SlideShare une entreprise Scribd logo
1  sur  17
Enterprise Access Infrastructure
What is CITRIX? -CITRIX is a technology that can allow a remote users to access applications securely and these application will be centralized on the terminal server ,without any kind of installing any application on the client PC. -Citrix delivers any application to any user with the best performance, security, cost over any kind of network , device or operating system.
Key Benefits ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Six Keys to Successful Application Delivery Citrix EdgeSight ™ Monitor End User Experience Citrix WANScaler ™ Accelerate Apps to Branch Users Citrix Access Gateway ™ Enable Secure Application Access Citrix ®  NetScaler ® Deliver Web Applications Citrix Desktop Server ™ Deliver Desktops Citrix  Presentation Server ™ Deliver Windows  Applications Apps Users
The Worldwide Leader in End-to-End Application Delivery Infrastructure LAN Branch Office Mobile User Application Visibility Application Security Application Delivery Citrix EdgeSight™ Citrix Access Gateway™ Citrix Password Manager™ Citrix Application Firewall Citrix Presentation Server™ Citrix NetScaler® Citrix WANScaler® Citrix Streaming Server® Web OPTIMISE Desktop STREAM Client-Server VIRTUALISE SECURITY COST VISIBILITY PERFORMANCE
Two Steps to Application Delivery Data Center Users First, centralize applications in the data center Easy to manage and support  Secure and control applications  Deploy and update easily Presentation Server Then, choose best delivery method  Virtualize or stream based on user, applications & network Presentation Server
Application Delivery – Virtualization Centralize and host in data center Easier to install, manage and support Secure—Apps and data are protected Application Servers Presentation Server environment Server component Web apps Custom apps Data Center Desktop Client component Web browser Desktop apps
Deliver all Windows applications – anywhere, on demand Citrix XenApp Advanced Enterprise Platinum
Xen App 5.0 ,[object Object],Best Performance and Scalability High Security It is End to End Application Delivery system for all  Windows application, both client and desktop server XenApp benefits:  -Simplifies Windows application delivery  -Optimizes security and compliance for sensitive information  -Accelerates application and network performance
Difference Between Editions NEW! Advanced Edition Enterprise Edition Platinum Edition Application Virtualization Speed Screen Progressive Display *64 Support Application Streaming Application Hub Isolation Health Assistant Performance Monitoring Smart Access Single Sign-On
Presentation Server Enterprise Edition Health Assistant Isolation 2.0 Application Hub App Streaming
[object Object],[object Object],[object Object],Presentation Server New! Platinum Edition App PerfMon SmartAccess Single Sign-on
Application Streaming Admin simply installs once and users run anywhere Record Enables a simple publish and subscribe model Download Users run app in a protected environment, without installing, while connected or offline Play Record Profile Application Download Publish to User Play Play  in Protected Environment
Access Gateway ,[object Object],[object Object]
Access Management & Action Control Action control Edit View Only Print Save What actions can the user carry out? Which access scenario? + Client machine analysis Which user? User profile Access control Who can access what?
What is Citrix Password Manager? Access to Any Application One Primary Logon…   Distinct credentials for each  backend application/resource Single Sign-On to Windows, Web and  host-based applications Integrated with more than 20  strong authentication vendors Windows Web Host
THANK YOU

Contenu connexe

Tendances

WSO2Con USA 2017: Managing Verifone’s New Payment Device “Carbon” with WSO2’s...
WSO2Con USA 2017: Managing Verifone’s New Payment Device “Carbon” with WSO2’s...WSO2Con USA 2017: Managing Verifone’s New Payment Device “Carbon” with WSO2’s...
WSO2Con USA 2017: Managing Verifone’s New Payment Device “Carbon” with WSO2’s...WSO2
 
Troubleshooting The Modern Managed Client - Workplace Nijna Summit 2020
Troubleshooting The Modern Managed Client - Workplace Nijna Summit 2020  Troubleshooting The Modern Managed Client - Workplace Nijna Summit 2020
Troubleshooting The Modern Managed Client - Workplace Nijna Summit 2020 Ronni Pedersen
 
Dell Quest TPAM Privileged Access Control
Dell Quest TPAM Privileged Access ControlDell Quest TPAM Privileged Access Control
Dell Quest TPAM Privileged Access ControlAidy Tificate
 
Ewug 1802 secure your windows device in a modern way
Ewug 1802   secure your windows device in a modern wayEwug 1802   secure your windows device in a modern way
Ewug 1802 secure your windows device in a modern wayPer Larsen
 
WSO2Con EU 2016: Understanding the WSO2 API Management Platform
WSO2Con EU 2016: Understanding the WSO2 API Management PlatformWSO2Con EU 2016: Understanding the WSO2 API Management Platform
WSO2Con EU 2016: Understanding the WSO2 API Management PlatformWSO2
 
Accelerate Digital Transformation with Application Delivery Automation
Accelerate Digital Transformation with Application Delivery AutomationAccelerate Digital Transformation with Application Delivery Automation
Accelerate Digital Transformation with Application Delivery AutomationAppViewX
 
Virutalization and the Future of Datacenter Security
Virutalization and the Future of Datacenter SecurityVirutalization and the Future of Datacenter Security
Virutalization and the Future of Datacenter Securityguestb09e16
 
SaaSPlex Enterprise
SaaSPlex EnterpriseSaaSPlex Enterprise
SaaSPlex EnterpriseLa Lakis
 
IBM Security Identity and Access Management - Portfolio
IBM Security Identity and Access Management - PortfolioIBM Security Identity and Access Management - Portfolio
IBM Security Identity and Access Management - PortfolioIBM Sverige
 
Branch Office Solution Son Vu
Branch Office Solution   Son VuBranch Office Solution   Son Vu
Branch Office Solution Son Vuvncson
 
A Single Strong Authentication Platform for Cloud and On-Premise Applications
A Single Strong Authentication Platform for Cloud and On-Premise ApplicationsA Single Strong Authentication Platform for Cloud and On-Premise Applications
A Single Strong Authentication Platform for Cloud and On-Premise ApplicationsSafeNet
 
Network Field Day 11 - Skyport Systems Presentation
Network Field Day 11 - Skyport Systems PresentationNetwork Field Day 11 - Skyport Systems Presentation
Network Field Day 11 - Skyport Systems PresentationDouglas Gourlay
 
Securing Internal Applications with Cloudflare Access - April 2018
Securing Internal Applications with Cloudflare Access - April 2018Securing Internal Applications with Cloudflare Access - April 2018
Securing Internal Applications with Cloudflare Access - April 2018Meghan Weinreich
 
Azure Overview Capgemini
Azure Overview CapgeminiAzure Overview Capgemini
Azure Overview Capgeminibramveen
 
No-Code SAML Support for SaaS Applications with Stormpath
No-Code SAML Support for SaaS Applications with StormpathNo-Code SAML Support for SaaS Applications with Stormpath
No-Code SAML Support for SaaS Applications with StormpathLindsay Brunner
 

Tendances (18)

WSO2Con USA 2017: Managing Verifone’s New Payment Device “Carbon” with WSO2’s...
WSO2Con USA 2017: Managing Verifone’s New Payment Device “Carbon” with WSO2’s...WSO2Con USA 2017: Managing Verifone’s New Payment Device “Carbon” with WSO2’s...
WSO2Con USA 2017: Managing Verifone’s New Payment Device “Carbon” with WSO2’s...
 
Troubleshooting The Modern Managed Client - Workplace Nijna Summit 2020
Troubleshooting The Modern Managed Client - Workplace Nijna Summit 2020  Troubleshooting The Modern Managed Client - Workplace Nijna Summit 2020
Troubleshooting The Modern Managed Client - Workplace Nijna Summit 2020
 
Dell Quest TPAM Privileged Access Control
Dell Quest TPAM Privileged Access ControlDell Quest TPAM Privileged Access Control
Dell Quest TPAM Privileged Access Control
 
Cloud Computing
Cloud Computing Cloud Computing
Cloud Computing
 
Ewug 1802 secure your windows device in a modern way
Ewug 1802   secure your windows device in a modern wayEwug 1802   secure your windows device in a modern way
Ewug 1802 secure your windows device in a modern way
 
WSO2Con EU 2016: Understanding the WSO2 API Management Platform
WSO2Con EU 2016: Understanding the WSO2 API Management PlatformWSO2Con EU 2016: Understanding the WSO2 API Management Platform
WSO2Con EU 2016: Understanding the WSO2 API Management Platform
 
Accelerate Digital Transformation with Application Delivery Automation
Accelerate Digital Transformation with Application Delivery AutomationAccelerate Digital Transformation with Application Delivery Automation
Accelerate Digital Transformation with Application Delivery Automation
 
Virutalization and the Future of Datacenter Security
Virutalization and the Future of Datacenter SecurityVirutalization and the Future of Datacenter Security
Virutalization and the Future of Datacenter Security
 
SaaSPlex Enterprise
SaaSPlex EnterpriseSaaSPlex Enterprise
SaaSPlex Enterprise
 
IBM Security Identity and Access Management - Portfolio
IBM Security Identity and Access Management - PortfolioIBM Security Identity and Access Management - Portfolio
IBM Security Identity and Access Management - Portfolio
 
Branch Office Solution Son Vu
Branch Office Solution   Son VuBranch Office Solution   Son Vu
Branch Office Solution Son Vu
 
Privileged Access Manager Product Q&A
Privileged Access Manager Product Q&APrivileged Access Manager Product Q&A
Privileged Access Manager Product Q&A
 
A Single Strong Authentication Platform for Cloud and On-Premise Applications
A Single Strong Authentication Platform for Cloud and On-Premise ApplicationsA Single Strong Authentication Platform for Cloud and On-Premise Applications
A Single Strong Authentication Platform for Cloud and On-Premise Applications
 
Network Field Day 11 - Skyport Systems Presentation
Network Field Day 11 - Skyport Systems PresentationNetwork Field Day 11 - Skyport Systems Presentation
Network Field Day 11 - Skyport Systems Presentation
 
Securing Internal Applications with Cloudflare Access - April 2018
Securing Internal Applications with Cloudflare Access - April 2018Securing Internal Applications with Cloudflare Access - April 2018
Securing Internal Applications with Cloudflare Access - April 2018
 
Azure Overview Capgemini
Azure Overview CapgeminiAzure Overview Capgemini
Azure Overview Capgemini
 
Ras pro
Ras proRas pro
Ras pro
 
No-Code SAML Support for SaaS Applications with Stormpath
No-Code SAML Support for SaaS Applications with StormpathNo-Code SAML Support for SaaS Applications with Stormpath
No-Code SAML Support for SaaS Applications with Stormpath
 

En vedette

06 01 сертифицированные продукты
06 01 сертифицированные продукты06 01 сертифицированные продукты
06 01 сертифицированные продуктыLiudmila Li
 
Мобильный офис глазами пентестера
Мобильный офис глазами пентестераМобильный офис глазами пентестера
Мобильный офис глазами пентестераDmitry Evteev
 
Переход к централизованной инфраструктуре рабочих мест вместе с Dell
Переход к централизованной инфраструктуре рабочих мест вместе с DellПереход к централизованной инфраструктуре рабочих мест вместе с Dell
Переход к централизованной инфраструктуре рабочих мест вместе с DellDell_Russia
 
IT infrastructure - from PC to Mobility
IT infrastructure - from PC to MobilityIT infrastructure - from PC to Mobility
IT infrastructure - from PC to MobilitySergey Khalyapin
 
CloudsNN 2013 Халяпин Сергей. Безопасность подхода Byod – мифы и реальность
CloudsNN 2013 Халяпин Сергей. Безопасность подхода Byod – мифы и реальностьCloudsNN 2013 Халяпин Сергей. Безопасность подхода Byod – мифы и реальность
CloudsNN 2013 Халяпин Сергей. Безопасность подхода Byod – мифы и реальностьClouds NN
 
Stonesoft: Безопасный удаленный доступ - это просто!
Stonesoft: Безопасный удаленный доступ - это просто!Stonesoft: Безопасный удаленный доступ - это просто!
Stonesoft: Безопасный удаленный доступ - это просто!Expolink
 
Webinar совместные решения Citrix и S-Terra
Webinar совместные решения Citrix и S-TerraWebinar совместные решения Citrix и S-Terra
Webinar совместные решения Citrix и S-TerraSergey Slepkov
 
Xen App Sergey Kh
Xen App Sergey KhXen App Sergey Kh
Xen App Sergey KhLiudmila Li
 
VDI. Факторы успеха проекта
VDI. Факторы успеха проектаVDI. Факторы успеха проекта
VDI. Факторы успеха проектаКРОК
 
Citrix Strategy Brief
Citrix Strategy BriefCitrix Strategy Brief
Citrix Strategy BriefCitrix
 
Citrix Remote Access Solution Soup
Citrix Remote Access Solution SoupCitrix Remote Access Solution Soup
Citrix Remote Access Solution SoupDan Brinkmann
 

En vedette (13)

06 01 сертифицированные продукты
06 01 сертифицированные продукты06 01 сертифицированные продукты
06 01 сертифицированные продукты
 
Мобильный офис глазами пентестера
Мобильный офис глазами пентестераМобильный офис глазами пентестера
Мобильный офис глазами пентестера
 
Переход к централизованной инфраструктуре рабочих мест вместе с Dell
Переход к централизованной инфраструктуре рабочих мест вместе с DellПереход к централизованной инфраструктуре рабочих мест вместе с Dell
Переход к централизованной инфраструктуре рабочих мест вместе с Dell
 
IT infrastructure - from PC to Mobility
IT infrastructure - from PC to MobilityIT infrastructure - from PC to Mobility
IT infrastructure - from PC to Mobility
 
CloudsNN 2013 Халяпин Сергей. Безопасность подхода Byod – мифы и реальность
CloudsNN 2013 Халяпин Сергей. Безопасность подхода Byod – мифы и реальностьCloudsNN 2013 Халяпин Сергей. Безопасность подхода Byod – мифы и реальность
CloudsNN 2013 Халяпин Сергей. Безопасность подхода Byod – мифы и реальность
 
Stonesoft: Безопасный удаленный доступ - это просто!
Stonesoft: Безопасный удаленный доступ - это просто!Stonesoft: Безопасный удаленный доступ - это просто!
Stonesoft: Безопасный удаленный доступ - это просто!
 
10 Dg Xd
10 Dg Xd10 Dg Xd
10 Dg Xd
 
13 zakharchenko
13 zakharchenko13 zakharchenko
13 zakharchenko
 
Webinar совместные решения Citrix и S-Terra
Webinar совместные решения Citrix и S-TerraWebinar совместные решения Citrix и S-Terra
Webinar совместные решения Citrix и S-Terra
 
Xen App Sergey Kh
Xen App Sergey KhXen App Sergey Kh
Xen App Sergey Kh
 
VDI. Факторы успеха проекта
VDI. Факторы успеха проектаVDI. Факторы успеха проекта
VDI. Факторы успеха проекта
 
Citrix Strategy Brief
Citrix Strategy BriefCitrix Strategy Brief
Citrix Strategy Brief
 
Citrix Remote Access Solution Soup
Citrix Remote Access Solution SoupCitrix Remote Access Solution Soup
Citrix Remote Access Solution Soup
 

Similaire à Citrix Enterprise Access Infrastructure

Cyberoam SSL VPN
Cyberoam SSL VPNCyberoam SSL VPN
Cyberoam SSL VPNAjay Nawani
 
Business Mobility - otevřete svou mysl k tomu, co je možné
Business Mobility - otevřete svou mysl k tomu, co je možnéBusiness Mobility - otevřete svou mysl k tomu, co je možné
Business Mobility - otevřete svou mysl k tomu, co je možnéMarketingArrowECS_CZ
 
ISS SA le presenta los Escenarios para IdentityGuard de Entrust
ISS SA le presenta los Escenarios para IdentityGuard de EntrustISS SA le presenta los Escenarios para IdentityGuard de Entrust
ISS SA le presenta los Escenarios para IdentityGuard de EntrustInformation Security Services SA
 
ISS SA le presenta los escenarios para IdentityGuard de Entrust
ISS SA le presenta los escenarios para IdentityGuard de EntrustISS SA le presenta los escenarios para IdentityGuard de Entrust
ISS SA le presenta los escenarios para IdentityGuard de EntrustInformation Security Services SA
 
Presentation technical deep dive of horizon 6 and mirage 5
Presentation   technical deep dive of horizon 6 and mirage 5Presentation   technical deep dive of horizon 6 and mirage 5
Presentation technical deep dive of horizon 6 and mirage 5solarisyougood
 
Presentaties seminar rethink the desktop 20.01.2011
Presentaties seminar rethink the desktop 20.01.2011Presentaties seminar rethink the desktop 20.01.2011
Presentaties seminar rethink the desktop 20.01.2011Joan Tuls
 
Citrix sb 0707-lowres
Citrix sb 0707-lowresCitrix sb 0707-lowres
Citrix sb 0707-lowresHai Nguyen
 
Sierraware browser isolation
Sierraware browser isolationSierraware browser isolation
Sierraware browser isolationSierraware
 
Symposium Cloud En Grid Computing Microsoft Online Strategy - 21-4-2009
Symposium Cloud En Grid Computing   Microsoft Online Strategy - 21-4-2009Symposium Cloud En Grid Computing   Microsoft Online Strategy - 21-4-2009
Symposium Cloud En Grid Computing Microsoft Online Strategy - 21-4-2009Peter de Haas
 
Desafíos de la Ciberseguridad en un ecosistema digitalmente transformado
Desafíos de la Ciberseguridad en un ecosistema digitalmente transformadoDesafíos de la Ciberseguridad en un ecosistema digitalmente transformado
Desafíos de la Ciberseguridad en un ecosistema digitalmente transformadoCristian Garcia G.
 
Presentation a vision for user centric computing
Presentation   a vision for user centric computingPresentation   a vision for user centric computing
Presentation a vision for user centric computingxKinAnx
 
Presentation a vision for user centric computing
Presentation   a vision for user centric computingPresentation   a vision for user centric computing
Presentation a vision for user centric computingsolarisyourep
 
Architecting Application Services For Hybrid Cloud - AWS Summit SG 2017
Architecting Application Services For Hybrid Cloud - AWS Summit SG 2017Architecting Application Services For Hybrid Cloud - AWS Summit SG 2017
Architecting Application Services For Hybrid Cloud - AWS Summit SG 2017Amazon Web Services
 
What's new in Citrix XenApp 7.5 und XenDesktop 7.5?
What's new in Citrix XenApp 7.5 und XenDesktop 7.5?What's new in Citrix XenApp 7.5 und XenDesktop 7.5?
What's new in Citrix XenApp 7.5 und XenDesktop 7.5?Digicomp Academy AG
 
Testting application with a presentation downloaded from the internet
Testting application with a presentation downloaded from the internetTestting application with a presentation downloaded from the internet
Testting application with a presentation downloaded from the internetindradipg
 
Contextual Security and Application Control for Virtualized Desktops
Contextual Security and Application Control for Virtualized DesktopsContextual Security and Application Control for Virtualized Desktops
Contextual Security and Application Control for Virtualized DesktopsIvanti
 
Citrix xenapp training
Citrix xenapp training Citrix xenapp training
Citrix xenapp training Yuvaraj1986
 
V mware view 5 customer presentation
V mware view 5 customer presentationV mware view 5 customer presentation
V mware view 5 customer presentationsolarisyourep
 
Reduce Capital & Operational Expenses with Business Productivity Online Suite
Reduce Capital & Operational Expenses with Business Productivity Online SuiteReduce Capital & Operational Expenses with Business Productivity Online Suite
Reduce Capital & Operational Expenses with Business Productivity Online SuiteMicrosoft Private Cloud
 
VDI and Application Virtualization
VDI and Application VirtualizationVDI and Application Virtualization
VDI and Application VirtualizationJames W. De Rienzo
 

Similaire à Citrix Enterprise Access Infrastructure (20)

Cyberoam SSL VPN
Cyberoam SSL VPNCyberoam SSL VPN
Cyberoam SSL VPN
 
Business Mobility - otevřete svou mysl k tomu, co je možné
Business Mobility - otevřete svou mysl k tomu, co je možnéBusiness Mobility - otevřete svou mysl k tomu, co je možné
Business Mobility - otevřete svou mysl k tomu, co je možné
 
ISS SA le presenta los Escenarios para IdentityGuard de Entrust
ISS SA le presenta los Escenarios para IdentityGuard de EntrustISS SA le presenta los Escenarios para IdentityGuard de Entrust
ISS SA le presenta los Escenarios para IdentityGuard de Entrust
 
ISS SA le presenta los escenarios para IdentityGuard de Entrust
ISS SA le presenta los escenarios para IdentityGuard de EntrustISS SA le presenta los escenarios para IdentityGuard de Entrust
ISS SA le presenta los escenarios para IdentityGuard de Entrust
 
Presentation technical deep dive of horizon 6 and mirage 5
Presentation   technical deep dive of horizon 6 and mirage 5Presentation   technical deep dive of horizon 6 and mirage 5
Presentation technical deep dive of horizon 6 and mirage 5
 
Presentaties seminar rethink the desktop 20.01.2011
Presentaties seminar rethink the desktop 20.01.2011Presentaties seminar rethink the desktop 20.01.2011
Presentaties seminar rethink the desktop 20.01.2011
 
Citrix sb 0707-lowres
Citrix sb 0707-lowresCitrix sb 0707-lowres
Citrix sb 0707-lowres
 
Sierraware browser isolation
Sierraware browser isolationSierraware browser isolation
Sierraware browser isolation
 
Symposium Cloud En Grid Computing Microsoft Online Strategy - 21-4-2009
Symposium Cloud En Grid Computing   Microsoft Online Strategy - 21-4-2009Symposium Cloud En Grid Computing   Microsoft Online Strategy - 21-4-2009
Symposium Cloud En Grid Computing Microsoft Online Strategy - 21-4-2009
 
Desafíos de la Ciberseguridad en un ecosistema digitalmente transformado
Desafíos de la Ciberseguridad en un ecosistema digitalmente transformadoDesafíos de la Ciberseguridad en un ecosistema digitalmente transformado
Desafíos de la Ciberseguridad en un ecosistema digitalmente transformado
 
Presentation a vision for user centric computing
Presentation   a vision for user centric computingPresentation   a vision for user centric computing
Presentation a vision for user centric computing
 
Presentation a vision for user centric computing
Presentation   a vision for user centric computingPresentation   a vision for user centric computing
Presentation a vision for user centric computing
 
Architecting Application Services For Hybrid Cloud - AWS Summit SG 2017
Architecting Application Services For Hybrid Cloud - AWS Summit SG 2017Architecting Application Services For Hybrid Cloud - AWS Summit SG 2017
Architecting Application Services For Hybrid Cloud - AWS Summit SG 2017
 
What's new in Citrix XenApp 7.5 und XenDesktop 7.5?
What's new in Citrix XenApp 7.5 und XenDesktop 7.5?What's new in Citrix XenApp 7.5 und XenDesktop 7.5?
What's new in Citrix XenApp 7.5 und XenDesktop 7.5?
 
Testting application with a presentation downloaded from the internet
Testting application with a presentation downloaded from the internetTestting application with a presentation downloaded from the internet
Testting application with a presentation downloaded from the internet
 
Contextual Security and Application Control for Virtualized Desktops
Contextual Security and Application Control for Virtualized DesktopsContextual Security and Application Control for Virtualized Desktops
Contextual Security and Application Control for Virtualized Desktops
 
Citrix xenapp training
Citrix xenapp training Citrix xenapp training
Citrix xenapp training
 
V mware view 5 customer presentation
V mware view 5 customer presentationV mware view 5 customer presentation
V mware view 5 customer presentation
 
Reduce Capital & Operational Expenses with Business Productivity Online Suite
Reduce Capital & Operational Expenses with Business Productivity Online SuiteReduce Capital & Operational Expenses with Business Productivity Online Suite
Reduce Capital & Operational Expenses with Business Productivity Online Suite
 
VDI and Application Virtualization
VDI and Application VirtualizationVDI and Application Virtualization
VDI and Application Virtualization
 

Plus de Emirates Computers

Changing the Virtualization Landscape
Changing the Virtualization LandscapeChanging the Virtualization Landscape
Changing the Virtualization LandscapeEmirates Computers
 
Emirates Computers / EMC Signature Solution Center
Emirates Computers / EMC Signature Solution CenterEmirates Computers / EMC Signature Solution Center
Emirates Computers / EMC Signature Solution CenterEmirates Computers
 
Virtualize Your Disaster! Introduction & Update
Virtualize Your Disaster! Introduction & UpdateVirtualize Your Disaster! Introduction & Update
Virtualize Your Disaster! Introduction & UpdateEmirates Computers
 
Virtualize Your Disaster! Remove the Disaster from “Disaster Recovery”
Virtualize Your Disaster! Remove the Disaster from “Disaster Recovery”Virtualize Your Disaster! Remove the Disaster from “Disaster Recovery”
Virtualize Your Disaster! Remove the Disaster from “Disaster Recovery”Emirates Computers
 
Virtualize Your Disaster! Customer Use Cases & Scenarios
Virtualize Your Disaster! Customer Use Cases & ScenariosVirtualize Your Disaster! Customer Use Cases & Scenarios
Virtualize Your Disaster! Customer Use Cases & ScenariosEmirates Computers
 
Cisco Product & Solutions Overview
Cisco Product & Solutions OverviewCisco Product & Solutions Overview
Cisco Product & Solutions OverviewEmirates Computers
 
Beyond Green: EMC and Energy Efficient IT
Beyond Green: EMC and Energy Efficient ITBeyond Green: EMC and Energy Efficient IT
Beyond Green: EMC and Energy Efficient ITEmirates Computers
 
EMC Documentum Enterprise Content Management 6.5
EMC Documentum Enterprise Content Management 6.5EMC Documentum Enterprise Content Management 6.5
EMC Documentum Enterprise Content Management 6.5Emirates Computers
 
EMC Documentum Product Line Overview
EMC Documentum Product Line OverviewEMC Documentum Product Line Overview
EMC Documentum Product Line OverviewEmirates Computers
 
Ca Service Desk Demo Scenarios
Ca Service Desk Demo ScenariosCa Service Desk Demo Scenarios
Ca Service Desk Demo ScenariosEmirates Computers
 
EC Unified Communications Presentation
EC Unified Communications PresentationEC Unified Communications Presentation
EC Unified Communications PresentationEmirates Computers
 

Plus de Emirates Computers (20)

Changing the Virtualization Landscape
Changing the Virtualization LandscapeChanging the Virtualization Landscape
Changing the Virtualization Landscape
 
Emirates Computers / EMC Signature Solution Center
Emirates Computers / EMC Signature Solution CenterEmirates Computers / EMC Signature Solution Center
Emirates Computers / EMC Signature Solution Center
 
EMC At A Glance
EMC At A GlanceEMC At A Glance
EMC At A Glance
 
Virtualize Your Disaster! Introduction & Update
Virtualize Your Disaster! Introduction & UpdateVirtualize Your Disaster! Introduction & Update
Virtualize Your Disaster! Introduction & Update
 
Virtualize Your Disaster! Remove the Disaster from “Disaster Recovery”
Virtualize Your Disaster! Remove the Disaster from “Disaster Recovery”Virtualize Your Disaster! Remove the Disaster from “Disaster Recovery”
Virtualize Your Disaster! Remove the Disaster from “Disaster Recovery”
 
Virtualize Your Disaster! Customer Use Cases & Scenarios
Virtualize Your Disaster! Customer Use Cases & ScenariosVirtualize Your Disaster! Customer Use Cases & Scenarios
Virtualize Your Disaster! Customer Use Cases & Scenarios
 
Sunray Presentation
Sunray PresentationSunray Presentation
Sunray Presentation
 
Sun Product Overview
Sun Product OverviewSun Product Overview
Sun Product Overview
 
VMware Presentation
VMware PresentationVMware Presentation
VMware Presentation
 
EMC Solution Center
EMC Solution CenterEMC Solution Center
EMC Solution Center
 
Cisco Product & Solutions Overview
Cisco Product & Solutions OverviewCisco Product & Solutions Overview
Cisco Product & Solutions Overview
 
Beyond Green: EMC and Energy Efficient IT
Beyond Green: EMC and Energy Efficient ITBeyond Green: EMC and Energy Efficient IT
Beyond Green: EMC and Energy Efficient IT
 
EMC Documentum Enterprise Content Management 6.5
EMC Documentum Enterprise Content Management 6.5EMC Documentum Enterprise Content Management 6.5
EMC Documentum Enterprise Content Management 6.5
 
EMC Documentum Product Line Overview
EMC Documentum Product Line OverviewEMC Documentum Product Line Overview
EMC Documentum Product Line Overview
 
Ca Service Desk Presentation
Ca Service Desk PresentationCa Service Desk Presentation
Ca Service Desk Presentation
 
Ca Service Desk Demo Scenarios
Ca Service Desk Demo ScenariosCa Service Desk Demo Scenarios
Ca Service Desk Demo Scenarios
 
EC History Timeline
EC History TimelineEC History Timeline
EC History Timeline
 
EC Smart Living
EC Smart LivingEC Smart Living
EC Smart Living
 
EC Unified Communications Presentation
EC Unified Communications PresentationEC Unified Communications Presentation
EC Unified Communications Presentation
 
Smart SMB Presentation
Smart SMB PresentationSmart SMB Presentation
Smart SMB Presentation
 

Dernier

A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 

Dernier (20)

A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 

Citrix Enterprise Access Infrastructure

  • 2. What is CITRIX? -CITRIX is a technology that can allow a remote users to access applications securely and these application will be centralized on the terminal server ,without any kind of installing any application on the client PC. -Citrix delivers any application to any user with the best performance, security, cost over any kind of network , device or operating system.
  • 3.
  • 4. Six Keys to Successful Application Delivery Citrix EdgeSight ™ Monitor End User Experience Citrix WANScaler ™ Accelerate Apps to Branch Users Citrix Access Gateway ™ Enable Secure Application Access Citrix ® NetScaler ® Deliver Web Applications Citrix Desktop Server ™ Deliver Desktops Citrix Presentation Server ™ Deliver Windows Applications Apps Users
  • 5. The Worldwide Leader in End-to-End Application Delivery Infrastructure LAN Branch Office Mobile User Application Visibility Application Security Application Delivery Citrix EdgeSight™ Citrix Access Gateway™ Citrix Password Manager™ Citrix Application Firewall Citrix Presentation Server™ Citrix NetScaler® Citrix WANScaler® Citrix Streaming Server® Web OPTIMISE Desktop STREAM Client-Server VIRTUALISE SECURITY COST VISIBILITY PERFORMANCE
  • 6. Two Steps to Application Delivery Data Center Users First, centralize applications in the data center Easy to manage and support Secure and control applications Deploy and update easily Presentation Server Then, choose best delivery method Virtualize or stream based on user, applications & network Presentation Server
  • 7. Application Delivery – Virtualization Centralize and host in data center Easier to install, manage and support Secure—Apps and data are protected Application Servers Presentation Server environment Server component Web apps Custom apps Data Center Desktop Client component Web browser Desktop apps
  • 8. Deliver all Windows applications – anywhere, on demand Citrix XenApp Advanced Enterprise Platinum
  • 9.
  • 10. Difference Between Editions NEW! Advanced Edition Enterprise Edition Platinum Edition Application Virtualization Speed Screen Progressive Display *64 Support Application Streaming Application Hub Isolation Health Assistant Performance Monitoring Smart Access Single Sign-On
  • 11. Presentation Server Enterprise Edition Health Assistant Isolation 2.0 Application Hub App Streaming
  • 12.
  • 13. Application Streaming Admin simply installs once and users run anywhere Record Enables a simple publish and subscribe model Download Users run app in a protected environment, without installing, while connected or offline Play Record Profile Application Download Publish to User Play Play in Protected Environment
  • 14.
  • 15. Access Management & Action Control Action control Edit View Only Print Save What actions can the user carry out? Which access scenario? + Client machine analysis Which user? User profile Access control Who can access what?
  • 16. What is Citrix Password Manager? Access to Any Application One Primary Logon… Distinct credentials for each backend application/resource Single Sign-On to Windows, Web and host-based applications Integrated with more than 20 strong authentication vendors Windows Web Host