1.How many X86 servers do you have? Are you running any HP equipment in your data center? 2.What mission critical applications are you running on these.

Slides:



Advertisements
Similar presentations
Embrace Mobility. Without Compromise. The apps they need. On the devices they want. Without sacrificing compliance. Strategic Approach to Mobile Security.
Advertisements

Paul Roberts – Enterprise Mobility Specialist
1 1 March 20, 2014 A SIMPLE APPROACH TO BYOD. WHAT THEY DONT WANT IS: Company monitoring of their personal activities or restriction of the apps they.
2  Industry trends and challenges  Windows Server 2012: Modern workstyle, enabled  Access from virtually anywhere, any device  Full Windows experience.
 What Is Desktop Virtualization?  How Does Application Virtualization Help?  How does V3 Systems help?  Getting Started AGENDA.
Which server is right for you? Get in Contact with us
© 2009 VMware Inc. All rights reserved VMware Horizon Mobile Intro - NetHope Deepak Puri Director Mobile Business Development +1 (415)
Windows 8.1 Device Management With Windows Intune Mark O’Shea MVP Windows Expert – IT Pro 30 June 2014.
Avaya – Proprietary. Use pursuant to the terms of your signed agreement or Company policy. idEngines® Avaya Identity Engines And Mobile Device Management.
WCL317 Disclaimer The information in this presentation relates to a pre-released product which may be substantially modified before it’s commercially.
SAP Travel OnDemand Travel and Expense Management
Iron Mountain’s Continuity Service ©2006 Iron Mountain Incorporated. All rights reserved. Iron Mountain and the design of the mountain are registered.
Network and Server Basics. 6/1/20152 Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server.
4/17/2017 © 2014 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks.
Empower Enterprise Mobility. of employees use personal devices for work purposes.* of employees that typically work on employer premises, also frequently.
SAM for Mobile Device Management Presenter Name. of employees spend at least some portion of their time working outside their office. Mobility is the.
IOS 8 for MDM/EMM Greg Elliott Shiv Chandra Kumar.
Software Distribution in Microsoft System Center Configuration Manager v.Next: Part 1.
MobileFirst Protect 1. MobileFirst Protect (MaaS360) 2 Mobile Device Management Enable and Manage Apple iOS smartphones, and tablets with Apple DEP Gain.
Windows Server 2012 R2 Capabilities for BYOD Scenario Yuri Diogenes Senior Knowledge Engineer Data Center, Devices & Enterprise Client – CSI Team’s Page:
Be there without going there. Microsoft Lync is an enterprise-ready, unified communications platform that connects users everywhere, providing a consistent,
Office 365: Efficient Cloud Solutions Wednesday March 12, 9AM Chaz Vossburg / Gabe Laushbaugh.
Empower Enterprise Mobility Jasbir Gill Azure Mobility.
Customer Sales Presentation Stoneware webNetwork Powered by ThinkServer.
Mobility Without Vulnerability: Secure and Enable Your Mobile Users, Apps, and Devices David Clapp – Intuitive.
1 Managed Security. 2 Managed Security provides a comprehensive suite of security services to manage and protect your network assets –Managed Firewall.
Jacob Hjenner Country manager. Revenue ($M) EPS Total Revenue Adjusted EPS Year *Based on Consensus Estimates Access Collaboration Networking Virtualization.
CredoGov VDI Introduction James Gunn
Empowering Your Users-Security & Mobility Bil Martin 1.
…. PrePlanPrepareMigratePost Pre- Deployment PlanPrepareMigrate Post- Deployment First Mailbox.
Solutions Road Show – 13 December 2013 | India Alok Agrawal Practice Lead – UC & C Communication and Collaboration.
Empowering people-centric IT Unified device management Access and information protection Desktop Virtualization Hybrid Identity.
One Platform, One Solution: eToken TMS 5.1 Customer Presentation November 2009.
July, 2012 Citrix CloudGateway™ Technical Overview.
Access and Information Protection Product Overview Andrew McMurray Technical Evangelist – Windows
- NCSU project goals and requirements - Adoption Drivers - Current challenges and pain points - Identacor at NCSU - Identacor Features - NCSU Key Benefits.
Lior Rubin PTS. What is it ? o The Microsoft Enterprise Mobility Suite (EMS) helps give users a more secure and integrated productivity experience with.
FND2851. Mobile First | Cloud First Sixty-one percent of workers mix personal and work tasks on their devices* >Seventy-five percent of network intrusions.
Access resources in a federation partner organization.
User and Device Management
What’s New Data Loss Prevention 14. Information is Everywhere Brings Productivity, Agility, Convenience ……and Problems Copyright © 2015 Symantec Corporation.
Craig Pringle & Derek Moir
Why EMS? What benefit does EMS provide O365 customers Manage Mobile Productivity Increase IT ProductivitySimplify app delivery and deployment LOB Apps.
BYOD: An IT Security Perspective. What is BYOD? Bring your own device - refers to the policy of permitting employees to bring personally owned mobile.
Enterprise Mobility Suite: Simplify security, stay productive Protect data and empower workers Unsecured company data can cost millions in lost research,
Citrix ShareFile. Instant file access from any device Sharing and collaboration—with anyone Easy & Familiar (love Dropbox) USERS DEMAND Security Control.
Tomaž Čebul Principal Consultant Microsoft Bring Your Own Device, kaj pa je to?
Mobile Security Solution Solution Overview Check Point Mobile Threat Prevention is an innovative approach to mobile security that detects and stops advanced.
Network and Server Basics. Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server network.
Today’s challenges Data Users Apps Devices
The time to address enterprise mobility is now
How to Define a Successful Mobility Strategy
Product Specialist Enterprise Mobility Technical Readiness EMEA
Mobile Data Solutions Inc
Hybrid Management and Security
Styr på filopbevaring og fildeling
SaaS Application Deep Dive
Azure AD for the client management guy (or gal!)
Microsoft 365 Business Customer Targeting 2/6/18
Microsoft Intune MAM without Device Enrollment
Skyhigh Enables Enterprises to Use Productivity Tools of Microsoft Office 365 While Meeting Their Security, Compliance & Governance Requirements Partner.
11/19/2018 4:38 AM Microsoft 365 Business Customer Targeting Janine Brittain - EXEED 2/6/18 © Microsoft Corporation. All rights reserved. MICROSOFT.
Microsoft Virtual Academy
Access and Information Protection Product Overview October 2013
Microsoft Ignite NZ October 2016 SKYCITY, Auckland
Office 365 and Microsoft Project Integrations for HULAK Project Management Software Enable Teams to Remain Productive and Within Budget OFFICE 365 APP.
4/9/ :42 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
System Center Marketing
TechEd /6/ :24 PM © 2013 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks.
Microsoft 365 Business Technical Fundamentals Series
Presentation transcript:

1.How many X86 servers do you have? Are you running any HP equipment in your data center? 2.What mission critical applications are you running on these servers. Database? ERP? HR? 3.Most organizations have a standard refresh cycle, can you tell me about yours? 4.How many are reaching end of life or coming off warranty? 5.Where are you in your virtualization process? VMware? Hyper-V? Citrix? 6.How many servers will you add as you continue virtualizing? 7.Are you aware that HP Blade Racks can house UNIX, x86, network switches and power all in the same unit? The reason for my call… … calling on behalf of Citrix. We want to make sure you’ve heard about our new enterprise mobility solutions and ask what types of mobility/BYO initiatives you are looking at this year to make users as productive on-the- go as they are in the office. I was under the impression that you handle these solutions for your organization? In considering mobility solutions, we’ve found that most companies are looking for: ► Security – It’s essential to keep corporate apps and data safe. IT needs to easily set policies and restrictions that only allow authorized users to access each app. In addition, IT must have the ability to lock and/or wipe corporate apps & data on mobile devices in case of theft or loss ► User experience – Users need to have easy access to all their corporate apps/resources anywhere on any device with a rich, consistent experience ► Simple management – Integrated solution for IT to easily deploy all types of apps, provision accounts and manage access and usage policies Server Questions What are XenMobile MDM and the Mobile Solutions Bundle? Citrix Mobile Solutions Bundle Summary of Value Propositions Give users device and app choice without impacting compliance requirements Deliver beautiful productivity apps that users love and IT embraces Enable the business by allowing simple, anywhere access to apps Provide advanced app and data access controls to keep users happy while assuring secure data. Strategic Feature List for Mobile Solutions Bundle: 1Enterprise MDM. XenMobile MDM delivers role- based management, configuration and security for both corporate and employee-owned devices. Users can self-service enroll their devices and IT can auto- provision policies and apps to those devices, blacklist or whitelist apps, detect and protect against jailbroken devices, and selectively wipe a device that is lost, stolen or out of compliance. 2Secure , browser and data sharing apps. Key productivity apps from Citrix that users need to get their and ShareFile integration deliver a rich user experience with the management and control that IT requires. Users get , calendar, contacts, a full browser for access to intranet and extranet sites, and data access from anywhere – all secured with Citrix MDX technologies in a sandboxed mobile container. 3Mobile app containers. IT can centralize management, security and control for any mobile app, whether created by a third party or enterprise IT. With MDX, corporate apps and data reside in a container, separated from personal apps and data. This allows IT to set comprehensive policy-based controls, including mobile DLP and the ability to remote lock, wipe and encrypt apps and data. 4 Unified app store. Provides a single place for users to access all of their apps – mobile, web, SaaS, and Windows – on any device. Users can easily access the apps they need for their job. As they move among their favorite devices, their chosen apps follow them to ensure full productivity. 5Identity management, single sign-on and scenario-based access control. IT can manage user access and radically simplify the user experience. The solution leverages users’ identities from the enterprise directory to instantly provision and de- provision app and data access, as well as set granular access controls based on the device and user scenario at any point in time. Through the unified app store, users get single sign-on to all of their approved apps and can easily request access to apps for which they are not currently authorized. Buying Questions 1. How do you handle user mobility needs and their requests to use personal devices for work? What devices are most used? 2.What security concerns do you have with employees sharing and accessing data and with unsecured services and devices? 3. Do you have specific regulatory compliance requirements? Which ones? What technologies do you use to fulfill those requirements – especially when users work from personal, unmanaged mobile devices? 4.How do your workers remotely access their apps and data? Does this method and experience change as users shift to different devices and/or apps? 5.Do you have a secure mobile solution? If yes, which one? If no, how do users access from mobile devices? 6.Do you deliver other mobile apps besides to users? How do you securely deploy mobile apps? 7.How do you deploy web, SaaS and Windows apps? Do users access all apps from a single ‘store?’ 8.Are you considering mobility initiatives such as BYO? If yes, how will you secure and deliver the business apps and data on BYO devices without impacting users' personal content? And how will you manage the devices? Titles to Target: Director of IT/Messaging/Security/ Mobility/LOB, Project Lead, CIO XenMobile MDM delivers role-based management, configuration and security for both corporate and employee-owned devices. Users can self-service enroll their devices and IT can provision policies and apps to those devices automatically, blacklist or whitelist apps, detect and protect against jailbroken devices, and wipe or selectively wipe a device that is lost, stolen or out of compliance. Users can use any device they choose, while IT can ensure compliance of corporate assets and secure corporate content on the device. The Citrix Mobile Solutions Bundle, which is comprised of XenMobile MDM and CloudGateway, is an enterprise mobility management solution that enables complete and secure mobile device, app and data freedom. Employees gain quick, single-click access to all their mobile, web, datacenter and Windows apps from a unified app store, including beautiful productivity apps that seamlessly integrate to offer a great user experience. The solution provides identity-based provisioning and control for all apps, data and devices, policy-based controls, such as restriction of application access to authorized users, automatic account de- provisioning for terminated employees and selective wipe of apps and data stored on lost, stolen or out-of- compliance devices. With the Mobile Solutions Bundle, IT can meet users’ desire for device choice while preventing data leakage and protecting the internal network from mobile threats.

Citrix XenMobile Make the appointment 1.Perfect. From what I gather you would be a good fit for Citrix mobile solutions. Do you have your calendar open? 2.Let’s go over how this will work… To give you a little more detail, this initial chat is to review your current technologies and IT initiatives; and give you a high-level overview of Citrix’s comprehensive mobile solutions. The first step is a brief phone call with the Citrix rep who will contact you to review the information we discussed and provide more details on our mobile solutions. Are you available on DATE at TIME? 3.Great! What is your direct line and . Can you confirm your job title? 4.In the meantime, I’d like to direct you to a site with additional resources like video demos & white papers created for our mobile solutions as well as our site for trying out Citrix Receiver with XenMobile MDM, CloudGateway, XenDesktop and Xenapp. I will it to you with the meeting request. Is that o.k.? 5.Thanks for sharing this information, the Citrix rep will give you a call on DATE at TIME.