|By Business Wire||
|February 20, 2013 08:02 AM EST||
Today, Citrix announced XenMobile™ MDM, an enterprise mobile device management solution that gives users device choice while also enabling IT to meet its management and compliance requirements. XenMobile MDM joins other Citrix solutions, including Citrix CloudGateway™, Citrix NetScaler®, Citrix XenDesktop®, GoToMeeting®, GoToAssist®, Citrix ShareFile™, and Citrix Podio™, providing organizations with a single vendor for all of their enterprise mobility needs.
Users are demanding the freedom to choose their own devices, use any app and access their e-mail and documents from anywhere. Organizations require a solution that addresses these user expectations, while also meeting IT’s need for security. XenMobile MDM provides the foundation to address these needs through role-based management, configuration and security of corporate and employee-owned devices. The solution is built on a highly secure architecture and integrates directly with Microsoft Active Directory and public key infrastructure systems, as well as security information and event management tools. With XenMobile MDM, users can self-service enroll their devices and IT can provision policies and apps to large groups of devices automatically. IT can blacklist or whitelist apps, detect and protect against jailbroken devices, and wipe or selectively wipe a device that is lost, stolen or out of compliance.
In addition to XenMobile MDM, Citrix now also offers a Mobile Solutions Bundle for Enterprise Mobility Management (EMM). The Mobile Solutions Bundle is comprised of XenMobile MDM and CloudGateway and eliminates the need for multiple point solutions from other vendors. This bundle combines industry-leading MDM with innovative mobile application management and delivers five key (EMM) capabilities.
- Enterprise MDM delivers role-based management, configuration and security for both corporate and employee-owned devices.
- Secure e-mail, browser and data sharing apps from Citrix deliver a rich user experience with the management and control that IT requires.
- Mobile app containers centralize IT management, security and control for any mobile app, whether created by a third party or enterprise IT.
- Unified app store provides a single place for users to access all of their apps – mobile, web, SaaS, and Windows – on any device.
- Identity management, single sign-on and scenario-based access control make it easy for IT to manage user access and radically simplify the user experience.
The Industry’s Most Comprehensive Mobility Portfolio
Citrix is the first company to offer a complete portfolio of mobile solutions, ranging from device management to native mobile apps for e-mail, web access, collaboration and data sharing, as well as desktop virtualization for seamless access to Windows apps and desktops.
Partners Support Citrix Mobility Portfolio
Citrix is working with key partners to deliver integrated solutions that leverage the Citrix enterprise mobility portfolio. Together, Citrix and its partners are helping customers mobilize their users with a comprehensive solution. These initial partners include Cisco, Fujitsu, HP, Palo Alto Networks, Samsung and Wipro Mobility Solutions .
“In today's complex enterprise mobility environment that includes a mix of corporate and employee-liable devices, companies need solutions that allow them to manage devices, data, and apps. The addition of an MDM solution to the Citrix MAM and data management capabilities create a complete solution. By offering a platform for mobile enterprise management that gives options, Citrix can help give customers the peace of mind that, if their needs change, the platform can adjust.” - Stephen Drake, Program VP Mobile Enterprise, IDC
"Samsung and Citrix solutions together enable enterprise organizations to simply and securely support workforce mobility. Samsung understands meeting the needs of enterprise mobility goes beyond device style and functionality, security and management play an important role. The announcement of Citrix XenMobile MDM addresses this important requirement and enables Citrix to provide a complete enterprise mobility management solution." - Jae Shin, VP, Global Enterprise Carrier and Head, B2B Alliance, Samsung Electronics
“The promise of mobility hinges on the ability for IT to deliver secure apps and data to users on any device. When customers bring their own devices to work, as is increasingly the norm, IT doesn’t have the tools to manage or secure the content on them. With its comprehensive portfolio of mobile solutions, Citrix offers customers the ability to say ‘yes’. Yes to total mobile freedom by providing a complete solution that can manage and secure all devices, apps and data while giving users the ability to experience work and life their way.” - Amit Pandey, Group Vice President and General Manager, Mobile Platforms, Citrix
XenMobile MDM and the Mobile Solutions Bundle will be available starting on February 25, 2013.
- Expert blog: MDM – Foundational to Enterprise Mobility Management
- Expert blog: Five Customer Requirements from an EMM Solution — All Met By One Vendor
- Expert blog: Our Intrepid Mobility Customers
- Expert blog: Redefining the Enterprise Mobility Solution
- Expert blog: A new Xen in the family – XenDesktop and XenApp have a sibling!
- Expert blog: Assumptions and Expectations – Mobility is Redefining the Perimeter
- Expert blog: Citrix NetScaler and XenMobile MDM solution - How Sweet it is!
Follow Us Online
Citrix (NASDAQ:CTXS) is the cloud computing company that enables mobile workstyles—empowering people to work and collaborate from anywhere, accessing apps and data on any of the latest devices, as easily as they would in their own office—simply and securely. Citrix cloud computing solutions help IT and service providers build both private and public clouds—leveraging virtualization and networking technologies to deliver high-performance, elastic and cost-effective services for mobile workstyles. With market leading solutions for mobility, desktop virtualization, cloud networking, cloud platforms, collaboration, and data sharing, Citrix helps organizations of all sizes achieve the kind of speed and agility necessary to succeed in an increasingly mobile and dynamic world. Citrix products are in use at more than 260,000 organizations and by over 100 million users globally. Annual revenue in 2012 was $2.59 billion. Learn more at www.citrix.com.
For Citrix Investors
This release contains forward-looking statements which are made pursuant to the safe harbor provisions of Section 27A of the Securities Act of 1933 and of Section 21E of the Securities Exchange Act of 1934. The forward-looking statements in this release do not constitute guarantees of future performance. Those statements involve a number of factors that could cause actual results to differ materially, including risks associated with the impact of the global economy and uncertainty in the IT spending environment, revenue growth and recognition of revenue, products and services, their development and distribution, product demand and pipeline, economic and competitive factors, the Company’s key strategic relationships, acquisition and related integration risks as well as other risks detailed in the Company’s filings with the Securities and Exchange Commission. Citrix assumes no obligation to update any forward-looking information contained in this press release or with respect to the announcements described herein.
The development, release and timing of any features or functionality described for our products remains at our sole discretion and is subject to change without notice or consultation. The information provided is for informational purposes only and is not a commitment, promise or legal obligation to deliver any material, code or functionality and should not be relied upon in making purchasing decisions or incorporated into any contract.
Citrix®, XenMobile™, CloudGateway™, XenDesktop®, NetScaler®, GoToMeeting®, GoToAssist®, ShareFile™ and Podio™ are trademarks or registered trademarks of Citrix Systems, Inc. and/or one or more of its subsidiaries, and may be registered in the U.S. Patent and Trademark Office and in other countries.
The Jevons Paradox suggests that when technological advances increase efficiency of a resource, it results in an overall increase in consumption. Writing on the increased use of coal as a result of technological improvements, 19th-century economist William Stanley Jevons found that these improvements led to the development of new ways to utilize coal. In his session at 19th Cloud Expo, Mark Thiele, Chief Strategy Officer for Apcera, will compare the Jevons Paradox to modern-day enterprise IT, e...
Sep. 27, 2016 07:30 PM EDT Reads: 2,130
Complete Internet of Things (IoT) embedded device security is not just about the device but involves the entire product’s identity, data and control integrity, and services traversing the cloud. A device can no longer be looked at as an island; it is a part of a system. In fact, given the cross-domain interactions enabled by IoT it could be a part of many systems. Also, depending on where the device is deployed, for example, in the office building versus a factory floor or oil field, security ha...
Sep. 27, 2016 07:15 PM EDT Reads: 422
SYS-CON Events announced today that Bsquare has been named “Silver Sponsor” of SYS-CON's @ThingsExpo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. For more than two decades, Bsquare has helped its customers extract business value from a broad array of physical assets by making them intelligent, connecting them, and using the data they generate to optimize business processes.
Sep. 27, 2016 07:00 PM EDT Reads: 2,846
Whether they’re located in a public, private, or hybrid cloud environment, cloud technologies are constantly evolving. While the innovation is exciting, the end mission of delivering business value and rapidly producing incremental product features is paramount. In his session at @DevOpsSummit at 19th Cloud Expo, Kiran Chitturi, CTO Architect at Sungard AS, will discuss DevOps culture, its evolution of frameworks and technologies, and how it is achieving maturity. He will also cover various st...
Sep. 27, 2016 06:45 PM EDT Reads: 1,809
Identity is in everything and customers are looking to their providers to ensure the security of their identities, transactions and data. With the increased reliance on cloud-based services, service providers must build security and trust into their offerings, adding value to customers and improving the user experience. Making identity, security and privacy easy for customers provides a unique advantage over the competition.
Sep. 27, 2016 06:30 PM EDT Reads: 3,559
There are several IoTs: the Industrial Internet, Consumer Wearables, Wearables and Healthcare, Supply Chains, and the movement toward Smart Grids, Cities, Regions, and Nations. There are competing communications standards every step of the way, a bewildering array of sensors and devices, and an entire world of competing data analytics platforms. To some this appears to be chaos. In this power panel at @ThingsExpo, moderated by Conference Chair Roger Strukhoff, Bradley Holt, Developer Advocate a...
Sep. 27, 2016 06:30 PM EDT Reads: 2,187
SYS-CON Events announced today that Niagara Networks will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Niagara Networks offers the highest port-density systems, and the most complete Next-Generation Network Visibility systems including Network Packet Brokers, Bypass Switches, and Network TAPs.
Sep. 27, 2016 06:15 PM EDT Reads: 379
SYS-CON Events announced today that Secure Channels will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. The bedrock of Secure Channels Technology is a uniquely modified and enhanced process based on superencipherment. Superencipherment is the process of encrypting an already encrypted message one or more times, either using the same or a different algorithm.
Sep. 27, 2016 06:00 PM EDT Reads: 1,696
If you’re responsible for an application that depends on the data or functionality of various IoT endpoints – either sensors or devices – your brand reputation depends on the security, reliability, and compliance of its many integrated parts. If your application fails to deliver the expected business results, your customers and partners won't care if that failure stems from the code you developed or from a component that you integrated. What can you do to ensure that the endpoints work as expect...
Sep. 27, 2016 05:45 PM EDT Reads: 1,656
So, you bought into the current machine learning craze and went on to collect millions/billions of records from this promising new data source. Now, what do you do with them? Too often, the abundance of data quickly turns into an abundance of problems. How do you extract that "magic essence" from your data without falling into the common pitfalls? In her session at @ThingsExpo, Natalia Ponomareva, Software Engineer at Google, provided tips on how to be successful in large scale machine learning...
Sep. 27, 2016 05:30 PM EDT Reads: 2,010
[session] Understanding the Inscrutable Chinese Internet By @CDSGlobalCloud | @CloudExpo #API #Cloud
If you had a chance to enter on the ground level of the largest e-commerce market in the world – would you? China is the world’s most populated country with the second largest economy and the world’s fastest growing market. It is estimated that by 2018 the Chinese market will be reaching over $30 billion in gaming revenue alone. Admittedly for a foreign company, doing business in China can be challenging. Often changing laws, administrative regulations and the often inscrutable Chinese Interne...
Sep. 27, 2016 05:15 PM EDT Reads: 299
In his general session at 18th Cloud Expo, Lee Atchison, Principal Cloud Architect and Advocate at New Relic, discussed cloud as a ‘better data center’ and how it adds new capacity (faster) and improves application availability (redundancy). The cloud is a ‘Dynamic Tool for Dynamic Apps’ and resource allocation is an integral part of your application architecture, so use only the resources you need and allocate /de-allocate resources on the fly.
Sep. 27, 2016 05:15 PM EDT Reads: 2,765
Enterprise IT has been in the era of Hybrid Cloud for some time now. But it seems most conversations about Hybrid are focused on integrating AWS, Microsoft Azure, or Google ECM into existing on-premises systems. Where is all the Private Cloud? What do technology providers need to do to make their offerings more compelling? How should enterprise IT executives and buyers define their focus, needs, and roadmap, and communicate that clearly to the providers?
Sep. 27, 2016 05:00 PM EDT Reads: 1,596
More and more companies are looking to microservices as an architectural pattern for breaking apart applications into more manageable pieces so that agile teams can deliver new features quicker and more effectively. What this pattern has done more than anything to date is spark organizational transformations, setting the foundation for future application development. In practice, however, there are a number of considerations to make that go beyond simply “build, ship, and run,” which changes ho...
Sep. 27, 2016 04:00 PM EDT Reads: 2,659
SYS-CON Events announced today that Commvault, a global leader in enterprise data protection and information management, has been named “Bronze Sponsor” of SYS-CON's 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Commvault is a leading provider of data protection and information management solutions, helping companies worldwide activate their data to drive more value and business insight and to transform moder...
Sep. 27, 2016 03:15 PM EDT Reads: 2,763
SYS-CON Events announced today that eCube Systems, a leading provider of middleware modernization, integration, and management solutions, will exhibit at @DevOpsSummit at 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. eCube Systems offers a family of middleware evolution products and services that maximize return on technology investment by leveraging existing technical equity to meet evolving business needs. ...
Sep. 27, 2016 03:15 PM EDT Reads: 1,405
Using new techniques of information modeling, indexing, and processing, new cloud-based systems can support cloud-based workloads previously not possible for high-throughput insurance, banking, and case-based applications. In his session at 18th Cloud Expo, John Newton, CTO, Founder and Chairman of Alfresco, described how to scale cloud-based content management repositories to store, manage, and retrieve billions of documents and related information with fast and linear scalability. He addres...
Sep. 27, 2016 03:15 PM EDT Reads: 2,869
The many IoT deployments around the world are busy integrating smart devices and sensors into their enterprise IT infrastructures. Yet all of this technology – and there are an amazing number of choices – is of no use without the software to gather, communicate, and analyze the new data flows. Without software, there is no IT. In this power panel at @ThingsExpo, moderated by Conference Chair Roger Strukhoff, panelists will look at the protocols that communicate data and the emerging data analy...
Sep. 27, 2016 03:00 PM EDT Reads: 1,693
Fifty billion connected devices and still no winning protocols standards. HTTP, WebSockets, MQTT, and CoAP seem to be leading in the IoT protocol race at the moment but many more protocols are getting introduced on a regular basis. Each protocol has its pros and cons depending on the nature of the communications. Does there really need to be only one protocol to rule them all? Of course not. In his session at @ThingsExpo, Chris Matthieu, co-founder and CTO of Octoblu, walk you through how Oct...
Sep. 27, 2016 02:45 PM EDT Reads: 2,214
We’ve been doing it for years, decades for some. How many websites have you created accounts on? Your bank, your credit card companies, social media sites, hotels and travel sites, online shopping sites, and that’s just the start. We do it often without even thinking about it, quickly entering our personal information, our data, in a plethora of systems. Sometimes we’re not even aware of the information we are providing. It could be very personal information (think of the security questions you ...
Sep. 27, 2016 02:45 PM EDT Reads: 4,670