Digital Workspace SHOWDOWN

Similar documents
How your network can take on the cloud and win. Think beyond traditional networking toward a secure digital perimeter

Design and deliver cloud-based apps and data for flexible, on-demand IT

Maximize your investment in Microsoft Office 365 with Citrix Workspace

Maximize your move to Microsoft in the cloud

Crash course in Azure Active Directory

Citrix Education Learning Journey

Optimizing your network for the cloud-first world

VMware AirWatch Workspace ONE Send Admin Guide Configuring and deploying Workspace ONE Send

DEFINING SECURITY FOR TODAY S CLOUD ENVIRONMENTS. Security Without Compromise

Speaker Introduction Who Mate Barany, VMware Manuel Mazzolin, VMware Peter Schmitt, Deutsche Bahn Systel Why VMworld 2017 Understanding the modern sec

Datasheet. Only Workspaces delivers the features users want and the control that IT needs.

VMWARE HORIZON 7. End-User Computing Today. Horizon 7: Delivering Desktops and Applications as a Service

XenApp, XenDesktop and XenMobile Integration

Cisco Start. IT solutions designed to propel your business

CONFIDENTLY INTEGRATE VMWARE CLOUD ON AWS WITH INTELLIGENT OPERATIONS

AKAMAI CLOUD SECURITY SOLUTIONS

Best Practices in Securing a Multicloud World

Citrix Education Learning Journey

Supercharge your virtual app and desktop user experience

Securing Your Microsoft Azure Virtual Networks

The ADC Guide to Managing Hybrid (IT and DevOps) Application Delivery. Citrix.com ebook Align Cloud Strategy to Business Goals 1

SYMANTEC DATA CENTER SECURITY

White Paper Taking Windows Mobile on Any Device Taking Windows Mobile on Any Device

Securing Your Amazon Web Services Virtual Networks

REVISED 6 NOVEMBER 2018 COMPONENT DESIGN: VMWARE IDENTITY MANAGER ARCHITECTURE

3 Ways Businesses Use Network Virtualization. A Faster Path to Improved Security, Automated IT, and App Continuity

How to Leverage Containers to Bolster Security and Performance While Moving to Google Cloud

How to Secure Your Cloud with...a Cloud?

The Essential Guide to Preparing Your Network for the Cloud. How to meet your network requirements at every step of your cloud transformation.

Citrix Workspace Cloud

A comprehensive security solution for enhanced mobility and productivity

REDUCE TCO AND IMPROVE BUSINESS AND OPERATIONAL EFFICIENCY

WORKPLACE Data Leak Prevention: Keeping your sensitive out of the public domain. Frans Oudendorp Ronny de Jong

How SD-WAN will Transform the Network. And lead to innovative, profitable business outcomes

McAfee Complete Endpoint Threat Protection Advanced threat protection for sophisticated attacks

RHM Presentation. Maas 360 Mobile device management

MaaS360 Secure Productivity Suite

Deliver Office 365 Without Compromise Ensure successful deployment and ongoing manageability of Office 365 and other SaaS apps

Optimizing Pulse Secure Access Suite with Pulse Secure Virtual Application Delivery Controller solution

Convergence is accelerating the path to the New Style of Business

WHITE PAPER AIRWATCH SUPPORT FOR OFFICE 365

Unified Endpoint Management: Security and productivity for the digital workspace

Service Description VMware Workspace ONE

SECURE, FLEXIBLE ON-PREMISE STORAGE WITH EMC SYNCPLICITY AND EMC ISILON

Mitel MiCollab. Keeping people connected and productive anytime, anywhere, on any device

Cisco Cloud Application Centric Infrastructure

Safeguard Application Uptime and Consistent Performance

Nutanix InstantON for Citrix Cloud

Borderless security engineered for your elastic hybrid cloud. Kaspersky Hybrid Cloud Security. #truecybersecurity

DIGITAL TRANSFORMATION IN FEDERAL GOVERNMENT. Securely Modernize and Mobilize Government IT to Advance Missions

Cisco Integration Platform

How Security Policy Orchestration Extends to Hybrid Cloud Platforms

Go mobile. Stay in control.

The Three Data Challenges

REVISED 4 JANUARY 2018 VMWARE WORKSPACE ONE REFERENCE ARCHITECTURE FOR SAAS DEPLOYMENTS

SOLUTION BRIEF RSA NETWITNESS EVOLVED SIEM

A Guide to Closing All Potential VDI Security Gaps

How can we gain the insights and control we need to optimize the performance of applications running on our network?

BULLETPROOF365 SECURING YOUR IT. Bulletproof365.com

Veritas Backup Exec. Powerful, flexible and reliable data protection designed for cloud-ready organizations. Key Features and Benefits OVERVIEW

Deliver Office 365 Without Compromise

905M 67% of the people who use a smartphone for work and 70% of people who use a tablet for work are choosing the devices themselves

Microsoft 365 Security & Compliance For Small- and Mid-Sized Businesses

Hybrid Cloud Management: Transforming hybrid cloud delivery

How to Enable and Secure in the Next Stage of BYOD: Reap the Benefits of Bring Your Own Laptop

Citrix SD-WAN for Optimal Office 365 Connectivity and Performance

BULLETPROOF365 SECURING YOUR IT. Bulletproof365.com

Why is Office 365 the right choice?

CloudSOC and Security.cloud for Microsoft Office 365

BUILDING A PATH TO MODERN DATACENTER OPERATIONS. Virtualize faster with Red Hat Virtualization Suite

MODERNIZE INFRASTRUCTURE

WHITE PAPER AUTHENTICATION YOUR WAY SECURING ACCESS IN A CHANGING WORLD

TREND MICRO SMART PROTECTION SUITES

ARCHITECTURAL OVERVIEW REVISED 6 NOVEMBER 2018

Securing the Software-Defined Data Center

Mitel MiCollab. Keeping People Connected and Productive Anytime, Anywhere, on Any Device

HYPER-CONVERGED INFRASTRUCTURE 101: HOW TO GET STARTED. Move Your Business Forward with a Software-Defined Approach

The Impact of Hyper- converged Infrastructure on the IT Landscape

IDENTITY: A KEY ELEMENT OF BUSINESS-DRIVEN SECURITY

MD-101: Modern Desktop Administrator Part 2

Challenges and. Opportunities. MSPs are Facing in Security

Building a Smart Segmentation Strategy

HOW A CLOUD COMMUNICATIONS SYSTEM UNIQUELY SUPPORTS YOUR MOBILE WORKFORCE

Whitepaper. Endpoint Strategy: Debunking Myths about Isolation

The Software-Defined Enterprise

Microsoft 365. A complete, intelligent, secure solution to empower employees. Integrated for simplicity. Built for teamwork. Unlocks creativity

World s Most Secure Government IT Solution

Data safety for digital business. Veritas Backup Exec WHITE PAPER. One solution for hybrid, physical, and virtual environments.

Make security part of your client systems refresh

BUILDING SECURITY INTO YOUR DATA CENTER MODERNIZATION STRATEGY

Connectivity to Cloud-First Applications

Hyper-Converged Infrastructure: Providing New Opportunities for Improved Availability

HP Device as a Service (DaaS)

Acronis Hybrid Cloud Architecture Unified Centralized Data Protection Web-based User Interface Deployed On-premises or in the Cloud.

Cisco Collaborative Knowledge

I D C T E C H N O L O G Y S P O T L I G H T

Office 365 Business The Microsoft Office you know, powered by the cloud.

Transforming Security Part 2: From the Device to the Data Center

Build application-centric data centers to meet modern business user needs

Achieving Digital Transformation: FOUR MUST-HAVES FOR A MODERN VIRTUALIZATION PLATFORM WHITE PAPER

Transcription:

Digital Workspace SHOWDOWN Why Citrix Workspace is a better choice than VMware Workspace ONE

Take a closer look at the dozen ways that Citrix Workspace outperforms VMware Workspace ONE. Today s workers expect the same flexibility and freedom in their working lives that mobile and cloud technologies have brought to their personal lives. That, in a nutshell, is likely the primary reason why you re looking into implementing a digital workspace solution. Digital workspaces make work possible no matter where your workers are located, or what devices or applications they use. If it was simple, then VMware Workspace ONE could handle it. The fact is implementing digital workspaces has ramifications that ripple throughout the organization. Can your chosen solution really give workers the seamless experiences they expect? Does it give you the choices and flexibility you need to confidently and seamlessly complete your march to digital transformation? Can you be sure that the workspaces and the secrets in your data center stay safe when workers might use SaaS applications, visit insecure websites, or engage in risky behaviors? To handle all of the above, only Citrix Workspace will do. In fact there are 12 distinct differences. Here, we lay them out in stark detail. Read on and ask yourself which is the better choice for your organization. 2 Digital Workspace Showdown

User Experience and Productivity Workers expect seamless experiences while using the devices and applications they are familiar with. And they expect their technology to perform, regardless of network conditions. They might not know they re on a bandwidth-constrained connection, nor do they care. They just want things to work. Meanwhile, you need to deliver these great user experiences in a way that supports business needs and improves productivity. That means providing flexibility for workers to access corporate resources and collaborate, while you manage the infrastructure in an agile way that allows you to scale quickly and cost-effectively. Greater User Productivity Compared to Workspace ONE, Citrix Workspace speeds and streamlines common tasks, including opening email attachments, accessing files from different repositories, opening and loading applications, and transitioning between different devices. 3 Digital Workspace Showdown

User Experience and Productivity Citrix Workspace VMware Workspace ONE 1 Simplicity and Consistency of Experience Apps, files, and multiplatform desktops integrate in a unified, context-aware user front end that is accessible from all devices. Users freely switch between devices as they work. With no support for Linux applications and files, users have to use multiple tools to access their files and do their work. 2 Performance Across Constrained Networks SD-WAN technology delivers the optimum application-specific path across available networks. The Citrix HDX protocol preserves the user experience under poor conditions, even for applications like Skype. Users see their productivity negatively impacted while waiting for files to load or the screen content to fully render, and suffer from poor text and image quality. 3 Integration with Microsoft Office Mobile users can open Office files attached to Citrix Secure Mail and cut, copy, and paste into other mobile apps. Citrix file sync and sharing technology integrates with Microsoft Teams. Mobile users need multiple steps to open Office files attached to their VMware Boxer email and copy/paste content. VMware s Content Locker for file syncing and sharing does not integrate with Microsoft Teams. 4 File Synchronization /Content Collaboration Users collaborate simply and more efficiently, regardless of location, device, or whether sharing documents with coworkers or external parties. Power users create custom workflows via a drag-and-drop wizard. Collaboration is limited to syncing files back and forth with no live editing. No support for workflows weakens security, and development resources are required to replicate paper forms. 4 Digital Workspace Showdown

Cloud Transformation and Management The more choices you have, the more confidence you can have that you will be able to complete your cloud transformation successfully. That means flexibility to adopt any combination of on-premises, public, and private cloud delivery models. You can support whatever mobile devices your users prefer, allow them to work in more places, provide more locations for them to store and access their work files, and enable them to collaborate seamlessly with colleagues. But choices can t come at the cost of control. You need to be able to manage users, devices, data, workloads, and networks centrally, so you ll modernize while maximizing your existing investments. Superior IT Flexibility Compared to Workspace ONE, Citrix Workspace offers more choices for IT while streamlining management, which makes it easier to smoothly transition and accomplish digital transformation without disrupting the business. 5 Digital Workspace Showdown

Cloud Transformation and Management Citrix Workspace VMware Workspace ONE 5 Unified Management Digital workspaces may be deployed on premises or on public, private, or hybrid clouds all managed through a single pane of glass. All components of Workspace ONE each have a separate management console, decreasing efficiency and making troubleshooting more complex. 6 VDI Platform Support A virtual desktop infrastructure can be hosted on any hypervisor or physical platform; choosing the most cost-effective platform reduces operational cost. VMware supports limited virtualization platforms, with inconsistent features and capabilities. Limited flexibility prevents companies from transforming the business quickly or efficiently. 7 Device Support /Application Protection Support for any device OS and choice of containerization and mobile device management platforms maximize flexibility for protecting applications. A unique mvpn and bridgeless integration with Microsoft EMS/ Intune and Office 365 deliver the best experience with high security. Security concerns limit end users options for devices and applications. Lack of mvpn and no bridgeless integration with Intune MAM mean greater risk for organizations with mobile Office 365 users. 8 User File Access Unique content collaboration allows users to store and access their files stored behind the firewall or on public/ private clouds such as Microsoft SharePoint or OneDrive. Citrix content collaboration allows users to share, edit, and sync files. Fewer connectors for different types of file storage limit user flexibility and may tempt them to go around security policies. Users are unable to collaborate. 6 Digital Workspace Showdown

Security and Compliance Your security teams need to protect corporate data assets while devices connect from anywhere, including over public networks. The security concerns are partially addressed by use of virtual desktops, which keep the applications and data in the data center. But only partially. Workers still need to access SaaS applications, they could visit insecure websites, and the security model must account for risky behaviors such as copying sensitive files onto removable drives or opening phishing emails. These can expose your business to potential data breaches or other compliance risks. The old approach of securing the perimeter has given way to the need to ensure end-toend security to the ends of the earth, if need be. That means protecting apps and data and controlling user access while supporting a growing number of devices and services. More Security Controls Compared to Workspace ONE, Citrix Workspace implements more security controls for common threats, including malware, denial of service, phishing attacks, and user error. 7 Digital Workspace Showdown

Security and Compliance Citrix Workspace VMware Workspace ONE 9 End-to-End Security The Citrix Secure Digital Perimeter framework enables comprehensive, integrated workspace security. This includes network security and identity management / access control with single sign-on and multifactor authentication to protect both endpoints and data in the data center. No integrated network security or strong controls in particular, secure browsing or secure access controls are available to protect SaaS applications. 10 Cloud Application Security Security teams can block access to unsanctioned SaaS apps and the Internet and protect sensitive data from actions such as copy/paste or download. A hardened browser protects against malware, data loss, and end user behavior while the web filter controls website access. Limited cloud application security means that security-conscious organizations need to adopt thirdparty solutions, increasing cost and complexity. With no copy/paste restrictions or watermarking, sensitive data can be exfiltrated from SaaS apps. 11 User Behavior Analytics Citrix Analytics uniquely aggregates and correlates user interaction with applications, devices, networks, and data to proactively identify and manage internal and external threats. Limited analytics primarily focus on security of devices enrolled to AirWatch and self-developed mobile applications. 12 Security Model Support for a risk-based security model using scoring dynamically balances the needs of users to have rapid access to data against IT s need to secure and govern the environment. Rather than machine learning and scoring, administrators must define static thresholds, which are inflexible and error-prone. 8 Digital Workspace Showdown

Citrix is reimagining the future of work, unlocking creativity, productivity, and innovation to make the extraordinary possible. From healthcare to financial services to the manufacturing floor, people have real-time intelligence and are connected in ways that allow them to work faster and smarter to deliver greater outcomes for the business and customers alike. To learn more, visit http://citrix.com/workspace. 2018 Citrix Systems, Inc. All rights reserved. Citrix, the Citrix logo, and other marks appearing herein are property of Citrix Systems, Inc. and/or one or more of its subsidiaries, and may be registered with the U.S. Patent and Trademark Office and in other countries. All other marks are the property of their respective owner(s).