Securing remote endpoints is one of the most challenging responsibilities of corporate security teams. Without the assistance of network security, endpoints are vulnerable to malicious code that initiates unauthorized software configuration changes, discovers and steals regulated data residing in files and temporary storage, and eavesdrops to acquire usernames and passwords. Traditional endpoint security best practices have proven to be ineffective in preventing malware, especially for endpoints serving both personal and professional uses. A new approach to endpoint protection and management for enterprise users is desperately needed. The Ogren Group feels that using virtualization to isolate the business environment places control in the hands of IT professionals to maintain compliant endpoint configurations and protect regulated data in a manner that scales easily to enterprise levels.
Citrix is one of the industry leaders in virtualization solutions, with advanced capabilities to centrally host desktops and applications in the secure data center with VDI and high performance remote display protocols. Between the enhancements for XenClient, Receiver for XenClient, Synchronizer for XenClient, and Citrix FlexCast Delivery protocols, the pieces are falling into place for Citrix to offer enterprise IT a common user friendly application self-service environment that increases the availability of compliant applications and protects sensitive data.
What is significant about this announcement
The Ogren Group believes that extending virtualization to embrace locally hosted solutions for remote and mobile users is a key innovation for Citrix. While a virtual desktop infrastructure solves compliance and security problems for office workers, VDI's expectations for network availability or bandwidth utilization for remote display protocols has necessitated locally hosted application architectures for remote and mobile users. The Citrix innovations allow IT to converge support for office and remote users with centralized administration, while offering more flexibility to the business for secure application access. The main elements that the Ogren Group found exciting are:
Why this step is important
With the economic recovery upon us, many organizations are planning on long-delayed infrastructure upgrades, a migration of endpoints to Windows 7, and an expansion of web-based access to employees, business partners, and customers. Citrix is using its virtualization strengths to lead IT on a path where the application infrastructure can dynamically choose the optimal application access method to meet security, performance, and usability requirements for office, remote, and mobile users:
The flexibility in application delivery provided by the Citrix approach, with centralized control by IT and security teams, sets the stage for significant endpoint operating expense savings, security enhancements of software and data, and less-invasive user experiences.
Microsoft moved to the cloud in 2014, and, as a result, Office 365 is taking off. Now, Okta customers are connecting to Office 365 in increasing numbers. This eGuide explains why IT departments should plan and deploy solutions around identity and mobility management in concert with their Office 365 roll out to get maximum user adoption. more
For most companies, Active Directory (AD) or Lightweight Directory Access Protocol (LDAP) play a central role in coordinating identity and access management policies. When on-premise applications are integrated to Active Directory or LDAP, users get the best possible experience. That's why Okta's cloud-based identity and access management service provides a highly useful single integration point. more
In the 1980s and 1990s, business applications and data were largely confined within and protected by a Local Area Network (LAN). The 2000s introduced a significant change. Download this white paper now to learn why the shift to the cloud is changing how companies think about and manage their IT infrastructure. more
With more and more businesses adopting Software-as-a-Service (SaaS) applications, enterprise IT is fundamentally changing. This whitepaper presents the eight biggest Identity and Access Management (IAM) challenges associated with adopting and deploying cloud and SaaS applications, and discusses best practices for addressing each of them. more