Welcome! Securely Sync, Store & Share with Citrix ShareFile › seminar_slides › documents ›...
Transcript of Welcome! Securely Sync, Store & Share with Citrix ShareFile › seminar_slides › documents ›...
Securely Sync, Store & Share
with Citrix ShareFile
Welcome!
Dennis Kloster
System Source
Charlie Brinson
Citrix
Chris Riley
System Source
During the Webinar…
Audio – In presentation mode until end
Control Panel
View webinar in full screen mode
Feel Free to submit written questions
Open Q & A at the end – Please Raise Your Hand
and we will open up your line!
Survey at conclusion of webinar
If it hasn’t arrived by 12:15
Please double check with your receptionist
then contact Tracey Maranto:
EMAIL: [email protected]
CALL or TEXT: 443-865-6446
(we are recording the webinar –
so don’t think twice about stepping away
for a few minutes to go pick it up at your front desk!)
We Hope You
are Enjoying
Your Pizza!!
System Source & Citrix:
Long Term Citrix Partner since 1990’s
Citrix Solution Adviser
Specializing in:
Small Business to Enterprise
Non-profit
Education
© 2015 Citrix | Confidential
ShareFile OverviewWhat is ShareFile
© 2015 Citrix | Confidential
Fragmentation of Devices, Apps, and Data
Devices Data
© 2015 Citrix | Confidential
ShareFile Enables Mobile Workspaces
Create Content
outline
Full Content
Creation
Final Touches
and Present
© 2015 Citrix | Confidential
ShareFile OverviewShareFile from 25,000 feet
Application Tier• USA or Europe
• Web Application
• Reporting
Storage• Citrix-Managed
• Customer-Managed
Authentication• Active Directory / Multi-factor
• XenMobile / SAML 2.0 IdP
Clients
Authorization
Business Logic
© 2015 Citrix | Confidential
ShareFile OverviewStorage Options
NetworkShares
Personal Cloud Connectors
StorageZone Controller
StorageZones
Citrix-Managed Customer-Managed
Connectors
If it hasn’t arrived by 12:15
Please double check with your receptionist
then contact Tracey Maranto:
EMAIL: [email protected]
CALL or TEXT: 443-865-6446
(we are recording the webinar –
so don’t think twice about stepping away
for a few minutes to go pick it up at your front desk!)
We Hope You
are Enjoying
Your Pizza!!
© 2015 Citrix | Confidential
Securely edit Microsoft Office files & PDFs
© 2015 Citrix | Confidential
Online document viewing and editingVia Microsoft Office Online
• Rich file interaction without
requiring download
• Leverages Microsoft web app
viewer ᵒ PowerPoint animations
ᵒ Excel calculations
ᵒ MS Word & PDF rendering
ᵒ Edit in browser
© 2015 Citrix | Confidential
Sharing Content
© 2015 Citrix | Confidential
Document SharingAnonymous Sharing
• Immediate download or view
• Online viewing– Available when using Citrix-Managed StorageZones
– Utilizes Microsoft Office Web App server
– Word, Excel, PowerPoint, PDF
Audit logging– Timestamp
– IP address
© 2015 Citrix | Confidential
Document SharingRequest Contact Info
• Request for basic contact information– Email
– First name
– Last name
– Company
• Anonymous download
Audit logging– Name & email
– Timestamp
– IP address
© 2015 Citrix | Confidential
Document SharingRequire Client Login
• Restricts download by email address– Clients accounts automatically created
– Requires username and password
– Email validation
– Cannot forward sharing links/emails
Audit logging– First name, last name, email address
– Timestamp
– IP address
© 2015 Citrix | Confidential
Additional Sharing Controls
Require Client Login• Disables anonymous sharing of documents
• Restricts ability for recipients to forward shared links to someone else
Blacklist / Whitelist• Prohibit sharing with specific email domains
• Restrict sharing to only specific email domains
Client 2-step verification• 2-step verification on untrusted devices using SMS messages, Google Authenticator
© 2015 Citrix | Confidential
Sharing ContentExample: Sharing from Web
© 2015 Citrix | Confidential
ShareFile Tools
© 2015 Citrix | Confidential
ShareFile ToolsSync for Windows and Mac
• Automatic background sync
• Users can select which folders they
want available offline
• Remote wipe support
© 2015 Citrix | Confidential
ShareFile ToolsDrive Mapper
Great way to incorporate ShareFile into:
© 2015 Citrix | Confidential
ShareFile ToolsOutlook Plugin
© 2015 Citrix | Confidential
User ProvisioningUser Management Tool
© 2015 Citrix | Confidential
ShareFile User Provisioning
3 ways to provision users
Manual
• Input data via administration
portal (single entry or batch
import from Excel)
• Built-in support for user
provisioning
• Required for MDX-wrapped
ShareFile mobile apps
• Limited support for setting
ShareFile privileges
• No support for group creation
User Management Tool
• On-premises tool
• Creates and updates users,
groups, and group memberships
• Reads from Active Directory
• Supports scheduled
synchronization
© 2015 Citrix | Confidential
ShareFile User ProvisioningUse Existing data store
Active
Directory
Users
Groups
Employees
GroupsGroup Name
Employee Membership
First Name
Last Name
Email Address
© 2015 Citrix | Confidential
ShareFile AuthenticationSAML…SSO…XenMobile
© 2015 Citrix | Confidential
• Unified storefront for all
applications, data and services
• Instant user provisioning and de-
provisioning
• Single sign-on with Citrix Worx
• Real-time SaaS application
monitoring
• Comprehensive access control
policies
AuthenticationOptions available
ShareFile Managed
• Uses email address and a
ShareFile password
• Passwords are stored hashed in
the ShareFile Control Plane
• Admin portal supports password
policy management
Customer IdP
• Requires customer provided and
configured SAML 2.0 identity
provider
• Supports Forms, Basic, and
Windows Integrated protocols
• Tested with ADFS 2.0,
PingFederate, SiteMinder, Okta
• Supported only with ‘Enterprise’
tools
© 2015 Citrix | Confidential
Demo
© 2015 Citrix | Confidential
Workflows
© 2015 Citrix | Confidential
• Integrate Citrix into daily routine
• Save time
• Increase productivity
• Minimize human error
• Replace CRM
• Go paperless
• Digital transformation
Why Workflows?
© 2015 Citrix | Confidential
Which workflow works for you?Different types of workflows for different use cases
Document workflows
Automate document-based workflows with approval,
feedback, annotations, and e-signature
Business workflows
Automate business procedures, actions,
activities and processes
© 2015 Citrix | Confidential
WorkflowsDocument Workflows
• Built in to ShareFile
– Parallel approvals
– Sequential approvals
– Collect feedback
• Approved and/or signed versions return to SF
• Automate document-based workflows with approval, feedback, annotations, and e-signature
© 2015 Citrix | Confidential
WorkflowsBusiness / Process example use cases
• Employee onboarding
• Performance reviews
• Travel requests
• Procurement & work order approvals
• Expense approvals
• Invoice processing
• Procurement & work order approvals
• Field data gathering
• User account provisioning
• Group membership management
• HR process enforcement
© 2015 Citrix | Confidential
General ShareFile SecurityBuilt-in User and Device security
© 2015 Citrix | Confidential
General ShareFile SecurityBuilt-in User Security
• Disable Download
• Require Password / Login
• Session Inactivity timeout
• Two-step verification
• Account Lock-out
• Oauth Lifetime
• Password Complexity Requirements
© 2015 Citrix | Confidential
General ShareFile SecurityBuilt-in Mobile Device Security
• Encryption at rest / in-transit
• Offline / Online access to files
• Device Restrictions
• File Self Destruct (Poison Pill)
• Passcode / Pin Code
• Modified Device Detection
• External Applications
© 2015 Citrix | Confidential
Security:Reporting and Auditing
• ShareFile Reports
• Usage Report
• Access Audit
• Messaging
• Storage
• Bandwidth Detail
• Bandwidth Summary
© 2015 Citrix | Confidential
Security:Mobile Device Security – without Mobile Device Management software
• All settings are customizable:
- Self Destruct
- Require User Passcode
- Enable External Applications
- Enable Offline Access to Files
- Enable Automatic Login
- Restrict Modified Devices
- Jail broken Devices
• Remote Wipe
• Device Lock
© 2015 Citrix | Confidential
Data Loss PreventionContent Centric Security
© 2015 Citrix | Confidential
ShareFile DLP integrationWhy DLP
Enterprise customers need to restrict document sharing
based on the content found within the document. Problem
Solution
File Upload
StorageZone DLP(or other DLP
system)
Classification
© 2015 Citrix | Confidential
ShareFile DLP IntegrationSupported Providers (any that support the ICAP protocol)
© 2015 Citrix | Confidential
StorageZonesData Storage Flexibility
© 2015 Citrix | Confidential
Flexibility: ShareFile StorageZonesShareFile gives you options
Citrix-Managed StorageZones Customer-Managed StorageZones
© 2015 Citrix | Confidential
StorageZonesClients just see “ShareFile”
© 2015 Citrix | Confidential
ShareFile ConnectorsAccess existing data repositories
© 2015 Citrix | Confidential
ConnectorsWhy?
Documents stay in their native repository
No changes to permissions & auditing
Windows, iOS, Android, web
Open, edit, share, use offline
© 2015 Citrix | Confidential
ConnectorsWhat
NAS Data Personal Cloud and MiscECM Software
File Servers
(CIFS/SMB)
Home
Directory
ShareFile feature Connector Sharing can
allow on-premises data to be shared
externally
© 2015 Citrix | Confidential
Live Q & APlease “Raise Your Hand”
And we will Open Your Line
Please Take Our Brief Survey at Conclusion of the Webinar!
THANKS FOR SPENDING YOUR LUNCH WITH US