Citrix Product Update for Partners 1 © 2016 Citrix | Confidential Citrix by the numbers $3.3B+ 400K+ 2015 revenue Enterprises 2 © 2016 Citrix | Confidential 9,000+ 10,000+ Employees Partners 100 Countries Remote access Secure app networking Virtual computing Mobile workspaces Secure delivery 2003 2006 2010 2013 2015 Secure delivery of apps & data 3 © 2016 Citrix | Confidential Our Strategy Offer the world’s best integrated technology services for the secure delivery of apps and data Citrix Cloud 4 © 2016 Citrix | Confidential Integrated technology services Citrix Virtual Apps Citrix Virtual Apps & Desktop (formerly XenApp & XenDesktop) App & desktop virtualization Citrix Endpoint Management (formerly XenMobile) Enterprise mobility management Citrix Content Collaboration (formerly Sharefile) Enterprise file sync & sharing Citrix ADC (formerly Netscaler) Citrix SD-WAN App & workspace delivery networking 5 © 2016 Citrix | Confidential The largest companies in the world rely on Citrix Healthcare Top 10 Healthcare Companies Top 10 Pharmaceutical Companies Manufacturing Financial Services Top 10 Automotive Top 10 Largest Banks Top 10 Chemical Top 10 Investment Companies Top 10 Computer and Electronics Top 10 Aerospace and Defense 6 © 2016 Citrix | Confidential Top 10 Property Insurance Companies Top 10 Life Insurance Companies Public Sector Education Cloud Providers Top 5 Largest US Government Agencies Top 10 Highest Ranked Universities Top 4 out of 5 clouds Top 10 Largest US Cities All US “Big Ten” Universities Top EMEA Central Government Agencies Top 10 Largest US School Districts Top 5 E-commerce sites 15 of Top 20 Telco Companies >80% World’s Music Downloads Challenges for business Employees/Contractors bringing own devices regardless of BYOD policy Organization exposed to risks from security, compliance gaps and IT complexity Rewriting apps to support mobile OS which is costly and time consuming BYOD Mobile Apps No mobile apps Critical data replicated between headquarters and branch office Designers & Engineers stuck to workstations Can’t access/share designs remotely in real time Designers & Engineers Remote & Branch Workers Network connection between headquarters and branch office gets congested Result: Complexity & Business Agility challenges 7 © 2016 Citrix | Confidential Challenges for IT Operating system upgrades, updates & patches on individual distributed PCs Maintain large set of desktop images to deal with complex mix of laptop hardware Can’t redirect funds towards more innovative IT initiatives Problems supporting users offline or on intermittent connections PC Refresh Corporate Laptops Maintain expensive office real estate Access and modify files locally on external devices that don’t adhere to corporate standards No data security Contractor & Partner Access Call Centers No flexibility to keep up with increasing business needs Result: Must find ways to reduce complexity & foster an agile business 8 © 2016 Citrix | Confidential Citrix Virtual Apps Citrix Virtual Apps & Desktop Application Virtualization Citrix Virtual Apps & Desktop Mobile Productivity 10 © 2017 Citrix | Confidential | Content Under NDA Security & Compliance Cost Savings Simplified IT Traditional app and desktop management Apps Apps Tightly coupled apps and data managed on device Devices 11 © 2017 Citrix | Confidential | Content Under NDA IT forced to manage and secure devices Data Virtualization delivers workforce mobility Deliver apps and desktops as an on-demand service Apps Eliminate / Reduce device support / Support BYO Secures data for anywhere access Devices 12 © 2017 Citrix | Confidential | Content Under NDA Data Virtualizing Apps and Desktops 13 © 2016 Citrix | Confidential Citrix Endpoint Management Citrix Content Collaboration Enterprise Mobility & File Sync - Share Productivity and Collaboration Citrix Endpoint Management Feature rich MDM with freedom of choice Data Management App Management Device Management 15 © 2016 Citrix | Confidential Mobile Device Management Gain visibility to devices (BYOD or CL) Start here Push policies (WiFi, VPN, Passcode etc.) Provision apps automatically Manage users through AD groups Monitor and manage compliance Mobile lifecycle management Notify users Support end-users remotely Remotely lock or selectively wipe Device agnostic – iOS, Android, Windows Phone 16 © 2016 Citrix | Confidential Productivity and Collaboration Citrix Endpoint Management Secure and manage mobile applications simply and easily Data Management App Management Device Management 17 © 2016 Citrix | Confidential 18 © 2016 Citrix | Confidential 19 © 2016 Citrix | Confidential 20 © 2016 Citrix | Confidential • Secure app containers • Inter-app controls • On-demand micro VPN • Conditional access policies • App lock and wipe Productivity and Collaboration Citrix Endpoint Management EMM is more than just checking your email Data Management App Management Device Management 21 © 2016 Citrix | Confidential ShareFile Enables Mobile Workstyles Access, share and sync files from any device Access data residing in existing network shares & SharePoint Offline access and editing Built-in mobile editor for rich content editing on-the-go PDF annotation Integrated with Outlook 22 © 2016 Citrix | Confidential Productivity and Collaboration Citrix Endpoint Management Experience productivity through application integration Data Management App Management Device Management 23 © 2016 Citrix | Confidential Built for business Secure Mail Secure Web • Free/Busy scheduling • Attachment Repository Secure Notes Secure Forms • Secure Tasks Digital transformation with Secure Forms ShareFile QuickEdit • Micro-VPN • Desktop access/control • Leverage Exchange Notes and Tasks • One Touch meeting join ScanDirect • Out of Office • Seamless intranet access • Easy file access with ShareFile • VIP Inbox and audio tones • Contextually aware note retrieval • View and edit Office docs and annotate PDFs • Personal Calendar overlay 24 © 2016 Citrix | Confidential Citrix Endpoint Management Editions XenMobile MDM Edition XenMobile Advanced Edition XenMobile Enterprise Edition • MDM • MDM • MDM • SecureEdit • MAM • MAM • MDX Toolkit • MDX Toolkit • SecureHub, SecureMail, SecureWeb, QuickEdit, SecureTasks • SecureHub, SecureMail, SecureWeb, SecureNotes, SecureTasks, QuickEdit, ShareConnect, SecureForms • ShareFile Enterprise 25 © 2016 Citrix | Confidential Citrix ADC Formerly Netscaler Secure delivery of traditional & micro-services apps Availability Performance Offload Security Visibility Load Balancing Acceleration Security SSL Availability Performance Visibility 27 © 2016 Citrix | Confidential Recognized as a leader 2016 Magic Quadrant for Application Delivery Controllers 10th Year …a solid roadmap of product features and licensing options. 2016 Source: Gartner report, Magic Quadrant for Enterprise Mobility Management Suites, June 8, 2015, Terrence Cosgrove, Rob Smith, Chris Silva, John Girard, Bryan Taylor Source: Gartner report, Magic Quadrant for Enterprise File Synchronization and Sharing, August 6, 2015 Monica Basso, Charles Smulders, Jeffrey Mann Source: Gartner report, Magic Quadrant for Application Delivery Controllers, September 12th, 2016, Mark Fabbi, Andrew Lerner © 2015 Gartner, Inc. and/or its affiliates. All rights reserved. Gartner is a registered trademark of Gartner, Inc. or its affiliates. For more information, e-mail [email protected] or visit gartner.com. Used with permission. The Gartner document is available upon request from Citrix. This graphic was published by Gartner, Inc. as part of a larger research document and should be evaluated in the context of the entire document. Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner's research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose. 28 © 2016 Citrix | Confidential > > > > > 29 © 2016 Citrix | Confidential Form factor Hypervisor Cloud Orchestration Architecture Citrix TriScale Technology Scale up, Scale in and Scale out Scale up “80:1 footprint reduction” “Grow capacity up to 5x. No New Hardware.” Simplicity with Many-In-One Elasticity with Pay-As-You-Grow Scale in “Horizontal Scalability to Tbps” Scale out 30 © 2016 Citrix | Confidential Expandability with Add-and-Go clustering Citrix ADC editions Standard Advanced Premium Ensure application availability with traffic management and server monitoring Improve application performance and manage resource availability across multiple datacenters Protect against web-based attacks and data theft 31 © 2016 Citrix | Confidential Platforms Hardware or software options Hypervisor based 32 © 2016 Citrix | Confidential Docker Container based Multi-tenant hardware Single instance hardware Standard Edition WANOP Edition Enterprise Edition Scale bandwidth, ensure availability, and reduce costs Optimize bandwidth while accelerating application delivery Fully integrated solution for efficiency, reliability, and usability 33 © 2016 Citrix | Confidential Citrix SD-WAN WANOP Edition Overview WAN Optimization NetScaler SD-WAN MPLS WAN Optimization NetScaler SD-WAN • Used in conjunction with a single WAN link or independent WAN links • Improves the user experience by accelerating application protocols • Reduces bandwidth utilization by compressing and de-duplicating application data • Provides details into application performance delivery through AppFlow 34 © 2016 Citrix | Confidential Citrix SD-WAN Standard Edition Overview Virtualized WAN Internet (DIA/DSL/Cable) IP Sec NetScaler SD-WAN MPLS IP Sec 4G LTE / Satellite NetScaler SD-WAN • Logically bonds multiple, distinct WAN connections into one virtual path • Encrypt data between devices to provide end-to-end security • Direct packets based upon application needs, link performance, and business policies 35 © 2016 Citrix | Confidential Citrix SD-WAN Enterprise Edition Overview Virtualized WAN Internet (DIA/DSL/Cable) WAN Optimization NetScaler SD-WAN IP Sec MPLS 4G LTE / Satellite IP Sec WAN Optimization NetScaler SD-WAN Combines the functionality of Virtual WAN and WAN Optimization editions: • Per-packet path selection to ensure high reliability and bandwidth efficiency • WAN optimization and protocol acceleration to ensure the user experience • Centralized management for simplified operations and troubleshooting 36 © 2016 Citrix | Confidential Finding the budget use case Reduce MPLS bandwidth and allocate resources towards Virtual WAN • Reducing MPLS link size and using funds for Virtual WAN • Appliances • New high bandwidth Internet drop 10Mbps -> 5Mbps Data Center MPLS Branch Office New 20Mbps Internet Master Control Node (MCN) Overall increase of bandwidth 10Mbps to 25Mbps for nearly the same cost per month. 37 © 2015 Citrix. Confidential. Client Node XENAPP/XENDESKTOP - WINDOWS 10 MIGRATION Business Issues We Address • Lost productivity and missed targets through prolonged migration efforts • Increased migration costs and business impacts • Simplified scalability of desktop images • Application testing and compatibility What to Ask • How did your past migrations turn out? • What are some of the key things you need to successfully migrate to Windows 10? • How is BYOD impacting your business? • How quickly do you want to migrate to Windows 10 and what are your concerns going into migration? 38 © 2015 Citrix. Confidential. What to Prepare and Listen For • • • • • • Windows migration Legacy applications BYOD Business impact Internet explorer Previous migration experiences (XP → 7) • User experience • Scalability Keys to the Conversation • Be sure the customer is considering a migration, and understand the history of past migrations • Stress the importance of app compatibility © 2017 Confidential CITRIX VIRTUAL APPS & DESKTOP (XENAPP/XENDESKTOP ) Business Issues We Address • Enabling workforce mobility on any device • Application compatibility and data control • Central management of desktops, simplifying maintenance and access • Low cost desktop delivery option • Improve user productivity What to Ask • How concerned are you with business agility and continuity? • How long does it take for a new user to receive a computer? Email access? Business critical applications? Computer failure replacement? • What does your current desktop delivery model look like? • If an employee changes internal job roles, how disruptive is that to their IT resources (computer, application changes, etc)? • Do contractors or temporary project staff receive a physical device? 39 © 2015 Citrix. Confidential. What to Prepare and Listen For • • • • • • • • Cost constraints BYOD Workforce mobility App compatibility Authentication Access control Device agnostic Business agility and continuity Keys to the Conversation • Involve IT and Security in the conversation early, because they bear responsibility for making everything work together • The Line of Business leader can help identify the pain of limited access • The best opportunities come in capturing a desktop/PC refresh budget © 2017 Confidential CITRIX ENDPOINT MANAGEMENT ( XENMOBILE ) SECURE DATA/EMAIL/APPLICATION ON MOBILE DEVICES Business Issues We Address • Security concerns, as corporate data resides on personal device What to Ask • How are you managing mobile devices, including BYO devices? • Are you able to deliver any app to mobile users? • Do you need to support any LOB mobility initiatives to improve productivity or reduce costs? • How do your users remotely access their apps and data? • Are you concerned about security of emails on mobile devices? • What types of mobile security solutions have you evaluated or deployed? 40 © 2015 Citrix. Confidential. What to Prepare and Listen For • BYOD • Replacing companyissued smart phones • Enterprise Mobility Management • Unified platform • Security • Productivity Keys to the Conversation • Remember that security conversations involve mobility and productivity as well © 2017 Confidential CITRIX CONTENT COLLABORATION (SHAREFILE) – ACCESS TO CONTENT REPOSITORIES Business Issues We Address • Lost productivity and missed targets, when workers waste time • Security and compliance exposure, when users feel the need to circumvent processes in order to get their work done • User frustration, when they don’t have the solution they need What to Ask • Where do users’ files live? • How are you tracking what data gets shared with whom? • How many of your users are signing up for consumer file sharing and sync tools—and then placing company data in those services? How are you addressing that? 41 © 2015 Citrix. Confidential. What to Prepare and Listen For • • • • • • • • “Security only says “no” Multiple File sync/share services Mobilizing on-prem data stores Data fragmentation Data loss Authentication Access control Granular control, reporting and auditing needs • Information Rights Management Keys to the Conversation • Involve IT managers in the conversation early, because they bear responsibility for making everything work together • The Line of Business leader can help identify the pain of limited access • A Security leader might have reservations, so address their questions and concerns early in the process as well © 2017 Confidential NETSCALER ADC - APPLICATION DELIVERY CONTROL Business Issues We Address • Lower operational costs and more flexibility versus F5 • Better application performance and availability • A better web security profile against both known and unknown attacks What to Ask • How are you ensuring 100% uptime and flawless application performance? • What kind of server monitoring is in place today to ensure that application services are responsive despite a server’s uptime? • How do you protect the applications from application vulnerabilities and DDOS attacks? • Do you develop your own web applications? • What is your authentication strategy for your web applications? • How do you handle Single Sign On and access auditing? 42 © 2015 Citrix. Confidential. What to Prepare and Listen For • • • • • • • High Availability Load balancing Network performance Remote access Network reliability and security F5 refresh DevOps (Mode 2) application development • Multi-cloud deployment Keys to the Conversation • Improves web applications availability and performance • Securing Web Applications © 2017 Confidential NETSCALER SD-WAN - BRANCH RELIABILITY AND OPTIMIZATION Business Issues We Address What to Prepare and Listen For • Loss of productivity when an unreliable network holds back the performance of enterprise apps • Unnecessary costs associated with MPLS lines, redundant connections, and wasted capacity • Lack of control, traffic engineering, and performance when companies switch to broadband in order to save money • Lost revenue when the network itself enables sales and customer service (e.g. loan processing offices, medical offices, law firms, manufacturing plants) 43 © 2015 Citrix. Confidential. • • • • • • • • • Deploying new applications Outages – actual or feared Downtime Customer service issues Virtual training demands Upgrades Patches Enhancements Telecommunications contract up for renegotiation/renewal What to Ask Keys to the Conversation • Do you have any remote office and how are they connected to the datacenter? • Are there application performance issues today? • What is the impact of a network outage, even momentary, to your business? • Do you have a need to increase branch bandwidth? • Do you have redundant WAN links in an active/passive mode? • The buyer is usually someone with responsibility for the network • Address high costs and limitations of the WAN • MPLS was never designed with the cloud in mind, yet more applications are moving to the cloud • Branch operations and the revenue associated with them, are at risk with unreliability in the branch network © 2017 Confidential 44 © 2016 Citrix | Confidential