citrix template white 2015
TRANSCRIPT
© 2017 Citrix
What If?
Andrew Schmidt, Senior Solution Center Engineer
3 APRIL 2018
2 © 2016 Citrix | Confidential
80%worry about data
breaches
74%see need for new security framework
$1 trillionspent on cyber
security by 2021
feel they can reduce risk of DDoS or ransomware attacks
Cyber Security
The world is under attack.
49%
3 © 2016 Citrix | Confidential
Experience &Productivity
Control & Security
4 © 2016 Citrix | Confidential
AUG 8 2017, 11:26 AM EThttps://www.nbcnews.com/tech/security/forget-everything-you-know-about-passwords-says-man-who-made-n790711
5 © 2016 Citrix | Confidential
6 © 2017 Citrix
What if…
You only had to sign in once?
The applications and data you need quick access to were easy to get to?
What if you only needed two-factor authentication when doing things differently than you usually do?
7 © 2016 Citrix | Confidential
Centralized PolicyDistributed
Hybrid Enforcement
FORCE THE USER FOLLOW THE USER
OLD NEW
Users
Apps
DataServices
Software-Defined Perimeter
Software Defined Perimeter
Citrix Secure Digital Workspace
Users Secure IT
Security & Performance Analytics
Unified Experience
“BYO” Identity
SingleSign-on
Unified Endpoint ManagementContextual
Access
Contextual Performance
App Ops
Content Control
Legacy/Custom
Apps
9 © 2017 Citrix
10 © 2017 Citrix
11 © 2017 Citrix
12 © 2017 Citrix
13 © 2017 Citrix
14 © 2016 Citrix | Confidential
15 © 2016 Citrix | Confidential
On Premises
• Virtualization• XenDesktop
• XenApp
• XenServer
• Networking• NetScaler ADC / Gateway
• NetScaler MAS
• NetScaler SD-WAN
• NetScaler Secure Web Gateway
The Citrix Portfolio
Hybrid
• Secure Digital Workspace• Workspace Service
• Virtualization• XenDesktop
• XenApp
• App Layering
Cloud Native
• EMM / UEM• XenMobile Service
• EFSS• ShareFile Service
• Secure Browser Standard
• NetScaler Gateway Service
• NetScaler Web App Security Service
16 © 2016 Citrix | Confidential
Start the Conversation
• What are your current business problems?
• What is your current IT state?
• Are you cloud curious or cloud adverse?
• What regulatory and compliance concerns do you have?
• What is your current IT security strategy?
• How, where and on what do your employees want to work?