Duration 39:24
16+
Play
Video

Citrix Synergy TV - SYN235 - Geek's guide to the workspace (part 10): analytics thinks that's not...

Ana Ruiz
Technical Marketing Architect at Citrix
+ 1 speaker
  • Video
  • Table of contents
  • Video
Citrix Synergy Atlanta 2019
May 23, 2019, Atlanta, GA, United States
Citrix Synergy Atlanta 2019
Video
Citrix Synergy TV - SYN235 - Geek's guide to the workspace (part 10): analytics thinks that's not...
Available
In cart
Free
Free
Free
Free
Free
Free
Add to favorites
239
I like 0
I dislike 0
Available
In cart
Free
Free
Free
Free
Free
Free
  • Description
  • Transcript
  • Discussion

About speakers

Ana Ruiz
Technical Marketing Architect at Citrix
Ryan McClure
Head of WW Customer Success Engineering at Citrix

About the talk

Most of us are unaware of the patterns and behaviors that influence our world, but when a pattern changes, it can directly impact each of us. Identifying patterns can be useful in predicting spikes in usage and potential security risks. Over the years, credit card companies developed algorithms to identify when your account is compromised. See how you can do the same within your Citrix Workspace environment. In this session, we will look at how a user's Workspace behavior provides insights into potential malicious activities and how changes in patterns can trigger countermeasures to protect the user, the content, and the business.Note: This session will be live-streamed during the event and available for on-demand viewing post-event on Citrix Synergy TV.

Share

Alright, let's go ahead and get started. So first thanks to everyone who decided to spend their last section of the day with us talking about analytics rather than heading to the bar early. I'm going to question your priorities a little bit, but we appreciate it. Nonetheless. So a little bit about us, so my name is Ryan McClure on the lead architect with the customer success team. My background is in Consulting. I'm based out of Chicago. I've been with Citrix 8 plus years now, so my job is essentially to make sure that customers are realizing value out of their Investments, which

is kind of why I'm here to talk about analytics specifically because I feel like it's a really important in high value load challenge level feature that customers can take advantage of at to do just that with their investment without having to do something like overhaul how you're delivering virtual apps and desktops that may be a little bit more complex for you to execute right? So some other interesting facts about me. I'm a u Miami grad. I like college football a lot. So I am often disappointed in the outcome of Miami football games, and I probably the only thing more

disappointing than that is my golf game, but I try my best Awesome, and I'm Anna Marie's. I'm a technical marketing Architects if you were here yesterday, I already did the first one of these also U, Miami grad. So cocaine to know it's going to be a good session is for both hurricanes delivering this presentation prior to that. I used to be a sales engineer actually see some of my customers old customers here. So shout out live in Dallas with my husband and my one-year-old one-year-old daughter. So my status quo is now always tired, so don't take it

personally. So before we get into the media content, we wanted to kind of get a feel for where everyone is in their Journey. So if I show of hands how many folks are actually using in production at least one Citrix cloud service today could be anything. Alright a handful of you. Have already deployed specifically workspace the workspace service or are planning to over the course of the next year. Let's say I want more of you. How many of you feel like in your existing environment whether it be on Fram or Cloud you have visibility gaps in your Citrix

environment. The business comes back to you and says hey, we got a Citrix problem. You know, it's a network problem, but you can't prove it, right? everybody shocking and how many folks have more than one cider Farm deployed across their various Loco que almost all of you again and last but not least how many folks think that analytics is just a buzzword. All right, so hopefully we're going to dispel the last one and explain the way that analytics can help solve some of these other challenges for you and potentially be the first one of those Citrix

cloud services that you can adopt to start realizing value out of that investment. Alrighty, so if you were here for our previous previous section we talked about I steal an HDX off of my face and where any of you guys here for such a 9 all right for a recipe that weren't all of the geek's guide session have been recorded So if you didn't attend I encourage you guys to go back and look at that time great content over the past two days, but like Ryan might focus on analytics. We're going to talk about machine learning how we can secure environment better and also from performance

perspective. We had a big announcement. Yes, they got two days ago. Now, I'm around performance inauguration how you guys can utilize it today? So, where are we in our work space filled? We talked about Seth and web and how you can integrate that into your Citrix workspace. We talked about content, right? If you don't have constant following you everywhere. Your apps are pretty useless in my opinion. We talked about endpoint management. How can you secure the and coins for which our users are accessing your workspace? We talked about having a unified app catalog right so that your

users got that consistent user experience no matter where they're accessing their Works based from We talked about securing your environments are your network we talked about that consistent user experience, but we have a really big up here and that's where analytics comes in right through analytics. You want to give you the visibility into your environment not only took accurate proactively but also to give your users the best user experience possible. So before they pick up the phone and complain and say hey, my Citrix is broken. My foot hurts to swallow. My Citrix doesn't work, which I'm

sure we have all heard in the past. Can we give you guys Fulton visibility into your environment in order to prevent that in proactively fix or Optimizer environment? So if you guys don't know what this is, this is Citrix workspace and it allows your end users to access your apps that stop them files. No matter where they are. It allows me to have a work space that is device-independent. So I'm no longer tied to a specific endpoint in order to be productive. I can be productive on the go and so throughout the office work space for you. We are

still deep into the different sections and different topics that make up the work space. So again, if you weren't able to attend in these past two days, I encourage you guys to check back and look at all the recording what analytics are going to talk about securing it, right? So again, how can we secure environment? How can we make sure that add your users are going from device to device your intellectual property remain secure and again, how can we ensure that your end users have the best experience possible? And so this is where analytics fits in right-center to analytics talk to all the

different services that make up the work space in order to give you the visibility that you need at the administrators to make your environment grade. And tell Ryan why don't you go through? I know you work with a lot of really large customers why I should be so scared about analytics. And what is analytics to begin with his kind of piece by piece. Right? So the piece that I think everyone is most familiar with because it's been out the longest is the security analytics be so I'm sure over the course of the you know, last 18 to 24 months. I all of your organizations have started to increase

focus on security if it wasn't already top of mine for you before but when you look at some of the trends in terms of breaches that occur over the course of time you can see that human are a big chunk. But then we got a quarter that's fishing another almost quarter that's ransomware lost devices are 20% There's there's no one culprit every time so how can we help automate the analysis of this nearly 200,000 events that most customers are seeing on average rather than requiring human intervention. Every time I start to generate some Trends on on what normal looks

Flight versus what's an anomaly and then start to respond to these in an automated fashion. And what are the other things I hear a lot is a big portion of the user base that access to my Citrix environment today their internal. They're not the threat to my organization write the threat to my organization is external that's becoming an egg is Big A misconception now is ever in the industry. So 28% I am starting to venture from a quarter to a third of breaches over the course of 2018 were perpetrated by internal actors. These are people that already have access to your network and some

legitimate business purpose for being there. So analytics is just another tool are toolbox. It's not uniquely targeted the internal users, but helps us gain visibility into that user community. That is a real threat. So once we have an understanding of the security implications of a user interacting with our environment, we also want to know that security and user experience can't always be at odds. They can't always be polar opposite. So what's their experience look like? How is there interaction with the workspace performing and that's really what

performance analytics is all about. So you see a list of tools up. These are certainly not the only ones out there but there's some of the most common ones that we see our large Enterprises to playing to gain visibility into some specific part of their environment that they had a gap in two before the challenge can be that these are distributed tools and you don't necessarily even know where to look when you have an issue with her or know where to start. So that's one of the things that performance analytics can do is help aggregate that data into a single view give you an understanding of

how do I have a log on time speed issue with my user say that Citrix is broken or Citrix is slow. Do I have a network latency issue? Where do I even begin right and the other thing for those of you that will raise your hand about having multiple sites in farms as whether you're using director or some other tool most of those give you single site or single Farm views of your environment today. You have to go back and forth between consoles or drop down tabs. It can be kind of painful to dig up what you're looking for. So performance analytics is going to give you that visibility across

multiple sites unlike director unfriended a right. So they're all going to aggregate into a single view. You can look at them an aggregate or you can look at them individually. Last but not least is operations analytics. So it's great to understand how we can further secure our environment how it's performing. But then we also need to know what our users are doing. What applications are they using? What websites are they going to how much bandwidth are they consuming those sorts of things? So when we look at this architectural e kind of left or right here at your starting with the user

interacting with a device and ultimately they're interacting with one of the data sources right to those data sources are our cloud services those cloud services send feed logs in various forms into the analytics database and analytics interacts with those to establish Trends and determine outcomes. Some of the these are administrator configured others will be generated based on Trends machine learning algorithms and and the light right. So when we talked about data retention, I think that's another thing that commonly comes up as a question when we talk about

analytics what data is obtained and how long is it stored? So all of these data sources are off by default and you go explicitly enable them. So you have total control over what day is being gathered from what services and by default it'll be retained for a. Of 13 months. So again, as we discussed those logs are then transmitted to that database and the key part. Here's that were then taking action on an information rather than just collecting information and doing nothing with it. So supported data sources, you can see that a good number of these

are services. But we also have the ability to gather data from some on-prem deployments for customers there in that hybrid scenario, which is where a lot of our customer base is today so we can gather information from a non-prime Gateway. We can gather information from a non-prime virtual app and desktop site. So some of you have probably had that conversation and say wait a minute. There's a catch there. I need to be using workspace to get security analytics off of my on-prem virtual app and desktop site. And that's where there's an exciting announcement that we're working towards right

that as part of performance analytics in an upcoming version of virtual app and Desktop Service, you'll be able to upgrade to that version establish a 4.3 outbound connection from your delivery controllers and director and you won't have to leverage workspace to get that performance analytics data. So a real solution for those customers that are truly on Fram virtual app and desktop sites today. Maybe you can't get to work space because there's a certain capability around authentication that you're working for. But you really want to start taking advantage of analytics to gain some additional

visibility. This is your path to do it. And obviously if you're already a virtual app and desktop cloud service or workspace premium. It's a pretty simple process that and it's going to walk us through and and show us how it looks awesome. Thanks Ryan. So, how do we go ahead and get started? Right? That's I'm sure all of you guys are like this sounds awesome. But how do I get it in my environment? So the first thing is for security analytics we do need Counts. If you don't have one go to Citrix cloud and get your account and then like Ryan mentioned it will actually do a

discovery of all the services that you already have one in your workspace, exclusive for security analytics and you're going to go on and turn it exclusively that data processing on right? We don't turn it on by default. We want you to decide which date a week after for you. And which date are you want to be a part of your analytics service all the time going to go through it. No talk to show you step-by-step of what that looks like for your efforts work space and once he do that so that you could take those actions that we that

we're going to talk about your going to have to install on AJ on your delivery controller. And again, I'm going to quickly go through these screenshots, but then we're going to go through a blond. Emma with me actually stepping through the configuration. So the first thing first you'll see that the configuration is incomplete. It's going to prompt me to configure an agent once I download the agent you'll see In the demo light the next Mex finish very easy, and we'll ask me for a credentials for that specific delivery controller. Then I'll ask me to enter the director URL so that you

are all that you used today to active directory on Prime. And once I do that I completed the configuration. So it really is very simple to get started. Especially if you're already a workspace customer and are utilizing some of our service for looking at moving into work today. This is a tool that we highly recommend you look into. I'm like we talked about for performance analytics and made a really awesome announcements that you don't even need to be on work space today. You could utilize fat by just being a full-on Prime customer feel like crying mention four performance analytics

specifically, you won't even have to be on the workplace in order to start taking advantage of performance analytics emergency is what what if I'm in ltsr ShopRite that was a CR build. So this is something that's being evaluated for consideration and up an upcoming ltsr how to get started. So if your console is a Citrix cloud service into the cloud console go into analytics one of the cool things that I think just across our our Cloud platform is really good at describing what we're doing and getting you videos and steps of how to do it. So you'll notice the first time I log on

Welcome to the birthday cakes you can do with demo or just go ahead and get started. So for now we're going to go ahead and get started. If you notice I know it's hard but in the upper right hand corner is going to start discovering those data sources. So again any Citrix Services, I have integrated into workplace that will automatically discover them. You will have to go and explicitly enable the date of processing because again, we don't want to make those decisions for you. So we want to make sure that you decide which day they were processing for the first option desktop, you'll notice that

it has a little yellow triangle saying that the configuration is incomplete just because I mentioned for the on-premise for Tots and desktops. We do need to have an agent installed in order to be able to take action once he set up some of those rules and so we're going to go ahead go into the configuration in complete and install and configure the agent. I am logged into this delivery controller. So I wouldn't be switching back and forth on some downloading the agent to the delivery. Controller for my on Prime site. So once I do that, it's a pretty easy next next finish.

And once I finish that I'll be able to connect to that install agents will give me that option. If now connecting to the agent that I just installed on my delivery controller. We do recommend for high availability in this demo. I only show four 1 delivery controller, but we would recommend you repeating this process on other delivery controllers for AJ purposes of account that you utilize for that delivery controller. So I'm going to go ahead and type in my credentials think I forgot type in my username. So I went back and did that so I'll go

ahead and hit And once I want once I do that, I will verify my credentials and I'll ask me just like I showed him the screenshots to provide the director. You are all that. I have an order to get some of that information. So I'll go ahead and real quick type in the director URL. And once I do that, I'll be able to review my configuration and say that configuration and again, you would repeat this process across your delivery controllers just to let you have the high availability one thing to know Ryan talks about the date of attention. We keep that for 13 months in the same pain, you

could go and turn off the data retention, but the data that we already captured we are retaining that for the 13-month. So just because you go and turn it off doesn't mean that we're going to go in flush all that data that we've already captured. So something for you guys to keep in mind. And that's it. It's as easy as that for security analytics. So you go you turn on the data processing and then you install an agent pretty easy right? I could do it. So I think it's pretty easy awesome. So what we're not going to break it down between security performance

in operation. So Ryan is going to get us started on the security piece know you're too many of you starting from sort of left to right. We've got our data sources feeding into the analytics engine those data sources are essentially broken down logically by access content apps and network. Those data sources are then run through the analytics machine learning processing model in addition to the administrator configurations, like manually saying that hay if they do this we stay should be added to a

watch list or what-have-you and ultimately it results in red Amber green view of the user's wrist or so the higher the number the higher risk of the user the the lower the number the lower risk of the user and it's important understand that this risk score can go both directions Rite Aid. Can Elevate and then as those risky events age out in the user's Behavior starts to change that they can dilute back out in that number can come back down. So how the risk or works again and everything starts with the data sources and the information that were

collecting but we already talked about sort of the the AI element of it. There are also administrator configured policies user Behavior. So establishing a baseline for what that user typically does and then depending on some of the other pieces of the solution that we may choose to enable like active directory integration. We may also have the ability to build information about this user Pier group and normalize them against the behavior that their peers are conducting so that combination is ultimately what results in those high medium and low scores high is

anyting 9291 to 100 medium that 71 and 90 range and low is below 70. So the policy configurations are all if-then statements. So if we look at some examples here. Can we build out the slide into some of the common ones like we will demo in a minute the user attempt to access a blacklisted URL. Let's add them to a watch list so that we know they they did that. We don't necessarily have to go and pick the user out or do something. That's that's really invasive to their ability to work

but we should at least know that that was happening. Right and I think that's a common theme here when you look at the stop on the right is there not all hard action. So when I talked earlier about the the balance between user experience in security, if for example someone is downloading files excessively and I decide to go in expire all of their share filings because I think they might try it be trying to exfiltrate data for my organization the worst case scenario. There is it was a valid business case and they have to go recreate the link when the recipient says hey that this link says

it's invalid. We haven't stopped them from working blocked access restricted login or anything like that. So there's that balance between what we're doing and sponsor the user's Behavior and the impact of the business So a quick demo here on how these rules work. So starting out in the analytics console from an administrator's perspective. Got to start the demo. That's the first step will go up into the policies configuration under settings and will create a new policy. So the condition we're going to select here is that if a user attempt to

access a blacklisted URL then as we discussed earlier, we want to make sure that we're going to go ahead and add them to that watch list so that we can go and talk to their manager or whatever we decide to do with that information. So we did have to explicitly enable at at the bottom there. That's something I've done incorrectly a few times myself so that if we hop over to access control, this is where you're actually configuring those blacklisted in whitelisted you are else so you can either go in manually specify them as we've done here. We've also got categories that are

available. You can kind of see at the bottom of the screen so you can say hey if they go to any of these websites that fall into these categories that are free to find those should also be blacklisted. So take some of the manual configuration away. Now if we jump over to the user's perspective, we're going to go ahead and launch a browser. This browser is going to launch in the Citrix secure browser service. So that's a linux-based vda that runs in a cloud service. That Citrix is hosting for you. The other nice thing here is this user just needs a web browser. I'm sure many of you have

applications that are just web apps for publishing Ivy and consuming an RDS Cal to do that in this model. You don't have to consume that RDS Cal but there's a real cost savings to the business there. So, you know as the user goes and browsers to Yahoo, which for whatever reason our business has decided is super dangerous. You can see that they get blocked and they're not able to get there. So let's jump back over to the the admin view here and take a look at what that changed. So you can see already there in the first view that there was a plus 40 on this user's risk score if we

know who we're looking for we can just go dive into the user be right and once it loads up for us we can see that hey aside from what we did analytics thought that that wasn't normal to borrow from this the title of the section and added to their risk or so. We also explicitly is an administrator said, hey, let's put them on a watch list. So both of those popped up, so he's going to know which users are doing bad things. So there's also a watch list view where you can just go jump into that watchlist see who got at it and go back historically over the period of a week a

month to see who falls into this category in if there's a trend starting to build where you know, there are real risk to your organization. And if you don't know what you're looking for all together, we also have the ability to search You can search based on those data categories that we talked about before so things like access content virtual apps and desktops and you'll see all that information appear right there on the console for you based on your search criteria and here you would get specifically exactly what security

model you would be able to see all the details of what workouts during for that specific user. So if someone even wants to do something as simple as like a sanity check on hey, what day does being gathered of gathering information about our users that we want to handle in a different way? It's a good way to sanity check in. So third-party Integrations, the first one we'll talk about is Microsoft intelligent security graph integration. So how many folks are either using as your ID ID protection or Windows Advanced threat protection is part of their

environment today any got one in the back a couple in the way back and I'm one up here. So you're four of you. So pretty cool integration point to the point where we can take a look at the IP that users coming in from and did they move in some manner that's impossible. You know, they were on the west coast of the US and then all of a sudden there in A jar somewhere in that happened in the course of an hour. We can establish that the user is accessing from a machine that has malware or ransomware installed on it and we can then adjust their risk score based on that information. So

pretty cool integration with a quote-unquote non Citrix data source to help us be a little bit more intelligent about that risk score. But this is the one that I think comes up most often when I talk to customers is all of this is cool. But like I'm not the security Center in my it organization. I am a data source for the security Center my it organization. So I love having this view of my user base and being able to be proactive with my security team. But I also got to get them this data and some centralized fashion infants blank is one of the the most common centralized seem

services that we see out there so you can take all this valuable data that we're Gathering and pipe it out Splunk so that your security team can process it in whatever manner they see fit. And last but not least is active directory is a datastore. So this one's a little bit of a consideration from a pii perspective personally identifiable information in terms of what we're Gathering about our end users. But what this allows us to do is help build a more intelligent job profile about the end-user right so that we know things about their organization their office location and who else is in

their organization. So when we're trying to make those map things between them and what other users like them do we have a little bit more information to do that with and again, this can be explicitly enabled or disabled. Play I know you want to talk a little bit about performance analytics for us a couple of days ago already. So you all heard the man. I know I'm very excited about we've been hearing it internally and tell him he bailed out this slide super quick so that we don't have all these animations

coming out in full on caffeine in animation mode anyway, so the user will go into their workspaces the original version of performance analytics that will kick off with will be specifically talking to her product managers. I know that we're looking to expand that just like with security analytics up other data sources to let you get that information for so you'll be able to do as well mention earlier. You won't even need to be on work space for your on-premise environment in order to consume performance analytics and you're going to get comprehensive data.

Way as well as infrastructure, so giving you a lot of insight into your environment and that you can proactively act upon that inside and be able to give your users the best experience possible and also take advantage and make sure that you're using your infrastructure wisely. And I think the coolest thing is that we had a lot of people in the room who mentioned that they had multiple sites in their environment today. So I cry I mentioned earlier I think one of the biggest challenges with our customers is that you know director is great and you got awesome information, but you need to

go in and look at it individually per site. You don't have that overall View and performance analytics will not give you that. Overall view of your environment or if you want to look across your multiple sites, you will be able to get that one out of every two customers I go to I feel like so that that's definitely a huge asset. Yep. So some of the things I will be able to see is like your user session. So how many users are accessing your environment you'll be able to filter that is across your entire site or if you want to just look at a specific site like you

wouldn't drive at 3. So I have that ability to do so. I know sometimes it is important to just look at a specific site of not your entire environment. So you will be given that flexibility. The other thing that we're going to be doing is we're going to actually be rating those experiences for you so that you can see who is having an excellent experience who is having up their experience and in poor experience and Advil PM and Emma were actually going to give you an end-user experience Court that's going to have many factors that go into it. And then from there you'll be able to proactively

take actions in order to hopefully get the majority of your user experience bucket. And I'm from an infrastructure perspective are also going to give you visibility into your infrastructure availability to make sure that you're utilizing that effectively so are your BTS healthy are they being over utilize are they being underutilized and will give you the tools that if you need to go to upper management you now have all this data and information. I know a lot of times when I was working with customers. That was their biggest complaint is we know what we need, but we need data

in order to go to Upper Management, Missoula buy more removed and show them right and now it's performance analytics. We're giving you those tools and empowering you tough to have that information readily available. And so how did these are experience work right very similar to that performance analytics user experience will be going in and taking different metric right? We're taking a different perspective from the security piece were looking right the performance of were looking at latency ma conservation failures reconnection and taking all of that and giving you a user experience

score that you'll be able to dive deeper into to see what your users are experiencing and again proactively be able to take actions on your environment before they come and complain that Citrix is broken or slow. So I take a look at what that looks like. So if we look all the way on the right hand side, you'll see the user experience score factors will actually be able to drill down even deeper still like the idea round trip time, log on to Regions failure video a load CPU and memory and again, we're going to rape those between Iceland fair and poor so you can see this for all your

side's but also brought down maybe there's a specific site. That's really, you know, having a poor user experience and you need to focus on that site in order to improve their experiences. Well, you'll be able to look at it historically as well as are just like in director, you will have that historical View at your environment and you'll be able to look at your user sessions. Right? How many users are connecting across my environment? You'll be able to look at your round trip time. Right? So all the information a lot of this information is already in director of but now we're giving

you not only the the tool to view it across site for also rating this for you to make it easier to consume and to be able to Move your environment, which I think is its Fusion something that a lot of customers can take advantage of it. And if you don't have your magnifying glasses at the bottom of each value there you can see how it's like how fair or poor as measured right? So either at milliseconds or seconds or whatever. The metric is top perspective again similar

to the user experience will be able to nail that down per site and again A lot of times you want to see how you know actively you're using your infrastructure. Is it being overused underuse and being able to make accommodations and not regard are some of your video is under maintenance are too many under maintenance at one specific time are there, you know BDA that are unregistered and being on used at the time. So, what can we give you guys in order to make your environment the best I can be so that your users are in calling you all the time saying that they're Citrix doesn't work.

Already so from an operations perspective last but definitely not least and fill this out to operation put it gives you is the ability to view access control and to view the total number of domains that your users are accessing within your network the data that they're uploading the data that they're downloading and give you an again a very easy view for you two to consume this. So this may be a little small but these lights will be available so that you will have these screenshots on the left hand side. You see it based on user operation. So both sides is essentially the same

information Justice League differently rides on the left hand side. We have it per user. So what are my top users per Transaction? What are my users that are downloading a lot of data? And then I'm the right hand side we have that propagation. So what are the top toe means that my users are accessing here in the demo environment. They're asking Facebook a lot. Maybe I should go and block that because you're not being very productive right? And so it gives you What to look at the information and what your users are doing with services that you're already consuming today with Citrix

workspace. The Ryan why don't you take us home? Let's go through not only what we covered today, but we've covered and so full heat guide. Johanns. Did anybody attend? All 10 Geeks guides? We have like three that's what the over-under was. I didn't win. So we started out with the Gateway service talking about I see a proxy and SO2 assassin web apps. From there. We layered in for that general purpose use case right access control the ability to control the browser and the use of SAS applications,

which is a capability that we have in workspace maybe a little different than what you're used to if you're just thinking of work space is a direct Cloud analog of storefront. It definitely does more after that. We talked about securing the endpoint itself. So securing the back end in the date on the apps is a piece of the puzzle, but if we can't take actions on the device itself if it's lost or stolen or jailbroken, we don't have that visibility that can be a gap for us. So then that was the next piece of the workspace that was added again still in that single pane of glass of

you regardless of the platform that were on And then last but not least we added content collaboration. So it's great if my work follows me everywhere, but the second if someone sends you that email. Hey, can you send me the PowerPoint presentation from yesterday? And you're on the go and you don't have that content with you? There's a huge chunk of your work that you can't do. So another critical piece of the work space and also a very different view than what folks are used to if you're just used to let the storefront experience. And then of course last but not least the analytics

piece, which is what we just spent the last half an hour on so if you don't know what that piece is yet you were probably not awake. The ultimate goal here is a single-pane-of-glass experience to the user that allows them to be more productive by bringing all of the different tasks that they're trying to perform in different locations together. And in a manner that allows us to wrap a layer of security around it and then understand what the users experience quality looks like on the back and when they're interacting with that workspace experience till now after the

announcement, you'll be able to add the intelligence teacher that we're bringing in later this year. So not only will he get all this awesome functionality for your end users and I will be able to do a lot of that intelligently as well. Yeah, good point. So mighty key takeaways hear it if you only remember a few things, I think the first one is that there is value for on Prime customers as well. Analytics is a cloud-based service, but it's not only for customers that are consuming virtual app and Desktop Service or Gateway service or your general purpose SAS. It has value for the

on-prem virtual app and desktop customer or xenapp. Send us Talk customer as well users don't need to come through workspace to get performance analytics data. They do for security analytics, but not the performance analytics piece of things. Are they getting out of it? And we've had these announcements energy analytics is about more than just security as well. But also trying to get disability from the operational perspective and a performance perspective. And then if you can layer on workspace on top of it, that's when you get the full Suite of added features and functionality.

So and I think the last note to hear the part of what makes analytics a little different than some of the other security tools out there isn't it always doesn't have to be an opposition of security and user experience as we saw some of their controls like starting session recording is a pretty soft control from an end-user experience perspective. We're not interrupting their ability to work but we are taking action based on something risky that they did so that we have the ability to go back and look at it in case it becomes the rest of the business. I'm going to a dinner now. I think

you did a great summary of then. All right. Well, then we will give people six minutes of our time back. Please take the time to write the session and I know that this is something that I think I saw Martin back there. He's worked really really hard on. So text villain is chock-full of awesome content that's been written by some of the folks in Citrix that do the most interacting with some of our most challenging deployments. There's a lot of great leading practices on their reference architecture. So if you haven't seen it yet definitely go check it out. There's a lot of great

information in there and we both expect phone in case you forget where to go. We have stickers up here. So if there's any questions, feel free to go to the Mike's or come up here and we'd be happy to answer those for you. But thanks again for coming enjoy happy hour enjoy the party tonight. And so and this is a last session of synergy and of Disguise. So, thank you guys for coming.

Cackle comments for the website

Buy this talk

Access to the talk “Citrix Synergy TV - SYN235 - Geek's guide to the workspace (part 10): analytics thinks that's not...”
Available
In cart
Free
Free
Free
Free
Free
Free

Access to all the recordings of the event

Get access to all videos “Citrix Synergy Atlanta 2019”
Available
In cart
Free
Free
Free
Free
Free
Free
Ticket

Interested in topic “Software development”?

You might be interested in videos from this event

September 28, 2018
Moscow
16
157
app store, apps, development, google play, mobile, soft

Similar talks

Praveen Raghuraman
Director, Product Management at Citrix
+ 1 speaker
Bala Swaminathan
Sr. Manager - Product Development at Citrix
+ 1 speaker
Available
In cart
Free
Free
Free
Free
Free
Free
Sameer Mehta
Sr Director PM, Performance & Security Analytics at Citrix
+ 1 speaker
Jitendra Deshpande
Vice President, Cloud and Server Engineering at Citrix
+ 1 speaker
Available
In cart
Free
Free
Free
Free
Free
Free
Mathew Varghese
Director of Product Management at Citrix
+ 1 speaker
Jim Regetz
Director of Data Science at Citrix
+ 1 speaker
Available
In cart
Free
Free
Free
Free
Free
Free

Buy this video

Video

Access to the talk “Citrix Synergy TV - SYN235 - Geek's guide to the workspace (part 10): analytics thinks that's not...”
Available
In cart
Free
Free
Free
Free
Free
Free

Conference Cast

With ConferenceCast.tv, you get access to our library of the world's best conference talks.

Conference Cast
551 conferences
21655 speakers
8015 hours of content