• <Daha Fazlası Intel.com'da

Citrix* Security Solutions Bring Flexibility, Performance

The best of desktop virtualization for mobile laptop users

Üzgünüz, bu PDF yalnız indirme formatında kullanılabilir

For Citrix, it’s all about mobility. The number of corporate employees using laptops is growing, and more importantly, these employees are constantly on the move—taking sensitive business data with them. More than ever, companies must make sure that their data is backed up and protected.

This vendor spotlight features Peter Blum, director of product management and marketing for Citrix* XenClient*, discussing how the XenClient solution addresses these challenges by providing greater flexibility for mobile users working both online and offline, and maximum security control for IT managers. XenClient extends the performance, flexibility, and security of desktop virtualization to mobile laptop users by leveraging Intel® vPro™ technology1 to help improve security and simplify IT management. The solution protects corporate data and applications using Intel Advanced Encryption Standard New Instructions2 (Intel AES-NI), which encrypts data up to four times faster;3 enforces robust policy controls to block unauthorized movement of data from the laptop, such as copying data to a USB flash or optical drive; and backs up user data unobtrusively and securely from any location. XenClient leverages Intel Virtualization Technology4 for CPU (Intel VT-x) to virtualize workloads based on Microsoft* Windows*using hardware-based support, and uses Intel Virtualization Technology for Directed I/O (Intel VT-d) to create a virtual experience that feels like a regular Windows-based laptop experience. In addition, XenClient allows for image management, which is part of Intel’s vision of Intelligent Desktop Virtualization. IT managers are able to use a single image of their corporate desktop to deploy, update, and roll back their distributed computing environments.

1. Intel vPro™ technology is sophisticated and requires setup and configuration. Availability of features and results will depend upon the setup and configuration of your hardware, software, and IT environment. To learn more, visit intel.com/technology/vpro/.
2. Intel AES-NI requires a computer system with an AES-NI–enabled processor, as well as non-Intel software, to execute the instructions in the correct sequence. AES-NI is available on select Intel Core™ processors. For availability, consult your system manufacturer. For more information, visit http:///software.intel.com/en-us/articles/intel-advanced-encryption-standard-instructions-aes-ni.
3. Software and workloads used in performance tests may have been optimized for performance only on Intel microprocessors. Performance tests, such as SYSmark* and MobileMark*, are measured using specific computer systems, components, software, operations, and functions. Any change to any of those factors may cause the results to vary. You should consult other information and performance tests to assist you in fully evaluating your contemplated purchases, including the performance of that product when combined with other products.
4. Intel Virtualization Technology requires a computer system with an enabled Intel processor, BIOS, and virtual machine monitor (VMM). Functionality, performance, or other benefits will vary depending on hardware and software configurations. Software applications may not be compatible with all operating systems. Consult your PC manufacturer. For more information, visit intel.com/go/virtualization.