you 31:26

will across Civics analytics drop down boxes checkboxes. You can very easily set up your own queries to dive into things as you wished. So 31:36 you do have access to most everything in to fix analytics through the self-service Analytics. And this is something else in terms of 31:45 again. The session is titled the ROI of improving our align your workspace with analytics. This is one of the others for the unsung heroes of 31:55 analytics that we don't talk enough about problem in Citrix workspace standard edition, which comes with Citrix Access Control. You also get 32:03

analytics with that. So you're getting Citrix analytics. It's part of that entry-level SKU. If you all are that that that sort of starter SKU for work 32:13 space and with with Access Control, it's the ability to control access to your secure Rabon and SAS applications. But you also get a whole pile 32:23 of analytics. So in the security section that you're not just the user tab subtype that we've been kind of focus on but if you look at user access and 32:33 app access you get this whole bunch of analytics around usage in terms of what domains are going to how much data they're uploading and downloading 32:40

from the SAS and web applications. And again, you're you're getting Red yellow green yellow risk indicators of potentially malicious domains that 32:50 people might be hitting or not. So lots of good stuff there. Sorry. I got to go to the next so lots of goodies. We've added into 32:59 to analytics. I want to touch on the performance side of it. So if we build this out pretty rapidly just and then we'll stay on the slide after you 33:09 build it out here. We talked a lot over the last couple years about security and one more click you'll see that we've now sort of enabled finally II 33:18

Big Tab called performance, by the way also here at this event. We have we're talking a little bit about productivity analytics as well and I'll show 33:26 you where you can learn more about that, but we're really starting to round out the whole portfolio of of Analytics. The one of the things that we're 33:35 doing with the performance analytics this is initially geared towards virtual laptops and desktops. So for workspace Premium Plus customers of access 33:43 entitlement to the bridge collapse in desktops. This would be something that would apply to to folks with with virtual Apple desktops. We're doing 33:52

multi-site aggregation. So we're being that we're tying it all the different speed ad sites are virtual Apple desktop sites together and really what 34:01 we're creating are quantifiable user experience scores. So just like we have the user risk scores were doing user experience score in similar kind of 34:09 fashion crossword providing and invisibility across your environment and tools for faster troubleshooting. And as we saw this morning, this is what 34:18 the screen would look like. So instead of security we hit the performance Tab. And again, we're looking at users in our environment with 650 users 500 34:27

of them are in sort of getting excellent performance a hundred Fair 50 or poor which is of course a concern 80 users have kind of moved up 34:35 into a better user experience score and you can also see the sites. We just picked Citrus locations Fort Lauderdale Raleigh and others but aggregating 34:45 sites together, it's over we want to drill down on the 54 users. You can you can drill into there and you'll see that what are the factors that are 34:54 causing some of those poor performance things like login duration the Ico real-time Telemetry, so the icap protocol maybe he's causing some problems. 35:03

You can see as we look below. There are some GPS some group policies may be causing some issues and to the right sort of provide some 35:12 possible causes in terms of I love those 50 users what the issues are in Castle drill down into specifically who those users are 35:22 and what the impact is to them. So today out of the box when we first go out to Market with this we're going to build in our own performance metrics. 35:32 But over time we'll be doing is enabling the machine learning to determine what is good performance in your specific environment and model that and 35:40

then use that to determine these the scores. So we're getting towards 35:49 the end of our our formal talk here. So just a couple of things certainly the surveys the end of Thursday. You to take a look at those all the 35:59 sessions will be available on demand. So if you feel like you're missing out on something, don't worry, you'll be able to catch it later on demand. 36:08 You can download presentations. This is super important for Blake and Aman. This is what we get judged on and in 36:14

whether or not we can actually come back next year. So I highly encourage you to rate the session and play a game on as well. I'm hashtags for you if 36:24 I should do nothing beginning to session but this is what's really important. So again, let's talk about a few things the first one of the top here 36:33 sooner g403 that's actually a fireside chat gopis here in the audience. He's going to be delivering a fireside chat with Preeti from Microsoft. So we 36:40 have to have a Microsoft speaker or Co fireside chat person with with Gopi that's tomorrow encouraging to do that if you want to know more about the 36:50

performance analytics I'd that is both tomorrow and on Thursday so that repeats that's in 201 repeats if you are heavy on I 37:00 want to learn much more about this machine learning stuff obviously send 700 is good for you also send 202 under the hood with Citrix analytics. Dr. 37:10 Jim Reagan says here, he's one of our deep algorithm folks behind the machine learning. He's great great speaker. He 37:20 has very awesome talking points and throws out some good some good knowledge there. And then also 37:29

ponds of here we have a security talks. If you want to dive even more into security. We have a couple of Security Experts ponds, and and Martin are 37:38 going to do the analytics security for more of a deep dive than what you throw a touchdown here. And then finally on my time with the Georgia state 37:47 lottery in another fireside chat as well. Just talking to the customers actually starting to look at this and implementing this that's kind of a quick 37:55 run-through of at least a key analytics sessions for now. All right. I think that's that's it for the formal talk. We will take questions. 38:05

Yeah questions if you have them microphones in the middle of the aisle. Don't knock each other over to to get to them. Take your time. 38:14 Quick question on how it works under the hood. Does he use a heuristic scanning at all to sort of cut down on some of the 38:30 processor and system usage or is it just all machine learning and AI? Completely probably performance side, you mean 38:39 performance or just in general does it use first-year is sixer definition base scanning? It's it's at this 38:49

mix-up. All right thing that we do on top of every other information on 38:59 bad actor has the nest reporting off like you know, what what is the the Baseline that buries every device should be any signatures that 39:08 we are getting off any any malicious files on a device all of those out anyways, you know embedded into it, but beyond that machine 39:18 learning further adds extra flavor that whether you can really distinguish between like a medium fry at but like five of them coming from different 39:28

sources, and now this is more severe because because this is something else which is going on between have to look into from the performance side. Be 39:38 only supported a civic virtue labs in desktop or not to say it won't be extended to other products before which Alaskan desktops. Yes, you can you can 39:46 all of that is included. And then just one other question if you don't mind, I don't have you caught any zero-day attacks attacks. Yeah, 39:55 I know. There's no definition file. That's never been seen before the other day. I got so against attacks like 40:05

the idea is to detect those we are not sure if we have any intelligence we do we do so we have ponds the product manager here, 40:15 you know, who's who say stuff you asked me. How would you like to maybe say a couple of words on that? Yes, we got to put 40:23 you on spot on the spot. The question is Toronto 40:33 zero-day attacks. The biggest difference would be unlike the traditional attach value have indicators of compromise where they have a visibility but 40:43 when it comes to zero.. It's all about the behavior. That's the uniqueness what he have. So I'm like the traditional security and I'll text Briel work 40:51

based on their systems and related fitness like Netflix, but we have a unique play around the behavioral differences that what you can learn and 40:59 understand only if you have a you know, the behavioral-based and I'll be talking more on that. Very 41:08 cool. Okay. Awesome. That's all I have. Thank you for the under the hood session and the innocent 204 the the deeper dive on security would be would 41:18 be great for those questions. And again, if you really are some kind of getting under about the machine learning part of it. It's great to actually 41:27

have the doctor records here cuz he'll be great to start of touch on their philosophy and how they act. Iterate on these algorithms and update them 41:36 has as they learn more. questions Alright, well, thank you very much for coming out with preciate it. Have a great rest of synergy. 41:44 Thank you. 41:54

Cackle comments for the website

Buy this talk

Access to the talk “Citrix Synergy TV - SYN100 - How to get more ROI on your Workspace Investment using Citrix Analytics”
Available
In cart
Free
Free
Free
Free
Free
Free

Video

Get access to all videos “Citrix Synergy Atlanta 2019”
Available
In cart
Free
Free
Free
Free
Free
Free
Ticket

Interested in topic “IT”?

You might be interested in videos from this event

September 28 2018
Moscow
16
122
app store, apps, development, google play, mobile, soft

Buy this video

Video

Access to the talk “Citrix Synergy TV - SYN100 - How to get more ROI on your Workspace Investment using Citrix Analytics”
Available
In cart
Free
Free
Free
Free
Free
Free

Conference Cast

With ConferenceCast.tv, you get access to our library of the world's best conference talks.

Conference Cast
505 conferences
19653 speakers
7164 hours of content