{"id":660308,"date":"2024-12-09T20:00:00","date_gmt":"2024-12-10T01:00:00","guid":{"rendered":"https:\/\/xentegra.com\/resources\/171-encryption-innovations-in-finance-and-government-sectors\/"},"modified":"2025-04-16T11:00:27","modified_gmt":"2025-04-16T15:00:27","slug":"171-encryption-innovations-in-finance-and-government-sectors","status":"publish","type":"post","link":"https:\/\/xentegra.com\/fr\/resources\/171-encryption-innovations-in-finance-and-government-sectors\/","title":{"rendered":"171: Encryption Innovations in Finance and Government Sectors"},"content":{"rendered":"<p><iframe loading=\"lazy\" style=\"width: 100%; height: 200px;\" src=\"https:\/\/www.buzzsprout.com\/670066\/episodes\/16249148-encryption-innovations-in-finance-and-government-sectors?iframe=true\" width=\"100%\" height=\"200\" frameborder=\"0\" scrolling=\"no\"><\/iframe><\/p>\n<p>Dans cet \u00e9pisode de <em>La session Citrix<\/em>, host Bill Sutton and guests dive deep into the latest advancements in hardware and device security, with a special focus on Netscaler disk encryption. Our experts, including Jeremy Myers and Todd Smith, discuss how these innovations originated from financial and public sectors and are now setting a standard for security across industries. Discover how encryption not only protects sensitive data but also ensures compliance with stringent regulations. Join us as we explore how these technologies are being implemented to safeguard decommissioned devices and prevent unauthorized data retrieval, making a significant impact in the finance and government sectors.<\/p>\n<div class=\"transcript\">\n<p><!--block-->WEBVTT<\/p>\n<p>1<br \/>\n00:00:02.370 &#8211;&gt; 00:00:17.209<br \/>\nBill Sutton: Hello, everyone, and welcome to episode 170 of the Citrix session. I&#8217;m your host today, Bill Sutton. I have with me a couple of folks from Citrix, as well as the chief enthusiasm officer of Zintegra, Andy Whiteside. Andy, you want to say hello.<\/p>\n<p>2<br \/>\n00:00:17.535 &#8211;&gt; 00:00:22.749<br \/>\nAndy Whiteside: Hello! And I&#8217;m shocked that this is 1 70, which is a pleasantly good surprise.<\/p>\n<p>3<br \/>\n00:00:22.950 &#8211;&gt; 00:00:25.740<br \/>\nAndy Whiteside: Bill. I can&#8217;t believe we&#8217;ve done this many of these.<\/p>\n<p>4<br \/>\n00:00:25.740 &#8211;&gt; 00:00:39.330<br \/>\nBill Sutton: Yep, I know it&#8217;s actually been couple of months since we were able to do one because of varying schedule schedule conflicts, and me being away and others being away. So I&#8217;m glad we&#8217;re we&#8217;re back in the swing of things just in time for Christmas.<\/p>\n<p>5<br \/>\n00:00:39.330 &#8211;&gt; 00:01:04.960<br \/>\nAndy Whiteside: Why? Why were we away? Well, part of the reason we were away because we were at Microsoft Ignite which if you didn&#8217;t go and you&#8217;re listening to this. You need to reach out to us. We&#8217;ve got free passes or very heavily discounted passes. I was at Aws reinvent last week. There weren&#8217;t nearly enough of our people there on the end user compute side. So just kind of a brief commercial about the way we reinvest in our customers and get them to conferences. And what better place to go? Have a good time and learn.<\/p>\n<p>6<br \/>\n00:01:05.430 &#8211;&gt; 00:01:24.099<br \/>\nBill Sutton: Absolutely. Yeah. Ignite was a good time. But also a lot of learning that occurred there. And we&#8217;re putting together as another advertisement, putting together a webinar, probably in the next week or 2. To cover some of the updates that that happened at Ignite both on the Microsoft side and and user computing and others.<\/p>\n<p>7<br \/>\n00:01:24.500 &#8211;&gt; 00:01:26.669<br \/>\nGeremy Meyers: It&#8217;s funny. I went to<\/p>\n<p>8<br \/>\n00:01:26.890 &#8211;&gt; 00:01:29.309<br \/>\nGeremy Meyers: Amazon. What is what is Amazon&#8217;s called again.<\/p>\n<p>9<br \/>\n00:01:29.310 &#8211;&gt; 00:01:29.810<br \/>\nBill Sutton: Reinvest.<\/p>\n<p>10<br \/>\n00:01:29.810 &#8211;&gt; 00:01:30.280<br \/>\nGeremy Meyers: Grandpa<\/p>\n<p>11<br \/>\n00:01:30.280 &#8211;&gt; 00:01:35.730<br \/>\nGeremy Meyers: Reinvent. That&#8217;s right. I did that one a few years ago when it was in Atlanta, and I can remember being feeling so useless<\/p>\n<p>12<br \/>\n00:01:35.820 &#8211;&gt; 00:01:52.970<br \/>\nGeremy Meyers: because I&#8217;m used to folks coming into the Citrix booth and wanting to talk about daz or end user compute, or something like that, and holy smokes. Most of the folks that came to the booth want to know about Netscalar? What are we doing from a networking perspective? What&#8217;s the cloud native approach. How do we do this? How do we do that? I&#8217;m like, Oh, wow! There&#8217;s this whole other world<\/p>\n<p>13<br \/>\n00:01:53.480 &#8211;&gt; 00:01:54.970<br \/>\nGeremy Meyers: that maybe I should look into.<\/p>\n<p>14<br \/>\n00:01:55.490 &#8211;&gt; 00:01:56.750<br \/>\nGeremy Meyers: It was fascinating.<\/p>\n<p>15<br \/>\n00:01:56.750 &#8211;&gt; 00:01:59.869<br \/>\nAndy Whiteside: The the amount of services offered through aws and growing.<\/p>\n<p>16<br \/>\n00:01:59.870 &#8211;&gt; 00:02:00.259<br \/>\nGeremy Meyers: Thank you.<\/p>\n<p>17<br \/>\n00:02:00.260 &#8211;&gt; 00:02:02.060<br \/>\nAndy Whiteside: Just unbelievable.<\/p>\n<p>18<br \/>\n00:02:02.630 &#8211;&gt; 00:02:04.829<br \/>\nGeremy Meyers: Amazing possible to keep up with.<\/p>\n<p>19<br \/>\n00:02:04.830 &#8211;&gt; 00:02:09.889<br \/>\nBill Sutton: And that earlier voice was the voice of Jeremy Myers from Citrix. Jeremy. Thanks for joining us today.<\/p>\n<p>20<br \/>\n00:02:10.600 &#8211;&gt; 00:02:13.569<br \/>\nGeremy Meyers: Welcome. That was my way of ninja, ninja ninja in.<\/p>\n<p>21<br \/>\n00:02:13.570 &#8211;&gt; 00:02:14.020<br \/>\nBill Sutton: That&#8217;s right.<\/p>\n<p>22<br \/>\n00:02:14.470 &#8211;&gt; 00:02:15.070<br \/>\nBill Sutton: That&#8217;s right.<\/p>\n<p>23<br \/>\n00:02:15.070 &#8211;&gt; 00:02:15.810<br \/>\nGeremy Meyers: But a verb.<\/p>\n<p>24<br \/>\n00:02:15.990 &#8211;&gt; 00:02:21.200<br \/>\nBill Sutton: Something like that. And then also we have Todd Smith from Citrix as well. Todd. Say hello.<\/p>\n<p>25<br \/>\n00:02:21.570 &#8211;&gt; 00:02:27.660<br \/>\nTodd Smith: Hey there, Bill! It was great to see you a couple of weeks ago in Washington, DC. For the Citrix connected.<\/p>\n<p>26<br \/>\n00:02:28.850 &#8211;&gt; 00:02:31.759<br \/>\nBill Sutton: Absolutely. Yeah. It was a really good event for sure.<\/p>\n<p>27<br \/>\n00:02:33.140 &#8211;&gt; 00:02:49.280<br \/>\nBill Sutton: Alright. So today, we&#8217;re going to do this blog entitled Improved Security Admin Interfaces and user experiences. Across the Citrix Solution portfolio was written by Emma Bland. This is a pretty long one, so we may end up doing a 2 parter here, which is, which is fine.<\/p>\n<p>28<br \/>\n00:02:49.638 &#8211;&gt; 00:03:03.589<br \/>\nBill Sutton: So starting off, this is, this is focused on admin interfaces, like the title says, and user experiences, etc, but also includes some other nuggets in here. So which one of you guys wants to kick this one off.<\/p>\n<p>29<br \/>\n00:03:05.600 &#8211;&gt; 00:03:15.009<br \/>\nGeremy Meyers: Well, let&#8217;s start here. It doesn&#8217;t necessarily cover this, but we do have a new current release that was released. So the 2411,<\/p>\n<p>30<br \/>\n00:03:15.230 &#8211;&gt; 00:03:18.699<br \/>\nGeremy Meyers: it gets a an honorable mention right out of the gate.<\/p>\n<p>31<br \/>\n00:03:18.700 &#8211;&gt; 00:03:19.209<br \/>\nBill Sutton: It does.<\/p>\n<p>32<br \/>\n00:03:19.542 &#8211;&gt; 00:03:22.199<br \/>\nGeremy Meyers: So if you are a current release customer.<\/p>\n<p>33<br \/>\n00:03:22.643 &#8211;&gt; 00:03:24.909<br \/>\nGeremy Meyers: This is available in the download portal.<\/p>\n<p>34<br \/>\n00:03:25.490 &#8211;&gt; 00:03:33.219<br \/>\nBill Sutton: Yes, it is, and I think a lot of the features that are in here are related to 2411, but not exclusive to 2411, right, Todd.<\/p>\n<p>35<br \/>\n00:03:33.440 &#8211;&gt; 00:03:39.449<br \/>\nTodd Smith: That&#8217;s correct. I I think I think what you&#8217;ve seen over the past year and a half to<\/p>\n<p>36<br \/>\n00:03:39.760 &#8211;&gt; 00:03:41.420<br \/>\nTodd Smith: year has been.<\/p>\n<p>37<br \/>\n00:03:41.530 &#8211;&gt; 00:03:54.886<br \/>\nTodd Smith: We&#8217;ve been playing catch up on a lot of technical debt reduction. So we&#8217;ve seen a lot of new features being dropped into the current release cycle and not just having to wait until the Lcsr. Comes out. So<\/p>\n<p>38<br \/>\n00:03:55.310 &#8211;&gt; 00:03:57.620<br \/>\nTodd Smith: you know, there&#8217;s there&#8217;s a ton of<\/p>\n<p>39<br \/>\n00:03:58.440 &#8211;&gt; 00:04:22.140<br \/>\nTodd Smith: goodness that&#8217;s coming out, and it&#8217;s not only for the users. It&#8217;s for the Admins, and it&#8217;s across all of our different products. So you know, in the past, it was typically you&#8217;d get a netscalar update, or you would get a Zen server update or a virtual app virtual desktop update? You know, we&#8217;re we&#8217;re adding a lot into into these updates. And<\/p>\n<p>40<br \/>\n00:04:22.200 &#8211;&gt; 00:04:26.120<br \/>\nTodd Smith: you know, I think there&#8217;s gonna be some Zara.<\/p>\n<p>41<br \/>\n00:04:26.690 &#8211;&gt; 00:04:30.160<br \/>\nTodd Smith: you know, we&#8217;re gonna reference a lot of these things in the in this conversation.<\/p>\n<p>42<br \/>\n00:04:30.840 &#8211;&gt; 00:04:38.639<br \/>\nBill Sutton: Yep, that&#8217;s right. So 1st off there were some new entitlements or announcements made at ignite a couple of weeks ago on November 19.th<\/p>\n<p>43<br \/>\n00:04:39.013 &#8211;&gt; 00:04:41.110<br \/>\nBill Sutton: Jeremy, you want to talk about the 1st one.<\/p>\n<p>44<br \/>\n00:04:41.390 &#8211;&gt; 00:04:54.840<br \/>\nGeremy Meyers: So the 1st one actually surprised me a bit, because this is something that actually thought we had in the product 12 months ago. Right? So we had been talking about the integration between windows 3, 65, and Citrix for some time now.<\/p>\n<p>45<br \/>\n00:04:55.010 &#8211;&gt; 00:04:57.679<br \/>\nGeremy Meyers: So keep me honest, Todd.<\/p>\n<p>46<br \/>\n00:04:57.780 &#8211;&gt; 00:05:04.409<br \/>\nGeremy Meyers: Did this ever go? Ga, or is this only a part of the hdx for Citrix experience.<\/p>\n<p>47<br \/>\n00:05:04.620 &#8211;&gt; 00:05:12.290<br \/>\nTodd Smith: It was. It was really focused on the hdx. From Citrix experience there was a it was a separate line item, separate skew<\/p>\n<p>48<br \/>\n00:05:12.690 &#8211;&gt; 00:05:16.740<br \/>\nTodd Smith: that you had that customers had to order or or acquire.<\/p>\n<p>49<br \/>\n00:05:17.532 &#8211;&gt; 00:05:22.240<br \/>\nTodd Smith: This is a game changer, because it really says if you&#8217;re entitled to<\/p>\n<p>50<br \/>\n00:05:22.800 &#8211;&gt; 00:05:32.479<br \/>\nTodd Smith: the Citrix virtual app and desktop through our universal hybrid multi cloud licensing you had access or or platform license. You had access to<\/p>\n<p>51<br \/>\n00:05:32.680 &#8211;&gt; 00:05:39.000<br \/>\nTodd Smith: all of these new features, specifically integrating with windows. 3, 65.<\/p>\n<p>52<br \/>\n00:05:40.510 &#8211;&gt; 00:05:42.900<br \/>\nGeremy Meyers: Now, if I understood correctly, it is not just<\/p>\n<p>53<br \/>\n00:05:42.960 &#8211;&gt; 00:05:55.219<br \/>\nGeremy Meyers: Cpl. The Citrix platform license. It is not just the universal hybrid multi cloud license. It&#8217;s not Cpc, so the private cloud license, simply because that doesn&#8217;t support deploying, managing anything out of the cloud.<\/p>\n<p>54<br \/>\n00:05:55.220 &#8211;&gt; 00:05:55.550<br \/>\nBill Sutton : C'est vrai.<\/p>\n<p>55<br \/>\n00:05:55.832 &#8211;&gt; 00:06:25.489<br \/>\nGeremy Meyers: Or public cloud. But I think it does include Daz and any of the legacy universal licenses as well. So this is different. A lot of folks are are. We&#8217;ve had this conversation quite a bit, especially as it comes to some of the net Scaler entitlements. There&#8217;s a lot bundled into like, say, a Uhmc or a Cpl license. But this is something that you get, and not just this, but the next one down that that&#8217;s in this blog post is also Uber agent as well as we&#8217;re we&#8217;re adding Uber agent as an entitled to entitlement to not only Cpl. Only before<\/p>\n<p>56<br \/>\n00:06:25.550 &#8211;&gt; 00:06:37.500<br \/>\nGeremy Meyers: now it&#8217;s the universal hybrid multi cloud. Now it&#8217;s daz any flavor of daz, any flavor of universal, any flavor of workspace service. So if you&#8217;ve got any of the cloud services from a daz perspective.<\/p>\n<p>57<br \/>\n00:06:38.340 &#8211;&gt; 00:06:42.500<br \/>\nGeremy Meyers: you get both of these entitlements the big thing with windows 365. And this is crazy.<\/p>\n<p>58<br \/>\n00:06:42.700 &#8211;&gt; 00:06:43.990<br \/>\nGeremy Meyers: unlimited use.<\/p>\n<p>59<br \/>\n00:06:44.340 &#8211;&gt; 00:06:44.790<br \/>\nBill Sutton: Yeah, I&#8217;m.<\/p>\n<p>60<br \/>\n00:06:44.790 &#8211;&gt; 00:06:45.200<br \/>\nGeremy Meyers: So.<\/p>\n<p>61<br \/>\n00:06:45.200 &#8211;&gt; 00:06:46.280<br \/>\nBill Sutton: That&#8217;s the key thing. Yeah.<\/p>\n<p>62<br \/>\n00:06:46.280 &#8211;&gt; 00:06:46.900<br \/>\nGeremy Meyers : Oui.<\/p>\n<p>63<br \/>\n00:06:48.220 &#8211;&gt; 00:06:53.659<br \/>\nBill Sutton: So you can. You can leverage citrix das, or any flavor thereof, to<\/p>\n<p>64<br \/>\n00:06:53.700 &#8211;&gt; 00:06:59.739<br \/>\nBill Sutton: manage an unlimited number of paid for cloud Pcs. Using windows. 365.<\/p>\n<p>65<br \/>\n00:07:00.130 &#8211;&gt; 00:07:17.249<br \/>\nGeremy Meyers: So. So let&#8217;s revisit that real quick cloud. PC. Is a dedicated desktop right posted in Microsoft azure. So it&#8217;s an entitlement of your windows. 365 M. 365 license. Could either you or Andy maybe get the Microsoft licensing straight on that like, how do I get a cloud? PC.<\/p>\n<p>66<br \/>\n00:07:17.250 &#8211;&gt; 00:07:21.140<br \/>\nBill Sutton: You. You pay for it per user per month. It&#8217;s a it&#8217;s not an entitlement.<\/p>\n<p>67<br \/>\n00:07:22.440 &#8211;&gt; 00:07:42.100<br \/>\nAndy Whiteside: Yeah, it. So you definitely, it definitely comes close to being like you use it with the windows. 3, 60, or, excuse me, m, 3, 65 have, like the Vda, the the the things that come with Avd. But windows 3, 65 is a separate pay for that PC. Monthly depending on which PC. You get offering.<\/p>\n<p>68<br \/>\n00:07:42.100 &#8211;&gt; 00:07:58.259<br \/>\nBill Sutton: But it&#8217;s it&#8217;s a. It&#8217;s an unlimited thing. So it&#8217;s like a, it&#8217;s, it&#8217;s like a persistent desktop. And for for whatever the payment is per user per month. You can use it 8\u00a0HA day or 24\u00a0HA day. I mean, it&#8217;s it&#8217;s always on, always available, maybe not always on, but always available.<\/p>\n<p>69<br \/>\n00:07:58.260 &#8211;&gt; 00:07:58.970<br \/>\nAndy Whiteside: Oh, that&#8217;s all.<\/p>\n<p>70<br \/>\n00:07:58.970 &#8211;&gt; 00:08:06.559<br \/>\nGeremy Meyers: So I&#8217;m getting a windows license, and I&#8217;m getting committed azure consumption. All you can eat. I&#8217;m not having to dial that up, dial it out. Got it? Okay.<\/p>\n<p>71<br \/>\n00:08:06.560 &#8211;&gt; 00:08:18.109<br \/>\nAndy Whiteside: Once they lift and shift your physical PC. Into the cloud, and and you pay a premium for it. But it&#8217;s there. It&#8217;s always there. It&#8217;s always on in theory. Maybe there are snapshots that you could revert it back to. Maybe, Bill, you know, if you can snapshot it.<\/p>\n<p>72<br \/>\n00:08:18.570 &#8211;&gt; 00:08:19.790<br \/>\nBill Sutton: Yes, I believe so.<\/p>\n<p>73<br \/>\n00:08:19.790 &#8211;&gt; 00:08:25.260<br \/>\nAndy Whiteside: So it&#8217;s not non-persistent, but you could revert it back. You know the power of virtualization.<\/p>\n<p>74<br \/>\n00:08:26.660 &#8211;&gt; 00:08:38.649<br \/>\nGeremy Meyers: So the idea here is you get unlimited integration with Cloud, PC. And Citrix, a citrix dash pla platform, regardless of how you get it. But of course, when you do that you get a lot of other things, too. Right? So.<\/p>\n<p>75<br \/>\n00:08:38.650 &#8211;&gt; 00:08:38.970<br \/>\nBill Sutton: Dude.<\/p>\n<p>76<br \/>\n00:08:38.970 &#8211;&gt; 00:08:44.330<br \/>\nGeremy Meyers: You know, honestly, under the hood, it&#8217;s like remote PC. Into a dedicated desktop. Right? It just happens to be<\/p>\n<p>77<br \/>\n00:08:44.410 &#8211;&gt; 00:08:53.090<br \/>\nGeremy Meyers: Cloud, PC. But that unlocks things like, you know, any observability. It unlocks session, recording it. Lock unlocks. You know, we got a lot of customers who are using<\/p>\n<p>78<br \/>\n00:08:53.429 &#8211;&gt; 00:08:59.019<br \/>\nGeremy Meyers: they&#8217;re not using intra id for their authentication. They might be using an octa or something else, sample, based or<\/p>\n<p>79<br \/>\n00:08:59.480 &#8211;&gt; 00:09:01.939<br \/>\nGeremy Meyers: or whatever, but that integrates into this as well.<\/p>\n<p>80<br \/>\n00:09:01.940 &#8211;&gt; 00:09:05.900<br \/>\nAndy Whiteside: The number. One thing you get is the world&#8217;s leading, you know, connection.<\/p>\n<p>81<br \/>\n00:09:05.900 &#8211;&gt; 00:09:06.600<br \/>\nGeremy Meyers: Protocol.<\/p>\n<p>82<br \/>\n00:09:06.600 &#8211;&gt; 00:09:30.809<br \/>\nAndy Whiteside: Protocol protocol absolutely like I literally on the way to later way to aws, I talked to a guy who&#8217;d moved from Citrix to Avd. And I used my virtual desktop the entire flight little bit hiccups when we lost connectivity along the way. But for the most part my the entire flight. And I&#8217;m I&#8217;m like punching like, can can you do this with your protocol? And he&#8217;s like, no, I wouldn&#8217;t begin to use that on the plane. But now, with windows 3, 65, and Citrix, you can. You can do it.<\/p>\n<p>83<br \/>\n00:09:31.200 &#8211;&gt; 00:09:34.661<br \/>\nBill Sutton: Right. Yep, you&#8217;re getting all the hdx. Goodness is what you&#8217;re getting.<\/p>\n<p>84<br \/>\n00:09:34.950 &#8211;&gt; 00:09:35.520<br \/>\nGeremy Meyers: Perfect.<\/p>\n<p>85<br \/>\n00:09:35.520 &#8211;&gt; 00:10:01.749<br \/>\nBill Sutton: Basically and historically, this was an entitlement of you of universal hybrid multi cloud in the platform, and then the platform license. You got the you got the ability to connect to with this 365 Pcs. Basically, what they did was extended that to be to the older Das products and made it unlimited. In terms of the number of windows. Pcs. You can connect or windows 365 Pcs. You can connect to cloud Pcs.<\/p>\n<p>86<br \/>\n00:10:03.700 &#8211;&gt; 00:10:12.519<br \/>\nBill Sutton: And then, of course, you touched Jeremy on uber agent. maybe maybe give a kind of a high level overview of what Uber agent is for our listeners.<\/p>\n<p>87<br \/>\n00:10:14.540 &#8211;&gt; 00:10:25.649<br \/>\nGeremy Meyers: Sure so uber agent is an observability platform that&#8217;s actually pretty dang granular, right? So you know, for a lot of customers who are using this. It&#8217;s very much<\/p>\n<p>88<br \/>\n00:10:25.820 &#8211;&gt; 00:10:29.740<br \/>\nGeremy Meyers: a piece of it is very much Citrix focus. But there is a line of sight<\/p>\n<p>89<br \/>\n00:10:30.025 &#8211;&gt; 00:10:34.620<br \/>\nGeremy Meyers: outside of the citrix environment as well. So a lot of customers are using it to not only<\/p>\n<p>90<br \/>\n00:10:34.640 &#8211;&gt; 00:10:42.990<br \/>\nGeremy Meyers: monitor the vdas they&#8217;re monitoring some of the Citrix components storefront the database servers, you know those pizzas as well.<\/p>\n<p>91<br \/>\n00:10:42.990 &#8211;&gt; 00:10:45.960<br \/>\nAndy Whiteside: This is Citrix Dex, offering right digital experience.<\/p>\n<p>92<br \/>\n00:10:45.960 &#8211;&gt; 00:10:47.369<br \/>\nGeremy Meyers: Correct monitor<\/p>\n<p>93<br \/>\n00:10:47.800 &#8211;&gt; 00:10:58.119<br \/>\nGeremy Meyers: right? Right? So at the end of the day you&#8217;re also hoping to gather some statistics off the endpoints as well. Right? So I&#8217;d love to know, in addition to what the Vda. Seeing is what the endpoint endpoint seeing right so, and tie this in with.<\/p>\n<p>94<br \/>\n00:10:58.180 &#8211;&gt; 00:11:01.040<br \/>\nGeremy Meyers: you know my endpoint connecting from<\/p>\n<p>95<br \/>\n00:11:01.457 &#8211;&gt; 00:11:18.380<br \/>\nGeremy Meyers: to a citrix session. Now, what&#8217;s interesting is we have opened this thing up so uber agent traditionally, was a a solution. You only got with our platform license, right? So what we&#8217;re doing here and this is very subtle here as well is you can deploy uber agent for any of your citrix components<\/p>\n<p>96<br \/>\n00:11:18.881 &#8211;&gt; 00:11:22.399<br \/>\nGeremy Meyers: including the endpoints that are running a citrix client<\/p>\n<p>97<br \/>\n00:11:22.440 &#8211;&gt; 00:11:31.420<br \/>\nGeremy Meyers: with a Uhmc license, a das license. So any of the Das services you can deploy this with the only difference between what you get with those<\/p>\n<p>98<br \/>\n00:11:31.430 &#8211;&gt; 00:11:34.709<br \/>\nGeremy Meyers: entitlements and Cpl is, I can also<\/p>\n<p>99<br \/>\n00:11:35.156 &#8211;&gt; 00:11:39.019<br \/>\nGeremy Meyers: monitor components outside of Citrix as well. If I had a cpl, right? So.<\/p>\n<p>100<br \/>\n00:11:39.020 &#8211;&gt; 00:11:40.190<br \/>\nBill Sutton: You know? Cpl, yeah.<\/p>\n<p>101<br \/>\n00:11:40.190 &#8211;&gt; 00:11:40.880<br \/>\nGeremy Meyers: Correct, correct.<\/p>\n<p>102<br \/>\n00:11:40.880 &#8211;&gt; 00:11:42.060<br \/>\nBill Sutton: Platform, License.<\/p>\n<p>103<br \/>\n00:11:43.350 &#8211;&gt; 00:11:53.540<br \/>\nGeremy Meyers: So so this is interesting. I&#8217;d love to get your take. So you haven&#8217;t had a chance to chat with Bill with about Bill with this, you know just yet. But you know, listen historically. You know, integra was an Uber agent<\/p>\n<p>104<br \/>\n00:11:53.630 &#8211;&gt; 00:11:54.670<br \/>\nGeremy Meyers: partner.<\/p>\n<p>105<br \/>\n00:11:55.840 &#8211;&gt; 00:12:00.629<br \/>\nGeremy Meyers: Can you provide just your own perspective on how you guys are leveraging this and working with.<\/p>\n<p>106<br \/>\n00:12:00.880 &#8211;&gt; 00:12:03.150<br \/>\nGeremy Meyers: we&#8217;re raising with your customers, or at least internally.<\/p>\n<p>107<br \/>\n00:12:03.150 &#8211;&gt; 00:12:16.110<br \/>\nAndy Whiteside: Yeah, I should probably do that. So we weren&#8217;t just at Uber. We were the Uber agent, only handful in the country prior to the Citrix acquisition. In fact, business perspective. Citrix, buying Uber agent, was devastating to us because people that used to buy it from us now got it for free.<\/p>\n<p>108<br \/>\n00:12:16.290 &#8211;&gt; 00:12:41.030<br \/>\nAndy Whiteside: not not not bitter, just reality. But nonetheless. We were huge advocates of Helge and those guys on the Uber agent side, specifically for the hundreds and hundreds, if not thousands, of Citrix users. We were hosting thousands at the time that we were hosting those workloads, and Uber agent was the best way to monitor those users in that Citrix environment.<\/p>\n<p>109<br \/>\n00:12:43.710 &#8211;&gt; 00:12:44.470<br \/>\nGeremy Meyers: Love it.<\/p>\n<p>110<br \/>\n00:12:44.950 &#8211;&gt; 00:12:45.500<br \/>\nBill Sutton : Oui.<\/p>\n<p>111<br \/>\n00:12:46.850 &#8211;&gt; 00:12:47.290<br \/>\nAndy Whiteside: But again.<\/p>\n<p>112<br \/>\n00:12:47.290 &#8211;&gt; 00:12:47.610<br \/>\nBill Sutton : C'est vrai.<\/p>\n<p>113<br \/>\n00:12:47.610 &#8211;&gt; 00:13:08.719<br \/>\nAndy Whiteside: Give you one great use case. We were able to you know, to determine what users were using, what websites and how long and all that browser consumption. I mean, yeah, I&#8217;m I&#8217;m a virtual desktop user on a daily basis. The number one thing I do that drives my virtual desktop, and my virtual desktop team crazy is open up like 30 browser tabs and go all kinds of places and just leave them open. That was one use case where we found it extremely valuable.<\/p>\n<p>114<br \/>\n00:13:09.330 &#8211;&gt; 00:13:09.740<br \/>\nBill Sutton : Oui.<\/p>\n<p>115<br \/>\n00:13:09.740 &#8211;&gt; 00:13:28.970<br \/>\nAndy Whiteside: Now, at that time we weren&#8217;t using it. And I think this is the big announcement. We weren&#8217;t using it. Across the the by the asynchronous solution where the endpoints weren&#8217;t in play now, because it&#8217;s kind of unlimited for those Citrix customers. Not only do you have the ability to use it for the Citrix sessions. You can use those endpoints. And, Jeremy, I think that&#8217;s whether they&#8217;re accessing Citrix or not in it.<\/p>\n<p>116<br \/>\n00:13:29.456 &#8211;&gt; 00:13:35.819<br \/>\nGeremy Meyers: So if you&#8217;re a Uhmc license holder, if you&#8217;re a das license holder, if you don&#8217;t have a Cpl, it&#8217;s only for Citrix<\/p>\n<p>117<br \/>\n00:13:36.083 &#8211;&gt; 00:13:44.120<br \/>\nGeremy Meyers: pieces as well as the endpoints connecting via Citrix. Now, if you wanna if you want to monitor outside of that, then that would be the Cpl. But I think for most customers<\/p>\n<p>118<br \/>\n00:13:45.420 &#8211;&gt; 00:13:47.209<br \/>\nGeremy Meyers: it&#8217;s a great value. Add, even from a.<\/p>\n<p>119<br \/>\n00:13:47.210 &#8211;&gt; 00:13:52.800<br \/>\nBill Sutton: We? We have a couple of large customers that are really interested in monitoring all the endpoints in addition to those that are.<\/p>\n<p>120<br \/>\n00:13:52.800 &#8211;&gt; 00:13:53.190<br \/>\nGeremy Meyers : C'est vrai.<\/p>\n<p>121<br \/>\n00:13:53.190 &#8211;&gt; 00:13:58.190<br \/>\nBill Sutton: Citrix. So those are obviously Citrix platform license customers.<\/p>\n<p>122<br \/>\n00:13:58.510 &#8211;&gt; 00:13:59.030<br \/>\nGeremy Meyers : C'est vrai.<\/p>\n<p>123<br \/>\n00:13:59.580 &#8211;&gt; 00:14:02.309<br \/>\nTodd Smith: And I think this is also a space where<\/p>\n<p>124<br \/>\n00:14:03.030 &#8211;&gt; 00:14:06.309<br \/>\nTodd Smith: it is really moving more and more towards<\/p>\n<p>125<br \/>\n00:14:06.610 &#8211;&gt; 00:14:09.800<br \/>\nTodd Smith: fire prevention as opposed to fire suppression.<\/p>\n<p>126<br \/>\n00:14:10.348 &#8211;&gt; 00:14:12.679<br \/>\nTodd Smith: What I mean by that is.<\/p>\n<p>127<br \/>\n00:14:12.850 &#8211;&gt; 00:14:20.259<br \/>\nTodd Smith: if the help desk and the engineering team has visibility into a problem before the user can really detect that there&#8217;s a problem.<\/p>\n<p>128<br \/>\n00:14:20.760 &#8211;&gt; 00:14:22.190<br \/>\nTodd Smith: They&#8217;re winning that game.<\/p>\n<p>129<br \/>\n00:14:24.800 &#8211;&gt; 00:14:28.339<br \/>\nTodd Smith: Uber agent is certainly one of those tools that&#8217;s going to help them<\/p>\n<p>130<br \/>\n00:14:28.700 &#8211;&gt; 00:14:36.240<br \/>\nTodd Smith: better prevent issues before they become problems. And that visibility piece of it is absolutely critical.<\/p>\n<p>131<br \/>\n00:14:37.830 &#8211;&gt; 00:14:40.449<br \/>\nTodd Smith: And being able to do that in a lightweight manner<\/p>\n<p>132<br \/>\n00:14:40.550 &#8211;&gt; 00:14:49.319<br \/>\nTodd Smith: is is also critical, right? You don&#8217;t want to have. I was talking with the customer last week that they have 13 agents, that they put on a on an endpoint<\/p>\n<p>133<br \/>\n00:14:49.740 &#8211;&gt; 00:15:00.070<br \/>\nTodd Smith: prior to them, making a connection to a virtual desktop, and then within the virtual desktop, they have about a dozen or so additional agents. So by the time you look at us, you know<\/p>\n<p>134<br \/>\n00:15:00.150 &#8211;&gt; 00:15:04.270<br \/>\nTodd Smith: almost half of the resources are being consumed by these<\/p>\n<p>135<br \/>\n00:15:04.990 &#8211;&gt; 00:15:19.410<br \/>\nTodd Smith: little agents that are doing nothing but collecting data. And that&#8217;s not including the back end costs on the data that&#8217;s being collected right? So you know, having it be lightweight, having it be unobtrusive, having it be always available.<\/p>\n<p>136<br \/>\n00:15:19.480 &#8211;&gt; 00:15:21.129<br \/>\nTodd Smith: are critical things.<\/p>\n<p>137<br \/>\n00:15:22.290 &#8211;&gt; 00:15:47.590<br \/>\nBill Sutton: Yeah, for sure. When we were at connect couple of weeks ago, Todd, they talked about the person presenting on this talked about how lightweight it is. And it&#8217;s it&#8217;s really just a under 10%, I think, or less CPU utilization on the endpoint. And it it collects the data very granularly. I believe it sends it up, or at least collects it in 3 second increments. Is that what I remember? Yeah. So you&#8217;re getting almost real time. It&#8217;s not like it&#8217;s matching it every 5\u00a0min.<\/p>\n<p>138<br \/>\n00:15:48.020 &#8211;&gt; 00:15:58.129<br \/>\nBill Sutton: and sending it up it&#8217;s it may be batching it to get it to the Uber agent console. But it&#8217;s collecting the data every 3 seconds, and that&#8217;s that&#8217;s pretty darn granular when you think about it.<\/p>\n<p>139<br \/>\n00:15:59.220 &#8211;&gt; 00:16:02.130<br \/>\nBill Sutton: Alright. Any other. Any other other<\/p>\n<p>140<br \/>\n00:16:02.140 &#8211;&gt; 00:16:06.039<br \/>\nBill Sutton: closing comments on windows 3, 65, or Uber agent. Before we move forward, guys.<\/p>\n<p>141<br \/>\n00:16:07.260 &#8211;&gt; 00:16:07.750<br \/>\nTodd Smith: Nope.<\/p>\n<p>142<br \/>\n00:16:07.750 &#8211;&gt; 00:16:08.120<br \/>\nBill Sutton : D'accord.<\/p>\n<p>143<br \/>\n00:16:08.120 &#8211;&gt; 00:16:08.740<br \/>\nGeremy Meyers: You know.<\/p>\n<p>144<br \/>\n00:16:08.740 &#8211;&gt; 00:16:24.619<br \/>\nBill Sutton: So earlier. I I don&#8217;t know which one of you guys I think it was Todd, but I could be wrong. Correct me if I am we&#8217;re talking about how Citrix has been iterating significantly this year in adding new features and functionality, I would argue<\/p>\n<p>145<br \/>\n00:16:24.620 &#8211;&gt; 00:16:41.802<br \/>\nBill Sutton: that it&#8217;s iterated more frequently and faster than I&#8217;ve ever seen. Citrix iterate particularly on features that may not be like, you know. Grandiose, you know, brand new ways of working, and that sort of thing, but incremental type of things like what we&#8217;re gonna talk about now.<\/p>\n<p>146<br \/>\n00:16:42.160 &#8211;&gt; 00:17:08.699<br \/>\nBill Sutton: for example, new platform ui I remember when we went from the old the old Zen app console to the Mmc. Based console. And now we move from the Mmc. Based console to the web console, and it not long after that. Now we&#8217;re talking about a completely new Ui to help make it more streamlined for administrators a better look and feel and other elements. What do you guys want to talk about this ui, this new ui.<\/p>\n<p>147<br \/>\n00:17:09.780 &#8211;&gt; 00:17:12.629<br \/>\nTodd Smith: Yeah, I I think I&#8217;ll I think I&#8217;ll take a shot at this.<\/p>\n<p>148<br \/>\n00:17:12.630 &#8211;&gt; 00:17:13.010<br \/>\nBill Sutton : D'accord.<\/p>\n<p>149<br \/>\n00:17:13.010 &#8211;&gt; 00:17:13.960<br \/>\nTodd Smith: That is.<\/p>\n<p>150<br \/>\n00:17:14.079 &#8211;&gt; 00:17:22.500<br \/>\nTodd Smith: you know, when you looked at what we were doing with the old web studio and the web consoles, and the versus compare that with the<\/p>\n<p>151<br \/>\n00:17:22.560 &#8211;&gt; 00:17:30.010<br \/>\nTodd Smith: Mmc. Right, and it really is geared more and more towards thinking about or<\/p>\n<p>152<br \/>\n00:17:30.030 &#8211;&gt; 00:17:35.610<br \/>\nTodd Smith: presenting the data presenting the the commands and the and the control features<\/p>\n<p>153<br \/>\n00:17:36.030 &#8211;&gt; 00:17:50.936<br \/>\nTodd Smith: in a way that it&#8217;s actually useful. And and it kind of goes through the cognitive process of how someone on boards. A user makes a change or modification, or goes through some type of changes in the environment. Right?<\/p>\n<p>154<br \/>\n00:17:51.380 &#8211;&gt; 00:17:55.480<br \/>\nTodd Smith: without having to, you know. Do the old<\/p>\n<p>155<br \/>\n00:17:55.560 &#8211;&gt; 00:18:09.000<br \/>\nTodd Smith: click on an icon, and see if that&#8217;s the one that you&#8217;re looking for. Right? So there&#8217;s a lot more automation. There&#8217;s a lot more is the data that&#8217;s being presented in the console, relevant to what I need to do, and being able to drill down as opposed, to<\/p>\n<p>156<br \/>\n00:18:09.020 &#8211;&gt; 00:18:12.369<br \/>\nTodd Smith: open up a whole nother tab, to be able to find that information.<\/p>\n<p>157<br \/>\n00:18:12.380 &#8211;&gt; 00:18:14.670<br \/>\nTodd Smith: So there&#8217;s been a lot of<\/p>\n<p>158<br \/>\n00:18:15.470 &#8211;&gt; 00:18:22.990<br \/>\nTodd Smith: shifts in our design philosophy around things like consoles and user interfaces in general, which has really been<\/p>\n<p>159<br \/>\n00:18:23.050 &#8211;&gt; 00:18:25.210<br \/>\nTodd Smith: kind of adapting towards the way<\/p>\n<p>160<br \/>\n00:18:25.520 &#8211;&gt; 00:18:28.789<br \/>\nTodd Smith: a lot of the other. You know, a lot of the<\/p>\n<p>161<br \/>\n00:18:29.470 &#8211;&gt; 00:18:35.380<br \/>\nTodd Smith: consumers of the data and consumers of the services are actually looking for.<\/p>\n<p>162<br \/>\n00:18:35.620 &#8211;&gt; 00:18:41.783<br \/>\nTodd Smith: and we talked to a lot of customers about. You know what needs to be changed and what you know what the ideas are.<\/p>\n<p>163<br \/>\n00:18:42.560 &#8211;&gt; 00:18:47.349<br \/>\nTodd Smith: you know, I think a lot of our development and a lot of our changes in our technical debt reduction.<\/p>\n<p>164<br \/>\n00:18:47.420 &#8211;&gt; 00:18:55.250<br \/>\nTodd Smith: The majority of the enhancements that are being done are being done based on customer requests.<\/p>\n<p>165<br \/>\n00:18:55.860 &#8211;&gt; 00:19:02.390<br \/>\nTodd Smith: So when someone from Citrix basically says, Hey, we&#8217;re gonna we&#8217;re gonna put in a request for enhancement<\/p>\n<p>166<br \/>\n00:19:02.430 &#8211;&gt; 00:19:04.169<br \/>\nTodd Smith: based on a customer need.<\/p>\n<p>167<br \/>\n00:19:04.410 &#8211;&gt; 00:19:12.399<br \/>\nTodd Smith: That shows that we&#8217;re listening to the customers. And we&#8217;re, you know, we&#8217;re we&#8217;re actually importing or taking a lot of their ideas and putting putting them into the product.<\/p>\n<p>168<br \/>\n00:19:13.760 &#8211;&gt; 00:19:16.310<br \/>\nAndy Whiteside: Hey, Todd? Can I call? Can I call something out on that real quick.<\/p>\n<p>169<br \/>\n00:19:16.310 &#8211;&gt; 00:19:16.820<br \/>\nTodd Smith: Sure.<\/p>\n<p>170<br \/>\n00:19:16.820 &#8211;&gt; 00:19:37.309<br \/>\nAndy Whiteside: It&#8217;s also just the reality of the fact that companies like Citrix, that hold a higher strategic position and organization than other vendors has the opportunity to collapse technologies into their stack, to remove the vendor sprawl that goes across, and be a more strategic vendor for that customer. For a longer period of time.<\/p>\n<p>171<br \/>\n00:19:37.310 &#8211;&gt; 00:19:37.810<br \/>\nTodd Smith : Oui.<\/p>\n<p>172<br \/>\n00:19:38.260 &#8211;&gt; 00:19:48.929<br \/>\nAndy Whiteside: That&#8217;s the business side of this. I don&#8217;t know that everybody understands guys. This is a business. It&#8217;s not all about, you know, tech tech tech tech. We gotta find ways to make the the tech that we&#8217;re already investing in more valuable.<\/p>\n<p>173<br \/>\n00:19:50.300 &#8211;&gt; 00:19:56.040<br \/>\nTodd Smith: Yeah, it&#8217;s ironic that you&#8217;re you&#8217;re talking about that because I just listened to an audio book over the weekend<\/p>\n<p>174<br \/>\n00:19:56.100 &#8211;&gt; 00:20:00.610<br \/>\nTodd Smith: where it was talking about, you know, defining and re reimagining<\/p>\n<p>175<br \/>\n00:20:00.750 &#8211;&gt; 00:20:05.869<br \/>\nTodd Smith: business value right? And it&#8217;s it was described as it&#8217;s not a science, it&#8217;s an art form.<\/p>\n<p>176<br \/>\n00:20:06.200 &#8211;&gt; 00:20:11.720<br \/>\nTodd Smith: and the art form is, how do I take something that someone wants versus something that they need?<\/p>\n<p>177<br \/>\n00:20:12.310 &#8211;&gt; 00:20:15.970<br \/>\nTodd Smith: And how would you get value when you marry those 2 together?<\/p>\n<p>178<br \/>\n00:20:16.520 &#8211;&gt; 00:20:18.040<br \/>\nAndy Whiteside: Yeah, because.<\/p>\n<p>179<br \/>\n00:20:18.290 &#8211;&gt; 00:20:25.930<br \/>\nTodd Smith: Reducing technical debt that tends to be very focused on what someone wants<\/p>\n<p>180<br \/>\n00:20:26.110 &#8211;&gt; 00:20:29.879<br \/>\nTodd Smith: versus the dollars associated with. That is what someone needs.<\/p>\n<p>181<br \/>\n00:20:30.840 &#8211;&gt; 00:20:44.569<br \/>\nTodd Smith: and being able to marry those 2 together is absolutely critical. And I think we found the right sweet spot here in a lot of the things that we&#8217;re doing where, you know, we are reducing our debt, but we&#8217;re also adding value at the same time.<\/p>\n<p>182<br \/>\n00:20:44.570 &#8211;&gt; 00:20:54.159<br \/>\nAndy Whiteside: Yeah, it sounds like the Microsoft playbook for all these years, right? They&#8217;ve been finding ways to give you enough of what you need under one license model, that you might reconsider all the other money you spend somewhere else.<\/p>\n<p>183<br \/>\n00:20:54.160 &#8211;&gt; 00:20:54.680<br \/>\nTodd Smith: Yep.<\/p>\n<p>184<br \/>\n00:20:55.340 &#8211;&gt; 00:21:07.040<br \/>\nAndy Whiteside: And this monitoring thing did I say, edge site, this monitoring concept around for a long time, and it&#8217;s been needed and needed to work. So something you want is a monitoring tool that works. And now it&#8217;s cost effective because it&#8217;s included.<\/p>\n<p>185<br \/>\n00:21:07.040 &#8211;&gt; 00:21:07.670<br \/>\nTodd Smith: Right.<\/p>\n<p>186<br \/>\n00:21:07.670 &#8211;&gt; 00:21:12.689<br \/>\nAndy Whiteside: It. Everybody that&#8217;s a Citrix shop should take a look at whether this can do the job for them.<\/p>\n<p>187<br \/>\n00:21:13.200 &#8211;&gt; 00:21:18.569<br \/>\nTodd Smith: So so since you brought up edge site, Andy, Edgelight was a phenomenal tool.<\/p>\n<p>188<br \/>\n00:21:18.850 &#8211;&gt; 00:21:21.109<br \/>\nTodd Smith: it collected a lot of information.<\/p>\n<p>189<br \/>\n00:21:21.400 &#8211;&gt; 00:21:29.420<br \/>\nTodd Smith: The problem with edge site was that it didn&#8217;t tell you what the information was. It didn&#8217;t describe what the information was telling you.<\/p>\n<p>190<br \/>\n00:21:29.920 &#8211;&gt; 00:21:40.859<br \/>\nTodd Smith: You still needed to have the Citrix ninja to be able to go in and figure out what exactly is in the edge site. Report that I need to that I need to pull out and then go make an adjustment.<\/p>\n<p>191<br \/>\n00:21:40.940 &#8211;&gt; 00:21:45.679<br \/>\nTodd Smith: And it required you to know what adjustments needed to be made<\/p>\n<p>192<br \/>\n00:21:46.180 &#8211;&gt; 00:21:56.459<br \/>\nTodd Smith: based on the information that Edge Site was providing it didn&#8217;t have any capabilities around AI or machine learning, or even being able to to accurately or not accurately.<\/p>\n<p>193<br \/>\n00:21:56.770 &#8211;&gt; 00:22:03.500<br \/>\nTodd Smith: efficiently define, describe what the actual problem is for someone who is not at that ninja level.<\/p>\n<p>194<br \/>\n00:22:06.150 &#8211;&gt; 00:22:06.700<br \/>\nBill Sutton : Oui.<\/p>\n<p>195<br \/>\n00:22:08.190 &#8211;&gt; 00:22:36.100<br \/>\nBill Sutton: alright. The next topic is on multi monitor enhancement. This is essentially what it looks like from reading through the blog is historically using multiple monitors is I. I know from experience. Sometimes it can be a challenge, particularly if you got more than 2 or if you want certain things on certain monitors. Well, apparently. Now we have the ability to customize these settings and save them for a better experience. Do you guys have any experience with this or anything? You&#8217;d like to add to that.<\/p>\n<p>196<br \/>\n00:22:37.160 &#8211;&gt; 00:22:43.929<br \/>\nGeremy Meyers: So I&#8217;ll tell you. I don&#8217;t have experience yet, but where this comes from is, you know, the Northeast. We have a lot of financial services.<\/p>\n<p>197<br \/>\n00:22:43.930 &#8211;&gt; 00:22:45.140<br \/>\nBill Sutton: Yes, yes.<\/p>\n<p>198<br \/>\n00:22:45.140 &#8211;&gt; 00:22:47.740<br \/>\nGeremy Meyers: And they have a lot of monitors they need to. In fact.<\/p>\n<p>199<br \/>\n00:22:48.000 &#8211;&gt; 00:23:02.290<br \/>\nGeremy Meyers: you know, 6 to 8 is not unusual, right? Just based on the amount of things they have to have open. And you know, just in the spirit of what Todd said in terms of Rfes feedback from the customer like this is one of the but believe it or not, this is one of the the most killer apps<\/p>\n<p>200<br \/>\n00:23:02.400 &#8211;&gt; 00:23:05.389<br \/>\nGeremy Meyers: when it comes to Citrix, and this hdx. And the ability<\/p>\n<p>201<br \/>\n00:23:05.590 &#8211;&gt; 00:23:20.919<br \/>\nGeremy Meyers: to save man a handful of minutes just rearranging a screen when you reconnect like. I don&#8217;t want to downplay that. But that&#8217;s a really big deal. And so this is from a user experience perspective. And this started as an Rfp or an Rfe that came in from more than one customer.<\/p>\n<p>202<br \/>\n00:23:21.010 &#8211;&gt; 00:23:43.400<br \/>\nGeremy Meyers: And you know this is where we can go back to the customer and go. Hey, this is just not product management, imagining what&#8217;s good for the customer. This is feedback from the customer they hop on with these customers. Product management does to understand exactly what those requirements are, you know. Listen, what do you need. How do we make this better? Boom? This is what we&#8217;re looking for. And this is an example of making that into the product.<\/p>\n<p>203<br \/>\n00:23:45.290 &#8211;&gt; 00:23:49.269<br \/>\nTodd Smith: And I think you know, as we look back at those Rfes that came in<\/p>\n<p>204<br \/>\n00:23:49.950 &#8211;&gt; 00:23:54.429<br \/>\nTodd Smith: Number one, it was enhancing a user experience number 2 is, they were able to actually<\/p>\n<p>205<br \/>\n00:23:54.460 &#8211;&gt; 00:23:57.700<br \/>\nTodd Smith: calculate how much time each day it took for someone<\/p>\n<p>206<br \/>\n00:23:57.800 &#8211;&gt; 00:24:00.290<br \/>\nTodd Smith: when they went into a different desk.<\/p>\n<p>207<br \/>\n00:24:00.470 &#8211;&gt; 00:24:14.119<br \/>\nTodd Smith: you know, because this all, a lot of this came out with with the whole concept around global free office or hot desking, or whatever you wanted to call it, where you weren&#8217;t assigned a physical location every single day. You just go to wherever the workstation was<\/p>\n<p>208<br \/>\n00:24:14.240 &#8211;&gt; 00:24:17.069<br \/>\nTodd Smith: and people were configuring. They were spending<\/p>\n<p>209<br \/>\n00:24:17.850 &#8211;&gt; 00:24:20.960<br \/>\nTodd Smith: 5, 1015\u00a0min a day<\/p>\n<p>210<br \/>\n00:24:22.190 &#8211;&gt; 00:24:26.810<br \/>\nTodd Smith: maneuvering their workspace so that they could. They could now work efficiently.<\/p>\n<p>211<br \/>\n00:24:27.050 &#8211;&gt; 00:24:33.520<br \/>\nTodd Smith: And it was really assigning a You know your your monitors to the right location inside your virtual desktop.<\/p>\n<p>212<br \/>\n00:24:33.540 &#8211;&gt; 00:24:40.430<br \/>\nTodd Smith: The fact that we can now save this configuration. So it follows the user wherever they are, is huge.<\/p>\n<p>213<br \/>\n00:24:40.730 &#8211;&gt; 00:24:47.960<br \/>\nTodd Smith: But not only does it follow. The user actually detects. When the configuration physical configuration is different than what the virtual configuration is.<\/p>\n<p>214<br \/>\n00:24:48.200 &#8211;&gt; 00:24:48.660<br \/>\nBill Sutton: Oh, really.<\/p>\n<p>215<br \/>\n00:24:48.660 &#8211;&gt; 00:24:50.439<br \/>\nTodd Smith: That was a that was a huge step forward.<\/p>\n<p>216<br \/>\n00:24:50.660 &#8211;&gt; 00:24:51.300<br \/>\nBill Sutton : Oui.<\/p>\n<p>217<br \/>\n00:24:51.680 &#8211;&gt; 00:25:18.519<br \/>\nBill Sutton: cause I know. A few years ago, you guys might remember they, Citrix came out with the ability to be able to carve up those larger monitors where you could carve up and put 2 screens on like a 48 inch monitor. Or what have you? But this is different. This is actually help allowing you to save the configuration of your physical monitor setup between. So when you roam, in a sense for hotel, as you mentioned, you get the same monitors in the same or the same content in the same place as you expect it to be<\/p>\n<p>218<br \/>\n00:25:20.570 &#8211;&gt; 00:25:21.580<br \/>\nBill Sutton: very cool.<\/p>\n<p>219<br \/>\n00:25:22.665 &#8211;&gt; 00:25:25.590<br \/>\nBill Sutton: The next topic is the new storefront. Ui.<\/p>\n<p>220<br \/>\n00:25:25.620 &#8211;&gt; 00:25:43.310<br \/>\nBill Sutton: I think this is talking a little bit. They don&#8217;t go into a lot of detail here, but I think this is referring to the A lot to the activity manager and just the general changes that Citrix has made to the Ui to give it a bit more modern look and make it easier to search, and things like that. Any other, any other thoughts or comments on this topic. Guys.<\/p>\n<p>221<br \/>\n00:25:43.310 &#8211;&gt; 00:25:56.620<br \/>\nAndy Whiteside: But amazing timing for me. I literally just logged in for the second time today in my citrix workspace. And as you&#8217;re saying that I noticed a little 3 boxes in the gear thing, or whatever in the upper right hand corner, and I was like, what is that? As you&#8217;re explaining, I was like, oh, that&#8217;s really valuable!<\/p>\n<p>222<br \/>\n00:25:59.900 &#8211;&gt; 00:26:17.890<br \/>\nBill Sutton: Yeah, that I you. I had that in my lab environment. I I didn&#8217;t have it turned on. I had to figure out how to turn it on it. Connect Todd and I turned it on and was like, Wow, this is this is essentially the ability for you, for a user to see what applications or desktops they actually have running on the on the back end systems or in the cloud<\/p>\n<p>223<br \/>\n00:26:18.163 &#8211;&gt; 00:26:30.480<br \/>\nBill Sutton: and be able to switch between them, or reconnect to certain ones that may, they may not realize they left open, etc. It&#8217;s called activity manager. And if it&#8217;s enabled, it&#8217;s in the top right corner of your your workspace app screen.<\/p>\n<p>224<br \/>\n00:26:31.420 &#8211;&gt; 00:26:44.620<br \/>\nGeremy Meyers: Which, by the way, this feels a lot like connection manager, if you remember that. But it was kind of hard to find and get to. You know you had to find the Citrix icon in the task bar, and once you were in, you had to know what you were looking for but love. The idea that this is just baked right in the ui. Here much.<\/p>\n<p>225<br \/>\n00:26:44.620 &#8211;&gt; 00:26:54.630<br \/>\nTodd Smith: And a lot of this. Once again this came out of an rfe that came in from the healthcare organizations that were out there where you may be a. You may be a doctor working at a physician&#8217;s practice organization<\/p>\n<p>226<br \/>\n00:26:54.800 &#8211;&gt; 00:27:03.639<br \/>\nTodd Smith: and have admitting rights at multiple hospitals. Well, if you&#8217;re on a if you&#8217;re on a session, you&#8217;re connecting to multiple environments. At the same time.<\/p>\n<p>227<br \/>\n00:27:03.930 &#8211;&gt; 00:27:07.870<br \/>\nTodd Smith: the user needs to have a little bit more information than what<\/p>\n<p>228<br \/>\n00:27:08.100 &#8211;&gt; 00:27:12.420<br \/>\nTodd Smith: you know to them to see what else is connected, what the you know.<\/p>\n<p>229<br \/>\n00:27:12.600 &#8211;&gt; 00:27:25.130<br \/>\nTodd Smith: what&#8217;s sitting out there, that they&#8217;re not, that they no longer need to be connected to, and it solves a lot of problems around things like privacy, a lot of things around costing and cost management<\/p>\n<p>230<br \/>\n00:27:25.300 &#8211;&gt; 00:27:28.089<br \/>\nTodd Smith: as well as the the underlying.<\/p>\n<p>231<br \/>\n00:27:28.330 &#8211;&gt; 00:27:39.099<br \/>\nTodd Smith: Where else am I connected to like, Jeremy said. You don&#8217;t have to go click on the system tray to figure out. You know what the connections are in there. It&#8217;s right in the storefront itself.<\/p>\n<p>232<br \/>\n00:27:39.300 &#8211;&gt; 00:27:39.990<br \/>\nBill Sutton : C'est vrai.<\/p>\n<p>233<br \/>\n00:27:41.050 &#8211;&gt; 00:27:41.889<br \/>\nTodd Smith: With the ui.<\/p>\n<p>234<br \/>\n00:27:42.970 &#8211;&gt; 00:27:47.993<br \/>\nBill Sutton: All right. The next section is called reduce reducing operational complexity.<\/p>\n<p>235<br \/>\n00:27:49.340 &#8211;&gt; 00:27:57.290<br \/>\nBill Sutton: 1st subset. Here is netscalar 0 touch certificate management. I think this is what it implies to either of you. Have any more detail on that.<\/p>\n<p>236<br \/>\n00:27:58.370 &#8211;&gt; 00:28:05.220<br \/>\nGeremy Meyers: Well, let&#8217;s just take a step back and say if you are not using Netscalar console to manage your fleet of netscalars.<\/p>\n<p>237<br \/>\n00:28:05.220 &#8211;&gt; 00:28:05.900<br \/>\nBill Sutton : Oui.<\/p>\n<p>238<br \/>\n00:28:05.900 &#8211;&gt; 00:28:31.659<br \/>\nGeremy Meyers: You were missing out, so some of us have to do it because we are pooled capacity Netscalar customers. And now we&#8217;re flex capacity, and of course, Netscalar console is how you manage that capacity amongst your fleet of netscalers. But for a lot of us, and there are a tremendous number of customers out there that have fixed capacity net scalers, meaning they can just install a license file on their netscalar and just run that like you don&#8217;t need the Netscalar console<\/p>\n<p>239<br \/>\n00:28:31.660 &#8211;&gt; 00:28:49.379<br \/>\nGeremy Meyers: you&#8217;re missing out. 1st of all, netscaler console is something that you should have managing your netscalers. If anything for certificate manager for certificate management. So you&#8217;ve got one view across your entire fleet. You can see where all the certificates are in terms of expiration which ones are live. I&#8217;ll be honest, there&#8217;s not<\/p>\n<p>240<br \/>\n00:28:49.610 &#8211;&gt; 00:28:59.009<br \/>\nGeremy Meyers: a week or 2 doesn&#8217;t go by where I don&#8217;t hear from a customer where the net scaler went down simply because the cert expired. There wasn&#8217;t that the net scalar went down. It&#8217;s just a vip.<\/p>\n<p>241<br \/>\n00:28:59.840 &#8211;&gt; 00:29:14.609<br \/>\nGeremy Meyers: The cert expired. It&#8217;s just what we do. So this does 2 things. Number one managing your net scalar. So you have. Visibility is one thing, but managing the search themselves. So they auto update the vips. I mean, that&#8217;s a game changer. That is a game changer here. So<\/p>\n<p>242<br \/>\n00:29:15.030 &#8211;&gt; 00:29:22.719<br \/>\nGeremy Meyers: that&#8217;s what this piece is. Is. 0 touch cert management. As long as you&#8217;re updating and getting your certs into<\/p>\n<p>243<br \/>\n00:29:23.020 &#8211;&gt; 00:29:24.290<br \/>\nGeremy Meyers: the cert manager.<\/p>\n<p>244<br \/>\n00:29:24.980 &#8211;&gt; 00:29:27.159<br \/>\nGeremy Meyers: The process is super super, simple.<\/p>\n<p>245<br \/>\n00:29:29.140 &#8211;&gt; 00:29:34.140<br \/>\nTodd Smith: And I think that&#8217;s I think that&#8217;s a great point, Jeremy, because you&#8217;ve got a lot of situations where.<\/p>\n<p>246<br \/>\n00:29:36.070 &#8211;&gt; 00:29:47.380<br \/>\nTodd Smith: you know, the the net scalers maybe started off being managed by one team, and then they another team takes over, or there&#8217;s been a cert that was put on there temporarily that that nobody knew it was gonna expire.<\/p>\n<p>247<br \/>\n00:29:48.830 &#8211;&gt; 00:29:52.969<br \/>\nTodd Smith: You know, having the ability to to graphically see that.<\/p>\n<p>248<br \/>\n00:29:53.560 &#8211;&gt; 00:29:55.580<br \/>\nTodd Smith: And you know.<\/p>\n<p>249<br \/>\n00:29:55.750 &#8211;&gt; 00:30:04.759<br \/>\nTodd Smith: just from a just from a a monthly check in on. You know. What search do I have that are expiring this month? Not all of us have situations where we<\/p>\n<p>250<br \/>\n00:30:04.810 &#8211;&gt; 00:30:09.250<br \/>\nTodd Smith: where we have a cert management program out there<\/p>\n<p>251<br \/>\n00:30:09.675 &#8211;&gt; 00:30:17.254<br \/>\nTodd Smith: to actually do all of this right? So this gives us the ability to have to have a lot more control over our environments.<\/p>\n<p>252<br \/>\n00:30:17.800 &#8211;&gt; 00:30:19.970<br \/>\nTodd Smith: and eliminate those.<\/p>\n<p>253<br \/>\n00:30:20.390 &#8211;&gt; 00:30:22.590<br \/>\nTodd Smith: The incidental downtime.<\/p>\n<p>254<br \/>\n00:30:23.900 &#8211;&gt; 00:30:52.416<br \/>\nBill Sutton: Yeah, we run into this a lot with customers, particularly that are doing a lot of different things on the Netscalar, you know. Maybe they&#8217;re doing more than just gateway. They&#8217;re doing, load balancing or Ssl offload for other work, for other workloads, maybe have multiple certificates and the ability to manage these across different devices, different appliances, whether virtual or physical, from one, console you, upload all your certs and your intermediates, and you link them. And then you just said, Hey, go push these down, and and it actually works. It&#8217;s really a solid<\/p>\n<p>255<br \/>\n00:30:52.780 &#8211;&gt; 00:30:53.950<br \/>\nBill Sutton: new option.<\/p>\n<p>256<br \/>\n00:30:54.500 &#8211;&gt; 00:31:01.630<br \/>\nTodd Smith: And and I think that this is also an area where some of the it auditing best practices that are out there.<\/p>\n<p>257<br \/>\n00:31:01.650 &#8211;&gt; 00:31:12.859<br \/>\nTodd Smith: They&#8217;re looking at. You know who&#8217;s managing the search, how frequently they get updated, who&#8217;s who&#8217;s actually updating those? How many devices have inaccurate or incorrect certs on them.<\/p>\n<p>258<br \/>\n00:31:12.860 &#8211;&gt; 00:31:13.420<br \/>\nBill Sutton : C'est vrai.<\/p>\n<p>259<br \/>\n00:31:13.699 &#8211;&gt; 00:31:16.210<br \/>\nTodd Smith: Those are all quick ways to fail. An audit.<\/p>\n<p>260<br \/>\n00:31:16.370 &#8211;&gt; 00:31:21.720<br \/>\nBill Sutton: Yep, missing intermediates that will affect user experience and so forth.<\/p>\n<p>261<br \/>\n00:31:21.720 &#8211;&gt; 00:31:22.580<br \/>\nTodd Smith: Correct.<\/p>\n<p>262<br \/>\n00:31:23.300 &#8211;&gt; 00:31:31.410<br \/>\nTodd Smith: especially where, if you you know, if you&#8217;re making a connection and your connection sees that there&#8217;s a cert on there, it&#8217;s going to assume that that connection is good.<\/p>\n<p>263<br \/>\n00:31:31.690 &#8211;&gt; 00:31:35.410<br \/>\nTodd Smith: What happens if it&#8217;s an inaccurate cert or a.<\/p>\n<p>264<br \/>\n00:31:35.510 &#8211;&gt; 00:31:39.279<br \/>\nTodd Smith: you know, an unauthorized search that gets dropped on a device?<\/p>\n<p>265<br \/>\n00:31:40.580 &#8211;&gt; 00:31:44.860<br \/>\nTodd Smith: Cert management is becoming much more of a critical, so.<\/p>\n<p>266<br \/>\n00:31:45.200 &#8211;&gt; 00:31:53.329<br \/>\nBill Sutton: Yes, alright. The next one is one that we we&#8217;ve been waiting for Netscalar support for Nutanix.<\/p>\n<p>267<br \/>\n00:31:53.720 &#8211;&gt; 00:31:54.770<br \/>\nBill Sutton: So<\/p>\n<p>268<br \/>\n00:31:54.880 &#8211;&gt; 00:32:09.980<br \/>\nBill Sutton: when it comes to V. Netscalar Vpx. Most of the users, most of listeners probably know that you can install that today. There&#8217;s Vpx appliances for for various hypervisors and Server vmware hyper, v. Kvm, and a lot of<\/p>\n<p>269<br \/>\n00:32:10.040 &#8211;&gt; 00:32:18.579<br \/>\nBill Sutton: lot of customers have taken the position that they needed it on. On Nutanix. They just use the kernel based virtual machine or Kvm. Vpx.<\/p>\n<p>270<br \/>\n00:32:18.630 &#8211;&gt; 00:32:22.530<br \/>\nBill Sutton: But I don&#8217;t believe correct me if I&#8217;m wrong, I don&#8217;t believe that was supported.<\/p>\n<p>271<br \/>\n00:32:23.290 &#8211;&gt; 00:32:44.629<br \/>\nBill Sutton: not officially. Now it&#8217;s official with it&#8217;s in tech preview. But it&#8217;s official with a actual Vpx built for the nutanix ahv hypervisor. So you you would just simply import that into your into your ahv console and deploy it from there similar to what you do in other hypervisors. You guys want to expound on that at all.<\/p>\n<p>272<br \/>\n00:32:45.290 &#8211;&gt; 00:32:51.910<br \/>\nGeremy Meyers: I mean. Listen! I think you nailed it. This has been an ask for a long time. I would just say, make sure you&#8217;ve got Netscaler console running so you can monitor, not required.<\/p>\n<p>273<br \/>\n00:32:52.650 &#8211;&gt; 00:32:53.150<br \/>\nTodd Smith : Oui.<\/p>\n<p>274<br \/>\n00:32:53.150 &#8211;&gt; 00:32:54.720<br \/>\nGeremy Meyers: But just a shameless plug.<\/p>\n<p>275<br \/>\n00:32:55.570 &#8211;&gt; 00:32:57.820<br \/>\nBill Sutton: No, but a valid saint. Shameless blunk<\/p>\n<p>276<br \/>\n00:32:59.072 &#8211;&gt; 00:33:06.589<br \/>\nBill Sutton: the next one. Netscalar releases custom. Snmp, trap framework. I haven&#8217;t dealt with Snmp traps for.<\/p>\n<p>277<br \/>\n00:33:06.660 &#8211;&gt; 00:33:10.249<br \/>\nBill Sutton: Gosh! I don&#8217;t know how many years way back.<\/p>\n<p>278<br \/>\n00:33:10.290 &#8211;&gt; 00:33:15.069<br \/>\nBill Sutton: way way back. But this is still something that&#8217;s used for for monitoring and alerting.<\/p>\n<p>279<br \/>\n00:33:15.519 &#8211;&gt; 00:33:19.950<br \/>\nBill Sutton: And I did. You guys have any any insight into what this?<\/p>\n<p>280<br \/>\n00:33:19.980 &#8211;&gt; 00:33:23.950<br \/>\nBill Sutton: What the benefit of this is other than what&#8217;s written here.<\/p>\n<p>281<br \/>\n00:33:24.290 &#8211;&gt; 00:33:31.879<br \/>\nTodd Smith: Yeah, I I think the big piece here is that almost every single vendor used to have their own management information block that went along with<\/p>\n<p>282<br \/>\n00:33:32.110 &#8211;&gt; 00:33:36.189<br \/>\nTodd Smith: the Snp traffic, right? So it was the ability to add in<\/p>\n<p>283<br \/>\n00:33:37.005 &#8211;&gt; 00:33:42.906<br \/>\nTodd Smith: individual components or additional data fields into your mib<\/p>\n<p>284<br \/>\n00:33:43.520 &#8211;&gt; 00:33:44.120<br \/>\nBill Sutton : Oui.<\/p>\n<p>285<br \/>\n00:33:44.120 &#8211;&gt; 00:33:45.969<br \/>\nTodd Smith: To make it a little bit more customized right?<\/p>\n<p>286<br \/>\n00:33:46.010 &#8211;&gt; 00:33:49.369<br \/>\nTodd Smith: And what this does is it allows you to<\/p>\n<p>287<br \/>\n00:33:49.510 &#8211;&gt; 00:33:55.679<br \/>\nTodd Smith: to add in additional events? You know the example that they use here is Hsn. Related<\/p>\n<p>288<br \/>\n00:33:55.940 &#8211;&gt; 00:34:04.400<br \/>\nTodd Smith: errors so they can be. That can then be trigger something else out of your consumer of the Snmp trap.<\/p>\n<p>289<br \/>\n00:34:04.430 &#8211;&gt; 00:34:08.599<br \/>\nTodd Smith: Right? So a lot of folks are starting to do<\/p>\n<p>290<br \/>\n00:34:09.190 &#8211;&gt; 00:34:14.789<br \/>\nTodd Smith: manage through. Manage through some automation and orchestration tools that are out there.<\/p>\n<p>291<br \/>\n00:34:15.239 &#8211;&gt; 00:34:20.365<br \/>\nTodd Smith: This gives you a little bit more visibility, and and the ability to<\/p>\n<p>292<br \/>\n00:34:21.010 &#8211;&gt; 00:34:24.809<br \/>\nTodd Smith: improve the operation or or streamline that operation.<\/p>\n<p>293<br \/>\n00:34:26.600 &#8211;&gt; 00:34:26.940<br \/>\nBill Sutton: Good.<\/p>\n<p>294<br \/>\n00:34:26.949 &#8211;&gt; 00:34:31.539<br \/>\nGeremy Meyers: I just remember the days where everyone had public turned on as the default community string.<\/p>\n<p>295<br \/>\n00:34:31.540 &#8211;&gt; 00:34:31.900<br \/>\nTodd Smith: Yep.<\/p>\n<p>296<br \/>\n00:34:31.900 &#8211;&gt; 00:34:35.459<br \/>\nGeremy Meyers: You could map a network with no skill whatsoever.<\/p>\n<p>297<br \/>\n00:34:35.630 &#8211;&gt; 00:34:36.260<br \/>\nBill Sutton : C'est vrai.<\/p>\n<p>298<br \/>\n00:34:37.550 &#8211;&gt; 00:34:42.169<br \/>\nTodd Smith: Yeah. And it was amazing the amount of information you could glean just by putting in an Smp. Sniffer.<\/p>\n<p>299<br \/>\n00:34:42.170 &#8211;&gt; 00:34:45.340<br \/>\nGeremy Meyers: So unbelievable public read only so much info yep.<\/p>\n<p>300<br \/>\n00:34:45.340 &#8211;&gt; 00:34:46.909<br \/>\nBill Sutton: Yup, yeah.<\/p>\n<p>301<br \/>\n00:34:47.570 &#8211;&gt; 00:34:59.420<br \/>\nBill Sutton: alright. The next one is general. Zen server updates couple of these here 1st to support for virtual machine anti affinity rules. This is basically where you let&#8217;s say you&#8217;re deploying<\/p>\n<p>302<br \/>\n00:34:59.800 &#8211;&gt; 00:35:02.869<br \/>\nBill Sutton: an on-premise Cbat environment. And you&#8217;ve got it running on<\/p>\n<p>303<br \/>\n00:35:03.030 &#8211;&gt; 00:35:14.499<br \/>\nBill Sutton: on Zen server. You don&#8217;t want both delivery controllers running on one host. You don&#8217;t want both storefront servers running on one host and if there&#8217;s a situation where a host goes down and they have to<\/p>\n<p>304<br \/>\n00:35:14.510 &#8211;&gt; 00:35:21.589<br \/>\nBill Sutton: spin up on another host. You don&#8217;t want to all of a sudden spinning up on the host with another one. Basically, that&#8217;s what it means. Right? Guys.<\/p>\n<p>305<br \/>\n00:35:21.890 &#8211;&gt; 00:35:26.599<br \/>\nGeremy Meyers: Correct. Correct. That would be bad, as they said in ghostbusters. Don&#8217;t cross the streams.<\/p>\n<p>306<br \/>\n00:35:26.600 &#8211;&gt; 00:35:33.600<br \/>\nBill Sutton: We&#8217;ve seen it. Oh, we&#8217;ve seen it even in in vmware environments where it&#8217;s just not turned on. And we&#8217;ll get on a on a<\/p>\n<p>307<br \/>\n00:35:33.920 &#8211;&gt; 00:35:56.669<br \/>\nBill Sutton: on an environment and say, Why are both delivery controllers running on this host? Well, I didn&#8217;t know that they&#8217;re not supposed to. Well, you need to turn anti infinity on for them. So it&#8217;s easy to forget about it. But it&#8217;s critical to making sure you have the best uptime optimal uptime. Another announcement is tech preview of windows. Server 2025 guest support on Zen server. I know this for<\/p>\n<p>308<br \/>\n00:35:56.910 &#8211;&gt; 00:36:08.219<br \/>\nBill Sutton: firsthand. I actually installed 2025 on my Zen server lab a week or so ago, and with other than the Tpm. Stuff, it worked pretty well. So any comments on that other than what stated.<\/p>\n<p>309<br \/>\n00:36:09.897 &#8211;&gt; 00:36:16.449<br \/>\nGeremy Meyers: The only thing I&#8217;ll point out is, we officially support Server 2025 on.<\/p>\n<p>310<br \/>\n00:36:16.890 &#8211;&gt; 00:36:35.840<br \/>\nGeremy Meyers: So you&#8217;ve had 24 7. So just kind of thinking, where? Why would you be running? 2025? A lot of it&#8217;s the vdas right? So I&#8217;m I don&#8217;t recall yet whether or not you know, we&#8217;ve got to the point where some of the the other infrastructure supports it. But if customers testing out vdas, you know. So listen, if you&#8217;re running zen server. This latest revision<\/p>\n<p>311<br \/>\n00:36:36.248 &#8211;&gt; 00:36:41.089<br \/>\nGeremy Meyers: we&#8217;ll have guest support at least tech tech preview guest support. So you can start testing out your<\/p>\n<p>312<br \/>\n00:36:41.680 &#8211;&gt; 00:36:43.280<br \/>\nGeremy Meyers: 2025 eds.<\/p>\n<p>313<br \/>\n00:36:43.520 &#8211;&gt; 00:36:44.460<br \/>\nBill Sutton : Exactement.<\/p>\n<p>314<br \/>\n00:36:45.750 &#8211;&gt; 00:36:53.339<br \/>\nBill Sutton: Alright from the next category here is enhancing hardware and device security. The 1st item is netscalar disk encryption.<\/p>\n<p>315<br \/>\n00:36:53.727 &#8211;&gt; 00:37:07.860<br \/>\nBill Sutton: This is apparently focused on financing government right now, or at least it&#8217;s references, finance and government to make sure that decommissioned devices don&#8217;t have any sensitive data on them and one way to do that is encryption. Any comments on this one.<\/p>\n<p>316<br \/>\n00:37:08.610 &#8211;&gt; 00:37:22.929<br \/>\nTodd Smith: Yeah. So so actually, this is this is something that not only did come out of the financial sector, but it also came out of the public sector as well. In the whole gear to the whole thought process here is, if we write it to those 2 highly secure required<\/p>\n<p>317<br \/>\n00:37:22.960 &#8211;&gt; 00:37:26.019<br \/>\nTodd Smith: requirement based industries.<\/p>\n<p>318<br \/>\n00:37:27.670 &#8211;&gt; 00:37:32.500<br \/>\nTodd Smith: Other industries will follow, and they&#8217;ll be able to do that right. And the 1st thing is obviously<\/p>\n<p>319<br \/>\n00:37:32.590 &#8211;&gt; 00:37:39.199<br \/>\nTodd Smith: encrypting the disks that are inside of the net scalers and be able to say, You know what if it does<\/p>\n<p>320<br \/>\n00:37:39.460 &#8211;&gt; 00:37:43.619<br \/>\nTodd Smith: get destroyed? We don&#8217;t need to go and pull the drives out, or if the drives get<\/p>\n<p>321<br \/>\n00:37:44.000 &#8211;&gt; 00:37:49.720<br \/>\nTodd Smith: compromise some way, you know, there&#8217;s no way you can actually read some of that, some of that content off of there.<\/p>\n<p>322<br \/>\n00:37:49.890 &#8211;&gt; 00:37:59.253<br \/>\nTodd Smith: because we think about it, the amount of information that especially the sensitive, networking information that goes through any of these networking appliances that are out there.<\/p>\n<p>323<br \/>\n00:37:59.940 &#8211;&gt; 00:38:04.350<br \/>\nTodd Smith: They really are the Rosetta stones of a lot of a lot of organizations.<\/p>\n<p>324<br \/>\n00:38:07.070 &#8211;&gt; 00:38:07.680<br \/>\nBill Sutton: Cool<\/p>\n<p>325<br \/>\n00:38:08.735 &#8211;&gt; 00:38:14.590<br \/>\nBill Sutton: the next one is trigger based scans from the device posture service. So the device posture service is<\/p>\n<p>326<br \/>\n00:38:14.730 &#8211;&gt; 00:38:19.109<br \/>\nBill Sutton: running this, keep me honest here, guys, this is the service that runs.<\/p>\n<p>327<br \/>\n00:38:19.640 &#8211;&gt; 00:38:36.730<br \/>\nBill Sutton: and monitors activity from a virtual desktop or virtual connection. Or the connection there, too. And then, apparently now, it has the ability to look at triggers for certain activity and be able to control the level of access. Can any either of you guys expand on that.<\/p>\n<p>328<br \/>\n00:38:37.410 &#8211;&gt; 00:38:43.879<br \/>\nGeremy Meyers: Yeah, I mean, so historically, a lot of device posturing was on connection. Right? So, for instance.<\/p>\n<p>329<br \/>\n00:38:43.880 &#8211;&gt; 00:38:44.300<br \/>\nBill Sutton : C'est vrai.<\/p>\n<p>330<br \/>\n00:38:44.300 &#8211;&gt; 00:38:47.189<br \/>\nGeremy Meyers: I wanna make sure the firewall is on when you connect. But<\/p>\n<p>331<br \/>\n00:38:47.300 &#8211;&gt; 00:39:04.870<br \/>\nGeremy Meyers: fine. I&#8217;ve gotten through the front door. Now what happens if I go to the firewall off, you know. Historically, there wasn&#8217;t too much that would happen in this case. If there&#8217;s a policy, or if there&#8217;s a a status change of the the endpoint. Now we can take something proactive like maybe turn off access. So it&#8217;s a trigger based. Scan. We can re.<\/p>\n<p>332<br \/>\n00:39:05.570 &#8211;&gt; 00:39:13.329<br \/>\nGeremy Meyers: you know. Fire off another scan to make sure that we&#8217;re still meeting the requirements. And then take take an action accordingly. So you know, I think the<\/p>\n<p>333<br \/>\n00:39:13.350 &#8211;&gt; 00:39:21.980<br \/>\nGeremy Meyers: a network change. Let&#8217;s say you went from wired to Wi-fi, or you turned off the firewall, or some agent on the endpoint. You know these are things we&#8217;d we&#8217;d look for<\/p>\n<p>334<br \/>\n00:39:21.990 &#8211;&gt; 00:39:24.250<br \/>\nGeremy Meyers: is a part of part of that device posturing.<\/p>\n<p>335<br \/>\n00:39:24.520 &#8211;&gt; 00:39:26.689<br \/>\nTodd Smith: I think I think the big, the big<\/p>\n<p>336<br \/>\n00:39:27.120 &#8211;&gt; 00:39:34.670<br \/>\nTodd Smith: use case there, Jeremy, is the you know you plug in a USB device while you&#8217;re in the middle of a session. It&#8217;s already been set up<\/p>\n<p>337<br \/>\n00:39:35.240 &#8211;&gt; 00:39:43.679<br \/>\nTodd Smith: right. You&#8217;ve already made that initial connection. EPA. Scan was already done on connection setup. And now all of a sudden you made a change to that.<\/p>\n<p>338<br \/>\n00:39:43.750 &#8211;&gt; 00:39:49.969<br \/>\nTodd Smith: How do we better and improve that continuous scanning? Because that&#8217;s 1 of the things about 0 trust is.<\/p>\n<p>339<br \/>\n00:39:50.040 &#8211;&gt; 00:39:55.930<br \/>\nTodd Smith: you&#8217;ve got to continuously scan and continuously address that that access.<\/p>\n<p>340<br \/>\n00:39:57.910 &#8211;&gt; 00:40:04.830<br \/>\nGeremy Meyers: Yeah, we have a joke. It&#8217;s 0 trust initial access like, that&#8217;s not Zt, and A, that is just scanning a device on the way in the front door. Yep.<\/p>\n<p>341<br \/>\n00:40:04.830 &#8211;&gt; 00:40:05.380<br \/>\nTodd Smith: Yep.<\/p>\n<p>342<br \/>\n00:40:07.430 &#8211;&gt; 00:40:11.849<br \/>\nBill Sutton: Yeah, there&#8217;s an example in the blog article for listeners to go look at that shows<\/p>\n<p>343<br \/>\n00:40:11.870 &#8211;&gt; 00:40:16.690<br \/>\nBill Sutton: as relevant to the USB connectivity. And what you could credit, create a policy.<\/p>\n<p>344<br \/>\n00:40:17.153 &#8211;&gt; 00:40:25.080<br \/>\nBill Sutton: If a USB storage device is connected during this during the session versus like, you guys said, if it&#8217;s if it&#8217;s already there at the beginning of the session.<\/p>\n<p>345<br \/>\n00:40:25.190 &#8211;&gt; 00:40:28.829<br \/>\nBill Sutton: Probably let it in, maybe depending on policy<\/p>\n<p>346<br \/>\n00:40:29.802 &#8211;&gt; 00:40:37.419<br \/>\nBill Sutton: the last section in the in the article is cost savings. 1st item is windows 365 frontline.<\/p>\n<p>347<br \/>\n00:40:38.810 &#8211;&gt; 00:40:43.790<br \/>\nBill Sutton: This was announced during Microsoft ignite where this is supported<\/p>\n<p>348<br \/>\n00:40:44.516 &#8211;&gt; 00:40:46.800<br \/>\nBill Sutton: through the through the the<\/p>\n<p>349<br \/>\n00:40:47.120 &#8211;&gt; 00:41:13.589<br \/>\nBill Sutton: the support for windows 365 that we mentioned earlier on this. Podcast frontline is essentially. I believe this is designed primarily for shift type workers where they they get a license from multiple multiple virtual desktops or multiple cloud Pcs under one license. So there&#8217;s certain parameters in terms of how they can use them. But it&#8217;s a relatively new licensing model, if you will, for windows 365. Any comments on this.<\/p>\n<p>350<br \/>\n00:41:14.130 &#8211;&gt; 00:41:39.650<br \/>\nGeremy Meyers: So I mean, like you said it goes in line with the windows 365 support. But I guess my question for windows. 365 frontline, just because I&#8217;m still trying to wrap my head around this. So I got it. It&#8217;s meant for frontline workers, I&#8217;m thinking, right manufacturing, I&#8217;m thinking, healthcare and it&#8217;s connecting to a cloud. PC, so to speak, or all of these users sharing the same cloud. PC. Is that kind of the idea cause that&#8217;d be a little bit of a different model with the understanding. The cloud Pcs<\/p>\n<p>351<br \/>\n00:41:39.700 &#8211;&gt; 00:41:42.030<br \/>\nGeremy Meyers: traditionally been like sort of a dedicated desktop.<\/p>\n<p>352<br \/>\n00:41:42.110 &#8211;&gt; 00:41:45.250<br \/>\nGeremy Meyers: But what do you guys know about frontline at this point.<\/p>\n<p>353<br \/>\n00:41:45.440 &#8211;&gt; 00:41:48.730<br \/>\nAndy Whiteside: So it&#8217;s it&#8217;s just that individual<\/p>\n<p>354<br \/>\n00:41:49.210 &#8211;&gt; 00:41:54.520<br \/>\nAndy Whiteside: PC, that allows for a rotation of people to log into it.<\/p>\n<p>355<br \/>\n00:41:54.670 &#8211;&gt; 00:41:55.420<br \/>\nGeremy Meyers : D'accord.<\/p>\n<p>356<br \/>\n00:41:56.640 &#8211;&gt; 00:41:57.070<br \/>\nAndy Whiteside: It did so.<\/p>\n<p>357<br \/>\n00:41:57.070 &#8211;&gt; 00:42:01.389<br \/>\nGeremy Meyers: And so the idea is, if I&#8217;ve got a frontline. PC,<\/p>\n<p>358<br \/>\n00:42:01.640 &#8211;&gt; 00:42:09.469<br \/>\nGeremy Meyers: so lack of, I mean, am I saying it to a group of folks. Or is it just a pool cloud? PC, that a certain kind of user frontline user<\/p>\n<p>359<br \/>\n00:42:09.510 &#8211;&gt; 00:42:12.420<br \/>\nGeremy Meyers: would just pluck and use, and off they go.<\/p>\n<p>360<br \/>\n00:42:12.920 &#8211;&gt; 00:42:15.199<br \/>\nGeremy Meyers: I I don&#8217;t know. That&#8217;s fair. Now.<\/p>\n<p>361<br \/>\n00:42:16.710 &#8211;&gt; 00:42:45.390<br \/>\nBill Sutton: Yeah, I believe that&#8217;s the case, Jeremy. I think there&#8217;s a there&#8217;s a license assigned. I don&#8217;t know if it&#8217;s assigned by the device or by the user. But you&#8217;re getting a a it, I guess. What it boils down to is, if you think about a hospital scenario where you&#8217;ve got. Let&#8217;s just make the math simple. You got 3,000 nurses nursing folks that a thousand works work each shift. You don&#8217;t wanna have to buy 3,000 licenses, because if you did, 2 thirds of them wouldn&#8217;t be used during the day. You know, at least during a shift<\/p>\n<p>362<br \/>\n00:42:45.773 &#8211;&gt; 00:43:06.079<br \/>\nBill Sutton: so I think frontline allows you to buy essentially a reduced price license under the expectation that the user is only going to use it. A certain amount of time. Each user is only going to use a certain amount of time from the pool. But I&#8217;m not sure whether the individual users connecting to their own desktop. I think it&#8217;s probably more of a pooled arrangement. But I&#8217;ll dig into it a little bit. And we can, we can talk about it in a future podcast.<\/p>\n<p>363<br \/>\n00:43:06.610 &#8211;&gt; 00:43:13.039<br \/>\nGeremy Meyers: Got it, so I guess the the punchline here is Microsoft is evolving the windows. 3, 65, licensing model, a smidge.<\/p>\n<p>364<br \/>\n00:43:13.080 &#8211;&gt; 00:43:16.559<br \/>\nGeremy Meyers: and Citrix day one is supporting that. So<\/p>\n<p>365<br \/>\n00:43:17.680 &#8211;&gt; 00:43:21.410<br \/>\nGeremy Meyers: if you&#8217;re a customer looking at Frontline, off you go. We&#8217;ve got support for you.<\/p>\n<p>366<br \/>\n00:43:21.410 &#8211;&gt; 00:43:26.199<br \/>\nAndy Whiteside: Here&#8217;s the reality, this windows thing for me. Windows 365. This cloud PC.<\/p>\n<p>367<br \/>\n00:43:26.490 &#8211;&gt; 00:43:43.589<br \/>\nAndy Whiteside: Microsoft knows the most widely used Microsoft application in the world is windows, and they want that running in azure, and they want you to become to the point where you, it becomes a necessity that you have it, and it&#8217;s in azure where it&#8217;s nice and safe and protected, and where they get the consumption that goes along with it at a fixed fee.<\/p>\n<p>368<br \/>\n00:43:43.660 &#8211;&gt; 00:43:55.920<br \/>\nAndy Whiteside: I see this as the big grab for Microsoft to get as many of those windows workloads as possible into azure in a subscription model that once a company subscribes to that, they can&#8217;t get out of it.<\/p>\n<p>369<br \/>\n00:43:59.100 &#8211;&gt; 00:43:59.950<br \/>\nGeremy Meyers: Sticky.<\/p>\n<p>370<br \/>\n00:43:59.950 &#8211;&gt; 00:44:00.930<br \/>\nBill Sutton : Exactement.<\/p>\n<p>371<br \/>\n00:44:01.890 &#8211;&gt; 00:44:05.350<br \/>\nBill Sutton: Very sticky. Yes, no.<\/p>\n<p>372<br \/>\n00:44:05.670 &#8211;&gt; 00:44:06.190<br \/>\nBill Sutton: Go ahead.<\/p>\n<p>373<br \/>\n00:44:06.190 &#8211;&gt; 00:44:16.659<br \/>\nAndy Whiteside: Is that the most cost effective and the most secure and the most technology advanced way to do it? No. Is it the way a lot of people go just because it&#8217;s easy, and it&#8217;s just like buying a PC. Except it&#8217;s in the cloud. I think so.<\/p>\n<p>374<br \/>\n00:44:16.930 &#8211;&gt; 00:44:17.819<br \/>\nGeremy Meyers: I think you&#8217;re right.<\/p>\n<p>375<br \/>\n00:44:19.610 &#8211;&gt; 00:44:24.369<br \/>\nAndy Whiteside: Now, Citrix&#8217;s job is to make it more usable and better and relevant.<\/p>\n<p>376<br \/>\n00:44:24.380 &#8211;&gt; 00:44:29.039<br \/>\nAndy Whiteside: And that&#8217;s what you guys are doing with this day. One support of all the different things they&#8217;re coming out with over there.<\/p>\n<p>377<br \/>\n00:44:31.860 &#8211;&gt; 00:44:32.420<br \/>\nBill Sutton : Oui.<\/p>\n<p>378<br \/>\n00:44:32.950 &#8211;&gt; 00:44:50.970<br \/>\nBill Sutton: Last item here is the cost savings report. This is in Tech Preview. They talked about this at length, at the connect event, about the the capability of being able to visualize and organize savings and track trends and things of that nature. It&#8217;s a it&#8217;s in. It&#8217;s gonna be in the cloud console<\/p>\n<p>379<br \/>\n00:44:51.278 &#8211;&gt; 00:45:07.319<br \/>\nBill Sutton: and it&#8217;ll provide a lot of information about what&#8217;s being saved, what what the customers saving by leveraging auto scale and other features of of Citrix Cloud. Guys want to comment on this. This is a pretty big one that that they seem to really emphasize at some of the events.<\/p>\n<p>380<br \/>\n00:45:08.350 &#8211;&gt; 00:45:17.379<br \/>\nGeremy Meyers: This is great. Listen! I can&#8217;t tell you how many times the customers come to me and said, we&#8217;re trying to reduce our azure, spend. Got it? And then<\/p>\n<p>381<br \/>\n00:45:17.450 &#8211;&gt; 00:45:20.289<br \/>\nGeremy Meyers: you roll out Citrix like, how can I quantify<\/p>\n<p>382<br \/>\n00:45:20.530 &#8211;&gt; 00:45:23.840<br \/>\nGeremy Meyers: how much azure spend you&#8217;re saving? So<\/p>\n<p>383<br \/>\n00:45:24.050 &#8211;&gt; 00:45:28.719<br \/>\nGeremy Meyers: I do have some tools that I&#8217;ll leverage with customers where we we kind of predict what that looks like.<\/p>\n<p>384<br \/>\n00:45:29.224 &#8211;&gt; 00:45:39.549<br \/>\nGeremy Meyers: It&#8217;s a best guess, you know. I don&#8217;t know how much you&#8217;re using. I don&#8217;t know how you&#8217;re using it, you know, on some level, I&#8217;m trying to gather as much data as I can. But this is actual actual stats, right? So this is pulling.<\/p>\n<p>385<br \/>\n00:45:39.750 &#8211;&gt; 00:45:44.590<br \/>\nGeremy Meyers: you know, from what you&#8217;re using and helping you at the end of the day. Take this to your leadership<\/p>\n<p>386<br \/>\n00:45:44.960 &#8211;&gt; 00:45:55.949<br \/>\nGeremy Meyers: and be able to show exactly how much cost savings and in what capacity you&#8217;re saving. Right? So as a computer storage there&#8217;s different areas. I think a lot of customers don&#8217;t quite understand<\/p>\n<p>387<br \/>\n00:45:56.080 &#8211;&gt; 00:46:04.929<br \/>\nGeremy Meyers: what constitutes that cloud cost, especially when you&#8217;re you&#8217;re looking at like an Avd solution. So this helps capture what that looks like and how much of it in what areas.<\/p>\n<p>388<br \/>\n00:46:05.050 &#8211;&gt; 00:46:13.380<br \/>\nGeremy Meyers: and puts it in sort of a format that&#8217;s easy to communicate back up to leadership, which, being very selfish, is good for me as a citrix person, because this is what I&#8217;m trying to socialize.<\/p>\n<p>389<br \/>\n00:46:13.600 &#8211;&gt; 00:46:21.719<br \/>\nGeremy Meyers: And now it&#8217;s right there in the product. So this is Tech Preview. It&#8217;s something we&#8217;ve talked about. Auto scale has been a part of the data solution for some time now. So just being able to.<\/p>\n<p>390<br \/>\n00:46:21.770 &#8211;&gt; 00:46:23.690<br \/>\nGeremy Meyers: you know, maximally use<\/p>\n<p>391<br \/>\n00:46:23.700 &#8211;&gt; 00:46:30.295<br \/>\nGeremy Meyers: your your azure resource for end user compute but now we can show you what it looks like. You know how much you&#8217;re actually saving.<\/p>\n<p>392<br \/>\n00:46:33.900 &#8211;&gt; 00:46:38.089<br \/>\nBill Sutton: Yep, absolutely any other thoughts on cost savings, reporting.<\/p>\n<p>393<br \/>\n00:46:39.000 &#8211;&gt; 00:47:04.189<br \/>\nAndy Whiteside: I think that&#8217;s where, Bill, if we can get engaged with a client, use tools like this, there&#8217;s there&#8217;s value in us being engaged just just with this, I mean, should every customer be considering what a move to cloud based, whether that&#8217;s windows 3, 65, or Avd. Should they all be considering this. Yes. Is it the right answer for most of them? Probably not. But we need to use our, you know, benefits of helping them with the tech and the cost<\/p>\n<p>394<br \/>\n00:47:04.290 &#8211;&gt; 00:47:15.739<br \/>\nAndy Whiteside: to understand why. And then I don&#8217;t know that I guess we&#8217;re at the end here. I don&#8217;t know if azure local came up in part of this at all. But Todd, Jeremy, you guys know anything about azure local and where that&#8217;s going to fit into the Citrix world.<\/p>\n<p>395<br \/>\n00:47:17.260 &#8211;&gt; 00:47:20.952<br \/>\nGeremy Meyers: Listen, that&#8217;s a that&#8217;s a great question. Will it be supported? Yes,<\/p>\n<p>396<br \/>\n00:47:21.460 &#8211;&gt; 00:47:25.300<br \/>\nGeremy Meyers: In fact, we did. We go ga with azure stack.<\/p>\n<p>397<br \/>\n00:47:25.560 &#8211;&gt; 00:47:28.480<br \/>\nTodd Smith: We haven&#8217;t we? It&#8217;s still in tech Preview right now. But it&#8217;s okay.<\/p>\n<p>398<br \/>\n00:47:28.480 &#8211;&gt; 00:47:31.640<br \/>\nTodd Smith: I mean, azure stack is basically the old name for azure local.<\/p>\n<p>399<br \/>\n00:47:31.640 &#8211;&gt; 00:47:32.100<br \/>\nBill Sutton : C'est vrai.<\/p>\n<p>400<br \/>\n00:47:33.380 &#8211;&gt; 00:47:34.200<br \/>\nTodd Smith: And<\/p>\n<p>401<br \/>\n00:47:34.670 &#8211;&gt; 00:47:39.719<br \/>\nTodd Smith: you know I&#8217;ve got a couple of customers that are looking into azure local azure stack as a<\/p>\n<p>402<br \/>\n00:47:40.170 &#8211;&gt; 00:47:41.617<br \/>\nTodd Smith: as a solution.<\/p>\n<p>403<br \/>\n00:47:42.460 &#8211;&gt; 00:47:48.420<br \/>\nTodd Smith: The both of the both of these customers has come back with some concerns around<\/p>\n<p>404<br \/>\n00:47:48.430 &#8211;&gt; 00:47:56.400<br \/>\nTodd Smith: the hardware or the specific hardware that&#8217;s required to run azure stack and<\/p>\n<p>405<br \/>\n00:47:57.220 &#8211;&gt; 00:48:03.499<br \/>\nTodd Smith: but but from a from Citrix being able to support running the workloads on azure stack absolutely, we can do that.<\/p>\n<p>406<br \/>\n00:48:07.030 &#8211;&gt; 00:48:15.529<br \/>\nAndy Whiteside: Nope, I mean, that&#8217;s that to me, is the answer to the cost saving challenge potentially that and multi-session.<\/p>\n<p>407<br \/>\n00:48:16.350 &#8211;&gt; 00:48:17.020<br \/>\nBill Sutton : C'est vrai.<\/p>\n<p>408<br \/>\n00:48:17.350 &#8211;&gt; 00:48:32.279<br \/>\nAndy Whiteside: And even with all that put together, it still may not. It still may be cost prohibited to run in public cloud these desktop workloads. But that&#8217;s where we can help you find that sweet spot for not the entire organization, but for individual groups within the organization cause. It&#8217;s gonna make sense sometimes, and sometimes it won&#8217;t.<\/p>\n<p>409<br \/>\n00:48:34.300 &#8211;&gt; 00:48:39.090<br \/>\nAndy Whiteside: And and when it doesn&#8217;t we can help you build your own. Or we can host you in our data center. Lots of options.<\/p>\n<p>410<br \/>\n00:48:40.690 &#8211;&gt; 00:49:10.319<br \/>\nBill Sutton: So we&#8217;re at the bottom or at the end of the article, and almost out of time. So we managed to get it all in under an hour, guys, which is great. But the last section here the 1st sentence, we&#8217;re con. It says we&#8217;re constantly rolling out new features to help you solve your most pressing. It challenges and address new use cases across your it environment. We talked about this a little bit at the beginning. The fact that Citrix really is iterating and adding changes based on customer feedback and doing it at a a pretty pretty steady clip. So<\/p>\n<p>411<br \/>\n00:49:10.320 &#8211;&gt; 00:49:23.669<br \/>\nBill Sutton: definitely I&#8217;m I&#8217;m I&#8217;m enjoying seeing that and seeing all the new features and functionality that comes out on each new release. So kudos to them for for moving things, continuing to move things forward. Any final thoughts from you guys before we adjourn today.<\/p>\n<p>412<br \/>\n00:49:24.950 &#8211;&gt; 00:49:33.410<br \/>\nGeremy Meyers: So it&#8217;s good to see. I think a lot of customers, and this is the message that we have shared for many years is these features come to cloud.<\/p>\n<p>413<br \/>\n00:49:33.430 &#8211;&gt; 00:49:50.350<br \/>\nGeremy Meyers: and there&#8217;s a perception that a lot of the on Prem product, the Cbat product is being neglected couldn&#8217;t be further from the truth. Right? So there&#8217;s a significant investment in the on Prem product. Do. I think there is some value in the das service? Absolutely. But I also understand<\/p>\n<p>414<br \/>\n00:49:50.440 &#8211;&gt; 00:49:51.780<br \/>\nGeremy Meyers: lot of customers.<\/p>\n<p>415<br \/>\n00:49:52.680 &#8211;&gt; 00:50:04.360<br \/>\nGeremy Meyers: Listen, see, that is a solid platform. There are definitely use cases for it and for a lot of customers. It&#8217;s just not ready for that move, and we&#8217;re here to support you. The licensing tells you that, and I&#8217;ll tell you the development tells you the same thing.<\/p>\n<p>416<br \/>\n00:50:05.820 &#8211;&gt; 00:50:24.430<br \/>\nAndy Whiteside: I would agree with that. And going back to my previous comment a while ago, around this being a business that Cvad is the anchor the anchor product within the platform, that as long as it stays viable and valuable citrus continues to add on to that the capabilities of it, and the pieces that go in with it. Then it&#8217;s going to be citrus can be relevant for a long time.<\/p>\n<p>417<br \/>\n00:50:26.810 &#8211;&gt; 00:50:30.689<br \/>\nBill Sutton: Yes, sir, any final thoughts before we adjourn for the day, gentlemen.<\/p>\n<p>418<br \/>\n00:50:33.280 &#8211;&gt; 00:50:35.149<br \/>\nGeremy Meyers: I&#8217;m good. Thanks, Bill, I&#8217;m good. I&#8217;m good. Thanks, Bill.<\/p>\n<p>419<br \/>\n00:50:35.530 &#8211;&gt; 00:50:36.460<br \/>\nBill Sutton: Thank you. Guys.<\/p>\n<p>420<br \/>\n00:50:36.460 &#8211;&gt; 00:50:37.500<br \/>\nTodd Smith: Good seeing you guys.<\/p>\n<p>421<br \/>\n00:50:37.500 &#8211;&gt; 00:50:38.190<br \/>\nBill Sutton: See you next week.<\/p>\n<p>422<br \/>\n00:50:38.190 &#8211;&gt; 00:50:39.100<br \/>\nGeremy Meyers: Alright. See? You guys.<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>In this episode of The Citrix Session, host Bill Sutton and guests dive deep into the latest advancements in hardware and device security, with a special focus on Netscaler disk &hellip;<\/p>","protected":false},"author":7,"featured_media":65995,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_price":"","_stock":"","_tribe_ticket_header":"","_tribe_default_ticket_provider":"","_tribe_ticket_capacity":"0","_ticket_start_date":"","_ticket_end_date":"","_tribe_ticket_show_description":"","_tribe_ticket_show_not_going":false,"_tribe_ticket_use_global_stock":"","_tribe_ticket_global_stock_level":"","_global_stock_mode":"","_global_stock_cap":"","_tribe_rsvp_for_event":"","_tribe_ticket_going_count":"","_tribe_ticket_not_going_count":"","_tribe_tickets_list":"[]","_tribe_ticket_has_attendee_info_fields":false,"footnotes":""},"categories":[5],"tags":[],"class_list":["post-660308","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-podcast"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>171: Encryption Innovations in Finance and Government Sectors - XenTegra<\/title>\n<meta name=\"description\" content=\"In this episode of The Citrix Session, host Bill Sutton and guests dive deep into the latest advancements in hardware and device security\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/xentegra.com\/fr\/resources\/171-encryption-innovations-in-finance-and-government-sectors\/\" \/>\n<meta property=\"og:locale\" content=\"fr_CA\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"171: Encryption Innovations in Finance and Government Sectors - XenTegra\" \/>\n<meta property=\"og:description\" content=\"In this episode of The Citrix Session, host Bill Sutton and guests dive deep into the latest advancements in hardware and device security\" \/>\n<meta property=\"og:url\" content=\"https:\/\/xentegra.com\/fr\/resources\/171-encryption-innovations-in-finance-and-government-sectors\/\" \/>\n<meta property=\"og:site_name\" content=\"XenTegra\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/XenTegra\/\" \/>\n<meta property=\"article:published_time\" content=\"2024-12-10T01:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-04-16T15:00:27+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/eadn-wc05-13529174.nxedge.io\/wp-content\/uploads\/2024\/03\/Citrix-Session.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1100\" \/>\n\t<meta property=\"og:image:height\" content=\"600\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Chase Newmyer\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@xentegra\" \/>\n<meta name=\"twitter:site\" content=\"@xentegra\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"Chase Newmyer\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimation du temps de lecture\" \/>\n\t<meta name=\"twitter:data2\" content=\"51 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/xentegra.com\\\/resources\\\/171-encryption-innovations-in-finance-and-government-sectors\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/xentegra.com\\\/resources\\\/171-encryption-innovations-in-finance-and-government-sectors\\\/\"},\"author\":{\"name\":\"Chase Newmyer\",\"@id\":\"https:\\\/\\\/xentegra.com\\\/#\\\/schema\\\/person\\\/84736408f096bfd92b80305aea8846a7\"},\"headline\":\"171: Encryption Innovations in Finance and Government Sectors\",\"datePublished\":\"2024-12-10T01:00:00+00:00\",\"dateModified\":\"2025-04-16T15:00:27+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/xentegra.com\\\/resources\\\/171-encryption-innovations-in-finance-and-government-sectors\\\/\"},\"wordCount\":11274,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/xentegra.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/xentegra.com\\\/resources\\\/171-encryption-innovations-in-finance-and-government-sectors\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/xentegra.com\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/Citrix-Session.png\",\"articleSection\":[\"Podcast\"],\"inLanguage\":\"fr-CA\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/xentegra.com\\\/resources\\\/171-encryption-innovations-in-finance-and-government-sectors\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/xentegra.com\\\/resources\\\/171-encryption-innovations-in-finance-and-government-sectors\\\/\",\"url\":\"https:\\\/\\\/xentegra.com\\\/resources\\\/171-encryption-innovations-in-finance-and-government-sectors\\\/\",\"name\":\"171: Encryption Innovations in Finance and Government Sectors - XenTegra\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/xentegra.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/xentegra.com\\\/resources\\\/171-encryption-innovations-in-finance-and-government-sectors\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/xentegra.com\\\/resources\\\/171-encryption-innovations-in-finance-and-government-sectors\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/xentegra.com\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/Citrix-Session.png\",\"datePublished\":\"2024-12-10T01:00:00+00:00\",\"dateModified\":\"2025-04-16T15:00:27+00:00\",\"description\":\"In this episode of The Citrix Session, host Bill Sutton and guests dive deep into the latest advancements in hardware and device security\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/xentegra.com\\\/resources\\\/171-encryption-innovations-in-finance-and-government-sectors\\\/#breadcrumb\"},\"inLanguage\":\"fr-CA\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/xentegra.com\\\/resources\\\/171-encryption-innovations-in-finance-and-government-sectors\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-CA\",\"@id\":\"https:\\\/\\\/xentegra.com\\\/resources\\\/171-encryption-innovations-in-finance-and-government-sectors\\\/#primaryimage\",\"url\":\"https:\\\/\\\/xentegra.com\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/Citrix-Session.png\",\"contentUrl\":\"https:\\\/\\\/xentegra.com\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/Citrix-Session.png\",\"width\":1100,\"height\":600},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/xentegra.com\\\/resources\\\/171-encryption-innovations-in-finance-and-government-sectors\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/xentegra.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"171: Encryption Innovations in Finance and Government Sectors\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/xentegra.com\\\/#website\",\"url\":\"https:\\\/\\\/xentegra.com\\\/\",\"name\":\"XenTegra\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/xentegra.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/xentegra.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-CA\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/xentegra.com\\\/#organization\",\"name\":\"XenTegra\",\"url\":\"https:\\\/\\\/xentegra.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-CA\",\"@id\":\"https:\\\/\\\/xentegra.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/xentegra.com\\\/wp-content\\\/uploads\\\/2023\\\/06\\\/1519903807641-min.jpg\",\"contentUrl\":\"https:\\\/\\\/xentegra.com\\\/wp-content\\\/uploads\\\/2023\\\/06\\\/1519903807641-min.jpg\",\"width\":200,\"height\":200,\"caption\":\"XenTegra\"},\"image\":{\"@id\":\"https:\\\/\\\/xentegra.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/XenTegra\\\/\",\"https:\\\/\\\/x.com\\\/xentegra\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/xentegra-llc\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/xentegra.com\\\/#\\\/schema\\\/person\\\/84736408f096bfd92b80305aea8846a7\",\"name\":\"Chase Newmyer\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-CA\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d46cd44f0bd433dc5a386cbac549c62fd92266e3951669c705b347be2130cca3?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d46cd44f0bd433dc5a386cbac549c62fd92266e3951669c705b347be2130cca3?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d46cd44f0bd433dc5a386cbac549c62fd92266e3951669c705b347be2130cca3?s=96&d=mm&r=g\",\"caption\":\"Chase Newmyer\"},\"url\":\"https:\\\/\\\/xentegra.com\\\/fr\\\/resources\\\/author\\\/chasenewmyer\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"171: Encryption Innovations in Finance and Government Sectors - XenTegra","description":"In this episode of The Citrix Session, host Bill Sutton and guests dive deep into the latest advancements in hardware and device security","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/xentegra.com\/fr\/resources\/171-encryption-innovations-in-finance-and-government-sectors\/","og_locale":"fr_CA","og_type":"article","og_title":"171: Encryption Innovations in Finance and Government Sectors - XenTegra","og_description":"In this episode of The Citrix Session, host Bill Sutton and guests dive deep into the latest advancements in hardware and device security","og_url":"https:\/\/xentegra.com\/fr\/resources\/171-encryption-innovations-in-finance-and-government-sectors\/","og_site_name":"XenTegra","article_publisher":"https:\/\/www.facebook.com\/XenTegra\/","article_published_time":"2024-12-10T01:00:00+00:00","article_modified_time":"2025-04-16T15:00:27+00:00","og_image":[{"width":1100,"height":600,"url":"https:\/\/eadn-wc05-13529174.nxedge.io\/wp-content\/uploads\/2024\/03\/Citrix-Session.png","type":"image\/png"}],"author":"Chase Newmyer","twitter_card":"summary_large_image","twitter_creator":"@xentegra","twitter_site":"@xentegra","twitter_misc":{"\u00c9crit par":"Chase Newmyer","Estimation du temps de lecture":"51 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/xentegra.com\/resources\/171-encryption-innovations-in-finance-and-government-sectors\/#article","isPartOf":{"@id":"https:\/\/xentegra.com\/resources\/171-encryption-innovations-in-finance-and-government-sectors\/"},"author":{"name":"Chase Newmyer","@id":"https:\/\/xentegra.com\/#\/schema\/person\/84736408f096bfd92b80305aea8846a7"},"headline":"171: Encryption Innovations in Finance and Government Sectors","datePublished":"2024-12-10T01:00:00+00:00","dateModified":"2025-04-16T15:00:27+00:00","mainEntityOfPage":{"@id":"https:\/\/xentegra.com\/resources\/171-encryption-innovations-in-finance-and-government-sectors\/"},"wordCount":11274,"commentCount":0,"publisher":{"@id":"https:\/\/xentegra.com\/#organization"},"image":{"@id":"https:\/\/xentegra.com\/resources\/171-encryption-innovations-in-finance-and-government-sectors\/#primaryimage"},"thumbnailUrl":"https:\/\/eadn-wc05-13529174.nxedge.io\/wp-content\/uploads\/2024\/03\/Citrix-Session.png","articleSection":["Podcast"],"inLanguage":"fr-CA","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/xentegra.com\/resources\/171-encryption-innovations-in-finance-and-government-sectors\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/xentegra.com\/resources\/171-encryption-innovations-in-finance-and-government-sectors\/","url":"https:\/\/xentegra.com\/resources\/171-encryption-innovations-in-finance-and-government-sectors\/","name":"171: Encryption Innovations in Finance and Government Sectors - XenTegra","isPartOf":{"@id":"https:\/\/xentegra.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/xentegra.com\/resources\/171-encryption-innovations-in-finance-and-government-sectors\/#primaryimage"},"image":{"@id":"https:\/\/xentegra.com\/resources\/171-encryption-innovations-in-finance-and-government-sectors\/#primaryimage"},"thumbnailUrl":"https:\/\/eadn-wc05-13529174.nxedge.io\/wp-content\/uploads\/2024\/03\/Citrix-Session.png","datePublished":"2024-12-10T01:00:00+00:00","dateModified":"2025-04-16T15:00:27+00:00","description":"In this episode of The Citrix Session, host Bill Sutton and guests dive deep into the latest advancements in hardware and device security","breadcrumb":{"@id":"https:\/\/xentegra.com\/resources\/171-encryption-innovations-in-finance-and-government-sectors\/#breadcrumb"},"inLanguage":"fr-CA","potentialAction":[{"@type":"ReadAction","target":["https:\/\/xentegra.com\/resources\/171-encryption-innovations-in-finance-and-government-sectors\/"]}]},{"@type":"ImageObject","inLanguage":"fr-CA","@id":"https:\/\/xentegra.com\/resources\/171-encryption-innovations-in-finance-and-government-sectors\/#primaryimage","url":"https:\/\/eadn-wc05-13529174.nxedge.io\/wp-content\/uploads\/2024\/03\/Citrix-Session.png","contentUrl":"https:\/\/eadn-wc05-13529174.nxedge.io\/wp-content\/uploads\/2024\/03\/Citrix-Session.png","width":1100,"height":600},{"@type":"BreadcrumbList","@id":"https:\/\/xentegra.com\/resources\/171-encryption-innovations-in-finance-and-government-sectors\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/xentegra.com\/"},{"@type":"ListItem","position":2,"name":"171: Encryption Innovations in Finance and Government Sectors"}]},{"@type":"WebSite","@id":"https:\/\/xentegra.com\/#website","url":"https:\/\/xentegra.com\/","name":"XenTegra","description":"","publisher":{"@id":"https:\/\/xentegra.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/xentegra.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-CA"},{"@type":"Organization","@id":"https:\/\/xentegra.com\/#organization","name":"XenTegra","url":"https:\/\/xentegra.com\/","logo":{"@type":"ImageObject","inLanguage":"fr-CA","@id":"https:\/\/xentegra.com\/#\/schema\/logo\/image\/","url":"https:\/\/eadn-wc05-13529174.nxedge.io\/wp-content\/uploads\/2023\/06\/1519903807641-min.jpg","contentUrl":"https:\/\/eadn-wc05-13529174.nxedge.io\/wp-content\/uploads\/2023\/06\/1519903807641-min.jpg","width":200,"height":200,"caption":"XenTegra"},"image":{"@id":"https:\/\/xentegra.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/XenTegra\/","https:\/\/x.com\/xentegra","https:\/\/www.linkedin.com\/company\/xentegra-llc"]},{"@type":"Person","@id":"https:\/\/xentegra.com\/#\/schema\/person\/84736408f096bfd92b80305aea8846a7","name":"Chase Newmyer","image":{"@type":"ImageObject","inLanguage":"fr-CA","@id":"https:\/\/secure.gravatar.com\/avatar\/d46cd44f0bd433dc5a386cbac549c62fd92266e3951669c705b347be2130cca3?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d46cd44f0bd433dc5a386cbac549c62fd92266e3951669c705b347be2130cca3?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d46cd44f0bd433dc5a386cbac549c62fd92266e3951669c705b347be2130cca3?s=96&d=mm&r=g","caption":"Chase Newmyer"},"url":"https:\/\/xentegra.com\/fr\/resources\/author\/chasenewmyer\/"}]}},"_links":{"self":[{"href":"https:\/\/xentegra.com\/fr\/wp-json\/wp\/v2\/posts\/660308","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/xentegra.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/xentegra.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/xentegra.com\/fr\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/xentegra.com\/fr\/wp-json\/wp\/v2\/comments?post=660308"}],"version-history":[{"count":150,"href":"https:\/\/xentegra.com\/fr\/wp-json\/wp\/v2\/posts\/660308\/revisions"}],"predecessor-version":[{"id":717669,"href":"https:\/\/xentegra.com\/fr\/wp-json\/wp\/v2\/posts\/660308\/revisions\/717669"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/xentegra.com\/fr\/wp-json\/wp\/v2\/media\/65995"}],"wp:attachment":[{"href":"https:\/\/xentegra.com\/fr\/wp-json\/wp\/v2\/media?parent=660308"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/xentegra.com\/fr\/wp-json\/wp\/v2\/categories?post=660308"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/xentegra.com\/fr\/wp-json\/wp\/v2\/tags?post=660308"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}