White PaperEnterprise MobilityTrends 2014Going Beyond Enterprise Mobility ManagementThe enterprise today is changing rapidly. The intersection of cloud,mobility, social networking and the Internet, what analyst firm Gartnercalls the, “Nexus of Forces” is making most medium and largeenterprises rethink their enterprise mobile strategies. Employees arebringing their own devices, downloading their own applications andcreating their own

White PaperEnterprise Mobility Trends 2014There are three main mobile trends that enterprises need torespond to—trends that will ultimately alter the way theiremployees perform their duties, where data and apps are storedand accessed and how productivity and collaboration aremeasured. These three trends include: Policy-Many companies are putting together mobile policies to help manage the influx ofpersonal (BYOD) devices and the consumerization issues. Mobile Apps—Smartphones and tablets are driving apps in the enterprise. Today those apps are beingfilled by consumer-focused apps, but many enterprises are looking at extending desktop to mobile. Security—companies are looking at enforcing security requirements.The Five Phases of MobilityThe Apple iPhone changed so much about enterprise mobility—creating the discussions todayaround mobile apps, security, BYOD, consumerization—and the methods to employ thesechanges. The key trends of policy (BYOD/consumerization, regulations, security), mobile apps andfocus on security started back in 2007 when iPhones began seriously entering the enterprisemarket, replacing the more secure and manageable BlackBerry devices. This kicked off what Citrix calls the “Five Phases of Mobility,” as seen in Figure PartnersUnifiedEnterprisePlatformFigure 1: The Five Phases of MobilityThe five phases of mobility cover the recenthistory of enterprise mobility including mobiledevice management (MDM) and enterprisemobility management (EMM).The next phase, really starting in earnest in theenterprise in 2015, is what we call MobileWorkspaces. Customers who are transformingcitrix.comtheir businesses with Citrix Mobile Workspacesolutions, demonstrate how virtualization,networking and cloud services technologiesempower new ways for people to work better.Workers need to gain access to a portable,always on, always connected workingenvironment that follows them no matterwhere they go, no matter what device they2

White PaperEnterprise Mobility Trends 2014choose to use, and no matter what method ofand by whom. These steps should be aligned toconnectivity they happen to be leveraging. Next, the key enterprise mobility trends, three ofcompanies will be working with their partnerswhich are covered here.and customers and helping them complete themobility journey. Finally, around 2018,Enterprise Mobile Policyenterprises will be looking to unify their mobileOne of the first key initiatives is to developplatforms to support employees, partners andpolicy on how mobility will be used in thecustomers, in what we are calling a Unifiedenterprise. Enterprise mobile policy shouldEnterprise Platform. Citrix will leverage thisinclude these main areas:evolution today, starting from its core Identify Users - policy should identify thecompetencies in MDM and EMM, and look todifferent user segments. Although someexpand to support the needs of the globalpolicy covers all users, policy may differenterprise going forward with cloud services,depend on user applications and security solutions to Hardware, software and services - policysupport their mobility needs.should dictate the types of hardware,But enterprises need to start today insoftware (OS, applications) and wirelessidentifying their key initiatives based on currentservices that will be supported.and future trends in mobility. As mentioned Security levels - policy should articulate thepreviously, the main trends this year includesecurity needs of the enterprise, what securitypolicy, mobile apps and security. Let’s look atprovisions will be used and details aroundeach in loss prevention, authentication andencryption guidelines, guidelines for securityEnterprise Mobility Trends 2014procedures, including lost device process.Enterprises should put together a strategy that Costs - policies should detail costfollows the enterprise lifecycle managementresponsibilities, spending guidelines etc.process, as shown in Figure 2. Regulatory - guidelines should also addresslocal regulatory requirements. For example,holding a phone is illegal in many locations.The best advice is to require users to adhereto local laws.Figure 2: Enterprise Mobile Lifecycle ProcessThis gives enterprises a starting and endingpoint when developing strategy. Each stepshould be identified and a strategy created forhow it will be accomplished in the enterprise,citrix.comThough most companies have some type ofpolicy—most don’t go across the major areas ofIT like security, networking and hardware. It’sbetter to have a single, combined policy thanmany individual ones. That doesn’t mean thatthe policy should be huge. Try to keep the policy to no more than five pages so that users willread it. Make getting a new device or servicecontingent upon agree to policy. Most MDMproducts can support policy endeavors andeven capture agreements, location and date ofpolicy readings by users.3

White PaperEnterprise Mobility Trends 2014Mobile Application Identification andManagementMost companies today are actively developingtheir strategy on mobile applications. Thoughmost companies already support wireless email,they definitely are looking at rolling outadditional support for enterprise applications—many that are being used on laptops anddesktops today. However, many organizationsstruggle with prioritizing and mobilizing theirapplications. Which apps should enterprisemobilize? Often enterprises answer to that iseither “I don’t know” or “Everything.” Everything isa bad answer but an easy one. Enterprises wantto replace current computing platforms formobile ones, so they think they should takeeverything off the desktop/laptop and put it on asmartphone/tablet. This is not a good idea. Somedon’t know what should be mobilized becausethey aren’t close to the business. They focus onhorizontal apps like email or calendaring, butpotentially miss company and user-specificapplications that drive business processes.Usually enterprises start out wanting to increaseproductivity or drive revenue. These are greatgoals but to be successful, enterprise need to godeeper into identifying user requirements andmatching them to individual, line-of-business orcorporate goals. How to do this?company? And don’t just think about the roadwarriors or executives, what about those insideyour buildings, or campus that may never be attheir desk? Think about both increasingrevenue and saving it. The business case willhelp a lot in identifying which users and data tomobilize. As the number of devices andapplications grow in the enterprise, IT needs tolook towards automating and getting tools tosupport that application growth. Mobileapplication management (MAM) adoption isgrowing rapidly because it helps the enterprisecreate, secure, distribute, manage and analyzeenterprise mobile applications. Today—mostEMM solutions incorporate MAM as part oftheir solution by supporting data containersthat can secure enterprise data and implementpolicy (see the section, “Mobile data containershave tradeoffs”). In the past year—the idea ofapplication containers has taken off. With appcontainers, apps can be forced to supportenterprise policies (i.e. data movement, cut/copy/paste, encryption standards etc.). Thissupports a moderate to high level of security(hardware-level security is not available).Companies can quickly (in minutes) convertexisting apps (via “app wrapping”), or easily addcode in to new ones to enforce security andmanagement policies. Plus this works acrossboth iOS and Android devices, so availability ishigh. Already thousands of managed andsecured apps are on the Apple App Store andGoogle Play. Many users may not even showthey are secure—but they are. This is a key partof enterprises future mobile security program.First, think about the goals that the enterprisehas. These could be user goals, lines of businessor corporate. These will help drive theidentification of the mobile process. Next, stopthinking about apps. Smarter thinking is tomobilize the needed data that will drive thebusiness, reduce costs, increase productivity,collaboration or revenue. Apps are secondary,important for accessing and securing data, butnot “killer.” Next—think about your users. Noteveryone is truly mobile for his or her everydaywork today. Sure many extend office hours orwant an easier way to access email on the fly,but who are the real mobile workers in yourcitrix.comMobile SecurityMuch has been written in the past onenterprise mobile security. Companies thathave supported BYOD for the past few yearsfeel that they have lost some control overwhere their data is accessed and stored. They’vegone from tightly controlled systems that allowfor granular policy, to loosely controlled devices4

White PaperEnterprise Mobility Trends 2014with minimal policy. Most companies havefollowed best practices by supporting dataencryption, PIN-based authentication andsome rules about data movement. But today,most applications off the public applicationstores don’t allow granular policy for DLP anddata restrictions. Companies looking tomobilize their own applications are also lookingat the use of MAM to ensure mobile policies.Mobile security is covered in-depth in ourwhitepaper, “Delivering enterprise informationsecurely on Android, Apple iOS and MicrosoftWindows tablets and smartphones.”between two systems—is poor. The need for thislevel of security is typically for those industriesthat have the highest security need, usuallydriven by regulations. Government, financialservices and healthcare are the primary targets.Mobile Data Containers Have TradeoffsData security remains top of mind for CIOs asthey consider how to manage consumerizationand BYOD. Security is a continual investment,even more so with the emerging mobileenterprise. One of the most popular enterprisemobile management platforms, XenMobileEnterprise, includes a full suite of secure mobileapps that can help enterprises contain andmanage their data. But much is stillmisunderstood about the different containertechnologies and methods for securing mobiledata. Each container technology has its tradeoffs, but some are rising to the top over others.To assess them it’s important to look at thesefour main areas: cost, availability, security leveland user experience.There are generally two ways to contain data onmobile devices: through hardware or softwaretechniques. Hardware containerization basicallyruns two systems on a single device-two radios,DSPs, memory, OSes etc. One is used forpersonal data, one for corporate. Never the twoshall meet. So even if the personal side is hit by avirus and can’t even be turned on, the corporateside still works. This is a very strong, securesolution. The problem is that it is not widelyavailable, running two systems is costly and theuser experience—switching back and forthcitrix.comMore popular are the software-basedcontainers, of which there are three types:OS-based, application and thin-client. Somecompanies are promoting the use of OS-basedcontainers. Usually a form of a hypervisor isused to run two separate OSes (on the samehardware layer)—one for business, one forpersonal. A single hardware platform keepscosts down; it has a high level of security,virtually separating data. Also, applicationsdon’t need to be rewritten or designed for aspecific vendor. But hardware availability islow—not every Android device is supported,the container may be proprietary to specificvendors (i.e. Samsung Knox) and iOS is notsupported in this manner. The user experienceof “dual-personas”, though getting better, is notone that companies have accepted yet, so isoften rated lower.Thin-client containers use web browsers toaccess data or apps, or are specific appsthemselves, like Citrix Receiver . They are verysecure because they can be set to erase dataonce disconnected—so no data remains locally.However, this can be an issue for mobile userswho need offline access to data and apps if notconnected to the network. In the future—secure data stores can be created to allow forsome offline access to apps and content. Butotherwise, thin-client containers are excellent—widely available, easy to use, low cost(depending on type) and very secure. Morecompanies—especially those with campusoriented, or always connected employees as inhealthcare, hospitality, banking, education—areusing thin-client containers as part of theirmobile strategy. This will only increase.5

White PaperEnterprise Mobility Trends 2014Containerization is gaining speed and adoptionin the enterprise. Today the race is on to createsecure and easily managed applications thatoffer the convenience and rich user experienceof a personal app, but help enterprise controlthe security of movement of their data. This willbe the next opportunity for vendors in thisspace, to increase the functionality and UE ofsecure data, but allow enterprises and users thefreedom they need to do their job.Citrix enterprise support is centered around theMobile Workspace. The idea is to support anyuser, device and any location—around apps,data, personal or business, desktop or mobile,see Figure 3.Citrix Supports The Mobile EnterpriseCitrix strategy aligns perfectly with the emergingneeds of the global, mobile enterprise. In 2013,Citrix launched the XenMobile Worx apps—which included a manageable, containerizedemail, calendar, contacts app called WorxMail and an enterprise-class web browser, called WorxWeb . The idea is to support the IT requirementsfor high-levels of security, with data encryption,managed open in, policies on data movement(cut/copy/paste) and other requirements IT have.It also supports the company in managingenterprise data, on user-owned devices for thosethat have a BYOD policy. At the same time, itgives users a better experience than they couldget with the native apps. For example, fileattachment is available right from the email,there is one click to dial into web conferencesand conference bridges. Citrix improved uponthe native experience and delighted both endusers and IT. Citrix also provides tools, in an SDKand wrapping agent that allows enterprise tosecure and manage their own apps through theCitrix XenMobile platform.In 2014, Citrix announced continued progress inthis area, with new apps like WorxDesktop ,WorxEdit and WorxNotes. Citrix will continue tolaunch more apps to fill in where enterprisesand users are missing, what research firmForrester calls the “app gap.” At the same timewe will continue to work on the main areas ofpolicy management, BYOD, mobile apps andthe highest level of security.citrix.comFigure 3: The Mobile WorkspaceCitrix brings together its mobile and virtualworlds to enable enterprise-wide mobility, nomatter what device or type of data. Access todata across networks is critical in order toenable collaboration and increase efficiency.Business Class Delights Users and ITWhen enterprises first started adopting mobiledevices, they went towards enterprise classdevices that offered strong management andsecurity, but not always the best userexperience. The consumerization of devicesreversed that by giving a great consumerexperience, but little in the ways ofmanagement and security. Companies arelooking to reverse this trend, and Citrix isfocused on providing the alternative, a mobiledevice that offers a strong “business class”experience that users want, with the securityand management that IT needs.The way this is done is by giving users a betterexperience in their everyday business6

White PaperEnterprise Mobility Trends 2014applications that their native experience maynot support. Citrix focuses on workflows byunderstanding how business users actually usetheir apps and provides shortcuts andoptimizations specifically for business users.Business users answer more emails, createmore content, collaborate more than theaverage smartphone user, yet most apps hadn’tbeen designed with these needs in mind. Citrixsupports the scale business users need whenresponding to the multitude of everyday uses,made especially difficult while on the road.differentiation and makes it the leadingplatform for the emerging mobile workspacesolutions and enterprise mobility.Mobile Enterprise Best PracticesCitrix recommends some best practices forenterprises when implementing mobility.These include: Assess User, Business and IT Requirements—this is the first step in creating a strategy andpolicy. Companies should identify userrequirements (apps., data, mobility style,But that scale is also important for IT. Mostdevices needed).business users have more than two mobile Segment Users—create user segments anddevices, and IT needs to support hundreds andgroups for individual policy and managementthousands of devices. Citrix mobile solutionsbased on requirements. We recommend noare designed to scale for IT, to support devicemore than ten different user segments acrossenrollment, application deployment,most enterprises.provisioning and reporting across a large Design Policy Across IT—there should be onenumber of users. Integrated with NetScaler ,main policy document across IT to make itthe industry’s leading enterprise gatewayeasier for users to read and adapt.product, Citrix XenMobile has been tested to Develop A Business Case—creating value,support up to one hundred thousandsaving costs—these are the best ways to gettransactions simultaneously. Citrix is deliveringmobile plans moving forward. Identify specificon its promise to delight both IT and theirgoals and steps needed to accomplish. Aligncustomer, the end business goals too. Create a Mobile Center of Excellence—Future Mobile Needsmobility doesn’t sit on one place. A MCOECitrix is assessing the future of mobility,aligns the different areas of IT, like applicationincluding support for new devices, platformsdevelopment, networking, security etc.and mobile apps. But Citrix also recognizes thataround the mobility planning and lifecyclemobility goes beyond that. The Internet ofprocess. Also a great place to test new mobileThings (IoT), wearable and virtual computing areapps, devices and services before introducingall part of the Citrix roadmap. Citrix willthem into the work environment.continue to lead the market in terms ofsupporting mobile-first initiatives, integratingCitrix recognizes that each customer is different,platforms across IT and supporting allso will work with each one to make sure theirenterprise technology needs, not justmobile enterprise strategy is a success todayhandhelds. These are key to the Citrixand in the future.citrix.com7

White PaperEnterprise Mobility Trends 2014Corporate HeadquartersFort Lauderdale, FL, USAIndia Development CenterBangalore, IndiaLatin America HeadquartersCoral Gables, FL, USASilicon Valley HeadquartersSanta Clara, CA, USAOnline Division HeadquartersSanta Barbara, CA, USAUK Development CenterChalfont, United KingdomEMEA HeadquartersSchaffhausen, SwitzerlandPacific HeadquartersHong Kong, ChinaAbout CitrixCitrix (NASDAQ:CTXS) is a leader in mobile workspaces, providing virtualization, mobility management, networking and cloud services toenable new ways to work better. Citrix solutions power business mobility through secure, personal workspaces that provide people withinstant access to apps, desktops, data and communications on any device, over any network and cloud. This year Citrix is celebrating 25years of innovation, making IT simpler and people more productive. With annual revenue in 2013 of 2.9 billion, Citrix solutions are in use atmore than 330,000 organizations and by over 100 million users globally. Learn more at 2014 Citrix Systems, Inc. All rights reserved. Citrix, XenMobile, WorxDesktop, NetScaler, WorxMail, Worx Web and CitrixReceiver are trademarks of Citrix Systems, Inc. and/or one of its subsidiaries, and may be registered in the U.S. and other countries. Otherproduct and company names mentioned herein may be trademarks of their respective companies.0814/PDFcitrix.com8

Enterprise Mobility Trends 2014 Going Beyond Enterprise Mobility Management The enterprise today is changing rapidly. The intersection of cloud, mobility, social networking and the Internet, what analyst firm Gartner calls the, “Nexus of Forces” is making most medium and large enterprises rethin