Who Is

watching out for you?

In today's world you need to understand a few more things...

Who Is

knocking on your virtual front door?

It could be someone down the block or from the Bloc

How do I protect what’s of value and important to me?

Michael Murphy, Citrix

12-August-2015 Hint: It’s not about the endpoint device.

While users are embracing mobility, at the top of their minds are user experience and – given the threat landscape – concerns about privacy.

“I think we get wrapped around focusing on what is security, and we go right to the technologies, the problems, the challenges and the solutions to address the security landscape or marketplace,” said Michael Murphy, VP and GM at Citrix Canada. If you look at it, it’s as simple as protecting what’s of value to an individual – be it data, works of art, financial in nature, or identity. Now let’s assess the risks associated with the threats and vulnerabilities and value of the assets, and how to protect them.”

Lots of companies spend time and resources to protect or secure things of little value. The ideal is to manage risks associated with the threats of an asset, commensurate with the assets value.

Today it’s about the information contained in email, on servers, stored in the cloud… it’s really securing the experience of delivering the best user experience, managing the apps and data, and with little control over the device.

“How do I make sure the information people need access to, is also protected and secured… both for the individuals whose information it might be about, and the company?” Murphy asked. “My information is used to deliver servers to me, but it’s also safeguarded appropriately so it doesn’t fall into the wrong hands and used for something other than it was intended.”

When doing business with a retailer, there is information tied to your financial position, such as a credit card. The intention is for transactions. If instead that information is about your health, well-being, family, the question becomes, how do you deliver apps securely? How do you protect that information?

“From a Citrix perspective we’ve been in business a long time for desktop virtualization,” said Murphy. “Also the apps we deliver follow a policy, are secured, use containerization, virtualization, and afford companies to manage a secure, patched, updated experience on any device individuals may be working from.”

Two digital lives exist on most endpoint devices – the personal and corporate. They can coexist, yet there’s a point at which they should not intermingle.

•    Twitter and Facebook need to be distinct and separate from corporate data.

•    Should they run on the same device?
•    Absolutely.

•    Should they be able to run simultaneously?
•    Absolutely.

•    Should corporate HR info be shared with personal apps?
•    No way.

Centralized computer models are about consolidating assets and tools and technologies so the data is secured irrespective of the device. The compute environment is more easily managed and distributed. Then companies can enforce policies around security and privacy, while at the same time delivering user experience. Murphy refers to it as xYOD = choose your own device.

“IT departments struggle to maintain experience and people – most are asked to do more with less,” he said. “When they divert from trying to manage thousands of endpoints to managing a few data centers, they can spend more of the waking hours on things that are important, such as securing and managing access to the data. Virtualizing desktops and devices saves them time. It’s the experience, the apps and the data. The closer you can bring that, the better off companies will be to protect what’s important to them. They’ll be able to spend whatever budgets they have more appropriately on the things that are important.”

Because of what networks and cloud have promised, it’s almost impossible to secure the endpoint devices. Which is not important, because the endpoint is not the target.

“If it’s a thin client and the monitor dies, they can easily go replace that,” said Murphy. “If I drop my iPad today, as much as I’m sad that I’m out a thousand bucks, once replaced I’m back to where I was two minute before I dropped it. The device is unimportant.”