Who Is

watching out for you?

In today's world you need to understand a few more things...

Who Is

knocking on your virtual front door?

It could be someone down the block or from the Bloc

Securing a better user experience

image of Phillip Redman - Citrix

21-Oct-2014 - Nobody wants crime scene photos next to their child’s birthday party photos.

If you asked security years ago people would tell you they put up perimeters, end user computing systems, firewalls, and they had it under control.

Today there is complexity, fragmentation, and the challenges of securing multiple browsers.

Most people use three devices – smart phone, tablets, and desktop – for different uses.

There are companies that are fragmented in the mobile software they use, including consumer grade and enterprise grade mobile solutions.

“Companies need to balance what they’re doing with IT and give a better experience, without locking everything down,” said Phil Redman, VP of Mobile Solutions & Strategy at Citrix. “Conflicting passwords for example – 20-character passwords don’t work on an iPhone. Giving the best user experience while protecting everything requires a balance.”

Different polices and security levels, based on location, content, and user get closer towards providing better user experiences, and don’t require everything be locked down.

“If you have an integrated platform across desktop, laptop and phone, with single sign on for instance, then once you sign in, you don’t have to re-sign in all the time,” he said. “We also have security templates so IT admins can distribute policies to groups based on mobility, devices, etc. Creating one policy and distributing it to multiple platforms – Windows, Linux, Android – ought to be easy.”

Citrix developed WorxWeb, a secure browser integrated without email. When you click on a link in an email message it will only open a secure browser.

“And since you’ve already signed in to your email, you’re authenticated automatically,” Redman said. “So you’re secure without inputting your password. The micro VPN allows only the enterprise application data to run. A user can still run Facebook or Safari and not worry about that traffic running through your system. That gives the user privacy without burdening the enterprise network. “

Containerization controls moving data via copy and paste. If you copy something you can only paste it into an application approved by admins.

If you wanted to create your own secure note for example, when you paste the secured encrypted data into your note, you can add different users with whom you want to share that data.

“If I want to share meeting notes with my team, I add in the notes, and it’s synchronized so the team can access it, as it synchronizes without me sending it via email… plus it’s editable and collaborative,” said Redman. “Voice memos can also go there too. They’re synchronized right back and shared with other team members.”

If you take a photo, it doesn’t go into the iPhone photo app. Instead it goes into a secured separate area.

For example detectives take crime scene photos that go right into their personal phones. Nobody wants crime scene photos next to their child’s birthday party photos. Now they’re secure – they can’t be put into Dropbox for instance, or saved elsewhere.
“We created the app and didn’t realize these uses,” Redman said. “Customers are creating different ways to use them that we didn’t think of. That means to me there is more demand for more secure processes in consumer apps found on a phone. Although they’ve been intermediary, companies are seeking better ways of managing secure data.”