Unified Endpoint Management

Total Page:16

File Type:pdf, Size:1020Kb

Unified Endpoint Management Unified Endpoint Management Unified Endpoint Management Security and Productivity for the Mobile Enterprise Citrix.com 1 The workplace has evolved from stationary EMM has the potential to manage and secure employees working on IT distributed Windows more than one billion Windows 10 devices work desktops and laptops to mobile users over the next several years as more and more playing and working on personal roaming lap- organizations make the transition to the new tops, tablets and smart phones. Ten years ago OS. Organizations moving into a more mobile, client management tools (CMT) such as Mic- global era should consider seriously whether rosoft SCCM and LANDESK were the enter- a partial or total transition from separate CMT prise choice for managing scores, hundreds or and EMM platforms to a single UEM tool such thousands of IT distributed Windows systems. as Citrix XenMobile makes sense for them. In an era of mobility, BYOD and the Internet of Things (IoT), however, client management In the next few years, organizations will also tools (CMT) must evolve. need to extend unified management solutions to cover the emerging enterprise Internet of Instead, for a growing number of IT organi- Things (IoT), including sensors, beacons and zations, the future lies in Unified Endpoint other similar devices. Luckily, EMM solutions Management (UEM), which combines CMT such as Citrix XenMobile have been moving with EMM (Enterprise Mobility Management) forward to encompass IoT devices as well. providing a single pane of glass to manage and secure, devices and operating systems, Why EMM whether laptops, smart phones, tablets or There are many reasons why UEM via EMM any other device. Increasingly, UEM means makes sense for a lot of organizations. EMM, with the user, rather than the individual device as the management focus. For users, Symplicity CMT and EMM tools have signifi- UEM helps enable a single unified workspace cantly different ways of working, and, for with easy, consistent collaboration and infor- many organizations, require a separate set of mation access from any device. staff and training for each. It’s a no brainer that managing all devices from a single pane In the next few years, many analysts believe of glass makes more logical business sense. that organizations will employ EMM systems Not only is it less expensive to invest in a to manage PC’s and Macs. This means that single management tool than two or three but This means that EMM has the potential to manage and secure more than one billion Windows 10 devices over the next sever- al years as more and more organizations make the transition to the new OS. Citrix.com | White Paper | Unified Endpoint Management 2 significant operational savings can come in be administered by an EMM solution such as OS and applications updates were much less reduced staff resources and training, allowing XenMobile. frequent a few years ago and very time and organizations to leverage existing staff for resource intensive and LAN dependent. Mo- more strategic purposes. Mobile Friendly Management Conceived at a bile operating systems today tend to run on a time when devices were stationary, corporate cloud service model with much smaller, more Consistency in management, security and distributed, and mostly connected to the frequent updates, which makes a lot more usability is important for enterprise user enterprise LAN, CMT tools required desktops sense for the roaming mobile user. productivity and information protection. Even and laptops to be LAN connected and joined small unintended differences in security and to an enterprise domain with a set of group Containerization One of the ways EMM and management policies among devices, appli- policy objects for initial configuration and mobile OS API’s enable BYOD and corporate cations and information can expose holes in subsequent management to take place. A owned, personally enabled (COPE) workstyles the security infrastructure that allow hackers user could not typically connect, configure is through containerization. Using application and malware to penetrate the organization. and upgrade his or her own device. This was wrapping, encryption and other similar meth- Consistency in mobile access to applications the job of IT, which acted as the ultimate ods, IT can separate corporate and personal and information is also important for user super user. applications and data on the device such productivity. UEM offers consistency in sev- that interactions among them are disabled eral ways: With legacy CMT solutions, IT spends a lot or restricted according to enterprise security of time creating one or a few sets of custom policies. •It’s inherently easier to implement a single system images and pushing them over the set of enterprise management and security LAN to a few, scores, or hundreds of network Containerization accomplishes both malware policies across all devices and users with a connected desktops and laptops, or uses an protection and Data Leakage Prevention single UEM solution than with two separate image deployment service for up to $25 per (DLP). Since enterprise and personal appli- sets of tools. system. With such a methodology, bringing cations and data on the device are walled a new device on board or replacing a lost or off from each other, any malware download- •User helpdesk services and system trouble- stolen laptop with all the requisite appli- ed with personal applications or browsing shooting are more consistent with a single cations are resource and time consuming has no impact on containerized enterprise management platform, and with operating processes that hamper user productivity. applications and cannot be transmitted to the systems, such as Windows 10, that are them- CMT application distribution is also IT centric, enterprise network when the device con- selves have more consistent interfaces across requiring complex distribution packages. nects. Most EMM solutions such as XenMobile different types of devices. enforce this separation as well with per app By contrast, EMM API’s and tools such as virtual private network (VPN) connections ac- •Reporting is obviously easier and more Citrix XenMobile were designed from day one tivated automatically when certain enterprise comprehensive with a single platform, which to support roaming, wirelessly connected mo- applications connect to the corporate LAN. can be useful when planning and calculating bile users on their chosen devices. Users can Per app VPN’s connect a single application, the costs of hardware and software upgrades acquire a device with the vendor configured rather than the entire device, shutting out any or refreshes. operating system and applications and use an malware from personal application use. enterprise EMM portal and configuration app •Windows 10 introduces its own consistency to enroll and configure their device them- Similarly, most operating system API’s and with a common operating system, application selves over the air according to corporate EMM systems allow IT to configure and en- development tools and set of API’s across settings and policies --all with little to no IT force a number of policies that regulate users’ desktop and mobile devices. Users can get all touch or help. ability to cut and paste data from enterprise their devices’ applications from a single se- to personal applications, paste or attach cure, corporate approved app store and work Users can also use a corporate app store enterprise data or files to personal email with enterprise applications and information portal to download and install IT preapproved messages, and print files containing sensitive both on their devices and the corporate net- applications. Cloud SaaS and virtual appli- data. work in a much more consistent way. cations have become much more prevalent in the enterprise, so in many cases applica- With Windows 10 laptops, desktops and •Microsoft recently announced the Centennial tions don’t have to be downloaded at all. If EMM, containerization can be accomplished App Converter, which will convert even legacy necessary, IT can still push out applications via digital rights management through the Win32 apps into the Universal Windows and updates to hundreds of globally roaming enforcement of Bitlocker encryption of all Platform apps, so organizations can add them devices. enterprise applications and data. IT can then to the Windows app store, where they can leverage policies that prevent users from Citrix.com | White Paper | Unified Endpoint Management 3 cutting and pasting encrypted content into organizing mobile collaboration and business online meetings and phone conference links unmanaged applications not using BitLocker processes across globally dispersed teams. in new meeting invitations and joining online encryption, including personal email client meetings via a single touch. software. Any data downloaded from services Citrix XenMobile is providing increasing such as SharePoint or a shared network are support for all operating system enterprise Secure Mail integrates tightly with XenMo- also encrypted. Thanks to Centennial, con- management API’s as they are introduced and bile’s Secure Web mobile app, so that all email tainerization can be accomplished with legacy adds its own unique capabilities that deliver Web links are opened in a secure, sandboxed Win32 applications as well. management consistency across device oper- web browser environment. Secure Mail also ating systems. These include full FIPS 140-2 integrates tightly with Citrix’s own ShareFile
Recommended publications
  • 7 Mythsabout
    7 Myths about the Future of Work ... and how you can create tomorrow’s workplace today Sponsored by 7 MythS about the Future of Work Table of Contents Introduction ................................................................................................................................................... 3 The Most Common Myths about the Workplace of the Future ............................................................... 5 Myth 1: Email is dead ......................................................................................................................... 5 Myth 2: One communication method fits all .................................................................................... 7 Myth 3: The home office is an idea of the past .............................................................................. 11 Myth 4: The right work-life balance will solve all problems .......................................................... 12 Myth 5: Leading remote teams is no different from leading local teams .................................... 13 Myth 6: The individual office space is losing its importance......................................................... 14 Myth 7: Good IT solutions are multi-functional ............................................................................. 15 Much Sought-After: Generation Y ............................................................................................................ 16 The Bottom Line and Recommendations ...............................................................................................
    [Show full text]
  • Citrix Workspace Suite Datasheet
    Data Sheet Citrix Workspace Suite Citrix Workspace Suite Seamlessly enable secure access to apps, desktops, data and services, anywhere Citrix Workspace Suite delivers secure access to apps, desktops, data and services optimized to meet the performance, security and mobility requirements of individuals. This complete and powerful solution can deliver secure access to personalized desktops, mobile, web and Windows apps, and corporate data, as well as provide device configuration management. The result is a high performance user experience delivered from any device, including tablets, smartphones, PCs, Macs or thin clients, over any network or cloud to empower mobile workers with the freedom and flexibility to choose how they work. Features Personalized content and self-service access for individuals on any device Follow-me apps, desktops and data across more than 3 billion devices Enterprise app store for self-service selection of IT provisioned applications Deliver Windows apps to users on any device with application virtualization Deliver mobile and web/SaaS apps to users on their mobile devices with mobile application management Worx Mobile Apps, such as WorxMail, WorxWeb, WorxNotes and more improve productivity and provide a seamless user experience and maximum security Support for any Worx-enabled app, including GoToMeeting, Podio or other 3rd party apps for improved productivity and maximum security Secure, sync and share enterprise files across any device, with full view and edit capabilities, including file systems, network drives
    [Show full text]
  • Securely Share, Sync and Store Large Files in the Cloud
    Secure, cloud-based file sharing Factsheet Securely share, sync and store large files in the cloud Citrix ShareFile is a secure, cloud-based file sharing and storage solution specifically built for business. Send, receive, sync and store files with anyone, anywhere, using any device! Easily retain security and control of all users • Provide users instant access to up-to-date files. • Support mobile work with secure file sharing inside and outside the organization. • Provide IT the control and management required to help ensure security and compliance. • Create advanced reports and usage audits on file-sharing activity. Sync files across all of your devices Key benefits • Sync information across all devices, including mobile phones and tablets. • Increase productivity and share files • Access your data when you need it, wherever you are. anywhere, anytime • Save money and • Integrate with Microsoft Outlook to send secure links through email. time exchanging and organizing documents • Securely track • Collaborate in real time with automatic file updates, so you are always working account activity on the most updated version. with multi-level access controls and notifications Powerful and simple-to-use features Professional When you sign up for a ShareFile account, our graphic design specialists will customize your web portal to seamlessly match your company logo and website at no extra charge. • Create online folders with customizable permissions. • Confirm that clients have received files with custom tracking and alerts. • Access your web portal from a Mac or a PC. sharefile.com Secure, cloud-based file sharing Factsheet 2 Secure and Compliant The functionality, With ShareFile, you can be confident that your data is sent securely.
    [Show full text]
  • IN2 Innovation Gotomeeting Case Study
    IN2 Innovation Case Study IN2 Innovation, Inc. IN2 Innovation designs a collaborative culture based on GoToMeeting with HDFaces gotomeeting.com IN2 Innovation Case Study 2 GoToMeeting with HDFaces makes it easy to interact with end users in their homes or workspaces to show and discuss a concept or in2innovation.com prototype. This qualitative approach not only provides extremely valuable, specific feedback, it also saves time and money. Brian Roderman Co-founder and Chief Innovation Officer IN2 Innovation is a strategic new product design and development firm offering comprehensive services ranging from idea generation to production manufacturing. Co-founders Brian Roderman, chief innovation officer, and Ken Buras, chief integration officer, created a turnkey process that combines equal portions of creativity and technical operations to move clients’ ideas from the concept stage through engineering and testing to commercialization. These clients range from single entrepreneurs to very large corporations in industries such as consumer goods, electronics, medical devices and industrial products. IN2 Innovation is based in Dallas, Texas, operates locations in Houston and Austin, Texas, and Dongguan and Wuxi, China, and employs about 20 people. The challenge: accelerating time to market for new products IN2 Innovation is dedicated to helping clients achieve success in the marketplace. Speed is a critical factor: the faster a new product can be commercialized, the sooner it can generate revenues and establish a competitive advantage. “We recognized that traditional in-person meetings with clients, with all the logistical arrangements that are required, stretched out the timeline and led to delays in launch,” said Roderman. IN2 Innovation’s global scope made on-site meetings even more challenging.
    [Show full text]
  • Citrix Gateway Service
    Citrix Gateway Service Citrix Product Documentation | docs.citrix.com September 28, 2021 Citrix Gateway Service Contents Release Notes 3 Get started with Citrix Gateway service 14 Technical Security Overview 15 Migrate Citrix Gateway to Citrix Gateway service for HDX Proxy 18 HDX Adaptive transport with EDT support for Citrix Gateway service 24 Support for Citrix Virtual Apps and Desktops 27 Route tables to resolve conflicts if the related domains in both SaaS and web apps are the same ‑ Tech Preview 29 Contextual access to Enterprise Web and SaaS applications – Tech Preview 33 Read‑only access for admins to SaaS and Web apps 37 Support for Software as a Service apps 41 Apps configuration using a template 52 SaaS app server specific configuration 59 Citrix Gateway Connector 73 Citrix Gateway Connector dashboard 96 Support for Enterprise web apps 97 Support for Citrix Endpoint Management 109 Citrix Cloud Gateway Connector availability in Azure Marketplace 113 Citrix Cloud Gateway Connector availability in Azure 118 Deploy a Citrix Gateway Connector instance on AWS ‑ Tech Preview 125 ADFS integration with Secure Workspace Access 131 FAQ 140 © 1999–2021 Citrix Systems, Inc. All rights reserved. 2 Citrix Gateway Service Release Notes August 24, 2021 The Citrix Gateway service release to cloud release notes describe the new features, enhancements to existing features, fixed issues, and known issues available in a service release. The release notes include one or more of the following sections: What’s new: The new features and enhancements available in the current release. Fixed issues: The issues that are fixed in the current release.
    [Show full text]
  • Podio Work the Way You Want To
    Work the way you want to Factsheet Podio Work the way you want to Citrix Podio is the collaborative work platform for getting work done with colleagues and clients. Podio helps you to organize projects, exchange ideas, assign tasks and review work all in one customizable place. Collaborate more — and more effectively Podio makes rich back-and-forth communication simple — whether you’re on a local team with hectic schedules, conducting a project task force with members all over the country (or world) or working with clients or partners. The Podio work platform makes it easy to ask a question, share an answer, comment on a file and come to a consensus without drowning in emails. Podio is • Powerful: Manage projects and meetings using workspaces that house tasks, files and activity feeds — from any device. • Simple: Build your own workspace starting with one of the 700 free apps in the complimentary Podio App Market. Key benefits • Customizable: Quickly and easily modify and create apps that fit your workstyle. • Collaborate more thanks to a simple Integrates with GoToMeeting social platform anyone can use. Podio makes it easy to manage GoToMeeting sessions directly from your project • Get rid of long workspaces. You can schedule meetings, invite participants and manage RSVPs email chains and document clutter. and notifications right from Podio. And launching the GoToMeeting session is as • Stay organized by simple as clicking Start in your workspace’s GoToMeeting app — no long meeting storing project files, IDs necessary. You Podio workspace is a great place to post meeting agendas, tasks and reviews in one place.
    [Show full text]
  • Bitdefender Enterprise Case Study
    Bitdefender Enterprise Case Study Bitdefender Enterprise Citrix’s easy-to-use remote support tool ensures customer satisfaction gotoassist.com Bitdefender Enterprise Case Study 2 Since using GoToAssist Corporate we have succeeded in generating a measurable increase in customer satisfaction. The human collaboration between the enterprise user and the support www.enterprise. provider during the remote session creates a sense bitdefender.com of trust, which is essential for customer retention. Cosmin Pucean Head of Enterprise Support Bitdefender is a trusted and respected security solutions company based in Bucharest, Romania. The firm also has offices in the USA, UK, Germany, Spain and the United Arab Emirates. Bitdefender’s industry-leading solutions and services support businesses that adopt virtualisation and cloud technologies and have been specifically designed to ensure the highest levels of reliability and performance. Founded in 2001, the international global security technology company has established a presence in more than 100 countries. It has forged strong relationships with technology and OEM partners, value-added resellers and business and end-user customers. The initial challenge: Managing the provision of remote support for an international business-critical technology provider Bitdefender’s core philosophy is to provide the best performing security technology available and to help its customers stay ahead in a high-threat environment. In 2011, Bitdefender introduced GoToAssist Corporate to enable its support teams to deliver the highest levels of fast, efficient customer care in a secure environment. The hosted solution, which requires no premise-based hardware or software, was initially installed on a trial basis. GoToAssist quickly gained the approval of Bitdefender’s enterprise support team, engineers and the business users they served.
    [Show full text]
  • CITRIX SYSTEMS INC Form 10-K Annual Report Filed 2013-02-21
    SECURITIES AND EXCHANGE COMMISSION FORM 10-K Annual report pursuant to section 13 and 15(d) Filing Date: 2013-02-21 | Period of Report: 2012-12-31 SEC Accession No. 0000877890-13-000016 (HTML Version on secdatabase.com) FILER CITRIX SYSTEMS INC Mailing Address Business Address 851 WEST CYPRESS CREEK 851 WEST CYPRESS CREEK CIK:877890| IRS No.: 752275152 | State of Incorp.:DE | Fiscal Year End: 1231 ROAD ROAD Type: 10-K | Act: 34 | File No.: 000-27084 | Film No.: 13630660 FORT LAUDERDALE FL FORT LAUDERDALE FL SIC: 7372 Prepackaged software 33309 33309 954-267-3000 Copyright © 2014 www.secdatabase.com. All Rights Reserved. Please Consider the Environment Before Printing This Document UNITED STATES SECURITIES AND EXCHANGE COMMISSION Washington, D.C. 20549 Form 10-K (Mark One) x ANNUAL REPORT PURSUANT TO SECTION 13 OR 15(d) OF THE SECURITIES EXCHANGE ACT OF 1934 For the fiscal year ended December 31, 2012 or o TRANSITION REPORT PURSUANT TO SECTION 13 OR 15(d) OF THE SECURITIES EXCHANGE ACT OF 1934 For the transition period from to . Commission File Number 0-27084 CITRIX SYSTEMS, INC. (Exact name of registrant as specified in its charter) Delaware 75-2275152 (State or other jurisdiction of (IRS Employer incorporation or organization) Identification No.) 851 West Cypress Creek Road Fort Lauderdale, Florida 33309 (Address of principal executive offices, including zip code) Registrant’s Telephone Number, Including Area Code: (954) 267-3000 Securities registered pursuant to Section 12(b) of the Act: Common Stock, $.001 Par Value The NASDAQ Stock Market LLC (Title of each class) (Name of each exchange on which registered) Securities registered pursuant to Section 12(g) of the Act: NONE Indicate by check mark if the registrant is a well-known seasoned issuer, as defined in Rule 405 of the Securities Act.
    [Show full text]
  • Construction Engineering Consulting Group, Inc. “We Ran Two Or Three Services in Tandem for a Couple of Weeks to See What Would Work Best for Us
    Construction | Case Study Construction Engineering Consulting Group, Inc. “We ran two or three services in tandem for a couple of weeks to see what would work best for us. ShareFile, by far, was the best product.” Maxwell Erwin, project manager CECG uses Citrix products to send project files to clients, collaborate with coworkers and access files from anywhere. Construction Engineering Consulting Group (CECG) specializes in providing a variety of construction Industry management services for general contractors in the heavy civil construction industry. One service, Construction a “take-off” package, provides information about what materials are needed on a job and allows Location contractors to bid for work more strategically. When CECG began offering these take-offs, the need Fremont, California for a consistent, scalable file-transfer solution to send plans and bids became apparent. A history of using other Citrix products — GoToMeeting, GoToMyPC and Podio — brought CECG to ShareFile. Number of Employees 5 “We ran two or three services in tandem for a couple of weeks to see what would work best for us,” Business Challenges says Maxwell Erwin, project manager at CECG. “ShareFile, by far, was the best product.” • Needed a better way to send large project files to CECG found a unique way to use Podio and ShareFile together as a comprehensive CRM system. clients and vendors. Customer information is logged in Podio and relevant documents are connected to each contact • Could not collaborate from ShareFile using the Podio File Picker. That way, anyone looking at a particular contact can view with remote employees. any of the related jobs files as well.
    [Show full text]
  • How to Join the Webinar
    From: James Arrick To: Master, Sarah L. Subject: Program Mapping / Education Gaps Analyst Training Confirmation Date: Friday, July 19, 2013 5:23:12 PM Dear Sarah, Thank you for registering for "Program Mapping / Education Gaps Analyst Training". Please send your questions, comments and feedback to: [email protected] How To Join The Webinar Tue, Jul 30, 2013 1:00 PM - 2:00 PM PDT Add to Calendar 1. Click the link to join the webinar at the specified time and date: https://global.gotowebinar.com/join/169030816426944332 8/845647848 Note: This link should not be shared with others; it is unique to you. 2. Choose one of the following audio options: Call in using the phone number(s) below: 1-877-661-1252 Webinar ID: 114-385-835 View System Requirements You are receiving this email because you registered for this webinar. You can also opt-out from receiving further emails from this webinar's organizers. Privacy Policy. Citrix Online, LLC | 7414 Hollister Avenue | Goleta, CA 93117 © 2013 Citrix Online, LLC. All rights reserved. Citrix, GoToAssist, GoToMeeting, GoToMyPC, GoToTraining, GoToWebinar, Podio and Sharefile are trademarks of Citrix Systems, Inc., or a subsidiary thereof, and are or may be registered in the U.S. Patent and Trademark Office and other countries. All other trademarks are the property of their respective owners. From: James Arrick To: Master, Sarah L. Subject: Thank you for attending Program Mapping / Education Gaps Analyst Training Date: Wednesday, July 31, 2013 12:00:20 AM Dear Sarah, Thank you for attending my webinar. We hope you enjoyed our event.
    [Show full text]
  • Citrix Systems
    ISSN (Online) 2278-1021 IJARCCE ISSN (Print) 2319-5940 International Journal of Advanced Research in Computer and Communication Engineering ISO 3297:2007 Certified Vol. 7, Issue 3, March 2018 Citrix Systems Meshal F. Aldhamen Public Authority and Applied Education, High Institute of Telecommunication and Navigation, Computer Department, Kuwait. Abstract: Citrix Systems, Inc. is an American multinational software company that supply server, application and desktop virtualization, networking, software as a service (SaaS), and cloud computing technologies. It was founded in Richardson, Texas in 1989 by a group of ex-IBM developers. The name Citrix is a combination of Unix and Citrus since its founder Ed Iacobucci moved the company from southern Florida to its new headquarters. Ed Iacobucci served as chairman until his departure in 2000. Citrix solutions are based on virtualization and cloud computing technologies that can grant various benefits and great efficiency in CPU utilization, green IT environments with low power consumption, central control, more availability, reduces project timelines by eliminating hardware procurement, improves disaster recovery capabilities, more central control of the desktop, and improve outsourcing services. Keywords: Citrix Systems, XenServer, Cloud Suite, NetScaler, Virtual Desktops. INTRODUCTION There have been numerous prominent instances of security breaches and attacks. There is no indication of this relenting, embracing the need to consider security at the design phase, to constantly screen and go along to security threats and to get ready and bolster the environment in like manner. Security intricacy increments with the rise and utilization of more sorts of devices (cell phones, tablets, and web-empowered devices) and extra network systems, (for example, 3G/4G, Wi-Fi, and Bluetooth).
    [Show full text]
  • CITRIX SYSTEMS INC Form 8-K Current Report
    SECURITIES AND EXCHANGE COMMISSION FORM 8-K Current report filing Filing Date: 2012-07-25 | Period of Report: 2012-07-25 SEC Accession No. 0001157523-12-003852 (HTML Version on secdatabase.com) FILER CITRIX SYSTEMS INC Mailing Address Business Address 851 WEST CYPRESS CREEK 851 WEST CYPRESS CREEK CIK:877890| IRS No.: 752275152 | State of Incorp.:DE | Fiscal Year End: 1231 ROAD ROAD Type: 8-K | Act: 34 | File No.: 000-27084 | Film No.: 12978977 FORT LAUDERDALE FL FORT LAUDERDALE FL SIC: 7372 Prepackaged software 33309 33309 954-267-3000 Copyright © 2012 www.secdatabase.com. All Rights Reserved. Please Consider the Environment Before Printing This Document UNITED STATES SECURITIES AND EXCHANGE COMMISSION WASHINGTON, D.C. 20549 FORM 8-K CURRENT REPORT PURSUANT TO SECTION 13 OR 15(d) OF THE SECURITIES EXCHANGE ACT OF 1934 Date of Report (Date of Earliest Event Reported): July 25, 2012 CITRIX SYSTEMS, INC. (Exact name of Registrant as specified in its Charter) Delaware 0-27084 75-2275152 (State or other Jurisdiction of (Commission File Number) (I.R.S. Employer Identification No.) Incorporation or Organization) 851 West Cypress Creek Road Fort Lauderdale, Florida 33309 (Address of Principal Executive Offices) (Zip Code) Telephone: (954) 267-3000 (Registrant’s Telephone Number, Including Area Code) Not Applicable (Former Name or Former Address, If Changed Since Last Report) Check the appropriate box below if the Form 8-K filing is intended to simultaneously satisfy the filing obligation of the registrant under any of the following provisions: ⃞ Written communications pursuant to Rule 425 under the Securities Act (17 CFR 230.425) ⃞ Soliciting material pursuant to Rule 14a-12 under the Exchange Act (17 CFR 240.14a-12) ⃞ Pre-commencement communications pursuant to Rule 14d-2(b) under the Exchange Act (17 CFR 240.14d-2(b)) ⃞ Pre-commencement communications pursuant to Rule 13e-4(c) under the Exchange Act (17 CFR 240.13e-4(c)) Copyright © 2012 www.secdatabase.com.
    [Show full text]