Duration 46:58
16+
Play
Video

Citrix Synergy TV - SYN122 - Identity and access management with Citrix Workspace

Srinivasan Shanmugam
Enterprise System Engineer at Prime Healthcare
+ 3 speakers
  • Video
  • Table of contents
  • Video
Citrix Synergy Atlanta 2019
May 22, 2019, Atlanta, GA, United States
Citrix Synergy Atlanta 2019
Video
Citrix Synergy TV - SYN122 - Identity and access management with Citrix Workspace
Available
In cart
Free
Free
Free
Free
Free
Free
Add to favorites
310
I like 0
I dislike 0
Available
In cart
Free
Free
Free
Free
Free
Free
  • Description
  • Transcript
  • Discussion

About speakers

Srinivasan Shanmugam
Enterprise System Engineer at Prime Healthcare
Pete Downing
Chief Marketing Technology Officer (CMTO) at XenTegra
Akhilesh Dhawan
Director of Product Marketing at Citrix
Praveen Raghuraman
Director, Product Management at Citrix

An experienced professional with over 16 years of work experience in Product Marketing/Management, Consulting, and Program Management• Strong understanding of the IT security, cloud and SaaS markets• Good experience in product positioning, messaging and strategy for “go to market”• 5 yrs+ experience in consulting• Excellent communication, leadership and team management skills

View the profile

About the talk

Come get an overview of Citrix Access Control (Workspace Standard). Understand the business value of Access Control, the challenges it addresses, and the differences between Access Control and Gateway. Come join us to see how we are different from a traditional SSO solution and how to improve ROI with a single vendor strategy.Note: This session will be available for on-demand viewing post-event on Citrix Synergy TV.

Share

All right, so I think we'll get started. So good afternoon everybody. I hope you are comfortable in these seats. I didn't know it was an auditorium to glad. So it's the end of the day we will try to keep it as a interactive as possible. So if you have any questions to what is the end of the session you can have to go to each of these mice and ask you questions. So I just in case I decide this is the session for our identity and access management story will be covering our own premises Gateway as well as our Cloud Services offering access manage. My name is ocular stock report marketing

looking across our security portfolio of cloud services and I am joined by rubbing your name to say. Hello. My name is Karina Graham, and I'm not responsible for Access Control and RV Solutions. All right, so just to get started a little bit into a glow or the market overview and I briefly talked about. You know, what we seeing in the customer accounts and then we'll start introducing her to text access Solutions. We also have our customers for a brief introduction on what they're doing it to take Gateway and one of our Premier Partners in

technical to hear talking about exactly what they are hearing from the customers in Jackson that act as catalysts getting And we'll have a lot of fun. I will have a lot of demos for you. So let's get started. So obviously the experience in Paradise. So this is something that a lot of CIO. Looking for how do we improve the user experience or b i t experience to manage the it and access and all of the different solutions that they have deployed in a data centers. Obviously, you know requirements are coming in from applications that are now being deployed more primarily into the

size or in the cloud to get. A cloud Journey climate get in data faster into the cloud to get access to the cloud for the users in the US has in his application is not only from the corporate manager devices, but also from their own personal devices. I can an Android phone an iOS phone but the concern is how do I control access to these applications which are not anymore in my on term data centers? And how do I control access based on the devices that my user for using how do I control data or access that just waiting on the person devices? For

example, so providing the end-to-end solution to get secure access in a single sign-on expedient not only to your own from web apps applications. The future of works as we talked about in this energy big, you know, what's the people and their experience at the center while obviously applying all the security policies in place, which does not impede the experience. So some of the challenges that we talked about are obviously you look at the a lot of customers. We have spoken to a lot of customers, you

know, we all have too many apps on an average talking about on an average more than 500 applications deployed in the data center or in Assassin environment and so on and so forth all these different form-factors of applications. They have deployed very Point specific Solutions. So you also you are all using Gateway mostly for your worthless and dust off some third-party single sign-on solutions for the applications and then SSL VPN solution for the Elantra bulb applications and so on and so forth. So there are too many access points as well. And how do I control in

different access point that are coming into my data center and controlling access to my applications complex for me to know manage these different access points and apply security policies that are consistent across all these data points. So we have solution around access management that helps you then we going to talk about that gives you a single time and do all your applications for the disaster applications web application or such as were clapping desktops. Obviously most concerning about improving the end-user experience as well as

much more efficient process as opposed to having three or four times and then have three or four different sporting to Mizner Solutions. And then if you have one solution, you can actually fly security policies that are consistent that are also very timely and that are granular across all these different application. And that obviously falls into a complete story around the balance portrait 8 with no experience choice and security keeping the people Centric or a user-centric focus. So let's talk about what these acts as offerings are the

first one always needs. Most of you might be using the Citrix access Gateway for your worthless and desktop environment. This is the same solution. This is the Campbell deployment Cloud video something something very small factors Hardware or virtual some factors that you can use depending on the location. Then we also introduced last year was our fattest access control services in the gate or a cloud-based offering fully managed by Citrix. So we'll start with Gator first because that's where I think most of the customers are using

today. It's obvious that you're using it for septic switch labs in desktops, but always goes beyond that, you know, as I was talking earlier, we have too many access point and putting different applications and that becomes a very hard to manage now. Don't you know when we use citrus unified get in the past, which is now called Citrus Gateway the dark thinking was how do we provide our customers in a once a week and they can send light in a man is centrally and apply security policies across all different applications. Not only the Citrix vdi but also across the oceans. And intention was a

lot of customers wanted to stay on Prim and this is a solution that we had a problem to Ghostbusters and not only consolidate access point with all the single time and experience across all different applications with a divorce as well. What lives in the end providing a much better and user experience? So let's talk about know what updates we have made for the Second Great Reform Act in the recent time. We have made a lot of enhancements and support for your

existing protocols like the SPX adaptive access or is he with with the new enhancements? We have a complete SPF inside support if you are using sdx and inside there was a limitation in the past that you cannot enable Estates inside if you have a. After taxes And then obviously we have some announcements in the RTP. Even using Microsoft RDP are we have made a lot of announcement in that area where you can obviously keep coming in from the gate reporting. For the security sensitive customers. We

also released a self-service password reset option for users authenticating against the active directory as well. As you know, we've ever had this in fact or framework that has been really kind of successful and important for our customers to make things easier for applying those impacted policies. We also released a visualizer where you can actually drag and drop the policies and picture them exactly how they're going to be in 4th once a user logs into the gator photo. 40 seasons of a PlayStations we are we are intact review for a

supporting the rabbit. So sorry, we have the web apps. Are we paying less experience and if a GM product no direct review this weekend into your on-premises of apps using to participate with product. As well as a complete a fqdn base-spec tunneling & Orthodontics Novelties for your job applications and any applications that you deployed on premises. So with that, I think I wouldn't wait Sweeney Sweeney is a Enterprise engineer with prime Healthcare and they had deployed watch last time

that stops along with the city gay pay for specifically like a proxy when they started the journey 6 years ago welcome and that lets talk about you know, what would we have done with such as Gateway? So she need when when you deploy at is Gateway for work Latin dust off that was mostly primarily for your eye care proxy use case where your remote users or coming in and accessing your porch lights on desktops. What were the challenges beyond the music that you were looking at? What were you trying to accomplish? So

I'll fax it in Office 365 for the email and other Public Access applications. We use around princess applications. I love when we wanted to have a single sign-on solution for all this application send the integrating it with the witch relax and rest stops plus the mobile applications and internally built web applications. We want to listen to solution that can address all this scenario single sign-on security multi-factor authentication beer. So it's a bit we have to purchase another product

and its add add add more with unified and so we can figure out a DCS proxy that issue. Like when we used a really serious about us proxy, it can seamlessly single sign-on into any says applications that is being used by your end users in addition to that. Ritual Arts plus the mobile apps and internally build a web application is also behind the Citrix Gateway adding multi-factor authentication into the mix. So dense that ability to talk about some of the business outcomes that one thing that you spoke about was if you

would have a third party coming in and doing a single sign-on that would have been called morecast. What about the user experience when you find URL to get things done? So it's a single you are a single point of entry into our environment accessing which realize that have any app saying that matter so it's a single point of entry better user experience talking about with the only For your work laptop desktop to use cases can go beyond you were clapping to stop Stewart's as it was bad even to work the movie The Single sign-on and I think one of the things

that she ain't talked about was a better user experience. Obviously when you have one single pole lightbulb to having three or four entry points is a much team that experience and easier to manage for it because you can just look at how much extra third-party Wonder week's chart because you already have the gate before the whole thing that you want to stay on Primus and in such as Gateway can help you provide consolidation for your on-premise interceptor. So let's move on. Let's move on to really want to focus

more on the cloud services with Access Control service. This is something that we had released in an ounce of cigarettes energy and the intention here in compared with what is Gateway, which is more on a non-prime consolidation and not experience much easier. This is basically the same storytelling in the cloud face with Axel Gonzalez. Consolidating your cloud services the solutions that you're getting from as no different vendors focusing on web filtering focusing on access management as well as your frosting to write up and were clapping desktops and so on and so forth. So

this is something that we help you consolidate with Citrix Access Control service. The office results as you know realize why should I need to consolidate again is the talk about user experience because users can now get into Citrix workspace and they can access not only were clapping. But you can start anywhere in your sass you can start animating your on-premise web applications applications review and we do plan to launch that soon. We will talk about that has and it gives you flexibility to use all your devices. You can use your idea to Android your windows or

Linux your max whatever you need to do you can get access to Applications. What is not only about the end-user experience? We do provide a lot of ground security controls that none other access management solution provides today, which is what we talked about with security policies with Citrix Access Control to you can actually now see limit users how they interact with your certification so you can disable copy paste or you can actually disabled bring commands. You can put Watermark 20 confidential information at a publishing in Santa Fe kitchens. And then in the end,

you can also now start analyzing any actions that use it are taking when are they when the log into Starz applications Outlander exiting internet and phone? So one of the key requirements that when we spoke about the customers last year one of the gaps that we had kind of identified with Citrix Access Control was the multi-factor authentication and this is something that we announced this week is the one time password is now available for you Santa cloud services, which allows you to know, I'll provide

the secondary level of authentication for your users coming in to access at the cloud services. And this is a one-time password for Google applications, which is citric acid to app to use a Google authenticator app and so on and so forth, but the only need to enroll your applications and they can get started with with this indication. In addition to that one of the other. A lot of talking to you guys. You said we already have some multi-factor with my

radius or supporting my other one that I do RSA and semantics of the world. So when you are accessing your gateways you already have made those Integrations with Gateway when you are acting out getting your users against using all these different vendors Solutions. What is when we talked about access control in a we only provide to the native one time password? So one thing that we are Integra view is you can actually now start using the same of integration mechanisms that you use with your own from Gateway to authenticate to suppress workspace. So now the story

becomes much stronger in terms of providing better security and improve security for your users and giving up on taxol set of policies based on your user location, you know, what kind of applications they're using in his phone's off or you can now start putting those policies in Gateway and that can come to your work space and you can authenticate users based on those policies using all the vendors that he replied or integrated with Gateway. So it can be RSA securid Cambio Symantec VIP tokens. It can be a Duo security indicating against Bill Gaither. You can now

Implement that with the space. So with that will give a demo and I'll request from you two going to take you through what this look like. Thanks Atlas. So we're going to talk to just give you a very quick demo off how you can use this if it's keeping and its capabilities to use that for second factor and you know along with work space considered the gateway to be all week and watch policy and invasion of the circuit for space you'll be able to create what is YDC profile and set up a

client so you can automatically when you try to login you'll get redirected into the gateways page and 1/3 authentication is done based on all indications are whatever you may have that package talk about the end users will seamlessly be you know, what integrated into the workspace. So that's what this was about. So he had to use it experiences urea and usable go to know Citrix cloud, and they're trying to access the workspace. I want you know, this is not right

after the authentication happens. So this is dropping you into the gateway a pain in my username my password and if you have set up or any of these multi-factor authentication capabilities, let's see using semantics or do or any of the integration. Those are actually automatically be used for during the second factor. And after that after the reaction happens you are now drop able to log into work space and you actually get all the work space apps. So this makes it extremely easy for end-users from experience perspective on

the 2nd of March when you mentioned but the benefit is that you cannot extend the solution and get all the contacts relaxes and other people but it is that are within the Gateway. Thanks for being so I think this is also saying that you don't have to rip and replace any of your existing configurations and Investments that you have made with the checks to move to Cloud. So I think that helps you take one step at least to get a physical education. Please keep on premises and then you can still go to work place by keeping that. So moving ahead going to talk about

obviously we have all these different templates that we have building 4 stars as well as for bad for single sign-on access control. I think when we launched the attacks of control because we have our own summer on hundred templates. It's somewhere around 300 now, so we are progressing in terms of working on these templates to provide a easier configuration of our customers, but just in case the constellations are temperature not available if you can still going to be videos has applications or web applications mentally. So I think that that in so long it's

supposed to be weakened support all the single sign-on to SAS applications. So one of the thing that we also heard a weird accent or was supporting the on Prime storefront and that's I think this is something that we also announced that sit at the keynote. So we we did we are working on and it's in Texas right now with access control that you can keep your own construction as is and you can still work with active control and access your own From the Vault or so and you and your vdi Citrix workspace.

So the way it works is obviously you have your own pen store friend and you also have your sass and web apps with that control. Now the question becomes why do I still have to have two different acts points or to do my users go to work to exercise and then they come to Gateway or storefront to access vdi what you're all doing is, you know, all these apps can now be intimidated with in the workspace. So you keep your store address on premises. If you don't want to move to Cloud we can celebrate your applications, which if this is something that a lot of customers looking to

have and I hope you like it and this is something that can help you going to move to Cloud for certain applications, like stop and grab at the same time keeping a vdi on premises. so and then we talked about the web applications, right? So it isn't currently in touch with you and these web application Centre Park on premises when we launched the service, we had support force a sandwich Labs, but we didn't have support for web applications. And this is a lot of customer saying can I now have how can I get rid

of my vpns that my users are using to access on-premise relax and answer now is yes. It is Integra movies plan to launch in the same quarter wherein you can get a VPN less access into your own prom without using such a saxophone. It becomes size and becomes web even mobile app that is something else and talk to you right now and you can all access your vdi so all of the applications now you can actually access within work using to access control service. So, let's see what that user experience looks like for

configuring and accessing your own from web apps. Sure circulation. I'm going to go again run through the internal web apps. So they'll be two parts in the demo for switch. Show me the admin experience for what are the configurations required to be a support three different forms of single sign-on. I know we have all of those and then from the end user experience perspective. It's a game using the word fees for taxes. So let's go in. So does the admin experience I go into the gateway service tile and you click on a dice as a part of what you've noticed yet is that you have the

option to actually add the app based on where it is and how it is hosted. So I'm going to lick the inside my copper Network quick few things about setting of the name and some things like the actual fqdn where this app has hosted. This will be typically it's in your carpet and vitamin E or Datacenter. I'm going to select the icon some what I'm trying to do here. This actually can figure the taxes and I just checked the box for enhanced security policies. I'm configuring the actual connector that is required for making Galvan connection that we talked about and there are the different

options for single sign-on. You obviously have basic car single sign-on you can do cobras. You can also use forms based on if your application doesn't have single turn on the fan option as well. So basically what we're really doing is in this case setting it up settings. And the application once it is completed. It will be appearing on your library for you to be able to then I can figure it for users. So I see the Outlook web access icon and what I can do as I can actually go in a dramatic subscribers to hear you can add individual users or user groups. Someone is born out of a group of

users. This is what you would have been figuring you're 80 and pretty much now the app is ready for the end users to access to that work space. Do you see the tile for Outlook web access when you click on that icon? It's going to now in for the steam consistent policy controls like cut copy paste on watermarking and all of the other things that you've been doing for Saturday for kitchens. If there is a link it as the caissons which happens to be malicious, you know, you'll see the song restricted page. So the whole goal is to keep it consistent with being able to Extended value.

Also the author Maps cool. Thank you. That's a great experience. How do I control access to my applications as well as any malicious links embedded in my applications? I use my email I get spam like 50 times a day and there are a lot of you this why I accidentally click on those things and you cannot protect those users and the user credentials in buying some of these policies. So which is what brings you to the weapons in policies and this is something that we are really excited about a lot of customers are liking it now that they can control what do

users can access onto the internet right to a lot of customers especially like in education universities public libraries. They have very restrictive requirements for what the student can access from the network and same as same as well Healthcare manufacturing a lot of these customers are asking is can I restrict my users to not download any malicious content with Canon in interrupt my network or break my complaints by working some militias are the metal content. For example So these are the what are the policies where you can Define what your users can access what other cool things that you

can actually do is you also have policies where you can read that interview the sessions automatically to secure browser. So if you don't want to restrict your users accessing anything on the internet, absolutely you can do that. For example that take social media users to restrict access to social media because sometimes they want to have a down time and they won't let you know spend the time on something else. You can read that in two sections in a secure browser, which is a Sandbox action within the sector. So nothing comes to your network in case it is a malicious activity or

malware sitting in any blog or any social media. You can just drink that malware into to text cloud service doesn't come to your network capability that we will be provided. No other vendor for like today. So the user experience what weight looks like as you can go to your workspace app, you can see all your applications after you do a multi-factor authentication into that. I have using whatever identity organism that you have configured with on turn Gateway or with once you single sign-on,

you know, if you don't have any security policy that we talked about a watermark in copy paste a little time to find you can access all those applications in a Singleton a man over the scanner browser. So this is something that we had what we had at least with Then obviously if you have security policy Define, then we have an embedded browser within Workforce app that opens up your sessions and then you can control all live at filtering in those South applications this solution with the set of capabilities. One of the Feed Bag that came was my

users are using IE or Chrome which is sitting on the laptops. I don't want to force them to use workspace app and the embedded browser that you are providing because a lot of my applications that I have on premises do not support the browser version or it doesn't support the plug in the phone. So I won't my users to use native trousers and other requirement game was can you control all internet traffic that goes we are the native browser and outside. So we came to the solution which is obviously working on and we are supporting we will be supporting all the standard browsers.

So if your users have Internet Explorer Chrome Firefox Safari browser sessions going to the internet The difference will be now you can actually start watermarking and applying controls within the standard browser itself. So that's the that's the best part of it that you don't have to have a workspace sitting on your laptop and device in the portal devices for using this solution. And anything that you can that you listen to go to the Internet for you can actually start controlling the traffic in apply policies for Backcountry. Now, you can

allow the traffic to any browser. I'm going to be intimate you can respect them or you can ask me transfer all your internet traffic to a secure browser if you want to so, these are the days that we going to be announcing very soon. But this is something that we're working on right now. So, let's see what that looks like. I think I will give it to pradeep or protein to take that sure. What I'm going to do here this actually launch a browser and prior to that

obviously show you the configuration Sunday admin with an access control if you're going to UNC. I need a browser setting Tab and here we are going to turn the native browser option which will give you the ability to copy paste the PAC file. So one important factor is that the pack fight of the century to use to redirect all the traffic from the need a browser into our cloud and also what I'm doing is I'm configuring the actual en point-to-point and have their stuff packed while actually be configured in the proxy settings. I'm from an end-user perspective when an end user

price to use that flavored browser to go ahead and try to access different sides. They will actually get the different kind of policy controls. So let's say the p and access very first time you'll be prompted to go ahead and log in and authenticate to work space and essentially the same already have but after that once they are not indicated then they can if they try to go to a site that has actually been blocked. It's part of the security policy. Then it would be restricted. In this case. He actually did not launch it to work with what we are still able to get the same

consistent reporting capabilities. And the other thing is obviously if you have to find let's say an application like a access for an application or a site like Instagram, then you try to access that then we have already set up a secure browser redirection policy for it. So that will automatically also come in. So in this case, he has you seeing or launching the automatic session for secure browser and within that session now you will we will render Instagram website one of the important thing here because I'm poor start. All of this is automatically controlled through

one single pane of glass from an Administration prospectus Avedon separately. We didn't give different policies just because the traffic is coming from need a browser or weather this coming from the city at work space app Instagram is something that you don't want to be used locally. And if you set up redirection, it'll work consistently Maldives cases. Cool. I think this is pretty cool. This just in the policies can be distributed to a GPO showed you I did go ahead and you know configure it on the endpoint.

But what you typically do is you may have gpor do you may have some form of an MDM solution which will make it easy for you to go ahead and do the proxy configuration that way to end users cannot change this and it's as long as it's a managed device all of this world pretty seamlessly. Alright, so one of the things that we also announced that becomes our next security Story how many people here think that they are not prone to any malware. Nobody like anybody everybody is going to Malvern. So that's something that a lot of a no conversations come around

days. Okay. We are providing you a secure way to access your applications. But a lot of time my users are using their own parts and devices to access my applications and I don't want to stop them to access data because they might be traveling or they might be doing something. They want my data for 4. A lot of times what happens is you or users can use it for some devices to go anywhere on the internet nothing respect them and nothing should but a lot of times when they go and accessed by accident really just want and a lot of things get installed on it and devices

and it can be keylogger if it can be something like a screen capture malware where the keyloggers can intercept all your keystrokes using your user names used in all including your password including any PIR PCI compliance information that you are posting on the side of application applications. They can intercept all of that and give it to some third-party hacker or whatever whoever has installed at on your machine. So for doing that I can do for protecting and against those use cases what we're also now for the keynote if you look at is the next set of security policies where we can detect

any you know, or think Apple malware and protect your information being intercepted by those keyloggers, for example, if a user is trying to access application to work space we starting from the login page little jumbled information that is keylogger going to do that. So they won't be able to see anything that they're typing and as a result they won't be able to look after the username password or any other information that is being shared by the user in that particular session. And it

can be across the sessions. It can be multiple of applications like science applications or even web applications and even watch last on desktop. So anything that starts and initiate work. It gets protected and this also include your micro apps the microbes every showcased at the keynote all the notifications all the secret files that you like something from work this app. So you can disable screen capturing of that or even attempt by keyloggers to hide are some of the information security policies that will be available very soon in the cloud with the cloud services

office in packaging and pricing and everything. We are still discussing but this is something that we're already kind of working towards. So once we have the tech review, we will eventually reach out to everybody and see if you guys are interested in joining us for any of the new 110w showcase you around secure your grip your native browser support and so on and so forth. So what did the way these policies are implemented is if you have seen their act upon to you, I I think we're going was showcasing them a little bit on the den where is well, but if you

look at it and a security policies that you can apply on your science applications, which is the top five rows the boat access printing navigation downloads and watermarking an EVAP applications access to work space the things that I'm talking about are the last two which is around, you know keylogging and your screen capture on this. These are the new set of policies where what I was talking about that protects your information from any third-party malware like a keylogger extreme caption device another you say something when

Sew-in in the positive policies we say you can actually put a watermark and that will kind of be a more prohibitive way or use it to take a screen capture and share with somebody but obviously did we need to prevent those users from taking a screen capture anyway, so that's the next step that we provide with this evening users and screen capturing them anything that is confidential unless asked like Salesforce has a lot of sales data. You don't want your sales team still going to go after that and give you the competitors or when they leave the date information with them. So

all of those qualities that use cases get answered with the new features that we going to be dancing. So another information in business and I know there's a lot of things new things coming and we want to kind of give you a quick overview of those but the last several things that we talked about is and we spoke about this and the keynote also very briefly was our individual doctor. And now this is something that a lot of customers were talking about we talked about. I'm already using off the can you support that because when we release the

service, we only support in Microsoft 80 and as you already so now single sign-on between your thighs your web your virtual applications, whatever. I think it's interesting to using third-party. I like to do the thing goes on on between their applications. So the first step process to now start integrating a note indicating against the actor authenticated mechanisms, including their user directory. So that's the first level of integration that we going to be doing. We we

can use you can also now use your okta authentication mechanism with Citrix workspace. This is something that you will be announcing very soon. The future of items looks like you know, once you thought into getting a visa after can I get my office in lausanne Ave within the workplace. So for example, if you using Office 365 pills for the doctor you are using what'll happen that starts with access control how you can actually merge them together but in one single workspace, so now you use it don't have to go to a different photo tracker. There's a supplications. They can just come to

work space and alcohol that app. So that is something that we going to be doing after or what time do the animated integration. And then obviously a lot of other things that I can talk about right now, but there are other plans to know provide more security value ones the animation happens. We can actually start to widen more value from a security standpoint Blacklist. And that also brings us to do in a complete ecosystem then going to build up in identity. Right? So obviously currently visible to set aside any platform to authenticate our users. You can also use the city Gateway product

that I talked about for an identity platform plus you can also use any of these men dressed now and it is oversleeping identity as well that we going to be. We would welcome to get against with gateway to all these different notification mechanic jobs become relevant for Statics workspace. So either you or if you ever want to get any of the authentication mechanism from the far-right you can start using the same authentication mechanism for your suit Xbox place. So I think that's what brought about I want to invite now. He's

the chief marketing and Technology officer for Centegra and they've been helping us deploy HR Solutions with a lot of our customers send it talk today. I'm going to be asking me to throw some light on what he's hearing from his customers on a cruise control. What are some of the big object as they have on consolidation and user experience and feet if you can talk to some of those partner Citrix and we just got recently partner of the year worldwide than I've been spending the better part of two years now doing that the cloud workshop and it's been really great doing

it every month and I do it like probably do one a week. And I log into the cloud once a week and I've seen the evolution of the cloud in and I think everybody in this room should be excited by what you see And because this is what the customers are asking for. So so, you know early on it was like Hey, I need two Factor authentication and I'm using my nephew and I'm praying with radius and maybe our say how do I plug it in the cloud or the native browser? Another guy's name, but you know on

everything in the workspace, so they need to know for example here in Outlook and they click on a phishing link while you want to be able to walk that and or you know, the secure browsing that's one of my favorite features because that you don't want certain browsing tapping on your network, right? You don't want to use your clicking on a drive-by install in Facebook yummy sample. So so that a lot of the stuff that I think the biggest thing I'm excited for is the two-factor authentication getting messed into the cloud cuz my you know, my customer base my client base. That's what they need

and in order to Pivot fully to the work. Yeah. So, so I'm very excited and being a partner. It's great to work with the product management team and has a x product manager. I'm I'm excited as well. Thank you so much. Does Delta story around? You know, what customers are asking for and how we're delivering distribution. Now, you don't have to implement three or four different solutions to get a complete Security Act the story you can always go get that with one single service where you can manage that easily. It's not a

complete engine management because this is a service for the best part is your users get consistent in user-experience their experience becomes more important and much better if they are coming in through one Singapore accepting applications one place and that helped improve the productivity as well for the idea that you don't have to deal with multiple vendors. You don't have to have a separate represent solution. Turn on condition and so on and so forth. So to wrap up going to just I want to help you or three major takeaways around, you know, if you are looking for something to

consolidate your own Ramen Pastor sure you want to stay on premises you want to explore you want no more precise and you are having a lot of applications. You can look at 6 Gateway to help you consolidate your data center infrastructure. You don't necessarily have to have a third-party FFL VPN or something an axis single sign-on too fast or in a different solution for your work laptop desktop. It can't be one single solution and it has a complete and Factor authentication competing forces that can support all your authentication requirements. We support all radius integrate vendors

with RSA Duo semantics. What are you using? Will you be cold and a smart card for biometric authentication we support all of that out of the box. If you're moving to cloud and you are looking at what I want, I don't have a lot of skill sets that require single sign-on that requires managing a more security product. You can look at a cloud service. It's a completely Statics managed service provider to you as a SASS and it can help you further consolidate your cloud services. You don't have to have a separate Fairfield Inn off and on all of that and Citrix Access Control give you a

complete and doing security story. The other part is the analytics account control says one place where you can now see all the users accessing all applications and the internet and based on the behavior that we control will be provided with Citrix. You can start enforcing policies based on that user Behavior. That's where I think we stand out and we give you a choice of identity if you have invested with Doctor usually locked identity. Invested in Microsoft 80, please use your Microsoft. And today we are not asking you to please any of your existing infrastructure about for

using citric acid to do. So that's all I had but if you have any questions, there are microphones on either side of the hallway in a few to please we have some time life and we can also come a few questions. But in the meanwhile, you can also read our session in your apps. It's been 1/2 to not notice in but the synergism so you can give us some feedback and how we can improve. And if you want to further know we will get vinyl recordings of all the sessions if you want to further and take a deep dive into this session that

cut off is that we touch you can actually look at sent one night. I have a question. If I don't have a netscaler appliance a roll and I want to use a Gateway service. I want to leverage our say that's what my company uses a lot. So, how can I do it without the next Keller Appliance over in this going to BPS require the on from Citrix Gateway or next gallon in that instance? We are also working on providing this functionality in the cloud natively. So once we

finish and complete the story with Quantum Gateway, I think the next step is to provide the same of indication organisms native in the cloud. But for now, if you know don't have a Gateway we can obviously if this is something that you want to have we can absolutely still talk and see you know, how we can Implement that solution and toothpaste capabilities are something we are considering on a road map. So, you know will California get their intention is for

this year. However, as I said earlier the time is going to change a little bit but it's the first priority on a road map is the highest priority that you can have for Native release Integrations in the cloud. What else come on? I know it's the end of the day. No more questions. All right. Write thank you so much you guys. Thank you, Angela.

Cackle comments for the website

Buy this talk

Access to the talk “Citrix Synergy TV - SYN122 - Identity and access management with Citrix Workspace”
Available
In cart
Free
Free
Free
Free
Free
Free

Access to all the recordings of the event

Get access to all videos “Citrix Synergy Atlanta 2019”
Available
In cart
Free
Free
Free
Free
Free
Free
Ticket

Interested in topic “Software development”?

You might be interested in videos from this event

September 28, 2018
Moscow
16
128
app store, apps, development, google play, mobile, soft

Buy this video

Video

Access to the talk “Citrix Synergy TV - SYN122 - Identity and access management with Citrix Workspace”
Available
In cart
Free
Free
Free
Free
Free
Free

Conference Cast

With ConferenceCast.tv, you get access to our library of the world's best conference talks.

Conference Cast
523 conferences
20459 speakers
7482 hours of content