summer 2017 citrix corporate template - fowt · © 2018 citrix | summit 2018 | confidential...
TRANSCRIPT
© 2018 Citrix | Summit 2018 | Confidential – Content in this presentation is under NDA
Citrix Analytics An overview
Niek Boevink
Senior Sales Engineer Citrix
9 OKTOBER 2019
© 2018 Citrix | Summit 2018 | Confidential – Content in this presentation is under NDA
Emphasis on Machine Learning based modeling to
reduce ‘data-to-value’ barrier
Data analysis, correlation and insights across all
Citrix products
Delivered from Cloud, but supports hybrid Citrix
deployments
VALUE ACROSS CITRIX ECOSYSTEM
DELIVERED VIACITRIX CLOUD
AI / ML DRIVEN ANALYTICS
CITRIX ANALYTICS STRATEGY
© 2018 Citrix | Summit 2018 | Confidential – Content in this presentation is under NDA
TURN-KEY
Turn-key data collection
User behavior & context based
1
ACCURATE
Correlation from multiple vantage points for accuracy
Machine Learning based models
2
AUTONOMOUS
Closed-loop autonomous actions
Granular policy control
3
Citrix Analytics is Unique
Sense Analyze Respond
© 2018 Citrix | Summit 2018 | Confidential – Content in this presentation is under NDA
Citrix Analytics
Security Performance Operations
Citrix Virtual AppsCitrix Endpoint Management
CITRIX CONTENT COLLABORATION
CITRIX NETWORKING&
ACCESS CONTROL
Director | Smart CheckCitrix Application Delivery
Management | SD-WAN InsightCitrix Endpoint Management Analyzer
Users
Apps NetworksAi / ML
© 2018 Citrix | Summit 2018 | Confidential – Content in this presentation is under NDA
On-premises Public Clouds Hybrid ModevSphere | Citrix Hypervisor |
Hyper-vAWS | Azure | Google | Oracle
Customer Managed Customer Managed Citrix & Customer Managed
Analytics for On-premises and Cloud Customers
© 2018 Citrix | Summit 2018 | Confidential – Content in this presentation is under NDA
Networking Offerings / Access Control
Virtual Apps & Desktops
Endpoint Management
Content Collaboration
Collect Data
Generate Insights
Citrix Analytics
Virtual Apps & Desktops
Endpoint Management
Networking Offerings / Access Control
Content Collaboration
Take Actions
Citrix Analytics FLOW
© 2018 Citrix | Summit 2018 | Confidential – Content in this presentation is under NDA
Security Analytics
© 2018 Citrix | Summit 2018 | Confidential – Content in this presentation is under NDA
Leading cause of security Breaches?
32%
25%
23%
20%Human Error
Phishing
Ransomware
Lost Devices
- BakerHostetlers Data Security Incident Report
• Average security events per day: 200,000 events
• Average malware alerts per week: 17,000 alerts, only 4% are investigated
• Average annual cost of false positives: $1.37 million
Source: IBM & Ponemon Institute
Why Citrix Analytics Security?
© 2018 Citrix | Summit 2018 | Confidential – Content in this presentation is under NDA
Closed-loop, autonomous system to dynamically adjust security
Citrix Analytics
Security
User Behavior Security Analytics
Application Security Analytics
Data Security Analytics
User Behavior Security Analytics
© 2018 Citrix | Summit 2018 | Confidential – Content in this presentation is under NDA
VRAAG:
Het percentage van security breaches door gecompromitteerde inloggegevens en zwakke wachtwoorden? 1 81%
1. Verizon Data Breach Investigations Report (DBIR)
© 2018 Citrix | Summit 2018 | Confidential – Content in this presentation is under NDA
DescriptiveWhat happened?
DiagnosticHow it happened?
PredictiveWhat will happen?
PrescriptiveWhat to do?
Excessive (sensitive) file downloads
Stolencredentials
Loss of(sensitive) data
QuarantineUser
Example
© 2018 Citrix | Summit 2018 | Confidential – Content in this presentation is under NDA
User Behaviors & Categories
Access
Content
Apps
Network
Notifications & Policy Control
Policy
High
Medium
Low
Proactive, Granular, Policy Control
Citrix Workspace
SaaS Apps
Mobile Apps
Networks
PartnerEcosystem
Devices
Content
Virtual Apps
ML Modeling, Profiles, & Risk Scores
Risk Meter
User behavior security analytics
© 2018 Citrix | Summit 2018 | Confidential – Content in this presentation is under NDA
Risk Scores are values that indicate the aggregate level of risk a user poses– Based on User Behavior Analytics
– Dynamic and based on patterns for specific user behaviors
Risk Indicators are user activities that look suspicious or can pose a security threat to your organization– Provided by different Citrix products
Administrators can provide feedback to report if a risk indicator is accurate
Risk Score & Risk Indicator
© 2018 Citrix | Summit 2018 | Confidential – Content in this presentation is under NDA
Access Data App Group
Risk Indicators
Endpoint Management
Content Collaboration
Gateway
Access Control
Virtual Apps & Desktop
Other…
Policy based violations
User Behavior Modeling Over
Time
Peer Group Normalization
AI/ML anomaly behavior detection
How the User Risk Score Works
© 2018 Citrix | Summit 2018 | Confidential – Content in this presentation is under NDA
Events Generate Insights
Citrix Analytics
Take Actions
Citrix Sources
• Citrix Virtual Apps & Desktops
• Content Collaboration• End point management• Networking
Microsoft Sources
• Azure AD ID Protection• Windows ATP
Risk Indicators
MicrosoftGraph Security
API
Citrix
• Citrix Virtual Apps & Desktops
• Content Collaboration• End point management• Networking
Microsoft Graph Security Integration
© 2018 Citrix | Summit 2018 | Confidential – Content in this presentation is under NDA
• Actions can be invoked at will by a Citrix Analytics administrator
• Actions can be invoked automatically by the system based on the rules defined by the administrator
• Rules are defined so once a condition is met, the action is executed
Rules & Actions
© 2018 Citrix | Summit 2018 | Confidential – Content in this presentation is under NDA
Content Collaboration
Excessive file downloads
Excessive file sharing
Excessive file uploads
Ransomware Activity Suspected (Files Replaced)
Excessive access to sensitive files (DLP alert)
Unusual logon access
Ransomware Activity Suspected (files updated)
Excessive file/folder deletion
Virtual Apps & Desktop
Access from New Device(s)Access from device with unsupported OS
Usual Application Usage (SaaS)Usual Application Usage (Virtual)
Potential data exfiltration
Access ControlAttempt to Access Blacklisted URL
Risky Website Access Unusual Download Volume
Unusual upload volume
Risk Score
Risk score Risk score change
Gateway
Logon failures
EPA scan failures
Authorization failures
Unusual logon access
Endpoint Management
Device with blacklisted apps detected
Jailbroken or rooted device detected
Unmanaged device detected
Log off User
Gateway
Notify Administrator
Content Collaboration
Disable UserExpire All Links
Virtual Apps & Desktop
Stop Session RecordingLog off User
Start Session Recording
Notify Admin
Endpoint Management
Lock DeviceNotify User
Global
Add to watchlist
IF the following condition is met
RULES / POLICY
THEN do the following
ACTIONS
© 2018 Citrix | Summit 2018 | Confidential – Content in this presentation is under NDA
• Detect & mitigate threats from trusted internal users with malicious intent
• Easily identify high risk users with drill-down capabilities on behavior
• Apply corrective actions
Admin Experience, User Risk
© 2018 Citrix | Summit 2018 | Confidential – Content in this presentation is under NDA
Risk Indicators
© 2018 Citrix | Summit 2018 | Confidential – Content in this presentation is under NDA
• Users accessing malicious & risky websites
• Uploads/ downloads to malicious & risky websites
• Historical views by user and website access
Admin Experience, User Access
© 2018 Citrix | Summit 2018 | Confidential – Content in this presentation is under NDA
Performance Analytics
© 2018 Citrix | Summit 2018 | Confidential – Content in this presentation is under NDA
Leverage AI/ML algorithms to translate data into readily actionable insights
Citrix Analytics
Performance & Operations
App, Network & Infrastructure Usage Analytics
Application Performance Analytics
Application Performance Anomaly Detection
© 2018 Citrix | Summit 2018 | Confidential – Content in this presentation is under NDA
Customers Use Disparate Tools to Manage Performance
Virtual Apps & Desktops
SaaS Apps Mobile & Native Apps Content Collaboration
Workspace
Even when utilizing Citrix tools like Citrix Director—it only gives us visibility into a SINGLE site
Why Citrix Analytics for Performance
© 2018 Citrix | Summit 2018 | Confidential – Content in this presentation is under NDA
• User-centric experience scores, Application & Infrastructure performance scores through advanced analytics
• Will be available to all on-prem. & Cloud Citrix Virtual Apps and Desktops customers
Overview
• Quantify UX & app. performance.
• Isolate Users and Apps experiencing poor performance
• End-to-end visibility - integrate Networking & Workspace data, insights
• Multi-site aggregation & reporting
• Tools for faster troubleshooting
Key Use Cases
Citrix Analytics for Performance
© 2018 Citrix | Summit 2018 | Confidential – Content in this presentation is under NDA
Performance Analytics
User Experience Score
Poor1-40
• Prolonged degradation in performance of multiple indicators
• Continuous lags or high number of failures. • Could indicate infrastructure and resource
failures.
Fair41-70
• Performance degradation for a limited time window.
• One-off degradation events such as single reconnection etc.
Excellent71-100
• Optimal experience • Majority excellent experience across
indicators
Contextual Benchmarking
Statistical Modelling
Latency
Logon Duration
Failures
Reconnections Relative ImpactFactors
Drilldowns for RCA
The development, release and timing of any features or functionality described for our products remains at our sole discretion and are subject to change without notice or consultation. The information provided is for informational purposes only and is not a commitment, promise or legal obligation to deliver any material, code or functionality and should not be relied upon in making purchasing decisions or incorporated into any contract.
How long the keystroke takes to appear?
How long to launch apps?
How often the session fails to launch?
Is the flaky network causing reconnections?
How UX score works?
© 2018 Citrix | Summit 2018 | Confidential – Content in this presentation is under NDA
© 2018 Citrix | Summit 2018 | Confidential – Content in this presentation is under NDA
© 2018 Citrix | Summit 2018 | Confidential – Content in this presentation is under NDA
© 2018 Citrix | Summit 2018 | Confidential – Content in this presentation is under NDA
© 2018 Citrix | Summit 2018 | Confidential – Content in this presentation is under NDA
© 2018 Citrix | Summit 2018 | Confidential – Content in this presentation is under NDA
© 2018 Citrix | Summit 2018 | Confidential – Content in this presentation is under NDA
© 2018 Citrix | Summit 2018 | Confidential – Content in this presentation is under NDA
Assess Citrix Health for multiple sites or a single site
User Sessions – How is Citrix VAD?
Quantify End User Experience thru Network Latency KPI
User Sessions – How is Citrix VAD?
© 2018 Citrix | Summit 2018 | Confidential – Content in this presentation is under NDA
Visibility into your workloads
Infrastructure Availability
© 2018 Citrix | Summit 2018 | Confidential – Content in this presentation is under NDA
Getting StartedSecurity Analytics
© 2018 Citrix | Summit 2018 | Confidential – Content in this presentation is under NDA
Onboarding Product DiscoverySecurity Analytics
© 2018 Citrix | Summit 2018 | Confidential – Content in this presentation is under NDA
• Automatic discovery of Virtual Apps & Desktops added to Workspace
• Actions require Smart Tools agent to be installed on the Delivery Controller or Smart Tools service to be utilized
Onboarding: On-Prem Virtual Apps & Desktops
© 2018 Citrix | Summit 2018 | Confidential – Content in this presentation is under NDA
Getting StartedPerformance Analytics
© 2018 Citrix | Summit 2018 | Confidential – Content in this presentation is under NDA
On-prem. Virtual Apps & Desktops
Virtual Apps & Desktops Cloud
Workspace Premium Plus
• Requires Citrix Analytics Account
• No new components
• Upgrade DDC and Director to 1909 release*
• Does not require workspace
• Outbound 443 connection
• Requires Citrix Analytics Account
• Single step onboarding
*The development, release and timing of any features or functionality described for our products remains at our sole discretion and are subject to change without notice or consultation. The information provided is for informational purposes only and is not a commitment, promise or legal obligation to deliver any material, code or functionality and should not be relied upon in making purchasing decisions or incorporated into any contract.
© 2018 Citrix | Summit 2018 | Confidential – Content in this presentation is under NDA
© 2018 Citrix | Summit 2018 | Confidential – Content in this presentation is under NDA