{"id":701892,"date":"2025-01-27T21:00:00","date_gmt":"2025-01-27T21:40:37","guid":{"rendered":"https:\/\/xentegra.com\/resources\/172-citrixs-strategic-moves-in-security-and-app-development\/"},"modified":"2025-10-28T15:25:31","modified_gmt":"2025-10-28T19:25:31","slug":"172-citrixs-strategic-moves-in-security-and-app-development","status":"publish","type":"post","link":"https:\/\/xentegra.com\/hi\/resources\/172-citrixs-strategic-moves-in-security-and-app-development\/","title":{"rendered":"172: Citrix&#8217;s Strategic Moves in Security and App Development"},"content":{"rendered":"<p><iframe loading=\"lazy\" style=\"width: 100%; height: 200px;\" src=\"https:\/\/www.buzzsprout.com\/670066\/episodes\/16513820-citrix-s-strategic-moves-in-security-and-app-development?iframe=true\" width=\"100%\" height=\"200\" frameborder=\"0\" scrolling=\"no\"><\/iframe><\/p>\n\n\n\n<p class=\"has-x-large-font-size\"><strong>Citrix\u2019s Strategic Moves in Security and App Development<\/strong>&nbsp;<\/p>\n\n\n\n<p>In an era where cybersecurity and remote work take center stage, Citrix is making significant moves to strengthen its position as a leader in secure hybrid work environments. The company\u2019s recent acquisitions of <strong>Device Trust<\/strong> \u0914\u0930 <strong>Strong Network<\/strong> demonstrate a clear commitment to bolstering <strong>Zero Trust architecture<\/strong> and enabling secure <strong>application development<\/strong>.&nbsp;<\/p>\n\n\n\n<p>These strategic acquisitions are more than just business maneuvers\u2014they\u2019re a testament to Citrix\u2019s evolving role in enterprise IT. Here\u2019s how Citrix is leveraging these technologies to deliver enhanced security and streamline operations for organizations worldwide.&nbsp;<\/p>\n\n\n\n<p class=\"has-large-font-size\"><strong>Reinforcing Security with Device Trust<\/strong>\u00a0<\/p>\n\n\n\n<p>One of the standout additions to Citrix\u2019s security stack is <strong>Device Trust<\/strong>, a platform that ensures continuous monitoring and enforcement of security policies for endpoint devices. Device Trust aligns seamlessly with Citrix\u2019s existing <strong>Secure Private Access<\/strong> solutions, offering real-time visibility into device posture and user behavior.&nbsp;<\/p>\n\n\n\n<p>This integration is a game-changer for organizations managing <strong>hybrid work security<\/strong>. With <strong>Device Trust<\/strong>, IT teams can enforce contextual policies, such as locking access if a device\u2019s firewall is disabled or a risky application is launched. This proactive approach strengthens <strong>Zero Trust architecture<\/strong> by ensuring that every action taken within a Citrix environment meets the highest security standards.&nbsp;<\/p>\n\n\n\n<p>The result? A secure, frictionless experience for users, regardless of where they work or what device they use.&nbsp;<\/p>\n\n\n\n<p class=\"has-large-font-size\"><strong><em>Transforming Application <\/em>Development<em> with Strong Network<\/em><\/strong>\u00a0<\/p>\n\n\n\n<p>The acquisition of <strong>Strong Network<\/strong> highlights Citrix\u2019s expansion into <strong>application development security<\/strong>. Traditionally, development environments have posed significant security challenges, especially with the rise of <strong>hybrid work<\/strong>. Developers often use a mix of personal and corporate devices, accessing tools and data across multiple clouds and on-premises environments.&nbsp;<\/p>\n\n\n\n<p>Strong Network addresses these issues by providing a <strong>secure development environment<\/strong> tailored to modern needs. This tool enables developers to work securely, whether they\u2019re leveraging Citrix Desktop-as-a-Service (DaaS) or containerized solutions. By consolidating development workflows into Citrix\u2019s platform, organizations can reduce costs, improve efficiency, and ensure compliance with corporate security policies.&nbsp;<\/p>\n\n\n\n<p class=\"has-large-font-size\"><strong>Expanding Secure Private Access for Hybrid Work<\/strong>\u00a0<\/p>\n\n\n\n<p>Citrix\u2019s <strong>Secure Private Access (SPA)<\/strong> solution has long been a staple for enabling secure access to web and SaaS applications. With the introduction of new hybrid models, Citrix has enhanced SPA to support <strong>on-premises data planes<\/strong>. This innovation ensures that organizations can benefit from a modern, <strong>\u0936\u0942\u0928\u094d\u092f \u0935\u093f\u0936\u094d\u0935\u093e\u0938<\/strong> approach while maintaining control over sensitive data.&nbsp;<\/p>\n\n\n\n<p>Another critical component of Citrix\u2019s <strong>SPA<\/strong> is its <strong>Enterprise Browser<\/strong>, a secure, containerized browser that allows users to access corporate resources without a VPN. This browser-based approach simplifies security management while delivering a high-definition user experience, even for unmanaged devices. It\u2019s a perfect example of how Citrix continues to innovate for the <strong>hybrid work<\/strong> era.&nbsp;<\/p>\n\n\n\n<p class=\"has-large-font-size\"><strong>Why These Moves Matter<\/strong>\u00a0<\/p>\n\n\n\n<p>Citrix\u2019s acquisitions of Device Trust and Strong Network are strategic responses to the growing complexity of enterprise IT. As organizations adopt <strong>\u0936\u0942\u0928\u094d\u092f \u0935\u093f\u0936\u094d\u0935\u093e\u0938<\/strong> frameworks, they need integrated solutions that can secure everything from endpoints to development environments.&nbsp;<\/p>\n\n\n\n<p>By embedding advanced security capabilities directly into its platform, Citrix is not just reacting to industry trends\u2014it\u2019s shaping them. These enhancements empower organizations to:&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Streamline IT management<\/strong> by consolidating tools into a single platform.\u00a0<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Reduce security risks<\/strong> with continuous monitoring and adaptive policies.\u00a0<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Support hybrid workforces<\/strong> with flexible, scalable solutions.\u00a0<\/li>\n<\/ul>\n\n\n\n<p class=\"has-large-font-size\"><strong>Conclusion: The Future of Secure Workflows<\/strong>\u00a0<\/p>\n\n\n\n<p>Citrix\u2019s strategic acquisitions and product enhancements reinforce its position as a leader in <strong>secure hybrid work<\/strong>. By integrating cutting-edge technologies like <strong>Device Trust<\/strong> \u0914\u0930 <strong>Strong Network<\/strong>, Citrix offers a comprehensive solution for securing enterprise IT environments while enabling productivity.&nbsp;<\/p>\n\n\n\n<p>Whether you\u2019re a <strong>CISO<\/strong>, an IT professional, or a developer, Citrix\u2019s innovations provide the tools needed to navigate today\u2019s challenges and prepare for tomorrow\u2019s opportunities. With a focus on <strong>Zero Trust architecture<\/strong> \u0914\u0930 <strong>application development security<\/strong>, Citrix is paving the way for more secure, efficient, and agile workflows.&nbsp;<\/p>\n\n\n\n<p><\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<p><strong>Episode Description<\/strong>:<\/p>\n\n\n\n<p>In this episode of The Citrix Session, Bill Sutton and guests delve into Citrix&#8217;s recent strategic acquisitions of Device Trust and Strong Network, examining how these integrate with Citrix&#8217;s security framework and enhance hybrid work environments. Join Andy Whiteside, Aaron Banner, Todd Smith, and Geremy Meyers as they explore the implications of these new capabilities on zero-trust architecture and secure private access. Discover how Citrix is not just improving security measures but also facilitating app development within its platform to adapt to the evolving needs of modern enterprises. Whether you&#8217;re a security professional or involved in enterprise IT, this discussion will provide deep insights into how Citrix&#8217;s latest enhancements can streamline operations and fortify security protocols in your organization.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<p><strong>\u092a\u094d\u0930\u0924\u093f\u0932\u093f\u092a\u093f<\/strong>:<\/p>\n\n\n\n<div class=\"transcript\">\n<p><!--block-->\u0935\u0947\u092c\u0935\u0940\u091f\u0940\u091f\u0940<\/p>\n<p>1<br>00:00:02.460 &#8211;&gt; 00:00:16.315<br>Bill Sutton: Hello, everyone, and welcome to episode 1 72 of the Citrix session. I&#8217;m your host today. Built. My name is Bill Sutton, the director of modern workspaces integra. I have some others integra folks on the call with us, as well as a couple of folks from<\/p>\n<p>2<br>00:00:16.710 &#8211;&gt; 00:00:22.310<br>Bill Sutton: from Citrix, so we&#8217;ll start off with Andy Whiteside from Zintegra. Andy. Introduce yourself real quick.<\/p>\n<p>3<br>00:00:22.310 &#8211;&gt; 00:00:34.559<br>Andy Whiteside: Hey, Bill? Glad to be on love what we do. Glad we&#8217;re doing these, and excited to talk about Citrix and security today, which it&#8217;s always been a security that always, always been a security play for me.<\/p>\n<p>4<br>00:00:35.090 &#8211;&gt; 00:00:38.129<br>Andy Whiteside: The idea of 0 trust in my world started with Citrix.<\/p>\n<p>5<br>00:00:38.350 &#8211;&gt; 00:00:52.110<br>Bill Sutton: Yes, and in that vein we also have with us another person from Zentegra, Aaron Banner, Aaron Banner. Why don&#8217;t you introduce yourself and talk about your role, and and so forth. Since it&#8217;s this 1st time you&#8217;ve been on welcome.<\/p>\n<p>6<br>00:00:52.280 &#8211;&gt; 00:01:13.400<br>Aaron Banner: Yeah. Hey, thanks, Bill, appreciate the opportunity to join you today. Yeah, I&#8217;m Aaron Banner. I run 2 practices with integra. I run a networking practice. And I run a security practice. And I think we&#8217;re here today to talk a little bit about security 0 trust app development and some key things that comes out of this. This acquisition from Citrix. Thanks.<\/p>\n<p>7<br>00:01:14.110 &#8211;&gt; 00:01:19.020<br>Bill Sutton: Great Aaron. Appreciate that. Alright, Todd, you want to just say hello to the folks.<\/p>\n<p>8<br>00:01:19.210 &#8211;&gt; 00:01:23.249<br>Todd Smith: Sure, hey? It&#8217;s Todd Smith from Citrix, glad to be here again.<\/p>\n<p>9<br>00:01:23.520 &#8211;&gt; 00:01:28.339<br>Bill Sutton: Yeah, of course. Glad to have you. And last, but not least, Mr. Myers. Mr. Jeremy Myers.<\/p>\n<p>10<br>00:01:28.340 &#8211;&gt; 00:01:34.590<br>Geremy Meyers: Bringing up the rear. My name is Jeremy. It&#8217;s a pleasure to see you all. And, Aaron, it&#8217;s a pleasure to meet you, too, actually.<\/p>\n<p>11<br>00:01:34.590 &#8211;&gt; 00:01:35.729<br>Aaron Banner: Yeah. Same. Here.<\/p>\n<p>12<br>00:01:35.940 &#8211;&gt; 00:01:36.490<br>\u092c\u093f\u0932 \u0938\u091f\u0928: \u0939\u093e\u0902.<\/p>\n<p>13<br>00:01:36.620 &#8211;&gt; 00:01:54.250<br>Bill Sutton: So the article we&#8217;re Gonna cover today. The blog article is entitled Citrix Strengthens 0 trust security posture with strategic acquisitions of device, trust and strong network. That&#8217;s a long title. But it&#8217;s by Sridhar Mulaputi, who&#8217;s the business unit manager, I believe, over Citrix.<\/p>\n<p>14<br>00:01:54.551 &#8211;&gt; 00:02:08.849<br>Bill Sutton: This this is a new basically talking about a new acquisition Citrix made last week of 2 companies device trust and strong network. And we&#8217;re going to go a little bit deeper in in into this in terms of what these do and how they<\/p>\n<p>15<br>00:02:08.889 &#8211;&gt; 00:02:13.070<br>Bill Sutton: they augment or benefit the citrix ecosystem.<\/p>\n<p>16<br>00:02:13.070 &#8211;&gt; 00:02:17.050<br>Andy Whiteside: I was. Gonna I told you guys coming. I wasn&#8217;t gonna say much, but I already see something. I gotta talk about.<\/p>\n<p>17<br>00:02:17.050 &#8211;&gt; 00:02:17.850<br>Bill Sutton: Please.<\/p>\n<p>18<br>00:02:18.480 &#8211;&gt; 00:02:37.780<br>Andy Whiteside: So what I just realized is the number one security play at Zintegra historically and still is Citrix, where people remotely access data and applications, whether they&#8217;re on the network or remote, and the number one and 2 people that I need to work with in this space are Jeremy and Todd and my security. Guy just met them for the 1st time.<\/p>\n<p>19<br>00:02:38.070 &#8211;&gt; 00:02:38.680<br>\u092c\u093f\u0932 \u0938\u091f\u0928: \u0939\u093e\u0902.<\/p>\n<p>20<br>00:02:39.270 &#8211;&gt; 00:02:39.960<br>\u090f\u0902\u0921\u0940 \u0935\u094d\u0939\u093e\u0907\u091f\u0938\u093e\u0907\u0921: \u092f\u0939\u0940 \u0939\u0948<\/p>\n<p>21<br>00:02:40.190 &#8211;&gt; 00:02:52.950<br>Andy Whiteside: the the alignment around Citrix, and and security in our world is makes complete sense, bringing us together and us going to the market, together with Citrix and security. I just realized that I I failed.<\/p>\n<p>22<br>00:02:53.420 &#8211;&gt; 00:03:16.690<br>Geremy Meyers: So Andy, to be fair. We walked into that one a little bit right? So I didn&#8217;t tee that up whatsoever. But, to be honest, you know I had a meeting with a Ciso recently, where I had to convince we had to convince as an account team. We had to convince the Ciso that it was worth meeting with us by socializing. You know there&#8217;s a so, you know, there&#8217;s a security aspect of what it is, we do.<\/p>\n<p>23<br>00:03:16.860 &#8211;&gt; 00:03:19.709<br>Geremy Meyers: and it was completely on unknown to her. So<\/p>\n<p>24<br>00:03:20.970 &#8211;&gt; 00:03:31.110<br>Geremy Meyers: so I say all that, just to say, we&#8217;re in a space where Citrix is almost out of the gate been a security solution, and yet doesn&#8217;t always look good as one. So.<\/p>\n<p>25<br>00:03:31.110 &#8211;&gt; 00:03:39.210<br>Andy Whiteside: It has one job. It has one job, and that&#8217;s get people access to applications and data in a high definition, user experience. And securely.<\/p>\n<p>26<br>00:03:39.530 &#8211;&gt; 00:03:41.599<br>Andy Whiteside: That&#8217;s what Citrix does.<\/p>\n<p>27<br>00:03:42.690 &#8211;&gt; 00:03:45.439<br>Todd Smith: And I think I think, Andy, one of the<\/p>\n<p>28<br>00:03:45.660 &#8211;&gt; 00:03:50.120<br>Todd Smith: kind of a comment that goes along with your your statement that you just made is<\/p>\n<p>29<br>00:03:50.340 &#8211;&gt; 00:03:54.420<br>Todd Smith: security has always been considered as an add-on to that stack.<\/p>\n<p>30<br>00:03:55.220 &#8211;&gt; 00:04:04.010<br>Todd Smith: We should really look at it as securely, providing access remotely or on network to applications and data<\/p>\n<p>31<br>00:04:04.140 &#8211;&gt; 00:04:04.690<br>Todd Smith: instead of.<\/p>\n<p>32<br>00:04:04.690 &#8211;&gt; 00:04:06.809<br>Andy Whiteside: With the with the high definition, user experience.<\/p>\n<p>33<br>00:04:06.810 &#8211;&gt; 00:04:18.549<br>Todd Smith: Correct. Yeah. And it it would be great if we could say, all of those things are equal and parallel when we&#8217;re making that statement. But we don&#8217;t talk that way. We need to have things in a sequence.<\/p>\n<p>34<br>00:04:18.660 &#8211;&gt; 00:04:25.070<br>Todd Smith: but I think we need to change the mindset a little bit within our customer and our partner community to better understand<\/p>\n<p>35<br>00:04:25.290 &#8211;&gt; 00:04:33.399<br>Todd Smith: that we&#8217;ve been doing security for almost our entire time. That Citrix has been a company<\/p>\n<p>36<br>00:04:35.010 &#8211;&gt; 00:04:45.120<br>Todd Smith: and we always got caught up in the you know the one slide that, said Citrix, secure by design, that always led to conversations about. Well, what do you? What exactly. Do you mean by that?<\/p>\n<p>37<br>00:04:46.320 &#8211;&gt; 00:04:50.760<br>Todd Smith: This is, you know what we&#8217;re gonna talk about in this article is really<\/p>\n<p>38<br>00:04:51.060 &#8211;&gt; 00:04:59.160<br>Todd Smith: expanding upon that, secure by design concept and really talk about. You know, this is something we&#8217;ve been doing for 30 plus years.<\/p>\n<p>39<br>00:05:00.040 &#8211;&gt; 00:05:00.760<br>Andy Whiteside: And I think.<\/p>\n<p>40<br>00:05:01.170 &#8211;&gt; 00:05:03.040<br>Geremy Meyers: So you know, I think<\/p>\n<p>41<br>00:05:03.220 &#8211;&gt; 00:05:07.939<br>Geremy Meyers: to be fair as a Citrix employee, I mean, I&#8217;ve been here 12 years now.<\/p>\n<p>42<br>00:05:08.558 &#8211;&gt; 00:05:19.239<br>Geremy Meyers: Yeah, we could do a better job of really sort of articulating where we fit into the security story of the customer. Right? So when we talk about security like that&#8217;s very nebulous word, right? So most<\/p>\n<p>43<br>00:05:19.510 &#8211;&gt; 00:05:24.650<br>Geremy Meyers: customers have a layered approach to security, you know. Where does Citrix fit into that layered approach?<\/p>\n<p>44<br>00:05:24.910 &#8211;&gt; 00:05:33.019<br>Geremy Meyers: And so, understanding, like what the solution does, honestly understanding our customers approach to security. And of course.<\/p>\n<p>45<br>00:05:33.510 &#8211;&gt; 00:05:39.349<br>Geremy Meyers: you know, kind of where we play into that where where we layer, into that, you know. I think we&#8217;ve got a pretty powerful story, but it can&#8217;t be<\/p>\n<p>46<br>00:05:39.620 &#8211;&gt; 00:05:54.640<br>Geremy Meyers: Todd to your point. We can&#8217;t have the one slide that&#8217;s secure by design. What does that even mean? Right? So I think you know what we do here with strong network. You know what we do from the Citrix solution really should be understanding. You know, where we fit into a customer strategy. And I think that&#8217;s honestly where we probably need to get better as an organization.<\/p>\n<p>47<br>00:05:55.190 &#8211;&gt; 00:06:06.669<br>Aaron Banner: Well, and you know there&#8217;s there&#8217;s also the the mindset that you can. You can never stop innovating. You can never stop trying to become more secure, and you can look at it, as<\/p>\n<p>48<br>00:06:06.860 &#8211;&gt; 00:06:27.110<br>Aaron Banner: you know, just just the the latest acquisition from Citrix. You can look at it as maybe defense in depth or or defense across a broad spectrum. But I mean, what about a year ago, I think Citrix bought Uber agent you know, a European company then, just now, Device Trust and and strong network. Strong network, I believe, is a Swiss Company<\/p>\n<p>49<br>00:06:27.110 &#8211;&gt; 00:06:54.410<br>Aaron Banner: device. Trust I. You know I looked up before we came here. To to understand a little bit more about them. But you know gmbh, gmb, ha! So tells me they&#8217;re a a German company. So something&#8217;s happening in Europe that Citrix really likes. And and and they&#8217;re pulling in. It looks to me like a lot of the right capabilities. From these partnerships or these acquisitions in order to to really drill down on on their security platform.<\/p>\n<p>50<br>00:06:54.600 &#8211;&gt; 00:06:57.380<br>Andy Whiteside: Aaron, and what I think it is is overall. The<\/p>\n<p>51<br>00:06:57.740 &#8211;&gt; 00:07:08.979<br>Andy Whiteside: the world of Citrix is secure by design, secure from the beginning, and then you factor in the ecosystem like the Igels. And now the device trusts the world, and it only compounds the security narrative.<\/p>\n<p>52<br>00:07:09.150 &#8211;&gt; 00:07:09.790<br>Aaron Banner: Right.<\/p>\n<p>53<br>00:07:11.740 &#8211;&gt; 00:07:33.660<br>Bill Sutton: All good stuff. So let&#8217;s talk. Talk 1st about device trust. You know, there&#8217;s some elements in this blog article that talk about the benefits of it. But why don&#8217;t we talk 1st about what what it does and what it accomplishes, at least from a technical or or end user experience level. And Jeremy, can you talk about it? I can talk a little bit about it. But I thought I&#8217;d start with you.<\/p>\n<p>54<br>00:07:34.130 &#8211;&gt; 00:07:42.949<br>Geremy Meyers: Oh, man, so I&#8217;m still picking this apart. Actually. So you know, the one thing that it seems to overlap with is our security app, you know, analytics platform.<\/p>\n<p>55<br>00:07:43.020 &#8211;&gt; 00:07:45.190<br>Geremy Meyers: And the idea behind that was<\/p>\n<p>56<br>00:07:45.210 &#8211;&gt; 00:08:14.039<br>Geremy Meyers: to sort of have continual security posturing right? And this is what device trust does really? Well, so the idea is, you know, I can certainly just from a 0 trust perspective, you know, I can certainly sort of vet you out on the way in. Be fair. You know, we&#8217;ve got a solution. That kind of already does that with device posturing service. Right? So if you&#8217;re a cloud customer and you&#8217;re authenticating through the workspace. There is a front door you&#8217;ve got to get through in order to, you know, even get initial access. But I think the idea behind device. Trust is continual.<\/p>\n<p>57<br>00:08:14.040 &#8211;&gt; 00:08:14.360<br>Bill Sutton: Yes.<\/p>\n<p>58<br>00:08:15.757 &#8211;&gt; 00:08:34.550<br>Geremy Meyers: not so much authorization. Maybe it&#8217;s authorization. This is where I get my security words mixed up. But you know, listen! If I turn off a feature of my machine like at the the firewall turned on. I turn it off, you know. That&#8217;s a change in my posture. I want to take immediate action. Maybe I switch networks. I&#8217;d like for my posture to change immediately, like I don&#8217;t wanna wait<\/p>\n<p>59<br>00:08:34.669 &#8211;&gt; 00:08:50.320<br>Geremy Meyers: 2&nbsp;min, 3&nbsp;min, 5&nbsp;min or the next time I log in for that posture check to happen. So a big piece of this is some pretty granular controls that happen in session on the fly, and immediately can restrict access based on your change in posture.<\/p>\n<p>60<br>00:08:50.960 &#8211;&gt; 00:09:16.469<br>Aaron Banner: Well, yeah. And if I can chime in just a little bit on what? What I what I understand now about Device Trust. You know we&#8217;ve been trying to continually answer the challenge of this remote hybrid workforce. And you know this is another great way to do that. So you know in in the identity space. If you will. You&#8217;ve got personal entities and non personal entities.<\/p>\n<p>61<br>00:09:16.470 &#8211;&gt; 00:09:33.640<br>Aaron Banner: Device Trust really looks at those non personal entities, looks at the systems accessing your network and and granting access. And so it&#8217;s not only saying that this device is able to access this network.<\/p>\n<p>62<br>00:09:33.640 &#8211;&gt; 00:09:52.639<br>Aaron Banner: but it&#8217;s looking at all the things that are on that device, and you can, tailor device, trust to the devices, to the information you want. It&#8217;s not just what it gives you you know, by default. But you can say, I want to know these things about these types of devices, whether that be a network device or an endpoint device, whatever that is.<\/p>\n<p>63<br>00:09:52.800 &#8211;&gt; 00:10:06.579<br>Aaron Banner: And so it&#8217;s going to, as it&#8217;s as it&#8217;s allowing or disallowing association with the network or association or access to information. It is going to verify not only that device, but what&#8217;s on that device.<\/p>\n<p>64<br>00:10:08.050 &#8211;&gt; 00:10:32.859<br>Bill Sutton: Right. It can also because I tested this out a little bit in the demo environment that Citrix is got available for us. And the interesting thing that I found about it was to Jeremy&#8217;s point, of course, that you can do the device posture as you as you come in the front door but once you&#8217;re in the door and you&#8217;ve got your you&#8217;re running your desktop. If you start certain applications in the case of the demo environment. It was the snipping application. It immediately locks your session.<\/p>\n<p>65<br>00:10:33.220 &#8211;&gt; 00:10:52.180<br>Bill Sutton: And if you and to Jeremy&#8217;s point, if you were to disable a firewall on it, it would do the same thing. So it&#8217;s it&#8217;s it&#8217;s monitoring the environment real in real time and looking for changes in behavior. If you plug in a USB stick. Maybe it locks the environment, that sort of thing. You can set all kinds of<\/p>\n<p>66<br>00:10:52.180 &#8211;&gt; 00:11:02.989<br>Bill Sutton: granular policies. To provide contextual access based on what the user is doing. So there&#8217;s a lot of security benefits in that regard. But it&#8217;s interesting how it works.<\/p>\n<p>67<br>00:11:04.190 &#8211;&gt; 00:11:07.920<br>Todd Smith: And it&#8217;s and it&#8217;s really, you know, to just even add on to that.<\/p>\n<p>68<br>00:11:08.140 &#8211;&gt; 00:11:13.960<br>Todd Smith: you know. Think about this as more and more companies are addressing. Bring your own. Bring your own device<\/p>\n<p>69<br>00:11:15.340 &#8211;&gt; 00:11:19.830<br>Todd Smith: environments. Or you know, users are starting to do things like<\/p>\n<p>70<br>00:11:20.670 &#8211;&gt; 00:11:33.369<br>Todd Smith: do updates of either an application, some type of software or operating system update or even adding a plugin into a browser can have an impact on the overall security posture of that device itself.<\/p>\n<p>71<br>00:11:33.890 &#8211;&gt; 00:11:50.830<br>Todd Smith: And that&#8217;s happening in the background after you&#8217;ve already set up your Citrix connection. Right? So we need to make sure that we have something in the in the way in the path of that user connecting into a virtual app or virtual desktop environment, to be able to detect that<\/p>\n<p>72<br>00:11:51.010 &#8211;&gt; 00:11:53.200<br>Todd Smith: there&#8217;s been something that has changed.<\/p>\n<p>73<br>00:11:53.430 &#8211;&gt; 00:11:57.909<br>Todd Smith: and apply the appropriate policy associated with that change.<\/p>\n<p>74<br>00:12:02.860 &#8211;&gt; 00:12:11.459<br>Bill Sutton: Definitely. Yes, anything else on device trust in particular, either generally or specifically, about the the acquisition before we move forward.<\/p>\n<p>75<br>00:12:11.720 &#8211;&gt; 00:12:13.409<br>Geremy Meyers: Yeah, I mean, I think<\/p>\n<p>76<br>00:12:13.860 &#8211;&gt; 00:12:24.510<br>Geremy Meyers: this is a very important piece to include in the Citrix stack. And it&#8217;s so important that we have made this a part of not only the new hybrid multi cloud license which<\/p>\n<p>77<br>00:12:24.620 &#8211;&gt; 00:12:38.580<br>Geremy Meyers: you know most customers are migrating to, so if you&#8217;re not familiar, I know we&#8217;ve covered this several times. It is the the pretty standard license most customers land on this. It&#8217;s a combination of cloud, and on prem licensing and several other buckets, including Uber agent. By the way, that was recently moved into this<\/p>\n<p>78<br>00:12:39.270 &#8211;&gt; 00:12:55.859<br>Geremy Meyers: do this license, but it also includes legacy das legacy, universal workspace service. So any cloud service that you you own. You will get access to this piece. That&#8217;s how important product management and the business think device trust 0 trust network access is to<\/p>\n<p>79<br>00:12:56.538 &#8211;&gt; 00:13:15.000<br>Geremy Meyers: just the security stack. So I think that&#8217;s important point to make. And from a layered perspective, it also includes now, like I mentioned Uber agent. So yes, I can get visibility into my environment from a infrastructure perspective. I&#8217;m looking at the vdas. I&#8217;m looking at the citrus components. Heck. I can even look at and monitor.<\/p>\n<p>80<br>00:13:15.000 &#8211;&gt; 00:13:27.840<br>Geremy Meyers: you know, components to support the citrus components like, say, your SQL. Database. But at the same time there are security events that can be monitored from an Uber agent perspective as well. So again, we talked about that defense in depth that layered approach.<\/p>\n<p>81<br>00:13:27.950 &#8211;&gt; 00:13:36.040<br>Geremy Meyers: You can see where we&#8217;re bringing this into just the standard core components of that Uhmc or even Das service license.<\/p>\n<p>82<br>00:13:36.040 &#8211;&gt; 00:14:03.420<br>Andy Whiteside: Well, let&#8217;s talk about the business aspect of that for Citrix to continue to be relevant. It&#8217;s about taking the good and great technologies they have, and then stacking additional things on top of that. So that when somebody is trying to evaluate, okay, maybe I just want to move to Microsoft. Avd, I want to use, like some minimal product to get this job done. Yes, you could do that from a decent user experience perspective. But Citrix is stacking up high definition, user experience along with high definition security simultaneously to make the platform<\/p>\n<p>83<br>00:14:03.480 &#8211;&gt; 00:14:11.180<br>Andy Whiteside: valuable to the point where there&#8217;s something in that stack that the client can&#8217;t live without, and they&#8217;re willing to pay for the more premium product.<\/p>\n<p>84<br>00:14:13.370 &#8211;&gt; 00:14:16.669<br>Geremy Meyers: Yeah. And honestly, Andy, to bring it home, because you usually stop me<\/p>\n<p>85<br>00:14:17.050 &#8211;&gt; 00:14:32.510<br>Geremy Meyers: whenever I get started down the path of this citrix value, and you go honestly. The number one thing, historically has been what the fact that it&#8217;s multi cloud hybrid cloud.no, it&#8217;s the fact that the protocol is. So that&#8217;s the secret sauce right there. The hdx, the Ica piece, the user experience.<\/p>\n<p>86<br>00:14:32.510 &#8211;&gt; 00:14:33.030<br>Andy Whiteside: Sure.<\/p>\n<p>87<br>00:14:33.350 &#8211;&gt; 00:14:40.650<br>Geremy Meyers: It&#8217;s thing number one. And I think what you&#8217;re seeing your point is, security is just becoming more embedded and visible into the base product.<\/p>\n<p>88<br>00:14:40.650 &#8211;&gt; 00:14:46.940<br>Andy Whiteside: Well, I think what I&#8217;m saying is, yeah, the the protocol is still the one I want to pull out of the bag. If I have to go tackle a project.<\/p>\n<p>89<br>00:14:47.240 &#8211;&gt; 00:14:56.200<br>Andy Whiteside: but that&#8217;s harder to sell people on. And then all of a sudden, you point out just key components like we&#8217;re talking about here, and all of a sudden. Yeah, my security guy can&#8217;t live without that. Let&#8217;s go.<\/p>\n<p>90<br>00:14:59.460 &#8211;&gt; 00:15:04.929<br>Bill Sutton: Yeah, absolutely anything else on the Device trust piece before we move on to strong networks.<\/p>\n<p>91<br>00:15:08.030 &#8211;&gt; 00:15:27.490<br>Bill Sutton: Alright strong networks. I I&#8217;d be honest to the listeners. I this one kind of confounded me. I&#8217;m hoping that some of the guys from Citrix can really shed some light on this one. It. It looks like some sort of development environments that are enabled from from Das or from Cbad. Can you guys elaborate at all on this.<\/p>\n<p>92<br>00:15:28.470 &#8211;&gt; 00:15:31.999<br>Todd Smith: Yeah, I I think I could take a stab at this one because it&#8217;s a<\/p>\n<p>93<br>00:15:32.220 &#8211;&gt; 00:15:43.200<br>Todd Smith: it. It&#8217;s really dealing with the the devops right? It used to be, you know, if you think about it, you used to have programmers, and you have operations team right<\/p>\n<p>94<br>00:15:43.380 &#8211;&gt; 00:15:57.039<br>Todd Smith: in in the cloud, especially these these cloud based applications that are being constantly tweaked and updated. And things like that, that line between development and operations has really kind of blurred.<\/p>\n<p>95<br>00:15:57.160 &#8211;&gt; 00:16:02.240<br>Todd Smith: And you now have some organizations that are saying.<\/p>\n<p>96<br>00:16:02.370 &#8211;&gt; 00:16:05.640<br>Todd Smith: You know what our developers do have access to<\/p>\n<p>97<br>00:16:05.910 &#8211;&gt; 00:16:10.410<br>Todd Smith: migrate code and to do things with that.<\/p>\n<p>98<br>00:16:10.520 &#8211;&gt; 00:16:22.539<br>Todd Smith: With that shift. There&#8217;s been a much more increased need for better security and better monitoring and restrictions on what they can do and how they do it.<\/p>\n<p>99<br>00:16:22.640 &#8211;&gt; 00:16:28.964<br>Todd Smith: So strong networks really kind of helps be able to kind of bridge that gap there.<\/p>\n<p>100<br>00:16:30.010 &#8211;&gt; 00:16:37.999<br>Todd Smith: securing resources, you know. So giving giving access to a developer to a secured development environment<\/p>\n<p>101<br>00:16:38.290 &#8211;&gt; 00:16:45.710<br>Todd Smith: that then restricts their ability to go up and just push things directly into production without going through a couple of gates.<\/p>\n<p>102<br>00:16:45.900 &#8211;&gt; 00:17:00.890<br>Todd Smith: Whether that be some type of authorization or some type of data and code control, or some type of kind of a automated workflow before you can actually push those things into a production environment.<\/p>\n<p>103<br>00:17:02.520 &#8211;&gt; 00:17:06.640<br>Aaron Banner: Yeah, I mean, development inherently is is very<\/p>\n<p>104<br>00:17:06.859 &#8211;&gt; 00:17:20.029<br>Aaron Banner: insecure, not secure. In general. And I I think this is something that gets lost on a lot of the developers out there. Or you know, companies that that are leading, you know, development teams.<\/p>\n<p>105<br>00:17:20.250 &#8211;&gt; 00:17:32.179<br>Aaron Banner: And so you know, there, there&#8217;s there&#8217;s multiple ways, multiple tools out there to solve this challenge. But it&#8217;s it&#8217;s clearly a challenge that that Citrix wanted to take on and and<\/p>\n<p>106<br>00:17:32.350 &#8211;&gt; 00:17:54.729<br>Aaron Banner: in the issue I think you have team is that you know, you&#8217;ve got someone working on, you know, a development scenario here. And with the the hybrid or multi cloud environment. You know, you may have pieces of that, whether it be tools or data, or whatever scattered everywhere, you know, you may be doing development here in azure and some some other things. Data or tools may be in aws.<\/p>\n<p>107<br>00:17:55.022 &#8211;&gt; 00:18:09.629<br>Aaron Banner: You may have some an On Prem environment that&#8217;s accessing that. So you&#8217;ve got. You&#8217;re you&#8217;re doing this one action in this one place. But you&#8217;re you&#8217;re reaching all over the place in order to pull all that together. And so the theory behind what&#8217;s what&#8217;s happening here is that<\/p>\n<p>108<br>00:18:09.850 &#8211;&gt; 00:18:23.549<br>Aaron Banner: you&#8217;re you&#8217;re you&#8217;re securing. You know that from from the start of development all the way through to to landing in a protection environment. And that&#8217;s that&#8217;s critical and something that a lot of organizations. Just I clearly I&#8217;ve seen don&#8217;t understand.<\/p>\n<p>109<br>00:18:23.950 &#8211;&gt; 00:18:24.480<br>\u091f\u094b\u0921 \u0938\u094d\u092e\u093f\u0925: \u0939\u093e\u0901.<\/p>\n<p>110<br>00:18:25.010 &#8211;&gt; 00:18:25.480<br>Bill Sutton: So is this.<\/p>\n<p>111<br>00:18:25.480 &#8211;&gt; 00:18:34.600<br>Todd Smith: Of it is, you know, the the historical. You know the horse, the historic waterfall development practices that were out there where you&#8217;d have<\/p>\n<p>112<br>00:18:35.210 &#8211;&gt; 00:18:43.359<br>Todd Smith: before you could move on to the next level or the next step. You have to go through a series of gates, or you have to go over. You know, you have to. You have to<\/p>\n<p>113<br>00:18:43.820 &#8211;&gt; 00:18:46.673<br>Todd Smith: get to the next level of that waterfall.<\/p>\n<p>114<br>00:18:47.230 &#8211;&gt; 00:18:56.539<br>Todd Smith: there was always things like software quality assurance, software quality control. And you would have configuration management team that would manage that process of<\/p>\n<p>115<br>00:18:57.510 &#8211;&gt; 00:18:58.900<br>Todd Smith: taking it from<\/p>\n<p>116<br>00:18:59.020 &#8211;&gt; 00:19:08.130<br>Todd Smith: your Qa and test environment and moving that into a production environment. And they were the ones responsible for making sure that there were things like<\/p>\n<p>117<br>00:19:09.350 &#8211;&gt; 00:19:24.009<br>Todd Smith: testing validation, making sure the libraries all match up, making sure all of those, you know, they would literally go through a checklist before they would allow that that piece of code to actually be migrated into the production libraries, and<\/p>\n<p>118<br>00:19:24.490 &#8211;&gt; 00:19:40.390<br>Todd Smith: a lot of that has changed with, you know, the agile development framework, a lot of organizations kind of merging the developer and operations teams together. A lot of the 3rd party software as a service and web based apps.<\/p>\n<p>119<br>00:19:40.580 &#8211;&gt; 00:19:45.470<br>Todd Smith: You know, there&#8217;s there&#8217;s some of those things are no longer in the customer&#8217;s control.<\/p>\n<p>120<br>00:19:47.040 &#8211;&gt; 00:19:50.709<br>Todd Smith: And you know, strong is strong. Network is the is<\/p>\n<p>121<br>00:19:50.890 &#8211;&gt; 00:19:56.059<br>Todd Smith: a yet another tool that can be brought into play to help manage that environment.<\/p>\n<p>122<br>00:19:58.130 &#8211;&gt; 00:20:08.959<br>Geremy Meyers: One of the things we one of the things we do, Bill, is Ats is, you know, with our accounts is we&#8217;re really trying to understand the use cases within the customers environment, and without a doubt<\/p>\n<p>123<br>00:20:09.630 &#8211;&gt; 00:20:20.609<br>Geremy Meyers: 99% of the time. Each of our customers has a Dev use case, a developer use case. Either a. These are internal employees or actually, what&#8217;s happening more often than not, it&#8217;s a it&#8217;s an external contractor. So.<\/p>\n<p>124<br>00:20:20.610 &#8211;&gt; 00:20:21.330<br>Bill Sutton: Like.<\/p>\n<p>125<br>00:20:21.710 &#8211;&gt; 00:20:36.650<br>Geremy Meyers: You know, especially for an external contractor, you know. Listen! Most organizations don&#8217;t want to go ship a laptop, so what do they do? They spin up a Vdi desktop right? So they&#8217;ll give someone a windows desktop into some kind of environment that they&#8217;ve got a patch and maintain. And, by the way is more expensive.<\/p>\n<p>126<br>00:20:36.870 &#8211;&gt; 00:20:43.730<br>Geremy Meyers: then maybe some alternatives. But that&#8217;s just kind of how it works today. Right? It&#8217;s easy. It&#8217;s very containerized. It<\/p>\n<p>127<br>00:20:44.460 &#8211;&gt; 00:21:08.119<br>Geremy Meyers: honestly present some problems because a lot of the developers like their own tools. And they&#8217;re kind of stuck with whatever is included inside the desktop. Or I&#8217;m gonna create a dedicated desktop, and let a developer just kind of go nuts with whatever they need. Right? So you know, I I think one of the pieces to this is, can we help save costs by maybe providing a different modality to doing this? So you know, with strong network, they are<\/p>\n<p>128<br>00:21:08.170 &#8211;&gt; 00:21:18.869<br>Geremy Meyers: honestly customized for dev use cases, right? So typically it&#8217;s either maybe a Linux virtual machine. It&#8217;s typically less expensive. And it&#8217;s the platform most developers use or be<\/p>\n<p>129<br>00:21:19.215 &#8211;&gt; 00:21:48.040<br>Geremy Meyers: you know, it&#8217;s a container of some kind, right? And so, you know, providing the developers, the platform they tend to use with the tools they tend to use and securing it, and I&#8217;m still working on some of the details just for myself and what this architecture looks like. But that&#8217;s kind of what we&#8217;re going here. Can we help you reduce costs and spend for this use case that is very common in most enterprise organizations. But at the same time making it secure and sort of tailored to this user population. So I could sum that up.<\/p>\n<p>130<br>00:21:48.150 &#8211;&gt; 00:21:50.680<br>Geremy Meyers: That&#8217;s probably how you can pigeonhole this now.<\/p>\n<p>131<br>00:21:53.720 &#8211;&gt; 00:22:00.470<br>Geremy Meyers: because it is sort of a different piece here, you know, it is only included in the Citrix platform license today.<\/p>\n<p>132<br>00:22:00.660 &#8211;&gt; 00:22:13.899<br>Geremy Meyers: So for organizations that are typically very large. And this maybe makes sense. Right? So for larger organizations that have dedicated teams that are very distributed lots of folks. This is probably where it makes the most sense. But that&#8217;s<\/p>\n<p>133<br>00:22:14.130 &#8211;&gt; 00:22:16.210<br>Geremy Meyers: maybe the best way to pigeonhole it today.<\/p>\n<p>134<br>00:22:19.020 &#8211;&gt; 00:22:41.439<br>Bill Sutton: Well, I appreciate that. That helps me understand it a lot better. Frankly, I mean, I think the goal of all of this is to improve the management of of security around 0 trust the 0 trust type concept. Right? That&#8217;s really what Citrix is trying to accomplish, based on what the article says itself. Any comments about this last sections, you know, simplifying 0 trust. With these tools.<\/p>\n<p>135<br>00:22:43.230 &#8211;&gt; 00:22:52.907<br>Todd Smith: I I think Jeremy kind of kind of touched on this a little bit with the you know, especially the strong networks piece that, you know, included in the platform licensing.<\/p>\n<p>136<br>00:22:54.030 &#8211;&gt; 00:22:59.820<br>Todd Smith: that&#8217;s part of it, right? It&#8217;s the the bigger overall approach towards this hybrid<\/p>\n<p>137<br>00:23:00.040 &#8211;&gt; 00:23:11.483<br>Todd Smith: 0 trust approach that we&#8217;re that we&#8217;re adopting. And we&#8217;re we&#8217;re embracing and continuing to nurture like we. You know, we we&#8217;ve had 0 trust before 0 trust because was 0 trust right?<\/p>\n<p>138<br>00:23:11.990 &#8211;&gt; 00:23:25.409<br>Todd Smith: and we&#8217;ve made some additional. You know, we&#8217;ve we&#8217;ve made some additional improvements around our security capabilities. Right? We talked about device trust. We talked about strong networks. We&#8217;ve talked about our overall, how those 2 fit together.<\/p>\n<p>139<br>00:23:25.820 &#8211;&gt; 00:23:31.427<br>Todd Smith: but as we segue into the next segment or the next section<\/p>\n<p>140<br>00:23:31.970 &#8211;&gt; 00:23:38.169<br>Todd Smith: we we&#8217;ve got to talk about. You know how we&#8217;re improving security around things like secure private access.<\/p>\n<p>141<br>00:23:39.420 &#8211;&gt; 00:23:40.630<br>Aaron Banner: Yeah. And I mean.<\/p>\n<p>142<br>00:23:40.910 &#8211;&gt; 00:23:53.999<br>Aaron Banner: remember, 0 trust is is a framework. It&#8217;s not a tool. It&#8217;s not a thing. And you know there&#8217;s i i think a lot of the tools that may be brought in are are<\/p>\n<p>143<br>00:23:55.030 &#8211;&gt; 00:24:18.300<br>Aaron Banner: really to enable policy. You know. So let&#8217;s say you have a policy of, you know in in this case with the device Trust right? You want. You want a policy about how you you know what you allow on endpoints, particularly those non managed endpoints. So talk a lot about managing points. But during in this hybrid environment, I think someone talked earlier about byod.<\/p>\n<p>144<br>00:24:18.490 &#8211;&gt; 00:24:41.034<br>Aaron Banner: it&#8217;s it&#8217;s, you know. So now you&#8217;re bringing in these unmanaged devices into your network. And you want to do that, you want to allow that. But but how do you? How do you develop policies around that? And so, if your policy says, I don&#8217;t know, you know th, these things cannot be allowed on the network, even though this device can be allowed on the network. Well, now, this is a tool that helps you to<\/p>\n<p>145<br>00:24:41.470 &#8211;&gt; 00:24:51.160<br>Aaron Banner: to to enforce that policy. And so just just always remember, like 0 trust is, it&#8217;s nothing but but a framework. And so and and largely.<\/p>\n<p>146<br>00:24:51.460 &#8211;&gt; 00:25:00.849<br>Aaron Banner: a lot of the technologies aren&#8217;t aren&#8217;t required for 0 trust. But a lot of the technologies are required in order to implement the policies that you want to define in your 0 trust environment.<\/p>\n<p>147<br>00:25:03.470 &#8211;&gt; 00:25:07.060<br>Bill Sutton: Thanks, Aaron, definitely good information. So I wanna<\/p>\n<p>148<br>00:25:07.240 &#8211;&gt; 00:25:30.179<br>Bill Sutton: double down on the next section, which is Citrix enhances hybrid work with expanded, secure private access. Obviously, what they&#8217;re talking about here to some degree correct is is the things we just talked about, which is device trust and and strong networks. But I think beyond that there&#8217;s some changes to Spa. Jeremy and Todd keep me honest around on premises. Data plane is that some of what&#8217;s being covered here.<\/p>\n<p>149<br>00:25:31.903 &#8211;&gt; 00:25:41.996<br>Geremy Meyers: I I think it&#8217;s alluding to it, Bill. So you know, traditionally secure private access has been a solution that has been entirely cloud based.<\/p>\n<p>150<br>00:25:42.940 &#8211;&gt; 00:26:04.760<br>Geremy Meyers: and you know, believe it or not. So we&#8217;ve got a fully on prem version of this as well. In fact, it&#8217;s baked into the product you go turn it on. And more recently, we have customers who like the administration of the cloud, but would prefer sort of a data flow on. Prem so true hybrid. So we&#8217;ve also got hybrid Spa, that Todd, is it Tech Preview? Or has it been released? Yet? I forget where this stands.<\/p>\n<p>151<br>00:26:04.760 &#8211;&gt; 00:26:06.109<br>Todd Smith: Think it&#8217;s still a tech preview.<\/p>\n<p>152<br>00:26:06.110 &#8211;&gt; 00:26:26.549<br>Geremy Meyers: Still check preview. Yeah, so this is coming again. It&#8217;s sort of an evolution of this secure private access, and ultimately to take a step back, you know, historically, when Andy and I got started 11 billion years ago, this was entirely virtual windows applications. And that&#8217;s it. Of course, we&#8217;ve evolved to include Linux applications. But you know, a big part of the story now is, how do you deliver<\/p>\n<p>153<br>00:26:26.961 &#8211;&gt; 00:26:39.609<br>Geremy Meyers: web and Sas based applications? Right? So something that typically required a web browser. And the Spa solution is actually inclusive of 2 different things. One is sort of a VPN virtual private access. Spa, access.<\/p>\n<p>154<br>00:26:40.050 &#8211;&gt; 00:26:51.300<br>Geremy Meyers: Think of it as more of a a more modern, smarter VPN. If you will, but also an enterprise browser as well, a containerized enterprise, browser that you can apply policies to. So<\/p>\n<p>155<br>00:26:51.400 &#8211;&gt; 00:27:16.170<br>Geremy Meyers: you know those 2 pieces again. 2 pieces of the layers here. Right? Can you do, Spa? Without the enterprise? Browser? Sure, you know there is a legacy VPN piece to that. But you can also pair the enterprise browser with Spa to provide, you know, things like internal access to websites without the full on VPN. What&#8217;s interesting is this is the model that Citrix has gone to as employees. So<\/p>\n<p>156<br>00:27:16.390 &#8211;&gt; 00:27:26.000<br>Geremy Meyers: you know, I don&#8217;t have a virtual desktop anymore. Bill, you know, I have a handful of virtual applications simply because there&#8217;s some requirements from a browser perspective to support that. But<\/p>\n<p>157<br>00:27:26.180 &#8211;&gt; 00:27:31.379<br>Geremy Meyers: 95% of what I do is all from an enterprise browser that runs locally and is rendered locally.<\/p>\n<p>158<br>00:27:31.660 &#8211;&gt; 00:27:36.880<br>Andy Whiteside: And and Jeremy. The internal cost savings on that compute workload is probably off the charts.<\/p>\n<p>159<br>00:27:36.880 &#8211;&gt; 00:27:46.009<br>Geremy Meyers: It is unbelievable. Yeah. So when we went through this transformation, believe it or not, initially, the idea was to do manage devices to everyone at Citrix.<\/p>\n<p>160<br>00:27:46.200 &#8211;&gt; 00:27:52.479<br>Geremy Meyers: and at some point we did the math, and 1 80 that right, and the big driver behind that was cost.<\/p>\n<p>161<br>00:27:52.680 &#8211;&gt; 00:27:59.970<br>Geremy Meyers: And so you know, a lot of it starts with the personas. I mean, you need to understand who your users are and what they need access to.<\/p>\n<p>162<br>00:27:59.970 &#8211;&gt; 00:28:03.499<br>Andy Whiteside: Did you say you went from planning unmanaged or managed devices.<\/p>\n<p>163<br>00:28:03.500 &#8211;&gt; 00:28:06.190<br>Geremy Meyers: Manage. We were going to be 100%, manage devices.<\/p>\n<p>164<br>00:28:06.190 &#8211;&gt; 00:28:06.620<br>\u090f\u0902\u0921\u0940 \u0935\u094d\u0939\u093e\u0907\u091f\u0938\u093e\u0907\u0921: \u0920\u0940\u0915 \u0939\u0948\u0964<\/p>\n<p>165<br>00:28:06.620 &#8211;&gt; 00:28:07.479<br>Geremy Meyers: Across the board.<\/p>\n<p>166<br>00:28:07.480 &#8211;&gt; 00:28:14.680<br>Andy Whiteside: And that would be the so managed devices accessing a secure portal would be the check check on the Security plan.<\/p>\n<p>167<br>00:28:15.180 &#8211;&gt; 00:28:15.680<br>Geremy Meyers: Right.<\/p>\n<p>168<br>00:28:15.680 &#8211;&gt; 00:28:24.870<br>Andy Whiteside: But then you factored in user experience. But also the 3rd thing which we haven&#8217;t really talked about a whole lot. And that is overall cost, and that&#8217;s when and that&#8217;s when the shit gets real.<\/p>\n<p>169<br>00:28:25.190 &#8211;&gt; 00:28:26.573<br>Geremy Meyers: That&#8217;s when it gets real.<\/p>\n<p>170<br>00:28:28.770 &#8211;&gt; 00:28:30.909<br>Andy Whiteside: Coming from a guy with 3 laptops on his desk.<\/p>\n<p>171<br>00:28:31.620 &#8211;&gt; 00:28:33.800<br>Geremy Meyers: Well, I might be right there with you, too, but.<\/p>\n<p>172<br>00:28:33.800 &#8211;&gt; 00:28:36.670<br>Andy Whiteside: In my world. I have 3, 3 company owned laptops on my desk.<\/p>\n<p>173<br>00:28:37.070 &#8211;&gt; 00:28:46.329<br>Geremy Meyers: To be fair. These are. These are 3 different personal devices that all access resources. And I&#8217;m not doing it with. VPN, I&#8217;m doing it with a containerized browser.<\/p>\n<p>174<br>00:28:46.480 &#8211;&gt; 00:28:48.750<br>Geremy Meyers: And that is 90% of my workflow.<\/p>\n<p>175<br>00:28:51.140 &#8211;&gt; 00:29:09.879<br>Andy Whiteside: The the, the security enhancements, the browser aspect of it. Where all you gotta do is get a browser sandbox on there. That is probably open the door to. I don&#8217;t. I don&#8217;t wanna call it Byod, but I I wanna call it not manage devices. So you can interpret that. However, you want, but that has new life again. I think.<\/p>\n<p>176<br>00:29:13.840 &#8211;&gt; 00:29:15.299<br>Bill Sutton: Yep, certainly sounds like it.<\/p>\n<p>177<br>00:29:15.600 &#8211;&gt; 00:29:16.580<br>Andy Whiteside: Sure.<\/p>\n<p>178<br>00:29:16.950 &#8211;&gt; 00:29:25.589<br>Bill Sutton: All right. We&#8217;re at the bottom of the blog article. Any other final thoughts work comments about these 2 technologies, and this article generally.<\/p>\n<p>179<br>00:29:26.990 &#8211;&gt; 00:29:27.480<br>\u090f\u0902\u0921\u0940 \u0935\u094d\u0939\u093e\u0907\u091f\u0938\u093e\u0907\u0921: \u0924\u094b.<\/p>\n<p>180<br>00:29:27.480 &#8211;&gt; 00:29:33.780<br>Andy Whiteside: Jeremy, you mentioned a while ago, you guys had to convince a CIO to talk to you guys about security.<\/p>\n<p>181<br>00:29:33.780 &#8211;&gt; 00:29:34.320<br>Geremy Meyers: Correct.<\/p>\n<p>182<br>00:29:35.430 &#8211;&gt; 00:29:42.470<br>Andy Whiteside: That&#8217;s got to be a common thing in your world. Where in, if if the world saw it the way I see it?<\/p>\n<p>183<br>00:29:43.167 &#8211;&gt; 00:29:46.469<br>Andy Whiteside: They would be. Cios would be coming to Citrix.<\/p>\n<p>184<br>00:29:46.650 &#8211;&gt; 00:29:50.970<br>Andy Whiteside: asking for the technology that&#8217;s been around for a long time, plus the new stuff.<\/p>\n<p>185<br>00:29:51.660 &#8211;&gt; 00:29:58.900<br>Andy Whiteside: That&#8217;s just not reality. Right? We&#8217;re we&#8217;re usually talking to the application and desktop team trying to get to the Ciso.<\/p>\n<p>186<br>00:29:59.020 &#8211;&gt; 00:30:05.959<br>Andy Whiteside: It really should be the Ciso coming to us for this conversation. I want you to answer that, and then I want Aaron to throw in his 2 cents.<\/p>\n<p>187<br>00:30:06.300 &#8211;&gt; 00:30:07.882<br>Geremy Meyers: Alright! What was the question? One more time.<\/p>\n<p>188<br>00:30:08.080 &#8211;&gt; 00:30:24.079<br>Andy Whiteside: Well, the question for you and Todd is, how often are you getting cisos coming to you guys, or or the opposite effect of that you&#8217;re having to go to Cisos and convince them even to talk to Citrix. And then I want Aaron to chime in on how he sees those things coming together.<\/p>\n<p>189<br>00:30:25.150 &#8211;&gt; 00:30:34.709<br>Geremy Meyers: So it&#8217;s common. But I think it largely depends on what our relationships are, where they are within the organization. Right? So if we are like you pointed out, kind of kind of<\/p>\n<p>190<br>00:30:35.000 &#8211;&gt; 00:30:45.989<br>Geremy Meyers: primarily in the Euc application management desktop management. You know that world, then? Yes, we&#8217;re making the case to go see the Ciso. But you know, when we have the relationships with the right level<\/p>\n<p>191<br>00:30:46.446 &#8211;&gt; 00:30:50.969<br>Geremy Meyers: it&#8217;s a lot easier for sure. So when we&#8217;re with a Vp of infrastructure when we&#8217;re with<\/p>\n<p>192<br>00:30:51.210 &#8211;&gt; 00:30:54.100<br>Geremy Meyers: of the CIO, I mean, it&#8217;s a no brainer, but it<\/p>\n<p>193<br>00:30:54.330 &#8211;&gt; 00:31:02.060<br>Geremy Meyers: listen. If it&#8217;s with the Uc team it&#8217;s looked at as a end, user productivity tool, not necessarily a security solution.<\/p>\n<p>194<br>00:31:02.060 &#8211;&gt; 00:31:07.790<br>Andy Whiteside: And is that a problem with Citrix product set? Or is that problem with the way it departments are laid out?<\/p>\n<p>195<br>00:31:08.100 &#8211;&gt; 00:31:16.270<br>Geremy Meyers: It&#8217;s probably more with how they&#8217;re laid out. I don&#8217;t necessarily think it&#8217;s a product issue, unless Todd clearly has a an opposing view here.<\/p>\n<p>196<br>00:31:16.270 &#8211;&gt; 00:31:16.910<br>Todd Smith: Well.<\/p>\n<p>197<br>00:31:18.010 &#8211;&gt; 00:31:27.590<br>Todd Smith: I I do say it&#8217;s both for a couple of reasons. Number one is historically, we&#8217;ve always been a remote access to applications and virtual desktops<\/p>\n<p>198<br>00:31:27.690 &#8211;&gt; 00:31:33.400<br>Todd Smith: solution which basically pigeonholed us into a into a very specific<\/p>\n<p>199<br>00:31:33.830 &#8211;&gt; 00:31:37.589<br>Todd Smith: part of the organization that dealt with our with our products.<\/p>\n<p>200<br>00:31:38.216 &#8211;&gt; 00:31:41.789<br>Todd Smith: Historically, we didn&#8217;t build in a lot of security<\/p>\n<p>201<br>00:31:42.120 &#8211;&gt; 00:31:46.340<br>Todd Smith: the bells and whistles that would identify us as a security company.<\/p>\n<p>202<br>00:31:47.750 &#8211;&gt; 00:31:50.380<br>Todd Smith: Yes, we have some great security tools.<\/p>\n<p>203<br>00:31:50.680 &#8211;&gt; 00:31:59.519<br>Todd Smith: not a lot of people on the Auc market understood what those security tools were. We integrated with authentication tools we integrated with.<\/p>\n<p>204<br>00:32:00.720 &#8211;&gt; 00:32:06.979<br>Todd Smith: You know, some of the firewalls that were out there. We. Oftentimes we weren&#8217;t at the<\/p>\n<p>205<br>00:32:07.560 &#8211;&gt; 00:32:13.289<br>Todd Smith: the network engineering level within a lot of customers.<\/p>\n<p>206<br>00:32:13.710 &#8211;&gt; 00:32:17.350<br>Todd Smith: So that was one thing, the second piece of it is.<\/p>\n<p>207<br>00:32:17.680 &#8211;&gt; 00:32:21.919<br>Todd Smith: it depends on where the where the Ciso sits within the organization<\/p>\n<p>208<br>00:32:22.620 &#8211;&gt; 00:32:24.929<br>Todd Smith: in relation to the Euc team<\/p>\n<p>209<br>00:32:25.160 &#8211;&gt; 00:32:34.299<br>Todd Smith: or the application desktop virtualization team, or the whoever is responsible for the Citrix environment. If they have a direct line of sight with the Ciso.<\/p>\n<p>210<br>00:32:35.130 &#8211;&gt; 00:32:37.699<br>Todd Smith: they probably have heard about Citrix.<\/p>\n<p>211<br>00:32:37.980 &#8211;&gt; 00:32:40.939<br>Todd Smith: They may know a little bit about what we can do.<\/p>\n<p>212<br>00:32:42.110 &#8211;&gt; 00:32:47.200<br>Todd Smith: One of our biggest challenges is getting is getting those cisos to<\/p>\n<p>213<br>00:32:47.640 &#8211;&gt; 00:32:51.819<br>Todd Smith: to understand that we can help reduce their threat risks<\/p>\n<p>214<br>00:32:52.130 &#8211;&gt; 00:32:58.900<br>Todd Smith: and and and oftentimes, when a Ciso does reach out to us, it&#8217;s after they&#8217;ve gone through some type of threat assessment<\/p>\n<p>215<br>00:32:59.350 &#8211;&gt; 00:33:03.329<br>Todd Smith: and said, Hey, you have a potential problem here.<\/p>\n<p>216<br>00:33:03.460 &#8211;&gt; 00:33:09.799<br>Todd Smith: You need to go talk to Citrix, and that&#8217;s being done by a couple of the vendors that are out there, you know, especially the security<\/p>\n<p>217<br>00:33:10.512 &#8211;&gt; 00:33:15.240<br>Todd Smith: consulting organizations that are out there doing these threat assessments.<\/p>\n<p>218<br>00:33:15.835 &#8211;&gt; 00:33:22.509<br>Todd Smith: They&#8217;re kind of pushing their customers. Our customers to have a deeper conversation with us.<\/p>\n<p>219<br>00:33:24.260 &#8211;&gt; 00:33:25.980<br>Geremy Meyers: So, Andy, I think.<\/p>\n<p>220<br>00:33:26.950 &#8211;&gt; 00:33:51.409<br>Geremy Meyers: I mean, listen, what were we originally trying to solve? For in a lot of cases it was the fact that client server applications just don&#8217;t run well when you leave the office right? Like trying to do that across the VPN. Didn&#8217;t make sense. So this is how we did it. And so the that was the primary reason is to make this application work well. The passive feature to that was, Oh, by the way, it&#8217;s more secure at the same time. But we were trying to solve this client server piece, I mean, I still<\/p>\n<p>221<br>00:33:51.610 &#8211;&gt; 00:33:53.999<br>Geremy Meyers: go to customers these days where<\/p>\n<p>222<br>00:33:54.860 &#8211;&gt; 00:33:58.619<br>Geremy Meyers: I mean. Listen, they&#8217;ll open up a VPN. To do a Citrix session right or.<\/p>\n<p>223<br>00:33:58.830 &#8211;&gt; 00:33:59.320<br>\u090f\u0902\u0921\u0940 \u0935\u094d\u0939\u093e\u0907\u091f\u0938\u093e\u0907\u0921: \u0939\u093e\u0901\u0964<\/p>\n<p>224<br>00:33:59.320 &#8211;&gt; 00:34:08.040<br>Geremy Meyers: They forget the fact. This Netscaler sits at the edge and can completely air gap near the access. But we&#8217;ll still do the VPN. On an unmanaged device<\/p>\n<p>225<br>00:34:08.350 &#8211;&gt; 00:34:20.499<br>Geremy Meyers: and just open up access just to do a Citrix session which blows my mind. But it just shows me that&#8217;s where you know, Todd, this is where I go, all right. This sits in a different spot within the organization, right? Because someone&#8217;s missing that piece of the architecture.<\/p>\n<p>226<br>00:34:20.949 &#8211;&gt; 00:34:48.219<br>Andy Whiteside: Yeah, I want to chime in on one more thing. And I do want Aaron&#8217;s feedback on this. So you&#8217;re talking about the organization structure alignment. I&#8217;m also going to add one of the things like Citrix has always been. Do we tell people we&#8217;re security company, do we not? And historically, it&#8217;s been because, in my opinion, that Citrix didn&#8217;t want to step on the toes of the natural security vendors because they wanted to work with them. Just kind of like what you were just saying a minute ago. I think we&#8217;re in an era now where we just just got to flat out. Tell people, hey? You don&#8217;t need that VPN anymore. We don&#8217;t part. We do partner with them.<\/p>\n<p>227<br>00:34:48.289 &#8211;&gt; 00:34:54.689<br>Andy Whiteside: But you don&#8217;t need them anymore. And that&#8217;s, I think, where Citrix, in this version of the company is probably at or getting to be.<\/p>\n<p>228<br>00:34:55.040 &#8211;&gt; 00:35:18.029<br>Geremy Meyers: Well, I think, just before Aaron, before you speak, I think one of the things we really try to go for to that point now is, we try to be pretty like we try to integrate with most most acts, aspects, or a lot of aspects of a customer security solution. So, for instance, you&#8217;re probably not using Citrix for identity. Right? You&#8217;re probably using Octa. You&#8217;re using intra, I do using something else. Let&#8217;s integrate with that. Or you know. Listen. You need to build an environment that&#8217;s air gapped in 2 or 3 different ways. You know, we<\/p>\n<p>229<br>00:35:18.040 &#8211;&gt; 00:35:43.190<br>Geremy Meyers: we sort of support that from where you place your resources like, I think, from an observability perspective, we have our own solution. But customers are looking for something very specific. How can we integrate those things together. I think that&#8217;s the real value is we&#8217;re trying not to be the quote unquote security solution. But just. And you know, I&#8217;ll come back to where I started is, where do we layer into what you&#8217;re doing today? I think we try really hard to have those hooks. If that makes sense.<\/p>\n<p>230<br>00:35:43.610 &#8211;&gt; 00:35:44.840<br>Andy Whiteside: Yeah. Hmm.<\/p>\n<p>231<br>00:35:45.790 &#8211;&gt; 00:35:48.380<br>Geremy Meyers: Alright, Aaron, explain it all to us. What&#8217;s the answer?<\/p>\n<p>232<br>00:35:48.410 &#8211;&gt; 00:35:50.110<br>Aaron Banner: That that&#8217;s a lot lot to unpack.<\/p>\n<p>233<br>00:35:50.110 &#8211;&gt; 00:35:51.720<br>Geremy Meyers: 42. The answer is, 42.<\/p>\n<p>234<br>00:35:51.890 &#8211;&gt; 00:36:11.069<br>Aaron Banner: So let let me let me see if I can go back to the the question you asked, and I think some of that revolves around the maybe the relationship between the Ciso and the CIO because I think your question was, Hey Cisco&#8217;s or your point was, Cisco should be coming to Citrix, not not the other way around.<\/p>\n<p>235<br>00:36:11.430 &#8211;&gt; 00:36:15.370<br>Aaron Banner: And I think part of that problem is that you know<\/p>\n<p>236<br>00:36:15.490 &#8211;&gt; 00:36:34.620<br>Aaron Banner: it, or or network access may may have been kind of. Okay, that&#8217;s the CIO&#8217;s thing. That&#8217;s not my thing. And and that&#8217;s just that&#8217;s bad business. If you ask me because at a minimum the Cisco should be interested in. What is my organization doing in the Citrix environment?<\/p>\n<p>237<br>00:36:35.100 &#8211;&gt; 00:36:52.469<br>Aaron Banner: And if if they are interested in that which they should, then it&#8217;s what what is, what is happening in the Citrix environment. And so I would say, based on these acquisitions. Now, you know, I&#8217;m very familiar with the Citrix platform. But I&#8217;m not familiar with every single security aspect of the Citrix platform. So<\/p>\n<p>238<br>00:36:52.570 &#8211;&gt; 00:36:59.884<br>Aaron Banner: by this, by nature of this acquisition, I would say that App dev wasn&#8217;t really secured in this way previously.<\/p>\n<p>239<br>00:37:00.760 &#8211;&gt; 00:37:08.010<br>Aaron Banner: by Citrix right? And so and so they were, you know, organizations were probably doing that outside of the Citrix platform, if<\/p>\n<p>240<br>00:37:08.430 &#8211;&gt; 00:37:22.180<br>Aaron Banner: a a smart security person was involved, and said, You can&#8217;t do this in this platform right now, because we need you to do do it over here because of these reasons. Right now you can bring that workload into the Citrix environment. And<\/p>\n<p>241<br>00:37:22.180 &#8211;&gt; 00:37:40.120<br>Aaron Banner: but but if it was that way before, that&#8217;s definitely something the Cisco should have known. So from a security aspect, you know, the the folks involved in security in any organization should have an understanding of what the security platform looks like, or the security posture looks like in any any environment that that they&#8217;re managing. Right?<\/p>\n<p>242<br>00:37:40.503 &#8211;&gt; 00:38:02.920<br>Aaron Banner: So so yes, in in this case, Andy, I mean, I&#8217;m sure anybody who has Citrix it&#8217;s it&#8217;s got to be a major port part of of what they do on a daily basis, and how their workforce does their job. And so from that aspect, there&#8217;s no way that me and I&#8217;ve been in a system role about 3 times. There&#8217;s no way that I wouldn&#8217;t want to have a very deep understanding of what that environment looks like.<\/p>\n<p>243<br>00:38:02.920 &#8211;&gt; 00:38:18.969<br>Andy Whiteside: But, Aaron, I would say, you&#8217;re a unicorn. Most security guys think about, you know, moats and intrusion. They think about some of the legacy stuff, too, but they don&#8217;t necessarily think about application, delivery and a systematic, secured, simplified method as being the number one approach to a security.<\/p>\n<p>244<br>00:38:19.170 &#8211;&gt; 00:38:21.190<br>Andy Whiteside: They don&#8217;t think like application<\/p>\n<p>245<br>00:38:21.670 &#8211;&gt; 00:38:29.660<br>Andy Whiteside: delivery, and how you do application delivery. They think about the layers of the network and the traditional security plays. That&#8217;s my take. Tell me if I&#8217;m wrong.<\/p>\n<p>246<br>00:38:30.450 &#8211;&gt; 00:38:57.740<br>Aaron Banner: I mean, you may be right. I you know I again you know my background. I don&#8217;t think I&#8217;ve mentioned it here today. My background is 31 years in the United States Army, and I started my career as as a network guy. You know, I was an it guy over my career. I&#8217;ve been both a Ciso and and a CIO I&#8217;ve I&#8217;ve held both both roles, and often I held both both roles simultaneously, so I I was. I was both at the same time and to me. That&#8217;s that&#8217;s where I would want to be.<\/p>\n<p>247<br>00:38:57.740 &#8211;&gt; 00:39:05.340<br>Aaron Banner: And then I have some security guys that kind of manage security for me and report to me on that. But I own both roles. I love that. I love that posture.<\/p>\n<p>248<br>00:39:05.787 &#8211;&gt; 00:39:17.469<br>Aaron Banner: So so yeah, I mean, maybe folks are different. But, Andy, I&#8217;ll tell you. I think I think the last figure I saw was there&#8217;s gonna be 750 million applications developed by 2026.<\/p>\n<p>249<br>00:39:17.470 &#8211;&gt; 00:39:17.930<br>\u090f\u0902\u0921\u0940 \u0935\u094d\u0939\u093e\u0907\u091f\u0938\u093e\u0907\u0921: \u0939\u093e\u0901\u0964<\/p>\n<p>250<br>00:39:17.930 &#8211;&gt; 00:39:24.559<br>Aaron Banner: Between now and 2026, 750 million different applications. So if you&#8217;re a security person and that doesn&#8217;t concern you.<\/p>\n<p>251<br>00:39:24.700 &#8211;&gt; 00:39:26.390<br>Aaron Banner: you need to figure it out.<\/p>\n<p>252<br>00:39:26.550 &#8211;&gt; 00:39:27.170<br>\u090f\u0902\u0921\u0940 \u0935\u094d\u0939\u093e\u0907\u091f\u0938\u093e\u0907\u0921: \u0939\u093e\u0901\u0964<\/p>\n<p>253<br>00:39:27.300 &#8211;&gt; 00:39:51.590<br>Andy Whiteside: And guys where this all worked out for me. When we were talking to Aaron about joining us long term, we started talking about some of his examples, and, you know, remotely presenting or even doing like secure browser service type of technology. Whether it was specifically that or not in like combat zones was stuff he was telling me about. Yeah, that&#8217;s exactly right. We we deliver the application smarter but efficient and high definition, and you know, we mitigate most of the security risk right then and there.<\/p>\n<p>254<br>00:39:55.400 &#8211;&gt; 00:39:56.250<br>Bill Sutton: Exactly.<\/p>\n<p>255<br>00:39:56.640 &#8211;&gt; 00:39:57.270<br>Geremy Meyers: It was right.<\/p>\n<p>256<br>00:39:57.270 &#8211;&gt; 00:40:07.550<br>Geremy Meyers: He did. He did he? He did say something that does resonate with me. It&#8217;s the fact that listen. If you think about the product stack the solution, stack that most organizations have<\/p>\n<p>257<br>00:40:08.040 &#8211;&gt; 00:40:33.019<br>Geremy Meyers: this. You only have the bandwidth to understand what&#8217;s a part of all those solutions. So it&#8217;s really important for us as 1st of all, as ats is Todd myself, to make sure customers understand what they have giving the right team. And to be fair, you know it was probably a fair question from the Cso. To really understand. Listen, what does your product do? Because I&#8217;m trying to understand where this fits into my strategy. So that&#8217;s a fair question. But I think it&#8217;s also to to pull this thing home. Is why we need to educate<\/p>\n<p>258<br>00:40:33.020 &#8211;&gt; 00:40:48.420<br>Geremy Meyers: is integra, our partners, they know the product inside. Now, this is why we&#8217;re doing this, podcast you guys understand what device trust is strong network. So again, you can take that to your customers as well. We could do a better job as an organization of socializing those pieces. Right? So I think that&#8217;s what we&#8217;re trying to get to<\/p>\n<p>259<br>00:40:48.843 &#8211;&gt; 00:40:54.630<br>Geremy Meyers: and we&#8217;ll keep evolving and hopefully, acquisitions like this, you know, kind of throw it on the radar of the industry, too.<\/p>\n<p>260<br>00:40:55.080 &#8211;&gt; 00:41:04.090<br>Bill Sutton: Yeah, and I suspect there&#8217;ll be a lot more blog type articles, Jeremy, around these topics, and we&#8217;ll dive deeper as they come out. Of course. To.<\/p>\n<p>261<br>00:41:04.090 &#8211;&gt; 00:41:25.970<br>Geremy Meyers: There&#8217;s a there&#8217;s a shameless plug bill. I&#8217;ll make a shameless plug plug for the for for tech zone. So if you are a citrix customer, and you have not been to tech zone recently. It is amazing. So there&#8217;s everything from tech briefs. So, for instance, if you just want to know what the heck an Uber agent is, and you don&#8217;t want to go through a big long. The documentation which reads like stereo instructions. Sometimes<\/p>\n<p>262<br>00:41:26.030 &#8211;&gt; 00:41:49.079<br>Geremy Meyers: tech zone is really good. It&#8217;ll give you a brief overview. I use this a lot. There&#8217;s even a guide on how to do a Poc for like an Uber agent. I&#8217;m sure we&#8217;ll see things like device trust briefs, you know, strong network briefs, things like that. But there are articles being written by our product specialists all the time takes me back to the day when we used to do a lot of this, so I would highly invest or highly recommend you invest some time just checking out tech zone, check out the community.<\/p>\n<p>263<br>00:41:49.080 &#8211;&gt; 00:41:54.120<br>Bill Sutton: I&#8217;m not sure where a stereo is, but nevertheless, I got the rest of what you said. So<\/p>\n<p>264<br>00:41:54.120 &#8211;&gt; 00:41:54.859<br>Bill Sutton: there you go. Yeah.<\/p>\n<p>265<br>00:41:54.860 &#8211;&gt; 00:42:06.189<br>Aaron Banner: Yeah, before we wrap up. If I can just throw in one more thing from my perspective of how I approach what we do. It&#8217;s integra, you know, is is finding ways to add value to clients. And so.<\/p>\n<p>266<br>00:42:06.250 &#8211;&gt; 00:42:28.479<br>Aaron Banner: you know, I I just made a note to someone today about, you know, somebody upgraded their Microsoft licensing, and so I was able to find some some value in that where they were able to trade off. You know something they were doing in in a separate instance for for that now. And so it&#8217;s gonna save them money over the long term. And I think you you&#8217;re you might be able to find that here, too, depending on what an organization is doing. So<\/p>\n<p>267<br>00:42:28.610 &#8211;&gt; 00:42:35.270<br>Aaron Banner: you know Citrix is is. Yes, it&#8217;s becoming more secure. But it&#8217;s also<\/p>\n<p>268<br>00:42:35.370 &#8211;&gt; 00:43:00.089<br>Aaron Banner: becoming a platform that you&#8217;re going to be able to add more workloads into because of the addition of things like strong network and device trust. So so there&#8217;s more things that Citrix is saying. Now, you can do this securely in our environment. You don&#8217;t need to go outside of our environment like secure app dev, right? And so what we need integra and and citrix. What we need to be focused on is looking at our client base and saying, Okay.<\/p>\n<p>269<br>00:43:00.250 &#8211;&gt; 00:43:12.010<br>Aaron Banner: how are you postured? Now, what do you have right now? What tools do you have that&#8217;s doing this today that we can now maybe offset and pull that into the Citrix environment. So you don&#8217;t have to have that additional<\/p>\n<p>270<br>00:43:12.485 &#8211;&gt; 00:43:17.859<br>Aaron Banner: time, effort, and money going into to paying or or running, that that application any longer.<\/p>\n<p>271<br>00:43:18.690 &#8211;&gt; 00:43:37.321<br>Bill Sutton: Yeah, that&#8217;s absolutely true, Aaron. And I think that that the whole concept of the packaging changes around universal hybrid multi cloud in Citrix and the platform licenses. It&#8217;s it&#8217;s as much, if not more, about driving adoption of new features within the the solution set and many of those features<\/p>\n<p>272<br>00:43:37.680 &#8211;&gt; 00:43:54.413<br>Bill Sutton: can can replace or or augment other products that the customers might be using and and result in cost savings as well as you know, a simplified structure versus a bunch of point products. So that&#8217;s certainly one of the goals. And I think that Citrix is<\/p>\n<p>273<br>00:43:54.770 &#8211;&gt; 00:44:08.699<br>Bill Sutton: demonstrated that by these acquisitions is the ability to grow the the use cases and the security well, the use case around strong networks. And of course, the security capabilities around Device Trust is going a long way towards accomplishing that goal.<\/p>\n<p>274<br>00:44:12.220 &#8211;&gt; 00:44:17.970<br>Bill Sutton: Alright any other. Any other thoughts on these this topic today, folks, before we adjourn.<\/p>\n<p>275<br>00:44:18.180 &#8211;&gt; 00:44:23.640<br>Geremy Meyers: You know, but we always do this when we say, Hey, well, this is a short blog post, and yet we.<\/p>\n<p>276<br>00:44:23.640 &#8211;&gt; 00:44:29.599<br>Bill Sutton: I know. I know for 51&nbsp;min. Right? So, yeah.<\/p>\n<p>277<br>00:44:29.950 &#8211;&gt; 00:44:32.510<br>Geremy Meyers: Listen. Security is a good jumping off point to a lot of topics. So.<\/p>\n<p>278<br>00:44:32.510 &#8211;&gt; 00:44:34.600<br>Bill Sutton: It is. Yeah, for sure. So<\/p>\n<p>279<br>00:44:34.730 &#8211;&gt; 00:44:49.270<br>Bill Sutton: all right. Well, thank you all very much. Again, as usual. Thanks, Aaron, for joining us today. It was great having you and great input, and we&#8217;ll we&#8217;ll do it again next time. Happy holidays to all our listeners, and thanks a lot.<\/p>\n<p>280<br>00:44:49.450 &#8211;&gt; 00:44:49.990<br>\u0917\u0947\u0930\u0947\u092e\u0940 \u092e\u0947\u092f\u0930\u094d\u0938: \u0920\u0940\u0915 \u0939\u0948\u0964<\/p>\n<p>281<br>00:44:49.990 &#8211;&gt; 00:44:50.700<br>Geremy Meyers: Alright. Guys.<\/p>\n<p>282<br>00:44:50.920 &#8211;&gt; 00:44:51.410<br>Todd Smith: Thank you. Guys.<\/p>\n<p>283<br>00:44:52.050 &#8211;&gt; 00:44:52.730<br>Geremy Meyers: Talk to you later.<\/p>\n<p>&nbsp;<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>Citrix\u2019s Strategic Moves in Security and App Development&nbsp; In an era where cybersecurity and remote work take center stage, Citrix is making significant moves to strengthen its position as a &hellip;<\/p>","protected":false},"author":7,"featured_media":65995,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_price":"","_stock":"","_tribe_ticket_header":"","_tribe_default_ticket_provider":"","_tribe_ticket_capacity":"0","_ticket_start_date":"","_ticket_end_date":"","_tribe_ticket_show_description":"","_tribe_ticket_show_not_going":false,"_tribe_ticket_use_global_stock":"","_tribe_ticket_global_stock_level":"","_global_stock_mode":"","_global_stock_cap":"","_tribe_rsvp_for_event":"","_tribe_ticket_going_count":"","_tribe_ticket_not_going_count":"","_tribe_tickets_list":"[]","_tribe_ticket_has_attendee_info_fields":false,"footnotes":""},"categories":[5],"tags":[],"class_list":["post-701892","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-podcast"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>172: Citrix&#039;s Strategic Moves in Security and App Development - XenTegra<\/title>\n<meta name=\"description\" content=\"Citrix is leveraging these technologies to deliver enhanced security and streamline operations for organizations worldwide.\u00a0\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/xentegra.com\/hi\/resources\/172-citrixs-strategic-moves-in-security-and-app-development\/\" \/>\n<meta property=\"og:locale\" content=\"hi_IN\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"172: Citrix&#039;s Strategic Moves in Security and App Development - XenTegra\" \/>\n<meta property=\"og:description\" content=\"Citrix is leveraging these technologies to deliver enhanced security and streamline operations for organizations worldwide.\u00a0\" \/>\n<meta property=\"og:url\" content=\"https:\/\/xentegra.com\/hi\/resources\/172-citrixs-strategic-moves-in-security-and-app-development\/\" \/>\n<meta property=\"og:site_name\" content=\"XenTegra\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/XenTegra\/\" \/>\n<meta property=\"article:published_time\" content=\"2025-01-27T21:40:37+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-10-28T19:25:31+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/eadn-wc05-13529174.nxedge.io\/wp-content\/uploads\/2024\/03\/Citrix-Session.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1100\" \/>\n\t<meta property=\"og:image:height\" content=\"600\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Chase Newmyer\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@xentegra\" \/>\n<meta name=\"twitter:site\" content=\"@xentegra\" \/>\n<meta name=\"twitter:label1\" content=\"\u0926\u094d\u0935\u093e\u0930\u093e \u0932\u093f\u0916\u093f\u0924\" \/>\n\t<meta name=\"twitter:data1\" content=\"Chase Newmyer\" \/>\n\t<meta name=\"twitter:label2\" content=\"\u0905\u0928\u0941\u092e\u093e\u0928\u093f\u0924 \u092a\u0922\u093c\u0928\u0947 \u0915\u093e \u0938\u092e\u092f\" \/>\n\t<meta name=\"twitter:data2\" content=\"46 \u092e\u093f\u0928\u091f\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/xentegra.com\\\/resources\\\/172-citrixs-strategic-moves-in-security-and-app-development\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/xentegra.com\\\/resources\\\/172-citrixs-strategic-moves-in-security-and-app-development\\\/\"},\"author\":{\"name\":\"Chase Newmyer\",\"@id\":\"https:\\\/\\\/xentegra.com\\\/#\\\/schema\\\/person\\\/84736408f096bfd92b80305aea8846a7\"},\"headline\":\"172: Citrix&#8217;s Strategic Moves in Security and App Development\",\"datePublished\":\"2025-01-27T21:40:37+00:00\",\"dateModified\":\"2025-10-28T19:25:31+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/xentegra.com\\\/resources\\\/172-citrixs-strategic-moves-in-security-and-app-development\\\/\"},\"wordCount\":10371,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/xentegra.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/xentegra.com\\\/resources\\\/172-citrixs-strategic-moves-in-security-and-app-development\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/xentegra.com\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/Citrix-Session.png\",\"articleSection\":[\"Podcast\"],\"inLanguage\":\"hi-IN\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/xentegra.com\\\/resources\\\/172-citrixs-strategic-moves-in-security-and-app-development\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/xentegra.com\\\/resources\\\/172-citrixs-strategic-moves-in-security-and-app-development\\\/\",\"url\":\"https:\\\/\\\/xentegra.com\\\/resources\\\/172-citrixs-strategic-moves-in-security-and-app-development\\\/\",\"name\":\"172: Citrix's Strategic Moves in Security and App Development - XenTegra\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/xentegra.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/xentegra.com\\\/resources\\\/172-citrixs-strategic-moves-in-security-and-app-development\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/xentegra.com\\\/resources\\\/172-citrixs-strategic-moves-in-security-and-app-development\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/xentegra.com\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/Citrix-Session.png\",\"datePublished\":\"2025-01-27T21:40:37+00:00\",\"dateModified\":\"2025-10-28T19:25:31+00:00\",\"description\":\"Citrix is leveraging these technologies to deliver enhanced security and streamline operations for organizations worldwide.\u00a0\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/xentegra.com\\\/resources\\\/172-citrixs-strategic-moves-in-security-and-app-development\\\/#breadcrumb\"},\"inLanguage\":\"hi-IN\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/xentegra.com\\\/resources\\\/172-citrixs-strategic-moves-in-security-and-app-development\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"hi-IN\",\"@id\":\"https:\\\/\\\/xentegra.com\\\/resources\\\/172-citrixs-strategic-moves-in-security-and-app-development\\\/#primaryimage\",\"url\":\"https:\\\/\\\/xentegra.com\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/Citrix-Session.png\",\"contentUrl\":\"https:\\\/\\\/xentegra.com\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/Citrix-Session.png\",\"width\":1100,\"height\":600},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/xentegra.com\\\/resources\\\/172-citrixs-strategic-moves-in-security-and-app-development\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/xentegra.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"172: Citrix&#8217;s Strategic Moves in Security and App Development\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/xentegra.com\\\/#website\",\"url\":\"https:\\\/\\\/xentegra.com\\\/\",\"name\":\"XenTegra\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/xentegra.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/xentegra.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"hi-IN\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/xentegra.com\\\/#organization\",\"name\":\"XenTegra\",\"url\":\"https:\\\/\\\/xentegra.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"hi-IN\",\"@id\":\"https:\\\/\\\/xentegra.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/xentegra.com\\\/wp-content\\\/uploads\\\/2023\\\/06\\\/1519903807641-min.jpg\",\"contentUrl\":\"https:\\\/\\\/xentegra.com\\\/wp-content\\\/uploads\\\/2023\\\/06\\\/1519903807641-min.jpg\",\"width\":200,\"height\":200,\"caption\":\"XenTegra\"},\"image\":{\"@id\":\"https:\\\/\\\/xentegra.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/XenTegra\\\/\",\"https:\\\/\\\/x.com\\\/xentegra\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/xentegra-llc\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/xentegra.com\\\/#\\\/schema\\\/person\\\/84736408f096bfd92b80305aea8846a7\",\"name\":\"Chase Newmyer\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"hi-IN\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d46cd44f0bd433dc5a386cbac549c62fd92266e3951669c705b347be2130cca3?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d46cd44f0bd433dc5a386cbac549c62fd92266e3951669c705b347be2130cca3?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d46cd44f0bd433dc5a386cbac549c62fd92266e3951669c705b347be2130cca3?s=96&d=mm&r=g\",\"caption\":\"Chase Newmyer\"},\"url\":\"https:\\\/\\\/xentegra.com\\\/hi\\\/resources\\\/author\\\/chasenewmyer\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"172: Citrix's Strategic Moves in Security and App Development - XenTegra","description":"Citrix is leveraging these technologies to deliver enhanced security and streamline operations for organizations worldwide.\u00a0","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/xentegra.com\/hi\/resources\/172-citrixs-strategic-moves-in-security-and-app-development\/","og_locale":"hi_IN","og_type":"article","og_title":"172: Citrix's Strategic Moves in Security and App Development - XenTegra","og_description":"Citrix is leveraging these technologies to deliver enhanced security and streamline operations for organizations worldwide.\u00a0","og_url":"https:\/\/xentegra.com\/hi\/resources\/172-citrixs-strategic-moves-in-security-and-app-development\/","og_site_name":"XenTegra","article_publisher":"https:\/\/www.facebook.com\/XenTegra\/","article_published_time":"2025-01-27T21:40:37+00:00","article_modified_time":"2025-10-28T19:25:31+00:00","og_image":[{"width":1100,"height":600,"url":"https:\/\/eadn-wc05-13529174.nxedge.io\/wp-content\/uploads\/2024\/03\/Citrix-Session.png","type":"image\/png"}],"author":"Chase Newmyer","twitter_card":"summary_large_image","twitter_creator":"@xentegra","twitter_site":"@xentegra","twitter_misc":{"\u0926\u094d\u0935\u093e\u0930\u093e \u0932\u093f\u0916\u093f\u0924":"Chase Newmyer","\u0905\u0928\u0941\u092e\u093e\u0928\u093f\u0924 \u092a\u0922\u093c\u0928\u0947 \u0915\u093e \u0938\u092e\u092f":"46 \u092e\u093f\u0928\u091f"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/xentegra.com\/resources\/172-citrixs-strategic-moves-in-security-and-app-development\/#article","isPartOf":{"@id":"https:\/\/xentegra.com\/resources\/172-citrixs-strategic-moves-in-security-and-app-development\/"},"author":{"name":"Chase Newmyer","@id":"https:\/\/xentegra.com\/#\/schema\/person\/84736408f096bfd92b80305aea8846a7"},"headline":"172: Citrix&#8217;s Strategic Moves in Security and App Development","datePublished":"2025-01-27T21:40:37+00:00","dateModified":"2025-10-28T19:25:31+00:00","mainEntityOfPage":{"@id":"https:\/\/xentegra.com\/resources\/172-citrixs-strategic-moves-in-security-and-app-development\/"},"wordCount":10371,"commentCount":0,"publisher":{"@id":"https:\/\/xentegra.com\/#organization"},"image":{"@id":"https:\/\/xentegra.com\/resources\/172-citrixs-strategic-moves-in-security-and-app-development\/#primaryimage"},"thumbnailUrl":"https:\/\/eadn-wc05-13529174.nxedge.io\/wp-content\/uploads\/2024\/03\/Citrix-Session.png","articleSection":["Podcast"],"inLanguage":"hi-IN","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/xentegra.com\/resources\/172-citrixs-strategic-moves-in-security-and-app-development\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/xentegra.com\/resources\/172-citrixs-strategic-moves-in-security-and-app-development\/","url":"https:\/\/xentegra.com\/resources\/172-citrixs-strategic-moves-in-security-and-app-development\/","name":"172: Citrix's Strategic Moves in Security and App Development - XenTegra","isPartOf":{"@id":"https:\/\/xentegra.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/xentegra.com\/resources\/172-citrixs-strategic-moves-in-security-and-app-development\/#primaryimage"},"image":{"@id":"https:\/\/xentegra.com\/resources\/172-citrixs-strategic-moves-in-security-and-app-development\/#primaryimage"},"thumbnailUrl":"https:\/\/eadn-wc05-13529174.nxedge.io\/wp-content\/uploads\/2024\/03\/Citrix-Session.png","datePublished":"2025-01-27T21:40:37+00:00","dateModified":"2025-10-28T19:25:31+00:00","description":"Citrix is leveraging these technologies to deliver enhanced security and streamline operations for organizations worldwide.\u00a0","breadcrumb":{"@id":"https:\/\/xentegra.com\/resources\/172-citrixs-strategic-moves-in-security-and-app-development\/#breadcrumb"},"inLanguage":"hi-IN","potentialAction":[{"@type":"ReadAction","target":["https:\/\/xentegra.com\/resources\/172-citrixs-strategic-moves-in-security-and-app-development\/"]}]},{"@type":"ImageObject","inLanguage":"hi-IN","@id":"https:\/\/xentegra.com\/resources\/172-citrixs-strategic-moves-in-security-and-app-development\/#primaryimage","url":"https:\/\/eadn-wc05-13529174.nxedge.io\/wp-content\/uploads\/2024\/03\/Citrix-Session.png","contentUrl":"https:\/\/eadn-wc05-13529174.nxedge.io\/wp-content\/uploads\/2024\/03\/Citrix-Session.png","width":1100,"height":600},{"@type":"BreadcrumbList","@id":"https:\/\/xentegra.com\/resources\/172-citrixs-strategic-moves-in-security-and-app-development\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/xentegra.com\/"},{"@type":"ListItem","position":2,"name":"172: Citrix&#8217;s Strategic Moves in Security and App Development"}]},{"@type":"WebSite","@id":"https:\/\/xentegra.com\/#website","url":"https:\/\/xentegra.com\/","name":"\u091c\u093c\u0947\u0928\u091f\u0947\u0917\u094d\u0930\u093e","description":"","publisher":{"@id":"https:\/\/xentegra.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/xentegra.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"hi-IN"},{"@type":"Organization","@id":"https:\/\/xentegra.com\/#organization","name":"\u091c\u093c\u0947\u0928\u091f\u0947\u0917\u094d\u0930\u093e","url":"https:\/\/xentegra.com\/","logo":{"@type":"ImageObject","inLanguage":"hi-IN","@id":"https:\/\/xentegra.com\/#\/schema\/logo\/image\/","url":"https:\/\/eadn-wc05-13529174.nxedge.io\/wp-content\/uploads\/2023\/06\/1519903807641-min.jpg","contentUrl":"https:\/\/eadn-wc05-13529174.nxedge.io\/wp-content\/uploads\/2023\/06\/1519903807641-min.jpg","width":200,"height":200,"caption":"XenTegra"},"image":{"@id":"https:\/\/xentegra.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/XenTegra\/","https:\/\/x.com\/xentegra","https:\/\/www.linkedin.com\/company\/xentegra-llc"]},{"@type":"Person","@id":"https:\/\/xentegra.com\/#\/schema\/person\/84736408f096bfd92b80305aea8846a7","name":"Chase Newmyer","image":{"@type":"ImageObject","inLanguage":"hi-IN","@id":"https:\/\/secure.gravatar.com\/avatar\/d46cd44f0bd433dc5a386cbac549c62fd92266e3951669c705b347be2130cca3?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d46cd44f0bd433dc5a386cbac549c62fd92266e3951669c705b347be2130cca3?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d46cd44f0bd433dc5a386cbac549c62fd92266e3951669c705b347be2130cca3?s=96&d=mm&r=g","caption":"Chase Newmyer"},"url":"https:\/\/xentegra.com\/hi\/resources\/author\/chasenewmyer\/"}]}},"_links":{"self":[{"href":"https:\/\/xentegra.com\/hi\/wp-json\/wp\/v2\/posts\/701892","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/xentegra.com\/hi\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/xentegra.com\/hi\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/xentegra.com\/hi\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/xentegra.com\/hi\/wp-json\/wp\/v2\/comments?post=701892"}],"version-history":[{"count":53,"href":"https:\/\/xentegra.com\/hi\/wp-json\/wp\/v2\/posts\/701892\/revisions"}],"predecessor-version":[{"id":717102,"href":"https:\/\/xentegra.com\/hi\/wp-json\/wp\/v2\/posts\/701892\/revisions\/717102"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/xentegra.com\/hi\/wp-json\/wp\/v2\/media\/65995"}],"wp:attachment":[{"href":"https:\/\/xentegra.com\/hi\/wp-json\/wp\/v2\/media?parent=701892"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/xentegra.com\/hi\/wp-json\/wp\/v2\/categories?post=701892"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/xentegra.com\/hi\/wp-json\/wp\/v2\/tags?post=701892"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}