Maximize your move to Microsoft in the cloud

Similar documents
Design and deliver cloud-based apps and data for flexible, on-demand IT

Maximize your investment in Microsoft Office 365 with Citrix Workspace

Crash course in Azure Active Directory

How your network can take on the cloud and win. Think beyond traditional networking toward a secure digital perimeter

WHITE PAPER AIRWATCH SUPPORT FOR OFFICE 365

Citrix SD-WAN for Optimal Office 365 Connectivity and Performance

BULLETPROOF365 SECURING YOUR IT. Bulletproof365.com

Securing Office 365 with MobileIron

Digital Workspace SHOWDOWN

Optimizing your network for the cloud-first world

BULLETPROOF365 SECURING YOUR IT. Bulletproof365.com

A comprehensive security solution for enhanced mobility and productivity

Office 365 Business The Microsoft Office you know, powered by the cloud.

Your Adoption Kit for Citrix Workspace Standard

Unlocking Office 365 without a password. How to Secure Access to Your Business Information in the Cloud without needing to remember another password.

Citrix ShareFile Share, store, sync, and secure data on any device, anywhere

DOWNLOAD OR READ : OFFICE 365 SECURITY AND TRUST STANDARD REQUIREMENTS PDF EBOOK EPUB MOBI

XenApp, XenDesktop and XenMobile Integration

Speaker Introduction Who Mate Barany, VMware Manuel Mazzolin, VMware Peter Schmitt, Deutsche Bahn Systel Why VMworld 2017 Understanding the modern sec

Secure File Sharing and Real-Time Mobile Access to Business Data with Citrix ShareFile

Video Conferencing & Skype for Business: Your Need-to-Know Guide

Secure Access for Microsoft Office 365 & SaaS Applications

Six steps to control the uncontrollable

Datasheet. Only Workspaces delivers the features users want and the control that IT needs.

The Economics of Office YTD Net Promoter Score. Microsoft Office365 10/20/2017. Paul Hoffman, CPA, CITP, CGMA CEO/President of SouthTech

How to Access Protected Health Information from Anywhere and Stay Compliant

BlackBerry Enterprise Identity

THE SECURITY LEADER S GUIDE TO SSO

SOLUTION BRIEF RSA SECURID SUITE ACCELERATE BUSINESS WHILE MANAGING IDENTITY RISK

A Practical Step-by-Step Guide to Managing Cloud Access in your Organization

Details on Integration Features

hidglobal.com HID ActivOne USER FRIENDLY STRONG AUTHENTICATION

Office 365 Adoption eguide

Microsoft IT deploys Work Folders as an enterprise client data management solution

Why is Office 365 the right choice?

Exchange 2007 End of Service: Modernize with Office 365. Todd Sweetser Technical Solutions Professional

Related Labs: Introduction to Universal Access and F5 SAML IDP (Self-paced)

Storage Made Easy. SoftLayer

WHITE PAPER AUTHENTICATION YOUR WAY SECURING ACCESS IN A CHANGING WORLD

Welcome to your Citrix User Adoption Kit

Google Identity Services for work

Single Sign-On. Introduction

Quick Heal Mobile Device Management. Available on

905M 67% of the people who use a smartphone for work and 70% of people who use a tablet for work are choosing the devices themselves

Make security part of your client systems refresh

Five Reasons It s Time For Secure Single Sign-On

THE NEW COLLABORATIVE WORKFORCE. Enterprise Communications, Advanced.

Next Generation Authentication

Define Your Office 365 External Sharing Strategy

HOW A CLOUD COMMUNICATIONS SYSTEM UNIQUELY SUPPORTS YOUR MOBILE WORKFORCE

Enhancing and Extending Microsoft SharePoint 2013 for Secure Mobile Access and Management

Android Enterprise Device Management with ZENworks 2017 Update 2

Centrify for Dropbox Deployment Guide

The Challenge. The Solution. The Modern Approach to Remote Access

Price list for Microsoft Office 365 from Swisscom. Valid from 1 may, 2016

MigrationWiz Security Overview

Streamline IT with Secure Remote Connection and Password Management

Augmenting security and management of. Office 365 with Citrix XenMobile

Enterprise-ready Unified communications platform

The security challenge in a mobile world

ENABLING AND MANAGING OFFICE 365

Storage Made Easy. Mirantis

Office 365: What to Expect When Moving to the Cloud

Unpacking Office 365 A high level overview of the apps and services bundled in the standard Office 365 subscription: What is it Use cases FAQ

Providing an Enterprise File Share and Sync Solution for

Office 365: Fact Sheet

Optimizing Pulse Secure Access Suite with Pulse Secure Virtual Application Delivery Controller solution

Top. Reasons Legal Teams Select kiteworks by Accellion

How to Enable and Secure in the Next Stage of BYOD: Reap the Benefits of Bring Your Own Laptop

White Paper Taking Windows Mobile on Any Device Taking Windows Mobile on Any Device

FIVE REASONS IT S TIME FOR FEDERATED SINGLE SIGN-ON

INCREASE APPLICATION SECURITY FOR PCI DSS VERSION 3.1 SUCCESS AKAMAI SOLUTIONS BRIEF INCREASE APPLICATION SECURITY FOR PCI DSS VERSION 3.

How to buy or cancel the XenDesktop Essentials Service

Simplify Application Access with Azure Active Directory

Desktop Virtualization Endpoint Solutions for SMB. Erik Willey The VDI Endpoint Authority

G Suite: Enabling the connected workspace with a cloud communications system. Google

Enabling and Managing Office 365

Details on Integration Features

Welcome to your Citrix Endpoint Management (formerly XenMobile) User Adoption Kit

Enterprise Guest Access

Microsoft 365 Business FAQs

IBM Security Access Manager

REVISED 6 NOVEMBER 2018 COMPONENT DESIGN: VMWARE IDENTITY MANAGER ARCHITECTURE

Hosted Exchange 2013

Exam Name: PASCERSE - Cisco SaaS Conferencing and EIM Resale ATP for the SE Exam

Deploying VMware Workspace ONE Intelligent Hub. October 2018 VMware Workspace ONE

Go mobile. Stay in control.

Best Practices in Securing a Multicloud World

Cirius Secure Messaging Single Sign-On

SECURING AWS ACCESS WITH MODERN IDENTITY SOLUTIONS

Citrix XenMobile and Windows 10

Mohit Saxena Senior Technical Lead Microsoft Corporation

Mobile device management at Microsoft

Get your business Skype d up. Lessons learned from Skype for Business adoption

Securing Amazon Web Services (AWS) EC2 Instances with Dome9. A Whitepaper by Dome9 Security, Ltd.

THE AVENTIS GUIDE TO OFFICE 365

CASE STUDY GLOBAL CONSUMER GOODS MANUFACTURER ACHIEVES SIGNIFICANT SAVINGS AND FLEXIBILITY THE CUSTOMER THE CHALLENGE

BlackBerry 2FA. Datasheet. BlackBerry 2FA

Microsoft Office 365: Tips to Save You Time and Improve Productivity

A Guide To Evaluating Desktop Virtualization Solutions

Transcription:

Citrix and Microsoft 365: Maximize your move to Microsoft in the cloud 3 reasons to manage Office 365 with Citrix Workspace Pg. 2 Pg. 4 Citrix.com e-book Maximize your Citrix Workspace 1

Content Introduction...3 Partnership...4 Faster migration and easier management...5 Improved security...8 Increased workforce productivity... 15 Get more with Citrix Workspace... 18 Back Pg. to 2 contents Pg. 4 Citrix.com 2

Introduction If you re facing challenges making the move to Microsoft Office 365, you re not alone. Although 90% of enterprises own licenses 1, organizations across industries are finding that the deployment of cloud apps tests even the most adept IT teams. Not to mention the hours of productivity it consumes. To ease the strain on your IT resources, we ve created a way for you to simplify the process. Energy 7.3% 13.6% 13.6% 5.8% 0.3% Financial Services 2.5% 39.3% 39.3% 17.3% 0.6% Food Products 2.1% 2.5% 2.5% 25.8% 0.3% Office 365 Usage, by Industry 2 Healthcare Manufacturing 2.0% 12.9% 4.2% 26.6% 4.2% 26.6% 14.2% 3.7% 0.1% 1.4% Percentage of users within industry who actively use application Media and Entertainment Real Estate Technology 12.5% 6.6% 10.3% 4.6% 10.6% 18.2% 4.6% 10.6% 18.2% 1.4% 4.7% 15.5% 1.3% 0.2% 0.4% Pg. 2 Pg. 4 Exchange Online OneDrive for Business SharePoint Online Skype for Business Online Yammer Citrix.com e-book Maximize your Citrix Workspace 3

Our Partnership Through a more than 20-year partnership, Citrix and Microsoft have created a unique solution to enable businesses worldwide to support migration, improve security, and increase user productivity. This collaboration helps maximize the value of Office 365 for our customers, who can use Citrix Workspace to deliver: Faster migration and easier management Improved security Increased workforce productivity Pg. 3 Pg. 5 Citrix.com e-book Maximize your Citrix Workspace 4

Faster migration and easier management Managing multiple device types in multiple locations is a challenge for IT teams and all the more so when you roll out new software across the organization. Manually configuring programs across each device is a time-consuming process that distracts IT from higher-value work. Pg. 4 Pg. 6 Citrix.com e-book Maximize your Citrix Workspace 5

Streamlined rollouts and simpler maintenance When moving to the cloud, you want to ensure an easy user experience for everyone in your organization including on-premises employees, remote workers, and contractors. Citrix accelerates this process, including launching federated identity for people working outside the office, by simplifying SSO setup and reducing the need for additional components. Every user can access the same cloud services wherever they re working, with a great experience no matter what device and network they use. Microsoft will be releasing two updates to Office 365 each year a completely different approach from traditional Office installations. Imagine trying to keep up with this rapid release cycle using manual, device-by-device configuration across your entire company. And if you fall out of support, your entire system can be at risk. Two Office update channels take your pick: 1 2 Citrix Workspace allows you to centrally manage these updates so your IT team s time isn t consumed with patch management. The solution also lets you test your system s interoperability with Office apps to ensure usability before you go live. Current channel: Immediately provides monthly updates to present new features to your team when available Deferred channel: Releases new features every four months Pg. 5 Pg. 7 Citrix.com e-book Maximize your Citrix Workspace 6

Better network reliability Applications that run in the cloud work best with continuous connectivity. This can be hard to deliver across dispersed teams, as latencies vary by location, device, and even by the day. To keep business-critical apps up and running with a great user experience, Citrix Networking technology creates a map of the network topology, then uses it to direct Citrix Workspace traffic through the best available routes. Pg. 6 Pg. 8 Citrix.com e-book Maximize your Citrix Workspace 7

Improved security Business-critical applications are often a weak point in an organization s security posture especially when they re cloud-based, mobile, or both. With Citrix Workspace, you can deliver Office 365 securely and protect your information no matter who on your team has access or where they use it. Pg. 7 Pg. 9 Citrix.com e-book Maximize your Citrix Workspace 8

Securely access Office 365 anywhere Bring-your-own-device (BYOD) and remote-working policies can put business data in jeopardy. If a device goes missing, so does any information it contains. You need a way to allow the flexibility employees need to be productive without putting your company at risk. 79% of surveyed security professionals say securing mobile devices is growing more difficult. 3 94% expect the frequency of mobile attacks to increase. 4 Pg. 8 Pg. 10 Citrix.com e-book Maximize your Citrix Workspace 9

Citrix Workspace unified endpoint management (UEM) helps you securely deliver applications such as Office 365 to every device people use corporate or personal, desktop or mobile. Seamless integration with your enterprise directory simplifies authentication and user provisioning. Pg. 9 Pg. 11 Citrix.com e-book Maximize your Citrix Workspace 10

Security control is in your hands: Configure contextual access according to your own security policies. Allow or prevent access to Office 365 and other company delivered apps. Limit access to the network based on person, device, or location. Control who saves, copies, or downloads files. Make access dependent on the presence of an anti-virus program. Add extra security checks, such as an additional token login, depending on where users are accessing the network. What s more, Citrix can secure user data in your data center and on any device people use even if it s lost or stolen. Pg. 10 Pg. 12 Citrix.com e-book Maximize your Citrix Workspace 11

Multi-factor authentication improves access security A single compromised password can put your whole business at risk. Even the longest, most obscure password can fail if it s written down or stored on the device itself. And focusing narrowly on password strength puts a real burden on employees and your helpdesk. With Citrix Workspace, security admins can ask for additional credentials beyond the password for multi-factor authentication. Authenticated employees get single sign-on (SSO) access to all their apps so there s just one password to remember. IT gets stronger, more reliable protection even in the event of a compromised password. Common password habits 5 49% write them down on paper 89% memorize passwords 24% 12% save them in a note on a computer or mobile device use a password management program * * * * * * * * * * 3% use other methods Pg. 11 Pg. 13 Citrix.com e-book Maximize your Citrix Workspace 12

Contextual access control policies Even with strong passwords and authentication measures in place, an employee can infect your whole network if their device is out of security compliance. The risk is even greater when you bring BYOD into the picture. Citrix Workspace takes into consideration the user s location, the status of their device, and other factors before granting access to Office 365. Expanded data security Citrix Workspace also enhances the security of Office 365 apps themselves, where most corporate data is housed. Sensitive cloud data on Office 365 2.4% Microsoft Outlook (MSG, PST) 10.1% Microsoft PowerPoint 29.2% Microsoft Excel 16.7% Microsoft Word 58.4% of sensitive data stored in the cloud is stored in office documents 6 22.8% Other Pg. 12 Pg. 14 18.8% Adobe PDF Citrix.com e-book Maximize your Citrix Workspace 13

When you use Citrix Workspace together with Microsoft OneDrive, you can see who has access to your data, where it is, and who s sharing it. The solution s advanced security features for file sharing also include: Citrix Workspace makes it simple to track and log employee activity in real time. You can also create custom reports and perform audits to meet your corporate data policies and compliance requirements. Authentication and authorization Access control and secure collaboration Device security Remote wipe Device lock **** ** Passcode protection White/black listing Data expiration policies Pg. 13 Pg. 15 Citrix.com e-book Maximize your Citrix Workspace 14

Increased workforce productivity No matter how secure and simple to manage a solution may be, it can only drive value if it s adopted by employees. That s why a simple, streamlined user experience is crucial. Citrix Workspace provides easy access to Microsoft Office 365 apps and the data that goes with them. Pg. 14 Pg. 16 Citrix.com ebook Maximize your Citrix Workspace 15

Unifying the user experience Citrix Workspace lets you deliver Office 365 and any other app (mobile, virtual, SaaS, web) to a unified workspace through a unified app store. One-URL, SSO access to all their apps gives people a fast and simple way to get to work. Simplifying data access Employees, contractors, and partners have a single, simple way to access their data no matter where it lives or which version of Office was used to create it. Citrix Workspace also helps prevent formatting and equation problems across multiple Office apps. Pairing OneDrive and Citrix Workspace Together, Citrix Workspace and OneDrive make it simple for employees to share files with remote employees, temporary contractors, and clients outside your Active Directory. People can share files securely with anyone on any device, and sync files more efficiently across virtual and physical desktops. Users can also access files in Office 365, Azure, and Microsoft SharePoint from a single view. Built for collaboration, Citrix Workspace lets people co-author and edit files, track feedback, and get approvals in real time. You can even request electronic signatures for contracts and other important documents. More than 20 million business users at 80,000 organizations use Citrix Workspace for secure collaboration with customers and partners. Pg. 15 Pg. 17 Citrix.com e-book Maximize your Citrix Workspace 16

Delivering superior video Replacing a traditional PBX with Skype for Business can help you save time and money, but it can be hard to deliver consistent service in a virtualized environment. Citrix and Microsoft help you take full advantage of the security and availability of virtualization without sacrificing user experience. People get reliable, high-def video and audio for calls, messaging, and online meetings on any device even in settings with latency and bandwidth limitations. Real-time network optimization intelligently routes traffic across public clouds, data centers, CDNs, and ISPs for the best connection every time. Skype for Business on Citrix VDI it s the ONLY way to use Skype and VDI together. Brad Anderson Corporate Vice President Microsoft Pg. 16 Pg. 18 Citrix.com e-book Maximize your Citrix Workspace 17

To get more out of Office 365 with Citrix Workspace, visit now.citrix.com/o365. Sources: 1 Microsoft Cloud Strength Highlights Second Quarter Results, 2017, Microsoft. 2 Office 365 Adoption & Risk Report, 2016, Skyhigh Network. 3 Ibid. 4 Ibid. 5 Password Management and Mobile Security, 2017, Pew Research Center. 6 Office 365 Adoption & Risk Report, 2016, Skyhigh Network. 2018 Pg. Citrix 2 Systems, Pg. 4 Inc. All rights reserved. Citrix, the Citrix logo, and other marks appearing herein are property of Citrix Systems, Inc. and/or one or more of its subsidiaries, and may be registered with the U.S. Patent and Trademark Office and in other countries. All other marks are the property of their respective owner(s).