Duration 39:24
16+
Play
Video

Citrix Synergy TV - SYN235 - Geek's guide to the workspace (part 10): analytics thinks that's not...

Ana Ruiz
Technical Marketing Architect at Citrix
  • Video
  • Table of contents
  • Video
Citrix Synergy Atlanta 2019
May 23 2019, Atlanta, GA, United States
Citrix Synergy Atlanta 2019
Video
Citrix Synergy TV - SYN235 - Geek's guide to the workspace (part 10): analytics thinks that's not...
Available
In cart
Free
Free
Free
Free
Free
Free
Add to favorites
237
I like 0
I dislike 0
Available
In cart
Free
Free
Free
Free
Free
Free
  • Description
  • Transcript
  • Discussion

About speakers

  • Ana Ruiz
    Technical Marketing Architect at Citrix
  • Ryan McClure
    Head of WW Customer Success Engineering at Citrix

About the talk

Topic: IT

Most of us are unaware of the patterns and behaviors that influence our world, but when a pattern changes, it can directly impact each of us. Identifying patterns can be useful in predicting spikes in usage and potential security risks. Over the years, credit card companies developed algorithms to identify when your account is compromised. See how you can do the same within your Citrix Workspace environment. In this session, we will look at how a user's Workspace behavior provides insights into potential malicious activities and how changes in patterns can trigger countermeasures to protect the user, the content, and the business.Note: This session will be live-streamed during the event and available for on-demand viewing post-event on Citrix Synergy TV.

Share

Alright, let's go ahead and get started. So first thanks to everyone who decided to spend their last section of the day with us talking about 00:05 analytics rather than heading to the bar early. I'm going to question your priorities a little bit, but we appreciate it. Nonetheless. So a little bit 00:11 about us, so my name is Ryan McClure on the lead architect with the customer success team. My background is in Consulting. I'm based out of Chicago. 00:21 I've been with Citrix 8 plus years now, so my job is essentially to make sure that customers are realizing value out of their Investments, which 00:29

is kind of why I'm here to talk about analytics specifically because I feel like it's a really important in high value load challenge level feature 00:39 that customers can take advantage of at to do just that with their investment without having to do something like overhaul how you're delivering 00:48 virtual apps and desktops that may be a little bit more complex for you to execute right? So some other interesting facts about me. I'm a u Miami 00:56 grad. I like college football a lot. So I am often disappointed in the outcome of Miami football games, and I probably the only thing more 01:05

disappointing than that is my golf game, but I try my best Awesome, and I'm Anna Marie's. I'm a technical marketing Architects if you were here 01:13 yesterday, I already did the first one of these also U, Miami grad. So cocaine to know it's going to be a good session is for both hurricanes 01:23 delivering this presentation prior to that. I used to be a sales engineer actually see some of my customers old customers here. So shout 01:31 out live in Dallas with my husband and my one-year-old one-year-old daughter. So my status quo is now always tired, so don't take it 01:41

personally. So before we get into the media content, we wanted to kind of get a feel for where everyone is in their Journey. So if I show of 01:50 hands how many folks are actually using in production at least one Citrix cloud service today could be anything. Alright a handful 02:00 of you. Have already deployed specifically workspace the workspace service or are planning to over the course of the next year. Let's say 02:10 I want more of you. How many of you feel like in your existing environment whether it be on Fram or Cloud you have visibility gaps in your Citrix 02:21

environment. The business comes back to you and says hey, we got a Citrix problem. You know, it's a network problem, but you can't prove it, right? 02:30 everybody shocking and how many folks have more than one cider Farm deployed across their various Loco que 02:38 almost all of you again and last but not least how many folks think that analytics is just a buzzword. All right, so hopefully we're going to dispel 02:47 the last one and explain the way that analytics can help solve some of these other challenges for you and potentially be the first one of those Citrix 02:56

cloud services that you can adopt to start realizing value out of that investment. Alrighty, so if you were here for our previous previous section 03:04 we talked about I steal an HDX off of my face and where any of you guys here for such a 9 all right for a recipe that weren't all of the geek's guide 03:14 session have been recorded So if you didn't attend I encourage you guys to go back and look at that time great content over the past two days, but 03:23 like Ryan might focus on analytics. We're going to talk about machine learning how we can secure environment better and also from performance 03:32

perspective. We had a big announcement. Yes, they got two days ago. Now, I'm around performance inauguration how you guys can utilize it today? So, 03:40 where are we in our work space filled? We talked about Seth and web and how you can integrate that into your Citrix workspace. We talked about 03:50 content, right? If you don't have constant following you everywhere. Your apps are pretty useless in my opinion. We talked about endpoint management. 03:59 How can you secure the and coins for which our users are accessing your workspace? We talked about having a unified app catalog right so that your 04:08

users got that consistent user experience no matter where they're accessing their Works based from We talked about securing your environments are your 04:17 network we talked about that consistent user experience, but we have a really big up here and that's where analytics comes in right through analytics. 04:25 You want to give you the visibility into your environment not only took accurate proactively but also to give your users the best user experience 04:34 possible. So before they pick up the phone and complain and say hey, my Citrix is broken. My foot hurts to swallow. My Citrix doesn't work, which I'm 04:42

sure we have all heard in the past. Can we give you guys Fulton visibility into your environment in order to prevent that in proactively fix or 04:50 Optimizer environment? So if you guys don't know what this is, this is Citrix workspace and it allows your 04:59 end users to access your apps that stop them files. No matter where they are. It allows me to have a work space that is device-independent. So I'm no 05:08 longer tied to a specific endpoint in order to be productive. I can be productive on the go and so throughout the office work space for you. We are 05:18

still deep into the different sections and different topics that make up the work space. So again, if you weren't able to attend in these past two 05:27 days, I encourage you guys to check back and look at all the recording what analytics are going to talk about securing it, right? So again, how can we 05:34 secure environment? How can we make sure that add your users are going from device to device your intellectual property remain secure and again, how 05:42 can we ensure that your end users have the best experience possible? And so this is where analytics fits in right-center to analytics talk to all the 05:50

different services that make up the work space in order to give you the visibility that you need at the administrators to make your environment grade. 05:59 And tell Ryan why don't you go through? I know you work with a lot of really large customers why I should be so scared about analytics. And what is 06:07 analytics to begin with his kind of piece by piece. Right? So the piece that I think everyone is most familiar with because it's been out the longest 06:16 is the security analytics be so I'm sure over the course of the you know, last 18 to 24 months. I all of your organizations have started to increase 06:24

focus on security if it wasn't already top of mine for you before but when you look at some of the trends in terms of breaches that occur over the 06:33 course of time you can see that human are a big chunk. But then we got a quarter that's fishing another almost quarter that's ransomware lost devices 06:41 are 20% There's there's no one culprit every time so how can we help automate the analysis of this nearly 200,000 events that 06:49 most customers are seeing on average rather than requiring human intervention. Every time I start to generate some Trends on on what normal looks 06:59

Flight versus what's an anomaly and then start to respond to these in an automated fashion. And what are the other things I hear a lot is a big 07:07 portion of the user base that access to my Citrix environment today their internal. They're not the threat to my organization write the threat to my 07:15 organization is external that's becoming an egg is Big A misconception now is ever in the industry. So 28% I am starting to venture from a quarter to 07:24 a third of breaches over the course of 2018 were perpetrated by internal actors. These are people that already have access to your network and some 07:34

legitimate business purpose for being there. So analytics is just another tool are toolbox. It's not uniquely targeted the internal users, but helps 07:42 us gain visibility into that user community. That is a real threat. So once we have an understanding of the 07:51 security implications of a user interacting with our environment, we also want to know that security and user experience can't always be at odds. They 08:00 can't always be polar opposite. So what's their experience look like? How is there interaction with the workspace performing and that's really what 08:09

performance analytics is all about. So you see a list of tools up. These are certainly not the only ones out there but there's some of the most common 08:17 ones that we see our large Enterprises to playing to gain visibility into some specific part of their environment that they had a gap in two before 08:24 the challenge can be that these are distributed tools and you don't necessarily even know where to look when you have an issue with her or know where 08:32 to start. So that's one of the things that performance analytics can do is help aggregate that data into a single view give you an understanding of 08:41

how do I have a log on time speed issue with my user say that Citrix is broken or Citrix is slow. Do I have a network latency issue? Where do I even 08:49 begin right and the other thing for those of you that will raise your hand about having multiple sites in farms as whether you're using director or 08:58 some other tool most of those give you single site or single Farm views of your environment today. You have to go back and forth between consoles or 09:06 drop down tabs. It can be kind of painful to dig up what you're looking for. So performance analytics is going to give you that visibility across 09:15

multiple sites unlike director unfriended a right. So they're all going to aggregate into a single view. You can look at them an aggregate or you can 09:23 look at them individually. Last but not least is operations analytics. So it's great to understand how we can further secure our environment how it's 09:31 performing. But then we also need to know what our users are doing. What applications are they using? What websites are they going to how much 09:40 bandwidth are they consuming those sorts of things? So when we look at this architectural e kind of left or right here at your starting with the user 09:46

interacting with a device and ultimately they're interacting with one of the data sources right to those data sources are our cloud services those 09:56 cloud services send feed logs in various forms into the analytics database and analytics interacts with those to establish Trends 10:04 and determine outcomes. Some of the these are administrator configured others will be generated based on Trends machine learning algorithms and and 10:14 the light right. So when we talked about data retention, I think that's another thing that commonly comes up as a question when we talk about 10:22

analytics what data is obtained and how long is it stored? So all of these data sources are off by default and you go explicitly 10:31 enable them. So you have total control over what day is being gathered from what services and by default it'll be retained for a. Of 13 months. 10:40 So again, as we discussed those logs are then transmitted to that database and the key part. Here's that were then taking action on 10:51 an information rather than just collecting information and doing nothing with it. So supported data sources, you can see that a good number of these 11:01

are services. But we also have the ability to gather data from some on-prem deployments for customers there in that hybrid scenario, which is where a 11:10 lot of our customer base is today so we can gather information from a non-prime Gateway. We can gather information from a non-prime virtual app and 11:19 desktop site. So some of you have probably had that conversation and say wait a minute. There's a catch there. I need to be using workspace to get 11:27 security analytics off of my on-prem virtual app and desktop site. And that's where there's an exciting announcement that we're working towards right 11:35

that as part of performance analytics in an upcoming version of virtual app and Desktop Service, you'll be able to upgrade to that version establish a 11:44 4.3 outbound connection from your delivery controllers and director and you won't have to leverage workspace to get that performance analytics data. 11:52 So a real solution for those customers that are truly on Fram virtual app and desktop sites today. Maybe you can't get to work space because there's a 12:00 certain capability around authentication that you're working for. But you really want to start taking advantage of analytics to gain some additional 12:09

visibility. This is your path to do it. And obviously if you're already a virtual app and desktop cloud service or workspace premium. It's a pretty 12:15 simple process that and it's going to walk us through and and show us how it looks awesome. Thanks Ryan. So, how do we go ahead and get started? 12:24 Right? That's I'm sure all of you guys are like this sounds awesome. But how do I get it in my environment? So the first thing is for security 12:31 analytics we do need Counts. If you don't have one go to Citrix cloud and get your account and then like Ryan mentioned it will actually do a 12:38

discovery of all the services that you already have one in your workspace, exclusive for security analytics and you're going to go on and turn it 12:47 exclusively that data processing on right? We don't turn it on by default. We want you to decide which date a week after for you. And which date are 12:55 you want to be a part of your analytics service all the time going to go through it. No talk to show you step-by-step of what that looks like for your 13:03 efforts work space and once he do that so that you could take those actions that we that 13:11

we're going to talk about your going to have to install on AJ on your delivery controller. And again, I'm going to quickly go through these 13:21 screenshots, but then we're going to go through a blond. Emma with me actually stepping through the configuration. So the first thing first you'll see 13:26 that the configuration is incomplete. It's going to prompt me to configure an agent once I download the agent you'll see In the demo light the next 13:34 Mex finish very easy, and we'll ask me for a credentials for that specific delivery controller. Then I'll ask me to enter the director URL so that you 13:41

are all that you used today to active directory on Prime. And once I do that I completed the configuration. So it really is very simple to get 13:50 started. Especially if you're already a workspace customer and are utilizing some of our service for looking at moving into work today. This is a tool 13:59 that we highly recommend you look into. I'm like we talked about for performance analytics and made a really awesome announcements that you don't even 14:07 need to be on work space today. You could utilize fat by just being a full-on Prime customer feel like crying mention four performance analytics 14:17

specifically, you won't even have to be on the workplace in order to start taking advantage of performance analytics emergency 14:25 is what what if I'm in ltsr ShopRite that was a CR build. So this is something that's being evaluated for consideration and up an upcoming ltsr 14:35 how to get started. So if your console is 14:44 a Citrix cloud service into the cloud console go into analytics one of the cool things that I think just across our our Cloud 14:53 platform is really good at describing what we're doing and getting you videos and steps of how to do it. So you'll notice the first time I log on 15:03

Welcome to the birthday cakes you can do with demo or just go ahead and get started. So for now we're going to go ahead and get started. If you notice 15:11 I know it's hard but in the upper right hand corner is going to start discovering those data sources. So again any Citrix Services, I have integrated 15:18 into workplace that will automatically discover them. You will have to go and explicitly enable the date of processing because again, we don't want to 15:27 make those decisions for you. So we want to make sure that you decide which day they were processing for the first option desktop, you'll notice that 15:36

it has a little yellow triangle saying that the configuration is incomplete just because I mentioned for the on-premise for Tots and desktops. We do 15:43 need to have an agent installed in order to be able to take action once he set up some of those rules and so we're going to go ahead go into the 15:53 configuration in complete and install and configure the agent. I am logged into this delivery controller. So I wouldn't be switching back and forth on 16:01 some downloading the agent to the delivery. Controller for my on Prime site. So once I do that, it's a pretty easy next next finish. 16:09

And once I finish that I'll be able to connect to that install agents will give me that option. If now connecting to the agent that I just installed 16:18 on my delivery controller. We do recommend for high availability in this demo. I only show four 1 delivery controller, but we would recommend you 16:27 repeating this process on other delivery controllers for AJ purposes 16:35 of account that you utilize for that 16:39 delivery controller. So I'm going to go ahead and type in my credentials think I forgot type in my username. So I went back and did that so I'll go 16:49

ahead and hit And once I want once I do that, I will verify my credentials and I'll ask me just like I showed him the screenshots to provide the 16:58 director. You are all that. I have an order to get some of that information. So I'll go ahead and real quick type in the director URL. And once I do 17:07 that, I'll be able to review my configuration and say that configuration and again, you would repeat this process across your delivery controllers 17:17 just to let you have the high availability one thing to know Ryan talks about the date of attention. We keep that for 13 months in the same pain, you 17:24

could go and turn off the data retention, but the data that we already captured we are retaining that for the 13-month. So just because you go and 17:33 turn it off doesn't mean that we're going to go in flush all that data that we've already captured. So something for you guys to keep in mind. And 17:39 that's it. It's as easy as that for security analytics. So you go you turn on the data processing and then you install an agent pretty easy right? I 17:47 could do it. So I think it's pretty easy awesome. So what we're not going to break it down between security performance 17:56

in operation. So Ryan is going to get us started on the security piece know you're too many of you starting from sort of left to 18:06 right. We've got our data sources feeding into the analytics engine those data sources are essentially broken down logically by access 18:16 content apps and network. Those data sources are then run through the analytics machine learning 18:25 processing model in addition to the administrator configurations, like manually saying that hay if they do this we stay should be added to a 18:34

watch list or what-have-you and ultimately it results in red Amber green view of the user's wrist or so the higher the number the 18:43 higher risk of the user the the lower the number the lower risk of the user and it's important understand that this risk score can go both directions 18:53 Rite Aid. Can Elevate and then as those risky events age out in the user's Behavior starts to change that they can dilute back out in that number can 19:00 come back down. So how the risk or works again and everything starts with the data sources and the information that were 19:09

collecting but we already talked about sort of the the AI element of it. There are also administrator configured policies 19:18 user Behavior. So establishing a baseline for what that user typically does and then depending on some of the other pieces of the solution that we may 19:27 choose to enable like active directory integration. We may also have the ability to build information about this user Pier group and normalize them 19:36 against the behavior that their peers are conducting so that combination is ultimately what results in those high medium and low scores high is 19:45

anyting 9291 to 100 medium that 71 and 90 range and low is below 70. So the 19:54 policy configurations are all if-then statements. So if we look at some examples here. Can we build out the slide 20:03 into some of the common ones like we will demo in a minute the user attempt to access a blacklisted URL. Let's add them to a watch list so that we 20:13 know they they did that. We don't necessarily have to go and pick the user out or do something. That's that's really invasive to their ability to work 20:23

but we should at least know that that was happening. Right and I think that's a common theme here when you look at the stop on the right is there not 20:31 all hard action. So when I talked earlier about the the balance between user experience in security, if for example someone is downloading files 20:38 excessively and I decide to go in expire all of their share filings because I think they might try it be trying to exfiltrate data for my organization 20:48 the worst case scenario. There is it was a valid business case and they have to go recreate the link when the recipient says hey that this link says 20:55

it's invalid. We haven't stopped them from working blocked access restricted login or anything like that. So there's that balance between what we're 21:02 doing and sponsor the user's Behavior and the impact of the business So a quick demo here on how these rules work. So starting out in 21:11 the analytics console from an administrator's perspective. Got to start the demo. That's the first step will go up into 21:21 the policies configuration under settings and will create a new policy. So the condition we're going to select here is that if a user attempt to 21:31

access a blacklisted URL then as we discussed earlier, we want to make sure that we're going to go ahead and add them to that watch list so that we 21:39 can go and talk to their manager or whatever we decide to do with that information. So we did have to explicitly enable at at the bottom there. That's 21:47 something I've done incorrectly a few times myself so that if we hop over to access control, this is where you're actually configuring those 21:55 blacklisted in whitelisted you are else so you can either go in manually specify them as we've done here. We've also got categories that are 22:04

available. You can kind of see at the bottom of the screen so you can say hey if they go to any of these websites that fall into these categories that 22:12 are free to find those should also be blacklisted. So take some of the manual configuration away. Now if we jump over to the user's perspective, we're 22:18 going to go ahead and launch a browser. This browser is going to launch in the Citrix secure browser service. So that's a linux-based vda that runs in 22:27 a cloud service. That Citrix is hosting for you. The other nice thing here is this user just needs a web browser. I'm sure many of you have 22:36

applications that are just web apps for publishing Ivy and consuming an RDS Cal to do that in this model. You don't have to consume that RDS Cal but 22:44 there's a real cost savings to the business there. So, you know as the user goes and browsers to Yahoo, which for whatever reason our business has 22:53 decided is super dangerous. You can see that they get blocked and they're not able to get there. So let's jump back over to the the admin view 23:00 here and take a look at what that changed. So you can see already there in the first view that there was a plus 40 on this user's risk score if we 23:10

know who we're looking for we can just go dive into the user be right and once it loads up for us we can see that hey aside from what we did 23:20 analytics thought that that wasn't normal to borrow from this the title of the section and added to their risk or so. We also explicitly is an 23:29 administrator said, hey, let's put them on a watch list. So both of those popped up, so he's going to know which users are doing bad things. So 23:38 there's also a watch list view where you can just go jump into that watchlist see who got at it and go back historically over the period of a week a 23:45

month to see who falls into this category in if there's a trend starting to build where you know, there are real risk to your organization. And if you 23:54 don't know what you're looking for all together, we also have the ability to search You can search based on those data categories that we talked about 24:03 before so things like access content virtual apps and desktops and you'll see all that information appear right there on the console for you based on 24:10 your search criteria and here you would get specifically exactly what security 24:20

model you would be able to see all the details of what workouts during for that specific user. So if someone even 24:27 wants to do something as simple as like a sanity check on hey, what day does being gathered of gathering information about our users that we want to 24:36 handle in a different way? It's a good way to sanity check in. So third-party Integrations, the first one we'll talk about is Microsoft intelligent 24:43 security graph integration. So how many folks are either using as your ID ID protection or Windows Advanced threat protection is part of their 24:52

environment today any got one in the back a couple in the way back and I'm one up here. So you're four of you. So pretty cool integration point to the 25:00 point where we can take a look at the IP that users coming in from and did they move in some manner that's impossible. You know, they were on the west 25:10 coast of the US and then all of a sudden there in A jar somewhere in that happened in the course of an hour. We can establish that the user is 25:18 accessing from a machine that has malware or ransomware installed on it and we can then adjust their risk score based on that information. So 25:27

pretty cool integration with a quote-unquote non Citrix data source to help us be a little bit more intelligent about that risk score. But this is the 25:36 one that I think comes up most often when I talk to customers is all of this is cool. But like I'm not the security Center in my it organization. I 25:46 am a data source for the security Center my it organization. So I love having this view of my user base and being able to be proactive with my 25:55 security team. But I also got to get them this data and some centralized fashion infants blank is one of the the most common centralized seem 26:05

services that we see out there so you can take all this valuable data that we're Gathering and pipe it out Splunk so that your security team can 26:14 process it in whatever manner they see fit. And last but not least is active directory is a datastore. So this one's a little bit of a consideration 26:22 from a pii perspective personally identifiable information in terms of what we're Gathering about our end users. But what this allows us to do is help 26:30 build a more intelligent job profile about the end-user right so that we know things about their organization their office location and who else is in 26:39

their organization. So when we're trying to make those map things between them and what other users like them do we have a little bit more information 26:47 to do that with and again, this can be explicitly enabled or disabled. Play I know you want to talk a little bit about performance analytics for us 26:54 a couple of days ago already. So you all heard the man. I know I'm 27:02 very excited about we've been hearing it internally and tell him he bailed out this slide super quick so that we don't have all these animations 27:12

coming out in full on caffeine in animation mode anyway, so the user will go into their workspaces the original version 27:19 of performance analytics that will kick off with will be specifically talking to her product managers. I know that we're looking to expand that just 27:29 like with security analytics up other data sources to let you get that information for so you'll be able to do as well mention earlier. You won't even 27:38 need to be on work space for your on-premise environment in order to consume performance analytics and you're going to get comprehensive data. 27:48

Way as well as infrastructure, so giving you a lot of insight into your environment and that you can proactively act upon that inside and be able to 27:59 give your users the best experience possible and also take advantage and make sure that you're using your infrastructure wisely. And I think the 28:08 coolest thing is that we had a lot of people in the room who mentioned that they had multiple sites in their environment today. So I cry I mentioned 28:16 earlier I think one of the biggest challenges with our customers is that you know director is great and you got awesome information, but you need to 28:23

go in and look at it individually per site. You don't have that overall View and performance analytics will not give you that. Overall view of your 28:30 environment or if you want to look across your multiple sites, you will be able to get that one out of every two customers I go 28:38 to I feel like so that that's definitely a huge asset. Yep. So some of the things I will be able to see is like your user session. So how many users 28:48 are accessing your environment you'll be able to filter that is across your entire site or if you want to just look at a specific site like you 28:56

wouldn't drive at 3. So I have that ability to do so. I know sometimes it is important to just look at a specific site of not your entire environment. 29:03 So you will be given that flexibility. The other thing that we're going to be doing is we're going to actually be rating those experiences for you so 29:09 that you can see who is having an excellent experience who is having up their experience and in poor experience and Advil PM and Emma were actually 29:19 going to give you an end-user experience Court that's going to have many factors that go into it. And then from there you'll be able to proactively 29:28

take actions in order to hopefully get the majority of your user experience bucket. And I'm from an infrastructure perspective are also 29:36 going to give you visibility into your infrastructure availability to make sure that you're utilizing that effectively so are your BTS healthy are 29:46 they being over utilize are they being underutilized and will give you the tools that if you need to go to upper management you now have all this data 29:53 and information. I know a lot of times when I was working with customers. That was their biggest complaint is we know what we need, but we need data 30:01

in order to go to Upper Management, Missoula buy more removed and show them right and now it's performance analytics. We're giving you those tools and 30:08 empowering you tough to have that information readily available. And so how did these are experience work right very similar to that performance 30:15 analytics user experience will be going in and taking different metric right? We're taking a different perspective from the security piece were 30:23 looking right the performance of were looking at latency ma conservation failures reconnection and taking all of that and giving you a user experience 30:31

score that you'll be able to dive deeper into to see what your users are experiencing and again proactively be able to take actions on your 30:40 environment before they come and complain that Citrix is broken or slow. So I take a look at what that looks like. So if we look all the way on the 30:48 right hand side, you'll see the user experience score factors will actually be able to drill down even deeper still like the idea round trip time, log 30:57 on to Regions failure video a load CPU and memory and again, we're going to rape those between Iceland fair and poor so you can see this for all your 31:05

side's but also brought down maybe there's a specific site. That's really, you know, having a poor user experience and you need to focus on that site 31:15 in order to improve their experiences. Well, you'll be able to look at it historically as well as are just like in director, you will have that 31:23 historical View at your environment and you'll be able to look at your user sessions. Right? How many users are connecting across my environment? 31:30 You'll be able to look at your round trip time. Right? So all the information a lot of this information is already in director of but now we're giving 31:37

you not only the the tool to view it across site for also rating this for you to make it easier to consume and to be able to Move your environment, 31:44 which I think is its Fusion something that a lot of customers can take advantage of it. And if you don't have your magnifying glasses at the bottom of 31:53 each value there you can see how it's like how fair or poor as measured right? So either at milliseconds or seconds or whatever. The metric is 32:00 top perspective again similar 32:09

to the user experience will be able to nail that down per site and again A lot of times you want to see how you know actively you're using your 32:19 infrastructure. Is it being overused underuse and being able to make accommodations and not regard are some of your video is under maintenance are too 32:28 many under maintenance at one specific time are there, you know BDA that are unregistered and being on used at the time. So, what can we give you guys 32:36 in order to make your environment the best I can be so that your users are in calling you all the time saying that they're Citrix doesn't work. 32:45

Already so from an operations perspective last but definitely not least and fill this out to operation put it gives you is the ability to view access 32:54 control and to view the total number of domains that your users are accessing within your network the data that they're uploading the data that 33:04 they're downloading and give you an again a very easy view for you two to consume this. So this may be a little small but these lights will be 33:11 available so that you will have these screenshots on the left hand side. You see it based on user operation. So both sides is essentially the same 33:21

information Justice League differently rides on the left hand side. We have it per user. So what are my top users per Transaction? What are my users 33:29 that are downloading a lot of data? And then I'm the right hand side we have that propagation. So what are the top toe means that my users are 33:38 accessing here in the demo environment. They're asking Facebook a lot. Maybe I should go and block that because you're not being very productive 33:45 right? And so it gives you What to look at the information and what your users are doing with services that you're already consuming today with Citrix 33:52

workspace. The Ryan why don't you take us home? Let's go through not only what we covered today, but we've covered and so full heat guide. 34:01 Johanns. Did anybody attend? All 10 Geeks guides? We have 34:09 like three that's what the over-under was. I didn't win. 34:19 So we started out with the Gateway service talking about I see a proxy and SO2 assassin web apps. 34:29 From there. We layered in for that general purpose use case right access control the ability to control the browser and the use of SAS applications, 34:39

which is a capability that we have in workspace maybe a little different than what you're used to if you're just thinking of work space is a direct 34:48 Cloud analog of storefront. It definitely does more after that. We talked about securing the endpoint itself. So securing the back end in 34:56 the date on the apps is a piece of the puzzle, but if we can't take actions on the device itself if it's lost or stolen or jailbroken, we don't have 35:06 that visibility that can be a gap for us. So then that was the next piece of the workspace that was added again still in that single pane of glass of 35:13

you regardless of the platform that were on And then last but not least we added content collaboration. So it's great if my work follows me 35:21 everywhere, but the second if someone sends you that email. Hey, can you send me the PowerPoint presentation from yesterday? And you're on the go and 35:31 you don't have that content with you? There's a huge chunk of your work that you can't do. So another critical piece of the work space and also a very 35:38 different view than what folks are used to if you're just used to let the storefront experience. And then of course last but not least the analytics 35:45

piece, which is what we just spent the last half an hour on so if you don't know what that piece is yet you were probably not awake. The ultimate goal 35:55 here is a single-pane-of-glass experience to the user that allows them to be more productive by bringing all of the different tasks that they're 36:05 trying to perform in different locations together. And in a manner that allows us to wrap a layer of security around it and then 36:14 understand what the users experience quality looks like on the back and when they're interacting with that workspace experience till now after the 36:23

announcement, you'll be able to add the intelligence teacher that we're bringing in later this year. So not only will he get all this awesome 36:33 functionality for your end users and I will be able to do a lot of that intelligently as well. Yeah, good point. So mighty key takeaways hear it if 36:40 you only remember a few things, I think the first one is that there is value for on Prime customers as well. Analytics is a cloud-based service, but 36:49 it's not only for customers that are consuming virtual app and Desktop Service or Gateway service or your general purpose SAS. It has value for the 36:59

on-prem virtual app and desktop customer or xenapp. Send us Talk customer as well users don't need to come through workspace to get performance 37:08 analytics data. They do for security analytics, but not the performance analytics piece of things. Are they getting out of it? And we've had these 37:16 announcements energy analytics is about more than just security as well. But also trying to get disability from the operational perspective and a 37:24 performance perspective. And then if you can layer on workspace on top of it, that's when you get the full Suite of added features and functionality. 37:33

So and I think the last note to hear the part of what makes analytics a little different than some of the other security tools out there isn't it 37:42 always doesn't have to be an opposition of security and user experience as we saw some of their controls like starting session recording is a pretty 37:50 soft control from an end-user experience perspective. We're not interrupting their ability to work but we are taking action based on something risky 37:59 that they did so that we have the ability to go back and look at it in case it becomes the rest of the business. I'm going to a dinner now. I think 38:08

you did a great summary of then. All right. Well, then we will give people six minutes of our time back. Please take the time to write the session and 38:16 I know that this is something that I think I saw Martin back there. He's worked really really hard on. So text villain is chock-full of awesome 38:25 content that's been written by some of the folks in Citrix that do the most interacting with some of our most challenging deployments. There's a lot 38:33 of great leading practices on their reference architecture. So if you haven't seen it yet definitely go check it out. There's a lot of great 38:41

information in there and we both expect phone in case you forget where to go. We have stickers up here. So if there's any questions, feel free to go 38:47 to the Mike's or come up here and we'd be happy to answer those for you. But thanks again for coming enjoy happy hour enjoy the party tonight. And 38:57 so and this is a last session of synergy and of Disguise. So, thank you guys for coming. 39:06

Cackle comments for the website

Buy this talk

Access to the talk “Citrix Synergy TV - SYN235 - Geek's guide to the workspace (part 10): analytics thinks that's not...”
Available
In cart
Free
Free
Free
Free
Free
Free

Video

Get access to all videos “Citrix Synergy Atlanta 2019”
Available
In cart
Free
Free
Free
Free
Free
Free
Ticket

Interested in topic “IT”?

You might be interested in videos from this event

September 28 2018
Moscow
16
122
app store, apps, development, google play, mobile, soft

Buy this video

Video

Access to the talk “Citrix Synergy TV - SYN235 - Geek's guide to the workspace (part 10): analytics thinks that's not...”
Available
In cart
Free
Free
Free
Free
Free
Free

Conference Cast

With ConferenceCast.tv, you get access to our library of the world's best conference talks.

Conference Cast
505 conferences
19653 speakers
7164 hours of content