Citrix Receiver and Brom - IT service delivery and business PC to the cloud era

2:33 PM
Citrix Receiver and Brom - IT service delivery and business PC to the cloud era -
Citrix Receiver is a software client that allows users to access data from the business applications and desktops from the device of their choice, including smartphones, tablets and PCs. Over the past two years, we have seen enormous uptake of Citrix Receiver. We have tens of millions of Citrix Receiver downloads and already a new download occurs every second or two. Citrix Receiver allows our customers to implement secure BYO -. Standardizing the management of their IT services rather than their endpoint devices
Recently, we announced powerful new additions to Citrix Receiver, including not only access to virtual applications and desktops via XenDesktop / XenApp but also access to the Web / SaaS applications using native secure browser, HTML 5 / iOS / Android running natively in a secure container on mobile devices and follow me-all integrated data in a unique experience through a unified storefront. A new receiver portfolio for all platforms is planned for the release of these powerful capabilities in July. In addition to these new capabilities, we invested to make our Windows receiver platform; a platform that can be easily extended by other software publishers via plugins. Brom is an excellent example of such a plug-in.
Traditionally, companies have relied on a combination of technologies (eg, anti-virus and protection against malware) and political (control what end users can / can not do with their PC) to obtain a false sense of security for their business PCs. Today, end users use their work computers not otherwise than using their own computers at home, including the use of social media or cloud personal documents. This means that companies have a threat of much greater profile than before and their political and traditional technologies are not designed to handle threats which darken bring to their PC.
Strategy for secure PC business to cloud era will evolve and should have the following two components:
  1. Manage IT services will not end devices item - think companies will focus their efforts on delivering applications and data safe rather than managing and securing endpoint devices. This is where Citrix Receiver comes in. Instead of managing endpoint, customers can manage their applications and data and deliver it to users via a receiver. The receiver can be easily standardized on any device and allow users to have a self service experience through a unique showcase for applications and data
  2. Isolate personal content from cloud -. Companies need to assume that users will use their work PC to access their social media, cloud personal documents and web browsing and have a strategy to cope. This is where Brom comes in. Brom enables this capability through their micro-virtualization technology announced recently. Bromium micro-virtualization technology always treats access personal web / cloud as a possible attack, isolate the function in its own micro-VM in a way that is completely transparent to end users. Whenever the end user visits a website or opens an untrusted documents (ie not delivered by IT as a service) it is instantly and seamlessly executed in a hardware isolated micro-VM implementation. All services and OS resources are controlled and managed by the Bromium technology while keeping the whole experience for end users completely seamless. This micro-VM is wiped once the end user ends the personal navigation; protect IT services and end-point device of any potential threat or malware.

Citrix Receiver Brom and together enable our customers to rethink the management of their service delivery and enterprise PC to the cloud era. Companies may have a solution for the simple delivery of centralized services of the company without having to worry to curb the behavior of the end user who may attempt to compromise the infrastructure of the company or to access inside information. You can register for the beta for Brom to www.bromium.com to Strt chalking deployment scenarios. I am delighted to hear about your experiences with receiver and micro-virtualization work together to allow your users while protecting your business information.

Previous
Next Post »
0 Komentar