{"id":66059,"date":"2021-11-01T18:00:00","date_gmt":"2021-11-01T22:00:00","guid":{"rendered":"http:\/\/74d2948405.nxcli.io\/resources\/93-the-citrix-session-citrix-and-chrome-os-secure-seamless-access-to-all-your-apps-for-all-your-employees\/"},"modified":"2026-01-30T12:19:28","modified_gmt":"2026-01-30T17:19:28","slug":"93-the-citrix-session-citrix-and-chrome-os-secure-seamless-access-to-all-your-apps-for-all-your-employees","status":"publish","type":"post","link":"https:\/\/xentegra.com\/hi\/resources\/93-the-citrix-session-citrix-and-chrome-os-secure-seamless-access-to-all-your-apps-for-all-your-employees\/","title":{"rendered":"93: The Citrix Session: Citrix and Chrome OS: Secure Access to All Your Apps"},"content":{"rendered":"<p><iframe loading=\"lazy\" src=\"https:\/\/www.buzzsprout.com\/670066\/9471418-the-citrix-session-citrix-and-chrome-os-secure-seamless-access-to-all-your-apps-for-all-your-employees?iframe=true\" scrolling=\"no\" width=\"100%\" height=\"200\" frameborder=\"0\" style=\"width: 100%;height: 200px\"><\/iframe><\/p>\n<p>Citrix and Chrome OS are joining forces to enable greater employee productivity through secure and seamless access to all your apps apps and the internet for all your employees everywhere, all while reducing the burden on IT. Chrome OS devices are providing an increasing number of organizations with built-in security functions and simpler device management. Citrix and Chrome OS devices broaden the variety of available apps and adds multi-layer cybersecurity protection for users everywhere.<\/p>\n<p>The partnership between Citrix and Chrome OS will deliver IT modernization that spans from endpoint devices to enterprise security architecture to apps. This will empower employees to be more productive, while protecting the enterprise against increasingly sophisticated cyberthreats.<\/p>\n<p>\u0939\u094b\u0938\u094d\u091f: \u090f\u0902\u0921\u0940 \u0935\u094d\u0939\u093e\u0907\u091f\u0938\u093e\u0907\u0921<br \/>\u0938\u0939-\u092e\u0947\u091c\u092c\u093e\u0928: \u092c\u093f\u0932 \u0938\u091f\u0928<br \/>\u0938\u0939-\u092e\u0947\u091c\u092c\u093e\u0928: \u092c\u0947\u0928 \u0930\u094b\u091c\u0930\u094d\u0938<br \/>Guest: Akshay Kakar<\/p>\n<div class=\"transcript\">\n<p><!--block-->\u0935\u0947\u092c\u0935\u0940\u091f\u0940\u091f\u0940<\/p>\n<p>1<br \/>00:00:02.340 &#8211;&gt; 00:00:09.389<br \/>Andy Whiteside: Hello everyone and welcome to episode 93 of the citrix session i&#8217;m your host Andy whites and we&#8217;re getting close but we&#8217;re getting close almost up to 100.<\/p>\n<p>2<br \/>00:00:10.170 &#8211;&gt; 00:00:12.420<br \/>Bill Sutton: yeah getting getting almost there it&#8217;s right.<\/p>\n<p>3<br \/>00:00:12.990 &#8211;&gt; 00:00:15.960<br \/>Andy Whiteside: We got to start thinking about how we&#8217;re going to celebrate and knowing the two of us.<\/p>\n<p>4<br \/>00:00:17.160 &#8211;&gt; 00:00:18.119<br \/>Andy Whiteside: We probably won&#8217;t do a whole lot.<\/p>\n<p>5<br \/>00:00:20.190 &#8211;&gt; 00:00:28.530<br \/>Andy Whiteside: So I got bill sudden with me bill director of services bill i&#8217;m going to i&#8217;m going to publicly acknowledge you for all the great work you&#8217;re doing here it&#8217;s INTEGRA.<\/p>\n<p>6<br \/>00:00:29.520 &#8211;&gt; 00:00:34.860<br \/>Andy Whiteside: takes a lot off of me, and I just want to make sure the world knows that without you and a couple other people wouldn&#8217;t get done so thank you.<\/p>\n<p>7<br \/>00:00:35.700 &#8211;&gt; 00:00:46.830<br \/>Bill Sutton: I appreciate that Andy yeah it&#8217;s a it can be challenging sometimes but it&#8217;s all good you know we we try to get it done for our customers that&#8217;s really what it boils down to and our partners that&#8217;s what it boils down to.<\/p>\n<p>8<br \/>00:00:47.310 &#8211;&gt; 00:00:58.470<br \/>Andy Whiteside: I think the sort of way to measure it is I don&#8217;t have partners, I don&#8217;t have customers that complain ever always know we could do better, I would get that better consultant methodology is odd stuff I mean nobody complains anymore, and things get taken care of that&#8217;s.<\/p>\n<p>9<br \/>00:00:58.740 &#8211;&gt; 00:00:59.760<br \/>Bill Sutton: Huge yeah.<\/p>\n<p>10<br \/>00:01:00.810 &#8211;&gt; 00:01:08.520<br \/>Andy Whiteside: it&#8217;s kinda like waiting tables it&#8217;s kind of a restaurant business is kind of a thankless job, nobody talks to you until something goes wrong, and I don&#8217;t give him any complaints which is great.<\/p>\n<p>11<br \/>00:01:08.970 &#8211;&gt; 00:01:15.600<br \/>Bill Sutton: Well that&#8217;s good yeah but you&#8217;re right, it can be can seem thankless it sometimes, but every once in a while you hear something like this, or.<\/p>\n<p>12<br \/>00:01:15.960 &#8211;&gt; 00:01:25.410<br \/>Bill Sutton: You have a customer says you guys just really did a great job and kind of makes it all worthwhile, you know all the all the frustrations that that that follow up to that kind of go away yeah.<\/p>\n<p>13<br \/>00:01:25.920 &#8211;&gt; 00:01:31.290<br \/>Andy Whiteside: yeah get more get proactive thank yous very little if any complaints which sounds good.<\/p>\n<p>14<br \/>00:01:32.340 &#8211;&gt; 00:01:40.470<br \/>Andy Whiteside: Well, I got been Rogers on been used to be it director he knows all about complaints and not getting enough accolades bill and pen Ben how&#8217;s it going.<\/p>\n<p>15<br \/>00:01:41.460 &#8211;&gt; 00:01:49.680<br \/>Ben Rogers: i&#8217;m doing well, and the day after Halloween so we went out and did some spooky things last night and try and stay away from the candy bowl this morning.<\/p>\n<p>16<br \/>00:01:50.310 &#8211;&gt; 00:01:53.460<br \/>Andy Whiteside: I can only imagine with your personality, you probably have a really good time with Halloween not sure.<\/p>\n<p>17<br \/>00:01:54.720 &#8211;&gt; 00:02:01.530<br \/>Ben Rogers: We had a blast man plus I live in a very large neighborhood with a lot of kids a lot of decoration so yeah I mean we blow it out.<\/p>\n<p>18<br \/>00:02:01.830 &#8211;&gt; 00:02:04.230<br \/>Andy Whiteside: Is your is your kid out of school today, and he had to go to school.<\/p>\n<p>19<br \/>00:02:05.040 &#8211;&gt; 00:02:17.220<br \/>Ben Rogers: Oh no they had to go to school, so it was funny by about nine 930 all the parents were showing all the kids back in getting ready for bed yeah all the kids kind of have a little sleepy I this morning, but they got candy to get them through.<\/p>\n<p>20<br \/>00:02:17.880 &#8211;&gt; 00:02:24.750<br \/>Andy Whiteside: The local school system here a lot of them actually have a teacher work day, just so conveniently the day after Halloween so it kind of works out for them, but.<\/p>\n<p>21<br \/>00:02:25.020 &#8211;&gt; 00:02:34.440<br \/>Andy Whiteside: Not my kids my kids had to get up all my actually my high school kid the high school started late like they gave in and started late, the day after Halloween, I guess, they just know they weren&#8217;t they knew they weren&#8217;t going to be there on.<\/p>\n<p>22<br \/>00:02:34.440 &#8211;&gt; 00:02:34.740<br \/>Time.<\/p>\n<p>23<br \/>00:02:36.390 &#8211;&gt; 00:02:37.560<br \/>Andy Whiteside: kind of said kinda.<\/p>\n<p>24<br \/>00:02:37.710 &#8211;&gt; 00:02:43.050<br \/>Bill Sutton: yeah are sad today off and tomorrow is an election in Virginia so they&#8217;re all for two days.<\/p>\n<p>25<br \/>00:02:44.760 &#8211;&gt; 00:02:49.410<br \/>Andy Whiteside: yeah well guys, we have a special guest with this akshay cars, did I say it right.<\/p>\n<p>26<br \/>00:02:49.950 &#8211;&gt; 00:02:50.580<br \/>akshaykakar: Yes, yeah.<\/p>\n<p>27<br \/>00:02:51.630 &#8211;&gt; 00:02:56.070<br \/>Andy Whiteside: Thank you for joining us we&#8217;re going to review your blog in a minute, you want to give us a little background yourself.<\/p>\n<p>28<br \/>00:02:56.700 &#8211;&gt; 00:03:05.760<br \/>akshaykakar: Show so firstly happy to be here, thank you for inviting me actually I got better i&#8217;m on the product marketing team for citrix I work on citrix is.<\/p>\n<p>29<br \/>00:03:06.450 &#8211;&gt; 00:03:17.010<br \/>akshaykakar: cloud security product it&#8217;s called citrix secure Internet access, we launched earlier this year on February 3 and with the greatest of all the customers that we have and all.<\/p>\n<p>30<br \/>00:03:18.000 &#8211;&gt; 00:03:33.060<br \/>akshaykakar: Of all the folks like yourself that have been talking about us we&#8217;ve actually gained significant traction in the market so we&#8217;ve seen customers and seen enterprises wants to beef up their cyber security architecture and we are engaging with them on that.<\/p>\n<p>31<br \/>00:03:34.170 &#8211;&gt; 00:03:39.900<br \/>akshaykakar: Before those have been in the cyber security space have been in the networking space product management, as well as product marketing.<\/p>\n<p>32<br \/>00:03:40.200 &#8211;&gt; 00:03:41.400<br \/>Andy Whiteside: yeah where do you live.<\/p>\n<p>33<br \/>00:03:42.390 &#8211;&gt; 00:03:44.400<br \/>akshaykakar: I am in the Silicon Valley area.<\/p>\n<p>34<br \/>00:03:44.640 &#8211;&gt; 00:03:51.000<br \/>Andy Whiteside: Okay awesome awesome i&#8217;m sure we&#8217;ll get into this I don&#8217;t wanna I don&#8217;t wanna steal our thunder from the blog but I appreciate you joining in.<\/p>\n<p>35<br \/>00:03:51.210 &#8211;&gt; 00:04:02.610<br \/>Andy Whiteside: it&#8217;s interesting to see citrix in this space and look i&#8217;ve thought for 20 years now, the idea that you could remotely access something, but not actually get X like download it you turn off printing turn off file transfer.<\/p>\n<p>36<br \/>00:04:03.060 &#8211;&gt; 00:04:16.560<br \/>Andy Whiteside: citrix to me has been a security play for over 25 years now it&#8217;s interesting to watch citrix turn it into a full product ties and evolve, the offerings if you don&#8217;t think of citrix as a security play you&#8217;re missing you&#8217;re missing an opportunity for sure.<\/p>\n<p>37<br \/>00:04:17.280 &#8211;&gt; 00:04:28.560<br \/>akshaykakar: i&#8217;m glad you said that yeah so that is a lot of folks think of citrix is just being just being able to access certain applications but they kind of forget the security aspects of it.<\/p>\n<p>38<br \/>00:04:29.550 &#8211;&gt; 00:04:42.990<br \/>akshaykakar: And there is a lot of productivity related features in citrix where you have one place to access all the business critical applications, but the the security that goes behind it and that&#8217;s embedded in it is a major part of the DNA as well.<\/p>\n<p>39<br \/>00:04:44.220 &#8211;&gt; 00:04:50.610<br \/>Andy Whiteside: hey been Rogers I know you&#8217;re a well i&#8217;m gonna say it, the way it popped in my brain don&#8217;t take offense to this, I know you&#8217;re a security nut.<\/p>\n<p>40<br \/>00:04:52.590 &#8211;&gt; 00:04:56.550<br \/>Andy Whiteside: thoughts on the general idea of citrix being a security play before we jump into this specific log.<\/p>\n<p>41<br \/>00:04:57.570 &#8211;&gt; 00:05:08.850<br \/>Ben Rogers: Well, you know i&#8217;ve always for years, explained it to the companies that i&#8217;ve worked for that citrix provides a window into the environment where things like a vpn actually bust a hole through it so.<\/p>\n<p>42<br \/>00:05:09.570 &#8211;&gt; 00:05:18.600<br \/>Ben Rogers: Man the concept has been reverberating across the industry for so long, I think we take it for granted, but it is truly a security play because you lock people out.<\/p>\n<p>43<br \/>00:05:18.900 &#8211;&gt; 00:05:26.460<br \/>Ben Rogers: You give people access to web interfaces you never really let them into the environment, like you do with a vpn or any other technology for that so.<\/p>\n<p>44<br \/>00:05:26.760 &#8211;&gt; 00:05:35.700<br \/>Ben Rogers: that&#8217;s kind of how i&#8217;ve been explaining it for years to corporations i&#8217;ve worked for and i&#8217;m now glad to see we&#8217;re finally getting the recognition that we deserve on that in yeah.<\/p>\n<p>45<br \/>00:05:36.690 &#8211;&gt; 00:05:49.140<br \/>Andy Whiteside: I often use the example of WikiLeaks the guy downloaded 10,000 documents he would have had to take in screen prints of every document every every page of every document to get the same thing WikiLeaks wouldn&#8217;t have happened.<\/p>\n<p>46<br \/>00:05:51.330 &#8211;&gt; 00:05:51.810<br \/>Bill Sutton: very true.<\/p>\n<p>47<br \/>00:05:51.840 &#8211;&gt; 00:05:52.320<br \/>Ben Rogers: very true.<\/p>\n<p>48<br \/>00:05:53.370 &#8211;&gt; 00:05:56.580<br \/>Andy Whiteside: Alright, so let&#8217;s jump into the intro here actually.<\/p>\n<p>49<br \/>00:05:56.970 &#8211;&gt; 00:06:10.950<br \/>Andy Whiteside: Tell us what you&#8217;re setting up below the hold on before I do that now this recent blog the name of the title of it citrix and chrome os secure seamless access to all your Apps for all your employees actually tell us what we&#8217;re trying to talk through here in the introduction section.<\/p>\n<p>50<br \/>00:06:11.700 &#8211;&gt; 00:06:28.470<br \/>akshaykakar: Absolutely so um Google and citrix have had a long standing relationship right they&#8217;ve been they&#8217;ve been working together and in multiple areas, especially in the in the citrix workspace front earlier and the diaspora, and what we are trying to do this time is there is this.<\/p>\n<p>51<br \/>00:06:29.520 &#8211;&gt; 00:06:35.580<br \/>akshaykakar: there&#8217;s this relationship that we built with the chrome os business unit or the chrome enterprise business unit within Google.<\/p>\n<p>52<br \/>00:06:36.180 &#8211;&gt; 00:06:44.250<br \/>akshaykakar: And the way we work in this is that we see the chrome os device with the chrome enterprise solution on top of it.<\/p>\n<p>53<br \/>00:06:44.550 &#8211;&gt; 00:06:57.060<br \/>akshaykakar: Is a very robust device so that that device by itself has a whole lot of security features in it it&#8217;s it&#8217;s an encrypted device there&#8217;s very little data that is stored on the device as a whole lot of security policy that you can device that you can create on the device.<\/p>\n<p>54<br \/>00:06:57.840 &#8211;&gt; 00:07:01.530<br \/>akshaykakar: And what we&#8217;re saying is that listen for enterprises to be fully successful.<\/p>\n<p>55<br \/>00:07:02.610 &#8211;&gt; 00:07:10.710<br \/>akshaykakar: and productive, you need two things you need one, the employees should have access to whatever applications, they want so, even if that is a.<\/p>\n<p>56<br \/>00:07:11.610 &#8211;&gt; 00:07:19.110<br \/>akshaykakar: That is an older applications a an older Linux application or a polar windows application, that is, we run that chrome os device.<\/p>\n<p>57<br \/>00:07:19.380 &#8211;&gt; 00:07:26.730<br \/>akshaykakar: We make that happen and then we&#8217;ll give you a multi layered security model on top of the chrome os device, and I can talk to that in more detail if you would like me to.<\/p>\n<p>58<br \/>00:07:27.420 &#8211;&gt; 00:07:30.690<br \/>akshaykakar: That what you&#8217;re doing is this relationship with the chrome os business unit.<\/p>\n<p>59<br \/>00:07:30.990 &#8211;&gt; 00:07:38.070<br \/>akshaykakar: Where we broaden the applications that you can use in chrome os device and we give them better security we build on to that existing security.<\/p>\n<p>60<br \/>00:07:39.000 &#8211;&gt; 00:07:47.190<br \/>Andy Whiteside: So we can jump through the blog and talk through I think you&#8217;re probably going to flush out the questions I have, but my first thought is you know, a Linux based chrome.<\/p>\n<p>61<br \/>00:07:47.190 &#8211;&gt; 00:07:55.320<br \/>Andy Whiteside: device is somewhat secure, to start with is that is that part of the baseline here and what you mean by it starts with a modern device.<\/p>\n<p>62<br \/>00:07:55.710 &#8211;&gt; 00:08:02.220<br \/>akshaykakar: yeah, so it is yeah so the homeboys device is a secure device you&#8217;re absolutely right, it is a basic device it&#8217;s a.<\/p>\n<p>63<br \/>00:08:02.910 &#8211;&gt; 00:08:06.660<br \/>akshaykakar: it&#8217;s a lightweight device in the sense that it&#8217;s very easy to provision and drop ship.<\/p>\n<p>64<br \/>00:08:07.470 &#8211;&gt; 00:08:11.070<br \/>akshaykakar: If you&#8217;ve got new work and, if you want to just ship them a device, and they log into that.<\/p>\n<p>65<br \/>00:08:11.490 &#8211;&gt; 00:08:17.880<br \/>akshaykakar: credentials and access all the applications to workspace so it&#8217;s super simple to manage is already a secure device.<\/p>\n<p>66<br \/>00:08:18.090 &#8211;&gt; 00:08:29.670<br \/>akshaykakar: As I mentioned here it&#8217;s got that I can see chip it&#8217;s got in built in data encryption Google safe browsing a whole lot of cool features So yes, it starts with that modern device, but as mobile that we add on to that.<\/p>\n<p>67<br \/>00:08:30.150 &#8211;&gt; 00:08:33.150<br \/>akshaykakar: And that&#8217;s what we&#8217;ve covered in the in the rest of the interest of the blog.<\/p>\n<p>68<br \/>00:08:33.270 &#8211;&gt; 00:08:40.140<br \/>Andy Whiteside: So let me, let me go to been real quick been I know you are adopting I gel Linux at one point, so you are going down the Linux But first let me ask the Group.<\/p>\n<p>69<br \/>00:08:40.530 &#8211;&gt; 00:08:46.830<br \/>Andy Whiteside: This is Google chrome os but it&#8217;s really Linux under the covers is that is that the right way to say it&#8217;s how i&#8217;ve been saying is that right.<\/p>\n<p>70<br \/>00:08:48.840 &#8211;&gt; 00:09:00.150<br \/>Ben Rogers: I think so, you know i&#8217;ve got a little bit of a different thought about this process, though I kind of consider these mobile devices almost sacrificial lambs.<\/p>\n<p>71<br \/>00:09:00.570 &#8211;&gt; 00:09:08.520<br \/>Ben Rogers: If you have the cloud technology right and you&#8217;re delivering applications virtually which we can do, obviously, but you know google&#8217;s getting into that game as well.<\/p>\n<p>72<br \/>00:09:09.180 &#8211;&gt; 00:09:16.560<br \/>Ben Rogers: i&#8217;m kind of beginning to see the phase of what does it matter what&#8217;s on the endpoint, you know as long as the back end that they&#8217;re going to should care.<\/p>\n<p>73<br \/>00:09:16.890 &#8211;&gt; 00:09:24.630<br \/>Ben Rogers: And i&#8217;m interested to see what the Group thinks about that, because, as our guests was talking, I was thinking to myself now we&#8217;re getting away from worrying about the.<\/p>\n<p>74<br \/>00:09:25.020 &#8211;&gt; 00:09:37.170<br \/>Ben Rogers: endpoint device and now we&#8217;re really are coming into a bring your own device and lightweight Google devices are but i&#8217;m also beginning to see in the next four to five years, maybe we get to where we really don&#8217;t care about what&#8217;s on the employee.<\/p>\n<p>75<br \/>00:09:37.410 &#8211;&gt; 00:09:43.410<br \/>Andy Whiteside: Well then, let me, and I would want to get everybody&#8217;s opinion as I promised I do want to highlight what just happened as integrity within the last few weeks.<\/p>\n<p>76<br \/>00:09:43.800 &#8211;&gt; 00:09:50.250<br \/>Andy Whiteside: We started the integrity of the idea of going to give you money you bring your own device will have a secure cloud you connect it I don&#8217;t care what your endpoint is.<\/p>\n<p>77<br \/>00:09:50.790 &#8211;&gt; 00:09:57.030<br \/>Andy Whiteside: we&#8217;ve now learned that that sounds like nirvana but we can&#8217;t quite get there, even though this is what we do for a living.<\/p>\n<p>78<br \/>00:09:57.300 &#8211;&gt; 00:10:07.920<br \/>Andy Whiteside: We still are now going back to controlling the endpoint device because we can&#8217;t just let it be the wild Wild West, even though, as you just stated a big chunk of this is all about what the backend looks like.<\/p>\n<p>79<br \/>00:10:08.340 &#8211;&gt; 00:10:14.310<br \/>Andy Whiteside: But we have consultants and we have sales people going into other environments, allowing them to take a is INTEGRA endorsed in.<\/p>\n<p>80<br \/>00:10:14.550 &#8211;&gt; 00:10:24.240<br \/>Andy Whiteside: device into their environment, as more than the that I can allow at this point so even though i&#8217;m one of the biggest preachers of what you just said, I can&#8217;t I can&#8217;t even do it myself but.<\/p>\n<p>81<br \/>00:10:24.270 &#8211;&gt; 00:10:34.740<br \/>akshaykakar: So i&#8217;m just gonna happen so Andy we are, we are whatever you&#8217;re saying we&#8217;re seeing we&#8217;re seeing more and more of that so we what we have coming to see is this managed byob model, if you will.<\/p>\n<p>82<br \/>00:10:35.130 &#8211;&gt; 00:10:38.640<br \/>akshaykakar: So, if any, wants to bring a chrome os device if bill wants to bring.<\/p>\n<p>83<br \/>00:10:39.600 &#8211;&gt; 00:10:46.620<br \/>akshaykakar: A windows device and Ben wants to bring a MAC os we want to be able to give you that level of flexibility, you bring in whatever operating system, you want.<\/p>\n<p>84<br \/>00:10:46.950 &#8211;&gt; 00:10:50.340<br \/>akshaykakar: To but here we are going to throw in a couple of agents on that operating system.<\/p>\n<p>85<br \/>00:10:51.210 &#8211;&gt; 00:11:01.950<br \/>akshaykakar: and to ensure that, regardless of what operating system you&#8217;re using you are secure on that operating system, regardless of where you are from a physical location perspective, regardless of what application you&#8217;re using.<\/p>\n<p>86<br \/>00:11:02.430 &#8211;&gt; 00:11:17.400<br \/>akshaykakar: And that&#8217;s essentially and also the the the so that&#8217;s the security aspect and the other aspect of that is hey you want to be able to access any application whatsoever, so the operating system should not be a limiting factor be open to the applications that to get you on access.<\/p>\n<p>87<br \/>00:11:19.050 &#8211;&gt; 00:11:30.570<br \/>Andy Whiteside: let&#8217;s let&#8217;s get you build a chance to speak he&#8217;s the ones got the consultants out doing doing the thing carrying around their own personal devices that we&#8217;ve allowed bill your thoughts on this whole you&#8217;ve been around forever what&#8217;s your thoughts.<\/p>\n<p>88<br \/>00:11:30.630 &#8211;&gt; 00:11:43.860<br \/>Bill Sutton: yeah I mean to your point Andy the the Holy Grail is is the is the device that that we can we can, in theory, lose or get stolen and not have to worry about any data or any other information being on that device and.<\/p>\n<p>89<br \/>00:11:44.460 &#8211;&gt; 00:11:56.400<br \/>Bill Sutton: Certainly the Google ios chrome os is is one that would satisfy that but it like you said, there are certain other challenges we have that that kind of lend themselves to a more of a byob or more.<\/p>\n<p>90<br \/>00:11:57.240 &#8211;&gt; 00:12:00.480<br \/>Bill Sutton: More extensive operating system like like windows or MAC.<\/p>\n<p>91<br \/>00:12:01.080 &#8211;&gt; 00:12:09.570<br \/>Bill Sutton: But we need we definitely need to start controlling those devices better and managing them so that we can we can control where the data is because that&#8217;s really my biggest.<\/p>\n<p>92<br \/>00:12:09.780 &#8211;&gt; 00:12:19.320<br \/>Bill Sutton: concern of any of everything is you know i&#8217;ve got consultants that are doing videos and things like that a customer environments and that that information needs to be kept secure and encrypted and.<\/p>\n<p>93<br \/>00:12:19.710 &#8211;&gt; 00:12:28.680<br \/>Bill Sutton: We want to make sure we have some control over it, and, and one way to do that would certainly be put it in in my data Center and only restrict access to it via.<\/p>\n<p>94<br \/>00:12:29.460 &#8211;&gt; 00:12:39.900<br \/>Bill Sutton: Via see dad from an from an endpoint but then that that consultant might be in a secure environment where they don&#8217;t have Internet access, and they need access to that in that document that this is not unique.<\/p>\n<p>95<br \/>00:12:40.320 &#8211;&gt; 00:12:46.410<br \/>Bill Sutton: To to our business, I mean I can remember doing this for law firms years ago and we had the same arguments that.<\/p>\n<p>96<br \/>00:12:46.710 &#8211;&gt; 00:12:59.790<br \/>Bill Sutton: My attorney needs to be able to access this data when he&#8217;s in trial and they don&#8217;t have Internet access now that&#8217;s not as much of the case now, but nevertheless there there&#8217;s so many factors that go into this that it&#8217;s not one size fits all anymore.<\/p>\n<p>97<br \/>00:13:00.510 &#8211;&gt; 00:13:07.800<br \/>Andy Whiteside: So so being we all just went around the Horn and said we love what you&#8217;re talking about but it&#8217;s not realistic what&#8217;s your what&#8217;s your thoughts and now that we&#8217;ve come back around to them.<\/p>\n<p>98<br \/>00:13:08.310 &#8211;&gt; 00:13:17.490<br \/>Ben Rogers: Well, I can I can put myself in every administrator shoes everybody&#8217;s got a boss that wants to access their files why they&#8217;re on a plane.<\/p>\n<p>99<br \/>00:13:17.760 &#8211;&gt; 00:13:22.950<br \/>Ben Rogers: And that&#8217;s what kills some of this and I came from that environment as much as I would try to look at my.<\/p>\n<p>100<br \/>00:13:23.370 &#8211;&gt; 00:13:31.440<br \/>Ben Rogers: Old CEO and say Mary you really don&#8217;t need to worry about it, she would look at me and go, what if what if it&#8217;s those what, if so, what I miss.<\/p>\n<p>101<br \/>00:13:31.650 &#8211;&gt; 00:13:37.440<br \/>Ben Rogers: What if i&#8217;m on a plane and I don&#8217;t have access, you know now planes are getting much more connected with the world and.<\/p>\n<p>102<br \/>00:13:37.950 &#8211;&gt; 00:13:43.890<br \/>Ben Rogers: That that seems to be going away, but I guess there, there are still spots in the world where you would see i&#8217;ve got to have.<\/p>\n<p>103<br \/>00:13:44.310 &#8211;&gt; 00:13:54.360<br \/>Ben Rogers: The physical access to the environment, so I can do my job I in a federal bunker somewhere and nowhere, whereas integrity technicians being asked to do something that&#8217;s highly.<\/p>\n<p>104<br \/>00:13:55.560 &#8211;&gt; 00:13:56.520<br \/>Ben Rogers: You know, secretive.<\/p>\n<p>105<br \/>00:13:58.110 &#8211;&gt; 00:14:11.760<br \/>Andy Whiteside: I think you guys are highlighting that if we can get a large percentage of our users working that way with a secure device that&#8217;s owned by them are owned by us and accessing data that they never really have local access to that&#8217;s a big part of the big part of the win right there.<\/p>\n<p>106<br \/>00:14:12.120 &#8211;&gt; 00:14:18.030<br \/>akshaykakar: Exactly, I think it depends a lot on if you kind of segment your employee base, if you will.<\/p>\n<p>107<br \/>00:14:18.330 &#8211;&gt; 00:14:25.230<br \/>akshaykakar: That is going to be a certain segment of employees that require that Okay, I need to be able to, for instance in a heightened industry right or.<\/p>\n<p>108<br \/>00:14:25.530 &#8211;&gt; 00:14:29.550<br \/>akshaykakar: an industry where you just for whatever reason, need to provision devices really quickly.<\/p>\n<p>109<br \/>00:14:30.150 &#8211;&gt; 00:14:45.600<br \/>akshaykakar: i&#8217;m in those industries yeah you want that kind of a device that such as a chrome os which is super simple to manage and which is, which is secure, but yeah if in certain other industries you&#8217;re going to need a device that has a whole lot of local storage that has that compute power.<\/p>\n<p>110<br \/>00:14:47.160 &#8211;&gt; 00:14:48.690<br \/>akshaykakar: I mean in marketing i&#8217;ve worked with folks that.<\/p>\n<p>111<br \/>00:14:49.320 &#8211;&gt; 00:14:55.620<br \/>akshaykakar: Are hardcore graphic designers and they just they need certain devices with certain applications sitting on those devices.<\/p>\n<p>112<br \/>00:14:55.920 &#8211;&gt; 00:15:01.230<br \/>akshaykakar: So it really is a lot, but that flexibility of being able to choose the device that you want.<\/p>\n<p>113<br \/>00:15:01.500 &#8211;&gt; 00:15:11.880<br \/>akshaykakar: And that flexibility of hey if I have chrome os devices, I want to be able to use any application, and I want to be able to use it&#8217;s a goalie that&#8217;s what that&#8217;s what we&#8217;re working with Google to provide.<\/p>\n<p>114<br \/>00:15:12.870 &#8211;&gt; 00:15:25.440<br \/>Andy Whiteside: So actually this the second section of your blog is the title of it was it starts with a modern device we&#8217;ve talked a lot is there anything in this section that we&#8217;ve skipped that you think is relevant, that we point out before we move on to the rest of the article.<\/p>\n<p>115<br \/>00:15:25.920 &#8211;&gt; 00:15:31.800<br \/>akshaykakar: I think I think it&#8217;s um what so everything that you guys pointed out, is is completely irrelevant it.<\/p>\n<p>116<br \/>00:15:32.520 &#8211;&gt; 00:15:39.540<br \/>akshaykakar: We there was some new news articles earlier this year if i&#8217;m not mistaken, that show that chrome glasses is growing very rapidly so.<\/p>\n<p>117<br \/>00:15:40.050 &#8211;&gt; 00:15:50.640<br \/>akshaykakar: We are beginning to get into these situations where a lot of people do have Internet access, a lot of people are working from home and a lot of industries are opening to chrome os devices.<\/p>\n<p>118<br \/>00:15:51.480 &#8211;&gt; 00:15:57.990<br \/>akshaykakar: And so what we are seeing is that that that increased adoption of chrome os devices and Google wanting to back it up, obviously.<\/p>\n<p>119<br \/>00:15:58.560 &#8211;&gt; 00:16:13.860<br \/>akshaykakar: And with that growth so all i&#8217;m trying to say is that hey, it is a great operating system, it is entering the mainstream arena of primary operating systems and yeah for our listeners out that they give give it a give it a give a talk it&#8217;s a good device.<\/p>\n<p>120<br \/>00:16:16.020 &#8211;&gt; 00:16:29.130<br \/>Andy Whiteside: i&#8217;ll just double down on that real quick, the idea that a lot of things are browser based and you throw it technologies like citrix into the mix managed by your corporate environments there&#8217;s a lot, you can do that&#8217;s real these days versus the theoretical that we used to.<\/p>\n<p>121<br \/>00:16:30.330 &#8211;&gt; 00:16:33.660<br \/>Andy Whiteside: tell people we were heading to and maybe going made that more real.<\/p>\n<p>122<br \/>00:16:35.250 &#8211;&gt; 00:16:45.690<br \/>Andy Whiteside: Okay, our next section, the title of it is empower employees with seamless access to Apps I think this is a lot about what Ben was highlighting you know, I guess, maybe what I just double down on what are we covering here.<\/p>\n<p>123<br \/>00:16:46.800 &#8211;&gt; 00:16:56.400<br \/>akshaykakar: it&#8217;s yes, it is, it is a lot so with with a chrome os device, you have access to applications through Google play Google play it&#8217;s a managed store managed Google play.<\/p>\n<p>124<br \/>00:16:56.790 &#8211;&gt; 00:17:02.490<br \/>akshaykakar: where you can control which applications do which users can access to and that&#8217;s pretty cool, but every now and then.<\/p>\n<p>125<br \/>00:17:03.030 &#8211;&gt; 00:17:11.820<br \/>akshaykakar: Actually, more than every now and then most industries have at least some applications that are homegrown applications might be sitting in the data Center might be in aws or azure or wherever.<\/p>\n<p>126<br \/>00:17:12.330 &#8211;&gt; 00:17:18.930<br \/>akshaykakar: And those own grown I wouldn&#8217;t call them legacy, but just traditional applications still need to be maintained.<\/p>\n<p>127<br \/>00:17:19.890 &#8211;&gt; 00:17:29.940<br \/>akshaykakar: And those applications still need to be accessed from that chrome os devices and what we essentially say is that hey if you are going through the citrix workspace application, you are able to access any APP.<\/p>\n<p>128<br \/>00:17:30.510 &#8211;&gt; 00:17:35.940<br \/>akshaykakar: including those traditional windows and Linux based applications off of your chrome os device.<\/p>\n<p>129<br \/>00:17:37.770 &#8211;&gt; 00:17:43.530<br \/>Andy Whiteside: You know Ben was talking about a while ago on planes and I fly a lot almost every week at this point and I it&#8217;s so hit or miss.<\/p>\n<p>130<br \/>00:17:44.340 &#8211;&gt; 00:17:52.020<br \/>Andy Whiteside: But when that salt and as long as i&#8217;m out out in the middle of nowhere this becomes even more, and you keep in mind you bill and I.<\/p>\n<p>131<br \/>00:17:52.800 &#8211;&gt; 00:18:00.930<br \/>Andy Whiteside: Maybe you guys see We grew up on, you know 15 K dial up modems doing this stuff which sometimes I even like better because I had a wired connection but.<\/p>\n<p>132<br \/>00:18:01.620 &#8211;&gt; 00:18:05.070<br \/>Andy Whiteside: Certainly becomes more and more real as the world around us evolves.<\/p>\n<p>133<br \/>00:18:05.610 &#8211;&gt; 00:18:14.370<br \/>Andy Whiteside: And the needs and the demands for security pandemic planning, you know work from anywhere hybrid stuff those things grow maybe they start to outpace.<\/p>\n<p>134<br \/>00:18:14.670 &#8211;&gt; 00:18:23.640<br \/>Andy Whiteside: Some limitations that maybe have been former manager who who thinks they&#8217;ve got to have it on airplane but just have to sacrifice for the benefit of hybrid and secure work.<\/p>\n<p>135<br \/>00:18:25.470 &#8211;&gt; 00:18:33.060<br \/>Ben Rogers: What I think the most interesting about this Andy is is let&#8217;s think about you know where citrix has come from over the years.<\/p>\n<p>136<br \/>00:18:33.510 &#8211;&gt; 00:18:46.710<br \/>Ben Rogers: When I first got into citrix is about given windows access and MAC access and you never really saw a lot of Linux now with the modern day man you&#8217;re looking at really all three and you never can&#8217;t really tell what&#8217;s going to be.<\/p>\n<p>137<br \/>00:18:47.070 &#8211;&gt; 00:18:53.850<br \/>Ben Rogers: You know thrown at you, so I like the idea of our product kind of being able to mix with all three of these.<\/p>\n<p>138<br \/>00:18:54.450 &#8211;&gt; 00:19:00.180<br \/>Ben Rogers: OSS and being able to basically allow connectivity and allow application access.<\/p>\n<p>139<br \/>00:19:00.480 &#8211;&gt; 00:19:12.330<br \/>Ben Rogers: You know, for whatever it is you&#8217;re in, and I think for organization that has to manage multiple os is like healthcare one device for them does not fit all you know if this is a good solution to go hey.<\/p>\n<p>140<br \/>00:19:12.900 &#8211;&gt; 00:19:27.690<br \/>Ben Rogers: tell us how you want it and we&#8217;ll be able to provide the applications through this workspace mechanism, and so I think this is a really powerful part of this blog because it just talks about how all the technologies are blended together through the workspace APP.<\/p>\n<p>141<br \/>00:19:29.310 &#8211;&gt; 00:19:39.630<br \/>Andy Whiteside: yeah I wanna I want to talk about that real quick um because we doing Google chrome os a disservice by lumping it to the Linux bucket or are we doing it as service by lumping into the Linux bucket.<\/p>\n<p>142<br \/>00:19:45.150 &#8211;&gt; 00:19:45.750<br \/>Andy Whiteside: Anybody.<\/p>\n<p>143<br \/>00:19:47.190 &#8211;&gt; 00:19:54.390<br \/>Ben Rogers: So that&#8217;s a deep question that i&#8217;ll hand off to the crowd I don&#8217;t know if I know enough about the ios to really comment on that with with education.<\/p>\n<p>144<br \/>00:19:55.950 &#8211;&gt; 00:20:01.920<br \/>Andy Whiteside: To me it kind of makes sense to call it chrome os as if it&#8217;s one of the three players when it&#8217;s time to call it chrome os, but it also.<\/p>\n<p>145<br \/>00:20:02.160 &#8211;&gt; 00:20:13.890<br \/>Andy Whiteside: makes sense to lump it into the Linux bucket when we&#8217;re trying to get some of the benefits of of Linux like you know less attack vector more secure lightweight actually that&#8217;s that&#8217;s probably one for you, you can defer it if you want.<\/p>\n<p>146<br \/>00:20:14.130 &#8211;&gt; 00:20:18.750<br \/>akshaykakar: yeah I mean i&#8217;m not an expert on the ios is and, but I would say that the I think.<\/p>\n<p>147<br \/>00:20:20.040 &#8211;&gt; 00:20:25.500<br \/>akshaykakar: chrome has offered way more than just the Linux was it does have that similarity in.<\/p>\n<p>148<br \/>00:20:27.000 &#8211;&gt; 00:20:37.710<br \/>akshaykakar: The end is not probably the right word, but it has that similarity in in in what Linux can provide, but then there is a lot more, especially with all the backing that has been getting from Google.<\/p>\n<p>149<br \/>00:20:38.820 &#8211;&gt; 00:20:39.000<br \/>akshaykakar: well.<\/p>\n<p>150<br \/>00:20:39.030 &#8211;&gt; 00:20:39.270<br \/>And I.<\/p>\n<p>151<br \/>00:20:40.470 &#8211;&gt; 00:20:44.880<br \/>akshaykakar: Use i&#8217;m just gonna be one one quick point I mean you&#8217;ll see.<\/p>\n<p>152<br \/>00:20:45.990 &#8211;&gt; 00:20:51.780<br \/>akshaykakar: you&#8217;ll see Google i&#8217;m like a lot of the other vendors out there, that I was cited as Google.<\/p>\n<p>153<br \/>00:20:52.320 &#8211;&gt; 00:21:00.690<br \/>akshaykakar: they&#8217;re trying to blend a lot of things that are trying to blend GDP with chrome os with other stuff that they provide um.<\/p>\n<p>154<br \/>00:21:01.320 &#8211;&gt; 00:21:09.930<br \/>akshaykakar: For instance, the Google workspace where the applications are right, so there is a lot of that blending taking place and and that&#8217;s that&#8217;s power of an ecosystem.<\/p>\n<p>155<br \/>00:21:10.290 &#8211;&gt; 00:21:17.880<br \/>akshaykakar: And when you blend that ecosystem would say the citrix ecosystem that&#8217;s a comprehensive hole that you don&#8217;t get with just say Linux or something else.<\/p>\n<p>156<br \/>00:21:20.610 &#8211;&gt; 00:21:30.930<br \/>Andy Whiteside: But it is Linux that&#8217;s The funny that&#8217;s where I get good like I swear I strict well okay so two things one the user interface is now familiar because it&#8217;s based off the chrome browser.<\/p>\n<p>157<br \/>00:21:31.590 &#8211;&gt; 00:21:41.400<br \/>Andy Whiteside: On that&#8217;s one piece, and the other part, is they have their you know web store where you have all these applications thousands at this point and at some point, I believe they&#8217;re going to have access to the android store.<\/p>\n<p>158<br \/>00:21:41.610 &#8211;&gt; 00:21:42.270<br \/>To run on target.<\/p>\n<p>159<br \/>00:21:45.900 &#8211;&gt; 00:21:47.070<br \/>Andy Whiteside: Though you said they already do.<\/p>\n<p>160<br \/>00:21:47.190 &#8211;&gt; 00:21:47.790<br \/>Bill Sutton: They already do.<\/p>\n<p>161<br \/>00:21:48.840 &#8211;&gt; 00:21:51.330<br \/>Andy Whiteside: Like a chromebook has access to the android store.<\/p>\n<p>162<br \/>00:21:51.450 &#8211;&gt; 00:21:56.790<br \/>Bill Sutton: yeah I installed android Apps on a chromebook we got five years ago, or 10 years ago, whatever it was we got it.<\/p>\n<p>163<br \/>00:21:57.750 &#8211;&gt; 00:22:07.200<br \/>Andy Whiteside: I think I think my challenge there I work a lot with Google cloud ready what used to be neverwhere cloud ready and I don&#8217;t think they have access to the android store yet Okay, I believe in this just my opinion.<\/p>\n<p>164<br \/>00:22:07.380 &#8211;&gt; 00:22:14.910<br \/>Andy Whiteside: That they&#8217;re going to get it, and then all of a sudden, you went from you know, a ton of Apps to a whole time I could use some slang there if I sell.<\/p>\n<p>165<br \/>00:22:16.050 &#8211;&gt; 00:22:18.420<br \/>Andy Whiteside: A lot a lot of Apps.<\/p>\n<p>166<br \/>00:22:20.670 &#8211;&gt; 00:22:31.440<br \/>Andy Whiteside: Well let&#8217;s do this let&#8217;s talk about this next piece, which goes double down on security conversation around the secure endpoint and an access model that secure actually you want to kind of talk us through this this sorry.<\/p>\n<p>167<br \/>00:22:31.500 &#8211;&gt; 00:22:32.700<br \/>Andy Whiteside: My browser keeps jumping around.<\/p>\n<p>168<br \/>00:22:33.240 &#8211;&gt; 00:22:36.630<br \/>akshaykakar: Multi device for London yeah you want to have a diagram it&#8217;s probably easier that way.<\/p>\n<p>169<br \/>00:22:37.980 &#8211;&gt; 00:22:44.100<br \/>akshaykakar: um so essentially what you&#8217;re saying on the left is listen we&#8217;ve got we&#8217;ve got a secure endpoint with.<\/p>\n<p>170<br \/>00:22:44.550 &#8211;&gt; 00:22:52.590<br \/>akshaykakar: With chrome os and then there is a chrome enterprise upgrade that can go on to that chrome so there&#8217;s a whole lot of security policy that you can talk that you have you spoken about that.<\/p>\n<p>171<br \/>00:22:53.490 &#8211;&gt; 00:23:02.280<br \/>akshaykakar: Now there&#8217;s there&#8217;s in we&#8217;ve already spoken about citrix workspace as well there&#8217;s another product called citrix secure internet access and for those of you that have not caught it.<\/p>\n<p>172<br \/>00:23:03.330 &#8211;&gt; 00:23:17.340<br \/>akshaykakar: Think of citrix secure Internet access as a whole, pretty much all the functionality, that you would expect, in a data Center may security staff so you&#8217;ve got the swag the signal the signal web gateway you&#8217;ve got a firewall got.<\/p>\n<p>173<br \/>00:23:18.390 &#8211;&gt; 00:23:28.260<br \/>akshaykakar: The malware protection capabilities blast you&#8217;ve got stuff like as be cloud based on Boxing anomaly detection a deep user level analytics.<\/p>\n<p>174<br \/>00:23:28.650 &#8211;&gt; 00:23:35.310<br \/>akshaykakar: So you take all of that security functionality you plug it all together put into a high performance architecture and toss it into the cloud.<\/p>\n<p>175<br \/>00:23:35.700 &#8211;&gt; 00:23:46.410<br \/>akshaykakar: Across 100 different points of presence and that&#8217;s what citrix like your Internet access is so citrix they got Internet access is a cloud there was security solution delivered from hundred different points of presence.<\/p>\n<p>176<br \/>00:23:46.860 &#8211;&gt; 00:23:54.240<br \/>akshaykakar: So what we are saying is that we create a multi layered security model so let&#8217;s just say you&#8217;re protecting a king and a Queen.<\/p>\n<p>177<br \/>00:23:54.660 &#8211;&gt; 00:24:04.050<br \/>akshaykakar: You know, in a medieval time war right, so you gonna have multiple layers of security between the enemy and the King and the Queen and that&#8217;s what we&#8217;re doing we&#8217;re giving you that.<\/p>\n<p>178<br \/>00:24:05.160 &#8211;&gt; 00:24:20.970<br \/>akshaykakar: One layer of security, which is provided by citrix secure internet access and the other layer of security, which is coming from the chrome os device and the chrome os and the chrome enterprise upgrade so and, yes, you&#8217;ve got the citrix workspace as well, which has some.<\/p>\n<p>179<br \/>00:24:22.020 &#8211;&gt; 00:24:32.370<br \/>akshaykakar: granular security features, for instance, you can do things like water mocking or you can do things like disable cut copy paste so some of those functionalities that are available as well, through the citrix workspace APP.<\/p>\n<p>180<br \/>00:24:32.910 &#8211;&gt; 00:24:42.690<br \/>akshaykakar: And then the chrome os device by itself is a secure device as well, which has its own security policies if i&#8217;m not mistaken, you can do things like okay you won&#8217;t allow USB sticks to be installed.<\/p>\n<p>181<br \/>00:24:44.160 &#8211;&gt; 00:24:59.190<br \/>akshaykakar: Or you won&#8217;t allow certain if you&#8217;ve used a password in one location already you can reuse that password so there&#8217;s things like that that chrome os also provides the chrome enterprise upgrade provides and we&#8217;re back what you&#8217;re essentially getting is that multicast security model.<\/p>\n<p>182<br \/>00:25:00.330 &#8211;&gt; 00:25:01.170<br \/>akshaykakar: In this architecture.<\/p>\n<p>183<br \/>00:25:01.590 &#8211;&gt; 00:25:07.260<br \/>Andy Whiteside: I think it&#8217;s funny how this whole time about a secure endpoint and accessing you know the plate the stores, as well as.<\/p>\n<p>184<br \/>00:25:07.740 &#8211;&gt; 00:25:13.230<br \/>Andy Whiteside: Using citrix workspace Apps specifically and then all of a sudden this secure Internet access thing, where the traffic&#8217;s being.<\/p>\n<p>185<br \/>00:25:13.470 &#8211;&gt; 00:25:21.600<br \/>Andy Whiteside: directed appropriately and monitored and in analytics are going along with that monitoring all the sudden that just up citrix is game big time in this space right.<\/p>\n<p>186<br \/>00:25:21.750 &#8211;&gt; 00:25:25.350<br \/>akshaykakar: In time, big time because keep in mind that listen see folks are.<\/p>\n<p>187<br \/>00:25:26.850 &#8211;&gt; 00:25:29.340<br \/>akshaykakar: folks that are accessing accessing.<\/p>\n<p>188<br \/>00:25:30.990 &#8211;&gt; 00:25:36.810<br \/>akshaykakar: say you finish your work today at 5pm you go onto a basketball for are you going to read it or wherever.<\/p>\n<p>189<br \/>00:25:37.230 &#8211;&gt; 00:25:47.520<br \/>akshaykakar: And you click on a couple of links and stuff like that, so you you do need that access even when you&#8217;re outside of citrix workspace APP you need that level of protection.<\/p>\n<p>190<br \/>00:25:48.060 &#8211;&gt; 00:25:51.660<br \/>akshaykakar: When you&#8217;re outside of citrix workspace appiah you&#8217;re doing recreational browsing.<\/p>\n<p>191<br \/>00:25:52.470 &#8211;&gt; 00:25:58.980<br \/>akshaykakar: you&#8217;re not sitting behind an enterprise firewall you need something that&#8217;s protecting you without having to do a piano or anything of that nature.<\/p>\n<p>192<br \/>00:25:59.370 &#8211;&gt; 00:26:08.640<br \/>akshaykakar: And so citrix secure Internet access is that in residual but always always on protection that&#8217;s blocking any threats from entering your device.<\/p>\n<p>193<br \/>00:26:09.480 &#8211;&gt; 00:26:16.770<br \/>akshaykakar: And then, of course, you have the chrome os as well and citrix as it as it is to go to Internet access, we have this relationship with threat engines.<\/p>\n<p>194<br \/>00:26:17.100 &#8211;&gt; 00:26:25.020<br \/>akshaykakar: So I should say there&#8217;s a Ted discovered and say hypothetically Japan couple of hours before before, and then we will update our.<\/p>\n<p>195<br \/>00:26:25.380 &#8211;&gt; 00:26:33.060<br \/>akshaykakar: cloud based on that threat intelligence and so you&#8217;re always protected against the latest stats man, the whole lot of functionality that&#8217;s available in that product yeah.<\/p>\n<p>196<br \/>00:26:33.480 &#8211;&gt; 00:26:41.400<br \/>Andy Whiteside: i&#8217;ve got some comments here, but I want to defer to let&#8217;s go to bill first bill thoughts on adding this extra piece of the story that we already thought was magical.<\/p>\n<p>197<br \/>00:26:41.670 &#8211;&gt; 00:26:50.400<br \/>Bill Sutton: Well, I you know the story that we already thought was magical I thought I think there was one piece, we were we weren&#8217;t maybe we were talking about it, but not directly, I think I got least I know that.<\/p>\n<p>198<br \/>00:26:51.000 &#8211;&gt; 00:27:02.100<br \/>Bill Sutton: Historically, when I hear access, you know, via the centric workspace APP i&#8217;m thinking virtual Apps virtual desktops that&#8217;s that&#8217;s what we&#8217;ve always that&#8217;s where I grew up, but obviously we know that the citrix workspace.<\/p>\n<p>199<br \/>00:27:02.730 &#8211;&gt; 00:27:14.550<br \/>Bill Sutton: can enable single sign on to SAS based Apps which are equally as critical if not more now than they used to be, you know folks are using SAS Apps and having a device that we can secure.<\/p>\n<p>200<br \/>00:27:15.540 &#8211;&gt; 00:27:25.290<br \/>Bill Sutton: and enable seamless access to those Apps is just as important, if not more so than than the access to the traditional windows based Apps you know hosted on a server somewhere.<\/p>\n<p>201<br \/>00:27:25.590 &#8211;&gt; 00:27:33.600<br \/>Bill Sutton: This just adds another layer to it that I think is critical, you meant you mentioned akshay you meant mentioned reddit as an example, I know that.<\/p>\n<p>202<br \/>00:27:34.470 &#8211;&gt; 00:27:50.490<br \/>Bill Sutton: Some of my consultants will go searching for a solution and it&#8217;ll take them to places like that and and beyond unfamiliar sites that may be in foreign countries, and having this kind of this kind of layered security here, certainly would provide a lot of benefit to them into our customers.<\/p>\n<p>203<br \/>00:27:52.140 &#8211;&gt; 00:27:55.260<br \/>akshaykakar: So guys, we absolutely good sorry.<\/p>\n<p>204<br \/>00:27:56.700 &#8211;&gt; 00:28:05.070<br \/>akshaykakar: i&#8217;m just gonna say you&#8217;re and you&#8217;re absolutely right, so when you say in other countries, or even mind that we spoke about this earlier that your workers your employees your consultants are traveling right.<\/p>\n<p>205<br \/>00:28:05.400 &#8211;&gt; 00:28:10.200<br \/>akshaykakar: So they are in a whole lot of different places where they they could be under attack, if you will, so.<\/p>\n<p>206<br \/>00:28:10.380 &#8211;&gt; 00:28:11.430<br \/>\u092c\u093f\u0932 \u0938\u091f\u0928: \u092c\u093f\u0932\u094d\u0915\u0941\u0932 \u0938\u0939\u0940\u0964<\/p>\n<p>207<br \/>00:28:12.120 &#8211;&gt; 00:28:18.480<br \/>Andy Whiteside: So guys let&#8217;s let&#8217;s see been up here we told him the idea of byob plus the cloud wasn&#8217;t good enough.<\/p>\n<p>208<br \/>00:28:18.780 &#8211;&gt; 00:28:26.400<br \/>Andy Whiteside: If we take byob plus this layer of security with the agent, which I would like to point out, which always do it&#8217;s part of the citrix workspace APP.<\/p>\n<p>209<br \/>00:28:26.730 &#8211;&gt; 00:28:34.500<br \/>Andy Whiteside: package anyway, I think, tell me if i&#8217;m wrong if we take security and access, plus the cloud, or we then back to tell him Ben he can bring whatever he wants.<\/p>\n<p>210<br \/>00:28:40.620 &#8211;&gt; 00:28:43.110<br \/>Andy Whiteside: let&#8217;s take it a step further we&#8217;re closer at least right.<\/p>\n<p>211<br \/>00:28:46.920 &#8211;&gt; 00:28:52.830<br \/>Ben Rogers: Well we&#8217;re I think this is really a play I go back to my old days of having to manage firewalls and.<\/p>\n<p>212<br \/>00:28:53.820 &#8211;&gt; 00:29:01.050<br \/>Ben Rogers: User threat management systems, and you know this really lifts that part out of the administration and the corporate security.<\/p>\n<p>213<br \/>00:29:01.740 &#8211;&gt; 00:29:08.130<br \/>Ben Rogers: framework and so we&#8217;re i&#8217;m really excited about this as I can look at you know cyber security engineers and go hey.<\/p>\n<p>214<br \/>00:29:08.340 &#8211;&gt; 00:29:17.910<br \/>Ben Rogers: I know you there&#8217;s a certain amount of effort to keep these firewalls updated make sure the traffic stolen, through them, making sure all the policies are upgraded and all those jazz.<\/p>\n<p>215<br \/>00:29:18.150 &#8211;&gt; 00:29:22.110<br \/>Ben Rogers: Let us take that off your hands, similar to the way that we look at them with see bad&#8217;s is.<\/p>\n<p>216<br \/>00:29:22.380 &#8211;&gt; 00:29:30.660<br \/>Ben Rogers: Let us take that we didn&#8217;t feed off your hands and let you concentrate on what you really need to be concentrate on and what is allowed out of this facility.<\/p>\n<p>217<br \/>00:29:30.900 &#8211;&gt; 00:29:42.330<br \/>Ben Rogers: And what did my employees need to be looking at on a daily basis, so for me i&#8217;m really excited about that point is that it now allows us to provide another service that makes us competitive against.<\/p>\n<p>218<br \/>00:29:42.810 &#8211;&gt; 00:29:47.490<br \/>Ben Rogers: The other user threat management systems that are out there, so i&#8217;m excited about that point.<\/p>\n<p>219<br \/>00:29:48.360 &#8211;&gt; 00:29:56.280<br \/>Ben Rogers: When it comes to you know there&#8217;s this created nirvana where you can get you know this to anybody, it would, in a sense that I could say to.<\/p>\n<p>220<br \/>00:29:56.550 &#8211;&gt; 00:30:05.730<br \/>Ben Rogers: My you know engineers that are out there in the field it doesn&#8217;t matter where you&#8217;re at i&#8217;m going to be able to backhaul all of your traffic to one resource and make sure that.<\/p>\n<p>221<br \/>00:30:05.970 &#8211;&gt; 00:30:21.120<br \/>Ben Rogers: Regardless of what endpoint your own or regardless of where you&#8217;re at in the network you got the same coverage that you do regardless and that&#8217;s really killer, in my opinion and that&#8217;s a step beyond what you can do with a traditional firewall layout.<\/p>\n<p>222<br \/>00:30:22.440 &#8211;&gt; 00:30:29.490<br \/>akshaykakar: yeah bill you hit it you hit the nail on the head there so you&#8217;re absolutely right so wherever your engineers are they and they.<\/p>\n<p>223<br \/>00:30:30.180 &#8211;&gt; 00:30:35.310<br \/>akshaykakar: We, so we have these points of presence, I said that&#8217;s hundred different points of presence, so your engineers aren&#8217;t.<\/p>\n<p>224<br \/>00:30:35.580 &#8211;&gt; 00:30:43.530<br \/>akshaykakar: aren&#8217;t going to be sent to that point of presence, but that backhaul isn&#8217;t going to be as much as it used to be back in the day let&#8217;s say you have three data centers with three stacks.<\/p>\n<p>225<br \/>00:30:43.950 &#8211;&gt; 00:30:52.500<br \/>akshaykakar: Now you&#8217;ve got 100 different stacks right so it&#8217;s it&#8217;s pretty much direct access to those SAS applications pretty much direct access to your Internet um.<\/p>\n<p>226<br \/>00:30:53.250 &#8211;&gt; 00:31:08.070<br \/>akshaykakar: hey I need one quick thing, so it is the cloud can enter agent for citrix secure ended and access is different from citrix workspace and I kind of works out because there is there is a lot of folks that are already using citrix workspace APP.<\/p>\n<p>227<br \/>00:31:08.910 &#8211;&gt; 00:31:15.030<br \/>akshaykakar: Or, there are some and, as we are talking to more and more customers, including net new customers, there are some customers that are.<\/p>\n<p>228<br \/>00:31:15.750 &#8211;&gt; 00:31:29.190<br \/>akshaykakar: That are looking or there are certain information security teams that are separate from the car teams that are looking at citrix or Internet access, so this guy is right now, giving us the flexibility of having a separate conversation if you need to.<\/p>\n<p>229<br \/>00:31:30.600 &#8211;&gt; 00:31:37.200<br \/>akshaykakar: What he has in the future, I icon mentioned publicly but it&#8217;s possible that that the agents might be combined and unified.<\/p>\n<p>230<br \/>00:31:38.220 &#8211;&gt; 00:31:44.250<br \/>akshaykakar: From an APP from management plane perspective that is unification of management plane between all citrix product through citrix cloud.<\/p>\n<p>231<br \/>00:31:45.120 &#8211;&gt; 00:31:54.690<br \/>Andy Whiteside: But I think that&#8217;s where you&#8217;re going this next section where you&#8217;re talking about civil file your operations both what citrix is doing for you as a service, as well as what you have to do as the managing it organization.<\/p>\n<p>232<br \/>00:31:56.100 &#8211;&gt; 00:32:07.260<br \/>akshaykakar: Yes, and exactly so what citrix is doing right now is that you log into citrix cloud you see all the different products that you have, and you can you can go into what you&#8217;re probably wondering and start managing that product.<\/p>\n<p>233<br \/>00:32:07.740 &#8211;&gt; 00:32:12.570<br \/>akshaykakar: And you&#8217;ve got that that that unification of management and then also.<\/p>\n<p>234<br \/>00:32:12.990 &#8211;&gt; 00:32:19.410<br \/>akshaykakar: As Ben was mentioning from an operational overhead perspective right you&#8217;ve got no more boxes to manage from a cyber security perspective.<\/p>\n<p>235<br \/>00:32:19.800 &#8211;&gt; 00:32:29.880<br \/>akshaykakar: All those boxes are done away with you&#8217;ve got a cloud security service, so you just log into that cloud security service, you make your policy changes in those policy changes push to all employees.<\/p>\n<p>236<br \/>00:32:30.750 &#8211;&gt; 00:32:40.020<br \/>akshaykakar: And everybody&#8217;s happy so pronounced simplification of operations perspective, we believe that it will not just improve the op X numbers but also.<\/p>\n<p>237<br \/>00:32:40.710 &#8211;&gt; 00:32:50.700<br \/>akshaykakar: Reverse multiple security breaches in the past where cyber security teams were just too overwhelmed to ensure that they&#8217;ve got the latest patches they&#8217;ve got the latest policy in there.<\/p>\n<p>238<br \/>00:32:51.390 &#8211;&gt; 00:33:02.310<br \/>akshaykakar: And so, if we&#8217;re able to take some work off their hands, so that they&#8217;ve got more time to think and more time to analyze and more time to penetration tests, then we will we will also improve the cyber security posture yeah.<\/p>\n<p>239<br \/>00:33:03.660 &#8211;&gt; 00:33:07.080<br \/>Andy Whiteside: So to bill, how do you see this impacting the customers that you&#8217;re working with.<\/p>\n<p>240<br \/>00:33:08.400 &#8211;&gt; 00:33:20.220<br \/>Bill Sutton: Well, I think it&#8217;s you know the customers we&#8217;re working with I think this This is something they&#8217;re not aware of probably and, probably, we need to help make them more aware of it, because I think it&#8217;s definitely got to fit with a lot of them yeah.<\/p>\n<p>241<br \/>00:33:20.640 &#8211;&gt; 00:33:21.510<br \/>Ben Rogers: Only the ones that care.<\/p>\n<p>242<br \/>00:33:21.570 &#8211;&gt; 00:33:22.680<br \/>Bill Sutton: Security yeah.<\/p>\n<p>243<br \/>00:33:22.770 &#8211;&gt; 00:33:23.940<br \/>Ben Rogers: it&#8217;s a paradigm shift.<\/p>\n<p>244<br \/>00:33:25.470 &#8211;&gt; 00:33:30.600<br \/>Ben Rogers: And that&#8217;s one thing that I would you know Andy and I, you and I, you and I have talked for years about how.<\/p>\n<p>245<br \/>00:33:31.200 &#8211;&gt; 00:33:40.620<br \/>Ben Rogers: It takes a societal move to kind of get things going in our first example was going from desktop to workspace at five years ago, you told me, I would create.<\/p>\n<p>246<br \/>00:33:40.860 &#8211;&gt; 00:33:49.980<br \/>Ben Rogers: career suicide if I took them the workspace or whatever it was called receiver then, but now I think that that very people would be open to a dashboard type of.<\/p>\n<p>247<br \/>00:33:50.310 &#8211;&gt; 00:33:55.140<br \/>Ben Rogers: Environment, I think, with cyber security engineers you&#8217;re going to have to get them used to the fact that hey.<\/p>\n<p>248<br \/>00:33:55.440 &#8211;&gt; 00:34:04.110<br \/>Ben Rogers: You don&#8217;t have to have these products on site, or you don&#8217;t have to physically see where these products are in your data Center or in the azure stack and.<\/p>\n<p>249<br \/>00:34:04.380 &#8211;&gt; 00:34:11.790<br \/>Ben Rogers: you&#8217;re going to have to kind of let them know that they can give up that management plane, the same as we&#8217;ve done with our citrix administrators for years.<\/p>\n<p>250<br \/>00:34:12.150 &#8211;&gt; 00:34:20.730<br \/>Ben Rogers: I think that&#8217;s going to be the challenge of getting them to think about all this lives in the cloud this lives wherever my services are close to and.<\/p>\n<p>251<br \/>00:34:21.090 &#8211;&gt; 00:34:33.690<br \/>Ben Rogers: that&#8217;s going to be the piece that I see being a challenge you know kind of going forward is this breaking that paradigm shift and getting them to understand that this is a different way than they&#8217;ve done over the last 2030 years.<\/p>\n<p>252<br \/>00:34:33.990 &#8211;&gt; 00:34:41.010<br \/>Bill Sutton: yeah I would agree with that banner, to some degree, I think a lot of the lot of the cyber security to see SOS around in the of the world have.<\/p>\n<p>253<br \/>00:34:41.640 &#8211;&gt; 00:34:51.150<br \/>Bill Sutton: Have kind of bought the or drank the Kool aid of layered approaches to security from other vendors and and bought a point product to do this and appoint product to do that and appoint product to do that.<\/p>\n<p>254<br \/>00:34:51.480 &#8211;&gt; 00:35:03.750<br \/>Bill Sutton: they&#8217;ve got a huge investment of those technologies, not to mention the renewals of those technologies and it&#8217;s going to take some education some time to get them to consider something like this, all in any ways, at least initially.<\/p>\n<p>255<br \/>00:35:04.680 &#8211;&gt; 00:35:13.860<br \/>Andy Whiteside: And part of that&#8217;s just the vendor name right, I mean citrix is seen as right as the access people not to secure access people and not the security company.<\/p>\n<p>256<br \/>00:35:14.580 &#8211;&gt; 00:35:28.290<br \/>Andy Whiteside: This clearly helps me understand where citrix is making a play on security, which we already had, but now we&#8217;re playing in a different piece of it and it&#8217;s you know, a vendor that you&#8217;re already knowing working and trusting people should consider it yes.<\/p>\n<p>257<br \/>00:35:29.340 &#8211;&gt; 00:35:38.130<br \/>akshaykakar: Exactly so think of it this way, so you&#8217;ve got you&#8217;ve got you&#8217;ve got your applicant you&#8217;ve got you and then you&#8217;ve got the application that are connected to, and then you got the fabric and lily right.<\/p>\n<p>258<br \/>00:35:38.700 &#8211;&gt; 00:35:47.910<br \/>akshaykakar: So citrix is everywhere, what we want to do is, we want to be able to control that entire end to end or support our entire end to end so that you, as a user have a great experience.<\/p>\n<p>259<br \/>00:35:48.930 &#8211;&gt; 00:36:02.670<br \/>akshaykakar: So we will do the the optimization or that in terms of the productivity will to be cybersecurity over there and it&#8217;ll keep you safe and that&#8217;s essentially what it is, and then the ecosystem is created or minus i&#8217;ve stated blends with the other vendors that you might be using.<\/p>\n<p>260<br \/>00:36:04.410 &#8211;&gt; 00:36:04.650<br \/>Andy Whiteside: What.<\/p>\n<p>261<br \/>00:36:05.850 &#8211;&gt; 00:36:19.110<br \/>Andy Whiteside: You just said you were vendor I mean citrix in Google being a play where you can like those legacy security vendors probably don&#8217;t really have a Google play at the layer we&#8217;re doing this, all of a sudden something like Google Google Linux i&#8217;ll use both words together.<\/p>\n<p>262<br \/>00:36:20.160 &#8211;&gt; 00:36:30.390<br \/>Andy Whiteside: All the sudden it&#8217;s irrelevant more or less as long as there&#8217;s the agent that can run and now the sudden the cloud makes it to where the security play fits whether it&#8217;s windows Google MAC you name it.<\/p>\n<p>263<br \/>00:36:32.220 &#8211;&gt; 00:36:32.910<br \/>Ben Rogers: Go ahead, I think.<\/p>\n<p>264<br \/>00:36:33.270 &#8211;&gt; 00:36:39.840<br \/>Ben Rogers: I think there&#8217;s an opportunity, and this is not an official statement I disclaimer that, and this has not been mentioned it all inside the.<\/p>\n<p>265<br \/>00:36:40.170 &#8211;&gt; 00:36:51.540<br \/>Ben Rogers: citrix walls, but I would love to see them take this product to our etc and build this into our at scene, because a lot of people can then turn their at CS into their outbound gateway.<\/p>\n<p>266<br \/>00:36:51.840 &#8211;&gt; 00:37:03.150<br \/>Ben Rogers: And then you could really start talking about competing against the Palo Alto is the 40 minutes because the adc is already kind of a Swiss army Swiss army knife firewall and a certain.<\/p>\n<p>267<br \/>00:37:03.480 &#8211;&gt; 00:37:12.360<br \/>Ben Rogers: extent we get this outbound traffic going through it so to me when I look at our product portfolio and how this product could fit into the portfolio.<\/p>\n<p>268<br \/>00:37:12.720 &#8211;&gt; 00:37:23.220<br \/>Ben Rogers: We obviously, could you know deliver it be a cloud and have it cloud be 100% of the answer, but we also could create a solution that could hinge on our at CS and go hey.<\/p>\n<p>269<br \/>00:37:23.430 &#8211;&gt; 00:37:29.730<br \/>Ben Rogers: If you&#8217;ve got at CES let&#8217;s start leveraging them for the outbound traffic and implement this user threat management.<\/p>\n<p>270<br \/>00:37:30.150 &#8211;&gt; 00:37:41.760<br \/>Ben Rogers: via the see a product on top of it so like I said no mention of it, but when I look at our product for folio and I go the things we could do that is one thing that I see that we could do that would be very slick and very cool.<\/p>\n<p>271<br \/>00:37:42.780 &#8211;&gt; 00:37:43.050<br \/>\u0939\u093e\u0901\u0964<\/p>\n<p>272<br \/>00:37:44.070 &#8211;&gt; 00:37:52.260<br \/>Andy Whiteside: So actually bring us home here let&#8217;s talk about where citrix and Google are truly partnering across the ecosystem of what they do together, but specifically here.<\/p>\n<p>273<br \/>00:37:54.000 &#8211;&gt; 00:37:59.520<br \/>akshaykakar: So, from a technology sample we&#8217;ve discussed, we discussed a lot from a technology standpoint, what I would also say, is it beyond.<\/p>\n<p>274<br \/>00:38:00.210 &#8211;&gt; 00:38:10.680<br \/>akshaykakar: I can&#8217;t disclose whole lot here right now there&#8217;s there&#8217;s some futures involved in that, but what we are essentially plan to do is we&#8217;re trying to go to gather to customers to ensure that.<\/p>\n<p>275<br \/>00:38:12.210 &#8211;&gt; 00:38:17.430<br \/>akshaykakar: To ensure that customers are not not overwhelmed which is multiple conversations with different vendors.<\/p>\n<p>276<br \/>00:38:18.120 &#8211;&gt; 00:38:32.520<br \/>akshaykakar: i&#8217;ve personally in my boss lives i&#8217;ve spoken to customers, where they were very happy when when two or more vendors, can I join forces came together as one to solve the customers problem was is the customer having to do all that multi flexing so.<\/p>\n<p>277<br \/>00:38:33.180 &#8211;&gt; 00:38:40.380<br \/>Andy Whiteside: i&#8217;ll add to that real quickly to vendors that you probably already going to have in house, seeing them come together and solve challenges for you is a win, win.<\/p>\n<p>278<br \/>00:38:40.770 &#8211;&gt; 00:38:51.090<br \/>akshaykakar: Yes, exactly and that&#8217;s the that&#8217;s the goal we&#8217;re trying to get the Google guy and the folks at Google chrome os talk to the folks at citrix get familiar with each other stuff.<\/p>\n<p>279<br \/>00:38:51.480 &#8211;&gt; 00:38:59.760<br \/>akshaykakar: And then it&#8217;s just as you&#8217;re saying the customer probably is already familiar with both the technology is now one plus one is equal to three years and so that&#8217;s basically what it is yeah.<\/p>\n<p>280<br \/>00:39:00.870 &#8211;&gt; 00:39:05.940<br \/>Andy Whiteside: So Ben as we start to finish up your any additional comments around what do you see citrix and Google doing.<\/p>\n<p>281<br \/>00:39:07.980 &#8211;&gt; 00:39:19.170<br \/>Ben Rogers: Well, what i&#8217;m what i&#8217;m kind of starting to get fascinated with it you&#8217;ve seen Google get into the education market like no other, you know and they kind of have become a dominant force in that market.<\/p>\n<p>282<br \/>00:39:19.830 &#8211;&gt; 00:39:25.350<br \/>Ben Rogers: I see that starting to happen in other markets you&#8217;re starting to see Google get more prevalent in healthcare.<\/p>\n<p>283<br \/>00:39:25.800 &#8211;&gt; 00:39:38.040<br \/>Ben Rogers: finance, so I think the same way they&#8217;ve gone after education and dominated that market, they have the possibility of doing these other markets as well, so i&#8217;m glad to see that our company is partnering up with them.<\/p>\n<p>284<br \/>00:39:38.430 &#8211;&gt; 00:39:45.420<br \/>Ben Rogers: And I think the two solutions could really flip some windows environments man, I mean I don&#8217;t mean that as a threat to Microsoft but.<\/p>\n<p>285<br \/>00:39:45.810 &#8211;&gt; 00:39:58.020<br \/>Ben Rogers: It could be really interesting if you could go into a shopping go, you can do the same thing today with cheaper products lightweight os is with a more secure environment it&#8217;s kind of a win so.<\/p>\n<p>286<br \/>00:39:58.200 &#8211;&gt; 00:40:08.190<br \/>Andy Whiteside: i&#8217;ve been I want to challenge, some of you said you said, Google going into education like no other I think at our age right we saw somebody else do that, it turned into a pretty pretty lucrative company this point.<\/p>\n<p>287<br \/>00:40:11.010 &#8211;&gt; 00:40:11.970<br \/>You know i&#8217;m saying.<\/p>\n<p>288<br \/>00:40:13.470 &#8211;&gt; 00:40:14.460<br \/>Ben Rogers: Like apple.<\/p>\n<p>289<br \/>00:40:14.520 &#8211;&gt; 00:40:21.240<br \/>Andy Whiteside: The they&#8217;re just doing what apple did except they&#8217;re not going to limit themselves to education and the consumer market they&#8217;re going they&#8217;re going for a bigger chunk of it.<\/p>\n<p>290<br \/>00:40:23.340 &#8211;&gt; 00:40:23.880<br \/>Ben Rogers: Oh yeah.<\/p>\n<p>291<br \/>00:40:29.280 &#8211;&gt; 00:40:30.090<br \/>I think.<\/p>\n<p>292<br \/>00:40:31.260 &#8211;&gt; 00:40:36.000<br \/>Ben Rogers: I think they&#8217;re never really strong domain commercially they never took the business idea.<\/p>\n<p>293<br \/>00:40:37.290 &#8211;&gt; 00:40:37.860<br \/>Ben Rogers: And they were.<\/p>\n<p>294<br \/>00:40:42.540 &#8211;&gt; 00:40:48.390<br \/>Ben Rogers: or or ecosystem personal they did some education Google or in the deep.<\/p>\n<p>295<br \/>00:40:49.560 &#8211;&gt; 00:40:53.940<br \/>Andy Whiteside: yeah all right bill, you want to any additional comments.<\/p>\n<p>296<br \/>00:40:54.150 &#8211;&gt; 00:41:00.450<br \/>Bill Sutton: Now i&#8217;m pretty much agree with the most of everything that Ben said had to say there I you know I certainly think that there&#8217;s a.<\/p>\n<p>297<br \/>00:41:00.900 &#8211;&gt; 00:41:09.570<br \/>Bill Sutton: there&#8217;s a place for the Google chrome os and I think that that more and more companies are going to take a look at it, I know that in my past i&#8217;ve had a couple of companies that were early adopters of.<\/p>\n<p>298<br \/>00:41:09.930 &#8211;&gt; 00:41:26.340<br \/>Bill Sutton: The chrome os for access to citrix Apps and desktops, but I think that it&#8217;s certainly it&#8217;s compelling for a lot of companies to look at something that&#8217;s more secure and easier to use and easier to manage for their employees to use to access their resources yeah.<\/p>\n<p>299<br \/>00:41:26.550 &#8211;&gt; 00:41:37.680<br \/>Andy Whiteside: No it&#8217;s true hundred percent well actually I appreciate you joining us before you go, is there any other topics specifically to this one or comments this one or other topics you&#8217;d like to maybe use this platform to bring up.<\/p>\n<p>300<br \/>00:41:38.490 &#8211;&gt; 00:41:47.970<br \/>akshaykakar: No, thank you for having me here and yeah I just just let&#8217;s let&#8217;s keep the conversation open and as more sessions that you&#8217;d like to have sex with people, you can do so.<\/p>\n<p>301<br \/>00:41:48.750 &#8211;&gt; 00:42:00.300<br \/>Andy Whiteside: we&#8217;ll keep an eye out for your blogs for this topic and beyond these topics and beyond, but if you have something that that did you write that you want to highlight to us and asked that we bring it back on that would be awesome this has been a really good conversation.<\/p>\n<p>302<br \/>00:42:01.140 &#8211;&gt; 00:42:01.950<br \/>akshaykakar: Thank you so much.<\/p>\n<p>303<br \/>00:42:03.060 &#8211;&gt; 00:42:05.010<br \/>Andy Whiteside: And with that guys will call today, thank you.<\/p>\n<p>304<br \/>00:42:06.450 &#8211;&gt; 00:42:06.810<br \/>Ben Rogers: Everybody.<\/p>\n<p>305<br \/>00:42:07.320 &#8211;&gt; 00:42:07.740<br \/>bye bye.<\/p>\n<p><\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>Citrix and Chrome OS are joining forces to enable greater employee productivity through secure and seamless access to all your apps apps and the internet for all your employees everywhere, &hellip;<\/p>","protected":false},"author":7,"featured_media":65995,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_price":"","_stock":"","_tribe_ticket_header":"","_tribe_default_ticket_provider":"","_tribe_ticket_capacity":"0","_ticket_start_date":"","_ticket_end_date":"","_tribe_ticket_show_description":"","_tribe_ticket_show_not_going":false,"_tribe_ticket_use_global_stock":"","_tribe_ticket_global_stock_level":"","_global_stock_mode":"","_global_stock_cap":"","_tribe_rsvp_for_event":"","_tribe_ticket_going_count":"","_tribe_ticket_not_going_count":"","_tribe_tickets_list":"[]","_tribe_ticket_has_attendee_info_fields":false,"footnotes":""},"categories":[5],"tags":[],"class_list":["post-66059","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-podcast"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>93: The Citrix Session: Citrix and Chrome OS<\/title>\n<meta name=\"description\" content=\"The Citrix Session highlights how the partnership between Citrix and Chrome OS will empower employees to be more productive.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/xentegra.com\/hi\/resources\/93-the-citrix-session-citrix-and-chrome-os-secure-seamless-access-to-all-your-apps-for-all-your-employees\/\" \/>\n<meta property=\"og:locale\" content=\"hi_IN\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"93: The Citrix Session: Citrix and Chrome OS\" \/>\n<meta property=\"og:description\" content=\"The Citrix Session highlights how the partnership between Citrix and Chrome OS will empower employees to be more productive.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/xentegra.com\/hi\/resources\/93-the-citrix-session-citrix-and-chrome-os-secure-seamless-access-to-all-your-apps-for-all-your-employees\/\" \/>\n<meta property=\"og:site_name\" content=\"XenTegra\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/XenTegra\/\" \/>\n<meta property=\"article:published_time\" content=\"2021-11-01T22:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-01-30T17:19:28+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/eadn-wc05-13529174.nxedge.io\/wp-content\/uploads\/2024\/03\/Citrix-Session.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1100\" \/>\n\t<meta property=\"og:image:height\" content=\"600\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Chase Newmyer\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@xentegra\" \/>\n<meta name=\"twitter:site\" content=\"@xentegra\" \/>\n<meta name=\"twitter:label1\" content=\"\u0926\u094d\u0935\u093e\u0930\u093e \u0932\u093f\u0916\u093f\u0924\" \/>\n\t<meta name=\"twitter:data1\" content=\"Chase Newmyer\" \/>\n\t<meta name=\"twitter:label2\" content=\"\u0905\u0928\u0941\u092e\u093e\u0928\u093f\u0924 \u092a\u0922\u093c\u0928\u0947 \u0915\u093e \u0938\u092e\u092f\" \/>\n\t<meta name=\"twitter:data2\" content=\"44 \u092e\u093f\u0928\u091f\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/xentegra.com\\\/resources\\\/93-the-citrix-session-citrix-and-chrome-os-secure-seamless-access-to-all-your-apps-for-all-your-employees\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/xentegra.com\\\/resources\\\/93-the-citrix-session-citrix-and-chrome-os-secure-seamless-access-to-all-your-apps-for-all-your-employees\\\/\"},\"author\":{\"name\":\"Chase Newmyer\",\"@id\":\"https:\\\/\\\/xentegra.com\\\/#\\\/schema\\\/person\\\/84736408f096bfd92b80305aea8846a7\"},\"headline\":\"93: The Citrix Session: Citrix and Chrome OS: Secure Access to All Your Apps\",\"datePublished\":\"2021-11-01T22:00:00+00:00\",\"dateModified\":\"2026-01-30T17:19:28+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/xentegra.com\\\/resources\\\/93-the-citrix-session-citrix-and-chrome-os-secure-seamless-access-to-all-your-apps-for-all-your-employees\\\/\"},\"wordCount\":9866,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/xentegra.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/xentegra.com\\\/resources\\\/93-the-citrix-session-citrix-and-chrome-os-secure-seamless-access-to-all-your-apps-for-all-your-employees\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/xentegra.com\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/Citrix-Session.png\",\"articleSection\":[\"Podcast\"],\"inLanguage\":\"hi-IN\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/xentegra.com\\\/resources\\\/93-the-citrix-session-citrix-and-chrome-os-secure-seamless-access-to-all-your-apps-for-all-your-employees\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/xentegra.com\\\/resources\\\/93-the-citrix-session-citrix-and-chrome-os-secure-seamless-access-to-all-your-apps-for-all-your-employees\\\/\",\"url\":\"https:\\\/\\\/xentegra.com\\\/resources\\\/93-the-citrix-session-citrix-and-chrome-os-secure-seamless-access-to-all-your-apps-for-all-your-employees\\\/\",\"name\":\"93: The Citrix Session: Citrix and Chrome OS\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/xentegra.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/xentegra.com\\\/resources\\\/93-the-citrix-session-citrix-and-chrome-os-secure-seamless-access-to-all-your-apps-for-all-your-employees\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/xentegra.com\\\/resources\\\/93-the-citrix-session-citrix-and-chrome-os-secure-seamless-access-to-all-your-apps-for-all-your-employees\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/xentegra.com\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/Citrix-Session.png\",\"datePublished\":\"2021-11-01T22:00:00+00:00\",\"dateModified\":\"2026-01-30T17:19:28+00:00\",\"description\":\"The Citrix Session highlights how the partnership between Citrix and Chrome OS will empower employees to be more productive.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/xentegra.com\\\/resources\\\/93-the-citrix-session-citrix-and-chrome-os-secure-seamless-access-to-all-your-apps-for-all-your-employees\\\/#breadcrumb\"},\"inLanguage\":\"hi-IN\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/xentegra.com\\\/resources\\\/93-the-citrix-session-citrix-and-chrome-os-secure-seamless-access-to-all-your-apps-for-all-your-employees\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"hi-IN\",\"@id\":\"https:\\\/\\\/xentegra.com\\\/resources\\\/93-the-citrix-session-citrix-and-chrome-os-secure-seamless-access-to-all-your-apps-for-all-your-employees\\\/#primaryimage\",\"url\":\"https:\\\/\\\/xentegra.com\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/Citrix-Session.png\",\"contentUrl\":\"https:\\\/\\\/xentegra.com\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/Citrix-Session.png\",\"width\":1100,\"height\":600},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/xentegra.com\\\/resources\\\/93-the-citrix-session-citrix-and-chrome-os-secure-seamless-access-to-all-your-apps-for-all-your-employees\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/xentegra.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"93: The Citrix Session: Citrix and Chrome OS: Secure Access to All Your Apps\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/xentegra.com\\\/#website\",\"url\":\"https:\\\/\\\/xentegra.com\\\/\",\"name\":\"XenTegra\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/xentegra.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/xentegra.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"hi-IN\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/xentegra.com\\\/#organization\",\"name\":\"XenTegra\",\"url\":\"https:\\\/\\\/xentegra.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"hi-IN\",\"@id\":\"https:\\\/\\\/xentegra.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/xentegra.com\\\/wp-content\\\/uploads\\\/2023\\\/06\\\/1519903807641-min.jpg\",\"contentUrl\":\"https:\\\/\\\/xentegra.com\\\/wp-content\\\/uploads\\\/2023\\\/06\\\/1519903807641-min.jpg\",\"width\":200,\"height\":200,\"caption\":\"XenTegra\"},\"image\":{\"@id\":\"https:\\\/\\\/xentegra.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/XenTegra\\\/\",\"https:\\\/\\\/x.com\\\/xentegra\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/xentegra-llc\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/xentegra.com\\\/#\\\/schema\\\/person\\\/84736408f096bfd92b80305aea8846a7\",\"name\":\"Chase Newmyer\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"hi-IN\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d46cd44f0bd433dc5a386cbac549c62fd92266e3951669c705b347be2130cca3?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d46cd44f0bd433dc5a386cbac549c62fd92266e3951669c705b347be2130cca3?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d46cd44f0bd433dc5a386cbac549c62fd92266e3951669c705b347be2130cca3?s=96&d=mm&r=g\",\"caption\":\"Chase Newmyer\"},\"url\":\"https:\\\/\\\/xentegra.com\\\/hi\\\/resources\\\/author\\\/chasenewmyer\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"93: The Citrix Session: Citrix and Chrome OS","description":"The Citrix Session highlights how the partnership between Citrix and Chrome OS will empower employees to be more productive.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/xentegra.com\/hi\/resources\/93-the-citrix-session-citrix-and-chrome-os-secure-seamless-access-to-all-your-apps-for-all-your-employees\/","og_locale":"hi_IN","og_type":"article","og_title":"93: The Citrix Session: Citrix and Chrome OS","og_description":"The Citrix Session highlights how the partnership between Citrix and Chrome OS will empower employees to be more productive.","og_url":"https:\/\/xentegra.com\/hi\/resources\/93-the-citrix-session-citrix-and-chrome-os-secure-seamless-access-to-all-your-apps-for-all-your-employees\/","og_site_name":"XenTegra","article_publisher":"https:\/\/www.facebook.com\/XenTegra\/","article_published_time":"2021-11-01T22:00:00+00:00","article_modified_time":"2026-01-30T17:19:28+00:00","og_image":[{"width":1100,"height":600,"url":"https:\/\/eadn-wc05-13529174.nxedge.io\/wp-content\/uploads\/2024\/03\/Citrix-Session.png","type":"image\/png"}],"author":"Chase Newmyer","twitter_card":"summary_large_image","twitter_creator":"@xentegra","twitter_site":"@xentegra","twitter_misc":{"\u0926\u094d\u0935\u093e\u0930\u093e \u0932\u093f\u0916\u093f\u0924":"Chase Newmyer","\u0905\u0928\u0941\u092e\u093e\u0928\u093f\u0924 \u092a\u0922\u093c\u0928\u0947 \u0915\u093e \u0938\u092e\u092f":"44 \u092e\u093f\u0928\u091f"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/xentegra.com\/resources\/93-the-citrix-session-citrix-and-chrome-os-secure-seamless-access-to-all-your-apps-for-all-your-employees\/#article","isPartOf":{"@id":"https:\/\/xentegra.com\/resources\/93-the-citrix-session-citrix-and-chrome-os-secure-seamless-access-to-all-your-apps-for-all-your-employees\/"},"author":{"name":"Chase Newmyer","@id":"https:\/\/xentegra.com\/#\/schema\/person\/84736408f096bfd92b80305aea8846a7"},"headline":"93: The Citrix Session: Citrix and Chrome OS: Secure Access to All Your Apps","datePublished":"2021-11-01T22:00:00+00:00","dateModified":"2026-01-30T17:19:28+00:00","mainEntityOfPage":{"@id":"https:\/\/xentegra.com\/resources\/93-the-citrix-session-citrix-and-chrome-os-secure-seamless-access-to-all-your-apps-for-all-your-employees\/"},"wordCount":9866,"commentCount":0,"publisher":{"@id":"https:\/\/xentegra.com\/#organization"},"image":{"@id":"https:\/\/xentegra.com\/resources\/93-the-citrix-session-citrix-and-chrome-os-secure-seamless-access-to-all-your-apps-for-all-your-employees\/#primaryimage"},"thumbnailUrl":"https:\/\/eadn-wc05-13529174.nxedge.io\/wp-content\/uploads\/2024\/03\/Citrix-Session.png","articleSection":["Podcast"],"inLanguage":"hi-IN","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/xentegra.com\/resources\/93-the-citrix-session-citrix-and-chrome-os-secure-seamless-access-to-all-your-apps-for-all-your-employees\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/xentegra.com\/resources\/93-the-citrix-session-citrix-and-chrome-os-secure-seamless-access-to-all-your-apps-for-all-your-employees\/","url":"https:\/\/xentegra.com\/resources\/93-the-citrix-session-citrix-and-chrome-os-secure-seamless-access-to-all-your-apps-for-all-your-employees\/","name":"93: The Citrix Session: Citrix and Chrome OS","isPartOf":{"@id":"https:\/\/xentegra.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/xentegra.com\/resources\/93-the-citrix-session-citrix-and-chrome-os-secure-seamless-access-to-all-your-apps-for-all-your-employees\/#primaryimage"},"image":{"@id":"https:\/\/xentegra.com\/resources\/93-the-citrix-session-citrix-and-chrome-os-secure-seamless-access-to-all-your-apps-for-all-your-employees\/#primaryimage"},"thumbnailUrl":"https:\/\/eadn-wc05-13529174.nxedge.io\/wp-content\/uploads\/2024\/03\/Citrix-Session.png","datePublished":"2021-11-01T22:00:00+00:00","dateModified":"2026-01-30T17:19:28+00:00","description":"The Citrix Session highlights how the partnership between Citrix and Chrome OS will empower employees to be more productive.","breadcrumb":{"@id":"https:\/\/xentegra.com\/resources\/93-the-citrix-session-citrix-and-chrome-os-secure-seamless-access-to-all-your-apps-for-all-your-employees\/#breadcrumb"},"inLanguage":"hi-IN","potentialAction":[{"@type":"ReadAction","target":["https:\/\/xentegra.com\/resources\/93-the-citrix-session-citrix-and-chrome-os-secure-seamless-access-to-all-your-apps-for-all-your-employees\/"]}]},{"@type":"ImageObject","inLanguage":"hi-IN","@id":"https:\/\/xentegra.com\/resources\/93-the-citrix-session-citrix-and-chrome-os-secure-seamless-access-to-all-your-apps-for-all-your-employees\/#primaryimage","url":"https:\/\/eadn-wc05-13529174.nxedge.io\/wp-content\/uploads\/2024\/03\/Citrix-Session.png","contentUrl":"https:\/\/eadn-wc05-13529174.nxedge.io\/wp-content\/uploads\/2024\/03\/Citrix-Session.png","width":1100,"height":600},{"@type":"BreadcrumbList","@id":"https:\/\/xentegra.com\/resources\/93-the-citrix-session-citrix-and-chrome-os-secure-seamless-access-to-all-your-apps-for-all-your-employees\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/xentegra.com\/"},{"@type":"ListItem","position":2,"name":"93: The Citrix Session: Citrix and Chrome OS: Secure Access to All Your Apps"}]},{"@type":"WebSite","@id":"https:\/\/xentegra.com\/#website","url":"https:\/\/xentegra.com\/","name":"\u091c\u093c\u0947\u0928\u091f\u0947\u0917\u094d\u0930\u093e","description":"","publisher":{"@id":"https:\/\/xentegra.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/xentegra.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"hi-IN"},{"@type":"Organization","@id":"https:\/\/xentegra.com\/#organization","name":"\u091c\u093c\u0947\u0928\u091f\u0947\u0917\u094d\u0930\u093e","url":"https:\/\/xentegra.com\/","logo":{"@type":"ImageObject","inLanguage":"hi-IN","@id":"https:\/\/xentegra.com\/#\/schema\/logo\/image\/","url":"https:\/\/eadn-wc05-13529174.nxedge.io\/wp-content\/uploads\/2023\/06\/1519903807641-min.jpg","contentUrl":"https:\/\/eadn-wc05-13529174.nxedge.io\/wp-content\/uploads\/2023\/06\/1519903807641-min.jpg","width":200,"height":200,"caption":"XenTegra"},"image":{"@id":"https:\/\/xentegra.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/XenTegra\/","https:\/\/x.com\/xentegra","https:\/\/www.linkedin.com\/company\/xentegra-llc"]},{"@type":"Person","@id":"https:\/\/xentegra.com\/#\/schema\/person\/84736408f096bfd92b80305aea8846a7","name":"Chase Newmyer","image":{"@type":"ImageObject","inLanguage":"hi-IN","@id":"https:\/\/secure.gravatar.com\/avatar\/d46cd44f0bd433dc5a386cbac549c62fd92266e3951669c705b347be2130cca3?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d46cd44f0bd433dc5a386cbac549c62fd92266e3951669c705b347be2130cca3?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d46cd44f0bd433dc5a386cbac549c62fd92266e3951669c705b347be2130cca3?s=96&d=mm&r=g","caption":"Chase Newmyer"},"url":"https:\/\/xentegra.com\/hi\/resources\/author\/chasenewmyer\/"}]}},"_links":{"self":[{"href":"https:\/\/xentegra.com\/hi\/wp-json\/wp\/v2\/posts\/66059","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/xentegra.com\/hi\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/xentegra.com\/hi\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/xentegra.com\/hi\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/xentegra.com\/hi\/wp-json\/wp\/v2\/comments?post=66059"}],"version-history":[{"count":948,"href":"https:\/\/xentegra.com\/hi\/wp-json\/wp\/v2\/posts\/66059\/revisions"}],"predecessor-version":[{"id":526468,"href":"https:\/\/xentegra.com\/hi\/wp-json\/wp\/v2\/posts\/66059\/revisions\/526468"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/xentegra.com\/hi\/wp-json\/wp\/v2\/media\/65995"}],"wp:attachment":[{"href":"https:\/\/xentegra.com\/hi\/wp-json\/wp\/v2\/media?parent=66059"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/xentegra.com\/hi\/wp-json\/wp\/v2\/categories?post=66059"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/xentegra.com\/hi\/wp-json\/wp\/v2\/tags?post=66059"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}