Professional Documents
Culture Documents
Endpoint Security
Challenges
Protect apps and data across every endpoint
to complete your enterprise security posture.
While the Citrix approach to endpoint To maintain security, compliance and threat
security focuses largely on apps and data, protection in a world of mobile endpoints,
device-level measures play a valuable role Citrix provides visibility, analytics and
Why Use MAM if I Already Use MDM? as well. SmartAccess acts as a firewall to insights across the network, and access to
Mobile application management (MAM) manage contextual authorization based on apps and data. End-to-end monitoring of
and mobile device management (MDM) parameters such as client device OS and infrastructure, performance, events, services
are complementary technologies that patch levels, whether a device has been and availability allows IT to filter noise
can each have a valuable role to play in jailbroken, and whether anti-virus is installed, from salient information, detect abnormal
endpoint security. running and up to date. IT can also enforce connection attempts, and identify indicators
• MAM can be used to protect, control password standards, encryption, and allowed of attack and compromise that can be used to
and manage business data and resources WiFi and VPN connections. Once a device has aid incident response. Citrix Management and
separately from personal content. been checked for compliance, SmartControl Analytics Service leverages analytics and data
These app-specific measures make MAM applies the contextual security policies telemetry from all Citrix products to enable
especially suitable for BYOD; IT can protect defined by IT to control access to apps profiling and detection of security incidents.
business data without the need for device- and data based on user, device, location
level management. MAM is also useful and network. Regular auditing and accounting of user
in cases where the user does not set a access, configuration changes and account
device passcode, which can leave data Mobile Device Management management logs aid compliance and threat
unencrypted. By providing an additional For situations where platform, root of detection by capturing early indicators of
layer of app-level encryption, MAM trust and TPM (Trusted Platform Module) attack and compromise. Data centralization,
protects data even if the device itself is ownership are required, XenMobile provides hosted delivery and remote display restrict
uncompromised. mobile device management (MDM) for fully PCI data to a small, protected space that
managed devices. Admins can configure can be audited more completely and
• MDM enables device-level policies to
policies, actions and security functions to efficiently than an entire internal network.
configure, secure and support mobile users.
protect devices and the data they contain at The ability to track and report on changes
IT can enable device-wide encryption,
a system level, such as placing restrictions made to the configuration of a XenApp
enforce restrictions for VPN and WiFi, track
on what users can download from app stores, server farm, for example, by whom and
a device’s location, and automatically lock
performing full or selective wipe, or tracking what time, ensures accountability and aids
or wipe a lost or stolen device. MDM is most
geolocation data. security—especially in environments where
appropriate for corporate-owned devices
multiple administrators make modifications.
that do not contain personal data.
Network Security Configuration logs also capture an audit
trail for change management, configuration
Citrix NetScaler helps IT maintain tracking and reporting of administration
comprehensive control over apps and data activity. Administrators can record active
while simplifying access for users. Admins XenApp virtual application and server hosted
can enable single sign-on to desktop, web desktop sessions based on user, application
and SaaS applications for a streamlined or server, and then archive recordings for
access to apps across any datacenter or forensic analysis or reference when needed.
cloud. A single point of administration
ensures consistent policy enforcement Complementary Technologies
across every device people use.
As part of a comprehensive, multilayered
Mobile Networking strategy, Citrix enables integration with
XenMobile and NetScaler provide dedicated leading security solutions to enable a broad
micro-VPN tunnels for native mobile apps; range of complementary measures.
encrypted SSL/TLS sessions between the
app and NetScaler are protected from other Client Hardening
device and micro-VPN communications to As a complementary security technology for
ensure that resources on the internal network the endpoint, organizations can leverage
are not exposed to traffic from personal apps partner solutions to harden the Citrix
infected with malware. Even if the device is Receiver client on laptops and mobile devices.
comprised, the data being transmitted from Integrated with NetScaler Gateway, these
the app remains protected. solutions make it possible to protect the
browser, logon process and Citrix session
Enterprise Sales
North America | 800-424-8749
Worldwide | +1 408-790-8000
Locations
Corporate Headquarters | 851 Cypress Creek Road Fort Lauderdale, FL 33309 United States
Silicon Valley | 4988 Great America Parkway Santa Clara, CA 95054 United States
Copyright© 2017 Inc. All rights reserved. Citrix, the Citrix logo, and other marks appearing herein are property of
Citrix Systems, Inc. and/or one or more of its subsidiaries, and may be registered with the U.S. Patent and Trademark
Office and in other countries. All other marks are the property of their respective owner/s.