Upload
others
View
0
Download
0
Embed Size (px)
Citation preview
$2.21B revenue in 2011
6,900 employees worldwide
10,000+ partners in 100
countries
100% of Fortune 500
250,000+ customers
#1 Desktop & App virtualization
75% of internet users
80% of Public Clouds
Top 5 SaaS vendor
By the numbers…
Consumerization
Consumerization
will force more IT
change over the
next 10 years
than any other
trend.
60% Growth in US employee-owned computers from
2009 to 2010
Source: Gartner, Checklist for an Employee-Owned Notebook or PC Program. ID Number: G00174917. March 11, 2010
IT
is at the center
managing structured systems,
apps and data
Data Apps
Data
is tied to apps and
devices
Apps
are large corporate
systems managed
by IT
IT
is at the center
managing structured systems,
apps and data
Devices
are standardized by
IT
to simplify support
Data Apps
Data
is tied to apps and
devices
Apps
are large corporate
systems managed
by IT
IT
is at the center
managing structured systems,
apps and data
Devices
are standardized by
IT
to simplify support
Data Apps
Data
is tied to apps and
devices
Apps
are large corporate
systems managed
by IT
IT
is at the center
managing structured systems,
apps and data
People
are thought of as
users of IT systems
Users Users Users Users Users
What IT wants
#@!*$
What IT wants What our users
want
What IT wants What our users
want
#@!*$
People
are at the center
with internal and external
relationships created
organically by users
Data Apps
Data
is available as
needed, independent
of app or device
Apps
include a vast array
of internal and
external tools
People
are at the center
with internal and external
relationships created
organically by users
Devices
are chosen by people
based on convenience,
task and location
Data Apps
Data
is available as
needed, independent
of app or device
Apps
include a vast array
of internal and
external tools
People
are at the center
with internal and external
relationships created
organically by users
Devices
are chosen by people
based on convenience,
task and location
Data Apps
Data
is available as
needed, independent
of app or device
Apps
include a vast array
of internal and
external tools
People
are at the center
with internal and external
relationships created
organically by users
IT
provides
governance and
service delivery
• Employee chooses the laptop & OS
• Same experience as a managed device
• Reduce dependency on IT
• Self Service via our BYOC website
• Control the service, not the hardware
• Simple to participate
Survey Your
Employees
Stipend Corporate
Policies
Security Program
Rules
Family PC | Work PC Personal Laptop | Tablet |
Smartphone
“How many different
computing devices do you use on a
daily basis?”
1 2 3 4 5+ Worldwide Survey of Corporate Employees
February 2011, Citrix Systems
42%
34%
16%
6%
2%
Employees were enthused
Their choice was outside what IT offered
Willing to take on the added responsibility
Believed they would be more productive and also happier
5 4 3 2 1 Start with an internal survey
Employees were enthused
Their choice was outside what IT offered
Willing to take on the added responsibility
Believed they would be more productive and also happier
5 4 3 2 1 Start with an internal survey
5 4 3 2 1
IT was also enthused
Reduce dependency on IT to procure and manage laptops
Believed we would save both time and expense
Felt it was important to keep it simple and provide it as self service
Start with an internal survey
5 4 3 2 1
IT was also enthused
Reduce dependency on IT to procure and manage laptops
Believed we would save both time and expense
Felt it was important to keep it simple and provide it as self service
Start with an internal survey
Identify existing cost, then the Stipend 5 4 3 2 1
Retire
Back-up
Maintain
Monitor
Deploy
Secure
Image
Procure
Identify existing cost, then the Stipend 5 4 3 2 1
Retire
Back-up
Maintain
Monitor
Deploy
Secure
Image
Procure
Three Year Cost:
$2,500 ~ $2,600
Identify existing cost, then the Stipend 5 4 3 2 1
Retire
Back-up
Maintain
Monitor
Deploy
Secure
Image
Procure
$2,100 Stipend
5 2 1
Do your existing policies apply ?
Our focus was to keep the rules the same for all
Policies are in effect for managed and BYOC devices
Review the program with HR and Legal 3 4
5 2 1
Do your existing policies apply ?
Our focus was to keep the rules the same for all
Policies are in effect for managed and BYOC devices
Review the program with HR and Legal 3 4
We Found That All Existing Policies Did
In Fact, Apply to BYOC Participants
Network
SSO
Active Directory
App Virtualization
Antivirus
Two-factor Authentication
Perimeter Firewall
Intrusion Detection and Prevention
(IDS / IPS)
Web Filtering
Threat Management
Citrix
Receiver
Access
Gateway
SSL VPN
XenApp™
XenDesktop™
Data
Center
3 2 1 Review your existing security 4 5
Network
SSO
Active Directory
App Virtualization
Antivirus
Two-factor Authentication
Perimeter Firewall
Intrusion Detection and Prevention
(IDS / IPS)
Web Filtering
Threat Management
Citrix
Receiver
Access
Gateway
SSL VPN
XenApp™
XenDesktop™
Data
Center
3 2 1 Review your existing security 4 5
Develop the rules, then present the concept
4 2 1
3 5
Develop the rules, then present the concept
1.
2.
3.
4 2 1
3 5
Develop the rules, then present the concept
1.
2.
3.
4.
5.
4 2 1
3 5
Develop the rules, then present the concept
1.
2.
3.
4.
5.
4 2 1
6.
7.
8.
9.
10.
3 5
BYOC Website
Self Service Website
Program description and rules
Enrollment
Getting Started
Extras
Simple Website
To Assist Users
1. Manager's approval
2. Receive $2,100 stipend
3. Laptop and 3 year maintenance
4. Return your managed laptop
5. Manager retains returned laptop
6. Vendor addresses hardware issues
7. Antivirus required
8. Connect via the Receiver™/ Access Gateway
9. Apps provided online and offline
10. All corporate polices apply
Program Rules Page
Review Policy
Check Agreement Box
Click Submit
Enrollment Page
Review + Submit
Discount on purchases
Download the Citrix Receiver and Antivirus
Section for Windows and Mac
Getting Started Page
Windows + Mac
Discounts
User Experience
Download The Receiver
Download the
Receiver from your
website
Citrix Confidential - Do Not Distribute
Download The Receiver
Download the
Receiver from your
website
Citrix Confidential - Do Not Distribute
Receiver installs multiple plug-ins:
SSL VPN
Online / Offline
Accelerator
Encrypted Data Plug-in (XenVault)
Download The Receiver
Citrix Confidential - Do Not Distribute
Self-Service Application Store
Select the Apps yourself
IT manages the store
Launch Receiver
Various
Applications
User Provisions Their Apps
Drag + Drop
Applications
Create Your Folders
User Provisions Their Apps
Drag + Drop
Applications
Create Your Folders
• Survey
• Stipend
• Review Corporate Policies
• Security
• Program Rules
• Survey
• Stipend
• Review Corporate Policies
• Security
• Program Rules
• Keep it simple
• Same user experience
• Website enables self-service
• Deliver program as a service
• Empower your users
Self-service
Choice of device
Virtual workstyles
Users get…
More strategic focus
Security and compliance
Freedom from device support
IT gets… Management gets…
Competitive edge
Higher productivity
Employee satisfaction