{"id":66001,"date":"2023-12-19T18:00:00","date_gmt":"2023-12-19T23:00:00","guid":{"rendered":"http:\/\/74d2948405.nxcli.io\/resources\/152-the-citrix-session-unveiling-the-power-of-citrix-enterprise-browsers-integration-with-citrix-analytics-service-for-security\/"},"modified":"2026-01-29T15:15:11","modified_gmt":"2026-01-29T20:15:11","slug":"152-the-citrix-session-unveiling-the-power-of-citrix-enterprise-browsers-integration-with-citrix-analytics-service-for-security","status":"publish","type":"post","link":"https:\/\/xentegra.com\/hi\/resources\/152-the-citrix-session-unveiling-the-power-of-citrix-enterprise-browsers-integration-with-citrix-analytics-service-for-security\/","title":{"rendered":"152: The Citrix Session: Unveiling the power of Citrix Enterprise Browser\u2019s integration with Citrix Analytics Service for Security"},"content":{"rendered":"<p><iframe loading=\"lazy\" src=\"https:\/\/www.buzzsprout.com\/670066\/episodes\/14174938-the-citrix-session-unveiling-the-power-of-citrix-enterprise-browser-s-integration-with-citrix-analytics-service-for-security?iframe=true\" scrolling=\"no\" width=\"100%\" height=\"200\" frameborder=\"0\" style=\"width: 100%;height: 200px\"><\/iframe><\/p>\n<p>In the dynamic landscape of enterprise browsing solutions, ensuring not just security but also comprehensive admin visibility is paramount. At Citrix, we take pride in our <a href=\"https:\/\/www.citrix.com\/blogs\/2021\/10\/13\/introducing-the-all-new-citrix-enterprise-browser\/\">Citrix Enterprise Browser<\/a> \u2014 a robust solution that goes beyond \u201cjust\u201d enabling secure access to your web\/SaaS applications to also providing unparalleled insights for administrators. In this blog, we\u2019ll dive into the seamless integration between the Enterprise Browser and Citrix Analytics Service (CAS) for Security, showcasing how it elevates the admin\u2019s ability to monitor, manage, and respond to potential risks effectively.<\/p>\n<p>\u0939\u094b\u0938\u094d\u091f: \u090f\u0902\u0921\u0940 \u0935\u094d\u0939\u093e\u0907\u091f\u0938\u093e\u0907\u0921<br \/>\u0938\u0939-\u092e\u0947\u091c\u092c\u093e\u0928: \u092c\u093f\u0932 \u0938\u091f\u0928<br \/>\u0938\u0939-\u092e\u0947\u091c\u092c\u093e\u0928: \u091f\u0949\u0921 \u0938\u094d\u092e\u093f\u0925<br \/>\u0938\u0939-\u092e\u0947\u091c\u092c\u093e\u0928: \u0917\u0947\u0930\u0947\u092e\u0940 \u092e\u0947\u092f\u0930\u094d\u0938<\/p>\n<div class=\"transcript\">\n<p><!--block-->\u0935\u0947\u092c\u0935\u0940\u091f\u0940\u091f\u0940<\/p>\n<p>1<br \/>00:00:02.440 &#8211;&gt; 00:00:21.049<br \/>Andy Whiteside: Alright welcome to episode 1 52 of the Citrix session of your host. Andy. Wise side today is December eighteenth, 2023. Got my my team, my crew with me. Guys starting with Bill sudden. Director of services here at Zintigra Bill, can you believe 2024 is over.<\/p>\n<p>2<br \/>00:00:21.440 &#8211;&gt; 00:00:27.620<br \/>Andy Whiteside: No, I can&#8217;t. You got your Christmas shopping done? Maybe I should start there. Yeah, most of it, except for the stockings.<\/p>\n<p>3<br \/>00:00:28.410 &#8211;&gt; 00:00:32.390<br \/>Andy Whiteside: Now your wife, your team. Has that done, or you haven&#8217;t done?<\/p>\n<p>4<br \/>00:00:32.780 &#8211;&gt; 00:00:49.879<br \/>Bill Sutton: I have it done well. The the Christmas shopping for my wife was really it was gifts for the family. We all got new iphones. So course. The funny thing is, it was a very inexpensive gif gift, because of all the promotions I picked last per month now than I did before. Believe it or not. So<\/p>\n<p>5<br \/>00:00:50.650 &#8211;&gt; 00:00:57.090<br \/>Andy Whiteside: getting other stuff, you know other stuff, and it&#8217;s all done. I&#8217;m just waiting for Amazon to show up with all the packages.<\/p>\n<p>6<br \/>00:00:57.570 &#8211;&gt; 00:01:12.580<br \/>Andy Whiteside: Well, that definitely makes Christmas easier. I don&#8217;t know if it&#8217;s less fun, more fun. I don&#8217;t know if you get what people want. Maybe. Right? Yeah. My daughter just texted me literally 5&nbsp;min ago and said, Do you want to go out and get stocking stuffers for Mom? And I&#8217;m all over that. Let her<\/p>\n<p>7<br \/>00:01:12.630 &#8211;&gt; 00:01:15.299<br \/>Andy Whiteside: let her help me pick stuff out, you know. So<\/p>\n<p>8<br \/>00:01:15.490 &#8211;&gt; 00:01:18.989<br \/>Andy Whiteside: you do have to deal with the crowd, though. Keep that in mind. Yes, for sure.<\/p>\n<p>9<br \/>00:01:19.020 &#8211;&gt; 00:01:22.070<br \/>Andy Whiteside: Jeremy Myers, how about yourself? You ready for the holiday?<\/p>\n<p>10<br \/>00:01:22.330 &#8211;&gt; 00:01:28.399<br \/>Geremy Meyers: I started shopping at 5 30 afternoon yesterday. So<\/p>\n<p>11<br \/>00:01:28.540 &#8211;&gt; 00:01:36.349<br \/>Geremy Meyers: yeah, I would say I&#8217;m early. I would also say, I know what I&#8217;m getting into. This is this every year. Actually, so my wife usually does most of it.<\/p>\n<p>12<br \/>00:01:36.440 &#8211;&gt; 00:01:40.279<br \/>Andy Whiteside: And then I fill in the gaps, and I started filling those gaps yesterday.<\/p>\n<p>13<br \/>00:01:40.520 &#8211;&gt; 00:01:41.540<br \/>Geremy Meyers: so we&#8217;ll see.<\/p>\n<p>14<br \/>00:01:41.940 &#8211;&gt; 00:01:54.989<br \/>Andy Whiteside: I may be a glen for Punch, but I&#8217;m going to the local shopping center after my live wife leaves town to go to where we&#8217;re going for the holidays a couple of days early, and I&#8217;m I like it, and I think it&#8217;s a program. I&#8217;ll buy it. If she wants to bring it back. I&#8217;ll keep. I&#8217;ll get a gift for seat<\/p>\n<p>15<br \/>00:01:56.170 &#8211;&gt; 00:01:57.359<br \/>Andy Whiteside: to South Columbia.<\/p>\n<p>16<br \/>00:01:57.400 &#8211;&gt; 00:02:12.420<br \/>Geremy Meyers: you know what call me old school, but at least once a year I do like to make the trip out with the masses into the shopping. you know just to just to be a part of it. I&#8217;ll be honest. And then, after I&#8217;m done, I&#8217;m like, why don&#8217;t I do that? I won&#8217;t do it next year. But what do I do next year? All over again?<\/p>\n<p>17<br \/>00:02:12.470 &#8211;&gt; 00:02:13.840<br \/>Geremy Meyers: Get my coffee.<\/p>\n<p>18<br \/>00:02:14.230 &#8211;&gt; 00:02:18.150<br \/>Andy Whiteside: Do the things. Hi, can you get Amazon up in a cabin in Maine.<\/p>\n<p>19<br \/>00:02:19.040 &#8211;&gt; 00:02:23.079<br \/>Todd Smith: Yeah, they actually do deliver.<\/p>\n<p>20<br \/>00:02:23.140 &#8211;&gt; 00:02:30.199<br \/>Todd Smith: they do deliver to a house that&#8217;s not limited I can that out. But it wasn&#8217;t. It wasn&#8217;t my gift. It was<\/p>\n<p>21<br \/>00:02:30.380 &#8211;&gt; 00:02:31.890<br \/>Todd Smith: It was someone else<\/p>\n<p>22<br \/>00:02:32.220 &#8211;&gt; 00:02:34.499<br \/>Todd Smith: who lives up in the area<\/p>\n<p>23<br \/>00:02:34.700 &#8211;&gt; 00:02:39.609<br \/>Todd Smith: had a 350 pound box dropped off in right front of a garage door. So<\/p>\n<p>24<br \/>00:02:39.800 &#8211;&gt; 00:02:47.830<br \/>Todd Smith: yeah, it was it was. Yes, Amazon does deliver pretty much everywhere. How&#8217;d you handle that? Throw it on the tractor and haul it off to him.<\/p>\n<p>25<br \/>00:02:47.930 &#8211;&gt; 00:02:57.980<br \/>Todd Smith: Now, actually, I pinged out on the on the local community Facebook page that said, Hey, does anyone know who would be getting this? And I got like<\/p>\n<p>26<br \/>00:02:58.930 &#8211;&gt; 00:03:05.450<br \/>Todd Smith: one person responded back and said, Yep, that&#8217;s mine. It got got dropped off, and we&#8217;ll come over and pick it up. So<\/p>\n<p>27<br \/>00:03:07.350 &#8211;&gt; 00:03:09.340<br \/>Andy Whiteside: yes, one day it was<\/p>\n<p>28<br \/>00:03:09.440 &#8211;&gt; 00:03:10.450<br \/>Todd Smith: that was it!<\/p>\n<p>29<br \/>00:03:11.690 &#8211;&gt; 00:03:12.940<br \/>Geremy Meyers: It&#8217;s hot!<\/p>\n<p>30<br \/>00:03:13.230 &#8211;&gt; 00:03:38.440<br \/>Andy Whiteside: Alright! Let me do the let me do this integral commercial if you are, or looking at becoming a Citrix customer, a net scalar customer, Hr. File customer and you do not feel like your partner is adding value the way they should. Well, that&#8217;s why we exist or 12 years old. Now it&#8217;s been the model from day one, whether it&#8217;s Citrix service. Now, salesforce, I can go on and on with vendors that we can help up. Level your partnership with.<\/p>\n<p>31<br \/>00:03:38.490 &#8211;&gt; 00:04:03.279<br \/>Andy Whiteside: Let us know. Reach out to myself on Linkedin. Let&#8217;s talk about it. I know the opportunity. And I and and actually, you know what I&#8217;ll say this, the the amount of partners out there that were like us are becoming less and less and less. They&#8217;re getting bought up by private equity. They&#8217;re they&#8217;re they&#8217;re growing up, I guess you might say. But that doesn&#8217;t mean they&#8217;re getting better. We&#8217;re not interested in that, and it it&#8217;ll it&#8217;s really opening the door to a lot more customer conversations. We met with a couple of large customers 2 weeks ago that<\/p>\n<p>32<br \/>00:04:03.280 &#8211;&gt; 00:04:10.810<br \/>Andy Whiteside: they don&#8217;t want to work with the big guys. They don&#8217;t want to work backward the big Lars or Si&#8217;s, because they know what they&#8217;re going to get. They&#8217;re super open these conversations these days.<\/p>\n<p>33<br \/>00:04:12.160 &#8211;&gt; 00:04:24.639<br \/>Andy Whiteside: Alright the blog we&#8217;re gonna look at today. The title of it is unveiling the power of citrix enterprise browsers integration with citrix analytics service for security. I think.<\/p>\n<p>34<br \/>00:04:24.720 &#8211;&gt; 00:04:31.170<br \/>Andy Whiteside: Jeremy, I&#8217;ll come to you first. The the browser scenario within the Citrix workspace portfolio.<\/p>\n<p>35<br \/>00:04:31.240 &#8211;&gt; 00:04:34.569<br \/>Andy Whiteside: It doesn&#8217;t seem like people know enough about it.<\/p>\n<p>36<br \/>00:04:35.590 &#8211;&gt; 00:04:49.240<br \/>Geremy Meyers: No, in fact, one of the questions that I usually get when we demo Enterprise browser off. So let&#8217;s take a step back. Enterprise Browser is a local browser that is integrated right into the Citrix workspace app, and when you launch<\/p>\n<p>37<br \/>00:04:49.450 &#8211;&gt; 00:04:56.379<br \/>Geremy Meyers: a web link that launches in the Enterprise browser. It&#8217;s using a local browser. So you&#8217;re using the local resources.<\/p>\n<p>38<br \/>00:04:56.500 &#8211;&gt; 00:05:03.669<br \/>Geremy Meyers: You know, of that machine. It&#8217;s not hosted. Hosted, shared virtual desktop. Any of those things is actually leveraging that local<\/p>\n<p>39<br \/>00:05:03.710 &#8211;&gt; 00:05:06.099<br \/>Geremy Meyers: enterprise browser, which, by the way.<\/p>\n<p>40<br \/>00:05:06.460 &#8211;&gt; 00:05:21.409<br \/>Geremy Meyers: includes security security controls as well. But when I did with this thing off. The first thing first question usually comes up is, Where are you hosting that that browser? And I&#8217;m like, no, no, no, this is not a hosted browser. So you know, sometimes we&#8217;re we&#8217;re kind of crippled by our own success, Andy.<\/p>\n<p>41<br \/>00:05:21.530 &#8211;&gt; 00:05:23.269<br \/>Geremy Meyers: In that.<\/p>\n<p>42<br \/>00:05:23.520 &#8211;&gt; 00:05:31.590<br \/>Geremy Meyers: Folks are so used to things from Citrix being virtual, that you know it takes a mind shift. Just sort of think about this from a local perspective. So<\/p>\n<p>43<br \/>00:05:31.900 &#8211;&gt; 00:05:41.450<br \/>Andy Whiteside: a large corporation couple weeks ago, CIO, and and I&#8217;m trying to taught him about the browser options within Citrix. And and he<\/p>\n<p>44<br \/>00:05:41.490 &#8211;&gt; 00:05:56.159<br \/>Andy Whiteside: he stops me and says, I&#8217;ve been doing Citrix since the late nineties. I know all about publishing a browser in Citrix, and for 5&nbsp;min I tried to convince him that wasn&#8217;t what this was. but he was so adamant. He knew it already that this didn&#8217;t exist. Only the old way exists. Go ahead, Todd.<\/p>\n<p>45<br \/>00:05:56.790 &#8211;&gt; 00:06:00.889<br \/>Todd Smith: Yeah, II was just gonna add on to that. You know, if you look at it.<\/p>\n<p>46<br \/>00:06:01.040 &#8211;&gt; 00:06:03.370<br \/>Todd Smith: the majority of our customers.<\/p>\n<p>47<br \/>00:06:03.410 &#8211;&gt; 00:06:19.059<br \/>Todd Smith: historical customers, especially the number one app that they would that they would publish out using. Xenap was a browser because they could manage the controls. They could manage the update of that browser. They could put in their own security controls and they would leverage<\/p>\n<p>48<br \/>00:06:19.140 &#8211;&gt; 00:06:21.270<br \/>Todd Smith: the Zen app policies<\/p>\n<p>49<br \/>00:06:21.380 &#8211;&gt; 00:06:24.639<br \/>Todd Smith: that were out there. And and they had<\/p>\n<p>50<br \/>00:06:25.050 &#8211;&gt; 00:06:26.550<br \/>Todd Smith: management reporting<\/p>\n<p>51<br \/>00:06:26.700 &#8211;&gt; 00:06:29.049<br \/>Todd Smith: reliability. All that stuff<\/p>\n<p>52<br \/>00:06:29.790 &#8211;&gt; 00:06:31.569<br \/>Todd Smith: problem is that came with a price.<\/p>\n<p>53<br \/>00:06:32.030 &#8211;&gt; 00:06:38.689<br \/>Todd Smith: and that price was it consumed back end resources on your servers to to be able to deliver that<\/p>\n<p>54<br \/>00:06:39.750 &#8211;&gt; 00:06:40.480<br \/>right?<\/p>\n<p>55<br \/>00:06:41.390 &#8211;&gt; 00:06:50.049<br \/>Andy Whiteside: Well. And it&#8217;s not like that doesn&#8217;t still exist. The use cases are there, but they&#8217;re minimum days versus the used cases for what we&#8217;re talking about. Here was a locally running<\/p>\n<p>56<br \/>00:06:50.100 &#8211;&gt; 00:07:08.919<br \/>Andy Whiteside: chromium, iterative or chromium version of a browser. That&#8217;s part of the Citrix Workspace app. And Jeremy, just to be clear when I install Citrix Workspace app to get access to this magical citrix digital workspace that I use. That browser is in there and ready to go.<\/p>\n<p>57<br \/>00:07:08.980 &#8211;&gt; 00:07:11.650<br \/>Geremy Meyers: The bits are already in there and ready to go. You got it.<\/p>\n<p>58<br \/>00:07:12.670 &#8211;&gt; 00:07:27.510<br \/>Andy Whiteside: Bill, are you are you seeing customers that are starting to understand this? Are they still just as unaware of this solution. They&#8217;re largely still unaware. They&#8217;re they&#8217;re still in the mindset of what Todd was mentioning, which is where they<\/p>\n<p>59<br \/>00:07:27.870 &#8211;&gt; 00:07:55.970<br \/>Bill Sutton: they publish the browser. Maybe they publish it with a link embedded. So you launch it and you get salesforce, or what have you? But you know that&#8217;s kind of the way we used to do it like, Todd was saying. But today, it might still make sense in some cases where you&#8217;ve got a really fat app that needs to run in the data center. And you you can&#8217;t really get to that with a browser outside of the environment. But so many users are remote now, and it really doesn&#8217;t make sense to publish a browser on a Zen App server just to turn right around and go out to the Internet and get to salesforce.<\/p>\n<p>60<br \/>00:07:56.080 &#8211;&gt; 00:08:07.390<br \/>Andy Whiteside: is it? Is it the is when you say fatness of the app? Are you talking about the old school days where you had all these different plugins and things that needed to be there is that part. Not that necessarily, but just the the app being client server, oriented.<\/p>\n<p>61<br \/>00:08:07.390 &#8211;&gt; 00:08:26.660<br \/>Bill Sutton: You know where you got a whole database tier and an app tier and all of those. And then the the end user tier. Those types of we don&#8217;t see that as much, maybe in some old insurance industry apps and maybe medical apps a lot of them are starting to move out of that, or have already moved out of that realm. But there&#8217;s still some legacy stuff out there.<\/p>\n<p>62<br \/>00:08:26.660 &#8211;&gt; 00:08:54.539<br \/>Andy Whiteside: I mean, Java was a great example of things that where you just need to make sure you controlled all that. So you put it in a in a virtualized back end sandbox and then present it versus having deployed. But HTML 5 and the the codecs and things that are all part of that capability these days, or they&#8217;ve kind of mitigated the need for all the control that you used to would have, wouldn&#8217;t you think they absolutely have? But I guess my point here is that most of what most of the apps that folks today are accessing<\/p>\n<p>63<br \/>00:08:54.640 &#8211;&gt; 00:09:10.130<br \/>Bill Sutton: our web. Or I&#8217;m sorry our Saas based or web based apps. So it doesn&#8217;t. It doesn&#8217;t even make sense it. It might have made sense then, from for security reasons. But it certainly doesn&#8217;t make sense now to publish a browser. So the user launches it in the data center. And then it turns right it out, goes out to the Internet<\/p>\n<p>64<br \/>00:09:10.190 &#8211;&gt; 00:09:11.630<br \/>Bill Sutton: to get to salesforce.<\/p>\n<p>65<br \/>00:09:11.810 &#8211;&gt; 00:09:23.220<br \/>Bill Sutton: Yeah, why not just do it from the endpoint to salesforce and then wrap a a secure browser around it with controls and and limitations on cut paste and other such things. Which is what this does. We&#8217;ll get into it in a minute.<\/p>\n<p>66<br \/>00:09:23.340 &#8211;&gt; 00:09:32.309<br \/>Andy Whiteside: Yeah. Hey, Todd, do you want to tackle this this first section after after the Intro. The title of this section is navigating the web. Every URL or every move.<\/p>\n<p>67<br \/>00:09:32.970 &#8211;&gt; 00:09:46.580<br \/>Todd Smith: Yeah. And and I think that&#8217;s one of the biggest challenges that&#8217;s been out there historically, has been okay. I&#8217;ve got a URL. I need to be able to lock it down. I need to be able to provide controls, customize to that URL or that that site<\/p>\n<p>68<br \/>00:09:46.680 &#8211;&gt; 00:09:55.710<br \/>Todd Smith: and be able to do things like monitor and control cut pace, control, clipboard functionality, printing capabilities, all of those type of things.<\/p>\n<p>69<br \/>00:09:55.760 &#8211;&gt; 00:10:03.900<br \/>Todd Smith: And really, this enterprise level browser really allows you to have that same level of controls<\/p>\n<p>70<br \/>00:10:04.000 &#8211;&gt; 00:10:29.630<br \/>Todd Smith: in a browser delivered session that you would normally have with a virtualized app session. Right? Because we&#8217;ve been able to take those controls and migrate them over, but not only migrate the controls over, but also migrate the reporting and analysis, the the analysis component of it right? So be able to not only say, Hey, we&#8217;ve got these controls, but we can then prove that those controls are actually effective<\/p>\n<p>71<br \/>00:10:30.110 &#8211;&gt; 00:10:33.269<br \/>Todd Smith: which anyone who has to deal with compliance programs.<\/p>\n<p>72<br \/>00:10:33.850 &#8211;&gt; 00:10:42.629<br \/>Todd Smith: That&#8217;s the that&#8217;s both sides of the of the argument. There, right? You&#8217;ve got to be able to have the controls, and you gotta be able to prove that those controls are actually<\/p>\n<p>73<br \/>00:10:42.940 &#8211;&gt; 00:10:44.110<br \/>Todd Smith: working.<\/p>\n<p>74<br \/>00:10:45.350 &#8211;&gt; 00:10:54.489<br \/>Andy Whiteside: I mean to me when I dive deeper into this which I have, which I do occasionally. This is like the most powerful new thing that Citrix has had in the last 10 years.<\/p>\n<p>75<br \/>00:10:54.610 &#8211;&gt; 00:10:55.790<br \/>Andy Whiteside: Do what do you think?<\/p>\n<p>76<br \/>00:10:56.660 &#8211;&gt; 00:11:12.400<br \/>Todd Smith: And I think, under, I think, under the covers. This is something that that a lot of customers have have been doing a workaround for the past 15 years. When really this was the end solution that really should have been should have been delivered.<\/p>\n<p>77<br \/>00:11:12.510 &#8211;&gt; 00:11:18.199<br \/>Todd Smith: II wanna say, in the first place, but certainly if we could have delivered this a lot sooner.<\/p>\n<p>78<br \/>00:11:18.240 &#8211;&gt; 00:11:28.909<br \/>Todd Smith: It probably would have been able to alleviate a lot of customers. Pains of having to manage browsers. And you know, think about it. How many times do you get an update<\/p>\n<p>79<br \/>00:11:29.610 &#8211;&gt; 00:11:37.040<br \/>Todd Smith: on your browser that requires you to do a reboot or the relaunch of the browser? I mean, I think.<\/p>\n<p>80<br \/>00:11:37.350 &#8211;&gt; 00:11:43.339<br \/>Todd Smith: as an example. My chrome browser. I&#8217;m up. I&#8217;m getting an update. Probably every other day.<\/p>\n<p>81<br \/>00:11:43.530 &#8211;&gt; 00:11:45.210<br \/>Todd Smith: Something is changing in that.<\/p>\n<p>82<br \/>00:11:45.500 &#8211;&gt; 00:11:51.359<br \/>Todd Smith: And it could be these subtle changes, or could be big changes. But the thing is, those are things that have to be done.<\/p>\n<p>83<br \/>00:11:51.700 &#8211;&gt; 00:11:58.449<br \/>Todd Smith: If I can then say, Hey, I&#8217;ve got a I&#8217;ve got an enterprise browser that is managed, that is controlled<\/p>\n<p>84<br \/>00:11:58.560 &#8211;&gt; 00:12:02.640<br \/>Todd Smith: without me having to worry about the updates that are occurring on my local.<\/p>\n<p>85<br \/>00:12:02.830 &#8211;&gt; 00:12:08.429<br \/>Todd Smith: II can. I can definitely get more control and more security around it.<\/p>\n<p>86<br \/>00:12:08.560 &#8211;&gt; 00:12:10.550<br \/>Todd Smith: and then also have a better experience<\/p>\n<p>87<br \/>00:12:11.370 &#8211;&gt; 00:12:12.400<br \/>Andy Whiteside: right?<\/p>\n<p>88<br \/>00:12:12.840 &#8211;&gt; 00:12:22.879<br \/>Andy Whiteside: While all that true and 100% true, while in parallel, not having to produce consumption compute on the back end, which is where a big chunk of the cost kicks in.<\/p>\n<p>89<br \/>00:12:23.000 &#8211;&gt; 00:12:28.319<br \/>Andy Whiteside: Yeah, I mean, listen, Bill, use the word salesforce, I mean, Andy, you&#8217;ve got salesforce running. Now.<\/p>\n<p>90<br \/>00:12:28.400 &#8211;&gt; 00:12:32.030<br \/>Geremy Meyers: salesforce lightning is a hog and running. That is, a published app<\/p>\n<p>91<br \/>00:12:32.070 &#8211;&gt; 00:12:42.980<br \/>Geremy Meyers: just consumes a lot of resource in the back end. So yeah, listen if I can. If security was the issue, Bill brings up a good point. I mean, if this is already a Sas hosted off site application. Anyways.<\/p>\n<p>92<br \/>00:12:43.090 &#8211;&gt; 00:12:53.260<br \/>Geremy Meyers: Now, I&#8217;m just tying up data center resources. For what reason? Right? I can secure this app through controls in this enterprise, browser. I&#8217;m offloading the processing to my local machine.<\/p>\n<p>93<br \/>00:12:53.330 &#8211;&gt; 00:12:56.110<br \/>Geremy Meyers: You know. Why not? Why not?<\/p>\n<p>94<br \/>00:12:56.290 &#8211;&gt; 00:12:57.979<br \/>Geremy Meyers: So? The first thing that&#8217;s a<\/p>\n<p>95<br \/>00:12:58.430 &#8211;&gt; 00:13:22.289<br \/>Andy Whiteside: sorry, real quick. Let me understand the traffic flow in this I know when I when I used to bring it as a published app, I knew it came in through presentation, and then went in and out through your typical http, https in this situation where I&#8217;m actually running a browser locally, and I&#8217;m outside the office. Can I force that traffic back in and then back out, back in to get to local resources directly out, or all the above.<\/p>\n<p>96<br \/>00:13:22.560 &#8211;&gt; 00:13:45.910<br \/>Geremy Meyers: you can do all the above. So the idea would be, listen, if you want to keep the traffic flow from your endpoint directly, like salesforce, that&#8217;s something that can completely be done. If you want to force it through the data center. And there&#8217;s some use cases for that. So, for instance, there are certain Sas apps that require all the data, all the traffic to originate like, say, from a data center. Again, you can also force it through the data center, so that traffic from a local machine at my house<\/p>\n<p>97<br \/>00:13:45.910 &#8211;&gt; 00:13:53.170<br \/>Geremy Meyers: appears to be going through the data center and out to the Sas app. So you know, that&#8217;s also a supported scenario as well, you can configure. Yeah.<\/p>\n<p>98<br \/>00:13:53.800 &#8211;&gt; 00:14:07.779<br \/>Andy Whiteside: Next section talks about clay. Let&#8217;s go back up. So there is an important point to the first one. So this first section talks about the fact that because you&#8217;re running this from the local Mr. The local enterprise browser, we&#8217;re actually logging<\/p>\n<p>99<br \/>00:14:07.960 &#8211;&gt; 00:14:10.910<br \/>Geremy Meyers: the yeah Urls that you go to. So, for instance, you can publish<\/p>\n<p>100<br \/>00:14:10.950 &#8211;&gt; 00:14:19.440<br \/>Geremy Meyers: a link to an app or a link to a website, it will launch in this enterprise Browser, which is great. But I can also open up another tab and go navigate to a different website. So<\/p>\n<p>101<br \/>00:14:19.760 &#8211;&gt; 00:14:27.419<br \/>Geremy Meyers: where that comes in useful is number one. I like the fact that I&#8217;m getting folks used to using it. But secondly, there&#8217;s a feature that you can enable<\/p>\n<p>102<br \/>00:14:27.430 &#8211;&gt; 00:14:41.920<br \/>Geremy Meyers: that will let you understand where these Urls are going. So, for instance, you could certainly look at this from a security perspective like, I don&#8217;t want folks going to certain websites from the Flip side. I might understand that my users are actually trying to go to this one website that they can&#8217;t get to like they&#8217;re having to type it in.<\/p>\n<p>103<br \/>00:14:41.980 &#8211;&gt; 00:14:48.950<br \/>Geremy Meyers: And it was just something I missed. So now I know a new website that I need to publish to my end users that maybe I didn&#8217;t realize I needed to before.<\/p>\n<p>104<br \/>00:14:49.040 &#8211;&gt; 00:14:54.639<br \/>Geremy Meyers: In fact, there&#8217;s a feature integrated into this called the app discovery feature. That helps you turn that on and figure it out.<\/p>\n<p>105<br \/>00:14:55.320 &#8211;&gt; 00:15:23.159<br \/>Andy Whiteside: Yeah, I think what you would really highlight here, and and very much true. We&#8217;ve talked about the local browser running, but it&#8217;s control of that local browser. And then analytics and insight into everything happening within that browser which you know when you use. Maybe the same I should have made earlier. It&#8217;s it&#8217;s 2023, 2024, almost a and most corporate users of enterprise. Commercial Midmarket, Smb. They still use a consumer grade browser to do their job. If you stop looking at that way that makes no sense<\/p>\n<p>106<br \/>00:15:23.270 &#8211;&gt; 00:15:24.600<br \/>Andy Whiteside: at this stage of the game.<\/p>\n<p>107<br \/>00:15:25.170 &#8211;&gt; 00:15:26.210<br \/>Geremy Meyers: It doesn&#8217;t.<\/p>\n<p>108<br \/>00:15:26.270 &#8211;&gt; 00:15:28.660<br \/>Geremy Meyers: But like those are people people just don&#8217;t know.<\/p>\n<p>109<br \/>00:15:29.120 &#8211;&gt; 00:15:34.710<br \/>Todd Smith: And the the other benefit here is, what if? What if it could become<\/p>\n<p>110<br \/>00:15:34.800 &#8211;&gt; 00:15:41.689<br \/>Todd Smith: proactive instead of reactive? Right? So, as a as Jeremy was just saying with the app discovery capabilities?<\/p>\n<p>111<br \/>00:15:41.860 &#8211;&gt; 00:15:45.409<br \/>Todd Smith: What if you could say, Hey, you know what we&#8217;re so we&#8217;re noticing<\/p>\n<p>112<br \/>00:15:45.420 &#8211;&gt; 00:15:48.829<br \/>Todd Smith: our users are doing more with this website.<\/p>\n<p>113<br \/>00:15:49.210 &#8211;&gt; 00:15:58.970<br \/>Todd Smith: What if we could then include that right as part of our service, or or go and understand how to optimize that.<\/p>\n<p>114<br \/>00:15:59.240 &#8211;&gt; 00:16:07.219<br \/>Todd Smith:&nbsp; you know. Now, all of a sudden, you&#8217;re you&#8217;re you&#8217;re meeting the you&#8217;re meeting your users needs before the users actually start complaining about it.<\/p>\n<p>115<br \/>00:16:07.310 &#8211;&gt; 00:16:11.160<br \/>Todd Smith: and you can help uncover shadow it, too. That&#8217;s exactly it.<\/p>\n<p>116<br \/>00:16:13.110 &#8211;&gt; 00:16:23.299<br \/>Andy Whiteside: Anything else to cover on this part, Jamie, I&#8217;m glad you stopped us, because that&#8217;s most one of the most important parts of this whole blog is the ability to see on the back end. What&#8217;s happening from a security and performance perspective?<\/p>\n<p>117<br \/>00:16:23.390 &#8211;&gt; 00:16:26.780<br \/>Geremy Meyers: Yep, no, that&#8217;s it. Yeah, we can. We can move on to the next one.<\/p>\n<p>118<br \/>00:16:26.870 &#8211;&gt; 00:16:32.840<br \/>Andy Whiteside: Alright. Let&#8217;s talk about this clipboard control cutting through the risk. Let&#8217;s cover this. I<\/p>\n<p>119<br \/>00:16:32.860 &#8211;&gt; 00:16:36.360<br \/>Andy Whiteside: extremely applicable in this conversation. Jeremy, go ahead.<\/p>\n<p>120<br \/>00:16:36.380 &#8211;&gt; 00:16:38.850<br \/>Geremy Meyers: Yeah. So when you think about why<\/p>\n<p>121<br \/>00:16:39.130 &#8211;&gt; 00:16:48.870<br \/>Geremy Meyers: customers were publishing applications like web browsers in the past. Some of it, to Bill&#8217;s Point was certainly client server, but some of it was just good old plain security, right? Like they wanted to contain<\/p>\n<p>122<br \/>00:16:48.880 &#8211;&gt; 00:17:03.159<br \/>Geremy Meyers: the data. They wanted to keep it in the data center. So of course, Zen Apps and Desktop, you can. Those are policies. You can turn on block copy and paste, which is kind of what we&#8217;re getting on here. You can just manage the clipboard well, as it turns out we can extend that same security control<\/p>\n<p>123<br \/>00:17:03.170 &#8211;&gt; 00:17:08.569<br \/>Geremy Meyers: out to this enterprise, Browser, that&#8217;s running on that local machine. So, for instance, if I&#8217;m within.<\/p>\n<p>124<br \/>00:17:08.730 &#8211;&gt; 00:17:17.679<br \/>Geremy Meyers: you know I&#8217;ve pulled. I&#8217;ve got a web page up on the Enterprise browser. I can turn on. Maybe this is salesforce. I can restrict the clipboard even at this local machine, even if it&#8217;s not hosted.<\/p>\n<p>125<br \/>00:17:18.690 &#8211;&gt; 00:17:24.419<br \/>Andy Whiteside: Am I doing that based on URL? What&#8217;s my key indicator that says, when that turns on and off<\/p>\n<p>126<br \/>00:17:24.740 &#8211;&gt; 00:17:38.059<br \/>Geremy Meyers: you can do it. Per, yeah. URL, so you can have a couple of different yeah. Urls, you might have one that&#8217;s wide open. You couldn&#8217;t care less about. And then you&#8217;ve got one that might be an internal jira app that you certainly want to maintain the day on, so you can do it on a per URL basis<\/p>\n<p>127<br \/>00:17:38.110 &#8211;&gt; 00:17:39.330<br \/>Geremy Meyers: when you probably am.<\/p>\n<p>128<br \/>00:17:39.370 &#8211;&gt; 00:17:43.189<br \/>Andy Whiteside: Is that also per tab, or that through is through the session itself.<\/p>\n<p>129<br \/>00:17:43.520 &#8211;&gt; 00:17:46.210<br \/>Geremy Meyers: Be per tab. Yeah, yes, you can do it per tab.<\/p>\n<p>130<br \/>00:17:46.330 &#8211;&gt; 00:18:16.090<br \/>Bill Sutton: But the interesting thing, the interesting thing about this and this goes back to what you were saying earlier, Jeremy. And I think, Andy, you said it as well is obviously you can. You can MoD you could create policies to restrict or allow cut, copy, paste, etc., between the browser and the local workstation, and vice versa. But the thing, I think, is really neat about this is that leveraging the security analytics, it&#8217;s logging all of this activity. So it could. We could. We can see when somebody cut and pasted from, you know,<\/p>\n<p>131<br \/>00:18:16.180 &#8211;&gt; 00:18:18.440<br \/>Bill Sutton: Pirate Bay into<\/p>\n<p>132<br \/>00:18:18.480 &#8211;&gt; 00:18:31.690<br \/>Bill Sutton: into a workstation, or if I tried to try to cut and paste something back and forth between the local workstation into a certain app, and you may not be able to see what they cut and paste it, but at least you can see that it was attempted, and then you can take action on it<\/p>\n<p>133<br \/>00:18:32.020 &#8211;&gt; 00:18:40.129<br \/>Geremy Meyers: well, and to take it a step further. So now that we can see now, first of all, how would you have done this with the Zen App, or a Zendesk.<\/p>\n<p>134<br \/>00:18:40.160 &#8211;&gt; 00:18:53.599<br \/>Geremy Meyers: or see bad, you know session right now. I might have turned copy and paste, off and on. I&#8217;ve seen what it is you actually did, and here&#8217;s the best part is now I can take a policy action based on what you did as well. So now only set it. But if I&#8217;ve noticed that.<\/p>\n<p>135<br \/>00:18:53.840 &#8211;&gt; 00:18:59.170<br \/>Geremy Meyers: I mean, listen, Bill cannot be trusted and he spans control. C control. V. If we see that enough.<\/p>\n<p>136<br \/>00:18:59.800 &#8211;&gt; 00:19:06.070<br \/>Geremy Meyers: maybe we just turn off his access or we take some proactive action, we alert someone to let them know. This is what&#8217;s going on.<\/p>\n<p>137<br \/>00:19:06.550 &#8211;&gt; 00:19:23.639<br \/>Andy Whiteside: Yeah, I think part of the argument you guys are making in theory, there&#8217;s there&#8217;s, there&#8217;s elements of this are more controllable, more visible, than if we hosted in the data center and consumed all those resources where we may or may not be able to do as much as we can do here. Yeah, we have more context. We have the ability to get more context into what&#8217;s going on and can take action on it<\/p>\n<p>138<br \/>00:19:23.670 &#8211;&gt; 00:19:27.069<br \/>Bill Sutton: in real time versus what we could do in the past.<\/p>\n<p>139<br \/>00:19:28.440 &#8211;&gt; 00:19:29.770<br \/>Andy Whiteside: Hey, Todd? Anything we missed.<\/p>\n<p>140<br \/>00:19:30.670 &#8211;&gt; 00:19:31.989<br \/>Todd Smith: Nope, I think we&#8217;re good.<\/p>\n<p>141<br \/>00:19:32.200 &#8211;&gt; 00:19:46.089<br \/>Andy Whiteside: Okay, let&#8217;s Todd, you wanna cover print printing precision managing output safely. Right? There&#8217;s the digital. That we&#8217;ve been talking about. But analog still happens. And analog. Still a major concern, Aka printing<\/p>\n<p>142<br \/>00:19:46.390 &#8211;&gt; 00:19:54.229<br \/>Todd Smith: Yup. And and you know this, this is something that re really happened when we started sending people home to to work from home.<\/p>\n<p>143<br \/>00:19:54.410 &#8211;&gt; 00:20:06.029<br \/>Todd Smith: One of the big risk factors out there, whether you&#8217;re talking about regulated industries like healthcare or banking. where customer service reps or billers are being sent to work from home<\/p>\n<p>144<br \/>00:20:06.170 &#8211;&gt; 00:20:08.940<br \/>Todd Smith: on a regular basis. And<\/p>\n<p>145<br \/>00:20:09.210 &#8211;&gt; 00:20:22.039<br \/>Todd Smith: their process was, Hey, I&#8217;m at the office. I&#8217;m just gonna print this out and put it into the file. That same process says, print it out. Well, you&#8217;re now. You&#8217;re now at home, right? You shouldn&#8217;t be printing thing. You may or may not be allowed to print<\/p>\n<p>146<br \/>00:20:22.210 &#8211;&gt; 00:20:36.269<br \/>Todd Smith: copies and keep them at home because it&#8217;s less secure or or it could be a potential data privacy issue things like that. So being able to manage where that print output actually occurs<\/p>\n<p>147<br \/>00:20:36.310 &#8211;&gt; 00:20:37.790<br \/>Todd Smith: and restrict it<\/p>\n<p>148<br \/>00:20:37.990 &#8211;&gt; 00:20:59.110<br \/>Todd Smith:&nbsp; and when you connect them through something like a VPN, right? So basically, you can say, Hey, don&#8217;t. When you&#8217;re connected to the VPN. Don&#8217;t allow any downloads or or printing or things like that. But oftentimes it&#8217;s at the application level, right? So this could be the application or the or the site level, where you can actually then<\/p>\n<p>149<br \/>00:20:59.350 &#8211;&gt; 00:21:08.530<br \/>Todd Smith: turn on the ability to print or turn it off and identify. You know not only what they&#8217;re printing, but also where they&#8217;ve printed it to<\/p>\n<p>150<br \/>00:21:08.640 &#8211;&gt; 00:21:13.379<br \/>Todd Smith: right could be identified as the the printer name, or, you know.<\/p>\n<p>151<br \/>00:21:13.660 &#8211;&gt; 00:21:19.819<br \/>Todd Smith: printing off to a Pdf file. This is it right? So, being able to track that, and once again to Bill&#8217;s comment<\/p>\n<p>152<br \/>00:21:20.140 &#8211;&gt; 00:21:24.029<br \/>Todd Smith: if we can. If we can restrict it, we can also report on it<\/p>\n<p>153<br \/>00:21:24.350 &#8211;&gt; 00:21:33.449<br \/>Todd Smith: right? So first time, hey? You know, you get a notification from manager saying, Hey, you shouldn&#8217;t have been printed that off. If you&#8217;re a repeat offender for that.<\/p>\n<p>154<br \/>00:21:33.580 &#8211;&gt; 00:21:42.019<br \/>Todd Smith: Guess what you&#8217;re gonna have that access turned off, or you may have some type of an easy phone call. With that your manager and Hr rep on, call<\/p>\n<p>155<br \/>00:21:42.860 &#8211;&gt; 00:21:43.590<br \/>Andy Whiteside: right.<\/p>\n<p>156<br \/>00:21:44.350 &#8211;&gt; 00:21:49.569<br \/>Andy Whiteside: Do you have any other comments on the the printing aspects of what the secure browser brings to this solution.<\/p>\n<p>157<br \/>00:21:49.680 &#8211;&gt; 00:21:58.620<br \/>Geremy Meyers: No, no, I mean, I think think Todd hit it here. Along the same line is this copy and paste, you know. If we can start tracking this, we can. We can be proactive with us with it as well.<\/p>\n<p>158<br \/>00:21:59.310 &#8211;&gt; 00:22:00.600<br \/>Andy Whiteside: Bill, are you seeing?<\/p>\n<p>159<br \/>00:22:01.450 &#8211;&gt; 00:22:11.610<br \/>Andy Whiteside: Or after we beat it to death. Customers don&#8217;t even know this stuff exists, much less using it. Do we have any examples where customers have have turned this on in your working set of customers. No.<\/p>\n<p>160<br \/>00:22:11.750 &#8211;&gt; 00:22:16.079<br \/>Andy Whiteside: now II think it&#8217;s just they don&#8217;t know. They they literally don&#8217;t know.<\/p>\n<p>161<br \/>00:22:16.460 &#8211;&gt; 00:22:25.030<br \/>Bill Sutton: It kind of goes back to something. I think, Jeremy, you alluded to earlier, and that is, you know, we&#8217;re victims of our success. And<\/p>\n<p>162<br \/>00:22:25.160 &#8211;&gt; 00:22:33.909<br \/>Bill Sutton: and I think a lot of customers still see Citrix as a use Mark Templeton term from years ago. One trick pony right?<\/p>\n<p>163<br \/>00:22:34.350 &#8211;&gt; 00:22:46.230<br \/>Andy Whiteside: Well. So in my situation with the CIO the other week of this major corporation that you know they started the whole conversation with, I know metaphrame, and I knew when app. Therefore you can&#8217;t tell me anything, and I&#8217;m like, Oh, God, I know where this one&#8217;s going.<\/p>\n<p>164<br \/>00:22:48.030 &#8211;&gt; 00:22:51.740<br \/>Todd Smith: I know which customer that was. Okay. Yeah.<\/p>\n<p>165<br \/>00:22:52.110 &#8211;&gt; 00:23:02.039<br \/>Andy Whiteside: Yup put me in my place right away. I was on that call. Yeah, alright, it&#8217;s Jeremy back to your download dynamics, tracking every bytes.<\/p>\n<p>166<br \/>00:23:02.170 &#8211;&gt; 00:23:03.880<br \/>Andy Whiteside: every bite.<\/p>\n<p>167<br \/>00:23:04.370 &#8211;&gt; 00:23:12.370<br \/>Andy Whiteside: this is where it really gets scary for customers, and that was one of the reasons why we had the published app concept of a published browser.<\/p>\n<p>168<br \/>00:23:12.600 &#8211;&gt; 00:23:16.750<br \/>Andy Whiteside: But we don&#8217;t need to do that anymore, because guess what we can do. It here helps understand that.<\/p>\n<p>169<br \/>00:23:16.830 &#8211;&gt; 00:23:25.840<br \/>Geremy Meyers: Yeah, yeah. So think about what would happen if you tried to download something from a website that was in your published app. What did you typically download to? It was probably.<\/p>\n<p>170<br \/>00:23:26.230 &#8211;&gt; 00:23:41.040<br \/>Geremy Meyers: you know, hopefully, your Citrix session. Your Citrix environment was set up correctly, so they would redirect that to a network share right? But some kind of personal folder, of course, but once you&#8217;ve taken the web browser quote unquote off net, now it sits locally, and I go to download something<\/p>\n<p>171<br \/>00:23:41.150 &#8211;&gt; 00:23:49.779<br \/>Geremy Meyers: all of a sudden. Where&#8217;s it? Downloading was downloading locally to my machine? So again, this is a this is an area that I might not have considered in the past.<\/p>\n<p>172<br \/>00:23:49.870 &#8211;&gt; 00:23:54.419<br \/>Geremy Meyers: In the past it might have looked like security controls, like a chrome browser, just to turn off<\/p>\n<p>173<br \/>00:23:54.480 &#8211;&gt; 00:23:59.570<br \/>Geremy Meyers: downloads in general. But now that I&#8217;m gonna download something, and it could potentially be local.<\/p>\n<p>174<br \/>00:23:59.580 &#8211;&gt; 00:24:02.180<br \/>Geremy Meyers: can I turn that off as well? And so being able to log.<\/p>\n<p>175<br \/>00:24:02.210 &#8211;&gt; 00:24:12.990<br \/>Geremy Meyers: you know, number one, what got downloaded where it got downloaded, where it was downloaded from. And is that something that I&#8217;m even going to allow. You know these are security controls, the number one you can turn on. And second, second of all. And this is the the trend. Here<\/p>\n<p>176<br \/>00:24:13.030 &#8211;&gt; 00:24:26.680<br \/>Geremy Meyers: I can log and track against and take proactive security. You know actions against as well. So some of these things. And this is kind of what the next session is is, you know, in micro chunks. Maybe it doesn&#8217;t<\/p>\n<p>177<br \/>00:24:26.850 &#8211;&gt; 00:24:37.809<br \/>Geremy Meyers: indicate any sort of security threat. But this all feeds into a risk score that tags the user as more or less risky. So you know, again, in in the theme of<\/p>\n<p>178<br \/>00:24:37.980 &#8211;&gt; 00:24:40.209<br \/>Geremy Meyers: feeding this into security analytics?<\/p>\n<p>179<br \/>00:24:40.270 &#8211;&gt; 00:24:51.440<br \/>Geremy Meyers: Yes, we can take proactive actions. But ultimately, what is the posture of the user doing all of these things? Or one of these things is one thing more important than the other like. I might not care about printing, but I care a lot about downloading<\/p>\n<p>180<br \/>00:24:51.450 &#8211;&gt; 00:24:55.799<br \/>Geremy Meyers: again. These are all things that can be controlled, things that can be logged. And ultimately.<\/p>\n<p>181<br \/>00:24:55.820 &#8211;&gt; 00:24:59.149<br \/>Geremy Meyers: you know, I can tag the user as risky and be proactive about it.<\/p>\n<p>182<br \/>00:24:59.830 &#8211;&gt; 00:25:02.059<br \/>Andy Whiteside: Right? Thought anything else.<\/p>\n<p>183<br \/>00:25:02.380 &#8211;&gt; 00:25:09.400<br \/>Todd Smith: III think it&#8217;s a great lead into the to to the kind of the last topic here, which is the<\/p>\n<p>184<br \/>00:25:09.920 &#8211;&gt; 00:25:13.670<br \/>Todd Smith: you know the whole comments around establishing a risk score<\/p>\n<p>185<br \/>00:25:13.780 &#8211;&gt; 00:25:21.350<br \/>Todd Smith:&nbsp; you know, and how how so much of our security is based on contextual items.<\/p>\n<p>186<br \/>00:25:21.450 &#8211;&gt; 00:25:28.839<br \/>Todd Smith: whether it be someone changes their location. what the application they&#8217;re using. you know, really kind of<\/p>\n<p>187<br \/>00:25:28.890 &#8211;&gt; 00:25:38.919<br \/>Todd Smith: identifying what their, what their score is compared to some of their peers, and compared to some of the other folks that are that are out there using these systems, being able to<\/p>\n<p>188<br \/>00:25:39.190 &#8211;&gt; 00:25:40.390<br \/>Todd Smith: address<\/p>\n<p>189<br \/>00:25:40.780 &#8211;&gt; 00:25:46.829<br \/>Todd Smith: the needs of the users and also the needs of the security requirements of the organization<\/p>\n<p>190<br \/>00:25:47.000 &#8211;&gt; 00:26:00.339<br \/>Todd Smith: are critical, right. So being able to say, Hey, you know what this this person, this user, needs to be able to print, they need to be able to download files. They need to be able to maybe edit some things, and then and then once they download it, re upload it.<\/p>\n<p>191<br \/>00:26:00.480 &#8211;&gt; 00:26:03.359<br \/>Todd Smith: What if I could have something like that reported.<\/p>\n<p>192<br \/>00:26:03.990 &#8211;&gt; 00:26:11.310<br \/>Todd Smith: you know. Hey? You downloaded something, but you never re uploaded. you know. What was. Is that a process issue, or is that something.<\/p>\n<p>193<br \/>00:26:11.430 &#8211;&gt; 00:26:17.229<br \/>Todd Smith: you know. Are you still working on it? You know there&#8217;s a variety of different things that we can. We could help manage here.<\/p>\n<p>194<br \/>00:26:17.340 &#8211;&gt; 00:26:21.579<br \/>Todd Smith: But it really helps us balance out that the<\/p>\n<p>195<br \/>00:26:21.660 &#8211;&gt; 00:26:24.480<br \/>Todd Smith: user experience versus the security requirements.<\/p>\n<p>196<br \/>00:26:24.950 &#8211;&gt; 00:26:33.769<br \/>Andy Whiteside: And guys, I think this is the right answer here. But you can. You don&#8217;t necessarily have to turn on a bunch of enforcement. But you can turn this on and start evaluating your risk<\/p>\n<p>197<br \/>00:26:33.780 &#8211;&gt; 00:26:35.210<br \/>Andy Whiteside: portfolio<\/p>\n<p>198<br \/>00:26:36.240 &#8211;&gt; 00:26:38.939<br \/>Andy Whiteside: just by turning this on without ever enforcing anything<\/p>\n<p>199<br \/>00:26:38.960 &#8211;&gt; 00:26:46.060<br \/>Geremy Meyers: correct. Yep. So if you just want to watch and get a feel for what users are doing and understand.<\/p>\n<p>200<br \/>00:26:46.100 &#8211;&gt; 00:26:48.540<br \/>Geremy Meyers: you know what the activity is. I mean. That&#8217;s step number one.<\/p>\n<p>201<br \/>00:26:48.740 &#8211;&gt; 00:26:52.109<br \/>Geremy Meyers: and then you can create controls after that if you choose to.<\/p>\n<p>202<br \/>00:26:53.290 &#8211;&gt; 00:26:57.480<br \/>Andy Whiteside: So the question, you guys, if you can do that, and it doesn&#8217;t have to be heavy handed. Why.<\/p>\n<p>203<br \/>00:26:57.510 &#8211;&gt; 00:27:10.710<br \/>Andy Whiteside: why don&#8217;t you like? Why didn&#8217;t everybody just turn this on start using it? And the truth is going back to the comments over. They just don&#8217;t even know you can do it. They are, I think, going. You know, the the idea that Citrix and the successful idea of publishing a browser. That&#8217;s how you do. It<\/p>\n<p>204<br \/>00:27:10.780 &#8211;&gt; 00:27:13.460<br \/>Andy Whiteside: is almost really been a detriment.<\/p>\n<p>205<br \/>00:27:14.690 &#8211;&gt; 00:27:25.359<br \/>Geremy Meyers: Yup, Yup! And, in fact, what&#8217;s interesting about this is you pointed this out, Andy, is you actually get more functionality out of this than you would have just publishing the app for the brow, for the Zen app session.<\/p>\n<p>206<br \/>00:27:27.020 &#8211;&gt; 00:27:35.720<br \/>Todd Smith: III think the other thing that that we&#8217;re seeing is in the past. We weren&#8217;t always engaging with the folks that were running the Security guard<\/p>\n<p>207<br \/>00:27:35.910 &#8211;&gt; 00:27:48.939<br \/>Todd Smith: the or the security organization within our customers. Right? It was very much reactive as opposed to being proactive in security. Folks would tend to go out and say, Hey, we just got this report.<\/p>\n<p>208<br \/>00:27:49.140 &#8211;&gt; 00:28:02.929<br \/>Todd Smith: We just did an investigation. We just read something that says we need to go in, either fix it or buy something new. And oftentimes it&#8217;s not being done in collaboration with the same folks that are running the Citrix environment.<\/p>\n<p>209<br \/>00:28:03.170 &#8211;&gt; 00:28:05.180<br \/>Todd Smith: So there&#8217;s no need there<\/p>\n<p>210<br \/>00:28:05.220 &#8211;&gt; 00:28:08.919<br \/>Todd Smith: to make a change and to to turn some of these features on.<\/p>\n<p>211<br \/>00:28:09.050 &#8211;&gt; 00:28:17.090<br \/>Todd Smith: But if you&#8217;re a customer and you listen to this, podcast you know, get to know your security folks. They&#8217;re not scary. They&#8217;re there to help you<\/p>\n<p>212<br \/>00:28:17.390 &#8211;&gt; 00:28:20.839<br \/>Todd Smith: find ways to to leverage what you&#8217;ve already made the investment in.<\/p>\n<p>213<br \/>00:28:20.860 &#8211;&gt; 00:28:33.949<br \/>Todd Smith: or potentially come up with a different way of doing things. You have the answer right here they&#8217;re looking for. They just don&#8217;t know, because they&#8217;re not looking in the citrus world for the answers. They&#8217;re going out trying to find new products that are sassy and 0 trust related. Yep.<\/p>\n<p>214<br \/>00:28:34.880 &#8211;&gt; 00:28:38.509<br \/>Andy Whiteside: Bill, any comments on the whole concept of contextual risk.<\/p>\n<p>215<br \/>00:28:38.750 &#8211;&gt; 00:28:53.279<br \/>Bill Sutton: No, III agree with the title there. A game changer, for sure. Is the, you know, the ability to look at the users act users behavior and activity and make make policy based decisions on whether they can continue to have that level of access or adjust it.<\/p>\n<p>216<br \/>00:28:53.330 &#8211;&gt; 00:29:02.390<br \/>Bill Sutton: So I really, this is, I knew this existed, but didn&#8217;t realize it was this extensive at this point. So now I want to go test it<\/p>\n<p>217<br \/>00:29:03.400 &#8211;&gt; 00:29:08.149<br \/>Bill Sutton: hopefully. Folks on the call want to do that, too, and if you do reach out we can work together.<\/p>\n<p>218<br \/>00:29:08.530 &#8211;&gt; 00:29:38.529<br \/>Andy Whiteside: We we&#8217;ve we&#8217;ve got it turned on within zoom integral. We just don&#8217;t enforce anything at the moment, therefore people just keep doing their own it their own, it sneaker net doing their own thing but we&#8217;re talking about. We talked about our management call this morning, turning this on so that in order to get this integral salesforce, you have to come through our digital workspace, it&#8217;s it&#8217;s a mutual blend of mandating stuff, as all also getting people to come to it up to their own on their own device and their own vice their own. What&#8217;s it called their their own reason for want to get to it?<\/p>\n<p>219<br \/>00:29:38.560 &#8211;&gt; 00:29:39.940<br \/>Andy Whiteside: What&#8217;s where I live working?<\/p>\n<p>220<br \/>00:29:40.050 &#8211;&gt; 00:29:54.790<br \/>Geremy Meyers: So the carrot for me is, there are quite a few web apps that are only available internal to Citrix, so like our Geir page, and you know some some of our internal sites, and you know, for me to launch my virtual desktop or me to launch a virtual app. Don&#8217;t be around<\/p>\n<p>221<br \/>00:29:55.450 &#8211;&gt; 00:30:04.660<br \/>Geremy Meyers: great use, case, but I would much rather do that. My enterprise, browser, which is what I tend to do. In fact, I&#8217;ve got bookmarks for most of the stuff inside Enterprise browser, and<\/p>\n<p>222<br \/>00:30:04.760 &#8211;&gt; 00:30:09.090<br \/>Geremy Meyers: you know it&#8217;s quicker. It&#8217;s easier, simpler, especially if I just need to pop in and pop out<\/p>\n<p>223<br \/>00:30:09.800 &#8211;&gt; 00:30:20.160<br \/>Andy Whiteside: most of the customers I&#8217;m running into today. They&#8217;re using a local browser completely unmanaged in a VPN. To get to that back end. And you&#8217;re like, what year are you living in that? That&#8217;s<\/p>\n<p>224<br \/>00:30:20.500 &#8211;&gt; 00:30:30.560<br \/>Andy Whiteside: the 2,005. I get it. Not. Yeah. You shook your head like, you see that all the time? Yeah, I see it a lot more frequently than I thought<\/p>\n<p>225<br \/>00:30:30.630 &#8211;&gt; 00:30:33.330<br \/>Todd Smith: we would see it as far as the<\/p>\n<p>226<br \/>00:30:33.460 &#8211;&gt; 00:30:49.810<br \/>Todd Smith: the older method and part of it is the architecture of some of these applications that are out there. Some of these websites that people are hitting where especially the internal ones, right? So the internal websites tend to have local data sources to that data center for that to that organization.<\/p>\n<p>227<br \/>00:30:50.010 &#8211;&gt; 00:30:59.680<br \/>Todd Smith:&nbsp; but if they&#8217;re using something like salesforce or service now, or some other type of commercially available websites, it&#8217;s a true software as a service.<\/p>\n<p>228<br \/>00:31:00.630 &#8211;&gt; 00:31:11.409<br \/>Todd Smith: The architecture is totally different. Right? You&#8217;re not going back to that data center, to to your company&#8217;s data center to get a lot of this information residing someplace up in the cloud or in someone else&#8217;s<\/p>\n<p>229<br \/>00:31:11.440 &#8211;&gt; 00:31:19.090<br \/>Todd Smith: location, or you&#8217;re pulling it from multiple sources. So that has changed considerably. The the architecture has changed to the point where<\/p>\n<p>230<br \/>00:31:19.230 &#8211;&gt; 00:31:28.340<br \/>Todd Smith:&nbsp; You know the old way of doing things. You said the 2,005 way of doing things doesn&#8217;t really, it&#8217;s no longer applicable.<\/p>\n<p>231<br \/>00:31:28.780 &#8211;&gt; 00:31:38.900<br \/>Todd Smith: But it&#8217;s nice to be able to turn around and say, Hey, we can do now both ways, right through this one single enterprise browser that&#8217;s included in your Workspace app<\/p>\n<p>232<br \/>00:31:38.980 &#8211;&gt; 00:31:43.480<br \/>Todd Smith: that you&#8217;ve got it already on there we can address both of those concern.<\/p>\n<p>233<br \/>00:31:43.680 &#8211;&gt; 00:31:50.430<br \/>Todd Smith: the traditional legacy websites or the software as a service new next generation website.<\/p>\n<p>234<br \/>00:31:51.020 &#8211;&gt; 00:32:03.319<br \/>Andy Whiteside: exactly in one pane of glass with with the same security controls on all the above it. It&#8217;s amazing. It really is amazing. And if you need a published desktop Vdi server based whatever. Hey? That&#8217;s there, too.<\/p>\n<p>235<br \/>00:32:03.680 &#8211;&gt; 00:32:04.360<br \/>Todd Smith: Yep.<\/p>\n<p>236<br \/>00:32:04.650 &#8211;&gt; 00:32:08.819<br \/>Andy Whiteside: it. It really is the most holistic end to end digital workspace platform on the planet.<\/p>\n<p>237<br \/>00:32:10.450 &#8211;&gt; 00:32:28.399<br \/>Andy Whiteside: Alright. Well, guys, I appreciate you jumping on maybe we&#8217;ll do this again next week. I&#8217;m not sure I don&#8217;t even know when the twenty-fifth is. I&#8217;m not sure. I think we may need a break from all the<\/p>\n<p>238<br \/>00:32:28.760 &#8211;&gt; 00:32:32.170<br \/>Todd Smith: the the chaos that tends to be Christmas morning.<\/p>\n<p>239<br \/>00:32:32.670 &#8211;&gt; 00:32:34.370<br \/>Geremy Meyers: That&#8217;s true.<\/p>\n<p>240<br \/>00:32:34.500 &#8211;&gt; 00:32:45.849<br \/>Geremy Meyers: my youngest is 8, so I&#8217;ll say little, especially compared to yours. You&#8217;ve got the college kids and Todd&#8217;s of are married. Now<\/p>\n<p>241<br \/>00:32:45.920 &#8211;&gt; 00:32:47.950<br \/>Todd Smith: I&#8217;m I&#8217;m on round 2 of<\/p>\n<p>242<br \/>00:32:48.620 &#8211;&gt; 00:32:52.439<br \/>Todd Smith: oh, you&#8217;re circling back. Okay? Okay, yes.<\/p>\n<p>243<br \/>00:32:52.510 &#8211;&gt; 00:33:00.330<br \/>Andy Whiteside: that&#8217;s exactly what I meant.<\/p>\n<p>244<br \/>00:33:00.550 &#8211;&gt; 00:33:22.830<br \/>Andy Whiteside: no matter what. Don&#8217;t show up your next Monday. We&#8217;ll take the day off. But, guys, I appreciate it. It&#8217;s been a great year, a lot of great conversations Monica has been fantastic to work with. We have a lot of great listeners. We don&#8217;t have enough. Great listeners cause what we talk about here in the Citrix world is is so applicable, and I guarantee you. I mean, it&#8217;s probably 95% or higher. The people don&#8217;t know what we just talked about, and they&#8217;re missing the boat<\/p>\n<p>245<br \/>00:33:23.690 &#8211;&gt; 00:33:27.010<br \/>Bill Sutton: and all they need to give us to be to whet their appetite.<\/p>\n<p>246<br \/>00:33:28.380 &#8211;&gt; 00:33:33.919<br \/>Andy Whiteside: It&#8217;s crazy. Alright, thank you. Enjoy the rest of your week.<\/p>\n<p><\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>In the dynamic landscape of enterprise browsing solutions, ensuring not just security but also comprehensive admin visibility is paramount. At Citrix, we take pride in our Citrix Enterprise Browser \u2014 &hellip;<\/p>","protected":false},"author":7,"featured_media":65995,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_price":"","_stock":"","_tribe_ticket_header":"","_tribe_default_ticket_provider":"","_tribe_ticket_capacity":"0","_ticket_start_date":"","_ticket_end_date":"","_tribe_ticket_show_description":"","_tribe_ticket_show_not_going":false,"_tribe_ticket_use_global_stock":"","_tribe_ticket_global_stock_level":"","_global_stock_mode":"","_global_stock_cap":"","_tribe_rsvp_for_event":"","_tribe_ticket_going_count":"","_tribe_ticket_not_going_count":"","_tribe_tickets_list":"[]","_tribe_ticket_has_attendee_info_fields":false,"footnotes":""},"categories":[5],"tags":[12],"class_list":["post-66001","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-podcast","tag-digital-workspace"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>152: The Citrix Session: Unveiling the power of Citrix Enterprise<\/title>\n<meta name=\"description\" content=\"Showcasing how Citrix Analytics Service for Security elevates the admin\u2019s ability to monitor, manage, and respond to potential risks.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/xentegra.com\/hi\/resources\/152-the-citrix-session-unveiling-the-power-of-citrix-enterprise-browsers-integration-with-citrix-analytics-service-for-security\/\" \/>\n<meta property=\"og:locale\" content=\"hi_IN\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"152: The Citrix Session: Unveiling the power of Citrix Enterprise\" \/>\n<meta property=\"og:description\" content=\"Showcasing how Citrix Analytics Service for Security elevates the admin\u2019s ability to monitor, manage, and respond to potential risks.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/xentegra.com\/hi\/resources\/152-the-citrix-session-unveiling-the-power-of-citrix-enterprise-browsers-integration-with-citrix-analytics-service-for-security\/\" \/>\n<meta property=\"og:site_name\" content=\"XenTegra\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/XenTegra\/\" \/>\n<meta property=\"article:published_time\" content=\"2023-12-19T23:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-01-29T20:15:11+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/eadn-wc05-13529174.nxedge.io\/wp-content\/uploads\/2024\/03\/Citrix-Session.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1100\" \/>\n\t<meta property=\"og:image:height\" content=\"600\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Chase Newmyer\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@xentegra\" \/>\n<meta name=\"twitter:site\" content=\"@xentegra\" \/>\n<meta name=\"twitter:label1\" content=\"\u0926\u094d\u0935\u093e\u0930\u093e \u0932\u093f\u0916\u093f\u0924\" \/>\n\t<meta name=\"twitter:data1\" content=\"Chase Newmyer\" \/>\n\t<meta name=\"twitter:label2\" content=\"\u0905\u0928\u0941\u092e\u093e\u0928\u093f\u0924 \u092a\u0922\u093c\u0928\u0947 \u0915\u093e \u0938\u092e\u092f\" \/>\n\t<meta name=\"twitter:data2\" content=\"35 \u092e\u093f\u0928\u091f\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/xentegra.com\\\/resources\\\/152-the-citrix-session-unveiling-the-power-of-citrix-enterprise-browsers-integration-with-citrix-analytics-service-for-security\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/xentegra.com\\\/resources\\\/152-the-citrix-session-unveiling-the-power-of-citrix-enterprise-browsers-integration-with-citrix-analytics-service-for-security\\\/\"},\"author\":{\"name\":\"Chase Newmyer\",\"@id\":\"https:\\\/\\\/xentegra.com\\\/#\\\/schema\\\/person\\\/84736408f096bfd92b80305aea8846a7\"},\"headline\":\"152: The Citrix Session: Unveiling the power of Citrix Enterprise Browser\u2019s integration with Citrix Analytics Service for Security\",\"datePublished\":\"2023-12-19T23:00:00+00:00\",\"dateModified\":\"2026-01-29T20:15:11+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/xentegra.com\\\/resources\\\/152-the-citrix-session-unveiling-the-power-of-citrix-enterprise-browsers-integration-with-citrix-analytics-service-for-security\\\/\"},\"wordCount\":7761,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/xentegra.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/xentegra.com\\\/resources\\\/152-the-citrix-session-unveiling-the-power-of-citrix-enterprise-browsers-integration-with-citrix-analytics-service-for-security\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/xentegra.com\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/Citrix-Session.png\",\"keywords\":[\"Digital Workspace\"],\"articleSection\":[\"Podcast\"],\"inLanguage\":\"hi-IN\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/xentegra.com\\\/resources\\\/152-the-citrix-session-unveiling-the-power-of-citrix-enterprise-browsers-integration-with-citrix-analytics-service-for-security\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/xentegra.com\\\/resources\\\/152-the-citrix-session-unveiling-the-power-of-citrix-enterprise-browsers-integration-with-citrix-analytics-service-for-security\\\/\",\"url\":\"https:\\\/\\\/xentegra.com\\\/resources\\\/152-the-citrix-session-unveiling-the-power-of-citrix-enterprise-browsers-integration-with-citrix-analytics-service-for-security\\\/\",\"name\":\"152: The Citrix Session: Unveiling the power of Citrix Enterprise\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/xentegra.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/xentegra.com\\\/resources\\\/152-the-citrix-session-unveiling-the-power-of-citrix-enterprise-browsers-integration-with-citrix-analytics-service-for-security\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/xentegra.com\\\/resources\\\/152-the-citrix-session-unveiling-the-power-of-citrix-enterprise-browsers-integration-with-citrix-analytics-service-for-security\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/xentegra.com\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/Citrix-Session.png\",\"datePublished\":\"2023-12-19T23:00:00+00:00\",\"dateModified\":\"2026-01-29T20:15:11+00:00\",\"description\":\"Showcasing how Citrix Analytics Service for Security elevates the admin\u2019s ability to monitor, manage, and respond to potential risks.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/xentegra.com\\\/resources\\\/152-the-citrix-session-unveiling-the-power-of-citrix-enterprise-browsers-integration-with-citrix-analytics-service-for-security\\\/#breadcrumb\"},\"inLanguage\":\"hi-IN\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/xentegra.com\\\/resources\\\/152-the-citrix-session-unveiling-the-power-of-citrix-enterprise-browsers-integration-with-citrix-analytics-service-for-security\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"hi-IN\",\"@id\":\"https:\\\/\\\/xentegra.com\\\/resources\\\/152-the-citrix-session-unveiling-the-power-of-citrix-enterprise-browsers-integration-with-citrix-analytics-service-for-security\\\/#primaryimage\",\"url\":\"https:\\\/\\\/xentegra.com\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/Citrix-Session.png\",\"contentUrl\":\"https:\\\/\\\/xentegra.com\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/Citrix-Session.png\",\"width\":1100,\"height\":600},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/xentegra.com\\\/resources\\\/152-the-citrix-session-unveiling-the-power-of-citrix-enterprise-browsers-integration-with-citrix-analytics-service-for-security\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/xentegra.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"152: The Citrix Session: Unveiling the power of Citrix Enterprise Browser\u2019s integration with Citrix Analytics Service for Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/xentegra.com\\\/#website\",\"url\":\"https:\\\/\\\/xentegra.com\\\/\",\"name\":\"XenTegra\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/xentegra.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/xentegra.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"hi-IN\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/xentegra.com\\\/#organization\",\"name\":\"XenTegra\",\"url\":\"https:\\\/\\\/xentegra.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"hi-IN\",\"@id\":\"https:\\\/\\\/xentegra.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/xentegra.com\\\/wp-content\\\/uploads\\\/2023\\\/06\\\/1519903807641-min.jpg\",\"contentUrl\":\"https:\\\/\\\/xentegra.com\\\/wp-content\\\/uploads\\\/2023\\\/06\\\/1519903807641-min.jpg\",\"width\":200,\"height\":200,\"caption\":\"XenTegra\"},\"image\":{\"@id\":\"https:\\\/\\\/xentegra.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/XenTegra\\\/\",\"https:\\\/\\\/x.com\\\/xentegra\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/xentegra-llc\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/xentegra.com\\\/#\\\/schema\\\/person\\\/84736408f096bfd92b80305aea8846a7\",\"name\":\"Chase Newmyer\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"hi-IN\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d46cd44f0bd433dc5a386cbac549c62fd92266e3951669c705b347be2130cca3?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d46cd44f0bd433dc5a386cbac549c62fd92266e3951669c705b347be2130cca3?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d46cd44f0bd433dc5a386cbac549c62fd92266e3951669c705b347be2130cca3?s=96&d=mm&r=g\",\"caption\":\"Chase Newmyer\"},\"url\":\"https:\\\/\\\/xentegra.com\\\/hi\\\/resources\\\/author\\\/chasenewmyer\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"152: The Citrix Session: Unveiling the power of Citrix Enterprise","description":"Showcasing how Citrix Analytics Service for Security elevates the admin\u2019s ability to monitor, manage, and respond to potential risks.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/xentegra.com\/hi\/resources\/152-the-citrix-session-unveiling-the-power-of-citrix-enterprise-browsers-integration-with-citrix-analytics-service-for-security\/","og_locale":"hi_IN","og_type":"article","og_title":"152: The Citrix Session: Unveiling the power of Citrix Enterprise","og_description":"Showcasing how Citrix Analytics Service for Security elevates the admin\u2019s ability to monitor, manage, and respond to potential risks.","og_url":"https:\/\/xentegra.com\/hi\/resources\/152-the-citrix-session-unveiling-the-power-of-citrix-enterprise-browsers-integration-with-citrix-analytics-service-for-security\/","og_site_name":"XenTegra","article_publisher":"https:\/\/www.facebook.com\/XenTegra\/","article_published_time":"2023-12-19T23:00:00+00:00","article_modified_time":"2026-01-29T20:15:11+00:00","og_image":[{"width":1100,"height":600,"url":"https:\/\/eadn-wc05-13529174.nxedge.io\/wp-content\/uploads\/2024\/03\/Citrix-Session.png","type":"image\/png"}],"author":"Chase Newmyer","twitter_card":"summary_large_image","twitter_creator":"@xentegra","twitter_site":"@xentegra","twitter_misc":{"\u0926\u094d\u0935\u093e\u0930\u093e \u0932\u093f\u0916\u093f\u0924":"Chase Newmyer","\u0905\u0928\u0941\u092e\u093e\u0928\u093f\u0924 \u092a\u0922\u093c\u0928\u0947 \u0915\u093e \u0938\u092e\u092f":"35 \u092e\u093f\u0928\u091f"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/xentegra.com\/resources\/152-the-citrix-session-unveiling-the-power-of-citrix-enterprise-browsers-integration-with-citrix-analytics-service-for-security\/#article","isPartOf":{"@id":"https:\/\/xentegra.com\/resources\/152-the-citrix-session-unveiling-the-power-of-citrix-enterprise-browsers-integration-with-citrix-analytics-service-for-security\/"},"author":{"name":"Chase Newmyer","@id":"https:\/\/xentegra.com\/#\/schema\/person\/84736408f096bfd92b80305aea8846a7"},"headline":"152: The Citrix Session: Unveiling the power of Citrix Enterprise Browser\u2019s integration with Citrix Analytics Service for Security","datePublished":"2023-12-19T23:00:00+00:00","dateModified":"2026-01-29T20:15:11+00:00","mainEntityOfPage":{"@id":"https:\/\/xentegra.com\/resources\/152-the-citrix-session-unveiling-the-power-of-citrix-enterprise-browsers-integration-with-citrix-analytics-service-for-security\/"},"wordCount":7761,"commentCount":0,"publisher":{"@id":"https:\/\/xentegra.com\/#organization"},"image":{"@id":"https:\/\/xentegra.com\/resources\/152-the-citrix-session-unveiling-the-power-of-citrix-enterprise-browsers-integration-with-citrix-analytics-service-for-security\/#primaryimage"},"thumbnailUrl":"https:\/\/eadn-wc05-13529174.nxedge.io\/wp-content\/uploads\/2024\/03\/Citrix-Session.png","keywords":["Digital Workspace"],"articleSection":["Podcast"],"inLanguage":"hi-IN","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/xentegra.com\/resources\/152-the-citrix-session-unveiling-the-power-of-citrix-enterprise-browsers-integration-with-citrix-analytics-service-for-security\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/xentegra.com\/resources\/152-the-citrix-session-unveiling-the-power-of-citrix-enterprise-browsers-integration-with-citrix-analytics-service-for-security\/","url":"https:\/\/xentegra.com\/resources\/152-the-citrix-session-unveiling-the-power-of-citrix-enterprise-browsers-integration-with-citrix-analytics-service-for-security\/","name":"152: The Citrix Session: Unveiling the power of Citrix Enterprise","isPartOf":{"@id":"https:\/\/xentegra.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/xentegra.com\/resources\/152-the-citrix-session-unveiling-the-power-of-citrix-enterprise-browsers-integration-with-citrix-analytics-service-for-security\/#primaryimage"},"image":{"@id":"https:\/\/xentegra.com\/resources\/152-the-citrix-session-unveiling-the-power-of-citrix-enterprise-browsers-integration-with-citrix-analytics-service-for-security\/#primaryimage"},"thumbnailUrl":"https:\/\/eadn-wc05-13529174.nxedge.io\/wp-content\/uploads\/2024\/03\/Citrix-Session.png","datePublished":"2023-12-19T23:00:00+00:00","dateModified":"2026-01-29T20:15:11+00:00","description":"Showcasing how Citrix Analytics Service for Security elevates the admin\u2019s ability to monitor, manage, and respond to potential risks.","breadcrumb":{"@id":"https:\/\/xentegra.com\/resources\/152-the-citrix-session-unveiling-the-power-of-citrix-enterprise-browsers-integration-with-citrix-analytics-service-for-security\/#breadcrumb"},"inLanguage":"hi-IN","potentialAction":[{"@type":"ReadAction","target":["https:\/\/xentegra.com\/resources\/152-the-citrix-session-unveiling-the-power-of-citrix-enterprise-browsers-integration-with-citrix-analytics-service-for-security\/"]}]},{"@type":"ImageObject","inLanguage":"hi-IN","@id":"https:\/\/xentegra.com\/resources\/152-the-citrix-session-unveiling-the-power-of-citrix-enterprise-browsers-integration-with-citrix-analytics-service-for-security\/#primaryimage","url":"https:\/\/eadn-wc05-13529174.nxedge.io\/wp-content\/uploads\/2024\/03\/Citrix-Session.png","contentUrl":"https:\/\/eadn-wc05-13529174.nxedge.io\/wp-content\/uploads\/2024\/03\/Citrix-Session.png","width":1100,"height":600},{"@type":"BreadcrumbList","@id":"https:\/\/xentegra.com\/resources\/152-the-citrix-session-unveiling-the-power-of-citrix-enterprise-browsers-integration-with-citrix-analytics-service-for-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/xentegra.com\/"},{"@type":"ListItem","position":2,"name":"152: The Citrix Session: Unveiling the power of Citrix Enterprise Browser\u2019s integration with Citrix Analytics Service for Security"}]},{"@type":"WebSite","@id":"https:\/\/xentegra.com\/#website","url":"https:\/\/xentegra.com\/","name":"\u091c\u093c\u0947\u0928\u091f\u0947\u0917\u094d\u0930\u093e","description":"","publisher":{"@id":"https:\/\/xentegra.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/xentegra.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"hi-IN"},{"@type":"Organization","@id":"https:\/\/xentegra.com\/#organization","name":"\u091c\u093c\u0947\u0928\u091f\u0947\u0917\u094d\u0930\u093e","url":"https:\/\/xentegra.com\/","logo":{"@type":"ImageObject","inLanguage":"hi-IN","@id":"https:\/\/xentegra.com\/#\/schema\/logo\/image\/","url":"https:\/\/eadn-wc05-13529174.nxedge.io\/wp-content\/uploads\/2023\/06\/1519903807641-min.jpg","contentUrl":"https:\/\/eadn-wc05-13529174.nxedge.io\/wp-content\/uploads\/2023\/06\/1519903807641-min.jpg","width":200,"height":200,"caption":"XenTegra"},"image":{"@id":"https:\/\/xentegra.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/XenTegra\/","https:\/\/x.com\/xentegra","https:\/\/www.linkedin.com\/company\/xentegra-llc"]},{"@type":"Person","@id":"https:\/\/xentegra.com\/#\/schema\/person\/84736408f096bfd92b80305aea8846a7","name":"Chase Newmyer","image":{"@type":"ImageObject","inLanguage":"hi-IN","@id":"https:\/\/secure.gravatar.com\/avatar\/d46cd44f0bd433dc5a386cbac549c62fd92266e3951669c705b347be2130cca3?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d46cd44f0bd433dc5a386cbac549c62fd92266e3951669c705b347be2130cca3?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d46cd44f0bd433dc5a386cbac549c62fd92266e3951669c705b347be2130cca3?s=96&d=mm&r=g","caption":"Chase Newmyer"},"url":"https:\/\/xentegra.com\/hi\/resources\/author\/chasenewmyer\/"}]}},"_links":{"self":[{"href":"https:\/\/xentegra.com\/hi\/wp-json\/wp\/v2\/posts\/66001","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/xentegra.com\/hi\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/xentegra.com\/hi\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/xentegra.com\/hi\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/xentegra.com\/hi\/wp-json\/wp\/v2\/comments?post=66001"}],"version-history":[{"count":1337,"href":"https:\/\/xentegra.com\/hi\/wp-json\/wp\/v2\/posts\/66001\/revisions"}],"predecessor-version":[{"id":717024,"href":"https:\/\/xentegra.com\/hi\/wp-json\/wp\/v2\/posts\/66001\/revisions\/717024"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/xentegra.com\/hi\/wp-json\/wp\/v2\/media\/65995"}],"wp:attachment":[{"href":"https:\/\/xentegra.com\/hi\/wp-json\/wp\/v2\/media?parent=66001"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/xentegra.com\/hi\/wp-json\/wp\/v2\/categories?post=66001"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/xentegra.com\/hi\/wp-json\/wp\/v2\/tags?post=66001"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}