SlideShare une entreprise Scribd logo
1  sur  46
Télécharger pour lire hors ligne
1	
  
2	
  
3	
  
We	
  will	
  focus	
  on	
  new	
  differen3ators	
  than	
  what	
  you’ve	
  been	
  currently	
  selling	
  
integrated	
  NetScaler	
  solu3ons	
  on.	
  	
  
Today,	
  when	
  you	
  speak	
  to	
  your	
  customers	
  about	
  the	
  value	
  of	
  a	
  NetScaler	
  along	
  with	
  
XenDesktop	
  solu3ons,	
  you	
  sell	
  NetScaler	
  on	
  load	
  balancing	
  and	
  secure	
  access	
  along	
  
with	
  applica3on	
  firewall.	
  These	
  are	
  definitely	
  compelling	
  reasons	
  and	
  solve	
  many	
  
customer	
  pain	
  points.	
  	
  
	
  
In	
  2013,	
  we	
  have	
  a	
  few	
  more	
  differen3ators	
  that	
  will	
  really	
  separate	
  us	
  from	
  our	
  
compe3tors	
  and	
  provide	
  a	
  much	
  more	
  solid	
  case	
  for	
  implemen3ng	
  NetScalers	
  with	
  a	
  
XenDesktop	
  deployment,	
  focused	
  on	
  visibility	
  and	
  solu3ons	
  for	
  the	
  Next-­‐Gen	
  XD	
  
4	
  
NetScaler	
  addressed	
  four	
  major	
  customer	
  pain	
  points	
  when	
  deploying	
  a	
  XD	
  solu3on.	
  	
  
(from	
  leO	
  to	
  right)	
  
	
  
Secure	
  Access	
  
GSLB	
  
Load	
  balancing	
  (enabling	
  session	
  persistence	
  for	
  redundancy)	
  
And	
  providing	
  a	
  way	
  to	
  configure	
  web	
  Interface	
  from	
  the	
  NetScaler	
  consolida3ng	
  the	
  
solu3on	
  
_____________________________________	
  
From	
  leO	
  to	
  right	
  
Secure	
  access	
  
GSLB	
  
Load	
  balancing	
  (with	
  session	
  persistence)	
  
WI	
  
5	
  
We	
  are	
  now	
  introducing	
  four	
  more	
  compelling	
  reasons	
  that	
  will	
  help	
  solve	
  customer	
  
pain	
  points	
  and	
  enable	
  you	
  to	
  demonstrate	
  the	
  value	
  of	
  NetScaler	
  even	
  beWer	
  in	
  
front	
  of	
  your	
  customers.	
  
	
  
1.	
  HDX	
  Insight	
  available	
  shortly	
  –	
  bringing	
  visibility	
  into	
  the	
  end-­‐end	
  user	
  experience	
  
from	
  the	
  packet	
  to	
  the	
  applica3on	
  with	
  full	
  visibility	
  into	
  the	
  ICA	
  protocol	
  and	
  help	
  in	
  
troubleshoo3ng	
  and	
  capacity	
  planning	
  
	
  
2.	
  A	
  simplified	
  Wizard	
  delivering	
  a	
  single	
  point	
  of	
  configura3on	
  to	
  deploy	
  NetScaler	
  
solu3on	
  for	
  your	
  XD	
  infrastructure.	
  This	
  was	
  done	
  before	
  with	
  many	
  different	
  
configura3on	
  panes	
  and	
  wizards,	
  and,	
  now	
  is	
  greatly	
  simplified.	
  
	
  
3.	
  WI	
  to	
  StoreFront	
  Transi3on:	
  For	
  administrators	
  wan3ng	
  to	
  convert	
  from	
  Web	
  
Interface	
  to	
  StoreFront,	
  a	
  single	
  point	
  of	
  entry	
  for	
  both	
  systems	
  so	
  administrators	
  can	
  
easily	
  transi3on	
  from	
  a	
  single	
  point	
  of	
  access.	
  Plus	
  custom	
  health	
  checks	
  and	
  
monitors	
  will	
  be	
  available	
  to	
  monitor	
  store	
  front	
  on	
  the	
  NetScaler	
  
	
  
4.	
  ICA	
  Proxy:	
  While	
  ICA	
  proxy	
  is	
  a	
  capability	
  we	
  already	
  have,	
  we	
  are	
  making	
  a	
  point	
  
to	
  market	
  it	
  more	
  in	
  2013.	
  It	
  secures	
  XenDesktop	
  from	
  data	
  leaks	
  with	
  3ght	
  
integra3on	
  and	
  proper	
  authen3ca3on	
  of	
  users.	
  
	
  
	
  
6	
  
HDX	
  Insight	
  
Master	
  Wizards	
  
SF	
  Migra3on	
  
ICA	
  Proxy	
  
HDX	
  Insight:	
  Real-­‐3me	
  visibility	
  into	
  the	
  end-­‐user	
  experience	
  from	
  the	
  packet	
  
to	
  the	
  user.	
  
StoreFront	
  Front-­‐End:	
  Security	
  3er	
  that	
  also	
  provides	
  scalability,	
  visibility,	
  and	
  
reliability.	
  
WI	
  to	
  StoreFront	
  Transi3on:	
  Simplifies	
  the	
  transi3on	
  from	
  Web	
  Interface	
  to	
  
StoreFront.	
  
ICA	
  Proxy:	
  Secures	
  XenDesktop	
  from	
  data	
  leaks	
  with	
  3ght	
  integra3on	
  and	
  
proper	
  authen3ca3on	
  of	
  users.	
  
	
  
HDX	
  Insight:	
  Opera3onal	
  troubleshoo3ng	
  tool	
  for	
  users	
  having	
  a	
  bad	
  
XenDesktop	
  experience.	
  
StoreFront	
  Front-­‐End:	
  DMZ	
  proxy	
  for	
  administrators	
  requiring	
  up3me,	
  
scalability,	
  and	
  3e-­‐in	
  to	
  the	
  login	
  process	
  for	
  HDX	
  Insight.	
  
WI	
  to	
  StoreFront	
  Transi3on:	
  For	
  administrators	
  wan3ng	
  to	
  convert	
  from	
  Web	
  
Interface	
  to	
  StoreFront,	
  a	
  single	
  point	
  of	
  entry	
  for	
  both	
  systems	
  so	
  
administrators	
  can	
  	
  
ICA	
  Proxy:	
  
	
  
	
  
7	
  
8	
  
9	
  
NetScalers	
  for	
  XD	
  deployments	
  meet	
  customer’s	
  business	
  challenges	
  
-­‐  Faster	
  performance	
  for	
  a	
  variety	
  of	
  environments	
  
-­‐  Meet	
  availability	
  SLAs	
  providing	
  op3mal	
  customer	
  user	
  experience	
  
-­‐  Ensure	
  regulatory	
  compliance	
  and	
  prevent	
  data	
  loss	
  
-­‐  Ensure	
  secure	
  access	
  and	
  network	
  con3nuity	
  for	
  the	
  business	
  
•  Desktop	
  Virtualiza3on	
  is	
  a	
  growing	
  secular	
  trend	
  that	
  is	
  not	
  only	
  evolving	
  as	
  a	
  
technology	
  offering	
  but	
  also	
  gaining	
  adop3on	
  among	
  its	
  users.	
  It	
  will	
  help	
  you	
  to	
  
get	
  in	
  the	
  door	
  with	
  exis.ng	
  customers	
  and	
  more	
  prospects	
  –	
  every	
  company	
  is	
  
being	
  challenged	
  with	
  the	
  diversity	
  of	
  user	
  types,	
  devices	
  and	
  loca3ons.	
  Use	
  this	
  to	
  
open	
  doors	
  and	
  posi3on	
  yourself	
  and	
  Citrix	
  as	
  a	
  thought	
  leader	
  and	
  solu3on	
  
provider	
  to	
  those	
  challenges.	
  
•  From	
  the	
  users’	
  perspec3ve,	
  experience	
  and	
  produc3vity	
  are	
  very	
  important.	
  On	
  
the	
  IT	
  side,	
  security,	
  regulatory	
  compliance	
  and	
  data	
  loss	
  con3nue	
  to	
  be	
  real	
  IT	
  
threats	
  in	
  the	
  workplace.	
  
10	
  
IT	
  administrators	
  care	
  about	
  many	
  points	
  of	
  failure	
  in	
  a	
  typical	
  XA/XD	
  deployment.	
  
This	
  is	
  not	
  only	
  restricted	
  to	
  the	
  backend	
  server	
  farm,	
  but	
  also	
  to	
  the	
  network.	
  Typical	
  
IT	
  infrastructure	
  concerns	
  include	
  
	
  
-­‐  Ensuring	
  WAN	
  latency	
  is	
  at	
  a	
  minimum	
  
-­‐  There	
  are	
  no	
  security	
  breaches	
  or	
  boWlenecks	
  
-­‐  Cri3cal	
  services	
  are	
  available	
  	
  
-­‐  The	
  LAN	
  environment	
  has	
  no	
  issues	
  reaching	
  the	
  backend	
  environment	
  
-­‐  Adequate	
  availability	
  of	
  VDI	
  resources	
  
These	
  concerns	
  apply	
  not	
  only	
  to	
  the	
  applica3on	
  level,	
  but	
  also	
  to	
  the	
  network	
  level	
  
and	
  require	
  end-­‐end	
  unprecedented	
  visibility	
  and	
  access	
  	
  
	
  
	
  
11	
  
Citrix	
  NetScaler	
  makes	
  applica3ons	
  such	
  as	
  MicrosoO’s	
  Exchange,	
  Lync,	
  and	
  
SharePoint,	
  Citrix	
  XenDesktop,	
  Oracle,	
  SAP	
  and	
  many	
  other	
  applica3ons	
  run	
  at	
  least	
  
5x	
  beWer	
  by	
  offloading	
  func3onality	
  from	
  app	
  servers	
  and	
  database	
  servers,	
  
accelera3ng	
  performance,	
  and	
  integra3ng	
  security.	
  	
  
	
  
Load	
  balancing	
  is	
  of	
  course	
  a	
  key	
  part	
  of	
  an	
  Applica3on	
  Delivery	
  Controller,	
  but	
  while	
  
many	
  Applica3on	
  Delivery	
  controllers	
  are	
  just	
  glorified	
  old	
  load	
  balancers,	
  NetScaler	
  
is	
  a	
  comprehensive	
  system	
  deployed	
  in	
  front	
  of	
  web	
  and	
  database	
  servers	
  that	
  
combines	
  high-­‐speed	
  load	
  balancing	
  and	
  content	
  switching,	
  compression,	
  	
  caching,	
  
SSL	
  accelera3on,	
  applica3on	
  visibility	
  and	
  	
  applica3on	
  security.	
  	
  
	
  
In	
  addi3on	
  to	
  global	
  desktop	
  availability,	
  op3mized	
  network	
  performance,	
  and,	
  
security,	
  we	
  are	
  now	
  introducing	
  yet	
  another	
  value-­‐add	
  to	
  netScaler	
  	
  and	
  that	
  of	
  
Visibility.	
  Think	
  of	
  visibility	
  as	
  the	
  signal	
  bars	
  we	
  have	
  on	
  our	
  phones.	
  A	
  lower	
  number	
  
of	
  signal	
  bars	
  indicate	
  an	
  issue	
  with	
  the	
  mobile	
  service	
  provider	
  and	
  not	
  with	
  the	
  
phone	
  itself.	
  Similarly,	
  	
  unprecedented	
  visibility	
  provided	
  by	
  NetScalers	
  indicate	
  key	
  
network	
  health	
  issues,	
  and	
  impac3ng	
  an	
  otherwise	
  perfectly	
  func3oning	
  XD	
  
architecture.	
  Monitoring	
  the	
  network	
  as	
  well	
  as	
  XD	
  architecture	
  is	
  essen3al	
  for	
  a	
  
complete	
  picture	
  and	
  ensuring	
  op3mal	
  user	
  experience.	
  	
  
12	
  
13	
  
14	
  
How	
  does	
  NetScaler	
  help	
  with	
  ICA	
  proxy	
  
	
  
-­‐by	
  ac3ng	
  as	
  a	
  full	
  proxy	
  for	
  ICA	
  connec3ons,	
  those	
  connec3ons	
  are	
  filtered	
  before	
  
hilng	
  the	
  backend	
  server	
  thereby	
  ensuring	
  these	
  connec3ons	
  are	
  aWack	
  free	
  
-­‐STA	
  (Secret	
  Ticket	
  Authority)	
  integra3on	
  prevents	
  server	
  data	
  leakage	
  
-­‐Integra3on	
  with	
  HDX	
  Insight,	
  StoreFront	
  and	
  Web	
  Interface	
  provides	
  a	
  fully	
  
consolidated	
  and	
  simplified	
  solu3on	
  
-­‐Delivers	
  a	
  compe33ve	
  advantage	
  by	
  providing	
  a	
  true	
  ICA	
  proxy	
  
	
  
	
  
15	
  
16	
  
Citrix	
  Sharefile	
  is	
  the	
  industry	
  leading	
  cloud	
  storage	
  solu3on	
  for	
  the	
  enterprise.	
  With	
  
the	
  introduc3on	
  of	
  Enterprise	
  Storage	
  Zones,	
  organiza3ons	
  can	
  now	
  leverage	
  hybrid	
  
storage	
  solu3ons	
  that	
  get	
  the	
  best	
  of	
  cloud	
  availability	
  with	
  the	
  security	
  of	
  on-­‐
premise	
  storage	
  and	
  data	
  at-­‐rest	
  encryp3on.	
  	
  
	
  
17	
  
With	
  the	
  benefits	
  of	
  on-­‐premise	
  cloud	
  storage	
  solu3ons	
  come	
  the	
  reality	
  that	
  
securing	
  access	
  and	
  providing	
  high	
  availability	
  for	
  those	
  components	
  hosted	
  by	
  the	
  
enterprise	
  are	
  an	
  absolute	
  requirement.	
  
To	
  address	
  the	
  security	
  and	
  availability	
  requirements,	
  Citrix	
  recommends	
  the	
  use	
  of	
  
the	
  Citrix	
  NetScaler	
  product	
  line.	
  The	
  NetScaler	
  is	
  a	
  3me-­‐tested	
  solu3on	
  providing	
  
security,	
  availability,	
  and	
  high	
  scalability	
  to	
  countless	
  large	
  scale	
  web	
  sites,	
  enterprise	
  
grade	
  applica3ons,	
  and	
  virtual	
  desktop	
  environments.	
  For	
  Sharefile,	
  this	
  means	
  
driving	
  the	
  highest	
  grade	
  of	
  security	
  while	
  providing	
  the	
  best	
  cloud	
  storage	
  solu3on	
  
for	
  end	
  users.	
  	
  
	
  
The	
  3ght	
  coupling	
  of	
  NetScaler	
  and	
  Sharefile	
  enables	
  the	
  secure	
  and	
  highly	
  available	
  
delivery	
  of	
  cloud	
  storage	
  while	
  keeping	
  that	
  data	
  which	
  should	
  be	
  private,	
  indeed	
  
private.	
  	
  Furthermore,	
  the	
  hardened	
  NetScaler	
  insures	
  that	
  Sharefile	
  soOware	
  stays	
  
well	
  behind	
  a	
  secured	
  environment	
  so	
  only	
  clean	
  traffic	
  is	
  allowed	
  through	
  and	
  risk	
  is	
  
mi3gated.	
  
	
  
18	
  
19	
  
To	
  answer	
  this	
  challenge	
  Citrix	
  has	
  introduced	
  The	
  Mobile	
  Solu3ons	
  Bundle.	
  We	
  think	
  
that	
  this	
  is	
  truly	
  revolu3onizing	
  the	
  way	
  that	
  companies	
  are	
  mobilizing	
  their	
  
businesses.	
  It’s	
  a	
  preWy	
  loOy	
  statement	
  but	
  let’s	
  get	
  into	
  the	
  specifics.	
  
20	
  
21
Let’s	
  talk	
  about	
  the	
  specific	
  elements	
  of	
  The	
  Mobile	
  Solu3ons	
  Bundle	
  and	
  NetScaler	
  
that	
  many	
  of	
  our	
  customers	
  care	
  a	
  great	
  deal	
  about.	
  I’ll	
  take	
  you	
  through	
  each	
  of	
  
these	
  in	
  this	
  next	
  sec3on.	
  
22	
  
Peeling	
  back	
  the	
  layers	
  on	
  the	
  stack	
  from	
  our	
  earlier	
  picture	
  you	
  see	
  how	
  extensive	
  
our	
  client	
  side	
  is	
  with	
  access	
  on	
  any	
  device	
  type	
  and	
  a	
  more	
  specific	
  view	
  of	
  what	
  we	
  
mean	
  by	
  applica3on	
  management.	
  Business	
  apps,	
  produc3vity	
  and	
  collabora3on	
  
tools	
  and	
  a	
  sandboxed	
  mail,	
  doc	
  and	
  browser	
  experience	
  that	
  users	
  love.	
  It’s	
  a	
  
complete	
  picture	
  and	
  Citrix	
  is	
  the	
  only	
  vendor	
  that	
  can	
  offer	
  all	
  of	
  these	
  components.	
  
23	
  
24	
  
25	
  
26	
  
27	
  
A	
  FEATURE	
  OF	
  XENMOBILE,	
  ALLOWS	
  NETSCALER	
  TO	
  CONTROL	
  ACTIVESYNC	
  TRAFFIC,	
  
GRANTING	
  ACCESS	
  TO	
  CORPORATE	
  MAIL,	
  CALENDAR,	
  AND	
  CONTACTS.	
  
NETSCALER	
  ACTS	
  AS	
  THE	
  ENFORCEMENT	
  POINT	
  FOR	
  MANAGING	
  DEVICES	
  THAT	
  HAVE	
  
ACCESS	
  TO	
  CORPORATE	
  EMAIL.	
  	
  
	
  
FOR	
  EXAMPLE,	
  A	
  CORPORATE	
  COMPLIANCE	
  POLICY	
  MAY	
  BE	
  TO	
  BLOCK	
  ALL	
  ANDROID	
  
DEVICES	
  BECAUSE	
  THEY	
  MAY	
  DEEM	
  THEM	
  TO	
  BE	
  A	
  GREATER	
  SECURITY	
  RISK.	
  
THEREFORE,	
  ONLY	
  IOS	
  DEVICES,	
  SUCH	
  AS	
  IPHONES	
  AND	
  IPADS,	
  CAN	
  HAVE	
  ACCESS	
  TO	
  
CORPORATE	
  EMAIL.	
  NETSCALER	
  COMPARES	
  THE	
  CONNECTING	
  DEVICES	
  AGAINST	
  THE	
  
CONFIGURATIONS	
  AND	
  DENIES	
  ACCESS	
  TO	
  ALL	
  ANDROID	
  DEVICES,	
  WHILE	
  ALLOWING	
  
USERS	
  WITH	
  IOS	
  DEVICES	
  TO	
  CONNECT.	
  
	
  
A	
  SECOND	
  USE	
  CASE	
  WOULD	
  BE	
  THAT	
  A	
  CORPORATE	
  COMPLIANCE	
  POLICY	
  IS	
  TO	
  
BLOCK	
  ALL	
  ROOTED	
  OR	
  JAILBROKEN	
  DEVICES	
  FROM	
  CONNECTING	
  TO	
  CORPORATE	
  
EMAIL.	
  AGAIN,	
  NETSCALER	
  COMPARES	
  THE	
  CONNECTING	
  DEVICES	
  AGAINST	
  THE	
  
CONFIGURATIONS	
  AND	
  DENIES	
  ACCESS	
  BASED	
  ON	
  THE	
  CONFIGURATIONS.	
  
	
  
THIS	
  WOULD	
  BE	
  HELPFUL	
  FOR	
  CUSTOMERS	
  LOOKING	
  AT	
  THE	
  XenMobile	
  MDM	
  
EDITION,	
  AS	
  WELL	
  AS	
  THE	
  XENMOBILE	
  MOBILE	
  SOLUTIONS	
  BUNDLE.	
  
	
  
WITHOUT	
  A	
  DOUBT,	
  THE	
  ACTIVESYNC	
  FEATURE	
  IS	
  A	
  PRIMARY	
  USE	
  CASE	
  FOR	
  MDM	
  	
  
28	
  
A	
  FEATURE	
  OF	
  XENMOBILE,	
  ALLOWS	
  NETSCALER	
  TO	
  CONTROL	
  ACTIVESYNC	
  TRAFFIC,	
  
GRANTING	
  ACCESS	
  TO	
  CORPORATE	
  MAIL,	
  CALENDAR,	
  AND	
  CONTACTS.	
  
NETSCALER	
  ACTS	
  AS	
  THE	
  ENFORCEMENT	
  POINT	
  FOR	
  MANAGING	
  DEVICES	
  THAT	
  HAVE	
  
ACCESS	
  TO	
  CORPORATE	
  EMAIL.	
  	
  
	
  
FOR	
  EXAMPLE,	
  A	
  CORPORATE	
  COMPLIANCE	
  POLICY	
  MAY	
  BE	
  TO	
  BLOCK	
  ALL	
  ANDROID	
  
DEVICES	
  BECAUSE	
  THEY	
  MAY	
  DEEM	
  THEM	
  TO	
  BE	
  A	
  GREATER	
  SECURITY	
  RISK.	
  
THEREFORE,	
  ONLY	
  IOS	
  DEVICES,	
  SUCH	
  AS	
  IPHONES	
  AND	
  IPADS,	
  CAN	
  HAVE	
  ACCESS	
  TO	
  
CORPORATE	
  EMAIL.	
  NETSCALER	
  COMPARES	
  THE	
  CONNECTING	
  DEVICES	
  AGAINST	
  THE	
  
CONFIGURATIONS	
  AND	
  DENIES	
  ACCESS	
  TO	
  ALL	
  ANDROID	
  DEVICES,	
  WHILE	
  ALLOWING	
  
USERS	
  WITH	
  IOS	
  DEVICES	
  TO	
  CONNECT.	
  
	
  
A	
  SECOND	
  USE	
  CASE	
  WOULD	
  BE	
  THAT	
  A	
  CORPORATE	
  COMPLIANCE	
  POLICY	
  IS	
  TO	
  
BLOCK	
  ALL	
  ROOTED	
  OR	
  JAILBROKEN	
  DEVICES	
  FROM	
  CONNECTING	
  TO	
  CORPORATE	
  
EMAIL.	
  AGAIN,	
  NETSCALER	
  COMPARES	
  THE	
  CONNECTING	
  DEVICES	
  AGAINST	
  THE	
  
CONFIGURATIONS	
  AND	
  DENIES	
  ACCESS	
  BASED	
  ON	
  THE	
  CONFIGURATIONS.	
  
	
  
THIS	
  WOULD	
  BE	
  HELPFUL	
  FOR	
  CUSTOMERS	
  LOOKING	
  AT	
  THE	
  XenMobile	
  MDM	
  
EDITION,	
  AS	
  WELL	
  AS	
  THE	
  XENMOBILE	
  MOBILE	
  SOLUTIONS	
  BUNDLE.	
  
	
  
WITHOUT	
  A	
  DOUBT,	
  THE	
  ACTIVESYNC	
  FEATURE	
  IS	
  A	
  PRIMARY	
  USE	
  CASE	
  FOR	
  MDM	
  
IMPLEMENTATIONS	
  BECAUSE	
  COMPANIES	
  WANT	
  TO	
  KNOW	
  THAT	
  MOBILE	
  DEVICES	
  
ARE	
  SECURE	
  BEFORE	
  THEY	
  ALLOW	
  ACCESS	
  TO	
  SENSITIVE	
  CORPORATE	
  INFORMATION.	
  	
  
	
  
	
  
29	
  
.	
  Why	
  this	
  solu3on:	
  
Mobile	
  applica3on	
  infrastructure	
  security	
  is	
  an	
  absolute	
  infrastructure	
  requirement.	
  
Balancing	
  transparency	
  with	
  applica3on	
  level	
  security	
  requires	
  detailed	
  and	
  granular	
  
policies	
  for	
  compliance.	
  Filtering	
  access	
  at	
  the	
  mail	
  server	
  itself	
  is	
  too	
  late	
  and	
  
introduces	
  risk	
  associated	
  with	
  hackers	
  crea3ng	
  mayhem.	
  	
  
	
  
	
  
	
  
	
  
30	
  
How	
  this	
  solu3on	
  works:	
  
This	
  is	
  achieved	
  by	
  NetScaler	
  parsing	
  the	
  Ac3veSync	
  protocol	
  used	
  between	
  mobile	
  
devices	
  and	
  Exchange	
  email	
  services	
  in	
  3ght	
  conjunc3on	
  with	
  XenMobile	
  providing	
  
real-­‐3me	
  policy	
  updates.	
  As	
  policies	
  are	
  revised,	
  impact	
  to	
  individual	
  device	
  access	
  is	
  
immediately	
  felt	
  
	
  
	
  
	
  
31	
  
A	
  FEATURE	
  OF	
  XENMOBILE,	
  ALLOWS	
  NETSCALER	
  TO	
  CONTROL	
  ACTIVESYNC	
  TRAFFIC,	
  
GRANTING	
  ACCESS	
  TO	
  CORPORATE	
  MAIL,	
  CALENDAR,	
  AND	
  CONTACTS.	
  
NETSCALER	
  ACTS	
  AS	
  THE	
  ENFORCEMENT	
  POINT	
  FOR	
  MANAGING	
  DEVICES	
  THAT	
  HAVE	
  
ACCESS	
  TO	
  CORPORATE	
  EMAIL.	
  	
  
	
  
FOR	
  EXAMPLE,	
  A	
  CORPORATE	
  COMPLIANCE	
  POLICY	
  MAY	
  BE	
  TO	
  BLOCK	
  ALL	
  ANDROID	
  
DEVICES	
  BECAUSE	
  THEY	
  MAY	
  DEEM	
  THEM	
  TO	
  BE	
  A	
  GREATER	
  SECURITY	
  RISK.	
  
THEREFORE,	
  ONLY	
  IOS	
  DEVICES,	
  SUCH	
  AS	
  IPHONES	
  AND	
  IPADS,	
  CAN	
  HAVE	
  ACCESS	
  TO	
  
CORPORATE	
  EMAIL.	
  NETSCALER	
  COMPARES	
  THE	
  CONNECTING	
  DEVICES	
  AGAINST	
  THE	
  
CONFIGURATIONS	
  AND	
  DENIES	
  ACCESS	
  TO	
  ALL	
  ANDROID	
  DEVICES,	
  WHILE	
  ALLOWING	
  
USERS	
  WITH	
  IOS	
  DEVICES	
  TO	
  CONNECT.	
  
	
  
A	
  SECOND	
  USE	
  CASE	
  WOULD	
  BE	
  THAT	
  A	
  CORPORATE	
  COMPLIANCE	
  POLICY	
  IS	
  TO	
  
BLOCK	
  ALL	
  ROOTED	
  OR	
  JAILBROKEN	
  DEVICES	
  FROM	
  CONNECTING	
  TO	
  CORPORATE	
  
EMAIL.	
  AGAIN,	
  NETSCALER	
  COMPARES	
  THE	
  CONNECTING	
  DEVICES	
  AGAINST	
  THE	
  
CONFIGURATIONS	
  AND	
  DENIES	
  ACCESS	
  BASED	
  ON	
  THE	
  CONFIGURATIONS.	
  
	
  
THIS	
  WOULD	
  BE	
  HELPFUL	
  FOR	
  CUSTOMERS	
  LOOKING	
  AT	
  THE	
  XenMobile	
  MDM	
  
EDITION,	
  AS	
  WELL	
  AS	
  THE	
  XENMOBILE	
  MOBILE	
  SOLUTIONS	
  BUNDLE.	
  
	
  
WITHOUT	
  A	
  DOUBT,	
  THE	
  ACTIVESYNC	
  FEATURE	
  IS	
  A	
  PRIMARY	
  USE	
  CASE	
  FOR	
  MDM	
  	
  
32	
  
Why	
  this	
  solu3on:	
  
Mobile	
  applica3on	
  infrastructure	
  security	
  is	
  an	
  absolute	
  infrastructure	
  requirement.	
  
Balancing	
  transparency	
  with	
  applica3on	
  level	
  security	
  requires	
  detailed	
  and	
  granular	
  
policies	
  for	
  compliance.	
  Filtering	
  access	
  at	
  the	
  mail	
  server	
  itself	
  is	
  too	
  late	
  and	
  
introduces	
  risk	
  associated	
  with	
  hackers	
  crea3ng	
  mayhem.	
  	
  
	
  
Next	
  click	
  
How	
  this	
  solu3on	
  works:	
  
This	
  is	
  achieved	
  by	
  NetScaler	
  parsing	
  the	
  Ac3veSync	
  protocol	
  used	
  between	
  mobile	
  
devices	
  and	
  Exchange	
  email	
  services	
  in	
  3ght	
  conjunc3on	
  with	
  XenMobile	
  providing	
  
real-­‐3me	
  policy	
  updates.	
  As	
  policies	
  are	
  revised,	
  impact	
  to	
  individual	
  device	
  access	
  is	
  
immediately	
  felt	
  
	
  
	
  
	
  
33	
  
34	
  
35	
  
36	
  
42	
  
Branch	
  Repeater	
  and	
  Repeater	
  are	
  available	
  in	
  variety	
  of	
  form-­‐factors	
  and	
  models	
  
based	
  on	
  the	
  target	
  applica3on.	
  	
  Appliance	
  models	
  are	
  primarily	
  sized	
  based	
  on	
  a	
  
customer’s	
  WAN	
  bandwidth	
  requirements.	
  	
  The	
  next	
  few	
  slides	
  will	
  focus	
  on	
  how	
  to	
  
posi3on	
  each	
  of	
  these	
  products.	
  
43	
  
44	
  
45	
  
Thank	
  you.	
  
46	
  

Contenu connexe

Tendances

V mware sddc-micro-segmentation-white-paper
V mware sddc-micro-segmentation-white-paperV mware sddc-micro-segmentation-white-paper
V mware sddc-micro-segmentation-white-paper
EMC
 
Tools of noc
Tools of nocTools of noc
Tools of noc
munawarul
 
brocade-data-center-fabric-architectures-wp
brocade-data-center-fabric-architectures-wpbrocade-data-center-fabric-architectures-wp
brocade-data-center-fabric-architectures-wp
Anuj Dewangan
 

Tendances (20)

V mware sddc-micro-segmentation-white-paper
V mware sddc-micro-segmentation-white-paperV mware sddc-micro-segmentation-white-paper
V mware sddc-micro-segmentation-white-paper
 
Cloud Security Best Practices - Part 2
Cloud Security Best Practices - Part 2Cloud Security Best Practices - Part 2
Cloud Security Best Practices - Part 2
 
Quiz 1 cloud computing
Quiz 1 cloud computing Quiz 1 cloud computing
Quiz 1 cloud computing
 
Tools of noc
Tools of nocTools of noc
Tools of noc
 
Service oriented software engineering
Service oriented software engineeringService oriented software engineering
Service oriented software engineering
 
Cloud Computing
 Cloud Computing Cloud Computing
Cloud Computing
 
Highly Available XenApp Cloud
Highly Available XenApp CloudHighly Available XenApp Cloud
Highly Available XenApp Cloud
 
IRJET- Single to Multi Cloud Data Security in Cloud Computing
IRJET-  	  Single to Multi Cloud Data Security in Cloud ComputingIRJET-  	  Single to Multi Cloud Data Security in Cloud Computing
IRJET- Single to Multi Cloud Data Security in Cloud Computing
 
MULTI-CLOUD ARCHITECTURE
MULTI-CLOUD ARCHITECTUREMULTI-CLOUD ARCHITECTURE
MULTI-CLOUD ARCHITECTURE
 
improve cloud security
improve cloud securityimprove cloud security
improve cloud security
 
Cloud Reference Model
Cloud Reference ModelCloud Reference Model
Cloud Reference Model
 
Zimory White Paper: Security in the Cloud pt 2/2
Zimory White Paper: Security in the Cloud pt 2/2Zimory White Paper: Security in the Cloud pt 2/2
Zimory White Paper: Security in the Cloud pt 2/2
 
A study on securing cloud environment from d do s attack to preserve data ava...
A study on securing cloud environment from d do s attack to preserve data ava...A study on securing cloud environment from d do s attack to preserve data ava...
A study on securing cloud environment from d do s attack to preserve data ava...
 
Xenapp deployment-blueprint
Xenapp deployment-blueprintXenapp deployment-blueprint
Xenapp deployment-blueprint
 
Cloud computing challenges with emphasis on amazon ec2 and windows azure
Cloud computing challenges with emphasis on amazon ec2 and windows azureCloud computing challenges with emphasis on amazon ec2 and windows azure
Cloud computing challenges with emphasis on amazon ec2 and windows azure
 
Virtualization - cloud computing
Virtualization - cloud computingVirtualization - cloud computing
Virtualization - cloud computing
 
brocade-data-center-fabric-architectures-wp
brocade-data-center-fabric-architectures-wpbrocade-data-center-fabric-architectures-wp
brocade-data-center-fabric-architectures-wp
 
IBM Connectivity and Integration
IBM Connectivity and IntegrationIBM Connectivity and Integration
IBM Connectivity and Integration
 
Cloud Models
Cloud ModelsCloud Models
Cloud Models
 
TermPaper
TermPaperTermPaper
TermPaper
 

Similaire à Netscaler for mobility and secure remote access

Cloud Computing Security Issues in Infrastructure as a Service” report
Cloud Computing Security Issues in Infrastructure as a Service” reportCloud Computing Security Issues in Infrastructure as a Service” report
Cloud Computing Security Issues in Infrastructure as a Service” report
Vivek Maurya
 

Similaire à Netscaler for mobility and secure remote access (20)

Ensure the Secure, Reliable Delivery of Applications to Any User, Over Any Ne...
Ensure the Secure, Reliable Delivery of Applications to Any User, Over Any Ne...Ensure the Secure, Reliable Delivery of Applications to Any User, Over Any Ne...
Ensure the Secure, Reliable Delivery of Applications to Any User, Over Any Ne...
 
A Breif On Cloud computing
A Breif On Cloud computingA Breif On Cloud computing
A Breif On Cloud computing
 
Simplifying User Access with NetScaler SDX and CA Single Sign-on
 Simplifying User Access with NetScaler SDX and CA Single Sign-on Simplifying User Access with NetScaler SDX and CA Single Sign-on
Simplifying User Access with NetScaler SDX and CA Single Sign-on
 
New Approaches to Security and Availability for Cloud Data
New Approaches to Security and Availability for Cloud DataNew Approaches to Security and Availability for Cloud Data
New Approaches to Security and Availability for Cloud Data
 
cloud computing notes for anna university syllabus
cloud computing notes for anna university syllabuscloud computing notes for anna university syllabus
cloud computing notes for anna university syllabus
 
A proposal for implementing cloud computing in newspaper company
A proposal for implementing cloud computing in newspaper companyA proposal for implementing cloud computing in newspaper company
A proposal for implementing cloud computing in newspaper company
 
Cloud Architect Company in India
Cloud Architect Company in IndiaCloud Architect Company in India
Cloud Architect Company in India
 
Citrix Netscaler Deployment Guide
Citrix Netscaler Deployment GuideCitrix Netscaler Deployment Guide
Citrix Netscaler Deployment Guide
 
Ccnp™ advanced cisco® router
Ccnp™ advanced cisco® routerCcnp™ advanced cisco® router
Ccnp™ advanced cisco® router
 
Cloud Architect Company in India
Cloud Architect Company in IndiaCloud Architect Company in India
Cloud Architect Company in India
 
brocade-swisscom-ss
brocade-swisscom-ssbrocade-swisscom-ss
brocade-swisscom-ss
 
ACIC Rome & Veritas: High-Availability and Disaster Recovery Scenarios
ACIC Rome & Veritas: High-Availability and Disaster Recovery ScenariosACIC Rome & Veritas: High-Availability and Disaster Recovery Scenarios
ACIC Rome & Veritas: High-Availability and Disaster Recovery Scenarios
 
Sdn primer pdf
Sdn primer pdfSdn primer pdf
Sdn primer pdf
 
Cloud monitoring overview
Cloud monitoring overviewCloud monitoring overview
Cloud monitoring overview
 
Top Interview Questions For Cloud Security Engineer.pdf
Top Interview Questions For Cloud Security Engineer.pdfTop Interview Questions For Cloud Security Engineer.pdf
Top Interview Questions For Cloud Security Engineer.pdf
 
Cloud Security Engineer.pdf
Cloud Security Engineer.pdfCloud Security Engineer.pdf
Cloud Security Engineer.pdf
 
Taw opening session
Taw opening sessionTaw opening session
Taw opening session
 
Implementation of the Open Source Virtualization Technologies in Cloud Computing
Implementation of the Open Source Virtualization Technologies in Cloud ComputingImplementation of the Open Source Virtualization Technologies in Cloud Computing
Implementation of the Open Source Virtualization Technologies in Cloud Computing
 
Implementation of the Open Source Virtualization Technologies in Cloud Computing
Implementation of the Open Source Virtualization Technologies in Cloud ComputingImplementation of the Open Source Virtualization Technologies in Cloud Computing
Implementation of the Open Source Virtualization Technologies in Cloud Computing
 
Cloud Computing Security Issues in Infrastructure as a Service” report
Cloud Computing Security Issues in Infrastructure as a Service” reportCloud Computing Security Issues in Infrastructure as a Service” report
Cloud Computing Security Issues in Infrastructure as a Service” report
 

Plus de Citrix

Plus de Citrix (20)

Building The Digital Workplace
Building The Digital WorkplaceBuilding The Digital Workplace
Building The Digital Workplace
 
Maximize your Investment in Microsoft Office 365 with Citrix Workspace
Maximize your Investment in Microsoft Office 365 with Citrix Workspace Maximize your Investment in Microsoft Office 365 with Citrix Workspace
Maximize your Investment in Microsoft Office 365 with Citrix Workspace
 
XenApp on Google Cloud Deployment Guide
XenApp on Google Cloud Deployment GuideXenApp on Google Cloud Deployment Guide
XenApp on Google Cloud Deployment Guide
 
Deploying Citrix XenApp & XenDesktop Service on Google Cloud Platform
Deploying Citrix XenApp & XenDesktop Service on Google Cloud PlatformDeploying Citrix XenApp & XenDesktop Service on Google Cloud Platform
Deploying Citrix XenApp & XenDesktop Service on Google Cloud Platform
 
Manage Risk by Protecting the Apps and Data That Drive Business Productivity
Manage Risk by Protecting the Apps and Data That Drive Business ProductivityManage Risk by Protecting the Apps and Data That Drive Business Productivity
Manage Risk by Protecting the Apps and Data That Drive Business Productivity
 
How do Organizations Plan to Assure Application Delivery in a Multi-Cloud World?
How do Organizations Plan to Assure Application Delivery in a Multi-Cloud World?How do Organizations Plan to Assure Application Delivery in a Multi-Cloud World?
How do Organizations Plan to Assure Application Delivery in a Multi-Cloud World?
 
Workforce Flexibility Can Drive Greater Engagement & Productivity
Workforce Flexibility Can Drive Greater Engagement & ProductivityWorkforce Flexibility Can Drive Greater Engagement & Productivity
Workforce Flexibility Can Drive Greater Engagement & Productivity
 
Citrix Cloud Services: Total Economic Benefits Assessment Guide
Citrix Cloud Services: Total Economic Benefits Assessment GuideCitrix Cloud Services: Total Economic Benefits Assessment Guide
Citrix Cloud Services: Total Economic Benefits Assessment Guide
 
The Growing U.S. IT Productivity Gap
The Growing U.S. IT Productivity GapThe Growing U.S. IT Productivity Gap
The Growing U.S. IT Productivity Gap
 
Citrix Cloud Services: Total Economic Benefits Assessment Guide
Citrix Cloud Services: Total Economic Benefits Assessment GuideCitrix Cloud Services: Total Economic Benefits Assessment Guide
Citrix Cloud Services: Total Economic Benefits Assessment Guide
 
Citrix Synergy 2017: Technology Keynote Sketch Notes
Citrix Synergy 2017: Technology Keynote Sketch NotesCitrix Synergy 2017: Technology Keynote Sketch Notes
Citrix Synergy 2017: Technology Keynote Sketch Notes
 
Citrix Synergy 2017: Malcolm Gladwell Innovation Super Session Sketch Notes
Citrix Synergy 2017: Malcolm Gladwell Innovation Super Session Sketch NotesCitrix Synergy 2017: Malcolm Gladwell Innovation Super Session Sketch Notes
Citrix Synergy 2017: Malcolm Gladwell Innovation Super Session Sketch Notes
 
Synergy 2017: Colin Powell Innovation Super Session Sketch Notes
Synergy 2017: Colin Powell Innovation Super Session Sketch NotesSynergy 2017: Colin Powell Innovation Super Session Sketch Notes
Synergy 2017: Colin Powell Innovation Super Session Sketch Notes
 
Who Are Citrix Customers?
Who Are Citrix Customers?Who Are Citrix Customers?
Who Are Citrix Customers?
 
Manage risk by protecting apps, data and usage
Manage risk by protecting apps, data and usageManage risk by protecting apps, data and usage
Manage risk by protecting apps, data and usage
 
Enterprise Case Study: Enabling a More Mobile Way of Working
Enterprise Case Study: Enabling a More Mobile Way of Working Enterprise Case Study: Enabling a More Mobile Way of Working
Enterprise Case Study: Enabling a More Mobile Way of Working
 
Life in the Digital Workspace
Life in the Digital WorkspaceLife in the Digital Workspace
Life in the Digital Workspace
 
Comparing traditional workspaces to digital workspaces
Comparing traditional workspaces to digital workspacesComparing traditional workspaces to digital workspaces
Comparing traditional workspaces to digital workspaces
 
4 Ways to Ensure a Smooth Windows 10 Migration
4 Ways to Ensure a Smooth Windows 10 Migration4 Ways to Ensure a Smooth Windows 10 Migration
4 Ways to Ensure a Smooth Windows 10 Migration
 
Citrix Paddington
Citrix PaddingtonCitrix Paddington
Citrix Paddington
 

Netscaler for mobility and secure remote access

  • 4. We  will  focus  on  new  differen3ators  than  what  you’ve  been  currently  selling   integrated  NetScaler  solu3ons  on.     Today,  when  you  speak  to  your  customers  about  the  value  of  a  NetScaler  along  with   XenDesktop  solu3ons,  you  sell  NetScaler  on  load  balancing  and  secure  access  along   with  applica3on  firewall.  These  are  definitely  compelling  reasons  and  solve  many   customer  pain  points.       In  2013,  we  have  a  few  more  differen3ators  that  will  really  separate  us  from  our   compe3tors  and  provide  a  much  more  solid  case  for  implemen3ng  NetScalers  with  a   XenDesktop  deployment,  focused  on  visibility  and  solu3ons  for  the  Next-­‐Gen  XD   4  
  • 5. NetScaler  addressed  four  major  customer  pain  points  when  deploying  a  XD  solu3on.     (from  leO  to  right)     Secure  Access   GSLB   Load  balancing  (enabling  session  persistence  for  redundancy)   And  providing  a  way  to  configure  web  Interface  from  the  NetScaler  consolida3ng  the   solu3on   _____________________________________   From  leO  to  right   Secure  access   GSLB   Load  balancing  (with  session  persistence)   WI   5  
  • 6. We  are  now  introducing  four  more  compelling  reasons  that  will  help  solve  customer   pain  points  and  enable  you  to  demonstrate  the  value  of  NetScaler  even  beWer  in   front  of  your  customers.     1.  HDX  Insight  available  shortly  –  bringing  visibility  into  the  end-­‐end  user  experience   from  the  packet  to  the  applica3on  with  full  visibility  into  the  ICA  protocol  and  help  in   troubleshoo3ng  and  capacity  planning     2.  A  simplified  Wizard  delivering  a  single  point  of  configura3on  to  deploy  NetScaler   solu3on  for  your  XD  infrastructure.  This  was  done  before  with  many  different   configura3on  panes  and  wizards,  and,  now  is  greatly  simplified.     3.  WI  to  StoreFront  Transi3on:  For  administrators  wan3ng  to  convert  from  Web   Interface  to  StoreFront,  a  single  point  of  entry  for  both  systems  so  administrators  can   easily  transi3on  from  a  single  point  of  access.  Plus  custom  health  checks  and   monitors  will  be  available  to  monitor  store  front  on  the  NetScaler     4.  ICA  Proxy:  While  ICA  proxy  is  a  capability  we  already  have,  we  are  making  a  point   to  market  it  more  in  2013.  It  secures  XenDesktop  from  data  leaks  with  3ght   integra3on  and  proper  authen3ca3on  of  users.       6  
  • 7. HDX  Insight   Master  Wizards   SF  Migra3on   ICA  Proxy   HDX  Insight:  Real-­‐3me  visibility  into  the  end-­‐user  experience  from  the  packet   to  the  user.   StoreFront  Front-­‐End:  Security  3er  that  also  provides  scalability,  visibility,  and   reliability.   WI  to  StoreFront  Transi3on:  Simplifies  the  transi3on  from  Web  Interface  to   StoreFront.   ICA  Proxy:  Secures  XenDesktop  from  data  leaks  with  3ght  integra3on  and   proper  authen3ca3on  of  users.     HDX  Insight:  Opera3onal  troubleshoo3ng  tool  for  users  having  a  bad   XenDesktop  experience.   StoreFront  Front-­‐End:  DMZ  proxy  for  administrators  requiring  up3me,   scalability,  and  3e-­‐in  to  the  login  process  for  HDX  Insight.   WI  to  StoreFront  Transi3on:  For  administrators  wan3ng  to  convert  from  Web   Interface  to  StoreFront,  a  single  point  of  entry  for  both  systems  so   administrators  can     ICA  Proxy:       7  
  • 10. NetScalers  for  XD  deployments  meet  customer’s  business  challenges   -­‐  Faster  performance  for  a  variety  of  environments   -­‐  Meet  availability  SLAs  providing  op3mal  customer  user  experience   -­‐  Ensure  regulatory  compliance  and  prevent  data  loss   -­‐  Ensure  secure  access  and  network  con3nuity  for  the  business   •  Desktop  Virtualiza3on  is  a  growing  secular  trend  that  is  not  only  evolving  as  a   technology  offering  but  also  gaining  adop3on  among  its  users.  It  will  help  you  to   get  in  the  door  with  exis.ng  customers  and  more  prospects  –  every  company  is   being  challenged  with  the  diversity  of  user  types,  devices  and  loca3ons.  Use  this  to   open  doors  and  posi3on  yourself  and  Citrix  as  a  thought  leader  and  solu3on   provider  to  those  challenges.   •  From  the  users’  perspec3ve,  experience  and  produc3vity  are  very  important.  On   the  IT  side,  security,  regulatory  compliance  and  data  loss  con3nue  to  be  real  IT   threats  in  the  workplace.   10  
  • 11. IT  administrators  care  about  many  points  of  failure  in  a  typical  XA/XD  deployment.   This  is  not  only  restricted  to  the  backend  server  farm,  but  also  to  the  network.  Typical   IT  infrastructure  concerns  include     -­‐  Ensuring  WAN  latency  is  at  a  minimum   -­‐  There  are  no  security  breaches  or  boWlenecks   -­‐  Cri3cal  services  are  available     -­‐  The  LAN  environment  has  no  issues  reaching  the  backend  environment   -­‐  Adequate  availability  of  VDI  resources   These  concerns  apply  not  only  to  the  applica3on  level,  but  also  to  the  network  level   and  require  end-­‐end  unprecedented  visibility  and  access         11  
  • 12. Citrix  NetScaler  makes  applica3ons  such  as  MicrosoO’s  Exchange,  Lync,  and   SharePoint,  Citrix  XenDesktop,  Oracle,  SAP  and  many  other  applica3ons  run  at  least   5x  beWer  by  offloading  func3onality  from  app  servers  and  database  servers,   accelera3ng  performance,  and  integra3ng  security.       Load  balancing  is  of  course  a  key  part  of  an  Applica3on  Delivery  Controller,  but  while   many  Applica3on  Delivery  controllers  are  just  glorified  old  load  balancers,  NetScaler   is  a  comprehensive  system  deployed  in  front  of  web  and  database  servers  that   combines  high-­‐speed  load  balancing  and  content  switching,  compression,    caching,   SSL  accelera3on,  applica3on  visibility  and    applica3on  security.       In  addi3on  to  global  desktop  availability,  op3mized  network  performance,  and,   security,  we  are  now  introducing  yet  another  value-­‐add  to  netScaler    and  that  of   Visibility.  Think  of  visibility  as  the  signal  bars  we  have  on  our  phones.  A  lower  number   of  signal  bars  indicate  an  issue  with  the  mobile  service  provider  and  not  with  the   phone  itself.  Similarly,    unprecedented  visibility  provided  by  NetScalers  indicate  key   network  health  issues,  and  impac3ng  an  otherwise  perfectly  func3oning  XD   architecture.  Monitoring  the  network  as  well  as  XD  architecture  is  essen3al  for  a   complete  picture  and  ensuring  op3mal  user  experience.     12  
  • 13. 13  
  • 14. 14  
  • 15. How  does  NetScaler  help  with  ICA  proxy     -­‐by  ac3ng  as  a  full  proxy  for  ICA  connec3ons,  those  connec3ons  are  filtered  before   hilng  the  backend  server  thereby  ensuring  these  connec3ons  are  aWack  free   -­‐STA  (Secret  Ticket  Authority)  integra3on  prevents  server  data  leakage   -­‐Integra3on  with  HDX  Insight,  StoreFront  and  Web  Interface  provides  a  fully   consolidated  and  simplified  solu3on   -­‐Delivers  a  compe33ve  advantage  by  providing  a  true  ICA  proxy       15  
  • 16. 16  
  • 17. Citrix  Sharefile  is  the  industry  leading  cloud  storage  solu3on  for  the  enterprise.  With   the  introduc3on  of  Enterprise  Storage  Zones,  organiza3ons  can  now  leverage  hybrid   storage  solu3ons  that  get  the  best  of  cloud  availability  with  the  security  of  on-­‐ premise  storage  and  data  at-­‐rest  encryp3on.       17  
  • 18. With  the  benefits  of  on-­‐premise  cloud  storage  solu3ons  come  the  reality  that   securing  access  and  providing  high  availability  for  those  components  hosted  by  the   enterprise  are  an  absolute  requirement.   To  address  the  security  and  availability  requirements,  Citrix  recommends  the  use  of   the  Citrix  NetScaler  product  line.  The  NetScaler  is  a  3me-­‐tested  solu3on  providing   security,  availability,  and  high  scalability  to  countless  large  scale  web  sites,  enterprise   grade  applica3ons,  and  virtual  desktop  environments.  For  Sharefile,  this  means   driving  the  highest  grade  of  security  while  providing  the  best  cloud  storage  solu3on   for  end  users.       The  3ght  coupling  of  NetScaler  and  Sharefile  enables  the  secure  and  highly  available   delivery  of  cloud  storage  while  keeping  that  data  which  should  be  private,  indeed   private.    Furthermore,  the  hardened  NetScaler  insures  that  Sharefile  soOware  stays   well  behind  a  secured  environment  so  only  clean  traffic  is  allowed  through  and  risk  is   mi3gated.     18  
  • 19. 19  
  • 20. To  answer  this  challenge  Citrix  has  introduced  The  Mobile  Solu3ons  Bundle.  We  think   that  this  is  truly  revolu3onizing  the  way  that  companies  are  mobilizing  their   businesses.  It’s  a  preWy  loOy  statement  but  let’s  get  into  the  specifics.   20  
  • 21. 21
  • 22. Let’s  talk  about  the  specific  elements  of  The  Mobile  Solu3ons  Bundle  and  NetScaler   that  many  of  our  customers  care  a  great  deal  about.  I’ll  take  you  through  each  of   these  in  this  next  sec3on.   22  
  • 23. Peeling  back  the  layers  on  the  stack  from  our  earlier  picture  you  see  how  extensive   our  client  side  is  with  access  on  any  device  type  and  a  more  specific  view  of  what  we   mean  by  applica3on  management.  Business  apps,  produc3vity  and  collabora3on   tools  and  a  sandboxed  mail,  doc  and  browser  experience  that  users  love.  It’s  a   complete  picture  and  Citrix  is  the  only  vendor  that  can  offer  all  of  these  components.   23  
  • 24. 24  
  • 25. 25  
  • 26. 26  
  • 27. 27  
  • 28. A  FEATURE  OF  XENMOBILE,  ALLOWS  NETSCALER  TO  CONTROL  ACTIVESYNC  TRAFFIC,   GRANTING  ACCESS  TO  CORPORATE  MAIL,  CALENDAR,  AND  CONTACTS.   NETSCALER  ACTS  AS  THE  ENFORCEMENT  POINT  FOR  MANAGING  DEVICES  THAT  HAVE   ACCESS  TO  CORPORATE  EMAIL.       FOR  EXAMPLE,  A  CORPORATE  COMPLIANCE  POLICY  MAY  BE  TO  BLOCK  ALL  ANDROID   DEVICES  BECAUSE  THEY  MAY  DEEM  THEM  TO  BE  A  GREATER  SECURITY  RISK.   THEREFORE,  ONLY  IOS  DEVICES,  SUCH  AS  IPHONES  AND  IPADS,  CAN  HAVE  ACCESS  TO   CORPORATE  EMAIL.  NETSCALER  COMPARES  THE  CONNECTING  DEVICES  AGAINST  THE   CONFIGURATIONS  AND  DENIES  ACCESS  TO  ALL  ANDROID  DEVICES,  WHILE  ALLOWING   USERS  WITH  IOS  DEVICES  TO  CONNECT.     A  SECOND  USE  CASE  WOULD  BE  THAT  A  CORPORATE  COMPLIANCE  POLICY  IS  TO   BLOCK  ALL  ROOTED  OR  JAILBROKEN  DEVICES  FROM  CONNECTING  TO  CORPORATE   EMAIL.  AGAIN,  NETSCALER  COMPARES  THE  CONNECTING  DEVICES  AGAINST  THE   CONFIGURATIONS  AND  DENIES  ACCESS  BASED  ON  THE  CONFIGURATIONS.     THIS  WOULD  BE  HELPFUL  FOR  CUSTOMERS  LOOKING  AT  THE  XenMobile  MDM   EDITION,  AS  WELL  AS  THE  XENMOBILE  MOBILE  SOLUTIONS  BUNDLE.     WITHOUT  A  DOUBT,  THE  ACTIVESYNC  FEATURE  IS  A  PRIMARY  USE  CASE  FOR  MDM     28  
  • 29. A  FEATURE  OF  XENMOBILE,  ALLOWS  NETSCALER  TO  CONTROL  ACTIVESYNC  TRAFFIC,   GRANTING  ACCESS  TO  CORPORATE  MAIL,  CALENDAR,  AND  CONTACTS.   NETSCALER  ACTS  AS  THE  ENFORCEMENT  POINT  FOR  MANAGING  DEVICES  THAT  HAVE   ACCESS  TO  CORPORATE  EMAIL.       FOR  EXAMPLE,  A  CORPORATE  COMPLIANCE  POLICY  MAY  BE  TO  BLOCK  ALL  ANDROID   DEVICES  BECAUSE  THEY  MAY  DEEM  THEM  TO  BE  A  GREATER  SECURITY  RISK.   THEREFORE,  ONLY  IOS  DEVICES,  SUCH  AS  IPHONES  AND  IPADS,  CAN  HAVE  ACCESS  TO   CORPORATE  EMAIL.  NETSCALER  COMPARES  THE  CONNECTING  DEVICES  AGAINST  THE   CONFIGURATIONS  AND  DENIES  ACCESS  TO  ALL  ANDROID  DEVICES,  WHILE  ALLOWING   USERS  WITH  IOS  DEVICES  TO  CONNECT.     A  SECOND  USE  CASE  WOULD  BE  THAT  A  CORPORATE  COMPLIANCE  POLICY  IS  TO   BLOCK  ALL  ROOTED  OR  JAILBROKEN  DEVICES  FROM  CONNECTING  TO  CORPORATE   EMAIL.  AGAIN,  NETSCALER  COMPARES  THE  CONNECTING  DEVICES  AGAINST  THE   CONFIGURATIONS  AND  DENIES  ACCESS  BASED  ON  THE  CONFIGURATIONS.     THIS  WOULD  BE  HELPFUL  FOR  CUSTOMERS  LOOKING  AT  THE  XenMobile  MDM   EDITION,  AS  WELL  AS  THE  XENMOBILE  MOBILE  SOLUTIONS  BUNDLE.     WITHOUT  A  DOUBT,  THE  ACTIVESYNC  FEATURE  IS  A  PRIMARY  USE  CASE  FOR  MDM   IMPLEMENTATIONS  BECAUSE  COMPANIES  WANT  TO  KNOW  THAT  MOBILE  DEVICES   ARE  SECURE  BEFORE  THEY  ALLOW  ACCESS  TO  SENSITIVE  CORPORATE  INFORMATION.         29  
  • 30. .  Why  this  solu3on:   Mobile  applica3on  infrastructure  security  is  an  absolute  infrastructure  requirement.   Balancing  transparency  with  applica3on  level  security  requires  detailed  and  granular   policies  for  compliance.  Filtering  access  at  the  mail  server  itself  is  too  late  and   introduces  risk  associated  with  hackers  crea3ng  mayhem.             30  
  • 31. How  this  solu3on  works:   This  is  achieved  by  NetScaler  parsing  the  Ac3veSync  protocol  used  between  mobile   devices  and  Exchange  email  services  in  3ght  conjunc3on  with  XenMobile  providing   real-­‐3me  policy  updates.  As  policies  are  revised,  impact  to  individual  device  access  is   immediately  felt         31  
  • 32. A  FEATURE  OF  XENMOBILE,  ALLOWS  NETSCALER  TO  CONTROL  ACTIVESYNC  TRAFFIC,   GRANTING  ACCESS  TO  CORPORATE  MAIL,  CALENDAR,  AND  CONTACTS.   NETSCALER  ACTS  AS  THE  ENFORCEMENT  POINT  FOR  MANAGING  DEVICES  THAT  HAVE   ACCESS  TO  CORPORATE  EMAIL.       FOR  EXAMPLE,  A  CORPORATE  COMPLIANCE  POLICY  MAY  BE  TO  BLOCK  ALL  ANDROID   DEVICES  BECAUSE  THEY  MAY  DEEM  THEM  TO  BE  A  GREATER  SECURITY  RISK.   THEREFORE,  ONLY  IOS  DEVICES,  SUCH  AS  IPHONES  AND  IPADS,  CAN  HAVE  ACCESS  TO   CORPORATE  EMAIL.  NETSCALER  COMPARES  THE  CONNECTING  DEVICES  AGAINST  THE   CONFIGURATIONS  AND  DENIES  ACCESS  TO  ALL  ANDROID  DEVICES,  WHILE  ALLOWING   USERS  WITH  IOS  DEVICES  TO  CONNECT.     A  SECOND  USE  CASE  WOULD  BE  THAT  A  CORPORATE  COMPLIANCE  POLICY  IS  TO   BLOCK  ALL  ROOTED  OR  JAILBROKEN  DEVICES  FROM  CONNECTING  TO  CORPORATE   EMAIL.  AGAIN,  NETSCALER  COMPARES  THE  CONNECTING  DEVICES  AGAINST  THE   CONFIGURATIONS  AND  DENIES  ACCESS  BASED  ON  THE  CONFIGURATIONS.     THIS  WOULD  BE  HELPFUL  FOR  CUSTOMERS  LOOKING  AT  THE  XenMobile  MDM   EDITION,  AS  WELL  AS  THE  XENMOBILE  MOBILE  SOLUTIONS  BUNDLE.     WITHOUT  A  DOUBT,  THE  ACTIVESYNC  FEATURE  IS  A  PRIMARY  USE  CASE  FOR  MDM     32  
  • 33. Why  this  solu3on:   Mobile  applica3on  infrastructure  security  is  an  absolute  infrastructure  requirement.   Balancing  transparency  with  applica3on  level  security  requires  detailed  and  granular   policies  for  compliance.  Filtering  access  at  the  mail  server  itself  is  too  late  and   introduces  risk  associated  with  hackers  crea3ng  mayhem.       Next  click   How  this  solu3on  works:   This  is  achieved  by  NetScaler  parsing  the  Ac3veSync  protocol  used  between  mobile   devices  and  Exchange  email  services  in  3ght  conjunc3on  with  XenMobile  providing   real-­‐3me  policy  updates.  As  policies  are  revised,  impact  to  individual  device  access  is   immediately  felt         33  
  • 34. 34  
  • 35. 35  
  • 36. 36  
  • 37.
  • 38.
  • 39.
  • 40.
  • 41.
  • 42. 42  
  • 43. Branch  Repeater  and  Repeater  are  available  in  variety  of  form-­‐factors  and  models   based  on  the  target  applica3on.    Appliance  models  are  primarily  sized  based  on  a   customer’s  WAN  bandwidth  requirements.    The  next  few  slides  will  focus  on  how  to   posi3on  each  of  these  products.   43  
  • 44. 44  
  • 45. 45