{"global":{"lastError":{},"locale":"en","locales":{"data":[{"id":"de","name":"Deutsch"},{"id":"en","name":"English"}],"loading":false,"error":false},"currency":{"id":49,"name":"EUR"},"currencies":{"data":[{"id":49,"name":"EUR"},{"id":124,"name":"RUB"},{"id":153,"name":"UAH"},{"id":155,"name":"USD"}],"loading":false,"error":false},"translations":{"implementations":{"categories":{"_type":"localeString","en":"Categories","ru":"Категории"},"more":{"en":"Learn more","ru":"Узнать больше","_type":"localeString"},"sort-title-asc":{"ru":"От А до Я","_type":"localeString","en":"From A to Z"},"sort-title-desc":{"ru":"от Я до А","_type":"localeString","en":"From Z to A"},"sort-rating-asc":{"_type":"localeString","en":"Rating ascending","ru":"По возрастанию рейтинга"},"sort-rating-desc":{"ru":"По убыванию рейтинга","_type":"localeString","en":"Rating descending"},"sort-discount-asc":{"en":"Rebate ascending","ru":"По возрастанию скидки","_type":"localeString"},"sort-discount-desc":{"_type":"localeString","en":"Rebate descending","ru":"По убыванию скидки"},"user":{"en":"User","ru":"Пользователь","_type":"localeString"},"vendor":{"ru":"Производитель","_type":"localeString","en":"Vendor"},"supplier":{"ru":"Поставщик","_type":"localeString","en":"Supplier"},"status":{"en":"Status","ru":"Статус","_type":"localeString"},"product":{"ru":"Продукт","_type":"localeString","en":"Product"},"no-results":{"_type":"localeString","en":"No results found. We didn't find any results with the filter you selected.","ru":"По вашему запросу ничего не найдено, попробуйте изменить запрос."},"with-reference":{"ru":"С референсом","_type":"localeString","en":"With reference"},"items-found":{"en":"Deployments found","ru":"Внедрений найдено","_type":"localeString"},"canceled":{"_type":"localeString","en":"Canceled","ru":"Отменено"},"deal-canceled":{"ru":"Сделка отменена","_type":"localeString","en":"Deal canceled"},"deal-closed":{"ru":"Сделка закрыта","_type":"localeString","en":"Deal closed"},"deal-in-progress":{"en":"Deal in progress","ru":"Сделка в процессе","_type":"localeString"},"deal-is-planned":{"ru":"Сделка планируется","_type":"localeString","en":"Deal is planned"},"finished":{"ru":"Завершено","_type":"localeString","en":"Finished"},"in-process":{"_type":"localeString","en":"In Process","ru":"Ведется"},"planned":{"en":"Planned","ru":"Планируется","_type":"localeString"},"proof-of-concept":{"en":"Proof of concept","ru":"Пилотный проект","_type":"localeString"},"stopped":{"ru":"Остановлено","_type":"localeString","en":"Stopped"},"date":{"ru":"Дата внедрения","_type":"localeString","en":"Deployment date"},"roi":{"en":"ROI","ru":"ROI","_type":"localeString"},"implementations-fetching-error":{"en":"An error has occurred. Please reload the page.","ru":"Произошла ошибка. Перезагрузите пожалуйста страницу.","_type":"localeString"}},"header":{"help":{"en":"Help","de":"Hilfe","ru":"Помощь","_type":"localeString"},"how":{"ru":"Как это работает","_type":"localeString","en":"How does it works","de":"Wie funktioniert es"},"login":{"en":"Log in","de":"Einloggen","ru":"Вход","_type":"localeString"},"logout":{"ru":"Выйти","_type":"localeString","en":"Sign out"},"faq":{"_type":"localeString","en":"FAQ","de":"FAQ","ru":"FAQ"},"references":{"en":"Requests","de":"References","ru":"Мои запросы","_type":"localeString"},"solutions":{"ru":"Возможности","_type":"localeString","en":"Solutions"},"find-it-product":{"ru":"Подбор и сравнение ИТ продукта","_type":"localeString","en":"Selection and comparison of IT product"},"autoconfigurator":{"en":" Price calculator","ru":"Калькулятор цены","_type":"localeString"},"comparison-matrix":{"ru":"Матрица сравнения","_type":"localeString","en":"Comparison Matrix"},"roi-calculators":{"en":"ROI calculators","ru":"ROI калькуляторы","_type":"localeString"},"b4r":{"_type":"localeString","en":"Bonus for reference","ru":"Бонус за референс"},"business-booster":{"_type":"localeString","en":"Business boosting","ru":"Развитие бизнеса"},"catalogs":{"en":"Catalogs","ru":"Каталоги","_type":"localeString"},"products":{"ru":"Продукты","_type":"localeString","en":"Products"},"implementations":{"_type":"localeString","en":"Deployments","ru":"Внедрения"},"companies":{"en":"Companies","ru":"Компании","_type":"localeString"},"categories":{"ru":"Категории","_type":"localeString","en":"Categories"},"for-suppliers":{"en":"For suppliers","ru":"Поставщикам","_type":"localeString"},"blog":{"ru":"Блог","_type":"localeString","en":"Blog"},"agreements":{"en":"Deals","ru":"Сделки","_type":"localeString"},"my-account":{"ru":"Мой кабинет","_type":"localeString","en":"My account"},"register":{"ru":"Зарегистрироваться","_type":"localeString","en":"Register"},"comparison-deletion":{"en":"Deletion","ru":"Удаление","_type":"localeString"},"comparison-confirm":{"_type":"localeString","en":"Are you sure you want to delete","ru":"Подтвердите удаление"},"search-placeholder":{"ru":"Введите поисковый запрос","_type":"localeString","en":"Enter your search term"},"my-profile":{"_type":"localeString","en":"My profile","ru":"Мои данные"},"about":{"_type":"localeString","en":"About Us"},"it_catalogs":{"en":"IT catalogs","_type":"localeString"},"roi4presenter":{"_type":"localeString","en":"Roi4Presenter"},"roi4webinar":{"_type":"localeString","en":"Pitch Avatar"},"sub_it_catalogs":{"en":"Find IT product","_type":"localeString"},"sub_b4reference":{"_type":"localeString","en":"Get reference from user"},"sub_roi4presenter":{"en":"Make online presentations","_type":"localeString"},"sub_roi4webinar":{"en":"Create an avatar for the event","_type":"localeString"},"catalogs_new":{"en":"Products","_type":"localeString"},"b4reference":{"_type":"localeString","en":"Bonus4Reference"},"it_our_it_catalogs":{"en":"Our IT Catalogs","_type":"localeString"},"it_products":{"_type":"localeString","en":"Find and compare IT products"},"it_implementations":{"_type":"localeString","en":"Learn implementation reviews"},"it_companies":{"en":"Find vendor and company-supplier","_type":"localeString"},"it_categories":{"en":"Explore IT products by category","_type":"localeString"},"it_our_products":{"_type":"localeString","en":"Our Products"},"it_it_catalogs":{"en":"IT catalogs","_type":"localeString"}},"footer":{"copyright":{"de":"Alle rechte vorbehalten","ru":"Все права защищены","_type":"localeString","en":"All rights reserved"},"company":{"de":"Über die Firma","ru":"О компании","_type":"localeString","en":"My Company"},"about":{"de":"Über uns","ru":"О нас","_type":"localeString","en":"About us"},"infocenter":{"_type":"localeString","en":"Infocenter","de":"Infocenter","ru":"Инфоцентр"},"tariffs":{"de":"Tarife","ru":"Тарифы","_type":"localeString","en":"Subscriptions"},"contact":{"ru":"Связаться с нами","_type":"localeString","en":"Contact us","de":"Kontaktiere uns"},"marketplace":{"_type":"localeString","en":"Marketplace","de":"Marketplace","ru":"Marketplace"},"products":{"ru":"Продукты","_type":"localeString","en":"Products","de":"Produkte"},"compare":{"de":"Wähle und vergleiche","ru":"Подобрать и сравнить","_type":"localeString","en":"Pick and compare"},"calculate":{"ru":"Расчитать стоимость","_type":"localeString","en":"Calculate the cost","de":"Kosten berechnen"},"get_bonus":{"en":"Bonus for reference","de":"Holen Sie sich einen Rabatt","ru":"Бонус за референс","_type":"localeString"},"salestools":{"en":"Salestools","de":"Salestools","ru":"Salestools","_type":"localeString"},"automatization":{"_type":"localeString","en":"Settlement Automation","de":"Abwicklungsautomatisierung","ru":"Автоматизация расчетов"},"roi_calcs":{"de":"ROI-Rechner","ru":"ROI калькуляторы","_type":"localeString","en":"ROI calculators"},"matrix":{"de":"Vergleichsmatrix","ru":"Матрица сравнения","_type":"localeString","en":"Comparison matrix"},"b4r":{"_type":"localeString","en":"Rebate 4 Reference","de":"Rebate 4 Reference","ru":"Rebate 4 Reference"},"our_social":{"ru":"Наши социальные сети","_type":"localeString","en":"Our social networks","de":"Unsere sozialen Netzwerke"},"subscribe":{"de":"Melden Sie sich für den Newsletter an","ru":"Подпишитесь на рассылку","_type":"localeString","en":"Subscribe to newsletter"},"subscribe_info":{"ru":"и узнавайте первыми об акциях, новых возможностях и свежих обзорах софта","_type":"localeString","en":"and be the first to know about promotions, new features and recent software reviews"},"policy":{"en":"Privacy Policy","ru":"Политика конфиденциальности","_type":"localeString"},"user_agreement":{"en":"Agreement","ru":"Пользовательское соглашение ","_type":"localeString"},"solutions":{"ru":"Возможности","_type":"localeString","en":"Solutions"},"find":{"en":"Selection and comparison of IT product","ru":"Подбор и сравнение ИТ продукта","_type":"localeString"},"quote":{"_type":"localeString","en":"Price calculator","ru":"Калькулятор цены"},"boosting":{"ru":"Развитие бизнеса","_type":"localeString","en":"Business boosting"},"4vendors":{"en":"4 vendors","ru":"поставщикам","_type":"localeString"},"blog":{"_type":"localeString","en":"blog","ru":"блог"},"pay4content":{"en":"we pay for content","ru":"платим за контент","_type":"localeString"},"categories":{"_type":"localeString","en":"categories","ru":"категории"},"showForm":{"_type":"localeString","en":"Show form","ru":"Показать форму"},"subscribe__title":{"ru":"Раз в месяц мы отправляем дайджест актуальных новостей ИТ мира!","_type":"localeString","en":"We send a digest of actual news from the IT world once in a month!"},"subscribe__email-label":{"ru":"Email","_type":"localeString","en":"Email"},"subscribe__name-label":{"en":"Name","ru":"Имя","_type":"localeString"},"subscribe__required-message":{"en":"This field is required","ru":"Это поле обязательное","_type":"localeString"},"subscribe__notify-label":{"en":"Yes, please, notify me about news, events and propositions","ru":"Да, пожалуйста уведомляйте меня о новостях, событиях и предложениях","_type":"localeString"},"subscribe__agree-label":{"_type":"localeString","en":"By subscribing to the newsletter, you agree to the %TERMS% and %POLICY% and agree to the use of cookies and the transfer of your personal data","ru":"Подписываясь на рассылку, вы соглашаетесь с %TERMS% и %POLICY% и даете согласие на использование файлов cookie и передачу своих персональных данных*"},"subscribe__submit-label":{"ru":"Подписаться","_type":"localeString","en":"Subscribe"},"subscribe__email-message":{"ru":"Пожалуйста, введите корректный адрес электронной почты","_type":"localeString","en":"Please, enter the valid email"},"subscribe__email-placeholder":{"_type":"localeString","en":"username@gmail.com","ru":"username@gmail.com"},"subscribe__name-placeholder":{"ru":"Имя Фамилия","_type":"localeString","en":"Last, first name"},"subscribe__success":{"en":"You are successfully subscribed! Check you mailbox.","ru":"Вы успешно подписаны на рассылку. Проверьте свой почтовый ящик.","_type":"localeString"},"subscribe__error":{"en":"Subscription is unsuccessful. Please, try again later.","ru":"Не удалось оформить подписку. Пожалуйста, попробуйте позднее.","_type":"localeString"},"roi4presenter":{"ru":"roi4presenter","_type":"localeString","en":"Roi4Presenter","de":"roi4presenter"},"it_catalogs":{"_type":"localeString","en":"IT catalogs"},"roi4webinar":{"_type":"localeString","en":"Pitch Avatar"},"b4reference":{"_type":"localeString","en":"Bonus4Reference"}},"breadcrumbs":{"home":{"en":"Home","ru":"Главная","_type":"localeString"},"companies":{"_type":"localeString","en":"Companies","ru":"Компании"},"products":{"ru":"Продукты","_type":"localeString","en":"Products"},"implementations":{"en":"Deployments","ru":"Внедрения","_type":"localeString"},"login":{"ru":"Вход","_type":"localeString","en":"Login"},"registration":{"ru":"Регистрация","_type":"localeString","en":"Registration"},"b2b-platform":{"en":"B2B platform for IT buyers, vendors and suppliers","ru":"Портал для покупателей, поставщиков и производителей ИТ","_type":"localeString"}},"comment-form":{"title":{"ru":"Оставить комментарий","_type":"localeString","en":"Leave comment"},"firstname":{"ru":"Имя","_type":"localeString","en":"First name"},"lastname":{"en":"Last name","ru":"Фамилия","_type":"localeString"},"company":{"ru":"Компания","_type":"localeString","en":"Company name"},"position":{"_type":"localeString","en":"Position","ru":"Должность"},"actual-cost":{"ru":"Фактическая стоимость","_type":"localeString","en":"Actual cost"},"received-roi":{"ru":"Полученный ROI","_type":"localeString","en":"Received ROI"},"saving-type":{"ru":"Тип экономии","_type":"localeString","en":"Saving type"},"comment":{"en":"Comment","ru":"Комментарий","_type":"localeString"},"your-rate":{"_type":"localeString","en":"Your rate","ru":"Ваша оценка"},"i-agree":{"en":"I agree","ru":"Я согласен","_type":"localeString"},"terms-of-use":{"_type":"localeString","en":"With user agreement and privacy policy","ru":"С пользовательским соглашением и политикой конфиденциальности"},"send":{"_type":"localeString","en":"Send","ru":"Отправить"},"required-message":{"_type":"localeString","en":"{NAME} is required filed","ru":"{NAME} - это обязательное поле"}},"maintenance":{"title":{"en":"Site under maintenance","ru":"На сайте проводятся технические работы","_type":"localeString"},"message":{"ru":"Спасибо за ваше понимание","_type":"localeString","en":"Thank you for your understanding"}},"filters":{"from":{"ru":"от","_type":"localeString","en":"from"},"to":{"_type":"localeString","en":"to","ru":"до"},"filter-price-title":{"_type":"localeString","en":"Filter by price","ru":"Фильтр по цене"},"view-type-label":{"ru":"Вид","_type":"localeString","en":"View"},"sort-type-label":{"en":"Sorting","ru":"Сортировка","_type":"localeString"},"category":{"_type":"localeString","en":"Category","ru":"Категория"},"follow":{"ru":"Следить","_type":"localeString","en":"Follow"},"add-product":{"ru":"Добавить продукт","_type":"localeString","en":"Add Product"},"show-all":{"ru":"Показать все","_type":"localeString","en":"Show all"},"filter-toggle":{"en":"Filter","ru":"Фильтр","_type":"localeString"},"clear-button":{"ru":"Очистить","_type":"localeString","en":"Сlear"},"delivery-type-field":{"ru":"Тип поставки","_type":"localeString","en":"Delivery type"},"product-categories-field":{"_type":"localeString","en":"product categories","ru":"категориz продуктаhjle"},"providers-field":{"ru":"Поставщик, производитель","_type":"localeString","en":"Providers"},"business-tasks-field":{"ru":"Бизнес задачи","_type":"localeString","en":"Business tasks"},"problems-field":{"_type":"localeString","en":"Problems","ru":"Проблемы"},"with-discounts-checkbox":{"_type":"localeString","en":"With discounts","ru":"Со скидками"},"expert-price-checkbox":{"ru":"Конфигуратор","_type":"localeString","en":"Configurator"},"roi-calculator-checkbox":{"ru":"ROI-калькулятор","_type":"localeString","en":"ROI-calculator"},"apply-filter-button":{"ru":"Применить фильтр","_type":"localeString","en":"Apply filter"},"sorting-toggle":{"_type":"localeString","en":"Sorting","ru":"Сортировка"},"show-all-button":{"ru":"Показать все","_type":"localeString","en":"Show all"},"suggest-product-button":{"ru":"Предложить продукт","_type":"localeString","en":"Suggest product"},"with-projects-label":{"ru":"С внедрениями","_type":"localeString","en":"With deployments"},"bonus-4-reference":{"ru":"Бонус за референс","_type":"localeString","en":"Bonus 4 Reference"},"product-categories":{"ru":"Категории продуктов","_type":"localeString","en":"Product Categories"},"countries":{"en":"Countries","ru":"Страны","_type":"localeString"},"seller":{"ru":"Продавец","_type":"localeString","en":"Seller"},"vendors":{"ru":"Производители продуктов пользователя","_type":"localeString","en":"User products vendors"},"suppliers":{"en":"User suppliers","ru":"Поставщики пользователя","_type":"localeString"},"business-process":{"_type":"localeString","en":"Problems","ru":"Проблемы"},"business-objectives":{"ru":"Бизнес задачи","_type":"localeString","en":"Business tasks"},"branch":{"en":" Branch","ru":"Отрасль","_type":"localeString"},"users":{"ru":"Пользователи","_type":"localeString","en":"Users"},"status":{"_type":"localeString","en":"Status","ru":"Статус"},"info-source":{"ru":"Информационный ресурс","_type":"localeString","en":"Info source"},"with-reference-checkbox":{"en":"With reference","ru":"С референсами","_type":"localeString"},"show-deal-checkbox":{"ru":"Показывать сделки с noname","_type":"localeString","en":"Show deal with noname"},"roi-checkbox":{"ru":"ROI","_type":"localeString","en":"ROI"},"problems":{"ru":"Проблемы","_type":"localeString","en":"Problems"},"find":{"en":"Find","ru":"Выполнить поиск","_type":"localeString"},"deal-date":{"ru":"Дата","_type":"localeString","en":"Date"},"try-button":{"en":"Try AI (Beta)","ru":"Попробовать AI (Beta)","_type":"localeString"},"hide":{"_type":"localeString","en":"Hide","ru":"Скрыть"},"company-size":{"ru":"Размер компании","_type":"localeString","en":"Company size"},"add-company":{"en":"Add company","ru":"Добавить компанию","_type":"localeString"},"add-implementation":{"en":"Add deployment","ru":"Добавить внедрение","_type":"localeString"},"sort-title-asc":{"ru":"От А до Я","_type":"localeString","en":"From A to Z"},"sort-title-desc":{"en":"From Z to A","ru":"От Я до А","_type":"localeString"},"sellers-field":{"ru":"Поставщики, Производители","_type":"localeString","en":"Sellers"},"supply-types":{"ru":"Тип поставки","_type":"localeString","en":"Supply type"},"with-comments-checkbox":{"ru":"С комментариями","_type":"localeString","en":"With comments"},"supplier":{"_type":"localeString","en":"Supplier","ru":"Поставщик"},"vendor":{"en":"Vendor","ru":"Производитель","_type":"localeString"},"user":{"ru":"Пользователь","_type":"localeString","en":"User"},"company-type":{"ru":"Тип компании","_type":"localeString","en":"Company type"},"partners-field":{"en":"Partners","ru":" Партнеры","_type":"localeString"},"customers":{"ru":"Покупатели","_type":"localeString","en":"Customers"},"product-supplier":{"ru":"Поставщик продукта","_type":"localeString","en":"Product supplier"},"product-vendor":{"ru":"Производитель продукта","_type":"localeString","en":"Product vendor"},"implementation-date":{"ru":"Дата внедрения","_type":"localeString","en":"Deployment date"},"canceled":{"_type":"localeString","en":"Canceled","ru":"Отменено"},"deal-canceled":{"en":"Deal canceled","ru":"Сделка отменена","_type":"localeString"},"deal-closed":{"ru":"Сделка закрыта","_type":"localeString","en":"Deal closed"},"deal-in-progress":{"_type":"localeString","en":"Deal in progress","ru":"Сделка в процессе"},"deal-is-planned":{"ru":"Сделка планируется","_type":"localeString","en":"Deal is planned"},"finished":{"ru":"Завершено","_type":"localeString","en":"Finished"},"in-process":{"en":"In Process","ru":"Ведется","_type":"localeString"},"planned":{"_type":"localeString","en":"Planned","ru":"Планируется"},"proof-of-concept":{"ru":"Пилотный проект","_type":"localeString","en":"Proof of concept"},"stopped":{"ru":"Остановлено","_type":"localeString","en":"Stopped"},"competencies":{"ru":"Компетенции","_type":"localeString","en":"Competencies"}}},"translationsStatus":{"implementations":"success","filters":"success"},"sections":{"implementations-text-block":{"label":"catalog-implementations-text-block","body":{"ru":[{"children":[{"_key":"1435aa0421110","_type":"span","marks":[],"text":"Каталог внедрений ROI4CIO - это база данных о внедрениях программного обеспечения, оборудования и ИТ-услуг. Находите внедрения по вендору, поставщику, пользователю, бизнес-задачам, проблемам, статусу, фильтруйте по наличию ROI и референса."}],"_type":"block","style":"normal","_key":"1435aa042111","markDefs":[]}],"_type":"localeBlock","en":[{"children":[{"_key":"0e40f9075bd00","_type":"span","marks":[],"text":"The ROI4CIO Deployment Catalog is a database of software, hardware, and IT service implementations. Find implementations by vendor, supplier, user, business tasks, problems, status, filter by the presence of ROI and reference."}],"_type":"block","style":"normal","_key":"0e40f9075bd0","markDefs":[]}]}}},"sectionsStatus":{"implementations-text-block":"success"},"pageMetaData":{"implementations":{"title":{"_type":"localeString","en":"ROI4CIO: Implementations","ru":"ROI4CIO: Внедрения"},"meta":[{"name":"og:image","content":"https://roi4cio.com/fileadmin/templates/roi4cio/image/roi4cio-logobig.jpg"},{"name":"og:type","content":"website"}],"translatable_meta":[{"name":"og:title","translations":{"ru":"Внедрения","_type":"localeString","en":"Deployments"}},{"name":"og:description","translations":{"en":"Implementations","ru":"Каталог внедрений различных видов программного обеспечения, ИТ проектов. Результаты внедрений ИТ, результаты, референсы, ROI","_type":"localeString"}},{"name":"title","translations":{"ru":"Внедрения","_type":"localeString","en":"Implementations"}},{"name":"description","translations":{"en":"Implementations description","ru":"Описание внедрений","_type":"localeString"}},{"translations":{"ru":"Внедрения ключевые слова","_type":"localeString","en":"Implementations keywords"},"name":"keywords"}]}},"pageMetaDataStatus":{"implementations":"success"},"subscribeInProgress":false,"subscribeError":false},"auth":{"inProgress":false,"error":false,"checked":true,"initialized":false,"user":{},"role":null,"expires":null},"products":{"productsByAlias":{},"aliases":{},"links":{},"meta":{},"loading":false,"error":null,"useProductLoading":false,"sellProductLoading":false,"templatesById":{},"comparisonByTemplateId":{}},"filters":{"filterCriterias":{"loading":false,"error":null,"data":{"price":{"min":0,"max":6000},"users":{"loading":false,"error":null,"ids":[],"values":{}},"suppliers":{"loading":false,"error":null,"ids":[],"values":{}},"vendors":{"loading":false,"error":null,"ids":[],"values":{}},"roles":{"id":200,"title":"Roles","values":{"1":{"id":1,"title":"User","translationKey":"user"},"2":{"id":2,"title":"Supplier","translationKey":"supplier"},"3":{"id":3,"title":"Vendor","translationKey":"vendor"}}},"categories":{"flat":[],"tree":[]},"countries":{"loading":false,"error":null,"ids":[],"values":{}}}},"showAIFilter":false},"companies":{"companiesByAlias":{},"aliases":{},"links":{},"meta":{},"loading":false,"error":null},"implementations":{"implementationsByAlias":{"citrix-for-petrochemical-company":{"id":707,"title":"Citrix for petrochemical company","description":"<span style=\"color: rgb(97, 97, 97); \">Chevron Phillips Chemical Company LP produces plastics and compounds used to manufacture more than 70,000 products ranging from food packaging to clean fuels, biodegradable solvents, medical devices, and more. To meet this massive demand, the company, based in The Woodlands, Texas, employs more than 5,000 workers worldwide and jointly operates 33 manufacturing and research centers with business partners.<br />As an engineer in the company’s Remote Connectivity and Mobility (RCM) team, Ryan Tsamouris’ role is to make sure that employees can work efficiently and effectively regardless of geographic location, device, or time of day. To facilitate this, the RCM team needed an integrated solution that could seamlessly deliver apps, data, and services that keep the company’s manufacturing workers and office employees connected and productive.<br />As part of a technology lifecycle, and after a thorough product comparison, the RCM team decided to implement Citrix Workspace to meet the company’s needs.</span>\r\n<span style=\"color: rgb(97, 97, 97); \"><br /><span style=\"font-weight: bold;\">Boosting security and increasing uptime</span><br />Today, Citrix Workspace—which includes Citrix XenMobile for device security, Citrix ShareFile for secure file sync and sharing, Citrix NetScaler for network security, and Citrix XenApp and Citrix XenDesktop for app and desktop delivery—is providing secure access to the apps and desktops employees use everywhere, from the manufacturing floor to the corporate office.<br />Citrix NetScaler Unified Gateway and the NetScaler application delivery controller allow staff to securely access the apps and data they need from any device and any location, without worrying about disruptive downtime. NetScaler Unified Gateway secures remote access to apps and desktops, and the NetScaler application delivery controller optimizes application performance with load balancing.<br />And to get visibility into everything, Chevron Phillips Chemical Company is also beginning to integrate NetScaler Management and Analytics System for end-to-end network and application insight, automation, and management.<br /><span style=\"font-style: italic;\">“All of this provides a layer of security and control that is proving to be very useful,”</span> says Tsamouris. <span style=\"font-style: italic;\">“Our critical services point to a load balancer, allowing monitoring of back-end services and providing the ability to add or remove resources without scheduling an outage.”</span></span>\r\n<span style=\"color: rgb(97, 97, 97); \"><span style=\"font-weight: bold;\"><br />Improving user experience and unburdening IT staff</span><br />Chevron Phillips Chemical Company is using Citrix Workspace to empower employees to work from anywhere, on any device. Because XenMobile technology separates corporate apps and data from personal apps and data on users’ devices, employees can now work securely whenever and wherever they want.<br /><span style=\"font-style: italic;\">“We no longer have to manage employees’ personal devices,”</span> Tsamouris says. <span style=\"font-style: italic;\">“Instead, all we have to do is provide the apps and ensure that they meet the security requirements. This greatly simplifies our mobile strategy.”</span></span>\r\n<span style=\"color: rgb(97, 97, 97); \"><span style=\"font-weight: bold;\"><span style=\"font-style: italic;\"></span><br />Sharing devices to cut costs</span><br />By using the XenApp solution along with XenMobile device management, Chevron Phillips Chemical Company was able to roll out a device-sharing program within its manufacturing facilities.<br /><span style=\"font-style: italic;\">“For manufacturing environments with shift workers, XenMobile’s shared device mode is very useful,”</span> Tsamouris says. <span style=\"font-style: italic;\">“For us, it means that when one shift worker signs off, another can simply sign on to the same tablet from the Secure Hub app. They get their single sign-on; they get their apps; and they’re off to work. As a result, we’re saving money on devices and simplifying our approach to mobile management within manufacturing.”</span></span>\r\n<span style=\"color: rgb(97, 97, 97); \"><span style=\"font-weight: bold;\"><br />Increasing collaboration and productivity</span><br />With the ShareFile solution, the company’s mobile workforce can access, sync, and share files from any device, at any given moment.<br /><span style=\"font-style: italic;\">“The ShareFile mobile app was a big win for us because it meant our users were able to access their desktop files, network shares, and Microsoft SharePoint document libraries from the same mobile device while on the go,”</span> Tsamouris says.<br />The company will soon extend its use of ShareFile technology to include encrypted email service and workflows—both of which will contribute to the increased productivity and improved collaboration employees already are experiencing.<br /><br /><span style=\"font-style: italic;\">“Citrix Workspace gives us the freedom to use all these products without having to worry about additional licensing or add-ons,” Tsamouris says. “We no longer have to decide whether we have the resources to take on a project; we already know we have the platform and the solution to support it.”</span></span>","alias":"citrix-for-petrochemical-company","roi":0,"seo":{"title":"Citrix for petrochemical company","keywords":"","description":"<span style=\"color: rgb(97, 97, 97); \">Chevron Phillips Chemical Company LP produces plastics and compounds used to manufacture more than 70,000 products ranging from food packaging to clean fuels, biodegradable solvents, medical devices, and more. To meet thi","og:title":"Citrix for petrochemical company","og:description":"<span style=\"color: rgb(97, 97, 97); \">Chevron Phillips Chemical Company LP produces plastics and compounds used to manufacture more than 70,000 products ranging from food packaging to clean fuels, biodegradable solvents, medical devices, and more. To meet thi"},"deal_info":"","user":{"id":5100,"title":"Chevron Phillips Chemical","logoURL":"https://old.roi4cio.com/uploads/roi/company/Chevron_Phillips.png","alias":"chevron-phillips-chemical","address":"","roles":[],"description":"Chevron Phillips Chemical is a petrochemical company jointly owned by Chevron Corporation and Phillips 66. The company was formed July 1, 2000 by merging the chemicals operations of both Chevron Corporation and Phillips Petroleum Company. As equally-owned company, it is governed by a board of directors composed of two members from each of the parent companies. The company was actually named in a coin toss to determine which parent company name would be first and which would be last.<br />Chevron Phillips is headquartered in The Woodlands, Texas, a northern suburb of Houston, and is a major producer of ethylene, propylene, polyethylene, Alpha-olefins, Polyalphaolefins, aromatic compounds and a range of specialty chemicals.","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":0,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":1,"supplierImplementationsCount":0,"vendorImplementationsCount":0,"vendorPartnersCount":0,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"http://www.cpchem.com/en-us/Pages/default.aspx","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Chevron Phillips Chemical","keywords":"","description":"Chevron Phillips Chemical is a petrochemical company jointly owned by Chevron Corporation and Phillips 66. The company was formed July 1, 2000 by merging the chemicals operations of both Chevron Corporation and Phillips Petroleum Company. As equally-owned comp","og:title":"Chevron Phillips Chemical","og:description":"Chevron Phillips Chemical is a petrochemical company jointly owned by Chevron Corporation and Phillips 66. The company was formed July 1, 2000 by merging the chemicals operations of both Chevron Corporation and Phillips Petroleum Company. As equally-owned comp","og:image":"https://old.roi4cio.com/uploads/roi/company/Chevron_Phillips.png"},"eventUrl":""},"supplier":{"id":182,"title":"Citrix","logoURL":"https://old.roi4cio.com/uploads/roi/company/Citrix_Systems_logo.png","alias":"citrix","address":"","roles":[],"description":"Citrix was founded in 1989. The company specializes in virtualization technologies, cloud computing and network security.<br /><br />Citrix has become a renowned provider of multi-user solutions. The company's key advantage was the OS source code license that Citrix received from Microsoft. The use of its own optimized ICA data transfer protocol allowed Citrix to successfully compete in the market with other powerful players. The company's flagship product is Citrix Presentation Server (now XenApp).<br /><br />In addition, the company offers a range of solutions for working with clouds and deploying virtual desktop infrastructures (VDI):<br /><br />Citrix Endpoint Management is a single end-to-end solution for managing mobile devices and applications for consistent productivity.<br /><br />Citrix Workspace is a platform for bringing all applications and data together in a secure, unified and personalized workspace\r\n<br />Citrix Cloud is a suite of cloud services that simplifies deployment and management of Citrix technologies, allowing you to extend existing software landscapes.<br /><br />Citrix also offers software tools for working with hybrid and multicloud environments.<br /><br />In 2005, Citrix acquired NetScaler, a networking company and also a hardware vendor. In 2007, the company acquired XenSource, a virtualization developer based on Xen, an open source hypervisor. Hundreds of thousands of customers worldwide use Citrix solutions. The company currently employs about 8,500 employees. Citrix is headquartered in Fort Lauderdale, Florida, USA. ","companyTypes":[],"products":{},"vendoredProductsCount":8,"suppliedProductsCount":8,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":9,"vendorImplementationsCount":11,"vendorPartnersCount":0,"supplierPartnersCount":6,"b4r":0,"categories":{},"companyUrl":"https://www.citrix.com/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Citrix","keywords":"company, Citrix, with, Microsoft, remote, 1995, software, partnership","description":"Citrix was founded in 1989. The company specializes in virtualization technologies, cloud computing and network security.<br /><br />Citrix has become a renowned provider of multi-user solutions. The company's key advantage was the OS source code license that ","og:title":"Citrix","og:description":"Citrix was founded in 1989. The company specializes in virtualization technologies, cloud computing and network security.<br /><br />Citrix has become a renowned provider of multi-user solutions. The company's key advantage was the OS source code license that ","og:image":"https://old.roi4cio.com/uploads/roi/company/Citrix_Systems_logo.png"},"eventUrl":""},"vendors":[{"id":182,"title":"Citrix","logoURL":"https://old.roi4cio.com/uploads/roi/company/Citrix_Systems_logo.png","alias":"citrix","address":"","roles":[],"description":"Citrix was founded in 1989. The company specializes in virtualization technologies, cloud computing and network security.<br /><br />Citrix has become a renowned provider of multi-user solutions. The company's key advantage was the OS source code license that Citrix received from Microsoft. The use of its own optimized ICA data transfer protocol allowed Citrix to successfully compete in the market with other powerful players. The company's flagship product is Citrix Presentation Server (now XenApp).<br /><br />In addition, the company offers a range of solutions for working with clouds and deploying virtual desktop infrastructures (VDI):<br /><br />Citrix Endpoint Management is a single end-to-end solution for managing mobile devices and applications for consistent productivity.<br /><br />Citrix Workspace is a platform for bringing all applications and data together in a secure, unified and personalized workspace\r\n<br />Citrix Cloud is a suite of cloud services that simplifies deployment and management of Citrix technologies, allowing you to extend existing software landscapes.<br /><br />Citrix also offers software tools for working with hybrid and multicloud environments.<br /><br />In 2005, Citrix acquired NetScaler, a networking company and also a hardware vendor. In 2007, the company acquired XenSource, a virtualization developer based on Xen, an open source hypervisor. Hundreds of thousands of customers worldwide use Citrix solutions. The company currently employs about 8,500 employees. Citrix is headquartered in Fort Lauderdale, Florida, USA. ","companyTypes":[],"products":{},"vendoredProductsCount":8,"suppliedProductsCount":8,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":9,"vendorImplementationsCount":11,"vendorPartnersCount":0,"supplierPartnersCount":6,"b4r":0,"categories":{},"companyUrl":"https://www.citrix.com/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Citrix","keywords":"company, Citrix, with, Microsoft, remote, 1995, software, partnership","description":"Citrix was founded in 1989. The company specializes in virtualization technologies, cloud computing and network security.<br /><br />Citrix has become a renowned provider of multi-user solutions. The company's key advantage was the OS source code license that ","og:title":"Citrix","og:description":"Citrix was founded in 1989. The company specializes in virtualization technologies, cloud computing and network security.<br /><br />Citrix has become a renowned provider of multi-user solutions. The company's key advantage was the OS source code license that ","og:image":"https://old.roi4cio.com/uploads/roi/company/Citrix_Systems_logo.png"},"eventUrl":""}],"products":[{"id":137,"logo":false,"scheme":false,"title":"Citrix Virtual Apps and Desktops (XenApp and XenDesktop)","vendorVerified":0,"rating":"2.40","implementationsCount":7,"suppliersCount":0,"alias":"citrix-virtual-apps-and-desktops-xenapp-and-xendesktop","companyTypes":[],"description":" Only Citrix provides a complete virtual app and desktop solution to meet all your business needs. Give employees the freedom to work from anywhere while cutting IT costs. Deliver Windows, Linux, and web business applications or full virtual desktops from any cloud—public, on-premises or hybrid—within a modern digital workspace.\r\n\r\n<span style=\"font-weight: bold; \">The main features of Citrix Virtual Apps and Desktops:</span>\r\n<ul><li>HDX technology for optimized user experience</li></ul>\r\n<ul><li>Virtual Windows, Linux and web applications</li></ul>\r\n<ul><li>Single management console for apps and desktops</li></ul>\r\n<ul><li>Centralized security in the data center</li></ul>\r\n<ul><li>FIPS and Common Criteria certified</li></ul>\r\n<ul><li>Single image provisioning technology </li></ul>\r\n<ul><li>VDI desktops</li></ul>\r\n<ul><li>Remote PC access</li></ul>\r\n\r\n<span style=\"font-weight: bold; \">Unifying editions across the Citrix product portfolio</span>\r\n<ul><li>Citrix is also unifying product editions across its portfolio – designating them Standard, Advanced, and Premium.</li></ul>\r\n<ul><li>XenApp Advanced edition now will map to Citrix Virtual Apps Standard edition</li></ul>\r\n<ul><li>XenApp Enterprise edition maps to Citrix Virtual Apps Advanced edition</li></ul>\r\n<ul><li>XenApp Platinum edition maps to Citrix Virtual Apps Premium edition</li></ul>\r\n<ul><li>XenDesktop VDI edition maps to Citrix Virtual Desktops Standard edition</li></ul>\r\n<ul><li>XenDesktop Enterprise edition maps to Citrix Virtual Apps and Desktops Advanced edition</li></ul>\r\n<ul><li>XenDesktop Platinum edition maps Citrix Virtual Apps and Desktops Premium edition</li></ul>\r\nView a detailed feature matrix","shortDescription":"Citrix Virtual Apps and Desktops are virtualization solutions that give IT control of virtual machines, applications, licensing, and security, while providing anywhere access for any device.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":16,"sellingCount":20,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Citrix Virtual Apps and Desktops (XenApp and XenDesktop)","keywords":"Single, desktops, data, technology, XenApp, apps, applications, Published","description":" Only Citrix provides a complete virtual app and desktop solution to meet all your business needs. Give employees the freedom to work from anywhere while cutting IT costs. Deliver Windows, Linux, and web business applications or full virtual desktop","og:title":"Citrix Virtual Apps and Desktops (XenApp and XenDesktop)","og:description":" Only Citrix provides a complete virtual app and desktop solution to meet all your business needs. Give employees the freedom to work from anywhere while cutting IT costs. Deliver Windows, Linux, and web business applications or full virtual desktop"},"eventUrl":"","translationId":138,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":299,"title":"Application and User Session Virtualization","alias":"application-and-user-session-virtualization","description":"Application virtualization is a technology that allows you to separate the software from the operating system on which it operates. Fully virtualized software is not installed in the traditional sense, although the end-user at first glance can not see it, because the virtualized software works just as normal. The software in the execution process works just as if it interacted with the operating system directly and with all its resources, but can be isolated or executed in a sandbox with different levels of restriction.\r\nModern operating systems, such as Microsoft Windows and Linux, can include limited software virtualization. For example, Windows 7 has Windows XP mode that allows you to run Windows XP software on Windows 7 without any changes.\r\nUser session virtualization is a newer version of desktop virtualization that works at the operating system level. While normal virtualization of the desktop allows an operating system to be run by virtualizing the hardware of the desktop, RDS and App-V allow for the virtualization of the applications. User session virtualization lies between the two.\r\nA desktop has an operating system loaded on the base hardware. This can be either physical or virtual. The user session virtualization keeps track of all changes to the operating system that a user might make by encapsulating the configuration changes and associating them to the user account. This allows the specific changes to be applied to the underlying operating system without actually changing it. This allows several users to have completely different operating system configurations applied to base operating system installation.\r\nIf you are in a distributed desktop environment and there are local file servers available at each location, you can deploy virtualized user sessions in the form of redirected folders and roaming profiles.","materialsDescription":" <span style=\"font-weight: bold;\">Understanding application virtualization</span>\r\nApplication virtualization technology isolates applications from the underlying operating system and from other applications to increase compatibility and manageability. This application virtualization technology enables applications to be streamed from a centralized location into an isolation environment on the target device where they will execute. The application files, configuration, and settings are copied to the target device and the application execution at run time is controlled by the application virtualization layer. When executed, the application run time believes that it is interfacing directly with the operating system when, in fact, it is interfacing with a virtualization environment that proxies all requests to the operating system.\r\n<span style=\"font-weight: bold;\">Understanding session virtualization</span>\r\nSession virtualization uses application streaming to deliver applications to hosting servers in the datacenter. The Application then connects the user to the server. The application then executes entirely on the server. The user interacts with the application remotely by sending mouse-clicks and keystrokes to the server. The server then responds by sending screen updates back to the user’s device. Whereas application virtualization is limited to Windows-based operating systems, session virtualization allows any user on any operating system to access any application delivered by IT. As a result, the application enables Windows, Mac, Linux, iOS and Android devices to run any applications using session virtualization. Furthermore, session virtualization leverages server-side processing power which liberates IT from the endless cycle of PC hardware refreshes which are typically needed to support application upgrades when using traditional application deployment methods.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/Application_and_User_Session_Virtualization__1_.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":449,"logo":false,"scheme":false,"title":"Citrix Endpoint Management (XenMobile)","vendorVerified":0,"rating":"2.80","implementationsCount":7,"suppliersCount":0,"alias":"citrixendpointmanagementxenmobile","companyTypes":[],"description":"Endpoint Management provides Mobile Device Management (MDM) and Mobile App Management (MAM).<br /><br /><span style=\"font-weight: bold;\">MDM features of Endpoint Management let you:</span>\r\n<ul> <li>Deploy device policies and apps.</li> </ul>\r\n<ul> <li>Retrieve asset inventories.</li> </ul>\r\n<ul> <li>Carry out actions on devices, such as a device wipe.</li> </ul>\r\n\r\n<span style=\"font-weight: bold;\">MAM features of Endpoint Management let you:</span>\r\n<ul> <li>Secure apps and data on BYO mobile devices.</li> </ul>\r\n<ul> <li>Deliver enterprise mobile apps.</li> </ul>\r\n<ul> <li>Lock apps and wipe their data.</li> </ul>\r\n\r\n<span style=\"font-weight: bold;\">Withi a combination of MDM and MAM features, you can:</span>\r\n<ul> <li>Manage a corporate-issued device by using MDM</li> </ul>\r\n<ul> <li>Deploy device policies and apps</li> </ul>\r\n<ul> <li>Retrieve an asset inventory</li> </ul>\r\n<ul> <li>Wipe devices</li> </ul>\r\n<ul> <li>Deliver enterprise mobile apps</li> </ul>\r\n<ul> <li>Lock apps and wipe the data on devices</li> </ul>","shortDescription":"Citrix Endpoint Management (formerly XenMobile) is a solution for managing endpoints, offering mobile device management (MDM) and mobile application management (MAM) capabilities. \r\n","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":9,"sellingCount":0,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Citrix Endpoint Management (XenMobile)","keywords":"management, devices, with, endpoint, unified, workspace, device, Simplify","description":"Endpoint Management provides Mobile Device Management (MDM) and Mobile App Management (MAM).<br /><br /><span style=\"font-weight: bold;\">MDM features of Endpoint Management let you:</span>\r\n<ul> <li>Deploy device policies and apps.</li> </ul>\r\n<ul> <li>Retriev","og:title":"Citrix Endpoint Management (XenMobile)","og:description":"Endpoint Management provides Mobile Device Management (MDM) and Mobile App Management (MAM).<br /><br /><span style=\"font-weight: bold;\">MDM features of Endpoint Management let you:</span>\r\n<ul> <li>Deploy device policies and apps.</li> </ul>\r\n<ul> <li>Retriev"},"eventUrl":"","translationId":1062,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":449,"logo":false,"scheme":false,"title":"Citrix Endpoint Management (XenMobile)","vendorVerified":0,"rating":"2.80","implementationsCount":7,"suppliersCount":0,"alias":"citrixendpointmanagementxenmobile","companyTypes":[],"description":"Endpoint Management provides Mobile Device Management (MDM) and Mobile App Management (MAM).<br /><br /><span style=\"font-weight: bold;\">MDM features of Endpoint Management let you:</span>\r\n<ul> <li>Deploy device policies and apps.</li> </ul>\r\n<ul> <li>Retrieve asset inventories.</li> </ul>\r\n<ul> <li>Carry out actions on devices, such as a device wipe.</li> </ul>\r\n\r\n<span style=\"font-weight: bold;\">MAM features of Endpoint Management let you:</span>\r\n<ul> <li>Secure apps and data on BYO mobile devices.</li> </ul>\r\n<ul> <li>Deliver enterprise mobile apps.</li> </ul>\r\n<ul> <li>Lock apps and wipe their data.</li> </ul>\r\n\r\n<span style=\"font-weight: bold;\">Withi a combination of MDM and MAM features, you can:</span>\r\n<ul> <li>Manage a corporate-issued device by using MDM</li> </ul>\r\n<ul> <li>Deploy device policies and apps</li> </ul>\r\n<ul> <li>Retrieve an asset inventory</li> </ul>\r\n<ul> <li>Wipe devices</li> </ul>\r\n<ul> <li>Deliver enterprise mobile apps</li> </ul>\r\n<ul> <li>Lock apps and wipe the data on devices</li> </ul>","shortDescription":"Citrix Endpoint Management (formerly XenMobile) is a solution for managing endpoints, offering mobile device management (MDM) and mobile application management (MAM) capabilities. \r\n","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":9,"sellingCount":0,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Citrix Endpoint Management (XenMobile)","keywords":"management, devices, with, endpoint, unified, workspace, device, Simplify","description":"Endpoint Management provides Mobile Device Management (MDM) and Mobile App Management (MAM).<br /><br /><span style=\"font-weight: bold;\">MDM features of Endpoint Management let you:</span>\r\n<ul> <li>Deploy device policies and apps.</li> </ul>\r\n<ul> <li>Retriev","og:title":"Citrix Endpoint Management (XenMobile)","og:description":"Endpoint Management provides Mobile Device Management (MDM) and Mobile App Management (MAM).<br /><br /><span style=\"font-weight: bold;\">MDM features of Endpoint Management let you:</span>\r\n<ul> <li>Deploy device policies and apps.</li> </ul>\r\n<ul> <li>Retriev"},"eventUrl":"","translationId":1062,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":3406,"logo":false,"scheme":false,"title":"Citrix Workspace","vendorVerified":0,"rating":"2.70","implementationsCount":2,"suppliersCount":0,"alias":"citrix-workspace","companyTypes":[],"description":"<p>With new workstyles and complex IT environments, it’s increasingly frustrating for people to get work done in a productive way. Employees are forced to remember numerous logins as they switch between applications—not to mention the time they can waste searching across locations for information. This is all while dealing with performance and security issues that can further hinder the employee experience. Citrix Workspace is the only solution that delivers a unified, secure and intelligent workspace that lets people do their best work while maintaining a high-quality user experience.</p>\r\n<p>With Citrix Workspace users get a seamless work experience regardless of the type of app, device, network, or location, without a lot of extra steps. IT maintains control and visibility of SaaS, mobile, virtual, and web apps with a simple and integrated solution that enhances user experience, giving them the best tool to work efficiently. <a class=\"external-link-new-window\" title=\"Opens internal link in current window\" href=\"https://www.citrix.com/products/citrix-workspace/\" target=\"_blank\" rel=\"noopener\">Compare </a>below to see which product best suits your business needs.</p>\r\n<p><span style=\"font-weight: bold;\">Citrix Workspace</span></p>\r\n<ul>\r\n<li>Provides employees a single, actionable view into all of their systems.</li>\r\n</ul>\r\n<ul>\r\n<li>Breaks down complex SaaS applications into single-purpose streamlined workflows.</li>\r\n</ul>\r\n<ul>\r\n<li>Automates work by pushing important information and tasks to any device, intranet or messenger.</li>\r\n</ul>\r\n<p><span style=\"font-weight: bold;\">Services included</span></p>\r\n<ul>\r\n<li>Citrix Virtual Apps and Desktops (formerly XenApp and XenDesktop Service)</li>\r\n</ul>\r\n<ul>\r\n<li>Citrix Endpoint Management (formerly XenMobile Service)</li>\r\n</ul>\r\n<ul>\r\n<li>Citrix Content Collaboration (ShareFile integration)</li>\r\n</ul>\r\n<ul>\r\n<li>Citrix Access Control</li>\r\n</ul>\r\n<ul>\r\n<li>Citrix Analytics</li>\r\n</ul>","shortDescription":"Combine the benefits of app and desktop virtualization, endpoint management, content collaboration and web/SaaS access control to deliver the secure digital workspace your business needs.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":3,"sellingCount":0,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Citrix Workspace","keywords":"","description":"<p>With new workstyles and complex IT environments, it’s increasingly frustrating for people to get work done in a productive way. Employees are forced to remember numerous logins as they switch between applications—not to mention the time they can","og:title":"Citrix Workspace","og:description":"<p>With new workstyles and complex IT environments, it’s increasingly frustrating for people to get work done in a productive way. Employees are forced to remember numerous logins as they switch between applications—not to mention the time they can"},"eventUrl":"","translationId":3407,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":3,"title":"MDM - Mobile Device Management","alias":"mdm-mobile-device-management","description":" <span style=\"font-weight: bold; \">Mobile device management (MDM)</span> is an industry term for the administration of mobile devices, such as smartphones, tablet computers and laptops. Device management system is usually implemented with the use of a third party product that has management features for particular vendors of mobile devices.\r\nMDM is typically a deployment of a combination of on-device applications and configurations, corporate policies and certificates, and backend infrastructure, for the purpose of simplifying and enhancing the IT management of end user devices. In modern corporate IT environments, the sheer number and diversity of managed devices (and user behavior) has motivated device management tools that allow the management of devices and users in a consistent and scalable way. The overall role of MDM is to increase device supportability, security, and corporate functionality while maintaining some user flexibility.\r\nMany organizations administer devices and applications using MDM products/services. Mobile device management software primarily deals with corporate data segregation, securing emails, securing corporate documents on devices, enforcing corporate policies, integrating and managing mobile devices including laptops and handhelds of various categories. MDM implementations may be either on-premises or cloud-based.\r\nMDM functionality can include over-the-air distribution of applications, data and configuration settings for all types of mobile devices, including mobile phones, smartphones, tablet computers, ruggedized mobile computers, mobile printers, mobile POS devices, etc. Most recently laptops and desktops have been added to the list of systems supported as Mobile Device Management becomes more about basic device management and less about the mobile platform itself. \r\nSome of the <span style=\"font-weight: bold; \">core functions</span> of mobile management software include:\r\n<ul><li>Ensuring that diverse user equipment is configured to a consistent standard/supported set of applications, functions, or corporate policies</li><li>Updating equipment, applications, functions, or policies in a scalable manner</li><li>Ensuring that users use applications in a consistent and supportable manner</li><li>Ensuring that equipment performs consistently</li><li>Monitoring and tracking equipment (e.g. location, status, ownership, activity)</li><li>Being able to efficiently diagnose and troubleshoot equipment remotely</li></ul>\r\nDevice management solutions are leveraged for both company-owned and employee-owned (Bring Your Own Device) devices across the enterprise or mobile devices owned by consumers. Consumer demand for BYOD is now requiring a greater effort for MDM and increased security for both the devices and the enterprise they connect to, especially since employers and employees have different expectations concerning the types of restrictions that should be applied to mobile devices.\r\nBy controlling and protecting the data and configuration settings of all mobile devices in a network, enterprise device management software can reduce support costs and business risks. The intent of MDM is to optimize the functionality and security of a mobile communications network while minimizing cost and downtime.\r\nWith mobile devices becoming ubiquitous and applications flooding the market, mobile monitoring is growing in importance. The use of mobile device management across continues to grow at a steady pace, and is likely to register a compound annual growth rate (CAGR) of nearly 23% through 2028. The US will continue to be the largest market for mobile device management globally. ","materialsDescription":"<h1 class=\"align-center\">How Mobile Device Management works?</h1>\r\nMobile device management relies on endpoint software called an MDM agent and an MDM server that lives in a data center. IT administrators configure policies through the MDM server's management console, and the server then pushes those policies over the air to the MDM agent on the device. The agent applies the policies to the device by communicating with application programming interfaces (APIs) built directly into the device operating system.\r\nSimilarly, IT administrators can deploy applications to managed devices through the MDM server. Mobile software management emerged in the early 2000s as a way to control and secure the personal digital assistants and smartphones that business workers began to use. The consumer smartphone boom that started with the launch of the Apple iPhone in 2007 led to the bring your own device trend, which fueled further interest in MDM.\r\nModern MDM management software supports not only smartphones but also tablets, Windows 10 and macOS computers and even some internet of things devices. The practice of using MDM to control PCs is known as unified endpoint management.\r\n<h1 class=\"align-center\">Key Benefits of Mobile Device Management Software</h1>\r\n<span style=\"font-weight: bold;\">Reduce IT Administration.</span> Instead of manually configuring and testing each new mobile device, mobile device software takes care of the repetitive tasks for you. That gives IT staff more time to work on challenging projects that improve productivity.<span style=\"font-weight: bold;\"></span> \r\n<span style=\"font-weight: bold;\">Improve End-user Productivity. </span>Mobile device management helps end users become more productive because the process of requesting new mobile devices can be cut down from days to hours. Once end users have the device in their hands, mobile device management program helps them get set up on their corporate network much faster. That means less time waiting to get access to email, internal websites, and calendars.<span style=\"font-weight: bold;\"></span> \r\n<span style=\"font-weight: bold;\">Reduce IT Risk.</span> Mobile devices, especially if your organization allows “Bring Your Own Device” (BYOD), create increased risk exposures. Typically, IT managers respond to these risks in one of two ways, neither of which help. First, you may say “no” to mobile device requests. That’s a fast way to become unpopular. Second, you may take a manual approach to review and oversee each device.<span style=\"font-weight: bold;\"></span> \r\n<span style=\"font-weight: bold;\">Enable Enterprise Growth. </span>If your enterprise added a thousand employees this quarter through hiring, acquisition, or other changes, could IT handle the challenge? If you’re honest, you can probably imagine going through plenty of struggles and missing SLAs. That kind of disappointment and missed service expectations make end users respect IT less. \r\nBy using enterprise device management thoroughly, you'll enable enterprise growth. You'll have the systems and processes to manage 100 users or 10,000 users. That means IT will be perceived as enabling growth not standing in the way.\r\n\r\n","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_MDM_Mobile_Device_Management.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]}],"countries":[{"id":20,"title":"Belgium","name":"BEL"},{"id":47,"title":"Colombia","name":"COL"},{"id":177,"title":"Qatar","name":"QAT"},{"id":182,"title":"Saudi Arabia","name":"SAU"},{"id":187,"title":"Singapore","name":"SGP"},{"id":220,"title":"United States","name":"USA"}],"startDate":"0000-00-00","endDate":"0000-00-00","dealDate":"0000-00-00","price":0,"status":"finished","statusLabel":"Finished","isImplementation":true,"isAgreement":false,"confirmed":1,"implementationDetails":{"businessObjectives":{"id":14,"title":"Business objectives","translationKey":"businessObjectives","options":[{"id":4,"title":"Reduce Costs"},{"id":5,"title":"Enhance Staff Productivity"},{"id":6,"title":"Ensure Security and Business Continuity"},{"id":9,"title":"Support Decision Making"},{"id":254,"title":"Centralize management"}]},"businessProcesses":{"id":11,"title":"Business process","translationKey":"businessProcesses","options":[{"id":177,"title":"Decentralized IT systems"},{"id":178,"title":"No control over data access"},{"id":346,"title":"Shortage of inhouse IT resources"},{"id":348,"title":"No centralized control over IT systems"},{"id":371,"title":"No control over the state of communication channels"},{"id":375,"title":"No support for mobile and remote users"},{"id":378,"title":"Low employee productivity"},{"id":382,"title":"High costs of IT personnel"},{"id":383,"title":"Shortage of inhouse IT engineers"},{"id":400,"title":"High costs"}]}},"categories":[{"id":299,"title":"Application and User Session Virtualization","alias":"application-and-user-session-virtualization","description":"Application virtualization is a technology that allows you to separate the software from the operating system on which it operates. Fully virtualized software is not installed in the traditional sense, although the end-user at first glance can not see it, because the virtualized software works just as normal. The software in the execution process works just as if it interacted with the operating system directly and with all its resources, but can be isolated or executed in a sandbox with different levels of restriction.\r\nModern operating systems, such as Microsoft Windows and Linux, can include limited software virtualization. For example, Windows 7 has Windows XP mode that allows you to run Windows XP software on Windows 7 without any changes.\r\nUser session virtualization is a newer version of desktop virtualization that works at the operating system level. While normal virtualization of the desktop allows an operating system to be run by virtualizing the hardware of the desktop, RDS and App-V allow for the virtualization of the applications. User session virtualization lies between the two.\r\nA desktop has an operating system loaded on the base hardware. This can be either physical or virtual. The user session virtualization keeps track of all changes to the operating system that a user might make by encapsulating the configuration changes and associating them to the user account. This allows the specific changes to be applied to the underlying operating system without actually changing it. This allows several users to have completely different operating system configurations applied to base operating system installation.\r\nIf you are in a distributed desktop environment and there are local file servers available at each location, you can deploy virtualized user sessions in the form of redirected folders and roaming profiles.","materialsDescription":" <span style=\"font-weight: bold;\">Understanding application virtualization</span>\r\nApplication virtualization technology isolates applications from the underlying operating system and from other applications to increase compatibility and manageability. This application virtualization technology enables applications to be streamed from a centralized location into an isolation environment on the target device where they will execute. The application files, configuration, and settings are copied to the target device and the application execution at run time is controlled by the application virtualization layer. When executed, the application run time believes that it is interfacing directly with the operating system when, in fact, it is interfacing with a virtualization environment that proxies all requests to the operating system.\r\n<span style=\"font-weight: bold;\">Understanding session virtualization</span>\r\nSession virtualization uses application streaming to deliver applications to hosting servers in the datacenter. The Application then connects the user to the server. The application then executes entirely on the server. The user interacts with the application remotely by sending mouse-clicks and keystrokes to the server. The server then responds by sending screen updates back to the user’s device. Whereas application virtualization is limited to Windows-based operating systems, session virtualization allows any user on any operating system to access any application delivered by IT. As a result, the application enables Windows, Mac, Linux, iOS and Android devices to run any applications using session virtualization. Furthermore, session virtualization leverages server-side processing power which liberates IT from the endless cycle of PC hardware refreshes which are typically needed to support application upgrades when using traditional application deployment methods.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/Application_and_User_Session_Virtualization__1_.png"},{"id":3,"title":"MDM - Mobile Device Management","alias":"mdm-mobile-device-management","description":" <span style=\"font-weight: bold; \">Mobile device management (MDM)</span> is an industry term for the administration of mobile devices, such as smartphones, tablet computers and laptops. Device management system is usually implemented with the use of a third party product that has management features for particular vendors of mobile devices.\r\nMDM is typically a deployment of a combination of on-device applications and configurations, corporate policies and certificates, and backend infrastructure, for the purpose of simplifying and enhancing the IT management of end user devices. In modern corporate IT environments, the sheer number and diversity of managed devices (and user behavior) has motivated device management tools that allow the management of devices and users in a consistent and scalable way. The overall role of MDM is to increase device supportability, security, and corporate functionality while maintaining some user flexibility.\r\nMany organizations administer devices and applications using MDM products/services. Mobile device management software primarily deals with corporate data segregation, securing emails, securing corporate documents on devices, enforcing corporate policies, integrating and managing mobile devices including laptops and handhelds of various categories. MDM implementations may be either on-premises or cloud-based.\r\nMDM functionality can include over-the-air distribution of applications, data and configuration settings for all types of mobile devices, including mobile phones, smartphones, tablet computers, ruggedized mobile computers, mobile printers, mobile POS devices, etc. Most recently laptops and desktops have been added to the list of systems supported as Mobile Device Management becomes more about basic device management and less about the mobile platform itself. \r\nSome of the <span style=\"font-weight: bold; \">core functions</span> of mobile management software include:\r\n<ul><li>Ensuring that diverse user equipment is configured to a consistent standard/supported set of applications, functions, or corporate policies</li><li>Updating equipment, applications, functions, or policies in a scalable manner</li><li>Ensuring that users use applications in a consistent and supportable manner</li><li>Ensuring that equipment performs consistently</li><li>Monitoring and tracking equipment (e.g. location, status, ownership, activity)</li><li>Being able to efficiently diagnose and troubleshoot equipment remotely</li></ul>\r\nDevice management solutions are leveraged for both company-owned and employee-owned (Bring Your Own Device) devices across the enterprise or mobile devices owned by consumers. Consumer demand for BYOD is now requiring a greater effort for MDM and increased security for both the devices and the enterprise they connect to, especially since employers and employees have different expectations concerning the types of restrictions that should be applied to mobile devices.\r\nBy controlling and protecting the data and configuration settings of all mobile devices in a network, enterprise device management software can reduce support costs and business risks. The intent of MDM is to optimize the functionality and security of a mobile communications network while minimizing cost and downtime.\r\nWith mobile devices becoming ubiquitous and applications flooding the market, mobile monitoring is growing in importance. The use of mobile device management across continues to grow at a steady pace, and is likely to register a compound annual growth rate (CAGR) of nearly 23% through 2028. The US will continue to be the largest market for mobile device management globally. ","materialsDescription":"<h1 class=\"align-center\">How Mobile Device Management works?</h1>\r\nMobile device management relies on endpoint software called an MDM agent and an MDM server that lives in a data center. IT administrators configure policies through the MDM server's management console, and the server then pushes those policies over the air to the MDM agent on the device. The agent applies the policies to the device by communicating with application programming interfaces (APIs) built directly into the device operating system.\r\nSimilarly, IT administrators can deploy applications to managed devices through the MDM server. Mobile software management emerged in the early 2000s as a way to control and secure the personal digital assistants and smartphones that business workers began to use. The consumer smartphone boom that started with the launch of the Apple iPhone in 2007 led to the bring your own device trend, which fueled further interest in MDM.\r\nModern MDM management software supports not only smartphones but also tablets, Windows 10 and macOS computers and even some internet of things devices. The practice of using MDM to control PCs is known as unified endpoint management.\r\n<h1 class=\"align-center\">Key Benefits of Mobile Device Management Software</h1>\r\n<span style=\"font-weight: bold;\">Reduce IT Administration.</span> Instead of manually configuring and testing each new mobile device, mobile device software takes care of the repetitive tasks for you. That gives IT staff more time to work on challenging projects that improve productivity.<span style=\"font-weight: bold;\"></span> \r\n<span style=\"font-weight: bold;\">Improve End-user Productivity. </span>Mobile device management helps end users become more productive because the process of requesting new mobile devices can be cut down from days to hours. Once end users have the device in their hands, mobile device management program helps them get set up on their corporate network much faster. That means less time waiting to get access to email, internal websites, and calendars.<span style=\"font-weight: bold;\"></span> \r\n<span style=\"font-weight: bold;\">Reduce IT Risk.</span> Mobile devices, especially if your organization allows “Bring Your Own Device” (BYOD), create increased risk exposures. Typically, IT managers respond to these risks in one of two ways, neither of which help. First, you may say “no” to mobile device requests. That’s a fast way to become unpopular. Second, you may take a manual approach to review and oversee each device.<span style=\"font-weight: bold;\"></span> \r\n<span style=\"font-weight: bold;\">Enable Enterprise Growth. </span>If your enterprise added a thousand employees this quarter through hiring, acquisition, or other changes, could IT handle the challenge? If you’re honest, you can probably imagine going through plenty of struggles and missing SLAs. That kind of disappointment and missed service expectations make end users respect IT less. \r\nBy using enterprise device management thoroughly, you'll enable enterprise growth. You'll have the systems and processes to manage 100 users or 10,000 users. That means IT will be perceived as enabling growth not standing in the way.\r\n\r\n","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_MDM_Mobile_Device_Management.png"}],"additionalInfo":{"budgetNotExceeded":"-1","functionallyTaskAssignment":"-1","projectWasPut":"-1","price":0,"source":{"url":"https://www.citrix.ru/customers/chevron-phillips-chemical-company-en.html","title":"Web-site of vendor"}},"comments":[],"referencesCount":0},"citrix-workspace-for-manufacturer-of-wind-turbines":{"id":791,"title":"Citrix Workspace for manufacturer of wind turbines","description":" <span style=\"font-weight: bold;\">Лидер ветроэнергетики смотрит в будущее</span>\r\nОснованная в 1898 году как кузнечная мастерская в сельской Дании, Vestas многократно меняла свою деятельность - от производства кухонных приборов до изготовления гидравлических кранов и промежуточных охладителей для турбонагнетателей. Сегодня это ведущий мировой поставщик ветряных турбин.\r\nВ такой инновационной компании ИТ-организация должна быть ключевым игроком. «<span style=\"font-style: italic;\">Ответственность за новаторство в сфере ИТ лежит на нас»,</span> - говорит Кристоффер Николайсен, ИТ-архитектор Vestas. <span style=\"font-style: italic;\">«ИТ-специалисты не могут просто сидеть в подвале, присматривая за серверами и следя за тем, чтобы все работало нормально».</span>\r\nРынок устойчивой энергетики быстро развивается, и Николайсен и его коллеги по ИТ помогают держать Vestas в игре, постоянно укрепляя конкурентные позиции компании.\r\nДля этого они полагаются на Citrix. Решения Citrix помогают повысить производительность, улучшить работу на рабочем месте и обеспечить безопасность информации. Более того, они поддерживают традицию Vestas в области инноваций и совершенства.<br /><br /><span style=\"font-weight: bold;\">Гибкие решения повышают производительность для всех</span>\r\nУ Vestas есть разнообразная группа сотрудников: от рабочих, которые шлифуют лезвия на фабрике до инженеров, путешествующих по миру. Программное обеспечение для виртуализации Citrix XenApp и XenDesktop обеспечивает гибкость, необходимую Vestas для повышения производительности всех из них. Например, до недавнего времени работники огромных турбинных заводов компании ходили по длинным производственным линиям, проверяли тысячи точек качества и все еще использовали бумагу для заметок. Благодаря технологии Citrix Vestas автоматизирует этот процесс и повышает производительность.\r\nVestas теперь может принимать приложения, обычно доступные только в Windows, и представлять их на любом устройстве. А благодаря решению Citrix XenMobile Vestas может управлять устройствами, приложениями и контентом на собственных устройствах (BYO) и корпоративных устройствах по всему миру.\r\n<span style=\"font-style: italic;\">«Работа - это не место; это то, что вы делаете »,</span> - говорит Николайсен. <span style=\"font-style: italic;\">«XenDesktop и XenApp позволяют нашим пользователям работать так, как им удобно, так и наиболее продуктивно».</span> И успехи последовали. Теперь вместо того, чтобы потратить недели на адаптацию к новой системе и стилю работы, сотрудники продуктивно работают с первого дня.<br /><br /><span style=\"font-weight: bold;\">Безопасное сотрудничество защищает работу с третьими лицами</span>\r\nVestas поставляет автоматизированные проекты высокой четкости (CAD) консультантам в разных странах. <span style=\"font-style: italic;\">«У нас есть инженеры по всему миру, которые разрабатывают наши турбины», </span>- говорит Николайсен. <span style=\"font-style: italic;\">«Но мы не хотим, чтобы наша интеллектуальная собственность передавалась конкурентам, чтобы они могли вывести на рынок новую турбину».</span>\r\nРешения Citrix не только позволяют третьим сторонам получить доступ к проектам. HDX 3D Pro, набор технологий ускорения графики, оптимизирует виртуализацию богатых графических приложений и обеспечивает безопасное удаленное взаимодействие в режиме реального времени с проектными данными.\r\nРешения Citrix также позволяют Vestas быстрее и безопаснее подключать внешних консультантов, поскольку сотрудники могут создавать инфраструктуру виртуальных рабочих столов и предоставлять ее, как только они в ней нуждаются.<br /><br /><span style=\"font-weight: bold;\">100-процентное время безотказной работы обеспечивает исключительный пользовательский опыт</span>\r\nЧтобы оставаться конкурентоспособными, сегодня компании должны использовать преимущества облака. Но это преимущество испаряется, если доставка приложений ненадежна, а время безотказной работы не составляет 100 процентов. Vestas использует технологию Citrix NetScaler App Delivery Controller для обеспечения бесперебойной работы приложений и безупречной производительности.\r\nVestas может предоставлять приложения для гибридных и многокристальных архитектур с исключительным пользовательским интерфейсом. <span style=\"font-style: italic;\">«NetScaler ADC - это способ перенести различные решения в облако и связать их все вместе»</span>, - говорит Николайсен. <span style=\"font-style: italic;\">«Это очень важно, потому что наше ERP-решение и некоторые из наших приложений Microsoft находятся в облаке. Кроме того, мы хотим перенести XenMobile в облако. Нам нужен NetScaler, чтобы связать все эти части вместе ».</span><br /><span style=\"font-weight: bold;\"><br />Гибкие продукты делают будущую технологию реальностью уже сейчас</span>\r\nБудущее ИТ находится в конференц-зале, а не в серверной. Он поддерживает инновации и предоставляет сотрудникам новые способы лучше выполнять свою работу. Он доставляет прямые и релевантные приложения и данные быстро. Это дает людям возможность сосредоточиться на своих задачах, а не заниматься сложным пользовательским интерфейсом.\r\nVestas использует решения Citrix, чтобы сделать это будущее реальностью. ИТ-отдел может предоставить работникам единообразный опыт, помогая им сосредоточиться на своей работе. Например, пользователи могут использовать систему планирования ресурсов предприятия (ERP) на виртуальном рабочем столе или мобильном устройстве, и оно выглядит как собственное приложение, даже если оно размещено в центре обработки данных Vestas.\r\n<span style=\"font-style: italic;\">«Мы многому учимся, просто слушая наших пользователей, а не рассказывая им, что делать», </span>- говорит Томас Даугор, ИТ-архитектор Vestas. <span style=\"font-style: italic;\">«Это легче сказать, чем сделать. Часто ИТ-команда настолько занята обслуживанием систем, что у них нет времени слушать, учиться и внедрять инновации. Технология Citrix делает это возможным.</span>\r\n<span style=\"font-style: italic;\">«Citrix избавила нас от некоторых операционных проблем, с которыми мы столкнулись, и высвободила время для наших ИТ-специалистов для работы с бизнесом и выяснения того, как создавать решения для поддержки бизнеса»,</span> - говорит Даугор. <span style=\"font-style: italic;\">«И когда ИТ могут помочь бизнесу, это здорово. Я бы предпочел сделать это, чем работать с серверами и исправлять программное обеспечение в течение всего дня ».</span><br /><br /><br />","alias":"citrix-workspace-for-manufacturer-of-wind-turbines","roi":0,"seo":{"title":"Citrix Workspace for manufacturer of wind turbines","keywords":"","description":" <span style=\"font-weight: bold;\">Лидер ветроэнергетики смотрит в будущее</span>\r\nОснованная в 1898 году как кузнечная мастерская в сельской Дании, Vestas многократно меняла свою деятельность - от производства кухонных приборов до изготовления гидравлических к","og:title":"Citrix Workspace for manufacturer of wind turbines","og:description":" <span style=\"font-weight: bold;\">Лидер ветроэнергетики смотрит в будущее</span>\r\nОснованная в 1898 году как кузнечная мастерская в сельской Дании, Vestas многократно меняла свою деятельность - от производства кухонных приборов до изготовления гидравлических к"},"deal_info":"","user":{"id":5420,"title":"Vestas","logoURL":"https://old.roi4cio.com/uploads/roi/company/Vestas.jpeg","alias":"vestas","address":"","roles":[],"description":" Vestas Wind Systems A/S is a Danish manufacturer, seller, installer, and servicer of wind turbines founded in 1945. The company operates manufacturing plants in Denmark, Germany, India, Italy, Romania, the United Kingdom, Spain, Sweden, Norway, Australia, China, and the United States.\r\nVestas lives on the cutting edge. Founded in 1898 as a blacksmith shop in rural Denmark, it has reinvented itself many times—from manufacturing kitchen appliances to making hydraulic cranes and intercoolers for turbochargers. Today it is the world’s leading wind turbine supplier.\r\nVestas designs, manufactures, installs, and services wind turbines across the globe, and with 101 GW of wind turbines in 80 countries, it has installed more wind power than anyone else.\r\nThrough its industry-leading smart data capabilities and unparalleled 86 GW of wind turbines under service, Vestas uses data to interpret, forecast, and exploit wind resources and deliver best-in-class wind power solutions. Together with its customers, Vestas’ more than 24,600 employees are bringing the world sustainable energy solutions to power a bright future.<br /><br />","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":0,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":1,"supplierImplementationsCount":0,"vendorImplementationsCount":0,"vendorPartnersCount":0,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"https://www.vestas.com/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Vestas","keywords":"","description":" Vestas Wind Systems A/S is a Danish manufacturer, seller, installer, and servicer of wind turbines founded in 1945. The company operates manufacturing plants in Denmark, Germany, India, Italy, Romania, the United Kingdom, Spain, Sweden, Norway, Australia","og:title":"Vestas","og:description":" Vestas Wind Systems A/S is a Danish manufacturer, seller, installer, and servicer of wind turbines founded in 1945. The company operates manufacturing plants in Denmark, Germany, India, Italy, Romania, the United Kingdom, Spain, Sweden, Norway, Australia","og:image":"https://old.roi4cio.com/uploads/roi/company/Vestas.jpeg"},"eventUrl":""},"supplier":{"id":182,"title":"Citrix","logoURL":"https://old.roi4cio.com/uploads/roi/company/Citrix_Systems_logo.png","alias":"citrix","address":"","roles":[],"description":"Citrix was founded in 1989. The company specializes in virtualization technologies, cloud computing and network security.<br /><br />Citrix has become a renowned provider of multi-user solutions. The company's key advantage was the OS source code license that Citrix received from Microsoft. The use of its own optimized ICA data transfer protocol allowed Citrix to successfully compete in the market with other powerful players. The company's flagship product is Citrix Presentation Server (now XenApp).<br /><br />In addition, the company offers a range of solutions for working with clouds and deploying virtual desktop infrastructures (VDI):<br /><br />Citrix Endpoint Management is a single end-to-end solution for managing mobile devices and applications for consistent productivity.<br /><br />Citrix Workspace is a platform for bringing all applications and data together in a secure, unified and personalized workspace\r\n<br />Citrix Cloud is a suite of cloud services that simplifies deployment and management of Citrix technologies, allowing you to extend existing software landscapes.<br /><br />Citrix also offers software tools for working with hybrid and multicloud environments.<br /><br />In 2005, Citrix acquired NetScaler, a networking company and also a hardware vendor. In 2007, the company acquired XenSource, a virtualization developer based on Xen, an open source hypervisor. Hundreds of thousands of customers worldwide use Citrix solutions. The company currently employs about 8,500 employees. Citrix is headquartered in Fort Lauderdale, Florida, USA. ","companyTypes":[],"products":{},"vendoredProductsCount":8,"suppliedProductsCount":8,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":9,"vendorImplementationsCount":11,"vendorPartnersCount":0,"supplierPartnersCount":6,"b4r":0,"categories":{},"companyUrl":"https://www.citrix.com/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Citrix","keywords":"company, Citrix, with, Microsoft, remote, 1995, software, partnership","description":"Citrix was founded in 1989. The company specializes in virtualization technologies, cloud computing and network security.<br /><br />Citrix has become a renowned provider of multi-user solutions. The company's key advantage was the OS source code license that ","og:title":"Citrix","og:description":"Citrix was founded in 1989. The company specializes in virtualization technologies, cloud computing and network security.<br /><br />Citrix has become a renowned provider of multi-user solutions. The company's key advantage was the OS source code license that ","og:image":"https://old.roi4cio.com/uploads/roi/company/Citrix_Systems_logo.png"},"eventUrl":""},"vendors":[{"id":182,"title":"Citrix","logoURL":"https://old.roi4cio.com/uploads/roi/company/Citrix_Systems_logo.png","alias":"citrix","address":"","roles":[],"description":"Citrix was founded in 1989. The company specializes in virtualization technologies, cloud computing and network security.<br /><br />Citrix has become a renowned provider of multi-user solutions. The company's key advantage was the OS source code license that Citrix received from Microsoft. The use of its own optimized ICA data transfer protocol allowed Citrix to successfully compete in the market with other powerful players. The company's flagship product is Citrix Presentation Server (now XenApp).<br /><br />In addition, the company offers a range of solutions for working with clouds and deploying virtual desktop infrastructures (VDI):<br /><br />Citrix Endpoint Management is a single end-to-end solution for managing mobile devices and applications for consistent productivity.<br /><br />Citrix Workspace is a platform for bringing all applications and data together in a secure, unified and personalized workspace\r\n<br />Citrix Cloud is a suite of cloud services that simplifies deployment and management of Citrix technologies, allowing you to extend existing software landscapes.<br /><br />Citrix also offers software tools for working with hybrid and multicloud environments.<br /><br />In 2005, Citrix acquired NetScaler, a networking company and also a hardware vendor. In 2007, the company acquired XenSource, a virtualization developer based on Xen, an open source hypervisor. Hundreds of thousands of customers worldwide use Citrix solutions. The company currently employs about 8,500 employees. Citrix is headquartered in Fort Lauderdale, Florida, USA. ","companyTypes":[],"products":{},"vendoredProductsCount":8,"suppliedProductsCount":8,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":9,"vendorImplementationsCount":11,"vendorPartnersCount":0,"supplierPartnersCount":6,"b4r":0,"categories":{},"companyUrl":"https://www.citrix.com/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Citrix","keywords":"company, Citrix, with, Microsoft, remote, 1995, software, partnership","description":"Citrix was founded in 1989. The company specializes in virtualization technologies, cloud computing and network security.<br /><br />Citrix has become a renowned provider of multi-user solutions. The company's key advantage was the OS source code license that ","og:title":"Citrix","og:description":"Citrix was founded in 1989. The company specializes in virtualization technologies, cloud computing and network security.<br /><br />Citrix has become a renowned provider of multi-user solutions. The company's key advantage was the OS source code license that ","og:image":"https://old.roi4cio.com/uploads/roi/company/Citrix_Systems_logo.png"},"eventUrl":""}],"products":[{"id":137,"logo":false,"scheme":false,"title":"Citrix Virtual Apps and Desktops (XenApp and XenDesktop)","vendorVerified":0,"rating":"2.40","implementationsCount":7,"suppliersCount":0,"alias":"citrix-virtual-apps-and-desktops-xenapp-and-xendesktop","companyTypes":[],"description":" Only Citrix provides a complete virtual app and desktop solution to meet all your business needs. Give employees the freedom to work from anywhere while cutting IT costs. Deliver Windows, Linux, and web business applications or full virtual desktops from any cloud—public, on-premises or hybrid—within a modern digital workspace.\r\n\r\n<span style=\"font-weight: bold; \">The main features of Citrix Virtual Apps and Desktops:</span>\r\n<ul><li>HDX technology for optimized user experience</li></ul>\r\n<ul><li>Virtual Windows, Linux and web applications</li></ul>\r\n<ul><li>Single management console for apps and desktops</li></ul>\r\n<ul><li>Centralized security in the data center</li></ul>\r\n<ul><li>FIPS and Common Criteria certified</li></ul>\r\n<ul><li>Single image provisioning technology </li></ul>\r\n<ul><li>VDI desktops</li></ul>\r\n<ul><li>Remote PC access</li></ul>\r\n\r\n<span style=\"font-weight: bold; \">Unifying editions across the Citrix product portfolio</span>\r\n<ul><li>Citrix is also unifying product editions across its portfolio – designating them Standard, Advanced, and Premium.</li></ul>\r\n<ul><li>XenApp Advanced edition now will map to Citrix Virtual Apps Standard edition</li></ul>\r\n<ul><li>XenApp Enterprise edition maps to Citrix Virtual Apps Advanced edition</li></ul>\r\n<ul><li>XenApp Platinum edition maps to Citrix Virtual Apps Premium edition</li></ul>\r\n<ul><li>XenDesktop VDI edition maps to Citrix Virtual Desktops Standard edition</li></ul>\r\n<ul><li>XenDesktop Enterprise edition maps to Citrix Virtual Apps and Desktops Advanced edition</li></ul>\r\n<ul><li>XenDesktop Platinum edition maps Citrix Virtual Apps and Desktops Premium edition</li></ul>\r\nView a detailed feature matrix","shortDescription":"Citrix Virtual Apps and Desktops are virtualization solutions that give IT control of virtual machines, applications, licensing, and security, while providing anywhere access for any device.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":16,"sellingCount":20,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Citrix Virtual Apps and Desktops (XenApp and XenDesktop)","keywords":"Single, desktops, data, technology, XenApp, apps, applications, Published","description":" Only Citrix provides a complete virtual app and desktop solution to meet all your business needs. Give employees the freedom to work from anywhere while cutting IT costs. Deliver Windows, Linux, and web business applications or full virtual desktop","og:title":"Citrix Virtual Apps and Desktops (XenApp and XenDesktop)","og:description":" Only Citrix provides a complete virtual app and desktop solution to meet all your business needs. Give employees the freedom to work from anywhere while cutting IT costs. Deliver Windows, Linux, and web business applications or full virtual desktop"},"eventUrl":"","translationId":138,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":299,"title":"Application and User Session Virtualization","alias":"application-and-user-session-virtualization","description":"Application virtualization is a technology that allows you to separate the software from the operating system on which it operates. Fully virtualized software is not installed in the traditional sense, although the end-user at first glance can not see it, because the virtualized software works just as normal. The software in the execution process works just as if it interacted with the operating system directly and with all its resources, but can be isolated or executed in a sandbox with different levels of restriction.\r\nModern operating systems, such as Microsoft Windows and Linux, can include limited software virtualization. For example, Windows 7 has Windows XP mode that allows you to run Windows XP software on Windows 7 without any changes.\r\nUser session virtualization is a newer version of desktop virtualization that works at the operating system level. While normal virtualization of the desktop allows an operating system to be run by virtualizing the hardware of the desktop, RDS and App-V allow for the virtualization of the applications. User session virtualization lies between the two.\r\nA desktop has an operating system loaded on the base hardware. This can be either physical or virtual. The user session virtualization keeps track of all changes to the operating system that a user might make by encapsulating the configuration changes and associating them to the user account. This allows the specific changes to be applied to the underlying operating system without actually changing it. This allows several users to have completely different operating system configurations applied to base operating system installation.\r\nIf you are in a distributed desktop environment and there are local file servers available at each location, you can deploy virtualized user sessions in the form of redirected folders and roaming profiles.","materialsDescription":" <span style=\"font-weight: bold;\">Understanding application virtualization</span>\r\nApplication virtualization technology isolates applications from the underlying operating system and from other applications to increase compatibility and manageability. This application virtualization technology enables applications to be streamed from a centralized location into an isolation environment on the target device where they will execute. The application files, configuration, and settings are copied to the target device and the application execution at run time is controlled by the application virtualization layer. When executed, the application run time believes that it is interfacing directly with the operating system when, in fact, it is interfacing with a virtualization environment that proxies all requests to the operating system.\r\n<span style=\"font-weight: bold;\">Understanding session virtualization</span>\r\nSession virtualization uses application streaming to deliver applications to hosting servers in the datacenter. The Application then connects the user to the server. The application then executes entirely on the server. The user interacts with the application remotely by sending mouse-clicks and keystrokes to the server. The server then responds by sending screen updates back to the user’s device. Whereas application virtualization is limited to Windows-based operating systems, session virtualization allows any user on any operating system to access any application delivered by IT. As a result, the application enables Windows, Mac, Linux, iOS and Android devices to run any applications using session virtualization. Furthermore, session virtualization leverages server-side processing power which liberates IT from the endless cycle of PC hardware refreshes which are typically needed to support application upgrades when using traditional application deployment methods.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/Application_and_User_Session_Virtualization__1_.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":449,"logo":false,"scheme":false,"title":"Citrix Endpoint Management (XenMobile)","vendorVerified":0,"rating":"2.80","implementationsCount":7,"suppliersCount":0,"alias":"citrixendpointmanagementxenmobile","companyTypes":[],"description":"Endpoint Management provides Mobile Device Management (MDM) and Mobile App Management (MAM).<br /><br /><span style=\"font-weight: bold;\">MDM features of Endpoint Management let you:</span>\r\n<ul> <li>Deploy device policies and apps.</li> </ul>\r\n<ul> <li>Retrieve asset inventories.</li> </ul>\r\n<ul> <li>Carry out actions on devices, such as a device wipe.</li> </ul>\r\n\r\n<span style=\"font-weight: bold;\">MAM features of Endpoint Management let you:</span>\r\n<ul> <li>Secure apps and data on BYO mobile devices.</li> </ul>\r\n<ul> <li>Deliver enterprise mobile apps.</li> </ul>\r\n<ul> <li>Lock apps and wipe their data.</li> </ul>\r\n\r\n<span style=\"font-weight: bold;\">Withi a combination of MDM and MAM features, you can:</span>\r\n<ul> <li>Manage a corporate-issued device by using MDM</li> </ul>\r\n<ul> <li>Deploy device policies and apps</li> </ul>\r\n<ul> <li>Retrieve an asset inventory</li> </ul>\r\n<ul> <li>Wipe devices</li> </ul>\r\n<ul> <li>Deliver enterprise mobile apps</li> </ul>\r\n<ul> <li>Lock apps and wipe the data on devices</li> </ul>","shortDescription":"Citrix Endpoint Management (formerly XenMobile) is a solution for managing endpoints, offering mobile device management (MDM) and mobile application management (MAM) capabilities. \r\n","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":9,"sellingCount":0,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Citrix Endpoint Management (XenMobile)","keywords":"management, devices, with, endpoint, unified, workspace, device, Simplify","description":"Endpoint Management provides Mobile Device Management (MDM) and Mobile App Management (MAM).<br /><br /><span style=\"font-weight: bold;\">MDM features of Endpoint Management let you:</span>\r\n<ul> <li>Deploy device policies and apps.</li> </ul>\r\n<ul> <li>Retriev","og:title":"Citrix Endpoint Management (XenMobile)","og:description":"Endpoint Management provides Mobile Device Management (MDM) and Mobile App Management (MAM).<br /><br /><span style=\"font-weight: bold;\">MDM features of Endpoint Management let you:</span>\r\n<ul> <li>Deploy device policies and apps.</li> </ul>\r\n<ul> <li>Retriev"},"eventUrl":"","translationId":1062,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":449,"logo":false,"scheme":false,"title":"Citrix Endpoint Management (XenMobile)","vendorVerified":0,"rating":"2.80","implementationsCount":7,"suppliersCount":0,"alias":"citrixendpointmanagementxenmobile","companyTypes":[],"description":"Endpoint Management provides Mobile Device Management (MDM) and Mobile App Management (MAM).<br /><br /><span style=\"font-weight: bold;\">MDM features of Endpoint Management let you:</span>\r\n<ul> <li>Deploy device policies and apps.</li> </ul>\r\n<ul> <li>Retrieve asset inventories.</li> </ul>\r\n<ul> <li>Carry out actions on devices, such as a device wipe.</li> </ul>\r\n\r\n<span style=\"font-weight: bold;\">MAM features of Endpoint Management let you:</span>\r\n<ul> <li>Secure apps and data on BYO mobile devices.</li> </ul>\r\n<ul> <li>Deliver enterprise mobile apps.</li> </ul>\r\n<ul> <li>Lock apps and wipe their data.</li> </ul>\r\n\r\n<span style=\"font-weight: bold;\">Withi a combination of MDM and MAM features, you can:</span>\r\n<ul> <li>Manage a corporate-issued device by using MDM</li> </ul>\r\n<ul> <li>Deploy device policies and apps</li> </ul>\r\n<ul> <li>Retrieve an asset inventory</li> </ul>\r\n<ul> <li>Wipe devices</li> </ul>\r\n<ul> <li>Deliver enterprise mobile apps</li> </ul>\r\n<ul> <li>Lock apps and wipe the data on devices</li> </ul>","shortDescription":"Citrix Endpoint Management (formerly XenMobile) is a solution for managing endpoints, offering mobile device management (MDM) and mobile application management (MAM) capabilities. \r\n","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":9,"sellingCount":0,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Citrix Endpoint Management (XenMobile)","keywords":"management, devices, with, endpoint, unified, workspace, device, Simplify","description":"Endpoint Management provides Mobile Device Management (MDM) and Mobile App Management (MAM).<br /><br /><span style=\"font-weight: bold;\">MDM features of Endpoint Management let you:</span>\r\n<ul> <li>Deploy device policies and apps.</li> </ul>\r\n<ul> <li>Retriev","og:title":"Citrix Endpoint Management (XenMobile)","og:description":"Endpoint Management provides Mobile Device Management (MDM) and Mobile App Management (MAM).<br /><br /><span style=\"font-weight: bold;\">MDM features of Endpoint Management let you:</span>\r\n<ul> <li>Deploy device policies and apps.</li> </ul>\r\n<ul> <li>Retriev"},"eventUrl":"","translationId":1062,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":3132,"logo":false,"scheme":false,"title":"Citrix ADC (Application Delivery Controller)","vendorVerified":0,"rating":"2.80","implementationsCount":4,"suppliersCount":0,"alias":"citrix-adc-application-delivery-controller","companyTypes":[],"description":"<p><span style=\"color: #616161;\">ADCs have gained traction within the last decade, largely due to increased demand for legacy load balancing appliances to handle more advanced application delivery requirements and improve application performance.<br />Application delivery controllers are purpose-built networking appliances whose function is to improve the performance, security and resiliency of applications delivered over the web.</span></p>\r\n<p>Citrix ADC is an application delivery and load balancing solution that provides a high-quality user experience for your web, traditional, and cloud-native applications regardless of where they are hosted. It comes in a wide variety of form factors and deployment options without locking you into a single cloud. Pooled capacity licensing enables the movement of capacity among cloud deployments.</p>\r\n<p> </p>\r\n<p><span style=\"font-weight: bold;\">The main features of Citrix ADC:</span></p>\r\n<ul>\r\n<li>Provides industry-leading app delivery and load balancing</li>\r\n</ul>\r\n<ul>\r\n<li>Fully integrates with Cisco ACI; endorsed as a Cisco ACE replacement</li>\r\n</ul>\r\n<ul>\r\n<li>Offers the most comprehensive set of ADC features in the ACI ecosystem</li>\r\n</ul>\r\n<ul>\r\n<li>Enables automation and orchestration of network-critical services to boost agility</li>\r\n</ul>","shortDescription":"Citrix ADC is an application delivery and load balancing solution that provides a high-quality user experience for web, traditional, and cloud-native applications regardless of where they are hosted.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":15,"sellingCount":19,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Citrix ADC (Application Delivery Controller)","keywords":"","description":"<p><span style=\"color: #616161;\">ADCs have gained traction within the last decade, largely due to increased demand for legacy load balancing appliances to handle more advanced application delivery requirements and improve application performance.<br />Applicat","og:title":"Citrix ADC (Application Delivery Controller)","og:description":"<p><span style=\"color: #616161;\">ADCs have gained traction within the last decade, largely due to increased demand for legacy load balancing appliances to handle more advanced application delivery requirements and improve application performance.<br />Applicat"},"eventUrl":"","translationId":3135,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":481,"title":"WAF-web application firewall","alias":"waf-web-application-firewall","description":"A <span style=\"font-weight: bold; \">WAF (Web Application Firewall)</span> helps protect web applications by filtering and monitoring HTTP traffic between a web application and the Internet. It typically protects web applications from attacks such as cross-site forgery, cross-site-scripting (XSS), file inclusion, and SQL injection, among others. A WAF is a protocol layer 7 defense (in the OSI model), and is not designed to defend against all types of attacks. This method of attack mitigation is usually part of a suite of tools which together create a holistic defense against a range of attack vectors.\r\nIn recent years, web application security has become increasingly important, especially after web application attacks ranked as the most common reason for breaches, as reported in the Verizon Data Breach Investigations Report. WAFs have become a critical component of web application security, and guard against web application vulnerabilities while providing the ability to customize the security rules for each application. As WAF is inline with traffic, some functions are conveniently implemented by a load balancer.\r\nAccording to the PCI Security Standards Council, WAFs function as “a security policy enforcement point positioned between a web application and the client endpoint. This functionality can be implemented in software or hardware, running in an appliance device, or in a typical server running a common operating system. It may be a stand-alone device or integrated into other network components.”\r\nBy deploying a WAF firewall in front of a web application, a shield is placed between the web application and the Internet. While a proxy server protects a client machine’s identity by using an intermediary, a web firewall is a type of reverse-proxy, protecting the server from exposure by having clients pass through the WAF before reaching the server.\r\nA WAF operates through a set of rules often called <span style=\"font-weight: bold; \">policies.</span> These policies aim to protect against vulnerabilities in the application by filtering out malicious traffic. The value of a WAF management comes in part from the speed and ease with which policy modification can be implemented, allowing for faster response to varying attack vectors; during a DDoS attack, rate limiting can be quickly implemented by modifying WAF policies.\r\nWAF solutions can be deployed in several ways—it all depends on where your applications are deployed, the services needed, how you want to manage it, and the level of architectural flexibility and performance you require. Do you want to manage it yourself, or do you want to outsource that management? Is it a better model to have a cloud WAF service, option or do you want your WAF to sit on-premises?\r\n<p class=\"align-center\"><span style=\"font-weight: bold; \">A WAF products can be implemented one of three different ways:</span></p>\r\n<ul><li><span style=\"font-weight: bold; \">A network-based WAF</span> is generally hardware-based. Since they are installed locally they minimize latency, but network-based WAFs are the most expensive option and also require the storage and maintenance of physical equipment.</li><li><span style=\"font-weight: bold; \">A host-based WAF</span> may be fully integrated into an application’s software. This solution is less expensive than a network-based WAF and offers more customizability. The downside of a host-based WAF is the consumption of local server resources, implementation complexity, and maintenance costs. These components typically require engineering time, and may be costly.</li><li><span style=\"font-weight: bold; \">Cloud-based WAFs</span> offer an affordable option that is very easy to implement; they usually offer a turnkey installation that is as simple as a change in DNS to redirect traffic. Cloud-based WAFs also have a minimal upfront cost, as users pay monthly or annually for security as a service. Cloud-based WAFs can also offer a solution that is consistently updated to protect against the newest threats without any additional work or cost on the user’s end. The drawback of a cloud-based WAF is that users hand over the responsibility to a third-party, therefore some features of the WAF may be a black box to them. </li></ul>\r\n<p class=\"align-left\"> </p>\r\n\r\n","materialsDescription":"<p class=\"align-center\"><span style=\"color: rgb(97, 97, 97); \"><span style=\"font-weight: bold; \">What types of attack WAF prevents?</span></span></p>\r\n<p class=\"align-left\"><span style=\"color: rgb(97, 97, 97); \">WAFs can prevent many attacks, including:</span></p>\r\n<ul><li><span style=\"color: rgb(97, 97, 97); \">Cross-site Scripting (XSS) — Attackers inject client-side scripts into web pages viewed by other users.</span></li><li><span style=\"color: rgb(97, 97, 97); \">SQL injection — Malicious code is inserted or injected into an web entry field that allows attackers to compromise the application and underlying systems.</span></li><li><span style=\"color: rgb(97, 97, 97); \">Cookie poisoning — Modification of a cookie to gain unauthorized information about the user for purposes such as identity theft.</span></li><li><span style=\"color: rgb(97, 97, 97); \">Unvalidated input — Attackers tamper with HTTP request (including the url, headers and form fields) to bypass the site’s security mechanisms.</span></li><li><span style=\"color: rgb(97, 97, 97); \">Layer 7 DoS — An HTTP flood attack that utilizes valid requests in typical URL data retrievals.</span></li><li><span style=\"color: rgb(97, 97, 97); \">Web scraping — Data scraping used for extracting data from websites.</span><span style=\"font-weight: bold; \"></span></li></ul>\r\n<p class=\"align-center\"><span style=\"font-weight: bold; \">What are some WAFs Benefits?</span></p>\r\nWeb app firewall prevents attacks that try to take advantage of the vulnerabilities in web-based applications. The vulnerabilities are common in legacy applications or applications with poor coding or designs. WAFs handle the code deficiencies with custom rules or policies.\r\nIntelligent WAFs provide real-time insights into application traffic, performance, security and threat landscape. This visibility gives administrators the flexibility to respond to the most sophisticated attacks on protected applications.\r\nWhen the Open Web Application Security Project identifies the OWASP top vulnerabilities, WAFs allow administrators to create custom security rules to combat the list of potential attack methods. An intelligent WAF analyzes the security rules matching a particular transaction and provides a real-time view as attack patterns evolve. Based on this intelligence, the WAF can reduce false positives.\r\n<p class=\"align-center\"><span style=\"font-weight: bold; \">What is the difference between a firewall and a Web Application Firewall?</span></p>\r\nA traditional firewall protects the flow of information between servers while a web application firewall is able to filter traffic for a specific web application. Network firewalls and web application firewalls are complementary and can work together.\r\nTraditional security methods include network firewalls, intrusion detection systems (IDS) and intrusion prevention systems (IPS). They are effective at blocking bad L3-L4 traffic at the perimeter on the lower end (L3-L4) of the Open Systems Interconnection (OSI) model. Traditional firewalls cannot detect attacks in web applications because they do not understand Hypertext Transfer Protocol (HTTP) which occurs at layer 7 of the OSI model. They also only allow the port that sends and receives requested web pages from an HTTP server to be open or closed. This is why web application firewalls are effective for preventing attacks like SQL injections, session hijacking and Cross-Site Scripting (XSS).","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_WAF_web_application_firewall.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":3406,"logo":false,"scheme":false,"title":"Citrix Workspace","vendorVerified":0,"rating":"2.70","implementationsCount":2,"suppliersCount":0,"alias":"citrix-workspace","companyTypes":[],"description":"<p>With new workstyles and complex IT environments, it’s increasingly frustrating for people to get work done in a productive way. Employees are forced to remember numerous logins as they switch between applications—not to mention the time they can waste searching across locations for information. This is all while dealing with performance and security issues that can further hinder the employee experience. Citrix Workspace is the only solution that delivers a unified, secure and intelligent workspace that lets people do their best work while maintaining a high-quality user experience.</p>\r\n<p>With Citrix Workspace users get a seamless work experience regardless of the type of app, device, network, or location, without a lot of extra steps. IT maintains control and visibility of SaaS, mobile, virtual, and web apps with a simple and integrated solution that enhances user experience, giving them the best tool to work efficiently. <a class=\"external-link-new-window\" title=\"Opens internal link in current window\" href=\"https://www.citrix.com/products/citrix-workspace/\" target=\"_blank\" rel=\"noopener\">Compare </a>below to see which product best suits your business needs.</p>\r\n<p><span style=\"font-weight: bold;\">Citrix Workspace</span></p>\r\n<ul>\r\n<li>Provides employees a single, actionable view into all of their systems.</li>\r\n</ul>\r\n<ul>\r\n<li>Breaks down complex SaaS applications into single-purpose streamlined workflows.</li>\r\n</ul>\r\n<ul>\r\n<li>Automates work by pushing important information and tasks to any device, intranet or messenger.</li>\r\n</ul>\r\n<p><span style=\"font-weight: bold;\">Services included</span></p>\r\n<ul>\r\n<li>Citrix Virtual Apps and Desktops (formerly XenApp and XenDesktop Service)</li>\r\n</ul>\r\n<ul>\r\n<li>Citrix Endpoint Management (formerly XenMobile Service)</li>\r\n</ul>\r\n<ul>\r\n<li>Citrix Content Collaboration (ShareFile integration)</li>\r\n</ul>\r\n<ul>\r\n<li>Citrix Access Control</li>\r\n</ul>\r\n<ul>\r\n<li>Citrix Analytics</li>\r\n</ul>","shortDescription":"Combine the benefits of app and desktop virtualization, endpoint management, content collaboration and web/SaaS access control to deliver the secure digital workspace your business needs.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":3,"sellingCount":0,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Citrix Workspace","keywords":"","description":"<p>With new workstyles and complex IT environments, it’s increasingly frustrating for people to get work done in a productive way. Employees are forced to remember numerous logins as they switch between applications—not to mention the time they can","og:title":"Citrix Workspace","og:description":"<p>With new workstyles and complex IT environments, it’s increasingly frustrating for people to get work done in a productive way. Employees are forced to remember numerous logins as they switch between applications—not to mention the time they can"},"eventUrl":"","translationId":3407,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":3,"title":"MDM - Mobile Device Management","alias":"mdm-mobile-device-management","description":" <span style=\"font-weight: bold; \">Mobile device management (MDM)</span> is an industry term for the administration of mobile devices, such as smartphones, tablet computers and laptops. Device management system is usually implemented with the use of a third party product that has management features for particular vendors of mobile devices.\r\nMDM is typically a deployment of a combination of on-device applications and configurations, corporate policies and certificates, and backend infrastructure, for the purpose of simplifying and enhancing the IT management of end user devices. In modern corporate IT environments, the sheer number and diversity of managed devices (and user behavior) has motivated device management tools that allow the management of devices and users in a consistent and scalable way. The overall role of MDM is to increase device supportability, security, and corporate functionality while maintaining some user flexibility.\r\nMany organizations administer devices and applications using MDM products/services. Mobile device management software primarily deals with corporate data segregation, securing emails, securing corporate documents on devices, enforcing corporate policies, integrating and managing mobile devices including laptops and handhelds of various categories. MDM implementations may be either on-premises or cloud-based.\r\nMDM functionality can include over-the-air distribution of applications, data and configuration settings for all types of mobile devices, including mobile phones, smartphones, tablet computers, ruggedized mobile computers, mobile printers, mobile POS devices, etc. Most recently laptops and desktops have been added to the list of systems supported as Mobile Device Management becomes more about basic device management and less about the mobile platform itself. \r\nSome of the <span style=\"font-weight: bold; \">core functions</span> of mobile management software include:\r\n<ul><li>Ensuring that diverse user equipment is configured to a consistent standard/supported set of applications, functions, or corporate policies</li><li>Updating equipment, applications, functions, or policies in a scalable manner</li><li>Ensuring that users use applications in a consistent and supportable manner</li><li>Ensuring that equipment performs consistently</li><li>Monitoring and tracking equipment (e.g. location, status, ownership, activity)</li><li>Being able to efficiently diagnose and troubleshoot equipment remotely</li></ul>\r\nDevice management solutions are leveraged for both company-owned and employee-owned (Bring Your Own Device) devices across the enterprise or mobile devices owned by consumers. Consumer demand for BYOD is now requiring a greater effort for MDM and increased security for both the devices and the enterprise they connect to, especially since employers and employees have different expectations concerning the types of restrictions that should be applied to mobile devices.\r\nBy controlling and protecting the data and configuration settings of all mobile devices in a network, enterprise device management software can reduce support costs and business risks. The intent of MDM is to optimize the functionality and security of a mobile communications network while minimizing cost and downtime.\r\nWith mobile devices becoming ubiquitous and applications flooding the market, mobile monitoring is growing in importance. The use of mobile device management across continues to grow at a steady pace, and is likely to register a compound annual growth rate (CAGR) of nearly 23% through 2028. The US will continue to be the largest market for mobile device management globally. ","materialsDescription":"<h1 class=\"align-center\">How Mobile Device Management works?</h1>\r\nMobile device management relies on endpoint software called an MDM agent and an MDM server that lives in a data center. IT administrators configure policies through the MDM server's management console, and the server then pushes those policies over the air to the MDM agent on the device. The agent applies the policies to the device by communicating with application programming interfaces (APIs) built directly into the device operating system.\r\nSimilarly, IT administrators can deploy applications to managed devices through the MDM server. Mobile software management emerged in the early 2000s as a way to control and secure the personal digital assistants and smartphones that business workers began to use. The consumer smartphone boom that started with the launch of the Apple iPhone in 2007 led to the bring your own device trend, which fueled further interest in MDM.\r\nModern MDM management software supports not only smartphones but also tablets, Windows 10 and macOS computers and even some internet of things devices. The practice of using MDM to control PCs is known as unified endpoint management.\r\n<h1 class=\"align-center\">Key Benefits of Mobile Device Management Software</h1>\r\n<span style=\"font-weight: bold;\">Reduce IT Administration.</span> Instead of manually configuring and testing each new mobile device, mobile device software takes care of the repetitive tasks for you. That gives IT staff more time to work on challenging projects that improve productivity.<span style=\"font-weight: bold;\"></span> \r\n<span style=\"font-weight: bold;\">Improve End-user Productivity. </span>Mobile device management helps end users become more productive because the process of requesting new mobile devices can be cut down from days to hours. Once end users have the device in their hands, mobile device management program helps them get set up on their corporate network much faster. That means less time waiting to get access to email, internal websites, and calendars.<span style=\"font-weight: bold;\"></span> \r\n<span style=\"font-weight: bold;\">Reduce IT Risk.</span> Mobile devices, especially if your organization allows “Bring Your Own Device” (BYOD), create increased risk exposures. Typically, IT managers respond to these risks in one of two ways, neither of which help. First, you may say “no” to mobile device requests. That’s a fast way to become unpopular. Second, you may take a manual approach to review and oversee each device.<span style=\"font-weight: bold;\"></span> \r\n<span style=\"font-weight: bold;\">Enable Enterprise Growth. </span>If your enterprise added a thousand employees this quarter through hiring, acquisition, or other changes, could IT handle the challenge? If you’re honest, you can probably imagine going through plenty of struggles and missing SLAs. That kind of disappointment and missed service expectations make end users respect IT less. \r\nBy using enterprise device management thoroughly, you'll enable enterprise growth. You'll have the systems and processes to manage 100 users or 10,000 users. That means IT will be perceived as enabling growth not standing in the way.\r\n\r\n","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_MDM_Mobile_Device_Management.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]}],"countries":[],"startDate":"0000-00-00","endDate":"0000-00-00","dealDate":"0000-00-00","price":0,"status":"finished","statusLabel":"Finished","isImplementation":true,"isAgreement":false,"confirmed":1,"implementationDetails":{"businessObjectives":{"id":14,"title":"Business objectives","translationKey":"businessObjectives","options":[{"id":7,"title":"Improve Customer Service"},{"id":254,"title":"Centralize management"},{"id":307,"title":"Enhance Competitive Ability"},{"id":6,"title":"Ensure Security and Business Continuity"},{"id":5,"title":"Enhance Staff Productivity"}]},"businessProcesses":{"id":11,"title":"Business process","translationKey":"businessProcesses","options":[{"id":177,"title":"Decentralized IT systems"},{"id":178,"title":"No control over data access"},{"id":340,"title":"Low quality of customer service"},{"id":370,"title":"No automated business processes"},{"id":375,"title":"No support for mobile and remote users"},{"id":378,"title":"Low employee productivity"},{"id":386,"title":"Risk of lost access to data and IT systems"},{"id":398,"title":"Poor communication and coordination among staff"}]}},"categories":[{"id":299,"title":"Application and User Session Virtualization","alias":"application-and-user-session-virtualization","description":"Application virtualization is a technology that allows you to separate the software from the operating system on which it operates. Fully virtualized software is not installed in the traditional sense, although the end-user at first glance can not see it, because the virtualized software works just as normal. The software in the execution process works just as if it interacted with the operating system directly and with all its resources, but can be isolated or executed in a sandbox with different levels of restriction.\r\nModern operating systems, such as Microsoft Windows and Linux, can include limited software virtualization. For example, Windows 7 has Windows XP mode that allows you to run Windows XP software on Windows 7 without any changes.\r\nUser session virtualization is a newer version of desktop virtualization that works at the operating system level. While normal virtualization of the desktop allows an operating system to be run by virtualizing the hardware of the desktop, RDS and App-V allow for the virtualization of the applications. User session virtualization lies between the two.\r\nA desktop has an operating system loaded on the base hardware. This can be either physical or virtual. The user session virtualization keeps track of all changes to the operating system that a user might make by encapsulating the configuration changes and associating them to the user account. This allows the specific changes to be applied to the underlying operating system without actually changing it. This allows several users to have completely different operating system configurations applied to base operating system installation.\r\nIf you are in a distributed desktop environment and there are local file servers available at each location, you can deploy virtualized user sessions in the form of redirected folders and roaming profiles.","materialsDescription":" <span style=\"font-weight: bold;\">Understanding application virtualization</span>\r\nApplication virtualization technology isolates applications from the underlying operating system and from other applications to increase compatibility and manageability. This application virtualization technology enables applications to be streamed from a centralized location into an isolation environment on the target device where they will execute. The application files, configuration, and settings are copied to the target device and the application execution at run time is controlled by the application virtualization layer. When executed, the application run time believes that it is interfacing directly with the operating system when, in fact, it is interfacing with a virtualization environment that proxies all requests to the operating system.\r\n<span style=\"font-weight: bold;\">Understanding session virtualization</span>\r\nSession virtualization uses application streaming to deliver applications to hosting servers in the datacenter. The Application then connects the user to the server. The application then executes entirely on the server. The user interacts with the application remotely by sending mouse-clicks and keystrokes to the server. The server then responds by sending screen updates back to the user’s device. Whereas application virtualization is limited to Windows-based operating systems, session virtualization allows any user on any operating system to access any application delivered by IT. As a result, the application enables Windows, Mac, Linux, iOS and Android devices to run any applications using session virtualization. Furthermore, session virtualization leverages server-side processing power which liberates IT from the endless cycle of PC hardware refreshes which are typically needed to support application upgrades when using traditional application deployment methods.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/Application_and_User_Session_Virtualization__1_.png"},{"id":481,"title":"WAF-web application firewall","alias":"waf-web-application-firewall","description":"A <span style=\"font-weight: bold; \">WAF (Web Application Firewall)</span> helps protect web applications by filtering and monitoring HTTP traffic between a web application and the Internet. It typically protects web applications from attacks such as cross-site forgery, cross-site-scripting (XSS), file inclusion, and SQL injection, among others. A WAF is a protocol layer 7 defense (in the OSI model), and is not designed to defend against all types of attacks. This method of attack mitigation is usually part of a suite of tools which together create a holistic defense against a range of attack vectors.\r\nIn recent years, web application security has become increasingly important, especially after web application attacks ranked as the most common reason for breaches, as reported in the Verizon Data Breach Investigations Report. WAFs have become a critical component of web application security, and guard against web application vulnerabilities while providing the ability to customize the security rules for each application. As WAF is inline with traffic, some functions are conveniently implemented by a load balancer.\r\nAccording to the PCI Security Standards Council, WAFs function as “a security policy enforcement point positioned between a web application and the client endpoint. This functionality can be implemented in software or hardware, running in an appliance device, or in a typical server running a common operating system. It may be a stand-alone device or integrated into other network components.”\r\nBy deploying a WAF firewall in front of a web application, a shield is placed between the web application and the Internet. While a proxy server protects a client machine’s identity by using an intermediary, a web firewall is a type of reverse-proxy, protecting the server from exposure by having clients pass through the WAF before reaching the server.\r\nA WAF operates through a set of rules often called <span style=\"font-weight: bold; \">policies.</span> These policies aim to protect against vulnerabilities in the application by filtering out malicious traffic. The value of a WAF management comes in part from the speed and ease with which policy modification can be implemented, allowing for faster response to varying attack vectors; during a DDoS attack, rate limiting can be quickly implemented by modifying WAF policies.\r\nWAF solutions can be deployed in several ways—it all depends on where your applications are deployed, the services needed, how you want to manage it, and the level of architectural flexibility and performance you require. Do you want to manage it yourself, or do you want to outsource that management? Is it a better model to have a cloud WAF service, option or do you want your WAF to sit on-premises?\r\n<p class=\"align-center\"><span style=\"font-weight: bold; \">A WAF products can be implemented one of three different ways:</span></p>\r\n<ul><li><span style=\"font-weight: bold; \">A network-based WAF</span> is generally hardware-based. Since they are installed locally they minimize latency, but network-based WAFs are the most expensive option and also require the storage and maintenance of physical equipment.</li><li><span style=\"font-weight: bold; \">A host-based WAF</span> may be fully integrated into an application’s software. This solution is less expensive than a network-based WAF and offers more customizability. The downside of a host-based WAF is the consumption of local server resources, implementation complexity, and maintenance costs. These components typically require engineering time, and may be costly.</li><li><span style=\"font-weight: bold; \">Cloud-based WAFs</span> offer an affordable option that is very easy to implement; they usually offer a turnkey installation that is as simple as a change in DNS to redirect traffic. Cloud-based WAFs also have a minimal upfront cost, as users pay monthly or annually for security as a service. Cloud-based WAFs can also offer a solution that is consistently updated to protect against the newest threats without any additional work or cost on the user’s end. The drawback of a cloud-based WAF is that users hand over the responsibility to a third-party, therefore some features of the WAF may be a black box to them. </li></ul>\r\n<p class=\"align-left\"> </p>\r\n\r\n","materialsDescription":"<p class=\"align-center\"><span style=\"color: rgb(97, 97, 97); \"><span style=\"font-weight: bold; \">What types of attack WAF prevents?</span></span></p>\r\n<p class=\"align-left\"><span style=\"color: rgb(97, 97, 97); \">WAFs can prevent many attacks, including:</span></p>\r\n<ul><li><span style=\"color: rgb(97, 97, 97); \">Cross-site Scripting (XSS) — Attackers inject client-side scripts into web pages viewed by other users.</span></li><li><span style=\"color: rgb(97, 97, 97); \">SQL injection — Malicious code is inserted or injected into an web entry field that allows attackers to compromise the application and underlying systems.</span></li><li><span style=\"color: rgb(97, 97, 97); \">Cookie poisoning — Modification of a cookie to gain unauthorized information about the user for purposes such as identity theft.</span></li><li><span style=\"color: rgb(97, 97, 97); \">Unvalidated input — Attackers tamper with HTTP request (including the url, headers and form fields) to bypass the site’s security mechanisms.</span></li><li><span style=\"color: rgb(97, 97, 97); \">Layer 7 DoS — An HTTP flood attack that utilizes valid requests in typical URL data retrievals.</span></li><li><span style=\"color: rgb(97, 97, 97); \">Web scraping — Data scraping used for extracting data from websites.</span><span style=\"font-weight: bold; \"></span></li></ul>\r\n<p class=\"align-center\"><span style=\"font-weight: bold; \">What are some WAFs Benefits?</span></p>\r\nWeb app firewall prevents attacks that try to take advantage of the vulnerabilities in web-based applications. The vulnerabilities are common in legacy applications or applications with poor coding or designs. WAFs handle the code deficiencies with custom rules or policies.\r\nIntelligent WAFs provide real-time insights into application traffic, performance, security and threat landscape. This visibility gives administrators the flexibility to respond to the most sophisticated attacks on protected applications.\r\nWhen the Open Web Application Security Project identifies the OWASP top vulnerabilities, WAFs allow administrators to create custom security rules to combat the list of potential attack methods. An intelligent WAF analyzes the security rules matching a particular transaction and provides a real-time view as attack patterns evolve. Based on this intelligence, the WAF can reduce false positives.\r\n<p class=\"align-center\"><span style=\"font-weight: bold; \">What is the difference between a firewall and a Web Application Firewall?</span></p>\r\nA traditional firewall protects the flow of information between servers while a web application firewall is able to filter traffic for a specific web application. Network firewalls and web application firewalls are complementary and can work together.\r\nTraditional security methods include network firewalls, intrusion detection systems (IDS) and intrusion prevention systems (IPS). They are effective at blocking bad L3-L4 traffic at the perimeter on the lower end (L3-L4) of the Open Systems Interconnection (OSI) model. Traditional firewalls cannot detect attacks in web applications because they do not understand Hypertext Transfer Protocol (HTTP) which occurs at layer 7 of the OSI model. They also only allow the port that sends and receives requested web pages from an HTTP server to be open or closed. This is why web application firewalls are effective for preventing attacks like SQL injections, session hijacking and Cross-Site Scripting (XSS).","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_WAF_web_application_firewall.png"},{"id":3,"title":"MDM - Mobile Device Management","alias":"mdm-mobile-device-management","description":" <span style=\"font-weight: bold; \">Mobile device management (MDM)</span> is an industry term for the administration of mobile devices, such as smartphones, tablet computers and laptops. Device management system is usually implemented with the use of a third party product that has management features for particular vendors of mobile devices.\r\nMDM is typically a deployment of a combination of on-device applications and configurations, corporate policies and certificates, and backend infrastructure, for the purpose of simplifying and enhancing the IT management of end user devices. In modern corporate IT environments, the sheer number and diversity of managed devices (and user behavior) has motivated device management tools that allow the management of devices and users in a consistent and scalable way. The overall role of MDM is to increase device supportability, security, and corporate functionality while maintaining some user flexibility.\r\nMany organizations administer devices and applications using MDM products/services. Mobile device management software primarily deals with corporate data segregation, securing emails, securing corporate documents on devices, enforcing corporate policies, integrating and managing mobile devices including laptops and handhelds of various categories. MDM implementations may be either on-premises or cloud-based.\r\nMDM functionality can include over-the-air distribution of applications, data and configuration settings for all types of mobile devices, including mobile phones, smartphones, tablet computers, ruggedized mobile computers, mobile printers, mobile POS devices, etc. Most recently laptops and desktops have been added to the list of systems supported as Mobile Device Management becomes more about basic device management and less about the mobile platform itself. \r\nSome of the <span style=\"font-weight: bold; \">core functions</span> of mobile management software include:\r\n<ul><li>Ensuring that diverse user equipment is configured to a consistent standard/supported set of applications, functions, or corporate policies</li><li>Updating equipment, applications, functions, or policies in a scalable manner</li><li>Ensuring that users use applications in a consistent and supportable manner</li><li>Ensuring that equipment performs consistently</li><li>Monitoring and tracking equipment (e.g. location, status, ownership, activity)</li><li>Being able to efficiently diagnose and troubleshoot equipment remotely</li></ul>\r\nDevice management solutions are leveraged for both company-owned and employee-owned (Bring Your Own Device) devices across the enterprise or mobile devices owned by consumers. Consumer demand for BYOD is now requiring a greater effort for MDM and increased security for both the devices and the enterprise they connect to, especially since employers and employees have different expectations concerning the types of restrictions that should be applied to mobile devices.\r\nBy controlling and protecting the data and configuration settings of all mobile devices in a network, enterprise device management software can reduce support costs and business risks. The intent of MDM is to optimize the functionality and security of a mobile communications network while minimizing cost and downtime.\r\nWith mobile devices becoming ubiquitous and applications flooding the market, mobile monitoring is growing in importance. The use of mobile device management across continues to grow at a steady pace, and is likely to register a compound annual growth rate (CAGR) of nearly 23% through 2028. The US will continue to be the largest market for mobile device management globally. ","materialsDescription":"<h1 class=\"align-center\">How Mobile Device Management works?</h1>\r\nMobile device management relies on endpoint software called an MDM agent and an MDM server that lives in a data center. IT administrators configure policies through the MDM server's management console, and the server then pushes those policies over the air to the MDM agent on the device. The agent applies the policies to the device by communicating with application programming interfaces (APIs) built directly into the device operating system.\r\nSimilarly, IT administrators can deploy applications to managed devices through the MDM server. Mobile software management emerged in the early 2000s as a way to control and secure the personal digital assistants and smartphones that business workers began to use. The consumer smartphone boom that started with the launch of the Apple iPhone in 2007 led to the bring your own device trend, which fueled further interest in MDM.\r\nModern MDM management software supports not only smartphones but also tablets, Windows 10 and macOS computers and even some internet of things devices. The practice of using MDM to control PCs is known as unified endpoint management.\r\n<h1 class=\"align-center\">Key Benefits of Mobile Device Management Software</h1>\r\n<span style=\"font-weight: bold;\">Reduce IT Administration.</span> Instead of manually configuring and testing each new mobile device, mobile device software takes care of the repetitive tasks for you. That gives IT staff more time to work on challenging projects that improve productivity.<span style=\"font-weight: bold;\"></span> \r\n<span style=\"font-weight: bold;\">Improve End-user Productivity. </span>Mobile device management helps end users become more productive because the process of requesting new mobile devices can be cut down from days to hours. Once end users have the device in their hands, mobile device management program helps them get set up on their corporate network much faster. That means less time waiting to get access to email, internal websites, and calendars.<span style=\"font-weight: bold;\"></span> \r\n<span style=\"font-weight: bold;\">Reduce IT Risk.</span> Mobile devices, especially if your organization allows “Bring Your Own Device” (BYOD), create increased risk exposures. Typically, IT managers respond to these risks in one of two ways, neither of which help. First, you may say “no” to mobile device requests. That’s a fast way to become unpopular. Second, you may take a manual approach to review and oversee each device.<span style=\"font-weight: bold;\"></span> \r\n<span style=\"font-weight: bold;\">Enable Enterprise Growth. </span>If your enterprise added a thousand employees this quarter through hiring, acquisition, or other changes, could IT handle the challenge? If you’re honest, you can probably imagine going through plenty of struggles and missing SLAs. That kind of disappointment and missed service expectations make end users respect IT less. \r\nBy using enterprise device management thoroughly, you'll enable enterprise growth. You'll have the systems and processes to manage 100 users or 10,000 users. That means IT will be perceived as enabling growth not standing in the way.\r\n\r\n","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_MDM_Mobile_Device_Management.png"}],"additionalInfo":{"budgetNotExceeded":"-1","functionallyTaskAssignment":"-1","projectWasPut":"-1","price":0,"source":{"url":"https://www.citrix.ru/customers/vestas-en.html","title":"Web-site of vendor"}},"comments":[],"referencesCount":0}},"aliases":{"1":["citrix-for-petrochemical-company","citrix-workspace-for-manufacturer-of-wind-turbines"]},"links":{"first":"http://b4r_be/api/implementations?page=1","last":"http://b4r_be/api/implementations?page=1","prev":null,"next":null},"meta":{"current_page":1,"from":1,"last_page":1,"path":"http://b4r_be/api/implementations","per_page":20,"to":2,"total":2},"loading":false,"error":null},"agreements":{"agreementById":{},"ids":{},"links":{},"meta":{},"loading":false,"error":null},"comparison":{"loading":false,"error":false,"templatesById":{},"comparisonByTemplateId":{},"products":[],"selectedTemplateId":null},"presentation":{"type":null,"company":{},"products":[],"partners":[],"formData":{},"dataLoading":false,"dataError":false,"loading":false,"error":false},"catalogsGlobal":{"subMenuItemTitle":""}}