welcome! securely sync, store & share with citrix sharefile › seminar_slides › documents ›...

Post on 24-Jun-2020

5 Views

Category:

Documents

0 Downloads

Preview:

Click to see full reader

TRANSCRIPT

Securely Sync, Store & Share

with Citrix ShareFile

Welcome!

Dennis Kloster

System Source

dkloster@syssrc.com

Charlie Brinson

Citrix

charlie.brinson@citrix.com

Chris Riley

System Source

criley@syssrc.com

During the Webinar…

Audio – In presentation mode until end

Control Panel

View webinar in full screen mode

Feel Free to submit written questions

Open Q & A at the end – Please Raise Your Hand

and we will open up your line!

Survey at conclusion of webinar

If it hasn’t arrived by 12:15

Please double check with your receptionist

then contact Tracey Maranto:

EMAIL: tmaranto@syssrc.com

CALL or TEXT: 443-865-6446

(we are recording the webinar –

so don’t think twice about stepping away

for a few minutes to go pick it up at your front desk!)

We Hope You

are Enjoying

Your Pizza!!

System Source & Citrix:

Long Term Citrix Partner since 1990’s

Citrix Solution Adviser

Specializing in:

Small Business to Enterprise

Non-profit

Education

© 2015 Citrix | Confidential

ShareFile OverviewWhat is ShareFile

© 2015 Citrix | Confidential

Fragmentation of Devices, Apps, and Data

Devices Data

© 2015 Citrix | Confidential

ShareFile Enables Mobile Workspaces

Create Content

outline

Full Content

Creation

Final Touches

and Present

© 2015 Citrix | Confidential

ShareFile OverviewShareFile from 25,000 feet

Application Tier• USA or Europe

• Web Application

• Reporting

Storage• Citrix-Managed

• Customer-Managed

Authentication• Active Directory / Multi-factor

• XenMobile / SAML 2.0 IdP

Clients

Authorization

Business Logic

© 2015 Citrix | Confidential

ShareFile OverviewStorage Options

NetworkShares

Personal Cloud Connectors

StorageZone Controller

StorageZones

Citrix-Managed Customer-Managed

Connectors

If it hasn’t arrived by 12:15

Please double check with your receptionist

then contact Tracey Maranto:

EMAIL: tmaranto@syssrc.com

CALL or TEXT: 443-865-6446

(we are recording the webinar –

so don’t think twice about stepping away

for a few minutes to go pick it up at your front desk!)

We Hope You

are Enjoying

Your Pizza!!

© 2015 Citrix | Confidential

Securely edit Microsoft Office files & PDFs

© 2015 Citrix | Confidential

Online document viewing and editingVia Microsoft Office Online

• Rich file interaction without

requiring download

• Leverages Microsoft web app

viewer ᵒ PowerPoint animations

ᵒ Excel calculations

ᵒ MS Word & PDF rendering

ᵒ Edit in browser

© 2015 Citrix | Confidential

Sharing Content

© 2015 Citrix | Confidential

Document SharingAnonymous Sharing

• Immediate download or view

• Online viewing– Available when using Citrix-Managed StorageZones

– Utilizes Microsoft Office Web App server

– Word, Excel, PowerPoint, PDF

Audit logging– Timestamp

– IP address

© 2015 Citrix | Confidential

Document SharingRequest Contact Info

• Request for basic contact information– Email

– First name

– Last name

– Company

• Anonymous download

Audit logging– Name & email

– Timestamp

– IP address

© 2015 Citrix | Confidential

Document SharingRequire Client Login

• Restricts download by email address– Clients accounts automatically created

– Requires username and password

– Email validation

– Cannot forward sharing links/emails

Audit logging– First name, last name, email address

– Timestamp

– IP address

© 2015 Citrix | Confidential

Additional Sharing Controls

Require Client Login• Disables anonymous sharing of documents

• Restricts ability for recipients to forward shared links to someone else

Blacklist / Whitelist• Prohibit sharing with specific email domains

• Restrict sharing to only specific email domains

Client 2-step verification• 2-step verification on untrusted devices using SMS messages, Google Authenticator

© 2015 Citrix | Confidential

Sharing ContentExample: Sharing from Web

© 2015 Citrix | Confidential

ShareFile Tools

© 2015 Citrix | Confidential

ShareFile ToolsSync for Windows and Mac

• Automatic background sync

• Users can select which folders they

want available offline

• Remote wipe support

© 2015 Citrix | Confidential

ShareFile ToolsDrive Mapper

Great way to incorporate ShareFile into:

© 2015 Citrix | Confidential

ShareFile ToolsOutlook Plugin

© 2015 Citrix | Confidential

User ProvisioningUser Management Tool

© 2015 Citrix | Confidential

ShareFile User Provisioning

3 ways to provision users

Manual

• Input data via administration

portal (single entry or batch

import from Excel)

• Built-in support for user

provisioning

• Required for MDX-wrapped

ShareFile mobile apps

• Limited support for setting

ShareFile privileges

• No support for group creation

User Management Tool

• On-premises tool

• Creates and updates users,

groups, and group memberships

• Reads from Active Directory

• Supports scheduled

synchronization

© 2015 Citrix | Confidential

ShareFile User ProvisioningUse Existing data store

Active

Directory

Users

Groups

Employees

GroupsGroup Name

Employee Membership

First Name

Last Name

Email Address

© 2015 Citrix | Confidential

ShareFile AuthenticationSAML…SSO…XenMobile

© 2015 Citrix | Confidential

• Unified storefront for all

applications, data and services

• Instant user provisioning and de-

provisioning

• Single sign-on with Citrix Worx

• Real-time SaaS application

monitoring

• Comprehensive access control

policies

AuthenticationOptions available

ShareFile Managed

• Uses email address and a

ShareFile password

• Passwords are stored hashed in

the ShareFile Control Plane

• Admin portal supports password

policy management

Customer IdP

• Requires customer provided and

configured SAML 2.0 identity

provider

• Supports Forms, Basic, and

Windows Integrated protocols

• Tested with ADFS 2.0,

PingFederate, SiteMinder, Okta

• Supported only with ‘Enterprise’

tools

© 2015 Citrix | Confidential

Demo

© 2015 Citrix | Confidential

Workflows

© 2015 Citrix | Confidential

• Integrate Citrix into daily routine

• Save time

• Increase productivity

• Minimize human error

• Replace CRM

• Go paperless

• Digital transformation

Why Workflows?

© 2015 Citrix | Confidential

Which workflow works for you?Different types of workflows for different use cases

Document workflows

Automate document-based workflows with approval,

feedback, annotations, and e-signature

Business workflows

Automate business procedures, actions,

activities and processes

© 2015 Citrix | Confidential

WorkflowsDocument Workflows

• Built in to ShareFile

– Parallel approvals

– Sequential approvals

– Collect feedback

• Approved and/or signed versions return to SF

• Automate document-based workflows with approval, feedback, annotations, and e-signature

© 2015 Citrix | Confidential

WorkflowsBusiness / Process example use cases

• Employee onboarding

• Performance reviews

• Travel requests

• Procurement & work order approvals

• Expense approvals

• Invoice processing

• Procurement & work order approvals

• Field data gathering

• User account provisioning

• Group membership management

• HR process enforcement

© 2015 Citrix | Confidential

General ShareFile SecurityBuilt-in User and Device security

© 2015 Citrix | Confidential

General ShareFile SecurityBuilt-in User Security

• Disable Download

• Require Password / Login

• Session Inactivity timeout

• Two-step verification

• Account Lock-out

• Oauth Lifetime

• Password Complexity Requirements

© 2015 Citrix | Confidential

General ShareFile SecurityBuilt-in Mobile Device Security

• Encryption at rest / in-transit

• Offline / Online access to files

• Device Restrictions

• File Self Destruct (Poison Pill)

• Passcode / Pin Code

• Modified Device Detection

• External Applications

© 2015 Citrix | Confidential

Security:Reporting and Auditing

• ShareFile Reports

• Usage Report

• Access Audit

• Messaging

• Storage

• Bandwidth Detail

• Bandwidth Summary

© 2015 Citrix | Confidential

Security:Mobile Device Security – without Mobile Device Management software

• All settings are customizable:

- Self Destruct

- Require User Passcode

- Enable External Applications

- Enable Offline Access to Files

- Enable Automatic Login

- Restrict Modified Devices

- Jail broken Devices

• Remote Wipe

• Device Lock

© 2015 Citrix | Confidential

Data Loss PreventionContent Centric Security

© 2015 Citrix | Confidential

ShareFile DLP integrationWhy DLP

Enterprise customers need to restrict document sharing

based on the content found within the document. Problem

Solution

File Upload

StorageZone DLP(or other DLP

system)

Classification

© 2015 Citrix | Confidential

ShareFile DLP IntegrationSupported Providers (any that support the ICAP protocol)

© 2015 Citrix | Confidential

StorageZonesData Storage Flexibility

© 2015 Citrix | Confidential

Flexibility: ShareFile StorageZonesShareFile gives you options

Citrix-Managed StorageZones Customer-Managed StorageZones

© 2015 Citrix | Confidential

StorageZonesClients just see “ShareFile”

© 2015 Citrix | Confidential

ShareFile ConnectorsAccess existing data repositories

© 2015 Citrix | Confidential

ConnectorsWhy?

Documents stay in their native repository

No changes to permissions & auditing

Windows, iOS, Android, web

Open, edit, share, use offline

© 2015 Citrix | Confidential

ConnectorsWhat

NAS Data Personal Cloud and MiscECM Software

File Servers

(CIFS/SMB)

Home

Directory

ShareFile feature Connector Sharing can

allow on-premises data to be shared

externally

© 2015 Citrix | Confidential

Live Q & APlease “Raise Your Hand”

And we will Open Your Line

Please Take Our Brief Survey at Conclusion of the Webinar!

THANKS FOR SPENDING YOUR LUNCH WITH US

top related