Mobile Security starts with Citrix Receiver, CloudGateway and ShareFile

3:22 PM
Mobile Security starts with Citrix Receiver, CloudGateway and ShareFile -

It is time to take action to advance the management of enterprise mobility and security. Companies must allow workers to bring the latest devices in the workplace to stay competitive. Respect and protection of sensitive corporate data must be ensured. These duties are apparently contradict each other, but must be balanced for harmony in the workplace. Where to start?

The need to support BYO users and consumer-grade systems is forcing companies to reassess security. Some adopt a scattergun approach - to accept too much risk - while others go too far in the opposite direction by limiting these new ways of working. Although the overall security can not be relaxed just to support convenience, protective measures must be re-tuned to simultaneously optimize performance and ensure the protection of sensitive data.

Citrix was officially a BYO organization since 08 and offers our current views and experiences in the protection of mobile applications and data. Citrix's safety story starts on the unit - with Citrix Receiver -. And is managed and controlled in the data center with CloudGateway

Citrix Receiver is easy to install the client software for the secure delivery of applications, data and working positions. As a free download from the Android windows, Apple and Windows, as well as citrix.com, receiver works on all popular mobile devices.

CloudGateway provides security by controlling access to virtual granularly applications, mobile web and / SaaS. application control policies include strong authentication, single sign-on, logging, and the lock. Inherent USB firewalling denies the use of mass storage devices, while allowing the interface devices such as a USB headset, if desired. The policy is set by the administrator and enforced on a per-app basis.

The method of proven safety and true to "Keep data in the data center" was to protect sensitive data using Citrix technologies for over two decades. Pixel-gap network ensures that only the pixelated representation of the data reaches the end point - no actual data transfer occurs. This pixel-gap keeps sensitive data off ends and protects against more bulk data loss by preventing the transfer of files and databases to workstations.

"Keep the data in the data center" is an excellent choice for applications and data protection, but how security can be applied if the data must be mobilized?

To control the mobile data ShareFile is integrated with Receiver CloudGateway. Mobile data is protected in an encrypted container on the device with the policies defined by the administrator for the remote wipe and data expires. security ShareFile measures are also a great way to keep sensitive attachments on email while offering a perfectly secure access. Mobile data also optimize policies that specify whether it can be opened in applications virtualized data centers, third-party applications, or directly in the run local applications.

MDX enabled applications are applications that are wrapped and mobilized to control the companies. These applications run natively on the device with the security provided by integrated policies with receiver. Mobile Application Management (MAM) using technologies MDX allows specific policies for application usage, file sharing and networking to be applied to web / SaaS, and Internet browsing rich native apps for Android, iOS and HTML5. For more control over the networking remote sites MDX Micro VPN controls access to intranet applications specific business application.

MDX provides a set of methods to enforce security at the application level for the mobile device and the selective and granular locking wipe corporate data while leaving personal data intact on BYO devices. Other features include jailbreak / root and password / PIN code detection policies, as well as mobile applications managed and integrated Sharefile data vaults. The MDX mobile experience is enabled through CloudGateway to control access to applications and local and remote data across devices

Secured enterprise mobility starts with receiver CloudGateway and ShareFile -. And the final state is the ability of workers to work from anywhere, on any device, online or offline. Secure by Design.

Previous
Next Post »
0 Komentar