High Performance Remote Desktop Access for Mobile Users Without the Pain and Complexity of VPN/RDP

Size: px
Start display at page:

Download "High Performance Remote Desktop Access for Mobile Users Without the Pain and Complexity of VPN/RDP"

Transcription

1 High Performance Remote Desktop Access for Mobile Users Without the Pain and Complexity of VPN/RDP May 2013 Splashtop Inc. 1/14

2 Table of Contents 1. Situation Analysis Introducing Splashtop Enterprise How Splashtop Enterprise Addresses Your Needs High Level Overview Splashtop Enterprise App Splashtop Center Splashtop Streamer for Business Helping to Meet HIPPA Compliance Typical DMZ set-up Splashtop Center Administration Implementation Overview Four Simple Steps Bandwidth Considerations Additional Ways to Use Splashtop Enterprise The New Approach to Remote Desktop Access Contact Information: Office Locations, Telephone Numbers Splashtop Inc. 2/14

3 1. Situation Analysis Extending legacy VPN/RDP to mobile devices can be fraught with challenges. Lengthy, complex, and error-prone configuration of mobile VPN and RDP clients can result in downtime and additional management costs. Users are frustrated with remembering multiple logins. Remote connections back to desktops are painfully slow. Splashtop Enterprise with SplashApp technology represents a unique alternative to this traditional approach. Splashtop is used by over 14 million users and is the market leading remote access solution. By using Splashtop Enterprise with SplashApp technology, organizations can more efficiently and more cost effectively deliver secure remote desktop services designed from the ground up to support today s mobile users while retaining the same level of security as a VPN. This white paper provides server, desktop, network and security personnel with an architectural overview and description of Splashtop Enterprise with SplashApp technology and how it compares to a traditional VPN/RDP solution. Splashtop Inc. 3/14

4 1. Challenges extending VPN / RDP to mobile users Despite the explosion of mobile devices and the increasing trend of BYOD, most businesses still rely on legacy solutions designed decades ago to connect mobile users back to desktops. Figure 1: Conventional VPN/RDP Setup RDP is a Microsoft remote desktop protocol that allows users to connect to remote desktops. Using RDP alone outside the firewall exposes traffic to security risks - and can make host computers vulnerable to outside attack - so VPN is required. When connected using VPN, the corporate network is exposed to users allowing them to retrieve files, access documents, access the internet or login to specific services hosted on the corporate network. However, when this conventional VPN/RDP approach is extended to support tablets and smartphones, the situation changes dramatically: Lengthy, complex, and error-prone configuration of mobile VPN and RDP clients can result in user downtime when using line of business applications. Users are confused remembering multiple logins - VPN client, RDP app, desktop. There is significant slowness when accessing applications users selecting menu options or typing text do not see an instant response leading to frustration. Typically Internet access is also pushed through VPN. This increases the load on the VPN appliance leading to a bad user experience and potentially impacting other network services. Lack of vendor documentation for VPN client and RDP app configuration - or conflicting options - leave user forums as a source of answers. It s hard to even know which vendor to contact when it comes to getting answers. There is no one-way to reliably configure VPN clients with RDP apps - resulting in time consuming trial-and-error set-up and on-going maintenance. Splashtop Inc. 4/14

5 Mobile client connections may involve users authenticating through third-party cloud/saas servers that exist outside of your organization s network and so increase security risk. Mobile users may download a variety of RDP apps each offering different configuration options and user experiences as they behave differently all of which IT has to support. As can been seen, ensuring a fast and reliable RDP connection across a VPN can be a challenging, lengthy and tortuous experience. Splashtop Enterprise with SplashApp technology addresses these challenges and more. Splashtop Inc. 5/14

6 2. Introducing Splashtop Enterprise Splashtop Enterprise eliminates the pain and complexity involved in extending existing VPN/RDP technologies to mobile devices. Splashtop Enterprise delivers: A managed, on-premise service that is secure, easy to set-up and cost effective to operate. High performance, secure remote access to desktops and servers that reside inside the company firewall. Integration with the existing Active Directory infrastructure Significantly reduced user frustration by delivering applications to their mobile devices with the speed and ease of use as if they were in front of their desktops. Splashtop satisfied our two top priorities security and budget. It provides a cost-effective and secure gateway to our desktops without the need to allocate additional server resources or incur additional licensing cost. Velta Moisio - Director, Information Technology Lake County Juvenile Court The physical setup for Splashtop Enterprise is comparable to a basic VPN/RDP solution remote clients connect to a server on the network over a secure tunnel and authenticate based on access policies applied to the connection. Figure 2: Splashtop Enterprise Setup However, despite being similar in terms of physical setup, the two systems differ significantly in important key areas. The following table contrasts network configuration, desktop setup, mobile device setup, operational/management and performance. It demonstrates how Splashtop Enterprise eliminates many of the challenges of using VPN/RDP. Splashtop Inc. 6/14

7 Table 1: Comparison of Splashtop Enterprise to Legacy VPN/RDP Area Legacy VPN/RDP Splashtop Enterprise Operational / Management Network Desktop Mobile Performance / Use cases Multiple points of administration and configuration to support mobile users Need to support multiple, inconsistent mobile VPN and RDP clients/apps Mobile activity must be synthesized from multiple server logs Setup and maintain multiple firewall policies for each user device Configure port forwarding on router Configure VPN appliance for mobile device access Configure policies for VPN access Configure each remote desktop for RDP o May require Windows upgrade to support RDP, or installation of additional third-party software Grant access rights for each user on each remote desktop separately Configure L2TP client for secure connection (VPN) Evaluate, install and configure RDP app for remote desktop access Train users how to use different gestures and menus for each RDP app Tunneling RDP within VPN is inefficient. It increases the connection pay load and so consumes more bandwidth. Poor video streaming means it is unable to support 3D/graphics intensive applications without considerably more bandwidth. Unified administration console Single mobile remote access solution Centralized logging with audit trail Single firewall policy/port - No additional complex firewall policy/port configuration is required Single point to define user and device access policies Install Splashtop Streamer on each remote desktop Install Splashtop Enterprise App onto mobile devices. Single app architecture includes Intuitive gestures for a excellent user experience. Splashtop streaming protocol requires just 300kbps for general office productivity Additional use cases include: o Working with graphic intensive 3D images / animation o Viewing full screen video such as product training o Engineering/design simulation o Viewing medical images Splashtop Inc. 7/14

8 3. How Splashtop Enterprise Addresses Your Needs 3.1. High Level Overview The Splashtop Enterprise solution is comprised of three components, each residing on different systems within an enterprise network. Together, they provide a high performance and secure remote desktop experience. Figure 3: High Level Architecture Splashtop Enterprise App The Splashtop Enterprise App is a lightweight remote client that is installed on an employee s mobile device, such as an Apple ipad or iphone, Google Android phone or tablet; Macs and Windows PCs and laptops are also supported. Users connect to desktops using the same AD credentials they use at their desk Splashtop Center Splashtop Center is installed within the enterprise firewall (or DMZ) on a Windows-based system and brokers connections between the user s mobile device (running the Splashtop for Business app) and enterprise desktops (running Splashtop Streamer for Business software). It also provides an administrative console to manage users and devices. Seamless integration with existing Active Directory (AD) domains helps IT administrators simplify the process of local user authentication and ensures that only authorized users can establish remote sessions. Since all Splashtop traffic is managed by Splashtop Center, only a single firewall policy is required, not per-user policies, reducing the firewall management workload. Security policies are applied within Splashtop Center as part of each user s assigned policy. Splashtop Inc. 8/14

9 Splashtop Streamer for Business This agent software must be installed on the target desktop the user will access. IT administrators can install the software either by visiting the user s desktop, using existing management tools or optionally allowing users to download the software from the Splashtop Center server themselves. To enable users to access more than one desktop, IT administrators must install streamers onto those other systems. The streamer software can automatically login using the users AD credentials Helping to Meet HIPPA Compliance For organizations specifically concerned with Health Insurance Portability and Accountability Act of 1996 (HIPAA) compliance, please see the Remote Desktop Access for the Mobile Workforce - Security White Paper. The Appendix of this document outlines how Splashtop Enterprise helps to meet certain required and addressable security requirements for HIPAA Typical DMZ set-up All communications within the Splashtop Enterprise solution from the mobile app through Splashtop Center to Splashtop Streamer for Business and back again are secured over Splashtop s patent-pending streaming technology using the IETF-standard Transport Layer Security (TLS) protocol. Splashtop Enterprise also prevents eavesdropping on and modification or replay of communications by restricting the cipher suite to 2048 bit ECDH-RSA with 256-bit AES-CBC and SHA1 (see Figure 5: Splashtop Center Deployment in DMZ). Figure 4: Splashtop Center Deployment in DMZ Splashtop Inc. 9/14

10 3.4. Splashtop Center Administration Splashtop Center provides a robust, unified administrative console that includes: Active Directory (AD) integration - Integrate with your existing AD for authentication Centralized policy-based control - Set user and device access policies, activate/deactivate users and devices, MAC address filtering, create or import SSL certificates, set maximum frame rate per user connection. set idle timeout Reporting - View real-time connections and audit trails Grouping - Allow access to shared pool of physical or virtual desktops With the installation of Splashtop Streamer for Business on the Splashtop Center server, the console can be accessed remotely by administrators from a Splashtop Enterprise app on a mobile device (or Windows PC or Mac). Figure 5: Splashtop Center Console Users Tab Active Directory (AD) integration eliminates redundant administration tasks and ensures consistency of user identities. By authenticating against the domain in read-only mode, the risk of modifying the existing AD infrastructure is reduced. Only approved devices and users that have been specifically added by the administrator can access desktops. Administrators can also allow/deny remote access by mobile devices individually using MAC addresses, lock or disable access by a specific device, disable auto-logon (forcing users to enter passwords to connect), and de-activate a mobile device entirely. Groups can be created to act as a shared resource pool for users. Splashtop Center also displays the active status of connections, IP addresses, and connection time and duration as well as device type logging this information in an audit trail. Splashtop Inc. 10/14

11 IT Security Controls Figure 6: Splashtop Center Audit Trail Splashtop Inc. 11/14

12 3.5. Implementation Overview Four Simple Steps IT setup User Setup Set-up Splashtop Center on a Windows server (for initial proof of concept you can install this onto your existing desktop). Install Splashtop Enterprise app on mobile devices (users download from device's app store) Create users and define access policies. Users can be created by accessing Active Directory or by creating local users. Install Splashtop Streamer for Business on each computer to be accessed. Users log in and connect to their desktop. Figure 7: Users choose their desired desktop from the Splashtop Enterprise app Splashtop Inc. 12/14

13 3.6. Bandwidth Considerations Splashtop Enterprise is capable of providing a truly interactive experience to mobile users, delivering 3D graphics and HD video without compromise using relatively modest bandwidth. Splashtop Center policies can be defined to throttle the frame rate for specific users (from 1-60 frames per second), allowing administrators to reduce bandwidth for each connection if required. Bandwidth required per session for general productivity usage bandwidth : 300 kbps For optimal performance : 800 kbps 3.7. Additional Ways to Use Splashtop Enterprise In addition to providing an alternative to VPN and RDP technologies, Splashtop Enterprise opens the door to discover new ways to extend company resources to mobile devices: Tabletize Office, Outlook, and Corporate Apps Support existing MS Office, IE-only,.NET or JAVA applications without rewriting or retraining users. Extending VDI Deliver virtual desktops to mobile devices more cost effectively and with greater performance. Turn Mobile Device into an Interactive Whiteboard Allow teachers, presenters or instructors to be freed from their computer to teach in all four corners of the classroom. High-Performance / High Fidelity Remote Access to 3D/graphics Deliver highly responsive 3D AutoCAD, animations, simulation, and medical images. Pooling of Resources Create a shared pool of physical or virtual desktops for users to access remotely. Splashtop Inc. 13/14

14 4. The New Approach to Remote Desktop Access Extending legacy VPN/RDP technologies to mobile devices can be fraught with challenges. Business of all sizes can use Splashtop Enterprise to efficiently and more cost effectively delivers a secure remote desktop solution uniquely designed to support the demands of today s mobile workforce. Its key features are: Market Leading Performance Patent-pending streaming technology and intelligent optimization techniques deliver up to 30 frames per second with synchronized audio for superior performance and highly responsive user interactivity Simplicity No complicated changes to your existing server hardware, networking, or storage infrastructure; intuitive administrative console for efficient user management Secure On-premise service with end-to-end encryption that integrates with your existing Active Directory infrastructure Universal A single app that supports a broad range of mobile devices and use cases Cost Effective Eliminates lengthy trial and error setup and reduces ongoing maintenance costs For further details and to start a free trial, please visit Splashtop aspires to touch people s lives by delivering the best-in-class remote desktop experience bridging tablets, phones, computers and TVs. Splashtop technology empowers consumer and business users with high-performance, secure, interactive access to their favorite applications, media content and files anytime, anywhere Contact Information: Office Locations, Telephone Numbers Silicon Valley Headquarters Taipei Office Tokyo Office 1054 S. De Anza Blvd, Suite 200 San Jose, CA U.S.A th Floor, No. 222, Fuxing South Road, Section 1, Taipei, Taiwan, Level 20 Marunouchi Trust Tower - Main Marunouchi, Chiyoda-Ku Tokyo Japan Splashtop Inc. 14/14

Remote Desktop Access for the Mobile Workforce

Remote Desktop Access for the Mobile Workforce Remote Desktop Access for the Mobile Workforce Security White Paper May 2013 Splashtop Inc. 1/12 Table of Contents 1. Situation Analysis... 3 2. Architecture... 4 2.1. Splashtop Enterprise App... 4 2.2.

More information

How Parallels RAS Enhances Microsoft RDS. White Paper Parallels Remote Application Server

How Parallels RAS Enhances Microsoft RDS. White Paper Parallels Remote Application Server How Parallels RAS Enhances Microsoft RDS White Paper Parallels Remote Application Server Table of Contents Introduction... 3 Overview of Microsoft Remote Desktop Services... 3 Microsoft RDS Pain Points...

More information

Optimizing Pulse Secure Access Suite with Pulse Secure Virtual Application Delivery Controller solution

Optimizing Pulse Secure Access Suite with Pulse Secure Virtual Application Delivery Controller solution DATASHEET Optimizing Pulse Secure Access Suite with Pulse Secure Virtual Application Delivery Controller solution Features & Benefits Best-in-class VPN and vadc solutions A single point of access for all

More information

PCI DSS Compliance. White Paper Parallels Remote Application Server

PCI DSS Compliance. White Paper Parallels Remote Application Server PCI DSS Compliance White Paper Parallels Remote Application Server Table of Contents Introduction... 3 What Is PCI DSS?... 3 Why Businesses Need to Be PCI DSS Compliant... 3 What Is Parallels RAS?... 3

More information

Splashtop Enterprise for IoT Devices - Quick Start Guide v1.0

Splashtop Enterprise for IoT Devices - Quick Start Guide v1.0 Introduction For information about different deployment choices, please see chapter 3 of the full Splashtop Center Administrator s Guide. Splashtop Enterprise for IoT Devices is comprised of three components:

More information

Webinar: Mitigating the risks of uncontrolled content access from mobile devices. Presented By: Brian Ulmer, Product Management Director

Webinar: Mitigating the risks of uncontrolled content access from mobile devices. Presented By: Brian Ulmer, Product Management Director Webinar: Mitigating the risks of uncontrolled content access from mobile devices Presented By: Brian Ulmer, Product Management Director 2013 1 Employees are going mobile Mobile devices are being used for

More information

BYOD Success Kit. Table of Contents. Current state of BYOD in enterprise Checklist for BYOD Success Helpful Pilot Tips

BYOD Success Kit. Table of Contents. Current state of BYOD in enterprise Checklist for BYOD Success Helpful Pilot Tips Table of Contents Current state of BYOD in enterprise Checklist for BYOD Success Helpful Pilot Tips 2 Current State of BYOD in the Enterprise Defining BYOD Bring-Your-Own-Device (BYOD): a business practice

More information

New Features in Splashtop Center v An Addendum to the Splashtop Center Administrator s Guide v1.7

New Features in Splashtop Center v An Addendum to the Splashtop Center Administrator s Guide v1.7 New Features in Splashtop Center v2.3.10 An Addendum to the Splashtop Center Administrator s Guide v1.7 Table of Contents 1. Introduction... 4 2. Overview of New Features... 5 3. Automatic Domain Users

More information

Design and deliver cloud-based apps and data for flexible, on-demand IT

Design and deliver cloud-based apps and data for flexible, on-demand IT White Paper Design and deliver cloud-based apps and data for flexible, on-demand IT Design and deliver cloud-based apps and data for flexible, on-demand IT Discover the fastest and easiest way for IT to

More information

Enterprise Guest Access

Enterprise Guest Access Data Sheet Published Date July 2015 Service Overview Whether large or small, companies have guests. Guests can be virtually anyone who conducts business with the company but is not an employee. Many of

More information

NetSupport Manager v11

NetSupport Manager v11 Remote Support For Any Environment NetSupport Manager v11 NetSupport Manager has been helping organisations optimise the delivery of their IT support services since 1989 and, while the use of Remote Control

More information

INCREASE APPLICATION SECURITY FOR PCI DSS VERSION 3.1 SUCCESS AKAMAI SOLUTIONS BRIEF INCREASE APPLICATION SECURITY FOR PCI DSS VERSION 3.

INCREASE APPLICATION SECURITY FOR PCI DSS VERSION 3.1 SUCCESS AKAMAI SOLUTIONS BRIEF INCREASE APPLICATION SECURITY FOR PCI DSS VERSION 3. INCREASE APPLICATION SECURITY FOR PCI DSS VERSION 3.1 SUCCESS Protect Critical Enterprise Applications and Cardholder Information with Enterprise Application Access Scope and Audience This guide is for

More information

A comprehensive security solution for enhanced mobility and productivity

A comprehensive security solution for enhanced mobility and productivity A comprehensive security solution for enhanced mobility and productivity coupled with NetScaler Unified Gateway and StoreFront lets organizations upgrade their business security beyond usernames and passwords,

More information

Streamline IT with Secure Remote Connection and Password Management

Streamline IT with Secure Remote Connection and Password Management Streamline IT with Secure Remote Connection and Password Management Table of Contents Introduction Identifying IT pain points Selecting a secure remote connection and password management solution Turning

More information

A Guide To Evaluating Desktop Virtualization Solutions

A Guide To Evaluating Desktop Virtualization Solutions A Guide To Evaluating Desktop Virtualization Solutions Takeaway Guide Table of Contents What To Look For In Evaluating Desktop Virtualization.........3 Achieving the Optimal Benefits of Desktop Virtualization.......7

More information

Enhancing VMware Horizon View with F5 Solutions

Enhancing VMware Horizon View with F5 Solutions Enhancing VMware Horizon View with F5 Solutions VMware Horizon View is the leading virtualization solution for delivering desktops as a managed service to a wide range of devices. F5 BIG-IP devices optimize

More information

Cloud FastPath: Highly Secure Data Transfer

Cloud FastPath: Highly Secure Data Transfer Cloud FastPath: Highly Secure Data Transfer Tervela helps companies move large volumes of sensitive data safely and securely over network distances great and small. Tervela has been creating high performance

More information

HIPAA Regulatory Compliance

HIPAA Regulatory Compliance Secure Access Solutions & HIPAA Regulatory Compliance Privacy in the Healthcare Industry Privacy has always been a high priority in the health profession. However, since the implementation of the Health

More information

Microsoft Windows Server 2008 R2 Remote Desktop Services Session Virtualization and VDI Microsoft RemoteFX

Microsoft Windows Server 2008 R2 Remote Desktop Services Session Virtualization and VDI Microsoft RemoteFX Microsoft Windows Server 2008 R2 Remote Desktop Services Session Virtualization and VDI Microsoft RemoteFX Citrix XenApp 6 on Remote Desktop Services Extending the Microsoft platform New features in XenApp

More information

XenApp, XenDesktop and XenMobile Integration

XenApp, XenDesktop and XenMobile Integration XA, XD and XM Integration XenApp, XenDesktop and XenMobile Integration for a Comprehensive Mobility and Digital Workspace Solution Citrix.com 1 Desktop and application virtualization have enhanced mobility

More information

Citrix XenMobile and Windows 10

Citrix XenMobile and Windows 10 White Paper Citrix XenMobile and Windows 10 Citrix XenMobile and Windows 10 With version 10, Windows has moved the once desktop operating system firmly into the era of the mobility and the cloud. Windows

More information

Deltek Touch Expense for Ajera. Touch 1.0 Technical Installation Guide

Deltek Touch Expense for Ajera. Touch 1.0 Technical Installation Guide Deltek Touch Expense for Ajera Touch 1.0 Technical Installation Guide June 01, 2018 While Deltek has attempted to verify that the information in this document is accurate and complete, some typographical

More information

White Paper Taking Windows Mobile on Any Device Taking Windows Mobile on Any Device

White Paper Taking Windows Mobile on Any Device Taking Windows Mobile on Any Device White Paper Taking Windows Mobile on Any Device Taking Windows Mobile on Any Device Citrix.com As the adoption of mobile devices continues to expand, IT organizations are challenged to keep up with the

More information

HOW A CLOUD COMMUNICATIONS SYSTEM UNIQUELY SUPPORTS YOUR MOBILE WORKFORCE

HOW A CLOUD COMMUNICATIONS SYSTEM UNIQUELY SUPPORTS YOUR MOBILE WORKFORCE HOW A CLOUD COMMUNICATIONS SYSTEM UNIQUELY SUPPORTS YOUR MOBILE WORKFORCE Table of contents 3 How a UCaaS platform empowers your mobile workforce with a phone system and much more 4 6 11 A cloud phone

More information

Exam : Title : Security Solutions for Systems Engineers. Version : Demo

Exam : Title : Security Solutions for Systems Engineers. Version : Demo Exam : 642-566 Title : Security Solutions for Systems Engineers Version : Demo 1. Which one of the following elements is essential to perform events analysis and correlation? A. implementation of a centralized

More information

Vendor: Citrix. Exam Code: 1Y Exam Name: Implementing Citrix NetScaler 10.5 for App and Desktop Solutions. Version: Demo

Vendor: Citrix. Exam Code: 1Y Exam Name: Implementing Citrix NetScaler 10.5 for App and Desktop Solutions. Version: Demo Vendor: Citrix Exam Code: 1Y0-253 Exam Name: Implementing Citrix NetScaler 10.5 for App and Desktop Solutions Version: Demo QUESTION 1 A Citrix Administrator needs to configure a single virtual server

More information

Designing Workspace of the Future for the Mobile Worker

Designing Workspace of the Future for the Mobile Worker Designing Workspace of the Future for the Mobile Worker Paulo Jorge Correia Technical Solutions Architect Building Business Value Enable mobile workers and BYOD Locate and access remote experts Collaborate

More information

GLOBALPROTECT. Key Usage Scenarios and Benefits. Remote Access VPN Provides secure access to internal and cloud-based business applications

GLOBALPROTECT. Key Usage Scenarios and Benefits. Remote Access VPN Provides secure access to internal and cloud-based business applications GLOBALPROTECT Prevent Breaches and Secure the Mobile Workforce GlobalProtect extends the protection of Palo Alto Networks Next-Generation Security Platform to the members of your mobile workforce, no matter

More information

Deployment of Cisco IP Mobility Solution on Enterprise Class Teleworker Network

Deployment of Cisco IP Mobility Solution on Enterprise Class Teleworker Network Deployment Guide Deployment of Cisco IP Mobility Solution on Enterprise Class Teleworker Network The Cisco Service Oriented Network Architecture (SONA) framework helps enterprise customers evolve their

More information

905M 67% of the people who use a smartphone for work and 70% of people who use a tablet for work are choosing the devices themselves

905M 67% of the people who use a smartphone for work and 70% of people who use a tablet for work are choosing the devices themselves 67% of the people who use a smartphone for work and 70% of people who use a tablet for work are choosing the devices themselves 905M tablets in use for work and home globally by 2017 Before Now 32% of

More information

WHITE PAPER Cloud FastPath: A Highly Secure Data Transfer Solution

WHITE PAPER Cloud FastPath: A Highly Secure Data Transfer Solution WHITE PAPER Cloud FastPath: A Highly Secure Data Transfer Solution Tervela helps companies move large volumes of sensitive data safely and securely over network distances great and small. We have been

More information

Disk Encryption Buyers Guide

Disk Encryption Buyers Guide Briefing Paper Disk Encryption Buyers Guide Why not all solutions are the same and how to choose the one that s right for you.com CommercialSector Introduction We have written this guide to help you understand

More information

Citrix XenApp and XenDesktop 7.15 LTSR FIPS Sample Deployments

Citrix XenApp and XenDesktop 7.15 LTSR FIPS Sample Deployments Citrix XenApp and XenDesktop 7.15 LTSR FIPS 140-2 Sample Deployments Contents Introduction... 2 Audience... 2 Security features introduced in XenApp and XenDesktop 7.15 LTSR... 2 FIPS 140-2 with XenApp

More information

NetMotion Mobility and Microsoft DirectAccess Comparison

NetMotion Mobility and Microsoft DirectAccess Comparison Product Comparison and Comparison Guidelines for Comparing and optimizes and secures all traffic to mobile devices across any network, application or operating system. It provides IT with root cause detection

More information

Maximize your investment in Microsoft Office 365 with Citrix Workspace

Maximize your investment in Microsoft Office 365 with Citrix Workspace White Paper Maximize your investment in Microsoft Office 365 with Citrix Workspace Maximize your investment in Microsoft Office 365 with Citrix Workspace Accelerate migration, simplify maintenance, and

More information

Ensuring a Consistent Security Perimeter with CloudGenix AppFabric

Ensuring a Consistent Security Perimeter with CloudGenix AppFabric USE CASE BRIEF Ensuring a Consistent Security Perimeter with CloudGenix AppFabric CloudGenix AppFabric ensures a consistent security perimeter for every site in the enterprise in the midst of constantly

More information

Securing Office 365 with MobileIron

Securing Office 365 with MobileIron Securing Office 365 with MobileIron Introduction Office 365 is Microsoft s cloud-based productivity suite. It includes online versions of Microsoft s most popular solutions, like Exchange and SharePoint,

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the product described herein without notice. Before installing and using the product, please review the readme files,

More information

Pulseway Security White Paper

Pulseway Security White Paper Pulseway Security White Paper Table of Contents 1. Introduction 2. Encryption 2.1 Transport Encryption 2.2 Message Encryption 3. Brute-Force Protection 4. DigiCert Code Signing Certificate 5. Datacenter

More information

TECHNOLOGY Introduction The Difference Protection at the End Points Security made Simple

TECHNOLOGY Introduction The Difference Protection at the End Points Security made Simple APPGATE TECHNOLOGY UNIFIED TECHNOLOGY Introduction The AppGate solution truly delivers holistic security and access control where other approaches fall short. It is designed to address the security and

More information

Empower a Mobile Workforce with Secure App Delivery

Empower a Mobile Workforce with Secure App Delivery Empower a Mobile Workforce with Secure App Delivery Empowering people to use Windows applications on any type of device with full security. For convenience and productivity, many people expect to use their

More information

Secure IT consumeration (BYOD), users will like you How to make secure access for smart mobile devices

Secure IT consumeration (BYOD), users will like you How to make secure access for smart mobile devices Michal Zlesák Area Sales Manager Michal.zlesak@enterasys.com Secure IT consumeration (BYOD), users will like you How to make secure access for smart mobile devices A Siemens Enterprise Communications Company

More information

What is an application delivery controller?

What is an application delivery controller? What is an application delivery controller? ADCs have gained traction within the last decade, largely due to increased demand for legacy load balancing appliances to handle more advanced application delivery

More information

Securing Today s Mobile Workforce

Securing Today s Mobile Workforce WHITE PAPER Securing Today s Mobile Workforce Secure and Manage Mobile Devices and Users with Total Defense Mobile Security Table of Contents Executive Summary..................................................................................

More information

Say Yes to BYOD How Fortinet Enables You to Protect Your Network from the Risk of Mobile Devices WHITE PAPER

Say Yes to BYOD How Fortinet Enables You to Protect Your Network from the Risk of Mobile Devices WHITE PAPER Say Yes to BYOD How Fortinet Enables You to Protect Your Network from the Risk of Mobile Devices WHITE PAPER FORTINET Say Yes to BYOD PAGE 2 Introduction Bring Your Own Device (BYOD) and consumerization

More information

Five Reasons It s Time For Secure Single Sign-On

Five Reasons It s Time For Secure Single Sign-On Five Reasons It s Time For Secure Single Sign-On From improved security to increased customer engagement, secure single sign-on is a smart choice. Executive Overview While cloud-based applications provide

More information

Google Identity Services for work

Google Identity Services for work INTRODUCING Google Identity Services for work One account. All of Google Enter your email Next Online safety made easy We all care about keeping our data safe and private. Google Identity brings a new

More information

Adaptacyjny dostęp do aplikacji wszędzie i z każdego urządzenia

Adaptacyjny dostęp do aplikacji wszędzie i z każdego urządzenia Adaptacyjny dostęp do aplikacji wszędzie i z każdego urządzenia F5 EMEA Webinar Listopad 2014 Andrzej Kroczek Field Systems Engineer Today s Network and App Access: So Many Variables! LOCATIONS USERS DEVICES

More information

Nuance. PowerMic Mobile. Installation and Administration Guide

Nuance. PowerMic Mobile. Installation and Administration Guide Nuance PowerMic Mobile Installation and Administration Guide Table of contents Welcome to PowerMic Mobile 3 System requirements 4 Hardware and software requirements 4 Network requirements 4 System sizing

More information

REVISED 6 NOVEMBER 2018 COMPONENT DESIGN: VMWARE IDENTITY MANAGER ARCHITECTURE

REVISED 6 NOVEMBER 2018 COMPONENT DESIGN: VMWARE IDENTITY MANAGER ARCHITECTURE REVISED 6 NOVEMBER 2018 COMPONENT DESIGN: VMWARE IDENTITY MANAGER ARCHITECTURE Table of Contents Component Design: VMware Identity Manager Architecture Design Overview VMware Identity Manager Connector

More information

VNC Connect security whitepaper. Cloud versus direct with VNC Connect

VNC Connect security whitepaper. Cloud versus direct with VNC Connect VNC Connect security whitepaper Cloud versus direct with VNC Connect November 2017 Contents Introduction... 3 Key terminology... 3 Direct connectivity... 4 Cloud connectivity... 5 Summary... 6 Appendix:

More information

VMware Workspace ONE Quick Configuration Guide. VMware AirWatch 9.1

VMware Workspace ONE Quick Configuration Guide. VMware AirWatch 9.1 VMware Workspace ONE Quick Configuration Guide VMware AirWatch 9.1 A P R I L 2 0 1 7 V 2 Revision Table The following table lists revisions to this guide since the April 2017 release Date April 2017 June

More information

Vendor: Citrix. Exam Code: 1Y Exam Name: Designing, Deploying and Managing Citrix XenMobile Solutions. Version: Demo

Vendor: Citrix. Exam Code: 1Y Exam Name: Designing, Deploying and Managing Citrix XenMobile Solutions. Version: Demo Vendor: Citrix Exam Code: 1Y0-370 Exam Name: Designing, Deploying and Managing Citrix XenMobile Solutions Version: Demo QUESTION NO: 1 Which connection type is used when WorxWeb for ios is configured to

More information

Mobile Access Security & Management Managed and Unmanaged Mobile Access to Windows Applications and Virtual Desktops from Smart phones and Tablets

Mobile Access Security & Management Managed and Unmanaged Mobile Access to Windows Applications and Virtual Desktops from Smart phones and Tablets WHITE PAPER Mobile Access Security & Management Managed and Unmanaged Mobile Access to Windows Applications and Virtual Desktops from Smart phones and Tablets Ericom Software www.ericom.com September 2012

More information

Cloud versus direct with VNC Connect

Cloud versus direct with VNC Connect VNC Connect security whitepaper Cloud versus direct with VNC Connect This document discusses strategies for choosing the best connectivity method for your business: establishing direct connections between

More information

Security Guide Zoom Video Communications Inc.

Security Guide Zoom Video Communications Inc. Zoom unifies cloud video conferencing, simple online meetings, group messaging, and a softwaredefined conference room solution into one easy-to-use platform. Zoom offers the best video, audio, and wireless

More information

Virtual Desktop (Windows 7 VM) User Guide

Virtual Desktop (Windows 7 VM) User Guide Virtual Desktop (Windows 7 VM) User Guide Welcome to using your new Virtual Desktop. This technology will offer mobility, enhanced security, and extreme versatility via Citrix technologies and Windows

More information

Maximize your move to Microsoft in the cloud

Maximize your move to Microsoft in the cloud Citrix and Microsoft 365: Maximize your move to Microsoft in the cloud 3 reasons to manage Office 365 with Citrix Workspace Pg. 2 Pg. 4 Citrix.com e-book Maximize your Citrix Workspace 1 Content Introduction...3

More information

Printing For Businesses with Multiple Locations Best Practice. ThinPrint White Paper

Printing For Businesses with Multiple Locations Best Practice. ThinPrint White Paper Printing For Businesses with Multiple Locations Best Practice ThinPrint White Paper Contents 1. Outline... 3 2. Remove Windows Print Servers and Create Company-Wide Scalability... 4 2.1 ThinPrint Engine

More information

Corente Cloud Services Exchange

Corente Cloud Services Exchange Corente Cloud Services Exchange Oracle s Corente Cloud Services Exchange (Corente CSX) is a cloud-based service that enables distributed enterprises to deliver trusted IPSec VPN connectivity services to

More information

Why Active Communications and Office 365?

Why Active Communications and Office 365? Why Active Communications and Office 365? Deploying Microsoft Lync Enterprise Voice with Office 365 has never been easier! The world of IT, telephony and communications is changing rapidly. The internet

More information

Securing Amazon Web Services (AWS) EC2 Instances with Dome9. A Whitepaper by Dome9 Security, Ltd.

Securing Amazon Web Services (AWS) EC2 Instances with Dome9. A Whitepaper by Dome9 Security, Ltd. Securing Amazon Web Services (AWS) EC2 Instances with Dome9 A Whitepaper by Dome9 Security, Ltd. Amazon Web Services (AWS) provides business flexibility for your company as you move to the cloud, but new

More information

MWA Deployment Guide. VPN Termination from Smartphone to Cisco ISR G2 Router

MWA Deployment Guide. VPN Termination from Smartphone to Cisco ISR G2 Router MWA Deployment Guide Mobile Workforce Architecture: VPN Deployment Guide for Microsoft Windows Mobile and Android Devices with Cisco Integrated Services Router Generation 2 This deployment guide explains

More information

Parallels Remote Application Server

Parallels Remote Application Server Parallels Remote Application Server Solutions Guide v16.1 Parallels International GmbH Vordergasse 59 8200 Schaffhausen Switzerland Tel: + 41 52 672 20 30 www.parallels.com Copyright 1999-2017 Parallels

More information

Fencing the Cloud. Roger Casals. Senior Director Product Management. Shared vision for the Identity: Fencing the Cloud 1

Fencing the Cloud. Roger Casals. Senior Director Product Management. Shared vision for the Identity: Fencing the Cloud 1 Fencing the Cloud with Identity Roger Casals Senior Director Product Management Shared vision for the Identity: Fencing the Cloud 1 Disclaimer Copyright 2014 Symantec Corporation. All rights reserved.

More information

White Paper. Why IDS Can t Adequately Protect Your IoT Devices

White Paper. Why IDS Can t Adequately Protect Your IoT Devices White Paper Why IDS Can t Adequately Protect Your IoT Devices Introduction As a key component in information technology security, Intrusion Detection Systems (IDS) monitor networks for suspicious activity

More information

Virtual Machine Encryption Security & Compliance in the Cloud

Virtual Machine Encryption Security & Compliance in the Cloud Virtual Machine Encryption Security & Compliance in the Cloud Pius Graf Director Sales Switzerland 27.September 2017 Agenda Control Your Data In The Cloud Overview Virtual Machine Encryption Architecture

More information

Evolved Backup and Recovery for the Enterprise

Evolved Backup and Recovery for the Enterprise Evolved Backup and Recovery for the Enterprise with Asigra technology Working gives me confidence in my data protection plan. I know that if I ever need to restore, it will take a few minutes rather than

More information

LiveMeeting conferencing solution

LiveMeeting conferencing solution LiveMeeting conferencing solution agenda section 1 section 2 section 3 section 4 section 5 section 6 Web conferencing LiveMeeting solution billing options/reporting customer care/slas free trial why Orange

More information

WHITE PAPER AIRWATCH SUPPORT FOR OFFICE 365

WHITE PAPER AIRWATCH SUPPORT FOR OFFICE 365 WHITE PAPER AIRWATCH SUPPORT FOR OFFICE 365 Airwatch Support for Office 365 One of the most common questions being asked by many customers recently is How does AirWatch support Office 365? Customers often

More information

SmarterMail v. Exchange: Admin Comparison

SmarterMail v. Exchange: Admin Comparison SmarterMail v. Exchange: Admin Comparison Help Documentation This document was auto-created from web content and is subject to change at any time. Copyright (c) 2018 SmarterTools Inc. SmarterMail and Microsoft

More information

Vendor: Citrix. Exam Code: 1Y Exam Name: Managing Citrix XenDesktop 7 Solutions Exam. Version: Demo

Vendor: Citrix. Exam Code: 1Y Exam Name: Managing Citrix XenDesktop 7 Solutions Exam. Version: Demo Vendor: Citrix Exam Code: 1Y0-200 Exam Name: Managing Citrix XenDesktop 7 Solutions Exam Version: Demo Question Set 1 QUESTION 1 Scenario: A Citrix Administrator installs XenServer. The administrator provisions

More information

PROTECTED EXTENSIBLE AUTHENTICATION PROTOCOL

PROTECTED EXTENSIBLE AUTHENTICATION PROTOCOL Q&A PROTECTED EXTENSIBLE AUTHENTICATION PROTOCOL This document answers questions about Protected Extensible Authentication Protocol. OVERVIEW Q. What is Protected Extensible Authentication Protocol? A.

More information

MaaS360 Secure Productivity Suite

MaaS360 Secure Productivity Suite MaaS360 Secure Productivity Suite Frequently Asked Questions (FAQs) What is MaaS360 Secure Productivity Suite? MaaS360 Secure Productivity Suite integrates a set of comprehensive mobile security and productivity

More information

How to find your IP address information

How to find your IP address information How to set up a VPN server on Windows 10 Source: https://pureinfotech.com/setup-vpn-server-windows-10/ Here are the step-by-step instructions to set up a VPN server using the built-in Incoming Connection

More information

The Device Has Left the Building

The Device Has Left the Building The Device Has Left the Building Mobile Security Made Easy With Managed PKI Christian Brindley Principal Systems Engineer, Symantec Identity and Information Protection Agenda 1 2 3 Mobile Trends and Use

More information

Xceedium Xio Framework: Securing Remote Out-of-band Access

Xceedium Xio Framework: Securing Remote Out-of-band Access Xceedium Xio Framework: Securing Remote Out-of-band Access 1 Common Scenario A major corporation, with many domestic and international offices, has a massive network infrastructure that spans across many

More information

TECHNOLOGY LEADER IN GLOBAL REAL-TIME TWO-FACTOR AUTHENTICATION

TECHNOLOGY LEADER IN GLOBAL REAL-TIME TWO-FACTOR AUTHENTICATION TECHNOLOGY LEADER IN GLOBAL REAL-TIME TWO-FACTOR AUTHENTICATION SMS PASSCODE is the leading technology in a new generation of two-factor authentication systems protecting against the modern Internet threats.

More information

Microsoft DirectAccess

Microsoft DirectAccess Microsoft DirectAccess The New Choice of Enterprises Over Traditional VPN Whitepaper August 2017 Microsoft DirectAccess The New Choice of Enterprises Over Traditional VPN Microsoft DirectAccess is a unique

More information

Enable Modern Work Styles with Microsoft VDI. Jeff Chin Windows Client Solutions Specialist

Enable Modern Work Styles with Microsoft VDI. Jeff Chin Windows Client Solutions Specialist Enable Modern Work Styles with Microsoft VDI Jeff Chin Windows Client Solutions Specialist Empowering People-centric IT User and Device Management Access and Information Protection Microsoft Virtual Desktop

More information

Delivering Windows-based Client-Server Applications Anywhere, On Demand with Presentation Server 4.5

Delivering Windows-based Client-Server Applications Anywhere, On Demand with Presentation Server 4.5 Delivering Windows-based Client-Server Applications Anywhere, On Demand with Presentation Server 4.5 Conrad Lee Enterprise Sales Engineer Hong Kong & Taiwan Delivering Windows Applications (IT Infrastructure

More information

Secure Industrial Automation Remote Access Connectivity. Using ewon and Talk2M Pro solutions

Secure Industrial Automation Remote Access Connectivity. Using ewon and Talk2M Pro solutions ewon Security Paper Secure Industrial Automation Remote Access Connectivity Using ewon and Talk2M Pro solutions www.ewon.us Last Modified: January 13, 2015 Overview ewon is a global provider of secure

More information

DIZZION TECHNOLOGY OVERVIEW

DIZZION TECHNOLOGY OVERVIEW DIZZION TECHNOLOGY OVERVIEW The Infrastructure and Advantages of DIzzion s Cloud Delivered Desktops Desktop-as-a-Service (DaaS) allows IT teams to implement robust, scalable, easy-to-manage virtual desktops

More information

SAP Security in a Hybrid World. Kiran Kola

SAP Security in a Hybrid World. Kiran Kola SAP Security in a Hybrid World Kiran Kola Agenda Cybersecurity SAP Cloud Platform Identity Provisioning service SAP Cloud Platform Identity Authentication service SAP Cloud Connector & how to achieve Principal

More information

Micro Focus iprint Feature Tour

Micro Focus iprint Feature Tour Micro Focus iprint Feature Tour Let your people print - quickly, easily and more securely Organizations want to reduce the complexity of managing printers by IT and allow end users to easily locate and

More information

Comodo IT and Security Manager Software Version 6.6

Comodo IT and Security Manager Software Version 6.6 Comodo IT and Security Manager Software Version 6.6 End User Guide Guide Version 6.6.053117 Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013 Table of Contents 1. Introduction to Comodo IT

More information

Cato Cloud. Software-defined and cloud-based secure enterprise network. Solution Brief

Cato Cloud. Software-defined and cloud-based secure enterprise network. Solution Brief Cato Cloud Software-defined and cloud-based secure enterprise network Solution Brief Legacy WAN and Security Appliances are Incompatible with the Modern Enterprise Cato Networks: Software-defined and Cloud-based

More information

BlackBerry 2FA. Datasheet. BlackBerry 2FA

BlackBerry 2FA. Datasheet. BlackBerry 2FA Datasheet BlackBerry 2FA BlackBerry 2FA The Challenge: Critical enterprise systems especially cloud services are more exposed than ever before because of the growing threat of cybercrime. Passwords alone

More information

REVISED 4 JANUARY 2018 VMWARE WORKSPACE ONE REFERENCE ARCHITECTURE FOR SAAS DEPLOYMENTS

REVISED 4 JANUARY 2018 VMWARE WORKSPACE ONE REFERENCE ARCHITECTURE FOR SAAS DEPLOYMENTS REVISED 4 JANUARY 2018 VMWARE WORKSPACE ONE REFERENCE ARCHITECTURE FOR SAAS DEPLOYMENTS Table of Contents Executive Summary VMware Reference Architectures Audience Reference Architecture Design Methodology

More information

Comodo IT and Security Manager Software Version 6.4

Comodo IT and Security Manager Software Version 6.4 Comodo IT and Security Manager Software Version 6.4 End User Guide Guide Version 6.4.040417 Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013 Table of Contents 1. Introduction to Comodo IT

More information

Privileged Access Management Android Access Console 2.2.2

Privileged Access Management Android Access Console 2.2.2 Privileged Access Management Android Access Console 2.2.2 2015 Bomgar Corporation. All rights reserved worldwide. BOMGAR and the BOMGAR logo are trademarks of Bomgar Corporation; other trademarks shown

More information

Secure Access & SWIFT Customer Security Controls Framework

Secure Access & SWIFT Customer Security Controls Framework Secure Access & SWIFT Customer Security Controls Framework SWIFT Financial Messaging Services SWIFT is the world s leading provider of secure financial messaging services. Their services are used and trusted

More information

HikCentral V.1.1.x for Windows Hardening Guide

HikCentral V.1.1.x for Windows Hardening Guide HikCentral V.1.1.x for Windows Hardening Guide Contents Introduction... 1 1. The Operating System - Microsoft Windows Security Configuration... 2 1.1 Strict Password Policy... 2 1.2 Turn Off Windows Remote

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the product described herein without notice. Before installing and using the product, please review the readme files,

More information

Configure Mobile and Remote Access

Configure Mobile and Remote Access Mobile and Remote Access Overview, on page 1 Mobile and Remote Access Prerequisites, on page 3 Mobile and Remote Access Configuration Task Flow, on page 4 Mobile and Remote Access Overview Cisco Unified

More information

What s New. New and Enhanced Features in NetSupport DNA v4. Welcome Dashboard. Auto Discovery. Platform Support

What s New. New and Enhanced Features in NetSupport DNA v4. Welcome Dashboard. Auto Discovery. Platform Support What s New New and Enhanced Features in NetSupport DNA v4 Welcome to NetSupport DNA version 4, the fresh approach to IT Asset Management. With any new release, the focus is not only on introducing innovative

More information

Critical Infrastructure Protection for the Energy Industries. Building Identity Into the Network

Critical Infrastructure Protection for the Energy Industries. Building Identity Into the Network Critical Infrastructure Protection for the Energy Industries Building Identity Into the Network Executive Summary Organizations in the oil, gas, and power industries are under increasing pressure to implement

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the product described herein without notice. Before installing and using the product, please review the readme files,

More information

Citrix XenApp and XenDesktop 7.6 LTSR FIPS Sample Deployments

Citrix XenApp and XenDesktop 7.6 LTSR FIPS Sample Deployments Citrix XenApp and XenDesktop 7.6 LTSR FIPS 140-2 Sample Deployments Table of contents Introduction... 2 Audience... 2 Security features introduced in XenApp and XenDesktop 7.6 LTSR... 2 FIPS 140-2 with

More information

Receiver for BlackBerry 2.2

Receiver for BlackBerry 2.2 Receiver for BlackBerry 2.2 2015-04-19 05:21:53 UTC 2015 Citrix Systems, Inc. All rights reserved. Terms of Use Trademarks Privacy Statement Contents Receiver for BlackBerry 2.2... 3 About This Release...

More information