CloudPortal Services Manager: Service vs. Citrix Hosted Service Applications and Office

7:13 PM 7 Comments
CloudPortal Services Manager: Service vs. Citrix Hosted Service Applications and Office - In CloudPortal Services Manager There are two ways to deliver applications and job work Citrix XenApp. Sometimes we wonder, "Why two?" And "Which one should I use"look at some of the differences: Citrix Service
  • Can be used to provide other types of applications (eg XenDesktop apps / workstations or even RDP applications).
  • Can be used to provide resources (to configure printers, settings specific for AD, etc ...).
  • allows tenants to create their own groups of applications.
  • not to use the user plane model for the management .. . instead of selecting applications for each user.
  • has support for private applications (applications that can not be assigned to a user).
hosted applications and office service
  • uses the user plane model, so it follows the familiar route to the provision of services.
  • does not support streaming applications (although you might want to do this with a workaround).
  • Based on the technology Orchestration App, which is the future of how we provisioning applications and workstations.
  • accordingly, it allows you to quickly configure XenApp for new tenants.
  • you can configure isolation levels 3 tenants in XenApp (shared, private server, private farm).
  • also get 3 tenant isolation levels for the Web interface (and it will be available for you WI).
  • A loan business features such as support for the upgraded application / user migration.
  • This will save your admins much time at the next need to provide a fix for an application or upgrading to a new version of an application.
Which one is right for you depends on your needs. The risk may be too generalizing, I would say that the Citrix service requires more manual labor. Also hosted and desktop applications is the way to go if you want to scale really. It is a key part of our Avalon history that we announced at Synergy. With Avalon, you'll be able to really automate your data center by leveraging CloudPortal Services Manager offers available to your users App Orchestration, which manages complex XenApp and XenDesktop deployments for you.In the "Demo Private Room" Synergy Barcelona I did a demo that really showed how you can automate end to end using hosted applications and desktop services and App Orchestration, starting with define your offers all the way to saving the end user in Outlook via Citrix Receiver.He was a great developer on the simplicity and power that we see in terms of automation of the data center!

Citrix continues Momentum Mobility Positioned as Leader in 2013 Mobile Device Management Software Magic Quadrant Gartner

6:12 PM 1 Comment
Citrix continues Momentum Mobility Positioned as Leader in 2013 Mobile Device Management Software Magic Quadrant Gartner - In the technology market of aujourd ay, companies are constantly touting the unique and vast benefits of their products, and often, consumers are left scratching their heads as to who actually has a superior solution. Gartner, as the first search technology plan of the world's information and advice, is a lighthouse in space technology and has provided insight during his more than 30 years.And considering this, we here at Citrix are delighted to announce that Citrix is positioned in the quadrant of the Magic Quadrant 2013 Leaders for Mobile Device Management Report (MDM) software following its evaluation Citrix XenMobile. Gartner Magic Quadrant are the result of research in a specific market - in this case software MDM - giving consumers a wide-angle view of the relative positions of market competitors. In other words, they draw the players competing in the major technology markets and determine how they are positioned to help potential clients.In addition, Citrix XenMobile received the highest score of "Outstanding" for the case of the overall use of the Critical Capabilities report for the mobile device management software. Critical capabilities for MDM takes a deep look at the advanced technology in the MDM for policy compliance, mobile security management, mobile software management, mobile content management, analysis and styles delivery.with federal policies, such as digital and Federal Government Strategy Bring your toolbox clean driving apparatus agenda of mobility, organizations are looking for solutions that can enable them to meet the growing demand for mobile. And we knew when we published XenMobile Enterprise Edition, a complete solution that enables mobile device users, application and freedom of information, while enabling it to meet its requirements management and compliance, it would be a great success on all markets, including the public sector. We believe this recent recognition affirms that not only offers Citrix help organizations achieve their goals of mobility, especially as we offer an end-end MDM solution that other vendors can not.We are honored to be recognized by Gartner in these reports and we hope you take a moment to consider the full 2013 Gartner Magic Quadrant for MDM and critical capabilities for MDM reports. For more information on XenMobile Enterprise Edition, click here, or drop me a line. Tom Simmons, vice president of public sector region for Citrix Systems is available at @ tom.simmons citrix.com .

To appease Dept of Defense security problems, UYOD can be the first step to true federal BYOD

5:11 PM Add Comment
To appease Dept of Defense security problems, UYOD can be the first step to true federal BYOD -

We all know about the Bring-Your-Own-device asks always riveting discussion among government agencies. Dept defense agencies are particularly opposed because of the underlying security issues in the exposure of non-GFE personal devices to a secure defense network. It was no different at the town hall meeting Mobility Exchanges there are only a few weeks when I had the dubious honor of moderating the "BYOD in Action" session, featuring the CTO of the Defense Logistics Agency (DLA) -.. Mr. Joshua Lashbrook

We launched the discussion with the mention of BYOD Toolkit federal CIO Council published last year in this document, there were three key solutions for BYOD that were recommended in as part of the management (I talked about this already in my earlier blog here). for our discussion at the MWE session, we concentrated mainly on virtualization because it has a long history proven in organizations federal and responded to the specific security needs by eliminating data at rest concerns about defense agency settings.

M .. Lashbrook length about moving to DLA App / Desktop Virtualization and how he made profit for a program "home" to empower employees of his agency for telework and COOP scenarios.

DLA wins Tele-vision award
DLA CTO Joshua Lashbrook accepts 2013 Tele-Vision "domicile" price DLA program

"home" program DLA allows 28,000 employees across several field sites to use their personal devices to their home network using only the Citrix Receiver, a product CAC reader for authentication and simple anti-virus software. One of the participants of the session asked a poignant issue - if a user has no right to "make" their non-GFE device in the office, only to "use" their non-GFE home appliance - can -it really be a "BYOD" program?

is that federal agencies really want a policy that allows non-GFE devices be physically plugged into a secure federal network? Several commercial companies implement BYOD policies, generally create a single WiFi network that provides Internet access only to help secure this treats all BYOD users physically located on-site or off-site "corporate LAN. " - That remote users. Although this type of architecture can not be an immediate reality for federal agencies, providing "remote" Use-Your-Own-Device (UYOD) access at home for non-GFE devices may be a common ground that would allow users any federal architecture and network policies can catch

learn more about the Defense Logistics Agency program in the following white paper to learn how they leveraged virtualization as a step towards a federal true BYOD program :.

DLA achieves agility through telework and BYOD - Citrix whitepaper
Whitepaper: DLA performs agility through teleworking and BYOD strategy

Feel free to continue the conversation in the comments section below and be sure to follow me on twitter @virtfaisal for more information on how the federal BYOD.

Eight Reasons to Run 7 XenDesktop on Hyper-V 2012

4:10 PM 1 Comment
Eight Reasons to Run 7 XenDesktop on Hyper-V 2012 -

XenDesktop 7 is the latest version of Citrix product to deliver virtual desktops and applications enabling users to work anywhere on any device. XenDesktop 7 is supported on all major hypervisors; but I will present the case for the selection Hyper-V 2012. Please note that this will not be a Hyper-V vs. VMware or XenServer comparison hypervisor. Each hypervisor offers unique features that organizations need to decide which is most important to them. However Hyper-V 2012 offers some great improvements over Hyper-V 08 R2 to 7 XenDesktop deployments.

1. Support for Windows 8 and Windows 2012 virtual machines

2012 Hyper-V supports Windows 8 and Windows 2012 virtual machines. This may not be important for organizations with existing Windows 7 VDI deployments, but those running Windows XP must read. Microsoft announced that all support for Windows XP will end next year, 8 April 2014. In April 2013, Netmarketshare research shows that Windows XP is the second desktop operating system most widely used for companies with 38% market share. Windows 7 is in first place with a market share of 44%.

The Netmarketshare research also shows that over a period from September 2012 to April 2013, Windows 7 market share has remained steady at 44%. Windows XP market share fell from 41% to 38%, while Windows 8 increased from 0.8% to 3%. If the current trend continues, most organizations with deployments of Windows XP VDI will migrate to Windows 7 8. XenDesktop will support all Windows workstations versions from Windows XP to Windows 8, so that organizations can benefit party for migration, and continue to support legacy applications will not work on Windows 8.

2. SMB 3.0 Enhancements

the (SMB) Server Message Block protocol is used for sharing files in Windows. In Windows Server 2012, the SMB protocol has been updated with new features to improve performance and stability. Some of these new features have a direct impact on the performance of Provisioning Services (PVS) and Machine Creation Services (MCS).

SMB Direct is a new transport protocol that supports the network adapters that have access Remote Direct Memory (RDMA) capability. This allows direct memory data transfers memory between servers with minimal CPU utilization and low latency. For Hyper-V hosts in 2012, remote file servers appear as fast as local storage. By minimizing the use of Hyper-V processor is able to allocate more CPU cycles to virtual machines and applications.

SMB Multichannel is a new feature that allows bandwidth aggregation through multiple network interfaces. This improves machine performance Creation Services when virtual machines are placed on file shares with shared volumes in the cluster via SMB 3.0.

SMB Transparent Failover is another new feature that allows Windows file shares in a failover cluster configuration to be permanently available. A good example of this would be if a Provisioning Services vDisk is located on a file share in the cluster. If a failure occurs on the node, the SMB client on the provisioning server to reconnect to another file server node in the cluster automatically and Provisioning Services does not experience downtime.

For a deeper look at the new SMB 3.0 features please see the Microsoft TechEd 2013 session of Understanding Hyper-V over SMB scenario, Configuration and Performance End-to-End presented by Jose Barreto.

3. Improvements Extension

Hyper-V 2012 scale resources about 4-16 times higher than Hyper-V 08 R2. A Hyper-V host 2012 can support up to 320 logical processors, while a R2 Hyper-V host 08 supports 64. A host Hyper-V 2012 can support up to 4TB of RAM, while Hyper-V 08 R2 supports 1TB. A Hyper-V cluster 2012 can support up to 64 nodes, which goes well beyond the limitation of 16 knots Hyper-V 08 R2. For larger deployments with XenDesktop adequately sized servers, this means fewer physical resources in the data center to support the environment. See the table below from the Microsoft white paper on Windows Server 2012 to view other resource enhancements to Hyper-V, 2012.

4. Migration dynamic no longer limited to clusters

In Hyper-V 08 R2, Live Migration is only possible between nodes in a cluster. With Hyper-V 2012, it is now possible to "live migrate" between two autonomous Hyper-V hosts, or between two standalone Hyper-V host clusters. File shares in the storage locations must use SMB 3.0 to take advantage of this feature. This is useful for smaller XenDesktop environments where resources may be limited and dedicated host servers to a cluster may not be possible, or in test environments where building a cluster is not justified.

5. Network Enhancements

There have been several enhancements to Windows Server 2012 and Hyper-V networking 2012.

Logical Networks, a new feature in System Center virtual machine Manager SP1, you can create multiple virtual networks on a physical host for Hyper-V to isolate network traffic. To do this on Hyper-V 08 R2 VLANs are typically required. A design XenDesktop may require multiple VLANs to isolate virtual desktops, servers supporting infrastructure, and traffic Provisioning Services. Depending on the use case, using logical networks have a distinct advantage over VLANs. They do not have the complexity of the design of VLANs. They do not require a physical switch for isolating the flow, or require the use of VLAN tagging. VLANs are also limited to a single IP subnet that usually limit the creation of the virtual machine at one site. logical networks can be designed to extend through different IP networks. For more information about logical networks please see the Microsoft white paper on Windows Server 2012.

Virtual Fibre Channel is now supported which allows virtual machines to access Fibre Channel storage based directly. This feature is only available for virtual machines running the Windows Server operating system (Windows Server 08, 08 R2, and 2012). So while virtual desktops can not enjoy this, critical infrastructure servers supporting the XenDesktop environment can. The typical use case, when useful is when you use Failover Clustering and Live Migration.

NIC Teaming is now native in Windows Server 2012. Although it is possible to team NICs on a Hyper-V R2 host 08, requires the use of third party software and are not taken into supported by Microsoft. The Hyper-V Extensible Switch enables the Hyper-V host in 2012 to use the NIC teaming configurations in the operating system.

Single Route I / O Virtualization (SR-IOV) support is now available. This allows the functions of the physical network adapter is available directly on a virtual machine, which increases the network throughput and reduces the network latency. This feature is ideal for virtual servers Provisioning Services. By communicating with the network adapter directly Provisioning Services is able to perform and scale better. SR-IOV can also improve the performance of live migration.

6. Storage Enhancements

2012 Hyper-V supports 4K sector VHDs that replace the 512-byte sector disks as the new standard in the storage industry. Hyper-V 2012 also supports 512 sector byte emulation disks, also called of the 512th sector discs, which are disks that have a 512-byte logical sector size, but a physical sector size 4K . This allows support for existing software written for the discs of 512-byte sector which are incompatible with the 4K sector drives. There is a performance impact when using discs 512th due process "Read- modify-write "involved.

Hyper-V 2012 is a new format that VHDX greater protection against disk corruption due to power outages. The disc has a VHDX intent log that captures all changes to metastructure VHDX. If power is lost before the changes are written to disk, the changes are recovered from the intent log, once power is restored.

7. supply services 7 can broadcast on Hyper-V synthetic adapter

One of the limitations in the use of provisioning services 6.x on Hyper-V is that network adapter inherited Hyper-V is required to start and spread the vDisk to target devices. The legacy adapter performs at 100Mbps, so for VMs provisioned using the most efficient synthetic NIC, your option is to assign the adapters to both the network and synthetic inherited to the virtual machine. the streaming traffic is linked to the card of inheritance and other network traffic can run on synthetic adapter.

Provisioning Services 7 will support the distribution of traffic on the synthetic network adapter in Hyper-V (both 08 R2 and 2012 versions). The legacy adapter is always required to boot the virtual machine, about the first 20 MB, then after it starts to synthetic adapter as long as the two adapters are on the same subnet. This feature can be disabled via a registry setting if desired.

8. Auto Write Cache & BDM discs

When using Provisioning 7 services, creating the disk write cache is an automated step in the wizard Installation XenDesktop and the boot Device manager (BDM) disk if you prefer to start the virtual machines without using PXE services. (This feature is supported in Hyper-V 08 R2). You no longer need to build master model pictures with the disk write cache attached, and using the Boot Device Manager has been simplified greatly by eliminating the manual process involved in the partition configuration start-up.

For more information on all new features Hyper-V, 2012, please visit What's New in Microsoft Microsoft Hyper-V Server 2012 for more information about XenDesktop on Hyper 7 V, 2012, including architecture information, scalability and advice on improving performance, I encourage you to check the Microsoft TechEd Europe 2013 sessions presented by my colleague Tony Sanchez. Visit the Citrix Web site to download a XenDesktop evaluation 7.

Ed Duncan - Senior Consultant
Worldwide Consulting
Desktop Team & Applications
Virtual Desktop Manual
Accelerator Project
Follow @ CTXConsulting

Bitdefender is Citrix Ready

3:09 PM 1 Comment
Bitdefender is Citrix Ready -

#bitdefender There is no dispute virtualization brings benefits to organizations. As technologies of computing and storage improvement; through virtualization of organizations see a better use of resources with the reduction of operating expenses and capital in their data centers.

The challenge, the virtual machines are still susceptible to malicious attacks and must be protected. In many cases, organizations use traditional security solutions in an attempt to counter these risks. However, they end up paying the price with regard to application performance.

traditional security evolves to accommodate virtualised environments, but not necessarily optimized for virtualization.

security vendors VMware has the ability to integrate with vShield Endpoint Security (EPSEC), agentless anti-malware scan that is triggered on open and close file. What is missing is the ability to perform processes, registry and memory scanning. To do this, organizations must still install an agent on each virtual machine, which in most cases is the traditional agent complete return to the header box with such issues as described above.

So what is the solution to this riddle? Also, are organizations with virtualized infrastructure based on hypervisors such as Xen, KVM or Hyper-V predestined these questions without solution?

virtualization security must be optimized specifically for virtualized environments, offering features such as whitelisting VM template files, caching mechanisms to reduce scans double and VM scanning offline .

Fortunately, I work for a company that is doing something about it and has a solution. Security for Virtualized Environments (SVE) by Bitdefender is designed specifically for virtualized environments, providing a hypervisor agnostic protection for Windows, Linux and Solaris virtualized for organizations. When installed in VMware environments, SVE takes advantage of vShield Endpoint Security offering agentless protection. The solution also provides protection in other virtualized environments against malicious attacks, while providing cost savings by the small size of the silent agent.

The Bitdefender solution de-duplicates and centralizes scanning functionality to virtual machines dedicated. Patent-pending technology that includes a series of sophisticated intelligent caching mechanisms is to provide new performance improvements in the scanning process, resulting in less CPU and memory usage compared to other anti-malware solutions. And result in higher VM density ratios host and greater cost savings. The white paper "The Impact of security virtualization on your VDI environment" goes into detail about the security cost savings for Virtualized Environments brings

Product Name :. Security for Virtualized Environments

version (s): 1.2

Unique Feature (s):

  • security platform agnostic ability to support major virtualization platforms: Citrix, VMware, Microsoft, Red Hat, Oracle and any guest operating system: Windows, Linux and Solaris
  • antimalware centralized offloads scanning and update on a dedicated virtual appliance per physical host, on all platforms
  • protection at Deep :. provides process and memory introspection capabilities to cover not only the file system, but also scanning the memory of both online and offline. VMs
  • Haute optimization :. integrates caching mechanisms of self-learning processes that streamline the antimalware outside cover VMware vSphere
  • Integrated Management : simplifies deployment. and administration of the protected environment through tight integration with VMware vCenter and Citrix XenServer

Propostion Value:

  • Improves rate consolidation of up to 30% compared to traditional antimalware, thanks to the patent-pending optimization technologies designed for virtualization.
  • Reduces infrastructure costs through higher server density and performance
  • addresses the most common security challenges caused by the AV heritage in virtual environments :. AV storms, poor performance, management overhead and complexity
  • meets the requirements of complex data centers with discreet protection designed to run on all operating systems in virtualization infrastructure and invited

technical contact (s): Andrei Pisau (apisau@bitdefender.com), product manager for EVS

Link (s) documentation:

administrator's Guide http://download.bitdefender.com/SMB/SVE/SVE-1.2/Multi-Platform/Bitdefender_SVE_MultiPlatform_AdminsGuide_enUS.pdf

Guide Reporter http://download.bitdefender.com/SMB/SVE/SVE-1.2/Multi-Platform/Bitdefender_SVE_MultiPlatform_ReportersGuide_enUS.pdf

Link (s) for the video demonstration - currently available only for VMware vShield: http://enterprise.bitdefender.com/solutions-and-services/enterprises-virtualization-security.html#Product%20Demo

product page bitdefender.com/sve

recording Webinar http: // Company .bitdefender.com / webinarCitrix; alternatively, it can be accessed from http://enterprise.bitdefender.com/ by clicking on "Register Now" page top banner rolling.

Search Citrix Ready Xchange market here

Join Citrix Ready program here

Client Virtualization speak: Part 1 - User Scenarios

2:08 PM Add Comment
Client Virtualization speak: Part 1 - User Scenarios -

XenClient Banner

Earlier this year, Citrix has acquired Virtual Computer to complete our Client virtualization product and to launch the new version of XenClient Enterprise. XenClient Enterprise is now part of our mobile solution Workstyles FlexCast technology and virtual office administration. It is a proven solution with real clients large-scale deployments, offering local virtual desktops that are managed centrally. In this series of blog should read, we'll look at client virtualization space, how XenClient came to be, why the acquisition of Virtual Computer was a logical thing to do, and how XenClient provides value.

The creation of XenClient was motivated by the need for virtual desktops offline. Citrix XenServer took type 1 hypervisor and put it on desktops and laptops, creating a virtualized PC client environment. In doing so, companies can now virtualize either client or server, allowing end users to run multiple virtual machines according to their specific needs better

XenClient has been developed with two attributes key to mind -. performance and security . From the standpoint of performance, the goal was to provide a user experience that was as good as native. To do this, the Citrix engineering benefited from specific hardware capabilities of PCs such as Intel Virtualization Technology for Directed I / O, or VT-d.

Like a true type 1 hypervisor, XenClient Enterprise inherently provides multiple, securely- isolated IT environments on a single device. To further harden this environment, XenClient has been enhanced to take advantage of the Intel Trusted Execution Technology (TXT) and the Trusted Platform Module (TPM). This result leads to XenClient XT, published in the second half of 2011. Intel TXT provides a client hypervisor trusted launch at boot time of the machine by validating that the hypervisor has not been altered. Intel TPM provides more tamper proofing sealing configuration of the hypervisor encryption keys.

The performance and safety attributes have attracted the attention of IT professionals and government agencies. Each saw how XenClient Enterprise (or XenClient XT) could be a useful tool for solving a client-side problem of calculation. However, it became clear that another scenario, the scenario management of PC images, presented the largest market opportunity.

In version 2.0, Citrix grew up the list of compatible hardware. However, there was a great opportunity to capitalize on that success by broadening the range for hardware management tools and back-end. This resulted in the acquisition of Virtual Computer. This strategy proves to be successful Citrix has recently signed an agreement of 1800 seats of XenDesktop Platinum, driven by XenClient Enterprise.

The following table summarizes these use cases for virtualization key customers.

Client Hypervisor User Scenarios

Table 1 :. scenarios client hypervisor user

in the next part of the series of blog we will discuss the problem of managing the computer image in more detail. Meanwhile, join the conversation by connecting with Citrix XenClient team online!

  • Visit product page XenClient
  • Follow us on Twitter
  • Like us on Facebook
  • Visit our XenClient Technical Forum

Citrix Positioned in the Leaders Quadrant of Gartner Magic for application delivery controller

1:07 PM 2 Comments
Citrix Positioned in the Leaders Quadrant of Gartner Magic for application delivery controller -

Magic Quadrant Gartner report focuses on the ability of provider to resolve complex challenges of deploying applications.

"Citrix has been evaluated and positioned by Gartner, Inc. in the leaders quadrant in the 2012 Magic Quadrant Application Delivery Controllers * report by Gartner analyst Joe Skorupa, VP Distinguish analyst, Neil Rickard, vice president of research and Bjarne Munch, senior research analyst. "

Partners , you can now shoot campaign party Citrix marketing Concierge that offers the report in 2012 magic Quadrant for Gartner Contollers delivery application. Check out the new HOT campaign today

- "Citrix in the Leaders Quadrant for App Delivery Controller (Gartner Magic Quadrant Report)"

And check out some of our other related campaigns! . Search NetScaler

- "Citrix NetScaler beats the competition in Making Enterprise Networks Cloud Ready (White Paper)"

- "NetScaler with TriScale Technology: Three ways to change your Cloud Ready Network (white Paper) "

-" Cisco ACE migration to Citrix NetScaler (Overview and details of the program) "

Go to Citrix marketing Concierge to learn more about Gartner's independent research. Search Gartner Report and check the resource in the marketing library.

For more Citrix Solutions updates follow me on twitter @ctxmkgconcierge