Archives

Security

The Usual Suspects – The Security Pitfalls of Data At Large

citrix_data_security

Data is the crown jewel of an organization - its high value must be protected at all costs. Data fuels the modern-day economy; the work of the present and the work of the future demand that we share it more


  

Related Stories

Continue reading..

Better Together: Join Citrix and Microsoft for a Live Virtual Event Aug. 22

What’s Next in Our Partnership and Security in the Digital Transformation Era

Over the years, Citrix and Microsoft have delivered powerful new services and solutions to help our customers accelerate their journey to the cloud, making it easier for their …


  

Related Stories

Continue reading..

XenApp & XenDesktop 7.15 LTSR – The Blockbuster Release of the Summer

Virtualization-goers everywhere will be talking about it. Over two decades in the making. More than twelve million lines of field-proven source code. Featuring the latest star capabilities around security, flexibility and user experience. This is the one you’ve been waiting


  

Related Stories

Continue reading..

IoT e Machine Learning: o que mudam no espaço de trabalho?

Se fosse preciso algum fato pontual que nos demonstrasse o ritmo acelerado do avanço da tecnologia, esse seria o debate entre Elon Musk e Mark Zuckerberg sobre Inteligência Artificial. Duas das maiores referências em TI acham que está cada vez …


  

Related Stories

Continue reading..

How to Avoid Common Security Pitfalls & Educate Employees on Security Best Practices

Five pillars of security success

Another day, another threat emerges. Security is top of mind for organizations of all shapes and sizes, but it can be overwhelming and many businesses don’t know where to start. At Citrix, our strategy is


  

Related Stories

Continue reading..

Bring Your Own Tech to Work: Risks, Rewards & Realities for Healthcare

Organizations need to recognize that people will continue to use unauthorized technologies — often in direct violation of organizational policies. This is especially true in the healthcare industry, where the balance between patient care, HIPAA compliance, security issues and privacy


  

Related Stories

Continue reading..

Uncover Security Blind Spots in Your Organization with Citrix & Bitdefender

If security used to be a compliance-only conversation, today it is a hot topic even at C-level. Recent ransomware attacks, such as WannaCry and GoldenEye, affected entire organizations, including companies like FedEx and Renault. Big brands, banks or state departments …


  

Related Stories

Continue reading..

Is Standardization IT’s Friend or Foe—or Both?

Exploring Part I of the *New* Digital Workspace Story Map

Getting the Digital Workspace Story Map Straight

Here at VMware, we have talked about the digital workspace story for years. But if you put 10 people in a room and ask them what a digital workspace is or how to get there, you will get at least 25 very interesting and very different answers.

The Journey to the Digital Workspace Story Map

Many of us technologists jump right into an architectural discussion or show off a cool demo focusing on self-service access. Others might point to an app catalog. Still others talk about a &#rsquo;virtual workspace,&#rdquo; where their virtual desktop is their &#rsquo;digital workspace.&#rdquo; Of course, they are all wrong and they are all right. This makes discussions about what it takes to create a digital workspace extremely tough.

Recently, a team across VMware—from product managers and marketers to engineers, designers and professional services architects—sat down with some talented artists and storytellers to create a digital workspace &#rsquo;story map.&#rdquo; The goal of the story map was to replace reams of fluffy whitepapers and never-ending slide decks (I get to say that since I am one of those marketing types who create them). We wanted to foster a richly visual dialog about the journey to the digital workspace. No products. No technology. Just the journey itself.

We took these ideas to some of our best customers and partners, and it was amazing to hear the excitement in their voices. They too struggled to articulate their own vision of the digital workspace to colleagues and management. We took their feedback and further refined the story map into the image we are proud to share with you today.

In some ways, I am loathe to annotate the story. Like the MAD magazine cartoons some of us grew up with (sorry if that reference is beyond your years … wait, no, I&#rsquo;m not…) the discovery and the details are half the fun. If you also enjoy a good puzzle, STOP NOW! Take a look at this section of the story map yourself and draw your own conclusions. When you&#rsquo;re ready to proceed, READ ON!

Part 1 of the Digital Workspace Story: Is Standardization IT&#rsquo;s Friend or Foe—or Both?

Standardization is in the DNA of probably anyone in IT, learned from process-oriented organizations. The concept of interchangeable parts popularized by Eli Whitney in the production of guns and cotton gins allowed manufacturers to better specialize labor, reduce production costs and permit better serviceability of increasingly complex machines. It is no surprise that we want to apply the same logic to IT by supplying modern tools of production (namely apps and devices) to today&#rsquo;s workforce.

By waging war on variables, IT is better able to achieve economies of scale.

  • If an organization standardizes on laptops, three standards are better than five.
  • If an organization is looking at office productivity apps, one is better than three.
  • And on and on from there.

From a serviceability perspective, I get it. Why reimage a laptop over the network if I can pop the top, plug a fresh SSD into the slot that I just took off a drive burner and then button it back up?

In the digital workspace story map, we show this idea of standardization with the Beetles and station wagons clogged on the packed highway. Every user should look like either a Beetle or a station wagon; depending on their job role, they get the keys to their car. It might not be the car they would choose, but it&#rsquo;s reliable—or at least IT will be there to fix it with their stash of backup parts.

This does not mean standards are unimportant. It just means the standards we need to care about in 2017 changed. Instead of standardizing on apps and devices or even web browsers, we standardize on APIs and service level agreements (SLAs), which are the new production frameworks for the mobile-cloud world.

Regardless of the standards, culture and policies of nearly every company, executives, line-of-business leaders and rogue-but-well-meaning employees do not want a Beetle or a station wagon. They want different apps and different devices. No matter how much IT wants to support these users, their production line is not equipped, ultimately leading to shadow IT.

Keeping with the transportation theme, it is no accident that IT is out fixing the &#rsquo;IT budget&#rdquo; potholes in the road. Under the weight of our legacy systems and continued focus on devices as assets, an increasing portion of our shrinking budgets continue to be spent on keeping the road open and drivable.

We believe the status quo is unsustainable.

Application growth, device advancements driven by consumer technologies and the ever-increasing expectations of both users and line-of-business leaders will cause traffic jams an emergency pothole crew cannot clear. Like many modern transportation systems, building a bigger road or a new bridge is not enough. We must think differently about how to move people from one place to another … and where those people are going.

That sets the stage for where many of us our today. In the next blog, we will talk about the transition to a digital workspace, the IT initiatives laying the groundwork for next-generation infrastructure and how organizations can plan for transformative change.

See the Digital Workspace Vision for Yourself—Live & In Technicolor

Thinking about heading to VMworld? VMworld is now the leading-industry event for End-User Computing (EUC) with nearly 100 dedicated sessions and a must-see showcase keynote specifically about the digital workspace. If you have not registered yet, there is no time like the present! Click here to get started.

Already registered for VMworld U.S.? Here&#rsquo;s your Vegas to-do list:

  • Click here to dive into the &#rsquo;empower the digital workspace&#rdquo; session catalog.
  • Click here to claim your seat to the digital workspace showcase keynote. Hurry! Seats are selling out fast!
  • Click here to see the four EUC sessions all VMworld attendees should join.

Joining us in Barcelona? Here are the links to the top digital workspace content at VMworld Europe:

  • Digital workspace session catalog.
  • Digital workspace showcase keynote.

Hear first hand how leading companies empower the digital workspace for transformation during VMworld. Register for the EUC Showcase keynote to hear their stories, dive into brand new innovations and much more. Seats are going fast, so register today!

The post Is Standardization IT&#rsquo;s Friend or Foe—or Both? appeared first on VMware End-User Computing Blog.

Read more..

Is Your Security Architecture the Achilles Heel of Your Financial Business?

The recent spotlight on security incidences and breaches against businesses across all industries — including financial organizations — is undoubtedly unnerving for those who are responsible for keeping the businesses safe. For financial services, in addition to this year’s WannaCry


  

Related Stories

Continue reading..

Ace Your Next Audit: Enroll in New Citrix Security Courses

Information security is mission-critical to everyone, but especially to companies in highly regulated industries such as healthcare, government and financial services. Your organization is constantly facing new security threats from ransomware to mobile malware, as well as new vulnerabilities


  

Related Stories

Continue reading..

Go Que Newsroom

Categories