For years, the Citrix Systems cheerleading team waved its pom-poms to the resounding chant of “Any, Any, Any!” Any app, anywhere, on any device, knowing all too well that while it could deliver apps anywhere and on any device, its ability to do so for anything other than Windows apps was nothing more than some well-crafted marketing hype.
Have you ever wondered what was going on within a cloud regardless of type? SaaS? PaaS? IaaS? Do you need to audit these environments to ensure compliance with your security policy (not to mention the subset of your security policy that contains regulatory compliance)? To provide solutions for these issues, a number companies both new and old have put forward various tools that utilize proxies, reverse proxies, and transparent gateways to uncover what is happening within a SaaS application. The goal is to know who did what, when, where, how, and hopefully why.
With the mobile device management (MDM) and enterprise mobility management (EMM) markets still reeling from VMware’s $1.5B purchase of competitor AirWatch, Good Technology has announced that it is purchasing BoxTone for an undisclosed amount. This is a purchase to turn heads: Good Technology is making a bold statement to the world that it, too, is here, and it can and does play in this space.
Desktop virtualization and mobility management are not the same. While it’s true that you can access virtualized desktops and applications from a mobile device, there are some key differences that may cause users to rethink how much work they will do on their mobile devices.
The mobile device management market has exploded over the past five years with solutions coming from “traditional” mobile management, security and specialty software vendors and fueled by the rapid consumer and corporate adoption of smartphones and tablets. Followers of the Mobile Device Management (MDM) and Mobile Application Management (MAM) space are tracking companies such as AirWatch, MobileIron, Citrix, Good Technology, SAP and nearly three dozen other vendors who provide competing products. Corporate implementers are trying to find the right balance between allowing individuality of a users owned device and the security of corporate data that may be accessed on it. The majority of solutions provide a secure layer, or container, for which the corporate data resides. These layers can, and do, have an effect on the usability of the devices. Continue reading Red Bend – Mobile Device Virtualization for the Enterprise
As you can probably tell from the title, Citrix is leveraging their biggest advantages in the mobility/BYOD race: their understanding of ALL client operating systems, multimedia in both SBC and VDI environments, and their established partnerships with hardware and OS vendors. In a conversation I had with Chris Fleck, VP Mobility & Alliances at Citrix (@chrisfleck), we spent an hour talking about the various methods Citrix has decided to use to manage mobile devices in both multi-user and multi-OS virtual environments, while extending their function from consumption to productivity. Oh, yeah, they have also changed their product and technology names to reflect their commitment to mobility; shocking I know. Continue reading Mobility Bytes – Citrix’s Mobile Strategy Has Sharp Teeth & It’s Attacking from Every Side