Click here to close now.




















Welcome!

News Feed Item

Citrix Customers Transform Their Businesses with Mobile Workspace Solutions

Citrix today announced customers who are transforming their businesses with Citrix mobile workspace solutions, demonstrating how its virtualization, networking and cloud services technologies empower new ways for people to work better. With consumerization, mobility and BYOD continuing to impact and evolve the workplace, industry analysts estimate the emerging mobile workspaces market is set to grow 15 times in the next three years1. With Citrix XenDesktop®, XenApp®, XenMobile®, ShareFile®, GoToMeeting® and NetScaler® offerings, Citrix continues to provide a complete mobile workspace solution that securely delivers apps, desktops, files and services to any user, on any device over any network – all with an intuitive user experience. As a result, workers gain access to a portable, always on, always connected working environment that follows them no matter where they go, no matter what device they choose to use, and no matter what method of connectivity they happen to be leveraging. No other vendor provides the breadth of capabilities – from app and desktop virtualization, to secure mobile app and device management, to cloud networking – that are needed to enable the delivery of comprehensive and personalized mobile workspaces.

The mobile and cloud era is marked by the rapid emergence of devices, app platforms, millennial generation, social media and globalization that are driving dramatic changes in how IT organizations respond. With 61 percent of information workers today now working outside the office2 and using an average of three or more devices a day for work purposes3, and 72 percent of workers feeling unequipped with the technology necessary to get their jobs done outside the office4, organizations are struggling with how to embrace business mobility. Moreover, technology decision makers are seeing security challenges in how to provide technology to these workers, with 67 percent expressing concerns about data protection on mobile devices5.

Today’s forward-thinking IT organizations are leveraging mobile workspace solutions from Citrix to enable seamless access to mobile, web and Windows apps, data and collaboration tools, while securely delivering services regardless of where or how they need to be accessed. As a result, they are achieving increased business agility and transforming the way their employees and customers work. Here are a few examples of how Citrix customers are leveraging the power of a mobile workspace:

  • Mobile workspaces deliver access to patient records. A large U.S. healthcare organization needed a solution to protect highly sensitive patient records while enabling clinicians and doctors to access documents from anywhere. With the implementation of a Citrix mobile workspace strategy, the organization is now able to meet HIPAA compliance requirements and deliver real-time access to critical patient information.
  • Mobile workspaces enable Department of Justice to meet compliance requirements. A state Department of Justice (DOJ) provides its employees, including law enforcement officers, with secure access to critical criminal justice information on mobile devices while meeting department and government compliance policies. Describing the technology as a “law enforcement game changer,” the DOJ highlighted that the Citrix mobile workspace solution has enabled them to increase productivity across multiple departments.
  • Mobile workspaces enable collaboration. The need for secure mobility isn’t just limited to traditional businesses. An elementary school leverages Citrix collaboration technology to hold classes during a snowstorm to keep from tacking on make-up days at the end of the school year. Teachers were able to broadcast the scheduled lessons to their students via iPads, allowing the students to attend classes from home in a safe and secure environment.

“Mobile workspaces are playing a key role in addressing the new organizational imperative around secure mobility,” said Mark Bowker, senior analyst, Enterprise Strategy Group. “The Citrix mobile workspace solution addresses these needs by providing security and control for IT, while giving employees the flexibility to work from anywhere, on the device of their choice with access to all the apps, data and collaboration tools they need to work like they are in the office.”

“Citrix has been providing customers access to apps and data since it was founded 25 years ago,” said Steve Daheb, chief marketing officer, Citrix. “As technology has become a seamless part of people’s work and personal lives, Citrix has removed the barriers for secure delivery of apps, desktops, files and services to any user, on any device, anywhere. The variety of examples from our customers speak for themselves. Each of them is leveraging the industry’s most complete mobile workspace solution from Citrix to empower people to choose when, where and how work gets done, giving them a new level of freedom, flexibility and choice that is helping organizations to succeed in this dynamic and transformative mobile era.”

Mobile Workspace Strategy and Innovation at Citrix Synergy 2014

The Citrix Synergy™ conference will take place May 6-8, 2014, at the Anaheim Convention Center in Los Angeles, California. This global event will provide strategic insights into mobile workspaces, including:

  • Mobility strategy: BYOD, flex-work and telework, secure app, data and device mobility, business continuity, security and compliance
  • Mobility in key industries: healthcare, financial services, education, public sector
  • Mobility technologies: enterprise mobility management, desktop and app virtualization, secure data sharing, app stores, cloud networking and public/private/hybrid clouds

Related Links

Follow Citrix

About Citrix

Citrix (NASDAQ:CTXS) is a leader in virtualization, networking and cloud services to enable new ways for people to work better. Citrix solutions help IT and service providers to build, manage and secure virtual and mobile workspaces that seamlessly deliver apps, desktops, data and services to anyone, on any device, over any network or cloud. This year Citrix is celebrating 25 years of innovation, making IT simpler and people more productive with mobile workstyles. With annual revenue in 2013 of $2.9 billion, Citrix solutions are in use at more than 330,000 organizations and by over 100 million people globally. Learn more at www.citrix.com.

For Investors

This release contains forward-looking statements which are made pursuant to the safe harbor provisions of Section 27A of the Securities Act of 1933 and of Section 21E of the Securities Exchange Act of 1934. The forward-looking statements in this release do not constitute guarantees of future performance. Those statements involve a number of factors that could cause actual results to differ materially, including risks associated with the impact of the global economy and uncertainty in the IT spending environment, revenue growth and recognition of revenue, products and services, their development and distribution, product demand and pipeline, economic and competitive factors, the Company’s key strategic relationships, acquisition and related integration risks as well as other risks detailed in the Company’s filings with the Securities and Exchange Commission. Citrix assumes no obligation to update any forward-looking information contained in this press release or with respect to the announcements described herein. The development, release and timing of any features or functionality described for our products remains at our sole discretion and is subject to change without notice or consultation. The information provided is for informational purposes only and is not a commitment, promise or legal obligation to deliver any material, code or functionality and should not be relied upon in making purchasing decisions or incorporated into any contract.

Citrix®, XenApp®, XenDesktop®, XenMobile®, Citrix Sharefile®, NetScaler®, GoToMeeting® and Citrix Synergy™ are trademarks of Citrix Systems, Inc. and/or one or more of its subsidiaries, and may be registered in the U.S. Patent and Trademark Office and in other countries. All other trademarks and registered trademarks are property of their respective owners.

1 Gartner, Inc., Market Guide for Workspace Aggregators, January 2, 2014

2 Forrester Research Inc., Business Technographics Application and Collaboration Workforce Survey, Q4 2013

3 Forbes.com, http://www.forbes.com/sites/kenrapoza/2013/02/18/one-in-five-americans-work-from-home-numbers-seen-rising-over-60/

4 Forrester Research Inc., Business Technographics Telecom And Mobility Workforce Survey, Q2 2013

5 Forrester Research Inc., Business Technographics Security Survey, Q2 2013

More Stories By Business Wire

Copyright © 2009 Business Wire. All rights reserved. Republication or redistribution of Business Wire content is expressly prohibited without the prior written consent of Business Wire. Business Wire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
WebRTC has had a real tough three or four years, and so have those working with it. Only a few short years ago, the development world were excited about WebRTC and proclaiming how awesome it was. You might have played with the technology a couple of years ago, only to find the extra infrastructure requirements were painful to implement and poorly documented. This probably left a bitter taste in your mouth, especially when things went wrong.
Skeuomorphism usually means retaining existing design cues in something new that doesn’t actually need them. However, the concept of skeuomorphism can be thought of as relating more broadly to applying existing patterns to new technologies that, in fact, cry out for new approaches. In his session at DevOps Summit, Gordon Haff, Senior Cloud Strategy Marketing and Evangelism Manager at Red Hat, discussed why containers should be paired with new architectural practices such as microservices rathe...
SYS-CON Events announced today that G2G3 will exhibit at SYS-CON's @DevOpsSummit Silicon Valley, which will take place on November 3–5, 2015, at the Santa Clara Convention Center in Santa Clara, CA. Based on a collective appreciation for user experience, design, and technology, G2G3 is uniquely qualified and motivated to redefine how organizations and people engage in an increasingly digital world.
Any Ops team trying to support a company in today’s cloud-connected world knows that a new way of thinking is required – one just as dramatic than the shift from Ops to DevOps. The diversity of modern operations requires teams to focus their impact on breadth vs. depth. In his session at DevOps Summit, Adam Serediuk, Director of Operations at xMatters, Inc., will discuss the strategic requirements of evolving from Ops to DevOps, and why modern Operations has begun leveraging the “NoOps” approa...
Too often with compelling new technologies market participants become overly enamored with that attractiveness of the technology and neglect underlying business drivers. This tendency, what some call the “newest shiny object syndrome,” is understandable given that virtually all of us are heavily engaged in technology. But it is also mistaken. Without concrete business cases driving its deployment, IoT, like many other technologies before it, will fade into obscurity.
Organizations from small to large are increasingly adopting cloud solutions to deliver essential business services at a much lower cost. According to cyber security experts, the frequency and severity of cyber-attacks are on the rise, causing alarm to businesses and customers across a variety of industries. To defend against exploits like these, a company must adopt a comprehensive security defense strategy that is designed for their business. In 2015, organizations such as United Airlines, Sony...
The Internet of Things is in the early stages of mainstream deployment but it promises to unlock value and rapidly transform how organizations manage, operationalize, and monetize their assets. IoT is a complex structure of hardware, sensors, applications, analytics and devices that need to be able to communicate geographically and across all functions. Once the data is collected from numerous endpoints, the challenge then becomes converting it into actionable insight.
Puppet Labs has announced the next major update to its flagship product: Puppet Enterprise 2015.2. This release includes new features providing DevOps teams with clarity, simplicity and additional management capabilities, including an all-new user interface, an interactive graph for visualizing infrastructure code, a new unified agent and broader infrastructure support.
Consumer IoT applications provide data about the user that just doesn’t exist in traditional PC or mobile web applications. This rich data, or “context,” enables the highly personalized consumer experiences that characterize many consumer IoT apps. This same data is also providing brands with unprecedented insight into how their connected products are being used, while, at the same time, powering highly targeted engagement and marketing opportunities. In his session at @ThingsExpo, Nathan Trel...
Amazon and Google have built software-defined data centers (SDDCs) that deliver massively scalable services with great efficiency. Yet, building SDDCs has proven to be a near impossibility for ‘normal’ companies without hyper-scale resources. In his session at 17th Cloud Expo, David Cauthron, founder and chief executive officer of Nimboxx, will discuss the evolution of virtualization (hardware, application, memory, storage) and how commodity / open source hyper converged infrastructure (HCI) so...
In their Live Hack” presentation at 17th Cloud Expo, Stephen Coty and Paul Fletcher, Chief Security Evangelists at Alert Logic, will provide the audience with a chance to see a live demonstration of the common tools cyber attackers use to attack cloud and traditional IT systems. This “Live Hack” uses open source attack tools that are free and available for download by anybody. Attendees will learn where to find and how to operate these tools for the purpose of testing their own IT infrastructu...
The web app is agile. The REST API is agile. The testing and planning are agile. But alas, data infrastructures certainly are not. Once an application matures, changing the shape or indexing scheme of data often forces at best a top down planning exercise and at worst includes schema changes that force downtime. The time has come for a new approach that fundamentally advances the agility of distributed data infrastructures. Come learn about a new solution to the problems faced by software organ...
With the Apple Watch making its way onto wrists all over the world, it’s only a matter of time before it becomes a staple in the workplace. In fact, Forrester reported that 68 percent of technology and business decision-makers characterize wearables as a top priority for 2015. Recognizing their business value early on, FinancialForce.com was the first to bring ERP to wearables, helping streamline communication across front and back office functions. In his session at @ThingsExpo, Kevin Roberts...
IBM’s Blue Box Cloud, powered by OpenStack, is now available in any of IBM’s globally integrated cloud data centers running SoftLayer infrastructure. Less than 90 days after its acquisition of Blue Box, IBM has integrated its Blue Box Cloud Dedicated private-cloud-as-a-service into its broader portfolio of OpenStack® based solutions. The announcement, made today at the OpenStack Silicon Valley event, further highlights IBM’s continued support to deliver OpenStack solutions across all cloud depl...
Red Hat is investing in Tesora, the number one contributor to OpenStack Trove Database as a Service (DBaaS) also ranked among the top 20 companies contributing to OpenStack overall. Tesora, the company bringing OpenStack Trove Database as a Service (DBaaS) to the enterprise, has announced that Red Hat and others have invested in the company as a part of Tesora's latest funding round. The funding agreement expands on the ongoing collaboration between Tesora and Red Hat, which dates back to Febr...