The Citrix Session

Citrix's Strategic Moves in Security and App Development

XenTegra / Andy Whiteside / Bill Sutton Episode 172

In this episode of The Citrix Session, Bill Sutton and guests delve into Citrix's recent strategic acquisitions of Device Trust and Strong Network, examining how these integrate with Citrix's security framework and enhance hybrid work environments. Join Andy Whiteside, Aaron Banner, Todd Smith, and Geremy Meyers as they explore the implications of these new capabilities on zero-trust architecture and secure private access. Discover how Citrix is not just improving security measures but also facilitating app development within its platform to adapt to the evolving needs of modern enterprises. Whether you're a security professional or involved in enterprise IT, this discussion will provide deep insights into how Citrix's latest enhancements can streamline operations and fortify security protocols in your organization.

WEBVTT

1
00:00:02.460 --> 00:00:16.315
Bill Sutton: Hello, everyone, and welcome to episode 1 72 of the Citrix session. I'm your host today. Built. My name is Bill Sutton, the director of modern workspaces integra. I have some others integra folks on the call with us, as well as a couple of folks from

2
00:00:16.710 --> 00:00:22.310
Bill Sutton: from Citrix, so we'll start off with Andy Whiteside from Zintegra. Andy. Introduce yourself real quick.

3
00:00:22.310 --> 00:00:34.559
Andy Whiteside: Hey, Bill? Glad to be on love what we do. Glad we're doing these, and excited to talk about Citrix and security today, which it's always been a security that always, always been a security play for me.

4
00:00:35.090 --> 00:00:38.129
Andy Whiteside: The idea of 0 trust in my world started with Citrix.

5
00:00:38.350 --> 00:00:52.110
Bill Sutton: Yes, and in that vein we also have with us another person from Zentegra, Aaron Banner, Aaron Banner. Why don't you introduce yourself and talk about your role, and and so forth. Since it's this 1st time you've been on welcome.

6
00:00:52.280 --> 00:01:13.400
Aaron Banner: Yeah. Hey, thanks, Bill, appreciate the opportunity to join you today. Yeah, I'm Aaron Banner. I run 2 practices with integra. I run a networking practice. And I run a security practice. And I think we're here today to talk a little bit about security 0 trust app development and some key things that comes out of this. This acquisition from Citrix. Thanks.

7
00:01:14.110 --> 00:01:19.020
Bill Sutton: Great Aaron. Appreciate that. Alright, Todd, you want to just say hello to the folks.

8
00:01:19.210 --> 00:01:23.249
Todd Smith: Sure, hey? It's Todd Smith from Citrix, glad to be here again.

9
00:01:23.520 --> 00:01:28.339
Bill Sutton: Yeah, of course. Glad to have you. And last, but not least, Mr. Myers. Mr. Jeremy Myers.

10
00:01:28.340 --> 00:01:34.590
Geremy Meyers: Bringing up the rear. My name is Jeremy. It's a pleasure to see you all. And, Aaron, it's a pleasure to meet you, too, actually.

11
00:01:34.590 --> 00:01:35.729
Aaron Banner: Yeah. Same. Here.

12
00:01:35.940 --> 00:01:36.490
Bill Sutton: Yep.

13
00:01:36.620 --> 00:01:54.250
Bill Sutton: So the article we're Gonna cover today. The blog article is entitled Citrix Strengthens 0 trust security posture with strategic acquisitions of device, trust and strong network. That's a long title. But it's by Sridhar Mulaputi, who's the business unit manager, I believe, over Citrix.

14
00:01:54.551 --> 00:02:08.849
Bill Sutton: This this is a new basically talking about a new acquisition Citrix made last week of 2 companies device trust and strong network. And we're going to go a little bit deeper in in into this in terms of what these do and how they

15
00:02:08.889 --> 00:02:13.070
Bill Sutton: they augment or benefit the citrix ecosystem.

16
00:02:13.070 --> 00:02:17.050
Andy Whiteside: I was. Gonna I told you guys coming. I wasn't gonna say much, but I already see something. I gotta talk about.

17
00:02:17.050 --> 00:02:17.850
Bill Sutton: Please.

18
00:02:18.480 --> 00:02:37.780
Andy Whiteside: So what I just realized is the number one security play at Zintegra historically and still is Citrix, where people remotely access data and applications, whether they're on the network or remote, and the number one and 2 people that I need to work with in this space are Jeremy and Todd and my security. Guy just met them for the 1st time.

19
00:02:38.070 --> 00:02:38.680
Bill Sutton: Yep.

20
00:02:39.270 --> 00:02:39.960
Andy Whiteside: That's

21
00:02:40.190 --> 00:02:52.950
Andy Whiteside: the the alignment around Citrix, and and security in our world is makes complete sense, bringing us together and us going to the market, together with Citrix and security. I just realized that I I failed.

22
00:02:53.420 --> 00:03:16.690
Geremy Meyers: So Andy, to be fair. We walked into that one a little bit right? So I didn't tee that up whatsoever. But, to be honest, you know I had a meeting with a Ciso recently, where I had to convince we had to convince as an account team. We had to convince the Ciso that it was worth meeting with us by socializing. You know there's a so, you know, there's a security aspect of what it is, we do.

23
00:03:16.860 --> 00:03:19.709
Geremy Meyers: and it was completely on unknown to her. So

24
00:03:20.970 --> 00:03:31.110
Geremy Meyers: so I say all that, just to say, we're in a space where Citrix is almost out of the gate been a security solution, and yet doesn't always look good as one. So.

25
00:03:31.110 --> 00:03:39.210
Andy Whiteside: It has one job. It has one job, and that's get people access to applications and data in a high definition, user experience. And securely.

26
00:03:39.530 --> 00:03:41.599
Andy Whiteside: That's what Citrix does.

27
00:03:42.690 --> 00:03:45.439
Todd Smith: And I think I think, Andy, one of the

28
00:03:45.660 --> 00:03:50.120
Todd Smith: kind of a comment that goes along with your your statement that you just made is

29
00:03:50.340 --> 00:03:54.420
Todd Smith: security has always been considered as an add-on to that stack.

30
00:03:55.220 --> 00:04:04.010
Todd Smith: We should really look at it as securely, providing access remotely or on network to applications and data

31
00:04:04.140 --> 00:04:04.690
Todd Smith: instead of.

32
00:04:04.690 --> 00:04:06.809
Andy Whiteside: With the with the high definition, user experience.

33
00:04:06.810 --> 00:04:18.549
Todd Smith: Correct. Yeah. And it it would be great if we could say, all of those things are equal and parallel when we're making that statement. But we don't talk that way. We need to have things in a sequence.

34
00:04:18.660 --> 00:04:25.070
Todd Smith: but I think we need to change the mindset a little bit within our customer and our partner community to better understand

35
00:04:25.290 --> 00:04:33.399
Todd Smith: that we've been doing security for almost our entire time. That Citrix has been a company

36
00:04:35.010 --> 00:04:45.120
Todd Smith: and we always got caught up in the you know the one slide that, said Citrix, secure by design, that always led to conversations about. Well, what do you? What exactly. Do you mean by that?

37
00:04:46.320 --> 00:04:50.760
Todd Smith: This is, you know what we're gonna talk about in this article is really

38
00:04:51.060 --> 00:04:59.160
Todd Smith: expanding upon that, secure by design concept and really talk about. You know, this is something we've been doing for 30 plus years.

39
00:05:00.040 --> 00:05:00.760
Andy Whiteside: And I think.

40
00:05:01.170 --> 00:05:03.040
Geremy Meyers: So you know, I think

41
00:05:03.220 --> 00:05:07.939
Geremy Meyers: to be fair as a Citrix employee, I mean, I've been here 12 years now.

42
00:05:08.558 --> 00:05:19.239
Geremy Meyers: Yeah, we could do a better job of really sort of articulating where we fit into the security story of the customer. Right? So when we talk about security like that's very nebulous word, right? So most

43
00:05:19.510 --> 00:05:24.650
Geremy Meyers: customers have a layered approach to security, you know. Where does Citrix fit into that layered approach?

44
00:05:24.910 --> 00:05:33.019
Geremy Meyers: And so, understanding, like what the solution does, honestly understanding our customers approach to security. And of course.

45
00:05:33.510 --> 00:05:39.349
Geremy Meyers: you know, kind of where we play into that where where we layer, into that, you know. I think we've got a pretty powerful story, but it can't be

46
00:05:39.620 --> 00:05:54.640
Geremy Meyers: Todd to your point. We can't have the one slide that's secure by design. What does that even mean? Right? So I think you know what we do here with strong network. You know what we do from the Citrix solution really should be understanding. You know, where we fit into a customer strategy. And I think that's honestly where we probably need to get better as an organization.

47
00:05:55.190 --> 00:06:06.669
Aaron Banner: Well, and you know there's there's also the the mindset that you can. You can never stop innovating. You can never stop trying to become more secure, and you can look at it, as

48
00:06:06.860 --> 00:06:27.110
Aaron Banner: you know, just just the the latest acquisition from Citrix. You can look at it as maybe defense in depth or or defense across a broad spectrum. But I mean, what about a year ago, I think Citrix bought Uber agent you know, a European company then, just now, Device Trust and and strong network. Strong network, I believe, is a Swiss Company

49
00:06:27.110 --> 00:06:54.410
Aaron Banner: device. Trust I. You know I looked up before we came here. To to understand a little bit more about them. But you know gmbh, gmb, ha! So tells me they're a a German company. So something's happening in Europe that Citrix really likes. And and and they're pulling in. It looks to me like a lot of the right capabilities. From these partnerships or these acquisitions in order to to really drill down on on their security platform.

50
00:06:54.600 --> 00:06:57.380
Andy Whiteside: Aaron, and what I think it is is overall. The

51
00:06:57.740 --> 00:07:08.979
Andy Whiteside: the world of Citrix is secure by design, secure from the beginning, and then you factor in the ecosystem like the Igels. And now the device trusts the world, and it only compounds the security narrative.

52
00:07:09.150 --> 00:07:09.790
Aaron Banner: Right.

53
00:07:11.740 --> 00:07:33.660
Bill Sutton: All good stuff. So let's talk. Talk 1st about device trust. You know, there's some elements in this blog article that talk about the benefits of it. But why don't we talk 1st about what what it does and what it accomplishes, at least from a technical or or end user experience level. And Jeremy, can you talk about it? I can talk a little bit about it. But I thought I'd start with you.

54
00:07:34.130 --> 00:07:42.949
Geremy Meyers: Oh, man, so I'm still picking this apart. Actually. So you know, the one thing that it seems to overlap with is our security app, you know, analytics platform.

55
00:07:43.020 --> 00:07:45.190
Geremy Meyers: And the idea behind that was

56
00:07:45.210 --> 00:08:14.039
Geremy Meyers: to sort of have continual security posturing right? And this is what device trust does really? Well, so the idea is, you know, I can certainly just from a 0 trust perspective, you know, I can certainly sort of vet you out on the way in. Be fair. You know, we've got a solution. That kind of already does that with device posturing service. Right? So if you're a cloud customer and you're authenticating through the workspace. There is a front door you've got to get through in order to, you know, even get initial access. But I think the idea behind device. Trust is continual.

57
00:08:14.040 --> 00:08:14.360
Bill Sutton: Yes.

58
00:08:15.757 --> 00:08:34.550
Geremy Meyers: not so much authorization. Maybe it's authorization. This is where I get my security words mixed up. But you know, listen! If I turn off a feature of my machine like at the the firewall turned on. I turn it off, you know. That's a change in my posture. I want to take immediate action. Maybe I switch networks. I'd like for my posture to change immediately, like I don't wanna wait

59
00:08:34.669 --> 00:08:50.320
Geremy Meyers: 2 min, 3 min, 5 min or the next time I log in for that posture check to happen. So a big piece of this is some pretty granular controls that happen in session on the fly, and immediately can restrict access based on your change in posture.

60
00:08:50.960 --> 00:09:16.469
Aaron Banner: Well, yeah. And if I can chime in just a little bit on what? What I what I understand now about Device Trust. You know we've been trying to continually answer the challenge of this remote hybrid workforce. And you know this is another great way to do that. So you know in in the identity space. If you will. You've got personal entities and non personal entities.

61
00:09:16.470 --> 00:09:33.640
Aaron Banner: Device Trust really looks at those non personal entities, looks at the systems accessing your network and and granting access. And so it's not only saying that this device is able to access this network.

62
00:09:33.640 --> 00:09:52.639
Aaron Banner: but it's looking at all the things that are on that device, and you can, tailor device, trust to the devices, to the information you want. It's not just what it gives you you know, by default. But you can say, I want to know these things about these types of devices, whether that be a network device or an endpoint device, whatever that is.

63
00:09:52.800 --> 00:10:06.579
Aaron Banner: And so it's going to, as it's as it's allowing or disallowing association with the network or association or access to information. It is going to verify not only that device, but what's on that device.

64
00:10:08.050 --> 00:10:32.859
Bill Sutton: Right. It can also because I tested this out a little bit in the demo environment that Citrix is got available for us. And the interesting thing that I found about it was to Jeremy's point, of course, that you can do the device posture as you as you come in the front door but once you're in the door and you've got your you're running your desktop. If you start certain applications in the case of the demo environment. It was the snipping application. It immediately locks your session.

65
00:10:33.220 --> 00:10:52.180
Bill Sutton: And if you and to Jeremy's point, if you were to disable a firewall on it, it would do the same thing. So it's it's it's monitoring the environment real in real time and looking for changes in behavior. If you plug in a USB stick. Maybe it locks the environment, that sort of thing. You can set all kinds of

66
00:10:52.180 --> 00:11:02.989
Bill Sutton: granular policies. To provide contextual access based on what the user is doing. So there's a lot of security benefits in that regard. But it's interesting how it works.

67
00:11:04.190 --> 00:11:07.920
Todd Smith: And it's and it's really, you know, to just even add on to that.

68
00:11:08.140 --> 00:11:13.960
Todd Smith: you know. Think about this as more and more companies are addressing. Bring your own. Bring your own device

69
00:11:15.340 --> 00:11:19.830
Todd Smith: environments. Or you know, users are starting to do things like

70
00:11:20.670 --> 00:11:33.369
Todd Smith: do updates of either an application, some type of software or operating system update or even adding a plugin into a browser can have an impact on the overall security posture of that device itself.

71
00:11:33.890 --> 00:11:50.830
Todd Smith: And that's happening in the background after you've already set up your Citrix connection. Right? So we need to make sure that we have something in the in the way in the path of that user connecting into a virtual app or virtual desktop environment, to be able to detect that

72
00:11:51.010 --> 00:11:53.200
Todd Smith: there's been something that has changed.

73
00:11:53.430 --> 00:11:57.909
Todd Smith: and apply the appropriate policy associated with that change.

74
00:12:02.860 --> 00:12:11.459
Bill Sutton: Definitely. Yes, anything else on device trust in particular, either generally or specifically, about the the acquisition before we move forward.

75
00:12:11.720 --> 00:12:13.409
Geremy Meyers: Yeah, I mean, I think

76
00:12:13.860 --> 00:12:24.510
Geremy Meyers: this is a very important piece to include in the Citrix stack. And it's so important that we have made this a part of not only the new hybrid multi cloud license which

77
00:12:24.620 --> 00:12:38.580
Geremy Meyers: you know most customers are migrating to, so if you're not familiar, I know we've covered this several times. It is the the pretty standard license most customers land on this. It's a combination of cloud, and on prem licensing and several other buckets, including Uber agent. By the way, that was recently moved into this

78
00:12:39.270 --> 00:12:55.859
Geremy Meyers: do this license, but it also includes legacy das legacy, universal workspace service. So any cloud service that you you own. You will get access to this piece. That's how important product management and the business think device trust 0 trust network access is to

79
00:12:56.538 --> 00:13:15.000
Geremy Meyers: just the security stack. So I think that's important point to make. And from a layered perspective, it also includes now, like I mentioned Uber agent. So yes, I can get visibility into my environment from a infrastructure perspective. I'm looking at the vdas. I'm looking at the citrus components. Heck. I can even look at and monitor.

80
00:13:15.000 --> 00:13:27.840
Geremy Meyers: you know, components to support the citrus components like, say, your SQL. Database. But at the same time there are security events that can be monitored from an Uber agent perspective as well. So again, we talked about that defense in depth that layered approach.

81
00:13:27.950 --> 00:13:36.040
Geremy Meyers: You can see where we're bringing this into just the standard core components of that Uhmc or even Das service license.

82
00:13:36.040 --> 00:14:03.420
Andy Whiteside: Well, let's talk about the business aspect of that for Citrix to continue to be relevant. It's about taking the good and great technologies they have, and then stacking additional things on top of that. So that when somebody is trying to evaluate, okay, maybe I just want to move to Microsoft. Avd, I want to use, like some minimal product to get this job done. Yes, you could do that from a decent user experience perspective. But Citrix is stacking up high definition, user experience along with high definition security simultaneously to make the platform

83
00:14:03.480 --> 00:14:11.180
Andy Whiteside: valuable to the point where there's something in that stack that the client can't live without, and they're willing to pay for the more premium product.

84
00:14:13.370 --> 00:14:16.669
Geremy Meyers: Yeah. And honestly, Andy, to bring it home, because you usually stop me

85
00:14:17.050 --> 00:14:32.510
Geremy Meyers: whenever I get started down the path of this citrix value, and you go honestly. The number one thing, historically has been what the fact that it's multi cloud hybrid cloud.no, it's the fact that the protocol is. So that's the secret sauce right there. The hdx, the Ica piece, the user experience.

86
00:14:32.510 --> 00:14:33.030
Andy Whiteside: Sure.

87
00:14:33.350 --> 00:14:40.650
Geremy Meyers: It's thing number one. And I think what you're seeing your point is, security is just becoming more embedded and visible into the base product.

88
00:14:40.650 --> 00:14:46.940
Andy Whiteside: Well, I think what I'm saying is, yeah, the the protocol is still the one I want to pull out of the bag. If I have to go tackle a project.

89
00:14:47.240 --> 00:14:56.200
Andy Whiteside: but that's harder to sell people on. And then all of a sudden, you point out just key components like we're talking about here, and all of a sudden. Yeah, my security guy can't live without that. Let's go.

90
00:14:59.460 --> 00:15:04.929
Bill Sutton: Yeah, absolutely anything else on the Device trust piece before we move on to strong networks.

91
00:15:08.030 --> 00:15:27.490
Bill Sutton: Alright strong networks. I I'd be honest to the listeners. I this one kind of confounded me. I'm hoping that some of the guys from Citrix can really shed some light on this one. It. It looks like some sort of development environments that are enabled from from Das or from Cbad. Can you guys elaborate at all on this.

92
00:15:28.470 --> 00:15:31.999
Todd Smith: Yeah, I I think I could take a stab at this one because it's a

93
00:15:32.220 --> 00:15:43.200
Todd Smith: it. It's really dealing with the the devops right? It used to be, you know, if you think about it, you used to have programmers, and you have operations team right

94
00:15:43.380 --> 00:15:57.039
Todd Smith: in in the cloud, especially these these cloud based applications that are being constantly tweaked and updated. And things like that, that line between development and operations has really kind of blurred.

95
00:15:57.160 --> 00:16:02.240
Todd Smith: And you now have some organizations that are saying.

96
00:16:02.370 --> 00:16:05.640
Todd Smith: You know what our developers do have access to

97
00:16:05.910 --> 00:16:10.410
Todd Smith: migrate code and to do things with that.

98
00:16:10.520 --> 00:16:22.539
Todd Smith: With that shift. There's been a much more increased need for better security and better monitoring and restrictions on what they can do and how they do it.

99
00:16:22.640 --> 00:16:28.964
Todd Smith: So strong networks really kind of helps be able to kind of bridge that gap there.

100
00:16:30.010 --> 00:16:37.999
Todd Smith: securing resources, you know. So giving giving access to a developer to a secured development environment

101
00:16:38.290 --> 00:16:45.710
Todd Smith: that then restricts their ability to go up and just push things directly into production without going through a couple of gates.

102
00:16:45.900 --> 00:17:00.890
Todd Smith: Whether that be some type of authorization or some type of data and code control, or some type of kind of a automated workflow before you can actually push those things into a production environment.

103
00:17:02.520 --> 00:17:06.640
Aaron Banner: Yeah, I mean, development inherently is is very

104
00:17:06.859 --> 00:17:20.029
Aaron Banner: insecure, not secure. In general. And I I think this is something that gets lost on a lot of the developers out there. Or you know, companies that that are leading, you know, development teams.

105
00:17:20.250 --> 00:17:32.179
Aaron Banner: And so you know, there, there's there's multiple ways, multiple tools out there to solve this challenge. But it's it's clearly a challenge that that Citrix wanted to take on and and

106
00:17:32.350 --> 00:17:54.729
Aaron Banner: in the issue I think you have team is that you know, you've got someone working on, you know, a development scenario here. And with the the hybrid or multi cloud environment. You know, you may have pieces of that, whether it be tools or data, or whatever scattered everywhere, you know, you may be doing development here in azure and some some other things. Data or tools may be in aws.

107
00:17:55.022 --> 00:18:09.629
Aaron Banner: You may have some an On Prem environment that's accessing that. So you've got. You're you're doing this one action in this one place. But you're you're reaching all over the place in order to pull all that together. And so the theory behind what's what's happening here is that

108
00:18:09.850 --> 00:18:23.549
Aaron Banner: you're you're you're securing. You know that from from the start of development all the way through to to landing in a protection environment. And that's that's critical and something that a lot of organizations. Just I clearly I've seen don't understand.

109
00:18:23.950 --> 00:18:24.480
Todd Smith: Yeah.

110
00:18:25.010 --> 00:18:25.480
Bill Sutton: So is this.

111
00:18:25.480 --> 00:18:34.600
Todd Smith: Of it is, you know, the the historical. You know the horse, the historic waterfall development practices that were out there where you'd have

112
00:18:35.210 --> 00:18:43.359
Todd Smith: before you could move on to the next level or the next step. You have to go through a series of gates, or you have to go over. You know, you have to. You have to

113
00:18:43.820 --> 00:18:46.673
Todd Smith: get to the next level of that waterfall.

114
00:18:47.230 --> 00:18:56.539
Todd Smith: there was always things like software quality assurance, software quality control. And you would have configuration management team that would manage that process of

115
00:18:57.510 --> 00:18:58.900
Todd Smith: taking it from

116
00:18:59.020 --> 00:19:08.130
Todd Smith: your Qa and test environment and moving that into a production environment. And they were the ones responsible for making sure that there were things like

117
00:19:09.350 --> 00:19:24.009
Todd Smith: testing validation, making sure the libraries all match up, making sure all of those, you know, they would literally go through a checklist before they would allow that that piece of code to actually be migrated into the production libraries, and

118
00:19:24.490 --> 00:19:40.390
Todd Smith: a lot of that has changed with, you know, the agile development framework, a lot of organizations kind of merging the developer and operations teams together. A lot of the 3rd party software as a service and web based apps.

119
00:19:40.580 --> 00:19:45.470
Todd Smith: You know, there's there's some of those things are no longer in the customer's control.

120
00:19:47.040 --> 00:19:50.709
Todd Smith: And you know, strong is strong. Network is the is

121
00:19:50.890 --> 00:19:56.059
Todd Smith: a yet another tool that can be brought into play to help manage that environment.

122
00:19:58.130 --> 00:20:08.959
Geremy Meyers: One of the things we one of the things we do, Bill, is Ats is, you know, with our accounts is we're really trying to understand the use cases within the customers environment, and without a doubt

123
00:20:09.630 --> 00:20:20.609
Geremy Meyers: 99% of the time. Each of our customers has a Dev use case, a developer use case. Either a. These are internal employees or actually, what's happening more often than not, it's a it's an external contractor. So.

124
00:20:20.610 --> 00:20:21.330
Bill Sutton: Like.

125
00:20:21.710 --> 00:20:36.650
Geremy Meyers: You know, especially for an external contractor, you know. Listen! Most organizations don't want to go ship a laptop, so what do they do? They spin up a Vdi desktop right? So they'll give someone a windows desktop into some kind of environment that they've got a patch and maintain. And, by the way is more expensive.

126
00:20:36.870 --> 00:20:43.730
Geremy Meyers: then maybe some alternatives. But that's just kind of how it works today. Right? It's easy. It's very containerized. It

127
00:20:44.460 --> 00:21:08.119
Geremy Meyers: honestly present some problems because a lot of the developers like their own tools. And they're kind of stuck with whatever is included inside the desktop. Or I'm gonna create a dedicated desktop, and let a developer just kind of go nuts with whatever they need. Right? So you know, I I think one of the pieces to this is, can we help save costs by maybe providing a different modality to doing this? So you know, with strong network, they are

128
00:21:08.170 --> 00:21:18.869
Geremy Meyers: honestly customized for dev use cases, right? So typically it's either maybe a Linux virtual machine. It's typically less expensive. And it's the platform most developers use or be

129
00:21:19.215 --> 00:21:48.040
Geremy Meyers: you know, it's a container of some kind, right? And so, you know, providing the developers, the platform they tend to use with the tools they tend to use and securing it, and I'm still working on some of the details just for myself and what this architecture looks like. But that's kind of what we're going here. Can we help you reduce costs and spend for this use case that is very common in most enterprise organizations. But at the same time making it secure and sort of tailored to this user population. So I could sum that up.

130
00:21:48.150 --> 00:21:50.680
Geremy Meyers: That's probably how you can pigeonhole this now.

131
00:21:53.720 --> 00:22:00.470
Geremy Meyers: because it is sort of a different piece here, you know, it is only included in the Citrix platform license today.

132
00:22:00.660 --> 00:22:13.899
Geremy Meyers: So for organizations that are typically very large. And this maybe makes sense. Right? So for larger organizations that have dedicated teams that are very distributed lots of folks. This is probably where it makes the most sense. But that's

133
00:22:14.130 --> 00:22:16.210
Geremy Meyers: maybe the best way to pigeonhole it today.

134
00:22:19.020 --> 00:22:41.439
Bill Sutton: Well, I appreciate that. That helps me understand it a lot better. Frankly, I mean, I think the goal of all of this is to improve the management of of security around 0 trust the 0 trust type concept. Right? That's really what Citrix is trying to accomplish, based on what the article says itself. Any comments about this last sections, you know, simplifying 0 trust. With these tools.

135
00:22:43.230 --> 00:22:52.907
Todd Smith: I I think Jeremy kind of kind of touched on this a little bit with the you know, especially the strong networks piece that, you know, included in the platform licensing.

136
00:22:54.030 --> 00:22:59.820
Todd Smith: that's part of it, right? It's the the bigger overall approach towards this hybrid

137
00:23:00.040 --> 00:23:11.483
Todd Smith: 0 trust approach that we're that we're adopting. And we're we're embracing and continuing to nurture like we. You know, we we've had 0 trust before 0 trust because was 0 trust right?

138
00:23:11.990 --> 00:23:25.409
Todd Smith: and we've made some additional. You know, we've we've made some additional improvements around our security capabilities. Right? We talked about device trust. We talked about strong networks. We've talked about our overall, how those 2 fit together.

139
00:23:25.820 --> 00:23:31.427
Todd Smith: but as we segue into the next segment or the next section

140
00:23:31.970 --> 00:23:38.169
Todd Smith: we we've got to talk about. You know how we're improving security around things like secure private access.

141
00:23:39.420 --> 00:23:40.630
Aaron Banner: Yeah. And I mean.

142
00:23:40.910 --> 00:23:53.999
Aaron Banner: remember, 0 trust is is a framework. It's not a tool. It's not a thing. And you know there's i i think a lot of the tools that may be brought in are are

143
00:23:55.030 --> 00:24:18.300
Aaron Banner: really to enable policy. You know. So let's say you have a policy of, you know in in this case with the device Trust right? You want. You want a policy about how you you know what you allow on endpoints, particularly those non managed endpoints. So talk a lot about managing points. But during in this hybrid environment, I think someone talked earlier about byod.

144
00:24:18.490 --> 00:24:41.034
Aaron Banner: it's it's, you know. So now you're bringing in these unmanaged devices into your network. And you want to do that, you want to allow that. But but how do you? How do you develop policies around that? And so, if your policy says, I don't know, you know th, these things cannot be allowed on the network, even though this device can be allowed on the network. Well, now, this is a tool that helps you to

145
00:24:41.470 --> 00:24:51.160
Aaron Banner: to to enforce that policy. And so just just always remember, like 0 trust is, it's nothing but but a framework. And so and and largely.

146
00:24:51.460 --> 00:25:00.849
Aaron Banner: a lot of the technologies aren't aren't required for 0 trust. But a lot of the technologies are required in order to implement the policies that you want to define in your 0 trust environment.

147
00:25:03.470 --> 00:25:07.060
Bill Sutton: Thanks, Aaron, definitely good information. So I wanna

148
00:25:07.240 --> 00:25:30.179
Bill Sutton: double down on the next section, which is Citrix enhances hybrid work with expanded, secure private access. Obviously, what they're talking about here to some degree correct is is the things we just talked about, which is device trust and and strong networks. But I think beyond that there's some changes to Spa. Jeremy and Todd keep me honest around on premises. Data plane is that some of what's being covered here.

149
00:25:31.903 --> 00:25:41.996
Geremy Meyers: I I think it's alluding to it, Bill. So you know, traditionally secure private access has been a solution that has been entirely cloud based.

150
00:25:42.940 --> 00:26:04.760
Geremy Meyers: and you know, believe it or not. So we've got a fully on prem version of this as well. In fact, it's baked into the product you go turn it on. And more recently, we have customers who like the administration of the cloud, but would prefer sort of a data flow on. Prem so true hybrid. So we've also got hybrid Spa, that Todd, is it Tech Preview? Or has it been released? Yet? I forget where this stands.

151
00:26:04.760 --> 00:26:06.109
Todd Smith: Think it's still a tech preview.

152
00:26:06.110 --> 00:26:26.549
Geremy Meyers: Still check preview. Yeah, so this is coming again. It's sort of an evolution of this secure private access, and ultimately to take a step back, you know, historically, when Andy and I got started 11 billion years ago, this was entirely virtual windows applications. And that's it. Of course, we've evolved to include Linux applications. But you know, a big part of the story now is, how do you deliver

153
00:26:26.961 --> 00:26:39.609
Geremy Meyers: web and Sas based applications? Right? So something that typically required a web browser. And the Spa solution is actually inclusive of 2 different things. One is sort of a VPN virtual private access. Spa, access.

154
00:26:40.050 --> 00:26:51.300
Geremy Meyers: Think of it as more of a a more modern, smarter VPN. If you will, but also an enterprise browser as well, a containerized enterprise, browser that you can apply policies to. So

155
00:26:51.400 --> 00:27:16.170
Geremy Meyers: you know those 2 pieces again. 2 pieces of the layers here. Right? Can you do, Spa? Without the enterprise? Browser? Sure, you know there is a legacy VPN piece to that. But you can also pair the enterprise browser with Spa to provide, you know, things like internal access to websites without the full on VPN. What's interesting is this is the model that Citrix has gone to as employees. So

156
00:27:16.390 --> 00:27:26.000
Geremy Meyers: you know, I don't have a virtual desktop anymore. Bill, you know, I have a handful of virtual applications simply because there's some requirements from a browser perspective to support that. But

157
00:27:26.180 --> 00:27:31.379
Geremy Meyers: 95% of what I do is all from an enterprise browser that runs locally and is rendered locally.

158
00:27:31.660 --> 00:27:36.880
Andy Whiteside: And and Jeremy. The internal cost savings on that compute workload is probably off the charts.

159
00:27:36.880 --> 00:27:46.009
Geremy Meyers: It is unbelievable. Yeah. So when we went through this transformation, believe it or not, initially, the idea was to do manage devices to everyone at Citrix.

160
00:27:46.200 --> 00:27:52.479
Geremy Meyers: and at some point we did the math, and 1 80 that right, and the big driver behind that was cost.

161
00:27:52.680 --> 00:27:59.970
Geremy Meyers: And so you know, a lot of it starts with the personas. I mean, you need to understand who your users are and what they need access to.

162
00:27:59.970 --> 00:28:03.499
Andy Whiteside: Did you say you went from planning unmanaged or managed devices.

163
00:28:03.500 --> 00:28:06.190
Geremy Meyers: Manage. We were going to be 100%, manage devices.

164
00:28:06.190 --> 00:28:06.620
Andy Whiteside: Okay.

165
00:28:06.620 --> 00:28:07.479
Geremy Meyers: Across the board.

166
00:28:07.480 --> 00:28:14.680
Andy Whiteside: And that would be the so managed devices accessing a secure portal would be the check check on the Security plan.

167
00:28:15.180 --> 00:28:15.680
Geremy Meyers: Right.

168
00:28:15.680 --> 00:28:24.870
Andy Whiteside: But then you factored in user experience. But also the 3rd thing which we haven't really talked about a whole lot. And that is overall cost, and that's when and that's when the shit gets real.

169
00:28:25.190 --> 00:28:26.573
Geremy Meyers: That's when it gets real.

170
00:28:28.770 --> 00:28:30.909
Andy Whiteside: Coming from a guy with 3 laptops on his desk.

171
00:28:31.620 --> 00:28:33.800
Geremy Meyers: Well, I might be right there with you, too, but.

172
00:28:33.800 --> 00:28:36.670
Andy Whiteside: In my world. I have 3, 3 company owned laptops on my desk.

173
00:28:37.070 --> 00:28:46.329
Geremy Meyers: To be fair. These are. These are 3 different personal devices that all access resources. And I'm not doing it with. VPN, I'm doing it with a containerized browser.

174
00:28:46.480 --> 00:28:48.750
Geremy Meyers: And that is 90% of my workflow.

175
00:28:51.140 --> 00:29:09.879
Andy Whiteside: The the, the security enhancements, the browser aspect of it. Where all you gotta do is get a browser sandbox on there. That is probably open the door to. I don't. I don't wanna call it Byod, but I I wanna call it not manage devices. So you can interpret that. However, you want, but that has new life again. I think.

176
00:29:13.840 --> 00:29:15.299
Bill Sutton: Yep, certainly sounds like it.

177
00:29:15.600 --> 00:29:16.580
Andy Whiteside: Sure.

178
00:29:16.950 --> 00:29:25.589
Bill Sutton: All right. We're at the bottom of the blog article. Any other final thoughts work comments about these 2 technologies, and this article generally.

179
00:29:26.990 --> 00:29:27.480
Andy Whiteside: So.

180
00:29:27.480 --> 00:29:33.780
Andy Whiteside: Jeremy, you mentioned a while ago, you guys had to convince a CIO to talk to you guys about security.

181
00:29:33.780 --> 00:29:34.320
Geremy Meyers: Correct.

182
00:29:35.430 --> 00:29:42.470
Andy Whiteside: That's got to be a common thing in your world. Where in, if if the world saw it the way I see it?

183
00:29:43.167 --> 00:29:46.469
Andy Whiteside: They would be. Cios would be coming to Citrix.

184
00:29:46.650 --> 00:29:50.970
Andy Whiteside: asking for the technology that's been around for a long time, plus the new stuff.

185
00:29:51.660 --> 00:29:58.900
Andy Whiteside: That's just not reality. Right? We're we're usually talking to the application and desktop team trying to get to the Ciso.

186
00:29:59.020 --> 00:30:05.959
Andy Whiteside: It really should be the Ciso coming to us for this conversation. I want you to answer that, and then I want Aaron to throw in his 2 cents.

187
00:30:06.300 --> 00:30:07.882
Geremy Meyers: Alright! What was the question? One more time.

188
00:30:08.080 --> 00:30:24.079
Andy Whiteside: Well, the question for you and Todd is, how often are you getting cisos coming to you guys, or or the opposite effect of that you're having to go to Cisos and convince them even to talk to Citrix. And then I want Aaron to chime in on how he sees those things coming together.

189
00:30:25.150 --> 00:30:34.709
Geremy Meyers: So it's common. But I think it largely depends on what our relationships are, where they are within the organization. Right? So if we are like you pointed out, kind of kind of

190
00:30:35.000 --> 00:30:45.989
Geremy Meyers: primarily in the Euc application management desktop management. You know that world, then? Yes, we're making the case to go see the Ciso. But you know, when we have the relationships with the right level

191
00:30:46.446 --> 00:30:50.969
Geremy Meyers: it's a lot easier for sure. So when we're with a Vp of infrastructure when we're with

192
00:30:51.210 --> 00:30:54.100
Geremy Meyers: of the CIO, I mean, it's a no brainer, but it

193
00:30:54.330 --> 00:31:02.060
Geremy Meyers: listen. If it's with the Uc team it's looked at as a end, user productivity tool, not necessarily a security solution.

194
00:31:02.060 --> 00:31:07.790
Andy Whiteside: And is that a problem with Citrix product set? Or is that problem with the way it departments are laid out?

195
00:31:08.100 --> 00:31:16.270
Geremy Meyers: It's probably more with how they're laid out. I don't necessarily think it's a product issue, unless Todd clearly has a an opposing view here.

196
00:31:16.270 --> 00:31:16.910
Todd Smith: Well.

197
00:31:18.010 --> 00:31:27.590
Todd Smith: I I do say it's both for a couple of reasons. Number one is historically, we've always been a remote access to applications and virtual desktops

198
00:31:27.690 --> 00:31:33.400
Todd Smith: solution which basically pigeonholed us into a into a very specific

199
00:31:33.830 --> 00:31:37.589
Todd Smith: part of the organization that dealt with our with our products.

200
00:31:38.216 --> 00:31:41.789
Todd Smith: Historically, we didn't build in a lot of security

201
00:31:42.120 --> 00:31:46.340
Todd Smith: the bells and whistles that would identify us as a security company.

202
00:31:47.750 --> 00:31:50.380
Todd Smith: Yes, we have some great security tools.

203
00:31:50.680 --> 00:31:59.519
Todd Smith: not a lot of people on the Auc market understood what those security tools were. We integrated with authentication tools we integrated with.

204
00:32:00.720 --> 00:32:06.979
Todd Smith: You know, some of the firewalls that were out there. We. Oftentimes we weren't at the

205
00:32:07.560 --> 00:32:13.289
Todd Smith: the network engineering level within a lot of customers.

206
00:32:13.710 --> 00:32:17.350
Todd Smith: So that was one thing, the second piece of it is.

207
00:32:17.680 --> 00:32:21.919
Todd Smith: it depends on where the where the Ciso sits within the organization

208
00:32:22.620 --> 00:32:24.929
Todd Smith: in relation to the Euc team

209
00:32:25.160 --> 00:32:34.299
Todd Smith: or the application desktop virtualization team, or the whoever is responsible for the Citrix environment. If they have a direct line of sight with the Ciso.

210
00:32:35.130 --> 00:32:37.699
Todd Smith: they probably have heard about Citrix.

211
00:32:37.980 --> 00:32:40.939
Todd Smith: They may know a little bit about what we can do.

212
00:32:42.110 --> 00:32:47.200
Todd Smith: One of our biggest challenges is getting is getting those cisos to

213
00:32:47.640 --> 00:32:51.819
Todd Smith: to understand that we can help reduce their threat risks

214
00:32:52.130 --> 00:32:58.900
Todd Smith: and and and oftentimes, when a Ciso does reach out to us, it's after they've gone through some type of threat assessment

215
00:32:59.350 --> 00:33:03.329
Todd Smith: and said, Hey, you have a potential problem here.

216
00:33:03.460 --> 00:33:09.799
Todd Smith: You need to go talk to Citrix, and that's being done by a couple of the vendors that are out there, you know, especially the security

217
00:33:10.512 --> 00:33:15.240
Todd Smith: consulting organizations that are out there doing these threat assessments.

218
00:33:15.835 --> 00:33:22.509
Todd Smith: They're kind of pushing their customers. Our customers to have a deeper conversation with us.

219
00:33:24.260 --> 00:33:25.980
Geremy Meyers: So, Andy, I think.

220
00:33:26.950 --> 00:33:51.409
Geremy Meyers: I mean, listen, what were we originally trying to solve? For in a lot of cases it was the fact that client server applications just don't run well when you leave the office right? Like trying to do that across the VPN. Didn't make sense. So this is how we did it. And so the that was the primary reason is to make this application work well. The passive feature to that was, Oh, by the way, it's more secure at the same time. But we were trying to solve this client server piece, I mean, I still

221
00:33:51.610 --> 00:33:53.999
Geremy Meyers: go to customers these days where

222
00:33:54.860 --> 00:33:58.619
Geremy Meyers: I mean. Listen, they'll open up a VPN. To do a Citrix session right or.

223
00:33:58.830 --> 00:33:59.320
Andy Whiteside: Yeah.

224
00:33:59.320 --> 00:34:08.040
Geremy Meyers: They forget the fact. This Netscaler sits at the edge and can completely air gap near the access. But we'll still do the VPN. On an unmanaged device

225
00:34:08.350 --> 00:34:20.499
Geremy Meyers: and just open up access just to do a Citrix session which blows my mind. But it just shows me that's where you know, Todd, this is where I go, all right. This sits in a different spot within the organization, right? Because someone's missing that piece of the architecture.

226
00:34:20.949 --> 00:34:48.219
Andy Whiteside: Yeah, I want to chime in on one more thing. And I do want Aaron's feedback on this. So you're talking about the organization structure alignment. I'm also going to add one of the things like Citrix has always been. Do we tell people we're security company, do we not? And historically, it's been because, in my opinion, that Citrix didn't want to step on the toes of the natural security vendors because they wanted to work with them. Just kind of like what you were just saying a minute ago. I think we're in an era now where we just just got to flat out. Tell people, hey? You don't need that VPN anymore. We don't part. We do partner with them.

227
00:34:48.289 --> 00:34:54.689
Andy Whiteside: But you don't need them anymore. And that's, I think, where Citrix, in this version of the company is probably at or getting to be.

228
00:34:55.040 --> 00:35:18.029
Geremy Meyers: Well, I think, just before Aaron, before you speak, I think one of the things we really try to go for to that point now is, we try to be pretty like we try to integrate with most most acts, aspects, or a lot of aspects of a customer security solution. So, for instance, you're probably not using Citrix for identity. Right? You're probably using Octa. You're using intra, I do using something else. Let's integrate with that. Or you know. Listen. You need to build an environment that's air gapped in 2 or 3 different ways. You know, we

229
00:35:18.040 --> 00:35:43.190
Geremy Meyers: we sort of support that from where you place your resources like, I think, from an observability perspective, we have our own solution. But customers are looking for something very specific. How can we integrate those things together. I think that's the real value is we're trying not to be the quote unquote security solution. But just. And you know, I'll come back to where I started is, where do we layer into what you're doing today? I think we try really hard to have those hooks. If that makes sense.

230
00:35:43.610 --> 00:35:44.840
Andy Whiteside: Yeah. Hmm.

231
00:35:45.790 --> 00:35:48.380
Geremy Meyers: Alright, Aaron, explain it all to us. What's the answer?

232
00:35:48.410 --> 00:35:50.110
Aaron Banner: That that's a lot lot to unpack.

233
00:35:50.110 --> 00:35:51.720
Geremy Meyers: 42. The answer is, 42.

234
00:35:51.890 --> 00:36:11.069
Aaron Banner: So let let me let me see if I can go back to the the question you asked, and I think some of that revolves around the maybe the relationship between the Ciso and the CIO because I think your question was, Hey Cisco's or your point was, Cisco should be coming to Citrix, not not the other way around.

235
00:36:11.430 --> 00:36:15.370
Aaron Banner: And I think part of that problem is that you know

236
00:36:15.490 --> 00:36:34.620
Aaron Banner: it, or or network access may may have been kind of. Okay, that's the CIO's thing. That's not my thing. And and that's just that's bad business. If you ask me because at a minimum the Cisco should be interested in. What is my organization doing in the Citrix environment?

237
00:36:35.100 --> 00:36:52.469
Aaron Banner: And if if they are interested in that which they should, then it's what what is, what is happening in the Citrix environment. And so I would say, based on these acquisitions. Now, you know, I'm very familiar with the Citrix platform. But I'm not familiar with every single security aspect of the Citrix platform. So

238
00:36:52.570 --> 00:36:59.884
Aaron Banner: by this, by nature of this acquisition, I would say that App dev wasn't really secured in this way previously.

239
00:37:00.760 --> 00:37:08.010
Aaron Banner: by Citrix right? And so and so they were, you know, organizations were probably doing that outside of the Citrix platform, if

240
00:37:08.430 --> 00:37:22.180
Aaron Banner: a a smart security person was involved, and said, You can't do this in this platform right now, because we need you to do do it over here because of these reasons. Right now you can bring that workload into the Citrix environment. And

241
00:37:22.180 --> 00:37:40.120
Aaron Banner: but but if it was that way before, that's definitely something the Cisco should have known. So from a security aspect, you know, the the folks involved in security in any organization should have an understanding of what the security platform looks like, or the security posture looks like in any any environment that that they're managing. Right?

242
00:37:40.503 --> 00:38:02.920
Aaron Banner: So so yes, in in this case, Andy, I mean, I'm sure anybody who has Citrix it's it's got to be a major port part of of what they do on a daily basis, and how their workforce does their job. And so from that aspect, there's no way that me and I've been in a system role about 3 times. There's no way that I wouldn't want to have a very deep understanding of what that environment looks like.

243
00:38:02.920 --> 00:38:18.969
Andy Whiteside: But, Aaron, I would say, you're a unicorn. Most security guys think about, you know, moats and intrusion. They think about some of the legacy stuff, too, but they don't necessarily think about application, delivery and a systematic, secured, simplified method as being the number one approach to a security.

244
00:38:19.170 --> 00:38:21.190
Andy Whiteside: They don't think like application

245
00:38:21.670 --> 00:38:29.660
Andy Whiteside: delivery, and how you do application delivery. They think about the layers of the network and the traditional security plays. That's my take. Tell me if I'm wrong.

246
00:38:30.450 --> 00:38:57.740
Aaron Banner: I mean, you may be right. I you know I again you know my background. I don't think I've mentioned it here today. My background is 31 years in the United States Army, and I started my career as as a network guy. You know, I was an it guy over my career. I've been both a Ciso and and a CIO I've I've held both both roles, and often I held both both roles simultaneously, so I I was. I was both at the same time and to me. That's that's where I would want to be.

247
00:38:57.740 --> 00:39:05.340
Aaron Banner: And then I have some security guys that kind of manage security for me and report to me on that. But I own both roles. I love that. I love that posture.

248
00:39:05.787 --> 00:39:17.469
Aaron Banner: So so yeah, I mean, maybe folks are different. But, Andy, I'll tell you. I think I think the last figure I saw was there's gonna be 750 million applications developed by 2026.

249
00:39:17.470 --> 00:39:17.930
Andy Whiteside: Yeah.

250
00:39:17.930 --> 00:39:24.559
Aaron Banner: Between now and 2026, 750 million different applications. So if you're a security person and that doesn't concern you.

251
00:39:24.700 --> 00:39:26.390
Aaron Banner: you need to figure it out.

252
00:39:26.550 --> 00:39:27.170
Andy Whiteside: Yeah.

253
00:39:27.300 --> 00:39:51.590
Andy Whiteside: And guys where this all worked out for me. When we were talking to Aaron about joining us long term, we started talking about some of his examples, and, you know, remotely presenting or even doing like secure browser service type of technology. Whether it was specifically that or not in like combat zones was stuff he was telling me about. Yeah, that's exactly right. We we deliver the application smarter but efficient and high definition, and you know, we mitigate most of the security risk right then and there.

254
00:39:55.400 --> 00:39:56.250
Bill Sutton: Exactly.

255
00:39:56.640 --> 00:39:57.270
Geremy Meyers: It was right.

256
00:39:57.270 --> 00:40:07.550
Geremy Meyers: He did. He did he? He did say something that does resonate with me. It's the fact that listen. If you think about the product stack the solution, stack that most organizations have

257
00:40:08.040 --> 00:40:33.019
Geremy Meyers: this. You only have the bandwidth to understand what's a part of all those solutions. So it's really important for us as 1st of all, as ats is Todd myself, to make sure customers understand what they have giving the right team. And to be fair, you know it was probably a fair question from the Cso. To really understand. Listen, what does your product do? Because I'm trying to understand where this fits into my strategy. So that's a fair question. But I think it's also to to pull this thing home. Is why we need to educate

258
00:40:33.020 --> 00:40:48.420
Geremy Meyers: is integra, our partners, they know the product inside. Now, this is why we're doing this, podcast you guys understand what device trust is strong network. So again, you can take that to your customers as well. We could do a better job as an organization of socializing those pieces. Right? So I think that's what we're trying to get to

259
00:40:48.843 --> 00:40:54.630
Geremy Meyers: and we'll keep evolving and hopefully, acquisitions like this, you know, kind of throw it on the radar of the industry, too.

260
00:40:55.080 --> 00:41:04.090
Bill Sutton: Yeah, and I suspect there'll be a lot more blog type articles, Jeremy, around these topics, and we'll dive deeper as they come out. Of course. To.

261
00:41:04.090 --> 00:41:25.970
Geremy Meyers: There's a there's a shameless plug bill. I'll make a shameless plug plug for the for for tech zone. So if you are a citrix customer, and you have not been to tech zone recently. It is amazing. So there's everything from tech briefs. So, for instance, if you just want to know what the heck an Uber agent is, and you don't want to go through a big long. The documentation which reads like stereo instructions. Sometimes

262
00:41:26.030 --> 00:41:49.079
Geremy Meyers: tech zone is really good. It'll give you a brief overview. I use this a lot. There's even a guide on how to do a Poc for like an Uber agent. I'm sure we'll see things like device trust briefs, you know, strong network briefs, things like that. But there are articles being written by our product specialists all the time takes me back to the day when we used to do a lot of this, so I would highly invest or highly recommend you invest some time just checking out tech zone, check out the community.

263
00:41:49.080 --> 00:41:54.120
Bill Sutton: I'm not sure where a stereo is, but nevertheless, I got the rest of what you said. So

264
00:41:54.120 --> 00:41:54.859
Bill Sutton: there you go. Yeah.

265
00:41:54.860 --> 00:42:06.189
Aaron Banner: Yeah, before we wrap up. If I can just throw in one more thing from my perspective of how I approach what we do. It's integra, you know, is is finding ways to add value to clients. And so.

266
00:42:06.250 --> 00:42:28.479
Aaron Banner: you know, I I just made a note to someone today about, you know, somebody upgraded their Microsoft licensing, and so I was able to find some some value in that where they were able to trade off. You know something they were doing in in a separate instance for for that now. And so it's gonna save them money over the long term. And I think you you're you might be able to find that here, too, depending on what an organization is doing. So

267
00:42:28.610 --> 00:42:35.270
Aaron Banner: you know Citrix is is. Yes, it's becoming more secure. But it's also

268
00:42:35.370 --> 00:43:00.089
Aaron Banner: becoming a platform that you're going to be able to add more workloads into because of the addition of things like strong network and device trust. So so there's more things that Citrix is saying. Now, you can do this securely in our environment. You don't need to go outside of our environment like secure app dev, right? And so what we need integra and and citrix. What we need to be focused on is looking at our client base and saying, Okay.

269
00:43:00.250 --> 00:43:12.010
Aaron Banner: how are you postured? Now, what do you have right now? What tools do you have that's doing this today that we can now maybe offset and pull that into the Citrix environment. So you don't have to have that additional

270
00:43:12.485 --> 00:43:17.859
Aaron Banner: time, effort, and money going into to paying or or running, that that application any longer.

271
00:43:18.690 --> 00:43:37.321
Bill Sutton: Yeah, that's absolutely true, Aaron. And I think that that the whole concept of the packaging changes around universal hybrid multi cloud in Citrix and the platform licenses. It's it's as much, if not more, about driving adoption of new features within the the solution set and many of those features

272
00:43:37.680 --> 00:43:54.413
Bill Sutton: can can replace or or augment other products that the customers might be using and and result in cost savings as well as you know, a simplified structure versus a bunch of point products. So that's certainly one of the goals. And I think that Citrix is

273
00:43:54.770 --> 00:44:08.699
Bill Sutton: demonstrated that by these acquisitions is the ability to grow the the use cases and the security well, the use case around strong networks. And of course, the security capabilities around Device Trust is going a long way towards accomplishing that goal.

274
00:44:12.220 --> 00:44:17.970
Bill Sutton: Alright any other. Any other thoughts on these this topic today, folks, before we adjourn.

275
00:44:18.180 --> 00:44:23.640
Geremy Meyers: You know, but we always do this when we say, Hey, well, this is a short blog post, and yet we.

276
00:44:23.640 --> 00:44:29.599
Bill Sutton: I know. I know for 51 min. Right? So, yeah.

277
00:44:29.950 --> 00:44:32.510
Geremy Meyers: Listen. Security is a good jumping off point to a lot of topics. So.

278
00:44:32.510 --> 00:44:34.600
Bill Sutton: It is. Yeah, for sure. So

279
00:44:34.730 --> 00:44:49.270
Bill Sutton: all right. Well, thank you all very much. Again, as usual. Thanks, Aaron, for joining us today. It was great having you and great input, and we'll we'll do it again next time. Happy holidays to all our listeners, and thanks a lot.

280
00:44:49.450 --> 00:44:49.990
Geremy Meyers: Okay.

281
00:44:49.990 --> 00:44:50.700
Geremy Meyers: Alright. Guys.

282
00:44:50.920 --> 00:44:51.410
Todd Smith: Thank you. Guys.

283
00:44:52.050 --> 00:44:52.730
Geremy Meyers: Talk to you later.