Citrix Launches CloudGateway 2

Add Your Comments

Citrix (CTXS)  announced the immediate availability of Citrix CloudGateway 2, featuring its new MDX mobile experience technology.

With the addition of MDX technology to CloudGateway 2 Citrix provides mobile app technologies that enable centralized management, security and control over native iOS, Android and HTML 5 apps. The four primary components of MDX include an App Vault, Web Connect – a secure mobile browser technology, Micro VPN – an app-specific secure access technology, and Policy orchestration for granular policy-based control over native mobile and HTML5 apps. CloudGateway also supports not only native mobile apps delivered through MDX, but also integration with Citrix ShareFile. Using CloudGateway with ShareFile, companies can give employees access to their files on whichever device they choose through seamless role-based management.

With corporate employees using multiple devices and the proliferation of mobile applications the days of managing a single corporate device are fading. A Citrix study found that most enterprises are now supporting an increasingly diverse portfolio of Windows, web and mobile apps. These trends are prompting enterprises to develop a new approach to end user computing – focusing on controlling apps and data, rather than the mobile device itself.

“The converged trends of BYO and mobile workstyles are here to stay, and are the key drivers forcing companies to re-think their enterprise mobility strategies,” said Sumit Dhawan, Group Vice President and General Manager, Receiver and Gateways.  These enterprises need to look beyond managing the device to managing the apps and data. With MDX Technology in CloudGateway, Citrix gives these enterprises an end-to-end solution that securely manages the apps and data, leaving device freedom in the hands of users. The powerful combination of CloudGateway, Citrix Receiver and ShareFile provides the missing piece in current solutions by allowing enterprises to support a mobile workforce while maintaining the right levels of security and control.”

About the Author

John Rath is a veteran IT professional and regular contributor at Data Center Knowledge. He has served many roles in the data center, including support, system administration, web development and facility management.

Add Your Comments

  • (will not be published)