Archives

Office 365

Forecast Calling for Cloud? Learn the Steps to Blue Skies

When discussing cloud with customers, some of the most common themes are “How do we get started? What are my options for Citrix in the cloud? And what steps should we follow?”

A cloud strategy is not one-size-fits-all. Getting started, …


  

Related Stories

Continue reading..

New Webinar: Solve Migration, Security & Productivity Challenges Around Office 365

Many organizations are embracing Office 365 as their tool of choice for productivity applications. However, introducing Office 365 into existing enterprise infrastructure raises the question of how to handle authorization and access while ensuring data security. With all of the …


  

Related Stories

Continue reading..

Newly Updated: Reviewer’s Guide for On-Premises VMware Identity Manager 2.9.1

The Reviewer&#rsquo;s Guide for On-Premises VMware Identity Manager 2.9.1 has just been updated.

This updated Reviewer&#rsquo;s Guide describes the newest features of VMware Identity Manager (formerly called Workspace Portal), such as enhanced Microsoft Office access. VMware Identity Manager has long provided conditional access control for any Office 365 clients that use modern authentication. VMware Identity Manager now also includes enhanced conditional access policies for Office 365 clients that use legacy user name and password authentication. These policies increase security and reduce risk of data loss by controlling clients such as native iOS and Android email applications, older versions of Microsoft Office, and email clients such as Thunderbird. This feature works for both managed and unmanaged devices.

In addition to discussion of new features and enhancements, the Reviewer&#rsquo;s Guide includes instructions in the form of illustrated, easy-to-follow exercises that walk you through the setup of a basic deployment. Follow the steps to set up and deploy, and then you can explore the new VMware Identity Manager features at your own pace.

You can find the Reviewer&#rsquo;s Guide for On-Premises VMware Identity Manager 2.9.1, as well as other technical papers, at VMware Technical Papers.

To comment on this paper, contact VMware End-User-Computing Technical Marketing at euc_tech_content_.

The post Newly Updated: Reviewer&#rsquo;s Guide for On-Premises VMware Identity Manager 2.9.1 appeared first on VMware End-User Computing Blog.

Read more..

Secure Your Office 365 Deployments with NetScaler

These days, when you make applications and services available from external locations, security is always (or should be) top-of-mind for IT admins. What they need to make sure of is that no one from an external location can easily break …


  

Related Stories

Continue reading..

Don’t Leave Holes in Your Office 365 Security Strategy

Secure every access point to Microsoft Office 365 emails and data with VMware Workspace ONE.

If your organization is like most, you&#rsquo;re either using Microsoft Office 365 or thinking about an Office 365 implementation. Since the data and email in Office 365 are vital to your business, you&#rsquo;ve probably thought through how to protect Office 365 with application access control policies. You need to ensure, however, that your policies protect all apps with access to Office 365.

Imagine that one of your end users goes to visit family for the holidays. While at her parent&#rsquo;s house, she borrows her father&#rsquo;s laptop to check work emails. Although you require multi-factor authentication (MFA) for access to Office 365, she logs into Outlook 2010 using nothing more than a username and password. Outlook downloads her mailbox, she checks her email, and after a few days, she returns home.

All her emails, however, stay on the laptop. That data is out of her control and out of IT&#rsquo;s control, creating data loss risks if the laptop is sold, lost or compromised with malware. How did your user (unwittingly) bypass your conditional access rules, and what can you do to protect your data and email?

In this blog post, we&#rsquo;ll cover how this data leak occurred, and how VMware Workspace ONE allows you to avoid similar Office 365 data losses and security holes.

Applying Access Policies to Office 365 Authentication Methods

To understand how your user bypassed your MFA requirement, you have to understand that Office 365 supports two ways to log users in: Modern authentication and legacy username/password authentication. In the example above, your user logged in with a legacy username/password client, accidentally bypassing the policies you created to protect Office 365.

To control access to Office 365 emails and data no matter what client your user chooses, you need a solution such as Workspace ONE that protects both authentication methods. Although many Office 365 client apps use newer modern authentication, older Office 365 apps, Android and iOS native mail (using ActiveSync), and third-party Office 365 apps (such as Thunderbird) use legacy username/password authentication.

Protecting both authentication types is vital for most organizations. Workspace ONE controls access to Office 365 no matter which client app a user chooses with policies based on group, network range, device type or OS and more.

Modern vs. Legacy Authentication

Here&#rsquo;s how to tell the difference Office 365 modern authentication and legacy username/password authentication:

Modern Authentication

If the end user is redirected to an IDP in a browser, it&#rsquo;s modern authentication.

Microsoft modern authentication redirects the end user in a browser from the Office 365 app to an identity provider (IdP), such as Workspace ONE, to authenticate. Modern authentication takes advantage of Microsoft&#rsquo;s Azure Active Directory Authentication Libraries (ADAL). For more details on modern authentication, see Microsoft&#rsquo;s summary here.

This is modern authentication. The user is redirected to Workspace ONE in a browser.

Legacy Authentication

If the end user enters credentials into the client&#rsquo;s UI (and there&#rsquo;s no redirection to an IDP), it&#rsquo;s legacy username/password authentication.

In username/password authentication, the Office 365 client collects a username and password in its own UI (rather than sending the user to an IDP in a browser). Because the user enters their credentials into the client rather than using standard browser single sign-on (SSO), legacy username/password authentication doesn&#rsquo;t support advanced features such as MFA or VMware mobile SSO. Microsoft sometimes calls legacy username/password authentication by a more specific name such as basic authentication or the Microsoft Online Services Sign-In Assistant.

This is legacy username/password authentication. The user enters credentials directly into the client UI—there&#rsquo;s no browser redirect to Workspace ONE or another IDP.

Many identity solutions can only protect access to Office 365 for clients using modern authentication. Workspace ONE protects access to Office 365 without requiring additional products or servers, no matter what client a user chooses.

Use Cases for Controlling Access to Office 365

Because modern authentication supports MFA, certificate authentication, VMware mobile SSO and all other standard authentication features of Workspace ONE, organizations have fine-grained control over how they allow access for Office 365 clients using modern authentication.

Controlling legacy username/password clients, on the other hand, is tricky. Because legacy username/password clients only support one authentication method (username and password), organizations can&#rsquo;t rely on the enhanced security of MFA, VMware mobile SSO or other authentication features. Instead, many organizations take the following approaches:

  • Allow legacy username/password access to Office 365 for mobile email only. In this approach, an organization could block legacy username/password access to Office 365 apps and data for all apps and add an exception for native mobile email clients that use Exchange ActiveSync. This approach works well with the mobile email management features in Workspace ONE. Many organizations choose this path because Exchange ActiveSync clients don&#rsquo;t download the user&#rsquo;s entire mailbox, reducing the risk of data loss. Your organization can also choose to limit mobile email access to the extra-secure VMware Boxer app.

 

  • Allow legacy username/password access to Office 365 only under more secure conditions. Because legacy username/password clients such as Thunderbird or older versions of Office don&#rsquo;t support MFA, some organizations want to limit these clients to only connect to Office 365 under more secure circumstances. For example, you might only allow Thunderbird on your corporate network to ensure users are not downloading their mailboxes on multiple computers. This approach can reduce the risk of data loss.
  • Allow legacy username/password access only for specific users or groups. Organizations may want to limit which users can connect to Office 365. For example, IT could block retail employees from accessing mobile email while they are offsite.
  • Block all access to Office 365 for username/password clients. Some organizations want to ensure all users access Office 365 with MFA, mobile SSO or other secure methods. Because modern authentication supports these methods but legacy username/password authentication does not, these organizations should block username/password client apps. Users will still be able to access Office 365 through Office 2016 apps (or Office 2013 apps, if they are configured correctly).

Workspace ONE & Office 365

Workspace ONE makes securing and deploying Office 365 easier, with industry-leading enterprise mobility management (EMM) to keep your devices and users safe. Learn more about how Workspace ONE protects Office 365, while providing end users with consumer-level ease of use. Visit vmware.com/products/workspace-one, or contact your VMware account representative for more details.

Because you liked this post:

  • Better Together: VMware Workspace ONE & Office 365
  • Enable Consumer Simple, Secure Access to Office 365 with New VMware Workspace ONE Enhancements
  • VMware Named a Leader in Gartner Magic Quadrant for Enterprise Mobility Management (EMM)

The post Don&#rsquo;t Leave Holes in Your Office 365 Security Strategy appeared first on VMware End-User Computing Blog.

Read more..

Synergy Milestone! 200,000 Users Served Daily by Optimization Pack for Skype for Business

Thank you, customers, for your perfect timing!

Just in time for our Citrix Synergy 2017 conference in Orlando this week, we hit a major milestone in adoption of the HDX RealTime Optimization Pack for Skype for Business that Citrix and


  

Related Stories

Continue reading..

New ShareFile Solutions for Today’s Modern Workspaces

New Features Improve Productivity, Collaboration, and Security

Today’s Digital Workspaces are facing increasing pressure to improve productivity and collaborative solutions, provide easy-to-access, mobile infrastructure, without creating operability challenges, and all within a secure environment.

In response to trends, Citrix ShareFile …


  

Related Stories

Continue reading..

Azure AD Join with VMware Workspace ONE

Secure, timely support for remote Windows users can be tricky.

Imagine your top remote sales rep breaks her laptop before an onsite meeting with a vital client. Does she have time to wait for IT to grab a new laptop, Domain Join it for secure access to corporate resources and then ship it out? Even if there is time, she&#rsquo;ll worry about her meeting, and you&#rsquo;ll get plenty of requests for updates.

Instead, imagine that your rep simply stops by a nearby store for a new laptop. She self-enrolls into your Azure Active Directory (AD) domain using the Windows 10 Getting Started wizard. Her device is automatically protected with VMware Workspace ONE enterprise mobility management (EMM) policies.

When you combine Azure AD Domain Join with the best-in-class Windows 10 management of Workspace ONE, you can ensure security and control over end-user access to resources—even from devices that never touch your internal corporate network.

Azure AD Join automatically protects Windows 10 with Workspace ONE EMM policies.

Secure Azure AD Join with Workspace ONE

Workspace ONE integrates with Azure AD Join to protect remote Windows 10 machines with enterprise mobility policies powered by VMware AirWatch. When an end user follows the Windows 10 setup wizard to join his or her device to your Azure AD instance, Azure AD can automatically enroll the device into Workspace ONE for management.

If you have devices that won&#rsquo;t consistently contact your corporate network, or if you have temporary users such as students or contractors, offering Azure AD Join to your users gives them the following benefits:

  • Easy access to their corporate resources through device enrollment into Workspace ONE;
  • Enterprise-class device security through Workspace ONE EMM;
  • User settings that follow them as they log into different domain-joined devices;
  • Strong but simple authentication with support for biometrics, such as face recognition using Windows Hello for Business and
  • Access to the Windows Store for Business using work or school accounts.

You can find full details on the benefits and prerequisites of Azure AD Join on Microsoft&#rsquo;s site.

Users can choose to Azure AD Join their device from the Windows 10 Getting Started Wizard.

Use Cases for Azure AD Join

Azure AD Join makes Windows 10 management easier than traditional AD Domain Join when you&#rsquo;re working with devices that may not connect to your corporate network or with temporary users (for more information, see this article outlining the pros and cons of Azure AD Join). Common use cases include the following:

  • Remote device registration: Some organizations ship Windows 10 devices to remote employees. If you set up Azure AD domain join, your users can easily join their devices to your domain as part of the Windows 10 setup wizard.
  • Temporary domain membership: If your organization employs temporary workers, such as contractors, or temporary users, such as students, you may choose to domain join them through Azure AD to take advantage of the self-service domain join as part of Windows 10 setup.

Workspace ONE, Azure AD and Office 365

Workspace ONE provides the industry-leading EMM you need to keep your devices and users safe. Learn more about how Workspace ONE protects valuable resources such as Microsoft Office 365, while providing end users with consumer-level ease of use. Visitvmware.com/products/workspace-one, or contact your VMware account representative for more details.

The post Azure AD Join with VMware Workspace ONE appeared first on VMware End-User Computing Blog.

Read more..

In Top Mobile News: Windows 10 Smartwatches & Android-Supported Laptops

Windows 10 smartwatches come to the enterprise. It&#rsquo;s 1.54 inches, runs Universal Windows Applications, secure and built to &#rsquo;survive a hard day at work,&#rdquo; saidMicrosoft. The TrekStor IoT Wearable runs on Windows 10 IoT Core, a version of Windows 10 for the Internet of Things. Microsoft will reveal more soon on the smartwatch for healthcare, […]]> Windows 10 smartwatches come to the enterprise.

It&#rsquo;s 1.54 inches, runs Universal Windows Applications, secure and built to &#rsquo;survive a hard day at work,&#rdquo; saidMicrosoft. The TrekStor IoT Wearable runs on Windows 10 IoT Core, a version of Windows 10 for the Internet of Things. Microsoft will reveal more soon on the smartwatch for healthcare, manufacturing, retail and other industries.

Migrating to Windows 10—everyone&#rsquo;s doing it.

By the end of this year, 85% of enterprises will have started deploying Windows 10, according to a newGartnersurvey. The top reason to migrate? Nearly half of respondents said it’s improved security.

You may be putting Office 365 apps at risk.

Mobile application management (MAM) helps you control Microsoft Office 365 apps—but there are limitations to an application-onlysecurity framework. Worried?Find out the risks and more comprehensive solutions here.

Are you thinking what I&#rsquo;m thinking?

Chrome could soon predict what you&#rsquo;re searching for in other Android apps based on the last website you visited in the mobile browser. The &#rsquo;Copyless Paste&#rdquo; feature spotted in development would use machine learning to guess what text you&#rsquo;ll enter next.

Google also updated thelistof Chromebook laptops planned to support Android apps, bumping the total from six to more than 80 devices, reportsThe Verge.

Personal privacy matters to enterprise security, too.

Mobile surveillance is a growing threat to individual privacyandto enterprise data. Bring-your-own (BYO) devices that allow apps to collect personal data, &#rsquo;open the door to corporate hacks, stolen business data and crippling cyber attacks.&#rdquo; Read more fromAppthority President Domingo Guerraon what you can do.

Wonder why workers won&#rsquo;t use the apps you deploy?

Blame it on shorter attention spans. About 7% of users won&#rsquo;t use a new work app for each extra step it takes to get started. So if it takes six extra steps, about 42% of workers won&#rsquo;t use a new app. Read more on theVMware EUC Blog.

Tweet of the Week

Renu Upadhyay, director of product marketing at VMware, on this week&#rsquo;s CMSWire Tweet Jam, &#rsquo;Optimizing the Employee Experience:&#rdquo;

 

 

It&#rsquo;s time for a change of scenery.

This year&#rsquo;s largest VMware event, VMworld, will be a once-in-a-lifetime experience for enterprise mobility experts. You’ll hear from Sumit Dhawan, Blake Brannon, Noah Wasmer and other end-user computing (EUC) leaders. Register now for early-bird rates, and get all the details at theAirWatch Blog.

Up next:

  • Join our SociaLab—Introduction to Mobile Device Management (MDM) with AirWatch—May 2 in Houston.
  • &#rsquo;Realize Your Digital Future&#rdquo; May 8–11 atDell EMC Worldin Vegas.
  • Unlock mobility withderived credentials and AirWatchJune 23 online.
  • Don&#rsquo;t miss anexclusive AirWatch experience atVMworld 2017, Aug. 27–31 in Vegas.

Read more..

New White Paper: Best Practices for Delivering Microsoft Office 365 in VMware Horizon 7 with Published Applications

By Frank Anderson, End-User-Computing Solutions Architect, Desktop Technical Marketing, VMware

and Cindy Heyer Carroll, Technical Writer, End-User-Computing Technical Marketing, VMware

We are excited to announce a new white paper, Best Practices for Delivering Microsoft Office 365 in VMware Horizon 7 with Published Applications, now available to help you avoid risks that can occur during setup and use.

VMware Horizon 7 bridges the gap between Office 365 and RDS-published application delivery. The white paper is packed full of useful tips for setting up Microsoft Office 365 in a VMware Horizon 7 environment, and seamlessly delivering published applications to end users. The paper provides overarching insight into the basic requirements, including use of the specialized Office Deployment Tool, Click-to-Run, and Shared Computer Activation.

Deploying Office 365 ProPlus using VMware Horizon 7 Published Applications

The paper explains the benefits of deploying Office 365 with Horizon 7 Published Applications, unpacks the concepts of shared computer activation (SCA) as applied to delivering published applications, and explains how you can use SCA when setting up Office 365 on VMware Horizon 7. Installation tips for Office 365 are included, as well as optimization tips for deploying Office 365 in a VMware Horizon 7 RDSH environment. Moreover, the paper gives you a preview of numerous optional enhancements using VMware App Volumes, VMware User Environment Manager, and VMware Identity Manager, all of which can further extend capabilities and streamline your deployments.

You can find out how to improve performance and application manageability when delivering Office 365 applications from VMware Horizon 7 in an RDSH environment, in the Best Practices for Delivering Microsoft Office 365 in VMware Horizon 7 with Published Applications white paper. This paper also includes links to additional information, a few of which are listed here:

  • VMware Horizon 7
  • VMware App Volumes
  • VMware User Environment Manager Deployed in 60 Minutes or Less (VMware blog post)
  • VMware Identity Manager Integration with Office 365 for Single Sign-on and Provisioning
  • Troubleshoot issues with shared computer activation for Office 365 ProPlus

To comment on this paper, contact VMware End-User-Computing Technical Marketing at euc_tech_content_.

The post New White Paper: Best Practices for Delivering Microsoft Office 365 in VMware Horizon 7 with Published Applications appeared first on VMware End-User Computing Blog.

Read more..

Go Que Newsroom Categories
Fatal error: Allowed memory size of 67108864 bytes exhausted (tried to allocate 2097152 bytes) in /home/content/36/8658336/html/goquecom/wp-includes/wp-db.php on line 1856