Analyst Report & Reviews ()
|
250KB
|
CIO Magazine Executive View Point with Kurt Roemer
Chief security strategist, Kurt Roemer, highlights how centralized virtual desktops and data enables companies to protect sensitive information while giving users more flexibility and choice.
Oct 6, 2011
|
Brochures & Data sheets ()
|
1MB
|
Citrix XenDesktop Visão Geral do Produto
O Citrix® XenDesktop® transforma os desktops Windows® em um serviço ondemand disponível para qualquer usuário, qualquer dispositivo, em qualquer lugar. O XenDesktop entrega, com rapidez e segurança, qualquer tipo de desktop virtual ou aplicativos Windows, web e SaaS para todos os PCs, Macs, tablets, smartphones, laptops e thin clients - isso tudo com uma experiência de alta definição para o usuário.
Mar 21, 2013
|
|
222KB
|
Windows XP Application Migration Checklist
This Windows XP migration checklist is to guide the process and put a successful migration plan together. Based on the customer feedback from hundreds of migrations and service pack projects, this solution brief shares hints to discover, model, automate and manage migration projects to save time, cost and mitigate risk.
Mar 14, 2013
|
FAQs ()
|
156KB
|
2013 Trade-up to XenDesktop Program: FAQ
This document answers commonly asked questions about the new Trade-up, Trade-up PLUS and Trade-up MAX permanent programs, in addition to the limited-time Trade-up RESTART promotion - available through 2012.
Dec 20, 2012
|
Licensing Resources ()
|
|
FAQ - XenDesktop licensing
Answers frequently asked questions about XenDesktop licensing. This FAQ covers topics including how XenDesktop user and device licensing works, how XenDesktop licenses are managed, how overdrafts are handled and what components are licensed with XenDesktop. It also covers how to perform a XenDesktop license upgrade, the Microsoft license requirements for XenDesktop and licensing during disaster recovery and maintenance.
Nov 8, 2010
|
|
|
End User License Agreement (EULA)
Access additional licensing resources and learn about Citrix licensing programs, the Citrix licensing system, and how to get licenses and support.
Nov 12, 2010
|
Reference Materials ()
|
2MB
|
Virtual Desktop Cost Analysis
This white paper explores the downward trend in desktop virtualization costs and how this trend is prompting organizations to evaluate their own physical PC costs.Based on Citrix internal analysis and industry data, acquisition costs for virtual desktops are trending down faster than those of traditional physical desktops.
Mar 19, 2013
|
Solution Guides ()
|
|
Enabling BYO: Solution Guide
Turn the iPad and other devices into a powerful business tool with an employee-owned device program.
Feb 1, 2011
|
White Papers ()
|
274KB
|
Workshifting: Wie die IT das Geschäftsleben verändert
Erfahren Sie mehr darüber, was Firmen dazu veranlasst, Workshifting einzuführen, die dafür genutzten Technologien, und wie vier Citrix-Kunden spürbare Vorteile durch Desktop-Virtualisierung erhalten.
Jan 16, 2013
|
|
1MB
|
Citrix desktop virtualization and Microsoft System Center 2012: Better together
Citrix XenDesktop is recognized worldwide as the most comprehensive desktop virtualization solution for meeting various business desktop demands. The Microsoft® System Center portfolio of management solutions is recognized as a complete solution for managing today’s virtual and physical Windows® infrastructures. In this white paper you will learn how Citrix and Microsoft System Center work better together.
Nov 14, 2012
|
|
|
A new chapter in device management - a Guide to BYO
This solution brief illustrates the benefits and a plan for deploying a student-owned device program. With desktop virtualization from Citrix, free up students to use the computer of their choice while also reducing the time and money IT spends on managing the computer lab.
Jan 31, 2011
|
|
149KB
|
Solving information challenges for Human Services Agencies
Address the challenge of fast, secure and flexible delivery of case management, eligibility and health care services applications with sensitive information to remote and mobile workers, anytime, anywhere, on any device.
Feb 18, 2011
|
|
459KB
|
In Step with State CIOs
Virtualization solutions to address state government’s technology trends and challenges
Mar 2, 2011
|
|
|
Refactoring Sensitive Data Access: Benefits of Virtualization Security
Traditional security methods are strained to the breaking point. More threat vectors than ever, coupled with device proliferation in the workplace, workshifting and cloud computing have produced a threat landscape of unprecedented complexity. This paper presents a secure-by-design IT strategy based on desktop virtualization that provides both information security and optimal agility to respond to changing business needs.
Mar 2, 2011
|
|
|
Thin Client Computing: Providing Solutions and Dispelling Myths
Thin client computing affords unprecedented flexibility and efficiency as well as an incremental approach to adopting a server-based system that allows standard devices to act like thin-client computers through the use of special software.
Mar 2, 2011
|
|
2MB
|
Delivering IT to the Virtual Workforce
This technical white paper provides a simple guide on how to build a virtualization architecture to address IT requirements for productivity and performance, collaboration and support, security and cost efficiency.
Jul 6, 2011
|
|
|
Desktop Virtualization: Empowering Information Security
IT managers are facing an increasingly complex and costly battle to control and protect enterprise applications and data. At the same time as information security threats are growing more sophisticated and numerous, computing trends such as the consumerization of IT and cloud computing further complicate the information security landscape. In this paper, CSO explores why desktop virtualization should be the foundation of your approach to information security.
Sep 26, 2011
|
|
388KB
|
An insider's look at security strategy
Citrix Systems has implemented an information security strategy and business continuity plan that incorporates technology and best practices designed to mitigate risk while supporting business agility and growth. At the center of that strategy is desktop virtualization. We invite you to join a Citrix security insider to explore the benefits of desktop virtualization for information security and business continuity.
Sep 26, 2011
|
|
|
Desktop Virtualization: The Key for Securing Your Enterprise
TechTarget explores how desktop virtualization secures applications and data at all times, no matter where or how it is used. It offers the critical balance that IT managers must achieve is to protect sensitive enterprise information while supporting initiatives that promote business agility and growth.
Sep 29, 2011
|
|
|
Secure By Design: Five Customers Use Desktop Virtualization for Security
Desktop virtualization offers IT the means to regain control over sensitive information and meet growing requirements for compliance and data privacy while supporting business productivity and growth. In this paper we highlight five customers who implemented desktop virtualization to augment their information security strategy.
Sep 29, 2011
|
|
|
Delivering Enterprise Information Securely an Android and Apple iOS Devices
Android and iOS-based consumer devices including smartphones and tablets play an increasing role in enterprise computing, providing new flexibility and mobility for workers and IT—but creating new challenges around security. This paper describes these issues and explains how they can be addressed effectively with Citrix BYOD solutions.
Sep 29, 2011
|
|
|
Top 10 Reasons to Strengthen Information Security with Desktop Virtualization
Information security has become an increasingly critical concern for organizations of all kinds. Trends such as consumerization, worker mobility, cloud computing and workshifting mean that more people are accessing enterprise desktops, applications and data from more places and in more ways than ever before. In this paper we explore ten reasons why desktop virtualization should be the foundation of your layered approach to information security.
Sep 29, 2011
|
|
|
10 raisons de renforcer la sécurité des données grâce aux postes virtuels
Des tendances nouvelles comme la consumérisation, la mobilité de la main-d'oeuvre, le cloud computing et le workshifting font que de plus en plus d'individus accèdent à leurs postes de travail, leurs applications et leurs données professionnelles depuis un nombre d'endroits et de manière plus éllevé que jamais. Ce livre blanc énumère les 10 raisons pour lesquelles la virtualisation de postes doit constituer le coeur de votre approche multicouche de sécurisation des informations.
Apr 18, 2012
|
|
|
Délivrer les données d'entreprise en toute sécurité sur les iPads
Les directions informatiques sont de plus en plus confrontées à la nécessité d'accorder aux employés qui introduisent des tablettes Apple iPad® en entreprise un accès aux applications professionnelles depuis leur périphérique personnel. Ce livre blanc explique comment résoudre les problèmes qui liés à l'introduction des iPads au sein du réseau de l'entreprise, énumère quelques considérations en matière de sécurité et décrit l'architecture nécessaire à la prise en charge de l'iPad en entreprise.
Apr 18, 2012
|
|
130KB
|
Citrix and VMware Distinctly Different Approaches to Desktop Virtualization
Citrix and VMWare are the acknowledged leaders in desktop virtualization. But that is where the similarities end. Their approaches are markedly different from one another. And as this probing white paper written by IDG shows, one is quite clearly better suited to today’s dynamic business environment.
Oct 6, 2011
|
|
165KB
|
Desktop Virtualization and Storage Infrastructure Optimization
This TechTarget white paper provides an overview of desktop virtualization from Citrix and unveils the storage performance challenges of large virtual desktop infrastructure (VDI) deployments. The paper also covers key best practices IT organizations can use to optimize their storage environments to achieve the highest and most cost-effective virtualized desktop performance.
Oct 6, 2011
|
|
1MB
|
Workshifting A Global Market Research Report
Workshifting—moving work to the most optimal location, time and resources—is a key business strategy to increase productivity, agility and mobility. This research report explores the rising use of the Internet, desktop virtualization and web collaboration to enable and support this strategy in organizations around the world.
Mar 5, 2012
|
|
2MB
|
Unified Communications with Citrix XenDesktop
Combining the mobility and flexibility of desktop and application virtualization from Citrix XenDesktop with the communication and collaboration abilities of some of the most popular unified communication solutions allows IT organizations to create a dynamic virtual workspace that makes it simple to work anywhere, with anyone. This white paper highlights some of the key integration features and functionality for today’s unified communication solutions with XenDesktop.
Jul 24, 2012
|
|
|
Guide BYOD
Apprenez les meilleures pratiques pour rendre le BYOD simple et sécurisé.
Jun 4, 2012
|
|
331KB
|
Citrix XenDesktop La Virtualisation de Postes pour Tous avec FlexCast
Les différents types d’utilisateurs d’une entreprise ont besoin de différents types de postes de travail. Certains ont besoin de simplicité et de standardisation, là où d’autres auront besoin de performances élevées et de personnalisation. XenDesktop répond à ces besoins par une solution unique, dotée de la technologie unique de mise à disposition Citrix FlexCast. Découvrez comment.
Apr 17, 2012
|
| |