Citrix Receiver is a client software that lets users access enterprise data, apps and desktops from the device of their choice, including smartphones, tablets and PCs. Over the course of past couple of years, we have seen tremendous uptake of Citrix Receiver. We have tens of millions of downloads of Citrix Receiver already and a new download occuring every second or two. Citrix Receiver has enabled our customers to securely implement BYO – standardizing on managing their IT services rather than their end point devices.
Recently, we announced powerful new additions to Citrix Receiver including access to not just virtual apps & desktops via XenDesktop/XenApp but also accessing Web/SaaS apps using a native secure browser, HTML 5/iOS/Android apps running natively in a secure container on mobile devices and follow-me-data all integrated into a single experience via a unified storefront. A new portfolio of Receiver for all platforms is targeted for release with these powerful capabilities in July. In addition to offering these new capabilities, we have invested in making our Windows Receiver a platform; a platform that can be easily extended by other ISVs via plugins. Bromium is an excellent example of such a plugin.
Traditionally, enterprises have relied on a combination of technologies (e.g. anti-virus & malware protection) and policies (controlling what end users can/cannot do with their PCs) in order to get a false sense of security for their enterprise PCs. Today, end users use their work PCs no differently than using their own PCs at home, including use of social media or personal document clouds. This means that enterprises have a much larger threat profile than before and their traditional policies & technologies are not designed to handle the threats that cloud bring to their PCs.
Strategy for securing enterprise PCs for the cloud era will need to evolve and should have the following two components:
  1. Manage IT services not end point devices – Enterprises will need to think about focusing their efforts onto delivering their apps & data securely rather than managing & securing the end point devices. This is where Citrix Receiver comes in. Instead of managing the end point, customers can manage their apps & data and deliver it to users via Receiver. Receiver can be easily standardized on any device and enable users to have a self-service experience via a unified storefront for apps & data.
  2. Isolate personal content from the cloud – Enterprises need to assume that users will be using their work PCs to access their social media, personal document clouds & web browsing and have a strategy to deal with it. This is where Bromium comes in. Bromium enables this capability via their recently announced micro-virtualization technology. Bromium micro-virtualization technology always treats personal web/cloud access as a possible attack, isolating the function in its own micro-VM in a way that is completely seamless to end-users. Every time the end-user visits a web site or opens a document that is not trusted (i.e. not delivered by IT as a service) it is instantly and transparently executed within a hardware-enforced isolated micro-VM. All the OS services and resources are controlled and managed by the Bromium technology while keeping the entire experience for end users completely seamless. This micro-VM is wiped away once the end user ends the personal browsing; protecting the IT services and end point device from any potential threat or malware.

Citrix Receiver and Bromium together enable our customers to rethink their service delivery and enterprise PC management for the cloud era. Enterprises can have a solution for simple, centralized delivery of enterprise services without having to worry about curbing end-user behavior that may try to compromise enterprise infrastructure or access privileged information. You can sign up for beta for Bromium at in order to strt chalking up deployment scenarios. I look forward to hearing about your experiences with Receiver and micro-virtualization working together to enable your users while protecting your enterprise information.