Unified Endpoint Management
Total Page:16
File Type:pdf, Size:1020Kb
Unified Endpoint Management Unified Endpoint Management Security and Productivity for the Mobile Enterprise Citrix.com 1 The workplace has evolved from stationary EMM has the potential to manage and secure employees working on IT distributed Windows more than one billion Windows 10 devices work desktops and laptops to mobile users over the next several years as more and more playing and working on personal roaming lap- organizations make the transition to the new tops, tablets and smart phones. Ten years ago OS. Organizations moving into a more mobile, client management tools (CMT) such as Mic- global era should consider seriously whether rosoft SCCM and LANDESK were the enter- a partial or total transition from separate CMT prise choice for managing scores, hundreds or and EMM platforms to a single UEM tool such thousands of IT distributed Windows systems. as Citrix XenMobile makes sense for them. In an era of mobility, BYOD and the Internet of Things (IoT), however, client management In the next few years, organizations will also tools (CMT) must evolve. need to extend unified management solutions to cover the emerging enterprise Internet of Instead, for a growing number of IT organi- Things (IoT), including sensors, beacons and zations, the future lies in Unified Endpoint other similar devices. Luckily, EMM solutions Management (UEM), which combines CMT such as Citrix XenMobile have been moving with EMM (Enterprise Mobility Management) forward to encompass IoT devices as well. providing a single pane of glass to manage and secure, devices and operating systems, Why EMM whether laptops, smart phones, tablets or There are many reasons why UEM via EMM any other device. Increasingly, UEM means makes sense for a lot of organizations. EMM, with the user, rather than the individual device as the management focus. For users, Symplicity CMT and EMM tools have signifi- UEM helps enable a single unified workspace cantly different ways of working, and, for with easy, consistent collaboration and infor- many organizations, require a separate set of mation access from any device. staff and training for each. It’s a no brainer that managing all devices from a single pane In the next few years, many analysts believe of glass makes more logical business sense. that organizations will employ EMM systems Not only is it less expensive to invest in a to manage PC’s and Macs. This means that single management tool than two or three but This means that EMM has the potential to manage and secure more than one billion Windows 10 devices over the next sever- al years as more and more organizations make the transition to the new OS. Citrix.com | White Paper | Unified Endpoint Management 2 significant operational savings can come in be administered by an EMM solution such as OS and applications updates were much less reduced staff resources and training, allowing XenMobile. frequent a few years ago and very time and organizations to leverage existing staff for resource intensive and LAN dependent. Mo- more strategic purposes. Mobile Friendly Management Conceived at a bile operating systems today tend to run on a time when devices were stationary, corporate cloud service model with much smaller, more Consistency in management, security and distributed, and mostly connected to the frequent updates, which makes a lot more usability is important for enterprise user enterprise LAN, CMT tools required desktops sense for the roaming mobile user. productivity and information protection. Even and laptops to be LAN connected and joined small unintended differences in security and to an enterprise domain with a set of group Containerization One of the ways EMM and management policies among devices, appli- policy objects for initial configuration and mobile OS API’s enable BYOD and corporate cations and information can expose holes in subsequent management to take place. A owned, personally enabled (COPE) workstyles the security infrastructure that allow hackers user could not typically connect, configure is through containerization. Using application and malware to penetrate the organization. and upgrade his or her own device. This was wrapping, encryption and other similar meth- Consistency in mobile access to applications the job of IT, which acted as the ultimate ods, IT can separate corporate and personal and information is also important for user super user. applications and data on the device such productivity. UEM offers consistency in sev- that interactions among them are disabled eral ways: With legacy CMT solutions, IT spends a lot or restricted according to enterprise security of time creating one or a few sets of custom policies. •It’s inherently easier to implement a single system images and pushing them over the set of enterprise management and security LAN to a few, scores, or hundreds of network Containerization accomplishes both malware policies across all devices and users with a connected desktops and laptops, or uses an protection and Data Leakage Prevention single UEM solution than with two separate image deployment service for up to $25 per (DLP). Since enterprise and personal appli- sets of tools. system. With such a methodology, bringing cations and data on the device are walled a new device on board or replacing a lost or off from each other, any malware download- •User helpdesk services and system trouble- stolen laptop with all the requisite appli- ed with personal applications or browsing shooting are more consistent with a single cations are resource and time consuming has no impact on containerized enterprise management platform, and with operating processes that hamper user productivity. applications and cannot be transmitted to the systems, such as Windows 10, that are them- CMT application distribution is also IT centric, enterprise network when the device con- selves have more consistent interfaces across requiring complex distribution packages. nects. Most EMM solutions such as XenMobile different types of devices. enforce this separation as well with per app By contrast, EMM API’s and tools such as virtual private network (VPN) connections ac- •Reporting is obviously easier and more Citrix XenMobile were designed from day one tivated automatically when certain enterprise comprehensive with a single platform, which to support roaming, wirelessly connected mo- applications connect to the corporate LAN. can be useful when planning and calculating bile users on their chosen devices. Users can Per app VPN’s connect a single application, the costs of hardware and software upgrades acquire a device with the vendor configured rather than the entire device, shutting out any or refreshes. operating system and applications and use an malware from personal application use. enterprise EMM portal and configuration app •Windows 10 introduces its own consistency to enroll and configure their device them- Similarly, most operating system API’s and with a common operating system, application selves over the air according to corporate EMM systems allow IT to configure and en- development tools and set of API’s across settings and policies --all with little to no IT force a number of policies that regulate users’ desktop and mobile devices. Users can get all touch or help. ability to cut and paste data from enterprise their devices’ applications from a single se- to personal applications, paste or attach cure, corporate approved app store and work Users can also use a corporate app store enterprise data or files to personal email with enterprise applications and information portal to download and install IT preapproved messages, and print files containing sensitive both on their devices and the corporate net- applications. Cloud SaaS and virtual appli- data. work in a much more consistent way. cations have become much more prevalent in the enterprise, so in many cases applica- With Windows 10 laptops, desktops and •Microsoft recently announced the Centennial tions don’t have to be downloaded at all. If EMM, containerization can be accomplished App Converter, which will convert even legacy necessary, IT can still push out applications via digital rights management through the Win32 apps into the Universal Windows and updates to hundreds of globally roaming enforcement of Bitlocker encryption of all Platform apps, so organizations can add them devices. enterprise applications and data. IT can then to the Windows app store, where they can leverage policies that prevent users from Citrix.com | White Paper | Unified Endpoint Management 3 cutting and pasting encrypted content into organizing mobile collaboration and business online meetings and phone conference links unmanaged applications not using BitLocker processes across globally dispersed teams. in new meeting invitations and joining online encryption, including personal email client meetings via a single touch. software. Any data downloaded from services Citrix XenMobile is providing increasing such as SharePoint or a shared network are support for all operating system enterprise Secure Mail integrates tightly with XenMo- also encrypted. Thanks to Centennial, con- management API’s as they are introduced and bile’s Secure Web mobile app, so that all email tainerization can be accomplished with legacy adds its own unique capabilities that deliver Web links are opened in a secure, sandboxed Win32 applications as well. management consistency across device oper- web browser environment. Secure Mail also ating systems. These include full FIPS 140-2 integrates tightly with Citrix’s own ShareFile