One issue that comes quite often with customers when it comes to the Citrix solution for mobility of business, receiver and CloudGateway! , Is how our solution supports "device wipe" and the feature "kill device". This interest in wiping technologies even the attention of Bloomberg News in a recent article Why Covet companies' Kill Switches . Specifically, many companies are concerned that the trend of BYOD in their organizations, how can they ensure that company information is always safe and does not leave the organization with a loss of the device or a departing employee.
There is a big question and we know many organizations are trying to determine the best way to handle this. I think it is first important to understand the magnitude of the problem ... and yes, it is great! According to Forrester Research, by 2016, 350 million employees will use smartphones - 0 million will bring their own. And that's just smartphones, and does not take into account the PC and tablets employees bring inside the four walls of their organization. That's a large number of devices and personal organizations must quickly determine their strategy to allow these devices.
In thinking about the problem, Citrix really tried to determine the objectives of these organizations when they implement BYOD. What we have determined by talking with customers and analysts is that these organizations seek to support BYOD, but realize that managing all these devices would be a nightmare. As with PCs, IT wants out of the user device management business because it is very expensive. Instead, they want to allow users to be productive on the device of their choice, while maintaining control and security across the enterprise content (applications and data) that users receive. This is our vision. Business users must have the ability to access all of their Windows companies, web, SaaS and mobile applications and their data from any device while at the same time, it should have full control of this content -. and nothing more
Citrix Receiver allows users, secure self-service access through a corporate application store (Citrix CloudGateway) to all their desktops, applications and data. This content follows users as they move between devices, in what I call the "Follow Enterprise -me." If an employee leaves the organization or a device is lost or stolen, full control of all enterprise content like everything was delivered via Citrix Receiver. iT can now remotely wipe all users of applications and business data to ensure that data does not get into bad hands while leaving the data intact personal users and applications. This is extremely important for reasons of disrupting users on their wiping devices. in many countries it is illegal and privacy laws to make these breaks . wiping action on a personal device Citrix brings the best of both worlds. - Full control over the content of the company, no access to personal information
I think Brian Katz, who as head of mobile engineering at Sanofi and helped select technologies that French drugmaker used to secure employees of the units, better said in comments to Bloomberg News on the protection of mobile devices: "Proceed with caution. Look for flexibility, look for ways to help and give your users, [and] do the work while protecting your assets. It is not always on the control of the device. "
So to summarize my lengthy answer, yes, it is absolutely possible to deliver secure enterprise mobility to all users without having to completely kill / wipe the device, even not on devices owned by the company - make sure you have complete control over the contents of the business (and nothing more), the ability to provision and de-provision the contents and wipe your hands of ☺ concern
.
0 Komentar