APPS USERS NETWORKS AI / ML Spans ‘Analytics’ types CITRIX ANALYTICS SECURITY PERFORMANCE PRODUCTIVITY Spans solution areas CITRIX VIRTUAL APPS & DESKTOPS CITRIX ENDPOINT MANAGEMENT CITRIX CONTENT COLLABORATION CITRIX NETWORKING and ACCESS CONTROL Spans Citrix portfolio What is Citrix Analytics?
Citrix Analytics: Machine Learning with Actionable Insights Virtual Apps & Desktops Endpoint Management Networking Offerings / Access Control Content Collaboration Collect Data Generate Insights Citrix Analytics Virtual Apps & Desktops Endpoint Management Networking Offerings Content Collaboration Take Actions
Analytics for On-premises and Cloud Customers On-premises Public Clouds Hybrid Mode vSphere | Citrix Hypervisor | Hyper-v AWS | Azure | Google | Oracle Customer Managed Customer Managed Citrix & Customer Managed Customer deployments on-premises (hypervisor) or in the Cloud Secure, encrypted data-transfer and storage
TURN-KEY Turn-key data collection User behavior & context based 1 ACCURATE Correlation from multiple vantage points for accuracy Machine Learning based models 2 AUTONOMOUS Closed-loop autonomous actions Granular policy control 3 Citrix Analytics is Unique Sense Analyze Respond
Diverse Comprehensive Data Sources Track Access, Devices & Things Track user access credentials, devices used for access, location (GPS), Time Tap into Network Traffic Access to user access data & encrypted network traffic on the wire Build End-to-end User Behavior with Context Presence in strategic locations (without any additional instrumentation) for visibility across all the hops from data center to the end-user Gather Apps & Data Gather granular Applications & Data usage related information Behavior | Context | Usage Network & Infrastructure Users Devices & Things
Security Citrix Analytics
Closed-loop, autonomous system to dynamically adjust security Citrix Analytics Security User Behavior Security Analytics Prevent internal threats & data exfiltration attacks Track & model individual User behaviors across enterprise Identify & aggregate User Risky behaviors into Risk Profiles Application Security Analytics Protect Applications from external attacks Track, access and rank applications based on risks Suggest mitigation steps to enhance security Data Security Analytics Prevent internal threats & data exfiltration attacks Track ‘sensitive files’ via DLP engines Security Analytics to establish Secure Digital Perimeter
Sophisticated attacks require a sophisticated response Machine Learning and Artificial Intelligence Engineered for hybrid architectures Gain insights and prevention, not data
Security Analytics What is it? Descriptive What happened? Diagnostic How it happened? Predictive What will happen? Prescriptive What to do? Excessive (sensitive) file downloads Stolen credentials Loss of (sensitive) data Quarantine User
User Behavior Security Analytics
The user threat Survey: Most frequently used security breach tactic: compromised credentials and weak passwords . 1 User Behavior Analytics 81% of breaches - compromised credentials or weak passwords 1. Verizon Data Breach Investigations Report (DBIR) 2017
Detect & mitigate threats from trusted internal users with malicious intent Easily identify high risk users with drill-down capabilities on behavior Apply corrective actions User Behavior Security Analytics
Performance and Operations/Usage Citrix Analytics
Leverage AI/ML algorithms to translate data into readily actionable insights Citrix Analytics Performance & Operations App, Network & Infrastructure Usage Analytics Track application usage across users and user groups Track infrastructure resources required to deliver applications Application Performance Analytics Monitor end-to-end app performance, highlight issues and RCA Track application usage across users and user groups Application Performance Anomaly Detection Monitor end-to-end app performance, highlight issues and RCA Performance & Operations Analytics
User-centric experience scores, Application & Infrastructure performance scores through advanced analytics Will be available to all on-prem. & Cloud Citrix Virtual Apps and Desktops customers Citrix Analytics for Performance Overview Quantify UX & app. performance. Isolate Users and Apps experiencing poor performance End-to-end visibility - integrate Networking & Workspace data, insights Multi-site aggregation & reporting Tools for faster troubleshooting Key Use Cases The development, release and timing of any features or functionality described for our products remains at our sole discretion and are subject to change without notice or consultation. The information provided is for informational purposes only and is not a commitment, promise or legal obligation to deliver any material, code or functionality and should not be relied upon in making purchasing decisions or incorporated into any contract.