virtual end-user computing business resiliency & mobility ... · virtual end-user computing...

31
Virtual End-User Computing Business Resiliency & Mobility with the Secure Digital Workspace Presented By: Keith Qualter XenTegra VP | Sales & Business Development

Upload: others

Post on 29-May-2020

16 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Virtual End-User Computing Business Resiliency & Mobility ... · Virtual End-User Computing Business Resiliency & Mobility with the Secure Digital Workspace ... RESERVED Agenda •Introduction

Virtual End-User Computing

Business Resiliency & Mobility with the Secure Digital Workspace

Presented By:

Keith QualterXenTegraVP | Sales & Business Development

Page 2: Virtual End-User Computing Business Resiliency & Mobility ... · Virtual End-User Computing Business Resiliency & Mobility with the Secure Digital Workspace ... RESERVED Agenda •Introduction

© 2018 XenTegra - ALL RIGHTS RESERVED

Agenda

• Introduction & Background

• Modern Challenges with Traditional End-User Computing Models

• Live Demo - Virtual Computing

• The Secure Digital Workspace – A New Way to Work

• Resiliency: Cloud, Multi Cloud, Hybrid

• Access Control & Security

• Q&A – Time Permitting

Page 3: Virtual End-User Computing Business Resiliency & Mobility ... · Virtual End-User Computing Business Resiliency & Mobility with the Secure Digital Workspace ... RESERVED Agenda •Introduction

© 2018 XenTegra - ALL RIGHTS RESERVED

Background

Page 4: Virtual End-User Computing Business Resiliency & Mobility ... · Virtual End-User Computing Business Resiliency & Mobility with the Secure Digital Workspace ... RESERVED Agenda •Introduction

© 2018 XenTegra - ALL RIGHTS RESERVED

Background

• 20+ Year IT Career

• Telephony, Networking, TCPIP/FC Etc. Test, Server Virtualization, ECU

• 8 Years with Citrix

• 3 Years with XenTegra as VP of Sales

• Worked with the NCLGISA Community for many years

• Live in Wake Forest

• 7 Kids

• Love being an End User (Virtual)

Page 5: Virtual End-User Computing Business Resiliency & Mobility ... · Virtual End-User Computing Business Resiliency & Mobility with the Secure Digital Workspace ... RESERVED Agenda •Introduction

© 2018 XenTegra - ALL RIGHTS RESERVED

Page 6: Virtual End-User Computing Business Resiliency & Mobility ... · Virtual End-User Computing Business Resiliency & Mobility with the Secure Digital Workspace ... RESERVED Agenda •Introduction

© 2018 XenTegra - ALL RIGHTS RESERVED

Cloud / Mobile Era

On-Premise + ERP Apps

Company-Issued Desktops/Laptops

Office Workers

Datacenter On-Premise

App + Network TrafficWithin Datacenter

On-Site Data Multiple Cloud Storage Zones

SaaS and Mobile Apps

PC’s, Laptops, Tablets, Smartphones, Connected Things

Work Anywhere, Contractors, Multi-Generational Workforce

Branch Operations, and Hybrid-Multi Cloud

Page 7: Virtual End-User Computing Business Resiliency & Mobility ... · Virtual End-User Computing Business Resiliency & Mobility with the Secure Digital Workspace ... RESERVED Agenda •Introduction

© 2018 XenTegra - ALL RIGHTS RESERVED

Security RisksThe total cost of a successful cyber attack is over

$5 million, or $301 per employee.*

Cloud AdoptionForrester predicts that more than 50% of global enterprises will rely on at least one public cloud platform to drive digital

transformation and delight customers

IdentityThe need for entitlements to provide specific authorizations for identity-based computing.

Remote AccessFrom mergers and acquisitions to global expansion to disaster recovery,

your users need access to their apps and data from anywhere at any time:

* Source: The Ponemon Institute

50%

54% of companies experienced one or more successful attacks that compromised data or IT infrastructure*

54%

Forces of change

Page 8: Virtual End-User Computing Business Resiliency & Mobility ... · Virtual End-User Computing Business Resiliency & Mobility with the Secure Digital Workspace ... RESERVED Agenda •Introduction

© 2018 XenTegra - ALL RIGHTS RESERVED

Challenges for business

Rewriting apps to support

mobile OS which is costly

and time consuming.

No mobile apps.

Designers & Engineers

stuck to workstations.

Can’t access/share designs

remotely in real time.

Employees/Contractors

bringing own devices

regardless of BYOD policy.

Organization exposed to

risks from security,

compliance gaps and IT

complexity.

Mobile Apps

Designers & Engineers

BYOD

Critical data replicated

between headquarters and

branch office.

Congested network

connection between

headquarters and branch

office.

Remote & Branch

Workers

Page 9: Virtual End-User Computing Business Resiliency & Mobility ... · Virtual End-User Computing Business Resiliency & Mobility with the Secure Digital Workspace ... RESERVED Agenda •Introduction

© 2018 XenTegra - ALL RIGHTS RESERVED

Challenges for IT

Operating system upgrades,

updates & patches on

individual distributed PCs.

Can’t redirect funds towards

more innovative IT

initiatives.

Maintain large set of desktop

images to deal with complex

mix of laptop hardware.

Problems supporting users

offline or on intermittent

connections.

Maintain expensive office

real estate.

No flexibility to keep up with

increasing business needs.

PC Refresh Corporate Laptops

Call Centers

Access and modify files

locally on external devices

that don’t adhere to

corporate standards.

No data security.Contractor & Partner

Access

Page 10: Virtual End-User Computing Business Resiliency & Mobility ... · Virtual End-User Computing Business Resiliency & Mobility with the Secure Digital Workspace ... RESERVED Agenda •Introduction

© 2018 XenTegra - ALL RIGHTS RESERVED

What is driving IT demand for app and desktop virtualization?

Percent of respondents, N=136, multiple responses accepted) Source: Enterprise Strategy Group, 2014.

33%

35%

35%

37%

38%

42%

0% 10% 20% 30% 40% 50%

Simplified OS deployments/upgrades

Improved support for remote/mobile users

Reduced IT operational expenses associated withsupporting end-users/endpoint devices

Centralized backup of desktops, laptops, andother client access devices

Simplified patch management

Simplified desktop provisioning

What benefits has your organization realized as a result of deploying app and desktop virtualization solution?

Page 11: Virtual End-User Computing Business Resiliency & Mobility ... · Virtual End-User Computing Business Resiliency & Mobility with the Secure Digital Workspace ... RESERVED Agenda •Introduction

© 2019 Citrix | Confidential

NICHE PRODUCTS = COMPLEXITY

BFSS Integration Tools

SearchMail

Productivity

Identity & Access Management

SSO

RBAC

App-Ops

VDI

VCC

App Delivery

CASB

EMM

UEBA NTA

IPS

NGFW

WAFaaS

SWGaaS

DDoS

Cyber Security & Threat Detection

Application Delivery Networks

ADC + Gateway

SD-WAN

SDWANaaS

WAN ADCaaSGSLB

SSL

LB

DLP

VPN

DNS

MDM

UEM

MAM

Endpoint Management

Page 12: Virtual End-User Computing Business Resiliency & Mobility ... · Virtual End-User Computing Business Resiliency & Mobility with the Secure Digital Workspace ... RESERVED Agenda •Introduction

© 2018 XenTegra - ALL RIGHTS RESERVED

Demands of the Modern Workforce

Work Anywhere

DeviceFlexibility

(BYOD)

SimpleSecurity

SelfService

TechSavvy

ConsistentExperience

AuthenticationSimplicity

CollaborationTools

Page 13: Virtual End-User Computing Business Resiliency & Mobility ... · Virtual End-User Computing Business Resiliency & Mobility with the Secure Digital Workspace ... RESERVED Agenda •Introduction

© 2018 XenTegra - ALL RIGHTS RESERVED

Page 14: Virtual End-User Computing Business Resiliency & Mobility ... · Virtual End-User Computing Business Resiliency & Mobility with the Secure Digital Workspace ... RESERVED Agenda •Introduction

© 2018 XenTegra - ALL RIGHTS RESERVED

Demo

Page 15: Virtual End-User Computing Business Resiliency & Mobility ... · Virtual End-User Computing Business Resiliency & Mobility with the Secure Digital Workspace ... RESERVED Agenda •Introduction

© 2018 XenTegra - ALL RIGHTS RESERVED

What’s required?

Workspace Technology

Stack

Apps and Desktops

Content Collaboration

Unified app catalog for all apps

Unified Endpoint Management

Secu

re A

cces

s (N

etw

ork

)

Vis

ibili

ty &

An

alyt

ics

Co

nsi

sten

t U

ser

Exp

erie

nce

SaaS/Web

Page 16: Virtual End-User Computing Business Resiliency & Mobility ... · Virtual End-User Computing Business Resiliency & Mobility with the Secure Digital Workspace ... RESERVED Agenda •Introduction

© 2018 XenTegra - ALL RIGHTS RESERVED

The Digital Workspace

Page 17: Virtual End-User Computing Business Resiliency & Mobility ... · Virtual End-User Computing Business Resiliency & Mobility with the Secure Digital Workspace ... RESERVED Agenda •Introduction

© 2018 XenTegra - ALL RIGHTS RESERVED

Secure Delivery of All Apps

Single point of entry to ALL apps and data

SaaS

Virtualized apps and desktops

Mobile apps

Distributed Data

Sources

Page 18: Virtual End-User Computing Business Resiliency & Mobility ... · Virtual End-User Computing Business Resiliency & Mobility with the Secure Digital Workspace ... RESERVED Agenda •Introduction

© 2019 Citrix | Confidential

Page 19: Virtual End-User Computing Business Resiliency & Mobility ... · Virtual End-User Computing Business Resiliency & Mobility with the Secure Digital Workspace ... RESERVED Agenda •Introduction

© 2019 Citrix | Confidential

On-prem Windows Apps

Page 20: Virtual End-User Computing Business Resiliency & Mobility ... · Virtual End-User Computing Business Resiliency & Mobility with the Secure Digital Workspace ... RESERVED Agenda •Introduction

© 2019 Citrix | Confidential

Cloud Windows Apps

Page 21: Virtual End-User Computing Business Resiliency & Mobility ... · Virtual End-User Computing Business Resiliency & Mobility with the Secure Digital Workspace ... RESERVED Agenda •Introduction

© 2019 Citrix | Confidential

Secured SaaS Apps

Page 22: Virtual End-User Computing Business Resiliency & Mobility ... · Virtual End-User Computing Business Resiliency & Mobility with the Secure Digital Workspace ... RESERVED Agenda •Introduction

© 2019 Citrix | Confidential

On-prem Desktop

Page 23: Virtual End-User Computing Business Resiliency & Mobility ... · Virtual End-User Computing Business Resiliency & Mobility with the Secure Digital Workspace ... RESERVED Agenda •Introduction

© 2019 Citrix | Confidential

Cloud Desktop

Page 24: Virtual End-User Computing Business Resiliency & Mobility ... · Virtual End-User Computing Business Resiliency & Mobility with the Secure Digital Workspace ... RESERVED Agenda •Introduction

© 2019 Citrix | Confidential

On-Prem Docs

Page 25: Virtual End-User Computing Business Resiliency & Mobility ... · Virtual End-User Computing Business Resiliency & Mobility with the Secure Digital Workspace ... RESERVED Agenda •Introduction

© 2019 Citrix | Confidential

Cloud Docs

Page 26: Virtual End-User Computing Business Resiliency & Mobility ... · Virtual End-User Computing Business Resiliency & Mobility with the Secure Digital Workspace ... RESERVED Agenda •Introduction

© 2018 XenTegra - ALL RIGHTS RESERVED

PrivateCloud

VirtualizationHCIAppliances

Hybrid-cloud, multi-cloud strategy

Page 27: Virtual End-User Computing Business Resiliency & Mobility ... · Virtual End-User Computing Business Resiliency & Mobility with the Secure Digital Workspace ... RESERVED Agenda •Introduction

© 2018 XenTegra - ALL RIGHTS RESERVED

Policy Controls

Session Recording

Map client drives

Allow USB devices

Turn off clipboard

Connect client printers

Page 28: Virtual End-User Computing Business Resiliency & Mobility ... · Virtual End-User Computing Business Resiliency & Mobility with the Secure Digital Workspace ... RESERVED Agenda •Introduction

© 2018 XenTegra - ALL RIGHTS RESERVED

Text-based session watermarking

Tamper-proof identification• Username• Protocol• Hostname• Timestamp• Client IP address

Page 29: Virtual End-User Computing Business Resiliency & Mobility ... · Virtual End-User Computing Business Resiliency & Mobility with the Secure Digital Workspace ... RESERVED Agenda •Introduction

© 2018 XenTegra - ALL RIGHTS RESERVED

Access

Content

Apps

Network

PartnerEcosystem

SaaS Apps

Mobile Apps

Devices

Virtual Apps

Networks

Risk Meter

New Risk Indicators & Actions

Policy

High

Medium

Low

Verify Against User HistoryIdentify Ransomware Pattern

Page 30: Virtual End-User Computing Business Resiliency & Mobility ... · Virtual End-User Computing Business Resiliency & Mobility with the Secure Digital Workspace ... RESERVED Agenda •Introduction

© 2019 Citrix | Confidential

Actionable analytics for closed loop securityUser Behavior, Application Security, Data Security

Page 31: Virtual End-User Computing Business Resiliency & Mobility ... · Virtual End-User Computing Business Resiliency & Mobility with the Secure Digital Workspace ... RESERVED Agenda •Introduction

www.electricities.com

FOLLOW US ON SOCIAL MEDIA:

@ncpublicpower

facebook.com/Electricities

@ElectriCitiesNC