enable tomorrow's mobile workstyles - intel · enable tomorrow’s mobile workstyles |...

6
Enable Tomorrow’s Mobile Workstyles | Solutions Brief citrix.com Enable tomorrow’s mobile workstyles Rein in unruly laptops. Deploy and manage mobile laptops effectively. Your mobile users will thank you, and you don’t have to tell them that their laptop is managed.

Upload: others

Post on 30-May-2020

13 views

Category:

Documents


0 download

TRANSCRIPT

Enable Tomorrow’s Mobile Workstyles | Solutions Brief

citrix.com

Enable tomorrow’s mobile workstylesRein in unruly laptops.

Deploy and manage mobile laptops effectively. Your mobile users will thank you, and you don’t have to tell them that their laptop is managed.

Enable Tomorrow’s Mobile Workstyles | Solutions Brief

citrix.com

2

Today’s users increasingly work wherever they go, on a variety of devices. And they want to take corporate data and applications with them. Are you tired of the headaches that are associated with managing laptops? Tired of choosing between manageability and user flexibility? You can have it both ways: support mobile workstyles while also keeping management control squarely in the datacenter and execution local with a joint solution from Citrix and Intel.

You can meet your needs for control and security in addition to users’ needs for freedom and mobility with a client virtualization solution built on Citrix® XenClient™ and laptops powered by Intel® Core™ vPro™ processors. Mobile workstyles are here, whether you’re ready or not. Citrix and Intel can help make sure that you are prepared.

The solution combines laptops powered by Intel Core vPro processors with Citrix XenClient, a client virtualization solution that extends the benefits of XenDesktop® to laptops. XenClient-powered laptop users can access their various virtual desktops anywhere, anytime—even while disconnected from the network, and XenClient is optimized to run on Intel® Virtualization Technology. Furthermore, you can centrally manage the virtualized clients from the datacenter by using the XenClient back-end management software.

Tomorrow Is Now. Stop Managing Laptops Like It’s YesterdayLaptops are the workhorses of today’s mobile and remote computing workforce. While they are a boon to productivity because users can work wherever they go, laptops can be difficult to manage. Fortunately, the Citrix and Intel joint solution lets you manage and secure them more effectively—in less time and with fewer headaches.

For example, look at that delayed Windows 7 deployment you haven’t had time to tackle. What if you could deploy a single, centrally managed image to many remote users at once? With the Citrix and Intel solution, you can easily create or update a centrally managed desktop image and then quickly deploy that image to many users from within the datacenter. If a laptop is lost or stolen, you can remotely disable it to keep data safe. And if a user must work on a different computer, the user’s desktop can be easily restored to any Citrix Receiver™–enabled laptop that is running XenClient.

What’s in the 3rd Generation Intel® Core™ vPro™ processor family?Laptops based on 3rd generation Intel Core vPro processors help IT administrators and users work smarter and more securely.

They also deliver responsive performance that will wake your clients in a flash and adapt to your users’ needs, while providing a suite of manageability capabilities.

These platforms include:

• Improved energy efficiency for longer battery life

• Enhanced visuals with support for three displays and the latest APIs

• New responsiveness features that help improve user experience

Enable Tomorrow’s Mobile Workstyles | Solutions Brief

citrix.com

3

You can enhance management flexibility and control even further with Shared Image mode technology in XenClient. Shared Image mode helps ensure that approved corporate images are always running on endpoints, which can reduce help desk calls. Simply make necessary changes to the image in the datacenter, and the back-end management system automatically deploys the updated golden image to XenClient devices without user intervention. In addition, XenClient OS-profile virtualization lets you selectively back up and recover user data independently from the rest of the desktop image, which helps to conserve storage and network resources.

And when you take advantage of XenClient back-end management software and management capabilities built into laptops powered by Intel Core vPro processors, you can keep laptops running smoothly without taking them out of users’ hands.1 For example, you can use hardware-based KVM Remote Control (keyboard, video, mouse) to fix more issues remotely by seeing what your users are seeing with greater resolution than ever before.2

Next-Generation Manageability with Intelligent Desktop VirtualizationIntelligent desktop virtualization (IDV), such as that provided by the Citrix and Intel solution, enables both IT control and great user experience. It is based on three principles:

• Manage centrally with local execution: The desktop image executes on the local device. This model is ideal for use cases where it is desirable to use the rich processing capabilities of the local device. IT administrators manage a golden image from the datacenter and fully control operating system and application updates.

• Deliver layered images intelligently: IT administrators centrally manage the logical segments of the desktop stack as separate layers. IDV solutions synchronize these layers bidirectionally so that the local device and the datacenter always have the latest copy. Bidirectional synchronization also simplifies recovery in the event of laptop loss or failure.

• Use device-native management and security: IT administrators and management software can manage and secure endpoints by using capabilities that are embedded in the hardware or below the operating system.

The Citrix and Intel joint solution lets you support mobile workstyles because it conforms to these three principles. You get the control and security that are essential in today’s high-risk computing environment, and users get the freedom and high-quality user experience they’re used to—even when disconnected from the network.

XenClient Enterprise is the first product I have ever tested that my users want to adopt merely from word of mouth. We had employees at all levels literally begging to get these systems.

Alan Rabideau, Chief Information Officer, Residential Finance Corporation

Enable Tomorrow’s Mobile Workstyles | Solutions Brief

citrix.com

4

A Familiar User Experience Helps Keep Users HappyWhile you simplify management tasks with the joint solution, your users can stay happy and productive with a desktop experience that feels just like the native performance they’re used to. Local execution on the laptop takes advantage of performance-enhancing features of Intel Core vPro processors to deliver outstanding performance. These features include:

• Intel® Turbo Boost Technology,3 which allows processor cores to run faster when workload demands it.

• Intel® Hyper-Threading Technology,4 which makes higher throughput possible on multi-threaded software running on the virtual desktop.

In addition, XenClient takes advantage of Intel® Virtualization Technology (Intel® VT) to provide the operating system and applications with direct access to hardware resources. This approach helps ensure outstanding performance in virtualized environments, contributing to the familiar experience that users need to do their jobs.

Enable Stronger Security with Citrix XenClient and Intel Core vPro ProcessorsThe laptops that empower today’s mobile workers are under constant threat of attack from increasingly sophisticated malware. And since laptops and the data they hold are at greater risk of being lost or stolen than tethered desktop computers, proactive administrators must plan carefully to secure laptops and quickly return workers to productivity in the event of loss or theft. With XenClient, IT administrators can have security and control, even for mobile users.

One way to strengthen security is through isolation. XenClient runs directly on the hardware, allowing multiple images to run in complete isolation from one another. As a result, malware on the user’s personal desktop image cannot affect the secure corporate image.

That increased security no longer means a sacrifice in usability. For example, it is important to encrypt data to protect it on mobile laptops, but user experience should not suffer. With the joint solution, it doesn’t because XenClient accelerates Advanced Encryption Standards (AES) operations by taking advantage of Intel® Advanced Encryption Standards-New Instructions (Intel® AES-NI) on laptops powered by Intel Core vPro processors.5 To further enhance security, the XenClient back-end management gives administrators granular control over policies that control data flow. For example, administrators can disable USB devices or optical drives to ensure that sensitive data does not leave the network. Role-based administration allows IT to define and create granular administrative roles that have specifically defined capabilities, such as creating and managing virtual machines and administering users. The XenClient back-end management can also automatically and remotely disable virtual desktops on laptops that are lost or stolen, based on policies that you define.

Enable Tomorrow’s Mobile Workstyles | Solutions Brief

citrix.com

5

Extreme Isolation and Security with XenClient XT

Highly regulated industries—such as government, health care, and financial institutions—have advanced security needs that require special solutions. XenClient XT allows you to meet these requirements and extend the benefits of client virtualization to mobile laptop users in tightly secured environments. Jointly developed by Citrix and Intel, XenClient XT is a special, hardened version of the Citrix client hypervisor. It provides the highest levels of security, isolation, and auditability needed by highly regulated industries. XenClient XT:

• Ensures a secure boot platform for the virtual desktop image by taking advantage of Intel® Trusted Execution Technology (Intel® TXT).6

• Enables multiple isolated environments, with different access permissions, on a single platform. For example, users can access networks with different security classifications from different images running on a single system.

• Accelerates encryption operations when protecting sensitive data using Intel AES-NI.

• Isolates network traffic into separate virtual machines and uses access control technologies, such as Xen Security Modules.

Take the Next Steps TodayIf you are ready to rein in unruly laptops while supporting the mobile workstyles your users expect, it is time to take another look at client virtualization. You get the manageability and security you need to protect corporate data while your users get the performance, mobility, and freedom they need to be productive with a solution built on XenClient and laptops powered by Intel Core vPro processors. You can easily manage and secure many laptops from a single console, even when they are disconnected from the network. Visit www.citrix.com/xenclient to learn more.

XenClient is available in three purpose-built editions—each designed to meet specific business needs:

• XenClient Enterprise for use with central management: Virtual desktops with local execution designed to be paired with the centralized management capabilities of the XenClient Enterprise Synchronizer—offered as a part of XenDesktop Enterprise or Platinum Editions or as a standalone product.

• XenClient Express for use without central management: Free virtual desktops with local execution for IT professionals, software developers, and testers.

• XenClient XT for extreme security and isolation: Multi-level, secure local virtual desktops designed for extreme isolation, security, and performance requirements.

Try XenClient today at www.citrix.com/xenclient/tryit.

6

citrix.com0912/PDF

Corporate HeadquartersFort Lauderdale, FL, USA

Silicon Valley HeadquartersSanta Clara, CA, USA

EMEA HeadquartersSchaffhausen, Switzerland

India Development CenterBangalore, India

Online Division HeadquartersSanta Barbara, CA, USA

Pacific HeadquartersHong Kong, China

Latin America HeadquartersCoral Gables, FL, USA

UK Development CenterChalfont, United Kingdom

Enable Tomorrow’s Mobile Workstyles | Solutions Brief

1 Intel® vPro™ Technology is sophisticated and requires setup and activation. Availability of features and results will depend upon the setup and configuration of your hardware, software, and IT environment. To learn more visit: http://www.intel.com/technology/vpro/2 KVM Remote Control (Keyboard, Video, Mouse) is only available with Intel® Core™ i5 vPro™ and Core™ i7 vPro™ processors with Intel® Active Management technology activated and configured and with integrated graphics active. Discrete graphics are not supported.3 Requires a system with Intel® Turbo Boost Technology. Intel® Turbo Boost Technology and Intel® Turbo Boost Technology 2.0 are only available on select Intel® processors. Consult your PC manufacturer. Performance varies depending on hardware, software and system configuration. For more information, visit http://www.intel.com/go/turbo4 Available on select Intel® Core™ processors. Requires an Intel® HT Technology enabled system. Consult your PC manufacturer. Performance will vary depending on the specific hardware and software used. For more information including details on which processors support HT Technology, visit http://www.intel.com/info/hyperthreading5 Intel® AES-NI requires a computer system with an AES-NI-enabled processor, as well as non-Intel software to execute the instructions in the correct sequence. AES-NI is available on select Intel® Core™ processors. For availability, consult your system manufacturer. For more information, see http://software.intel.com/en-us/articles/intel-advanced-encryption-standard-instructions-aes-ni/6 (Intel® TXT) No computer system can provide absolute security under all conditions. Intel® Trusted Execution Technology (Intel® TXT) requires a computer with Intel® Virtualization Technology, an Intel TXT-enabled processor, chipset, BIOS, Authenticated Code Modules and an Intel TXT-compatible measured launched environment (MLE). Intel TXT also requires the system to contain a TPM v1.s. For more information, visit http://www.intel.com/technology/security

About CitrixCitrix Systems, Inc. (NASDAQ:CTXS) is a leading provider of virtual computing solutions that help companies deliver IT as an on-demand service. Founded in 1989, Citrix combines virtualization, networking and cloud computing technologies into a full portfolio of products that enable virtual workstyles for users and virtual datacenters for IT. More than 230,000 organizations worldwide rely on Citrix to help them build simpler and more cost-effective IT environments. Citrix partners with over 10,000 companies in more than 100 countries. Annual revenue in 2010 was $1.87 billion.

©2012 Citrix Systems, Inc. All rights reserved. Citrix®, XenDesktop®, Citrix Receiver™, and XenClient™ are trademarks of Citrix Systems, Inc. and/or one or more of its subsidiaries, and may be registered in the United States Patent and Trademark Office and in the other countries. All other trademarks and registered trademarks are the property of their respective owners.

Intel, Core, and vPro are trademarks of Intel Corporation in the U.S. and/or other countries.