Strategy for securing enterprise PCs for the cloud era will need to evolve and should have the following two components:
- Manage IT services not end point devices – Enterprises will need to think about focusing their efforts onto delivering their apps & data securely rather than managing & securing the end point devices. This is where Citrix Receiver comes in. Instead of managing the end point, customers can manage their apps & data and deliver it to users via Receiver. Receiver can be easily standardized on any device and enable users to have a self-service experience via a unified storefront for apps & data.
- Isolate personal content from the cloud – Enterprises need to assume that users will be using their work PCs to access their social media, personal document clouds & web browsing and have a strategy to deal with it. This is where Bromium comes in. Bromium enables this capability via their recently announced micro-virtualization technology. Bromium micro-virtualization technology always treats personal web/cloud access as a possible attack, isolating the function in its own micro-VM in a way that is completely seamless to end-users. Every time the end-user visits a web site or opens a document that is not trusted (i.e. not delivered by IT as a service) it is instantly and transparently executed within a hardware-enforced isolated micro-VM. All the OS services and resources are controlled and managed by the Bromium technology while keeping the entire experience for end users completely seamless. This micro-VM is wiped away once the end user ends the personal browsing; protecting the IT services and end point device from any potential threat or malware.
Citrix Receiver and Bromium together enable our customers to rethink their service delivery and enterprise PC management for the cloud era. Enterprises can have a solution for simple, centralized delivery of enterprise services without having to worry about curbing end-user behavior that may try to compromise enterprise infrastructure or access privileged information. You can sign up for beta for Bromium at www.bromium.com in order to strt chalking up deployment scenarios. I look forward to hearing about your experiences with Receiver and micro-virtualization working together to enable your users while protecting your enterprise information.