SlideShare une entreprise Scribd logo
1  sur  34
Director – Systems Engineering, US Public Sector
Faisal.Iqbal@citrix.com
@virtfaisal
Future of Fed Mobility
Enabling productivity through
Mobility, Telework, BYOD and DCC
Faisal Iqbal
State of Federal Mobility
BYO
55%
Employees
Basic Security
1/3
Employees
Unsecured Data
42%
Employees
Productivity
28B
Source: MWE Digital Dilemma 2013 Report
Driving towards Federal Mobility
DOD Mobility Strategy and Implementation Plan
“Establish a mobile device management service”
“Promote the Development and use of DOD Mobile and
Web-enabled Applications”
“Provide an enterprise mobile application environment”
DGS Milestone 9.1
Develop government-wide mobile and wireless security baseline
(includes security reference architectures.)
DHS/DoD/NIST
OPM 2012 Telework Status Report
http://www.telework.gov
• All 87 agencies participating in the
Data Call had established telework
policies
• Approximately 32 percent of all
federal employees deemed eligible
• 27 percent of teleworkers worked
remotely three or more days per
week
“Not all managers are comfortable directing employees who telework”
Fed CIO Council’s BYOD Toolkit
http://www.whitehouse.gov/digitalgov/bring-your-own-device
“…guidance based on lessons learned from successful BYOD programs launched
at forward-leaning agencies. ”
Enterprise
Mobility
Telework
Next Gen
Workplaces
BYOD
App Stores
Federal
Mobile
Workstyles
Disaster
COOP
Office
Security &
Compliance
App + Desktop Virtualization
Delivering hosted Windows Apps and Desktops
SSL 011010 SSL 1011011010 SSL 1011011010 SSL 1011011010 SSL 1011011010 SSL 101101 SSL SSL 1011011010 SSL
APPS
DATA
USER PROFILE
OS
Any networkUniversal
client
Any Datacenter
or Cloud
FIPS 140-2
SSL DMZ Proxy
People-centric and use case driven
Mobilizing
Windows
Apps
GIS and
3D
workloads
BYO
laptop and
device
Remote
Access
Thin/Zero
Client
Computing
Telework Case Study
Virtualization
• “Home Use” Program
• 28,000 users worldwide
• Mission Productivity and COOP
BYOD Case Study
Virtualization
• ~80% telecommuting
• $2 million – typical GFE HW costs
• $1.2 million in savings
Remote PC Access
Secure Remote access to your work computer
SSL 011010 SSL 1011011010 SSL 1011011010 SSL 1011011010 SSL 1011011010 SSL 101101 SSL 1011011010 SSL 101101101
Any networkUniversal
client
Any Thick PCFIPS 140-2
SSL DMZ Proxy
• Platform unification
• HDX Mobile
• Integrated Monitoring
• Unified App Store
• Fully PIV-compatible
2 purpose-built consoles
Studio
• Automated workload
provisioning
• Automatic app publishing
• Custom delegated
administration
Director
• Real-time assessment
• Site health and performance
• EdgeSightTM User Experience
Analytics
High definition experience on any device
Efficient bandwidth utilization
Advanced quality of service
Cross-continent latency tolerance
Industry leading peripheral support
Real-time voice and multimedia
optimization
Point to point unified communications
Virtualized 3D workstation
GPU accelerated 3D graphics
15
• Industry First vGPU solution
• Full OpenGL and DirectX Support
• Fluid experience with full screen
3D apps
• 50% reduction in bandwidth
requirements
Demo
XenDesktop 7
Delivering Windows apps & desktops
as a cloud service
Citrix
Project Avalon
How Federal Mobility Feels Today
IA Perspective
Mobile makes security and
compliance harder. Too many
tools are required to manage it.
User Perspective
Mobile can do so much for
my life, why can’t it do more
for my agency?
Federal Mobile Security
• "Specifically, the Army CIO did not
appropriately track CMDs and was
unaware of more than 14,000 CMDs
used throughout the Army”
• ”Army also failed to ensure its
commands properly configured
devices to store protected
information and to use a mobile
device management application to
do so.”
• Balance security with mobility access
• Government data leakage
• Delivery to multiple mobile platforms
• Secure authentication (smartcard, two-factor)
• BYOD, GOPE…security, compliance, mgmt
• Dual Persona
Federal Mobility Challenges
A complete stack for
managing and
securing apps, data,
and devices
App Management
Device Management
Data Management
Recognized as a “Leader” by Gartner; Winner at Interop
Magic Quadrant Critical Capabilities
Source: Gartner report, Magic Quadrant for Mobile Device Management Software, May 23, 2013, Phillip Redman, John Girard, Terrence Cosgrove, Monica Basso
Source: Gartner report, Critical Capabilities for Mobile Device Management Software, May 23, 2013, Phillip Redman
© 2013 Gartner, Inc. and/or its affiliates. All rights reserved. Gartner is a registered trademark of Gartner, Inc. or its affiliates. For more information, e-mail info@gartner.com or visit gartner.com. Used with permission.
MDX
App Vault
Secure container
that enables app and
data containment,
wipe and lock
MDX
Access
Secure access to
Intranet resources
via Micro-VPN
MDX
InterApp
Trusted application
communication
fabric
Container-Based Mobile App Management
• Secure mobile browser
• Internal web app access
• URL black/whitelists
• Mail, calendar, contacts
• Enterprise class security
• Beautiful native-like experience
• Secure file sharing & sync
• Mobile content editing
• SharePoint & network files
Sandboxed email, browser and document
sharing apps
Enterprise-enable any mobile app with the
Worx App SDK
• Simple and powerful SDK
• Enabled through a single line of code
• Apps can be wrapped post-development
• Controls like:
ᵒData encryption
ᵒAuthentication
ᵒSecure lock and wipe
ᵒInter-app policies
ᵒMicro VPNs
Any app can be a Worx app
Demo
XenMobile
Data Center Consolidation
Data Center Consolidation Case Study
Server Virtualization
• Reduced Power consumption by 83%
• $472k annual operational savings
• Improved capacity and performance
by 300%
Building an “Open” Data Center
Server Virtualization and Cloud
Network Appliance Consolidation
SDX
SDN Platform
1010SL1010101SSL01
Seamless
Experience
Cloud
Solutions
Secure
Access
Client Gateway
Data
Mobile & Web Apps
Collaboration
Windows Apps & Desktops
AppStore
Networking & Cloud Infrastructure
1010SL1010101SSL01
Seamless
Experience
Cloud
Solutions
Secure
Access
Resources
Citrix.com/USGovernment
• Whitepapers
• Solution Guides
• Govt References accounts
Follow us @CitrixPublicSec
Work better. Live better.

Contenu connexe

Tendances

Tendances (20)

Symantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec Mobile Security Webinar
Symantec Mobile Security Webinar
 
Best practices of mobile technology leaders: Airwatch Connect 2013
Best practices of mobile technology leaders: Airwatch Connect 2013Best practices of mobile technology leaders: Airwatch Connect 2013
Best practices of mobile technology leaders: Airwatch Connect 2013
 
Mobile Devices & BYOD Security – Deployment & Best Practices
Mobile Devices & BYOD Security – Deployment & Best PracticesMobile Devices & BYOD Security – Deployment & Best Practices
Mobile Devices & BYOD Security – Deployment & Best Practices
 
Roadmap to Healthcare HIPAA Compliance and Mobile Security for BYOD
Roadmap to Healthcare HIPAA Compliance and Mobile Security for BYODRoadmap to Healthcare HIPAA Compliance and Mobile Security for BYOD
Roadmap to Healthcare HIPAA Compliance and Mobile Security for BYOD
 
SierraVMI Virtual Mobile Infrastructure (VMI). Android-based VDI.
SierraVMI Virtual Mobile Infrastructure (VMI). Android-based VDI.SierraVMI Virtual Mobile Infrastructure (VMI). Android-based VDI.
SierraVMI Virtual Mobile Infrastructure (VMI). Android-based VDI.
 
Adopting A Zero-Trust Model. Google Did It, Can You?
Adopting A Zero-Trust Model. Google Did It, Can You?Adopting A Zero-Trust Model. Google Did It, Can You?
Adopting A Zero-Trust Model. Google Did It, Can You?
 
Mobile Device Management and Mobile Security Strategy - a presentation by Rap...
Mobile Device Management and Mobile Security Strategy - a presentation by Rap...Mobile Device Management and Mobile Security Strategy - a presentation by Rap...
Mobile Device Management and Mobile Security Strategy - a presentation by Rap...
 
Ivanti remote worker ds
Ivanti remote worker   dsIvanti remote worker   ds
Ivanti remote worker ds
 
Mobile Device Management
Mobile Device ManagementMobile Device Management
Mobile Device Management
 
Securing the Mobile enterprise
Securing the Mobile enterpriseSecuring the Mobile enterprise
Securing the Mobile enterprise
 
Rethinking Cybersecurity for the Digital Transformation Era
Rethinking Cybersecurity for the Digital Transformation EraRethinking Cybersecurity for the Digital Transformation Era
Rethinking Cybersecurity for the Digital Transformation Era
 
Security Development Life Cycle
Security Development Life CycleSecurity Development Life Cycle
Security Development Life Cycle
 
Cyber Threat Intelligence: Highlights and Trends for 2020
Cyber Threat Intelligence: Highlights and Trends for 2020Cyber Threat Intelligence: Highlights and Trends for 2020
Cyber Threat Intelligence: Highlights and Trends for 2020
 
A Primer on iOS Management and What's Changing
A Primer on iOS Management and What's ChangingA Primer on iOS Management and What's Changing
A Primer on iOS Management and What's Changing
 
Three ways-zero-trust-security-redefines-partner-access-v8
Three ways-zero-trust-security-redefines-partner-access-v8Three ways-zero-trust-security-redefines-partner-access-v8
Three ways-zero-trust-security-redefines-partner-access-v8
 
What Comes After VPN?
What Comes After VPN?What Comes After VPN?
What Comes After VPN?
 
SmartDevCon - Katowice - 2013
SmartDevCon - Katowice - 2013SmartDevCon - Katowice - 2013
SmartDevCon - Katowice - 2013
 
3 reasons-sdp-is-replacing-vpn-in-2019
3 reasons-sdp-is-replacing-vpn-in-20193 reasons-sdp-is-replacing-vpn-in-2019
3 reasons-sdp-is-replacing-vpn-in-2019
 
Mobile Security for Banking and Finance
Mobile Security for Banking and FinanceMobile Security for Banking and Finance
Mobile Security for Banking and Finance
 
Faster, simpler, more secure remote access to apps in aws
Faster, simpler, more secure remote access to apps in awsFaster, simpler, more secure remote access to apps in aws
Faster, simpler, more secure remote access to apps in aws
 

En vedette

En vedette (8)

May 2013 Federal Cloud Computing Summit Presentation
May 2013 Federal Cloud Computing Summit PresentationMay 2013 Federal Cloud Computing Summit Presentation
May 2013 Federal Cloud Computing Summit Presentation
 
May 2013 Federal Cloud Computing Summit Welcome by Dr. David McClure
May 2013 Federal Cloud Computing Summit Welcome by Dr. David McClureMay 2013 Federal Cloud Computing Summit Welcome by Dr. David McClure
May 2013 Federal Cloud Computing Summit Welcome by Dr. David McClure
 
Speaker Presention by Adam Porter of the University of Maryland | December 17...
Speaker Presention by Adam Porter of the University of Maryland | December 17...Speaker Presention by Adam Porter of the University of Maryland | December 17...
Speaker Presention by Adam Porter of the University of Maryland | December 17...
 
Recap of MITRE Cloud Collaboration Sessions by Justin Brunelle of MITRE | Dec...
Recap of MITRE Cloud Collaboration Sessions by Justin Brunelle of MITRE | Dec...Recap of MITRE Cloud Collaboration Sessions by Justin Brunelle of MITRE | Dec...
Recap of MITRE Cloud Collaboration Sessions by Justin Brunelle of MITRE | Dec...
 
Visionary Keynote by Bill Schlough of the San Francisco Giants | December 17,...
Visionary Keynote by Bill Schlough of the San Francisco Giants | December 17,...Visionary Keynote by Bill Schlough of the San Francisco Giants | December 17,...
Visionary Keynote by Bill Schlough of the San Francisco Giants | December 17,...
 
Progam slides | December 17, 2013 | Federal Cloud Computing Summit
Progam slides | December 17, 2013 | Federal Cloud Computing SummitProgam slides | December 17, 2013 | Federal Cloud Computing Summit
Progam slides | December 17, 2013 | Federal Cloud Computing Summit
 
May 2013 Federal Cloud Computing Summit Keynote by David Cearly
May 2013 Federal Cloud Computing Summit Keynote by David CearlyMay 2013 Federal Cloud Computing Summit Keynote by David Cearly
May 2013 Federal Cloud Computing Summit Keynote by David Cearly
 
Speaker Presention by Irena Bojanova of the University of Maryland University...
Speaker Presention by Irena Bojanova of the University of Maryland University...Speaker Presention by Irena Bojanova of the University of Maryland University...
Speaker Presention by Irena Bojanova of the University of Maryland University...
 

Similaire à Future of Fed Mobility | Citrix Technical Exchange hosted by AMARC | Faisal Iqbal

IBM Partner Jam - 10th April 2013
IBM Partner Jam - 10th April 2013IBM Partner Jam - 10th April 2013
IBM Partner Jam - 10th April 2013
Arrow ECS UK
 
Ibm fiberlink analyst presentation nov 13 final
Ibm fiberlink analyst presentation nov 13 finalIbm fiberlink analyst presentation nov 13 final
Ibm fiberlink analyst presentation nov 13 final
Cleophas Kipruto
 

Similaire à Future of Fed Mobility | Citrix Technical Exchange hosted by AMARC | Faisal Iqbal (20)

Embracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and CentrifyEmbracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and Centrify
 
Smarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst ServicesSmarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst Services
 
Soluções F5 Networks - FORENSE Tecnologia
Soluções F5 Networks - FORENSE TecnologiaSoluções F5 Networks - FORENSE Tecnologia
Soluções F5 Networks - FORENSE Tecnologia
 
Enterprise Mobility: Microsoft Cloud OS Roadshow
Enterprise Mobility: Microsoft Cloud OS RoadshowEnterprise Mobility: Microsoft Cloud OS Roadshow
Enterprise Mobility: Microsoft Cloud OS Roadshow
 
Mobile secure workplace briefing presentation
Mobile secure workplace briefing presentationMobile secure workplace briefing presentation
Mobile secure workplace briefing presentation
 
Mobile Workspaces Go Where You Go [Infographic]
Mobile Workspaces Go Where You Go [Infographic]Mobile Workspaces Go Where You Go [Infographic]
Mobile Workspaces Go Where You Go [Infographic]
 
Citrix MDX Technologies Feature Brief
Citrix MDX Technologies Feature BriefCitrix MDX Technologies Feature Brief
Citrix MDX Technologies Feature Brief
 
IBM Partner Jam - 10th April 2013
IBM Partner Jam - 10th April 2013IBM Partner Jam - 10th April 2013
IBM Partner Jam - 10th April 2013
 
Three Keys to Building a Secure Mobile Infrastructure in Government Environments
Three Keys to Building a Secure Mobile Infrastructure in Government EnvironmentsThree Keys to Building a Secure Mobile Infrastructure in Government Environments
Three Keys to Building a Secure Mobile Infrastructure in Government Environments
 
Government and Education Webinar: Conquering Remote Work IT Challenges
Government and Education Webinar: Conquering Remote Work IT Challenges Government and Education Webinar: Conquering Remote Work IT Challenges
Government and Education Webinar: Conquering Remote Work IT Challenges
 
Mobile Enterprise Application Platform
Mobile Enterprise Application PlatformMobile Enterprise Application Platform
Mobile Enterprise Application Platform
 
Ibm fiberlink analyst presentation nov 13 final
Ibm fiberlink analyst presentation nov 13 finalIbm fiberlink analyst presentation nov 13 final
Ibm fiberlink analyst presentation nov 13 final
 
Achieving Secure BYOD in Government Agencies
Achieving Secure BYOD in Government AgenciesAchieving Secure BYOD in Government Agencies
Achieving Secure BYOD in Government Agencies
 
MobileFirst
MobileFirstMobileFirst
MobileFirst
 
Bring Your Own Device - DesktopDirect by Array Networks
 Bring Your Own Device - DesktopDirect by Array Networks Bring Your Own Device - DesktopDirect by Array Networks
Bring Your Own Device - DesktopDirect by Array Networks
 
Blackberry in Government
Blackberry in GovernmentBlackberry in Government
Blackberry in Government
 
IBM Endpoint Manager for Mobile Devices (Overview)
IBM Endpoint Manager for Mobile Devices (Overview)IBM Endpoint Manager for Mobile Devices (Overview)
IBM Endpoint Manager for Mobile Devices (Overview)
 
IBM Announce Intent to Acquire Fiberlink Analyst Presentation
IBM Announce Intent to Acquire Fiberlink Analyst PresentationIBM Announce Intent to Acquire Fiberlink Analyst Presentation
IBM Announce Intent to Acquire Fiberlink Analyst Presentation
 
Market Study on Mobile Authentication
Market Study on Mobile AuthenticationMarket Study on Mobile Authentication
Market Study on Mobile Authentication
 
Transforming Risky Mobile Apps into Self Defending Apps
Transforming Risky Mobile Apps into Self Defending AppsTransforming Risky Mobile Apps into Self Defending Apps
Transforming Risky Mobile Apps into Self Defending Apps
 

Plus de Tim Harvey (6)

Complete Presentation | Federal Mobile Computing Summit | July 9, 2013
Complete Presentation | Federal Mobile Computing Summit | July 9, 2013Complete Presentation | Federal Mobile Computing Summit | July 9, 2013
Complete Presentation | Federal Mobile Computing Summit | July 9, 2013
 
Mobile Security Project | Visionary Keynote by Marilyn Rose | Federal Mobile ...
Mobile Security Project | Visionary Keynote by Marilyn Rose | Federal Mobile ...Mobile Security Project | Visionary Keynote by Marilyn Rose | Federal Mobile ...
Mobile Security Project | Visionary Keynote by Marilyn Rose | Federal Mobile ...
 
CAPI the NASS Way | Pam Hird | Federal Mobile Computing Summit | July 9, 2013
CAPI the NASS Way | Pam Hird | Federal Mobile Computing Summit | July 9, 2013CAPI the NASS Way | Pam Hird | Federal Mobile Computing Summit | July 9, 2013
CAPI the NASS Way | Pam Hird | Federal Mobile Computing Summit | July 9, 2013
 
Lessons from mHealth | Dr. David Rogers | Federal Mobile Computing Summit | J...
Lessons from mHealth | Dr. David Rogers | Federal Mobile Computing Summit | J...Lessons from mHealth | Dr. David Rogers | Federal Mobile Computing Summit | J...
Lessons from mHealth | Dr. David Rogers | Federal Mobile Computing Summit | J...
 
Mobile Broadband Performance | Visionary Keynote by Walter Johnston | Federal...
Mobile Broadband Performance | Visionary Keynote by Walter Johnston | Federal...Mobile Broadband Performance | Visionary Keynote by Walter Johnston | Federal...
Mobile Broadband Performance | Visionary Keynote by Walter Johnston | Federal...
 
Mobility in the Federal Government -- What's Next? | Kevin Cox, Mark Norton &...
Mobility in the Federal Government -- What's Next? | Kevin Cox, Mark Norton &...Mobility in the Federal Government -- What's Next? | Kevin Cox, Mark Norton &...
Mobility in the Federal Government -- What's Next? | Kevin Cox, Mark Norton &...
 

Dernier

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Dernier (20)

Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by Anitaraj
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 

Future of Fed Mobility | Citrix Technical Exchange hosted by AMARC | Faisal Iqbal

  • 1. Director – Systems Engineering, US Public Sector Faisal.Iqbal@citrix.com @virtfaisal Future of Fed Mobility Enabling productivity through Mobility, Telework, BYOD and DCC Faisal Iqbal
  • 2. State of Federal Mobility BYO 55% Employees Basic Security 1/3 Employees Unsecured Data 42% Employees Productivity 28B Source: MWE Digital Dilemma 2013 Report
  • 3. Driving towards Federal Mobility DOD Mobility Strategy and Implementation Plan “Establish a mobile device management service” “Promote the Development and use of DOD Mobile and Web-enabled Applications” “Provide an enterprise mobile application environment” DGS Milestone 9.1 Develop government-wide mobile and wireless security baseline (includes security reference architectures.) DHS/DoD/NIST
  • 4. OPM 2012 Telework Status Report http://www.telework.gov • All 87 agencies participating in the Data Call had established telework policies • Approximately 32 percent of all federal employees deemed eligible • 27 percent of teleworkers worked remotely three or more days per week “Not all managers are comfortable directing employees who telework”
  • 5. Fed CIO Council’s BYOD Toolkit http://www.whitehouse.gov/digitalgov/bring-your-own-device “…guidance based on lessons learned from successful BYOD programs launched at forward-leaning agencies. ”
  • 7. App + Desktop Virtualization Delivering hosted Windows Apps and Desktops SSL 011010 SSL 1011011010 SSL 1011011010 SSL 1011011010 SSL 1011011010 SSL 101101 SSL SSL 1011011010 SSL APPS DATA USER PROFILE OS Any networkUniversal client Any Datacenter or Cloud FIPS 140-2 SSL DMZ Proxy
  • 8. People-centric and use case driven Mobilizing Windows Apps GIS and 3D workloads BYO laptop and device Remote Access Thin/Zero Client Computing
  • 9. Telework Case Study Virtualization • “Home Use” Program • 28,000 users worldwide • Mission Productivity and COOP
  • 10. BYOD Case Study Virtualization • ~80% telecommuting • $2 million – typical GFE HW costs • $1.2 million in savings
  • 11. Remote PC Access Secure Remote access to your work computer SSL 011010 SSL 1011011010 SSL 1011011010 SSL 1011011010 SSL 1011011010 SSL 101101 SSL 1011011010 SSL 101101101 Any networkUniversal client Any Thick PCFIPS 140-2 SSL DMZ Proxy
  • 12. • Platform unification • HDX Mobile • Integrated Monitoring • Unified App Store • Fully PIV-compatible
  • 13. 2 purpose-built consoles Studio • Automated workload provisioning • Automatic app publishing • Custom delegated administration Director • Real-time assessment • Site health and performance • EdgeSightTM User Experience Analytics
  • 14. High definition experience on any device Efficient bandwidth utilization Advanced quality of service Cross-continent latency tolerance Industry leading peripheral support Real-time voice and multimedia optimization Point to point unified communications
  • 15. Virtualized 3D workstation GPU accelerated 3D graphics 15 • Industry First vGPU solution • Full OpenGL and DirectX Support • Fluid experience with full screen 3D apps • 50% reduction in bandwidth requirements
  • 17. Delivering Windows apps & desktops as a cloud service Citrix Project Avalon
  • 18. How Federal Mobility Feels Today IA Perspective Mobile makes security and compliance harder. Too many tools are required to manage it. User Perspective Mobile can do so much for my life, why can’t it do more for my agency?
  • 19. Federal Mobile Security • "Specifically, the Army CIO did not appropriately track CMDs and was unaware of more than 14,000 CMDs used throughout the Army” • ”Army also failed to ensure its commands properly configured devices to store protected information and to use a mobile device management application to do so.”
  • 20. • Balance security with mobility access • Government data leakage • Delivery to multiple mobile platforms • Secure authentication (smartcard, two-factor) • BYOD, GOPE…security, compliance, mgmt • Dual Persona Federal Mobility Challenges
  • 21. A complete stack for managing and securing apps, data, and devices App Management Device Management Data Management
  • 22. Recognized as a “Leader” by Gartner; Winner at Interop Magic Quadrant Critical Capabilities Source: Gartner report, Magic Quadrant for Mobile Device Management Software, May 23, 2013, Phillip Redman, John Girard, Terrence Cosgrove, Monica Basso Source: Gartner report, Critical Capabilities for Mobile Device Management Software, May 23, 2013, Phillip Redman © 2013 Gartner, Inc. and/or its affiliates. All rights reserved. Gartner is a registered trademark of Gartner, Inc. or its affiliates. For more information, e-mail info@gartner.com or visit gartner.com. Used with permission.
  • 23. MDX App Vault Secure container that enables app and data containment, wipe and lock MDX Access Secure access to Intranet resources via Micro-VPN MDX InterApp Trusted application communication fabric Container-Based Mobile App Management
  • 24. • Secure mobile browser • Internal web app access • URL black/whitelists • Mail, calendar, contacts • Enterprise class security • Beautiful native-like experience • Secure file sharing & sync • Mobile content editing • SharePoint & network files Sandboxed email, browser and document sharing apps
  • 25. Enterprise-enable any mobile app with the Worx App SDK • Simple and powerful SDK • Enabled through a single line of code • Apps can be wrapped post-development • Controls like: ᵒData encryption ᵒAuthentication ᵒSecure lock and wipe ᵒInter-app policies ᵒMicro VPNs Any app can be a Worx app
  • 28. Data Center Consolidation Case Study Server Virtualization • Reduced Power consumption by 83% • $472k annual operational savings • Improved capacity and performance by 300%
  • 29. Building an “Open” Data Center Server Virtualization and Cloud
  • 31. 1010SL1010101SSL01 Seamless Experience Cloud Solutions Secure Access Client Gateway Data Mobile & Web Apps Collaboration Windows Apps & Desktops AppStore Networking & Cloud Infrastructure
  • 33. Resources Citrix.com/USGovernment • Whitepapers • Solution Guides • Govt References accounts Follow us @CitrixPublicSec
  • 34. Work better. Live better.

Notes de l'éditeur

  1. “The primary TTB BYOD lesson learned is to avoid allowing data to touch the personal device. Having all data, settings and processing in a central location and using the BYOD device simply as a viewer significantly simplifies the legal and policy implications”