Cisco Blogs


Cisco Blog > Data Center and Cloud

Powering the New Citrix Mobile Workspace – built on Cisco UCS

Did you catch the news from Cisco and Citrix yesterday?  Here at Citrix Synergy, we announced the new Cisco Mobile Workspace Solution with Citrix.  This new jointly integrated solution brings together best of breed technologies from both companies to deliver a pervasively accessible end user workspace – One that can be delivered on any device, anywhere, seamlessly and securely integrated with the applications and productivity suite necessary for workers to be productive.

Central to this solution are the following tenets of the new mobile workspace:

  • Supporting any device, any OS
  • Maintaining secure access to the corporate network
  • Facilitating rapid expansion and control of mobile applications
  • Protecting data and preventing data loss

Foundational to the New Mobile Workspace is a best-in-class workspace virtualization platform built on Cisco Unified Computing System and Citrix XenDesktop.

Check out this infographic which Cisco and Citrix have compiled highlighting some nice proof points of business impact enabled by Cisco Desktop Virtualization Solutions with Citrix XenDesktop – then, ask yourself – “Can Your Server Deliver Results Like These?

Is your organization ready to enable a mobile workforce? from Cisco Data Center

While here at Synergy, I’ve had numerous conversations with VDI implementers who’ve resonated with the unique benefits and performance advantage associated with deploying hosted VDI as well as hosted shared desktops on UCS.  Surprised in fact, at the number of attendees I run into who are already well familiarized with:

  • The performance advantage VMFEX brings to XenApp environments
  • The simplified manageability of UCS Service Profile Templates, enabling rapid turn-up of XenDesktop environments starting from bare metal servers
  • The linearly consistent performance with scale, proven through Cisco Validated Designs for Citrix XenDesktop

The roster of clientele that have tapped the benefits of XenDesktop deployed on UCS continues to grow, providing these organizations an accelerated path to delivering an enterprise-wide mobility strategy, built on this differentiated virtual workspace infrastructure.

Tags: , , , , ,

Get Your Mobile Workspace Solution now – from Cisco and Citrix

Mobility and Strategy InitiativesHaving an enterprise-wide mobility strategy provides a competitive advantage as a recent IT survey from Cisco concluded.  Working with many customers over the last couple of years we have come to recognize that mobility is a multi-stage journey that every organization is taking at its own pace. While some of you might think of this journey as just getting your employees’ devices onto your network, there is significantly more to the journey – device-focused leads to application-focused, which then leads to experiences-focused.

Being a dad to my 5-month old son, I can relate our customers’ mobility journey to the 3 stages a child goes through in his first year as they learn to be mobile – roll, crawl, and walk!

Babies start off without the ability to move from one spot to the next– think of this as your enterprise 10 years ago before the popularization of smartphones.  Then babies learn to roll.  Suddenly, the world opens up to them.  This is the first stage of the mobility journey – similar to a device focused BYOD strategy.  The focus here is to provide a secure onboarding experience for your users while having the right policies in place to enable context-aware secure access control. The Cisco Unified Access solution – with ISE for policy, Prime Infrastructure for management, and converged wired and wireless network – provides the foundation for enable this BYOD solution.  However, would you really want to stop at the rolling stage of development?

The next step for kids is learning to crawl. This is often the most exciting stage as kids can now move with intent. Crawling provides true mobility to the kid as he can explore the fascinating world around him and get access to all his toys. This is the application-focused strategy in your mobility journey. Now that you have enabled secure access for your workforce, you can decide on the right set of applications to enable your workforce to be productive – on the go. This is where Cisco has been working with our ecosystem partners to provide a complete mobile workspace solution.

One of these ecosystem partners is Citrix and in this blog, I’d like to highlight a first-of-its-kind solution for employee mobility, that Cisco & Citrix have developed in close collaboration.

This new Cisco Mobile Workspace Solution with Citrixbuilt on the Citrix Workspace Suiteprovides the complete hardware and software technology stack for delivering all the applications, content, and tools workers need on any device. This new Workspace Solution is excellent for companies moving into the second stage of their mobility journey – where their focus is on providing all the applications, content and services their employees need on their devices.

This solution can help your employees, partners, and consultants work and collaborate on their mobile and desk devices, from pretty much anywhere. Read More »

Tags: , , ,

Setting the Stage for the Cisco Mobile Workspace Solution with Citrix CVD

CiscoWotrkSpaceSolutionThe times keep changing: first there were devices, then there were apps, and today, if you don’t develop a strategy for enterprise mobility and get ahead of the trend, the mobile wave will leave you behind. A year ago, after talking with many of our customers, partners, and our own technical sales teams, we realized that IT organizations were facing enormous challenges when making the transition from simple BYOD to adopting an enterprise mobility strategy across the business. As is typical during such tremendous market transitions like mobility, IT organizations were spending a lot of time figuring out how to line up the pieces required to support a mobile workforce, sorting through and weighing the many technology and vendor choices.

Today in conjunction with our friends at Citrix, we are happy to highlight the  Cisco Mobile Workspace Solution with Citrixbuilt on the Citrix Workspace Suite. We are very excited to deliver this first of its kind, comprehensive solution to our customers. Today I’d like to take a step back and set the stage for the Cisco Mobile Workspace Solution with Citrix by taking you through our thought process in creating the right enterprise mobility solution for our customers. Read More »

Tags: , , , , , , , , , , , , , , , , , , , ,

Summary: Navigating Security Threats in a Mobile World

Security plays an important role in the success of mobility implementations worldwide. We assume security threats are always present, however it’s not always apparent where threats may arise from. Being aware of these potential risk areas is crucial.

Business decision-makers must gain insight into where these breaches are occurring. They should also understand why it is important for them to care, and how they can be aided by technical decision-makers to solve these issues moving forward.

Here’s a brief look into the where, the why and the how of embracing a secure approach to enterprise mobility and what it means for business leaders.

Cisco_NavigatingSecurityMobileWorld

Where are security threats? Today’s organizations are facing a greater attack surface as advanced mobile devices and public cloud services foster new attack models and increasing complexity within networks. To cover the entire attack continuum, organizations need to address a broad range of attack vectors with solutions that operate everywhere the threat can manifest itself: on the network, on traditional endpoints, on mobile devices, and in virtual environments.

How can threats be thwarted? The best approach is a proactive one, rather than a reactive one, especially when many organizations may not know when they are under attack. Business leaders must work with IT teams to institute a formal program for managing mobile devices and to ensure that any device is secure before it can access the network.

Why does a balanced approach to mobile security matter? In a recent blog post, I discussed the need for organizations to deploy a balanced approach to mobile security. This approach should focus more on protecting the network and proprietary data and less on implementing overly broad restrictions. IT needs to approach security with a user experience mentality. After all, if you overly manage devices, your adoption will be low and so will your return on investment (ROI). This approach can lead to greater opportunities to align threat intelligence and security best practices.

To learn more about this balanced approach to mobile security, read the full blog: Navigating Security Threats in a Mobile World.

Tags: , , , , , , , , , , , , ,

Navigating Security Threats in a Mobile World

Security plays an important role in the success of mobility implementations worldwide. We assume security threats are always present; however, it’s not always apparent where threats may arise from. Being aware of these potential risk areas is crucial.

Since mobility solutions offer users the ability to use devices on a range of networks and in a wide array of places, threats may come in unsuspected ways, or be inadvertently introduced into your enterprises network. For example, one recent study reveals that 80 percent of corporate security professionals and IT leaders recognize that “end user carelessness” constitutes the biggest security threat to an organization.

In addition, information from the Cisco 2014 Annual Security Report sheds light on the persistent security attacks that enterprises face. From hackers to malicious malware, it’s clear that security threats arise from unsuspecting places.

Given this knowledge, business decision-makers must gain insight into where these breaches are occurring. They should also understand why it is important for them to care, and how they can be aided by technical decision-makers to solve these issues moving forward. In this post I’ll discuss the where, the why and the how of embracing a secure approach to enterprise mobility and what it means for business leaders.

Read More »

Tags: , , , , , , , , , , , , ,