93: The Citrix Session: Citrix and Chrome OS: Secure, seamless access to all your apps, for all your employees

Nov 1, 2021

Citrix and Chrome OS are joining forces to enable greater employee productivity through secure and seamless access to all your apps apps and the internet for all your employees everywhere, all while reducing the burden on IT. Chrome OS devices are providing an increasing number of organizations with built-in security functions and simpler device management. Citrix and Chrome OS devices broaden the variety of available apps and adds multi-layer cybersecurity protection for users everywhere.

The partnership between Citrix and Chrome OS will deliver IT modernization that spans from endpoint devices to enterprise security architecture to apps. This will empower employees to be more productive, while protecting the enterprise against increasingly sophisticated cyberthreats.

Host: Andy Whiteside
Co-Host: Bill Sutton
Co-Host: Ben Rogers
Guest: Akshay Kakar


00:00:02.340 –> 00:00:09.389
Andy Whiteside: Hello everyone and welcome to episode 93 of the citrix session i’m your host Andy whites and we’re getting close but we’re getting close almost up to 100.

00:00:10.170 –> 00:00:12.420
Bill Sutton: yeah getting getting almost there it’s right.

00:00:12.990 –> 00:00:15.960
Andy Whiteside: We got to start thinking about how we’re going to celebrate and knowing the two of us.

00:00:17.160 –> 00:00:18.119
Andy Whiteside: We probably won’t do a whole lot.

00:00:20.190 –> 00:00:28.530
Andy Whiteside: So I got bill sudden with me bill director of services bill i’m going to i’m going to publicly acknowledge you for all the great work you’re doing here it’s INTEGRA.

00:00:29.520 –> 00:00:34.860
Andy Whiteside: takes a lot off of me, and I just want to make sure the world knows that without you and a couple other people wouldn’t get done so thank you.

00:00:35.700 –> 00:00:46.830
Bill Sutton: I appreciate that Andy yeah it’s a it can be challenging sometimes but it’s all good you know we we try to get it done for our customers that’s really what it boils down to and our partners that’s what it boils down to.

00:00:47.310 –> 00:00:58.470
Andy Whiteside: I think the sort of way to measure it is I don’t have partners, I don’t have customers that complain ever always know we could do better, I would get that better consultant methodology is odd stuff I mean nobody complains anymore, and things get taken care of that’s.

00:00:58.740 –> 00:00:59.760
Bill Sutton: Huge yeah.

00:01:00.810 –> 00:01:08.520
Andy Whiteside: it’s kinda like waiting tables it’s kind of a restaurant business is kind of a thankless job, nobody talks to you until something goes wrong, and I don’t give him any complaints which is great.

00:01:08.970 –> 00:01:15.600
Bill Sutton: Well that’s good yeah but you’re right, it can be can seem thankless it sometimes, but every once in a while you hear something like this, or.

00:01:15.960 –> 00:01:25.410
Bill Sutton: You have a customer says you guys just really did a great job and kind of makes it all worthwhile, you know all the all the frustrations that that that follow up to that kind of go away yeah.

00:01:25.920 –> 00:01:31.290
Andy Whiteside: yeah get more get proactive thank yous very little if any complaints which sounds good.

00:01:32.340 –> 00:01:40.470
Andy Whiteside: Well, I got been Rogers on been used to be it director he knows all about complaints and not getting enough accolades bill and pen Ben how’s it going.

00:01:41.460 –> 00:01:49.680
Ben Rogers: i’m doing well, and the day after Halloween so we went out and did some spooky things last night and try and stay away from the candy bowl this morning.

00:01:50.310 –> 00:01:53.460
Andy Whiteside: I can only imagine with your personality, you probably have a really good time with Halloween not sure.

00:01:54.720 –> 00:02:01.530
Ben Rogers: We had a blast man plus I live in a very large neighborhood with a lot of kids a lot of decoration so yeah I mean we blow it out.

00:02:01.830 –> 00:02:04.230
Andy Whiteside: Is your is your kid out of school today, and he had to go to school.

00:02:05.040 –> 00:02:17.220
Ben Rogers: Oh no they had to go to school, so it was funny by about nine 930 all the parents were showing all the kids back in getting ready for bed yeah all the kids kind of have a little sleepy I this morning, but they got candy to get them through.

00:02:17.880 –> 00:02:24.750
Andy Whiteside: The local school system here a lot of them actually have a teacher work day, just so conveniently the day after Halloween so it kind of works out for them, but.

00:02:25.020 –> 00:02:34.440
Andy Whiteside: Not my kids my kids had to get up all my actually my high school kid the high school started late like they gave in and started late, the day after Halloween, I guess, they just know they weren’t they knew they weren’t going to be there on.

00:02:34.440 –> 00:02:34.740

00:02:36.390 –> 00:02:37.560
Andy Whiteside: kind of said kinda.

00:02:37.710 –> 00:02:43.050
Bill Sutton: yeah are sad today off and tomorrow is an election in Virginia so they’re all for two days.

00:02:44.760 –> 00:02:49.410
Andy Whiteside: yeah well guys, we have a special guest with this akshay cars, did I say it right.

00:02:49.950 –> 00:02:50.580
akshaykakar: Yes, yeah.

00:02:51.630 –> 00:02:56.070
Andy Whiteside: Thank you for joining us we’re going to review your blog in a minute, you want to give us a little background yourself.

00:02:56.700 –> 00:03:05.760
akshaykakar: Show so firstly happy to be here, thank you for inviting me actually I got better i’m on the product marketing team for citrix I work on citrix is.

00:03:06.450 –> 00:03:17.010
akshaykakar: cloud security product it’s called citrix secure Internet access, we launched earlier this year on February 3 and with the greatest of all the customers that we have and all.

00:03:18.000 –> 00:03:33.060
akshaykakar: Of all the folks like yourself that have been talking about us we’ve actually gained significant traction in the market so we’ve seen customers and seen enterprises wants to beef up their cyber security architecture and we are engaging with them on that.

00:03:34.170 –> 00:03:39.900
akshaykakar: Before those have been in the cyber security space have been in the networking space product management, as well as product marketing.

00:03:40.200 –> 00:03:41.400
Andy Whiteside: yeah where do you live.

00:03:42.390 –> 00:03:44.400
akshaykakar: I am in the Silicon Valley area.

00:03:44.640 –> 00:03:51.000
Andy Whiteside: Okay awesome awesome i’m sure we’ll get into this I don’t wanna I don’t wanna steal our thunder from the blog but I appreciate you joining in.

00:03:51.210 –> 00:04:02.610
Andy Whiteside: it’s interesting to see citrix in this space and look i’ve thought for 20 years now, the idea that you could remotely access something, but not actually get X like download it you turn off printing turn off file transfer.

00:04:03.060 –> 00:04:16.560
Andy Whiteside: citrix to me has been a security play for over 25 years now it’s interesting to watch citrix turn it into a full product ties and evolve, the offerings if you don’t think of citrix as a security play you’re missing you’re missing an opportunity for sure.

00:04:17.280 –> 00:04:28.560
akshaykakar: i’m glad you said that yeah so that is a lot of folks think of citrix is just being just being able to access certain applications but they kind of forget the security aspects of it.

00:04:29.550 –> 00:04:42.990
akshaykakar: And there is a lot of productivity related features in citrix where you have one place to access all the business critical applications, but the the security that goes behind it and that’s embedded in it is a major part of the DNA as well.

00:04:44.220 –> 00:04:50.610
Andy Whiteside: hey been Rogers I know you’re a well i’m gonna say it, the way it popped in my brain don’t take offense to this, I know you’re a security nut.

00:04:52.590 –> 00:04:56.550
Andy Whiteside: thoughts on the general idea of citrix being a security play before we jump into this specific log.

00:04:57.570 –> 00:05:08.850
Ben Rogers: Well, you know i’ve always for years, explained it to the companies that i’ve worked for that citrix provides a window into the environment where things like a vpn actually bust a hole through it so.

00:05:09.570 –> 00:05:18.600
Ben Rogers: Man the concept has been reverberating across the industry for so long, I think we take it for granted, but it is truly a security play because you lock people out.

00:05:18.900 –> 00:05:26.460
Ben Rogers: You give people access to web interfaces you never really let them into the environment, like you do with a vpn or any other technology for that so.

00:05:26.760 –> 00:05:35.700
Ben Rogers: that’s kind of how i’ve been explaining it for years to corporations i’ve worked for and i’m now glad to see we’re finally getting the recognition that we deserve on that in yeah.

00:05:36.690 –> 00:05:49.140
Andy Whiteside: I often use the example of WikiLeaks the guy downloaded 10,000 documents he would have had to take in screen prints of every document every every page of every document to get the same thing WikiLeaks wouldn’t have happened.

00:05:51.330 –> 00:05:51.810
Bill Sutton: very true.

00:05:51.840 –> 00:05:52.320
Ben Rogers: very true.

00:05:53.370 –> 00:05:56.580
Andy Whiteside: Alright, so let’s jump into the intro here actually.

00:05:56.970 –> 00:06:10.950
Andy Whiteside: Tell us what you’re setting up below the hold on before I do that now this recent blog the name of the title of it citrix and chrome os secure seamless access to all your Apps for all your employees actually tell us what we’re trying to talk through here in the introduction section.

00:06:11.700 –> 00:06:28.470
akshaykakar: Absolutely so um Google and citrix have had a long standing relationship right they’ve been they’ve been working together and in multiple areas, especially in the in the citrix workspace front earlier and the diaspora, and what we are trying to do this time is there is this.

00:06:29.520 –> 00:06:35.580
akshaykakar: there’s this relationship that we built with the chrome os business unit or the chrome enterprise business unit within Google.

00:06:36.180 –> 00:06:44.250
akshaykakar: And the way we work in this is that we see the chrome os device with the chrome enterprise solution on top of it.

00:06:44.550 –> 00:06:57.060
akshaykakar: Is a very robust device so that that device by itself has a whole lot of security features in it it’s it’s an encrypted device there’s very little data that is stored on the device as a whole lot of security policy that you can device that you can create on the device.

00:06:57.840 –> 00:07:01.530
akshaykakar: And what we’re saying is that listen for enterprises to be fully successful.

00:07:02.610 –> 00:07:10.710
akshaykakar: and productive, you need two things you need one, the employees should have access to whatever applications, they want so, even if that is a.

00:07:11.610 –> 00:07:19.110
akshaykakar: That is an older applications a an older Linux application or a polar windows application, that is, we run that chrome os device.

00:07:19.380 –> 00:07:26.730
akshaykakar: We make that happen and then we’ll give you a multi layered security model on top of the chrome os device, and I can talk to that in more detail if you would like me to.

00:07:27.420 –> 00:07:30.690
akshaykakar: That what you’re doing is this relationship with the chrome os business unit.

00:07:30.990 –> 00:07:38.070
akshaykakar: Where we broaden the applications that you can use in chrome os device and we give them better security we build on to that existing security.

00:07:39.000 –> 00:07:47.190
Andy Whiteside: So we can jump through the blog and talk through I think you’re probably going to flush out the questions I have, but my first thought is you know, a Linux based chrome.

00:07:47.190 –> 00:07:55.320
Andy Whiteside: device is somewhat secure, to start with is that is that part of the baseline here and what you mean by it starts with a modern device.

00:07:55.710 –> 00:08:02.220
akshaykakar: yeah, so it is yeah so the homeboys device is a secure device you’re absolutely right, it is a basic device it’s a.

00:08:02.910 –> 00:08:06.660
akshaykakar: it’s a lightweight device in the sense that it’s very easy to provision and drop ship.

00:08:07.470 –> 00:08:11.070
akshaykakar: If you’ve got new work and, if you want to just ship them a device, and they log into that.

00:08:11.490 –> 00:08:17.880
akshaykakar: credentials and access all the applications to workspace so it’s super simple to manage is already a secure device.

00:08:18.090 –> 00:08:29.670
akshaykakar: As I mentioned here it’s got that I can see chip it’s got in built in data encryption Google safe browsing a whole lot of cool features So yes, it starts with that modern device, but as mobile that we add on to that.

00:08:30.150 –> 00:08:33.150
akshaykakar: And that’s what we’ve covered in the in the rest of the interest of the blog.

00:08:33.270 –> 00:08:40.140
Andy Whiteside: So let me, let me go to been real quick been I know you are adopting I gel Linux at one point, so you are going down the Linux But first let me ask the Group.

00:08:40.530 –> 00:08:46.830
Andy Whiteside: This is Google chrome os but it’s really Linux under the covers is that is that the right way to say it’s how i’ve been saying is that right.

00:08:48.840 –> 00:09:00.150
Ben Rogers: I think so, you know i’ve got a little bit of a different thought about this process, though I kind of consider these mobile devices almost sacrificial lambs.

00:09:00.570 –> 00:09:08.520
Ben Rogers: If you have the cloud technology right and you’re delivering applications virtually which we can do, obviously, but you know google’s getting into that game as well.

00:09:09.180 –> 00:09:16.560
Ben Rogers: i’m kind of beginning to see the phase of what does it matter what’s on the endpoint, you know as long as the back end that they’re going to should care.

00:09:16.890 –> 00:09:24.630
Ben Rogers: And i’m interested to see what the Group thinks about that, because, as our guests was talking, I was thinking to myself now we’re getting away from worrying about the.

00:09:25.020 –> 00:09:37.170
Ben Rogers: endpoint device and now we’re really are coming into a bring your own device and lightweight Google devices are but i’m also beginning to see in the next four to five years, maybe we get to where we really don’t care about what’s on the employee.

00:09:37.410 –> 00:09:43.410
Andy Whiteside: Well then, let me, and I would want to get everybody’s opinion as I promised I do want to highlight what just happened as integrity within the last few weeks.

00:09:43.800 –> 00:09:50.250
Andy Whiteside: We started the integrity of the idea of going to give you money you bring your own device will have a secure cloud you connect it I don’t care what your endpoint is.

00:09:50.790 –> 00:09:57.030
Andy Whiteside: we’ve now learned that that sounds like nirvana but we can’t quite get there, even though this is what we do for a living.

00:09:57.300 –> 00:10:07.920
Andy Whiteside: We still are now going back to controlling the endpoint device because we can’t just let it be the wild Wild West, even though, as you just stated a big chunk of this is all about what the backend looks like.

00:10:08.340 –> 00:10:14.310
Andy Whiteside: But we have consultants and we have sales people going into other environments, allowing them to take a is INTEGRA endorsed in.

00:10:14.550 –> 00:10:24.240
Andy Whiteside: device into their environment, as more than the that I can allow at this point so even though i’m one of the biggest preachers of what you just said, I can’t I can’t even do it myself but.

00:10:24.270 –> 00:10:34.740
akshaykakar: So i’m just gonna happen so Andy we are, we are whatever you’re saying we’re seeing we’re seeing more and more of that so we what we have coming to see is this managed byob model, if you will.

00:10:35.130 –> 00:10:38.640
akshaykakar: So, if any, wants to bring a chrome os device if bill wants to bring.

00:10:39.600 –> 00:10:46.620
akshaykakar: A windows device and Ben wants to bring a MAC os we want to be able to give you that level of flexibility, you bring in whatever operating system, you want.

00:10:46.950 –> 00:10:50.340
akshaykakar: To but here we are going to throw in a couple of agents on that operating system.

00:10:51.210 –> 00:11:01.950
akshaykakar: and to ensure that, regardless of what operating system you’re using you are secure on that operating system, regardless of where you are from a physical location perspective, regardless of what application you’re using.

00:11:02.430 –> 00:11:17.400
akshaykakar: And that’s essentially and also the the the so that’s the security aspect and the other aspect of that is hey you want to be able to access any application whatsoever, so the operating system should not be a limiting factor be open to the applications that to get you on access.

00:11:19.050 –> 00:11:30.570
Andy Whiteside: let’s let’s get you build a chance to speak he’s the ones got the consultants out doing doing the thing carrying around their own personal devices that we’ve allowed bill your thoughts on this whole you’ve been around forever what’s your thoughts.

00:11:30.630 –> 00:11:43.860
Bill Sutton: yeah I mean to your point Andy the the Holy Grail is is the is the device that that we can we can, in theory, lose or get stolen and not have to worry about any data or any other information being on that device and.

00:11:44.460 –> 00:11:56.400
Bill Sutton: Certainly the Google ios chrome os is is one that would satisfy that but it like you said, there are certain other challenges we have that that kind of lend themselves to a more of a byob or more.

00:11:57.240 –> 00:12:00.480
Bill Sutton: More extensive operating system like like windows or MAC.

00:12:01.080 –> 00:12:09.570
Bill Sutton: But we need we definitely need to start controlling those devices better and managing them so that we can we can control where the data is because that’s really my biggest.

00:12:09.780 –> 00:12:19.320
Bill Sutton: concern of any of everything is you know i’ve got consultants that are doing videos and things like that a customer environments and that that information needs to be kept secure and encrypted and.

00:12:19.710 –> 00:12:28.680
Bill Sutton: We want to make sure we have some control over it, and, and one way to do that would certainly be put it in in my data Center and only restrict access to it via.

00:12:29.460 –> 00:12:39.900
Bill Sutton: Via see dad from an from an endpoint but then that that consultant might be in a secure environment where they don’t have Internet access, and they need access to that in that document that this is not unique.

00:12:40.320 –> 00:12:46.410
Bill Sutton: To to our business, I mean I can remember doing this for law firms years ago and we had the same arguments that.

00:12:46.710 –> 00:12:59.790
Bill Sutton: My attorney needs to be able to access this data when he’s in trial and they don’t have Internet access now that’s not as much of the case now, but nevertheless there there’s so many factors that go into this that it’s not one size fits all anymore.

00:13:00.510 –> 00:13:07.800
Andy Whiteside: So so being we all just went around the Horn and said we love what you’re talking about but it’s not realistic what’s your what’s your thoughts and now that we’ve come back around to them.

00:13:08.310 –> 00:13:17.490
Ben Rogers: Well, I can I can put myself in every administrator shoes everybody’s got a boss that wants to access their files why they’re on a plane.

00:13:17.760 –> 00:13:22.950
Ben Rogers: And that’s what kills some of this and I came from that environment as much as I would try to look at my.

00:13:23.370 –> 00:13:31.440
Ben Rogers: Old CEO and say Mary you really don’t need to worry about it, she would look at me and go, what if what if it’s those what, if so, what I miss.

00:13:31.650 –> 00:13:37.440
Ben Rogers: What if i’m on a plane and I don’t have access, you know now planes are getting much more connected with the world and.

00:13:37.950 –> 00:13:43.890
Ben Rogers: That that seems to be going away, but I guess there, there are still spots in the world where you would see i’ve got to have.

00:13:44.310 –> 00:13:54.360
Ben Rogers: The physical access to the environment, so I can do my job I in a federal bunker somewhere and nowhere, whereas integrity technicians being asked to do something that’s highly.

00:13:55.560 –> 00:13:56.520
Ben Rogers: You know, secretive.

00:13:58.110 –> 00:14:11.760
Andy Whiteside: I think you guys are highlighting that if we can get a large percentage of our users working that way with a secure device that’s owned by them are owned by us and accessing data that they never really have local access to that’s a big part of the big part of the win right there.

00:14:12.120 –> 00:14:18.030
akshaykakar: Exactly, I think it depends a lot on if you kind of segment your employee base, if you will.

00:14:18.330 –> 00:14:25.230
akshaykakar: That is going to be a certain segment of employees that require that Okay, I need to be able to, for instance in a heightened industry right or.

00:14:25.530 –> 00:14:29.550
akshaykakar: an industry where you just for whatever reason, need to provision devices really quickly.

00:14:30.150 –> 00:14:45.600
akshaykakar: i’m in those industries yeah you want that kind of a device that such as a chrome os which is super simple to manage and which is, which is secure, but yeah if in certain other industries you’re going to need a device that has a whole lot of local storage that has that compute power.

00:14:47.160 –> 00:14:48.690
akshaykakar: I mean in marketing i’ve worked with folks that.

00:14:49.320 –> 00:14:55.620
akshaykakar: Are hardcore graphic designers and they just they need certain devices with certain applications sitting on those devices.

00:14:55.920 –> 00:15:01.230
akshaykakar: So it really is a lot, but that flexibility of being able to choose the device that you want.

00:15:01.500 –> 00:15:11.880
akshaykakar: And that flexibility of hey if I have chrome os devices, I want to be able to use any application, and I want to be able to use it’s a goalie that’s what that’s what we’re working with Google to provide.

00:15:12.870 –> 00:15:25.440
Andy Whiteside: So actually this the second section of your blog is the title of it was it starts with a modern device we’ve talked a lot is there anything in this section that we’ve skipped that you think is relevant, that we point out before we move on to the rest of the article.

00:15:25.920 –> 00:15:31.800
akshaykakar: I think I think it’s um what so everything that you guys pointed out, is is completely irrelevant it.

00:15:32.520 –> 00:15:39.540
akshaykakar: We there was some new news articles earlier this year if i’m not mistaken, that show that chrome glasses is growing very rapidly so.

00:15:40.050 –> 00:15:50.640
akshaykakar: We are beginning to get into these situations where a lot of people do have Internet access, a lot of people are working from home and a lot of industries are opening to chrome os devices.

00:15:51.480 –> 00:15:57.990
akshaykakar: And so what we are seeing is that that that increased adoption of chrome os devices and Google wanting to back it up, obviously.

00:15:58.560 –> 00:16:13.860
akshaykakar: And with that growth so all i’m trying to say is that hey, it is a great operating system, it is entering the mainstream arena of primary operating systems and yeah for our listeners out that they give give it a give it a give a talk it’s a good device.

00:16:16.020 –> 00:16:29.130
Andy Whiteside: i’ll just double down on that real quick, the idea that a lot of things are browser based and you throw it technologies like citrix into the mix managed by your corporate environments there’s a lot, you can do that’s real these days versus the theoretical that we used to.

00:16:30.330 –> 00:16:33.660
Andy Whiteside: tell people we were heading to and maybe going made that more real.

00:16:35.250 –> 00:16:45.690
Andy Whiteside: Okay, our next section, the title of it is empower employees with seamless access to Apps I think this is a lot about what Ben was highlighting you know, I guess, maybe what I just double down on what are we covering here.

00:16:46.800 –> 00:16:56.400
akshaykakar: it’s yes, it is, it is a lot so with with a chrome os device, you have access to applications through Google play Google play it’s a managed store managed Google play.

00:16:56.790 –> 00:17:02.490
akshaykakar: where you can control which applications do which users can access to and that’s pretty cool, but every now and then.

00:17:03.030 –> 00:17:11.820
akshaykakar: Actually, more than every now and then most industries have at least some applications that are homegrown applications might be sitting in the data Center might be in aws or azure or wherever.

00:17:12.330 –> 00:17:18.930
akshaykakar: And those own grown I wouldn’t call them legacy, but just traditional applications still need to be maintained.

00:17:19.890 –> 00:17:29.940
akshaykakar: And those applications still need to be accessed from that chrome os devices and what we essentially say is that hey if you are going through the citrix workspace application, you are able to access any APP.

00:17:30.510 –> 00:17:35.940
akshaykakar: including those traditional windows and Linux based applications off of your chrome os device.

00:17:37.770 –> 00:17:43.530
Andy Whiteside: You know Ben was talking about a while ago on planes and I fly a lot almost every week at this point and I it’s so hit or miss.

00:17:44.340 –> 00:17:52.020
Andy Whiteside: But when that salt and as long as i’m out out in the middle of nowhere this becomes even more, and you keep in mind you bill and I.

00:17:52.800 –> 00:18:00.930
Andy Whiteside: Maybe you guys see We grew up on, you know 15 K dial up modems doing this stuff which sometimes I even like better because I had a wired connection but.

00:18:01.620 –> 00:18:05.070
Andy Whiteside: Certainly becomes more and more real as the world around us evolves.

00:18:05.610 –> 00:18:14.370
Andy Whiteside: And the needs and the demands for security pandemic planning, you know work from anywhere hybrid stuff those things grow maybe they start to outpace.

00:18:14.670 –> 00:18:23.640
Andy Whiteside: Some limitations that maybe have been former manager who who thinks they’ve got to have it on airplane but just have to sacrifice for the benefit of hybrid and secure work.

00:18:25.470 –> 00:18:33.060
Ben Rogers: What I think the most interesting about this Andy is is let’s think about you know where citrix has come from over the years.

00:18:33.510 –> 00:18:46.710
Ben Rogers: When I first got into citrix is about given windows access and MAC access and you never really saw a lot of Linux now with the modern day man you’re looking at really all three and you never can’t really tell what’s going to be.

00:18:47.070 –> 00:18:53.850
Ben Rogers: You know thrown at you, so I like the idea of our product kind of being able to mix with all three of these.

00:18:54.450 –> 00:19:00.180
Ben Rogers: OSS and being able to basically allow connectivity and allow application access.

00:19:00.480 –> 00:19:12.330
Ben Rogers: You know, for whatever it is you’re in, and I think for organization that has to manage multiple os is like healthcare one device for them does not fit all you know if this is a good solution to go hey.

00:19:12.900 –> 00:19:27.690
Ben Rogers: tell us how you want it and we’ll be able to provide the applications through this workspace mechanism, and so I think this is a really powerful part of this blog because it just talks about how all the technologies are blended together through the workspace APP.

00:19:29.310 –> 00:19:39.630
Andy Whiteside: yeah I wanna I want to talk about that real quick um because we doing Google chrome os a disservice by lumping it to the Linux bucket or are we doing it as service by lumping into the Linux bucket.

00:19:45.150 –> 00:19:45.750
Andy Whiteside: Anybody.

00:19:47.190 –> 00:19:54.390
Ben Rogers: So that’s a deep question that i’ll hand off to the crowd I don’t know if I know enough about the ios to really comment on that with with education.

00:19:55.950 –> 00:20:01.920
Andy Whiteside: To me it kind of makes sense to call it chrome os as if it’s one of the three players when it’s time to call it chrome os, but it also.

00:20:02.160 –> 00:20:13.890
Andy Whiteside: makes sense to lump it into the Linux bucket when we’re trying to get some of the benefits of of Linux like you know less attack vector more secure lightweight actually that’s that’s probably one for you, you can defer it if you want.

00:20:14.130 –> 00:20:18.750
akshaykakar: yeah I mean i’m not an expert on the ios is and, but I would say that the I think.

00:20:20.040 –> 00:20:25.500
akshaykakar: chrome has offered way more than just the Linux was it does have that similarity in.

00:20:27.000 –> 00:20:37.710
akshaykakar: The end is not probably the right word, but it has that similarity in in in what Linux can provide, but then there is a lot more, especially with all the backing that has been getting from Google.

00:20:38.820 –> 00:20:39.000
akshaykakar: well.

00:20:39.030 –> 00:20:39.270
And I.

00:20:40.470 –> 00:20:44.880
akshaykakar: Use i’m just gonna be one one quick point I mean you’ll see.

00:20:45.990 –> 00:20:51.780
akshaykakar: you’ll see Google i’m like a lot of the other vendors out there, that I was cited as Google.

00:20:52.320 –> 00:21:00.690
akshaykakar: they’re trying to blend a lot of things that are trying to blend GDP with chrome os with other stuff that they provide um.

00:21:01.320 –> 00:21:09.930
akshaykakar: For instance, the Google workspace where the applications are right, so there is a lot of that blending taking place and and that’s that’s power of an ecosystem.

00:21:10.290 –> 00:21:17.880
akshaykakar: And when you blend that ecosystem would say the citrix ecosystem that’s a comprehensive hole that you don’t get with just say Linux or something else.

00:21:20.610 –> 00:21:30.930
Andy Whiteside: But it is Linux that’s The funny that’s where I get good like I swear I strict well okay so two things one the user interface is now familiar because it’s based off the chrome browser.

00:21:31.590 –> 00:21:41.400
Andy Whiteside: On that’s one piece, and the other part, is they have their you know web store where you have all these applications thousands at this point and at some point, I believe they’re going to have access to the android store.

00:21:41.610 –> 00:21:42.270
To run on target.

00:21:45.900 –> 00:21:47.070
Andy Whiteside: Though you said they already do.

00:21:47.190 –> 00:21:47.790
Bill Sutton: They already do.

00:21:48.840 –> 00:21:51.330
Andy Whiteside: Like a chromebook has access to the android store.

00:21:51.450 –> 00:21:56.790
Bill Sutton: yeah I installed android Apps on a chromebook we got five years ago, or 10 years ago, whatever it was we got it.

00:21:57.750 –> 00:22:07.200
Andy Whiteside: I think I think my challenge there I work a lot with Google cloud ready what used to be neverwhere cloud ready and I don’t think they have access to the android store yet Okay, I believe in this just my opinion.

00:22:07.380 –> 00:22:14.910
Andy Whiteside: That they’re going to get it, and then all of a sudden, you went from you know, a ton of Apps to a whole time I could use some slang there if I sell.

00:22:16.050 –> 00:22:18.420
Andy Whiteside: A lot a lot of Apps.

00:22:20.670 –> 00:22:31.440
Andy Whiteside: Well let’s do this let’s talk about this next piece, which goes double down on security conversation around the secure endpoint and an access model that secure actually you want to kind of talk us through this this sorry.

00:22:31.500 –> 00:22:32.700
Andy Whiteside: My browser keeps jumping around.

00:22:33.240 –> 00:22:36.630
akshaykakar: Multi device for London yeah you want to have a diagram it’s probably easier that way.

00:22:37.980 –> 00:22:44.100
akshaykakar: um so essentially what you’re saying on the left is listen we’ve got we’ve got a secure endpoint with.

00:22:44.550 –> 00:22:52.590
akshaykakar: With chrome os and then there is a chrome enterprise upgrade that can go on to that chrome so there’s a whole lot of security policy that you can talk that you have you spoken about that.

00:22:53.490 –> 00:23:02.280
akshaykakar: Now there’s there’s in we’ve already spoken about citrix workspace as well there’s another product called citrix secure internet access and for those of you that have not caught it.

00:23:03.330 –> 00:23:17.340
akshaykakar: Think of citrix secure Internet access as a whole, pretty much all the functionality, that you would expect, in a data Center may security staff so you’ve got the swag the signal the signal web gateway you’ve got a firewall got.

00:23:18.390 –> 00:23:28.260
akshaykakar: The malware protection capabilities blast you’ve got stuff like as be cloud based on Boxing anomaly detection a deep user level analytics.

00:23:28.650 –> 00:23:35.310
akshaykakar: So you take all of that security functionality you plug it all together put into a high performance architecture and toss it into the cloud.

00:23:35.700 –> 00:23:46.410
akshaykakar: Across 100 different points of presence and that’s what citrix like your Internet access is so citrix they got Internet access is a cloud there was security solution delivered from hundred different points of presence.

00:23:46.860 –> 00:23:54.240
akshaykakar: So what we are saying is that we create a multi layered security model so let’s just say you’re protecting a king and a Queen.

00:23:54.660 –> 00:24:04.050
akshaykakar: You know, in a medieval time war right, so you gonna have multiple layers of security between the enemy and the King and the Queen and that’s what we’re doing we’re giving you that.

00:24:05.160 –> 00:24:20.970
akshaykakar: One layer of security, which is provided by citrix secure internet access and the other layer of security, which is coming from the chrome os device and the chrome os and the chrome enterprise upgrade so and, yes, you’ve got the citrix workspace as well, which has some.

00:24:22.020 –> 00:24:32.370
akshaykakar: granular security features, for instance, you can do things like water mocking or you can do things like disable cut copy paste so some of those functionalities that are available as well, through the citrix workspace APP.

00:24:32.910 –> 00:24:42.690
akshaykakar: And then the chrome os device by itself is a secure device as well, which has its own security policies if i’m not mistaken, you can do things like okay you won’t allow USB sticks to be installed.

00:24:44.160 –> 00:24:59.190
akshaykakar: Or you won’t allow certain if you’ve used a password in one location already you can reuse that password so there’s things like that that chrome os also provides the chrome enterprise upgrade provides and we’re back what you’re essentially getting is that multicast security model.

00:25:00.330 –> 00:25:01.170
akshaykakar: In this architecture.

00:25:01.590 –> 00:25:07.260
Andy Whiteside: I think it’s funny how this whole time about a secure endpoint and accessing you know the plate the stores, as well as.

00:25:07.740 –> 00:25:13.230
Andy Whiteside: Using citrix workspace Apps specifically and then all of a sudden this secure Internet access thing, where the traffic’s being.

00:25:13.470 –> 00:25:21.600
Andy Whiteside: directed appropriately and monitored and in analytics are going along with that monitoring all the sudden that just up citrix is game big time in this space right.

00:25:21.750 –> 00:25:25.350
akshaykakar: In time, big time because keep in mind that listen see folks are.

00:25:26.850 –> 00:25:29.340
akshaykakar: folks that are accessing accessing.

00:25:30.990 –> 00:25:36.810
akshaykakar: say you finish your work today at 5pm you go onto a basketball for are you going to read it or wherever.

00:25:37.230 –> 00:25:47.520
akshaykakar: And you click on a couple of links and stuff like that, so you you do need that access even when you’re outside of citrix workspace APP you need that level of protection.

00:25:48.060 –> 00:25:51.660
akshaykakar: When you’re outside of citrix workspace appiah you’re doing recreational browsing.

00:25:52.470 –> 00:25:58.980
akshaykakar: you’re not sitting behind an enterprise firewall you need something that’s protecting you without having to do a piano or anything of that nature.

00:25:59.370 –> 00:26:08.640
akshaykakar: And so citrix secure Internet access is that in residual but always always on protection that’s blocking any threats from entering your device.

00:26:09.480 –> 00:26:16.770
akshaykakar: And then, of course, you have the chrome os as well and citrix as it as it is to go to Internet access, we have this relationship with threat engines.

00:26:17.100 –> 00:26:25.020
akshaykakar: So I should say there’s a Ted discovered and say hypothetically Japan couple of hours before before, and then we will update our.

00:26:25.380 –> 00:26:33.060
akshaykakar: cloud based on that threat intelligence and so you’re always protected against the latest stats man, the whole lot of functionality that’s available in that product yeah.

00:26:33.480 –> 00:26:41.400
Andy Whiteside: i’ve got some comments here, but I want to defer to let’s go to bill first bill thoughts on adding this extra piece of the story that we already thought was magical.

00:26:41.670 –> 00:26:50.400
Bill Sutton: Well, I you know the story that we already thought was magical I thought I think there was one piece, we were we weren’t maybe we were talking about it, but not directly, I think I got least I know that.

00:26:51.000 –> 00:27:02.100
Bill Sutton: Historically, when I hear access, you know, via the centric workspace APP i’m thinking virtual Apps virtual desktops that’s that’s what we’ve always that’s where I grew up, but obviously we know that the citrix workspace.

00:27:02.730 –> 00:27:14.550
Bill Sutton: can enable single sign on to SAS based Apps which are equally as critical if not more now than they used to be, you know folks are using SAS Apps and having a device that we can secure.

00:27:15.540 –> 00:27:25.290
Bill Sutton: and enable seamless access to those Apps is just as important, if not more so than than the access to the traditional windows based Apps you know hosted on a server somewhere.

00:27:25.590 –> 00:27:33.600
Bill Sutton: This just adds another layer to it that I think is critical, you meant you mentioned akshay you meant mentioned reddit as an example, I know that.

00:27:34.470 –> 00:27:50.490
Bill Sutton: Some of my consultants will go searching for a solution and it’ll take them to places like that and and beyond unfamiliar sites that may be in foreign countries, and having this kind of this kind of layered security here, certainly would provide a lot of benefit to them into our customers.

00:27:52.140 –> 00:27:55.260
akshaykakar: So guys, we absolutely good sorry.

00:27:56.700 –> 00:28:05.070
akshaykakar: i’m just gonna say you’re and you’re absolutely right, so when you say in other countries, or even mind that we spoke about this earlier that your workers your employees your consultants are traveling right.

00:28:05.400 –> 00:28:10.200
akshaykakar: So they are in a whole lot of different places where they they could be under attack, if you will, so.

00:28:10.380 –> 00:28:11.430
Bill Sutton: Right exactly.

00:28:12.120 –> 00:28:18.480
Andy Whiteside: So guys let’s let’s see been up here we told him the idea of byob plus the cloud wasn’t good enough.

00:28:18.780 –> 00:28:26.400
Andy Whiteside: If we take byob plus this layer of security with the agent, which I would like to point out, which always do it’s part of the citrix workspace APP.

00:28:26.730 –> 00:28:34.500
Andy Whiteside: package anyway, I think, tell me if i’m wrong if we take security and access, plus the cloud, or we then back to tell him Ben he can bring whatever he wants.

00:28:40.620 –> 00:28:43.110
Andy Whiteside: let’s take it a step further we’re closer at least right.

00:28:46.920 –> 00:28:52.830
Ben Rogers: Well we’re I think this is really a play I go back to my old days of having to manage firewalls and.

00:28:53.820 –> 00:29:01.050
Ben Rogers: User threat management systems, and you know this really lifts that part out of the administration and the corporate security.

00:29:01.740 –> 00:29:08.130
Ben Rogers: framework and so we’re i’m really excited about this as I can look at you know cyber security engineers and go hey.

00:29:08.340 –> 00:29:17.910
Ben Rogers: I know you there’s a certain amount of effort to keep these firewalls updated make sure the traffic stolen, through them, making sure all the policies are upgraded and all those jazz.

00:29:18.150 –> 00:29:22.110
Ben Rogers: Let us take that off your hands, similar to the way that we look at them with see bad’s is.

00:29:22.380 –> 00:29:30.660
Ben Rogers: Let us take that we didn’t feed off your hands and let you concentrate on what you really need to be concentrate on and what is allowed out of this facility.

00:29:30.900 –> 00:29:42.330
Ben Rogers: And what did my employees need to be looking at on a daily basis, so for me i’m really excited about that point is that it now allows us to provide another service that makes us competitive against.

00:29:42.810 –> 00:29:47.490
Ben Rogers: The other user threat management systems that are out there, so i’m excited about that point.

00:29:48.360 –> 00:29:56.280
Ben Rogers: When it comes to you know there’s this created nirvana where you can get you know this to anybody, it would, in a sense that I could say to.

00:29:56.550 –> 00:30:05.730
Ben Rogers: My you know engineers that are out there in the field it doesn’t matter where you’re at i’m going to be able to backhaul all of your traffic to one resource and make sure that.

00:30:05.970 –> 00:30:21.120
Ben Rogers: Regardless of what endpoint your own or regardless of where you’re at in the network you got the same coverage that you do regardless and that’s really killer, in my opinion and that’s a step beyond what you can do with a traditional firewall layout.

00:30:22.440 –> 00:30:29.490
akshaykakar: yeah bill you hit it you hit the nail on the head there so you’re absolutely right so wherever your engineers are they and they.

00:30:30.180 –> 00:30:35.310
akshaykakar: We, so we have these points of presence, I said that’s hundred different points of presence, so your engineers aren’t.

00:30:35.580 –> 00:30:43.530
akshaykakar: aren’t going to be sent to that point of presence, but that backhaul isn’t going to be as much as it used to be back in the day let’s say you have three data centers with three stacks.

00:30:43.950 –> 00:30:52.500
akshaykakar: Now you’ve got 100 different stacks right so it’s it’s pretty much direct access to those SAS applications pretty much direct access to your Internet um.

00:30:53.250 –> 00:31:08.070
akshaykakar: hey I need one quick thing, so it is the cloud can enter agent for citrix secure ended and access is different from citrix workspace and I kind of works out because there is there is a lot of folks that are already using citrix workspace APP.

00:31:08.910 –> 00:31:15.030
akshaykakar: Or, there are some and, as we are talking to more and more customers, including net new customers, there are some customers that are.

00:31:15.750 –> 00:31:29.190
akshaykakar: That are looking or there are certain information security teams that are separate from the car teams that are looking at citrix or Internet access, so this guy is right now, giving us the flexibility of having a separate conversation if you need to.

00:31:30.600 –> 00:31:37.200
akshaykakar: What he has in the future, I icon mentioned publicly but it’s possible that that the agents might be combined and unified.

00:31:38.220 –> 00:31:44.250
akshaykakar: From an APP from management plane perspective that is unification of management plane between all citrix product through citrix cloud.

00:31:45.120 –> 00:31:54.690
Andy Whiteside: But I think that’s where you’re going this next section where you’re talking about civil file your operations both what citrix is doing for you as a service, as well as what you have to do as the managing it organization.

00:31:56.100 –> 00:32:07.260
akshaykakar: Yes, and exactly so what citrix is doing right now is that you log into citrix cloud you see all the different products that you have, and you can you can go into what you’re probably wondering and start managing that product.

00:32:07.740 –> 00:32:12.570
akshaykakar: And you’ve got that that that unification of management and then also.

00:32:12.990 –> 00:32:19.410
akshaykakar: As Ben was mentioning from an operational overhead perspective right you’ve got no more boxes to manage from a cyber security perspective.

00:32:19.800 –> 00:32:29.880
akshaykakar: All those boxes are done away with you’ve got a cloud security service, so you just log into that cloud security service, you make your policy changes in those policy changes push to all employees.

00:32:30.750 –> 00:32:40.020
akshaykakar: And everybody’s happy so pronounced simplification of operations perspective, we believe that it will not just improve the op X numbers but also.

00:32:40.710 –> 00:32:50.700
akshaykakar: Reverse multiple security breaches in the past where cyber security teams were just too overwhelmed to ensure that they’ve got the latest patches they’ve got the latest policy in there.

00:32:51.390 –> 00:33:02.310
akshaykakar: And so, if we’re able to take some work off their hands, so that they’ve got more time to think and more time to analyze and more time to penetration tests, then we will we will also improve the cyber security posture yeah.

00:33:03.660 –> 00:33:07.080
Andy Whiteside: So to bill, how do you see this impacting the customers that you’re working with.

00:33:08.400 –> 00:33:20.220
Bill Sutton: Well, I think it’s you know the customers we’re working with I think this This is something they’re not aware of probably and, probably, we need to help make them more aware of it, because I think it’s definitely got to fit with a lot of them yeah.

00:33:20.640 –> 00:33:21.510
Ben Rogers: Only the ones that care.

00:33:21.570 –> 00:33:22.680
Bill Sutton: Security yeah.

00:33:22.770 –> 00:33:23.940
Ben Rogers: it’s a paradigm shift.

00:33:25.470 –> 00:33:30.600
Ben Rogers: And that’s one thing that I would you know Andy and I, you and I, you and I have talked for years about how.

00:33:31.200 –> 00:33:40.620
Ben Rogers: It takes a societal move to kind of get things going in our first example was going from desktop to workspace at five years ago, you told me, I would create.

00:33:40.860 –> 00:33:49.980
Ben Rogers: career suicide if I took them the workspace or whatever it was called receiver then, but now I think that that very people would be open to a dashboard type of.

00:33:50.310 –> 00:33:55.140
Ben Rogers: Environment, I think, with cyber security engineers you’re going to have to get them used to the fact that hey.

00:33:55.440 –> 00:34:04.110
Ben Rogers: You don’t have to have these products on site, or you don’t have to physically see where these products are in your data Center or in the azure stack and.

00:34:04.380 –> 00:34:11.790
Ben Rogers: you’re going to have to kind of let them know that they can give up that management plane, the same as we’ve done with our citrix administrators for years.

00:34:12.150 –> 00:34:20.730
Ben Rogers: I think that’s going to be the challenge of getting them to think about all this lives in the cloud this lives wherever my services are close to and.

00:34:21.090 –> 00:34:33.690
Ben Rogers: that’s going to be the piece that I see being a challenge you know kind of going forward is this breaking that paradigm shift and getting them to understand that this is a different way than they’ve done over the last 2030 years.

00:34:33.990 –> 00:34:41.010
Bill Sutton: yeah I would agree with that banner, to some degree, I think a lot of the lot of the cyber security to see SOS around in the of the world have.

00:34:41.640 –> 00:34:51.150
Bill Sutton: Have kind of bought the or drank the Kool aid of layered approaches to security from other vendors and and bought a point product to do this and appoint product to do that and appoint product to do that.

00:34:51.480 –> 00:35:03.750
Bill Sutton: they’ve got a huge investment of those technologies, not to mention the renewals of those technologies and it’s going to take some education some time to get them to consider something like this, all in any ways, at least initially.

00:35:04.680 –> 00:35:13.860
Andy Whiteside: And part of that’s just the vendor name right, I mean citrix is seen as right as the access people not to secure access people and not the security company.

00:35:14.580 –> 00:35:28.290
Andy Whiteside: This clearly helps me understand where citrix is making a play on security, which we already had, but now we’re playing in a different piece of it and it’s you know, a vendor that you’re already knowing working and trusting people should consider it yes.

00:35:29.340 –> 00:35:38.130
akshaykakar: Exactly so think of it this way, so you’ve got you’ve got you’ve got your applicant you’ve got you and then you’ve got the application that are connected to, and then you got the fabric and lily right.

00:35:38.700 –> 00:35:47.910
akshaykakar: So citrix is everywhere, what we want to do is, we want to be able to control that entire end to end or support our entire end to end so that you, as a user have a great experience.

00:35:48.930 –> 00:36:02.670
akshaykakar: So we will do the the optimization or that in terms of the productivity will to be cybersecurity over there and it’ll keep you safe and that’s essentially what it is, and then the ecosystem is created or minus i’ve stated blends with the other vendors that you might be using.

00:36:04.410 –> 00:36:04.650
Andy Whiteside: What.

00:36:05.850 –> 00:36:19.110
Andy Whiteside: You just said you were vendor I mean citrix in Google being a play where you can like those legacy security vendors probably don’t really have a Google play at the layer we’re doing this, all of a sudden something like Google Google Linux i’ll use both words together.

00:36:20.160 –> 00:36:30.390
Andy Whiteside: All the sudden it’s irrelevant more or less as long as there’s the agent that can run and now the sudden the cloud makes it to where the security play fits whether it’s windows Google MAC you name it.

00:36:32.220 –> 00:36:32.910
Ben Rogers: Go ahead, I think.

00:36:33.270 –> 00:36:39.840
Ben Rogers: I think there’s an opportunity, and this is not an official statement I disclaimer that, and this has not been mentioned it all inside the.

00:36:40.170 –> 00:36:51.540
Ben Rogers: citrix walls, but I would love to see them take this product to our etc and build this into our at scene, because a lot of people can then turn their at CS into their outbound gateway.

00:36:51.840 –> 00:37:03.150
Ben Rogers: And then you could really start talking about competing against the Palo Alto is the 40 minutes because the adc is already kind of a Swiss army Swiss army knife firewall and a certain.

00:37:03.480 –> 00:37:12.360
Ben Rogers: extent we get this outbound traffic going through it so to me when I look at our product portfolio and how this product could fit into the portfolio.

00:37:12.720 –> 00:37:23.220
Ben Rogers: We obviously, could you know deliver it be a cloud and have it cloud be 100% of the answer, but we also could create a solution that could hinge on our at CS and go hey.

00:37:23.430 –> 00:37:29.730
Ben Rogers: If you’ve got at CES let’s start leveraging them for the outbound traffic and implement this user threat management.

00:37:30.150 –> 00:37:41.760
Ben Rogers: via the see a product on top of it so like I said no mention of it, but when I look at our product for folio and I go the things we could do that is one thing that I see that we could do that would be very slick and very cool.

00:37:42.780 –> 00:37:43.050

00:37:44.070 –> 00:37:52.260
Andy Whiteside: So actually bring us home here let’s talk about where citrix and Google are truly partnering across the ecosystem of what they do together, but specifically here.

00:37:54.000 –> 00:37:59.520
akshaykakar: So, from a technology sample we’ve discussed, we discussed a lot from a technology standpoint, what I would also say, is it beyond.

00:38:00.210 –> 00:38:10.680
akshaykakar: I can’t disclose whole lot here right now there’s there’s some futures involved in that, but what we are essentially plan to do is we’re trying to go to gather to customers to ensure that.

00:38:12.210 –> 00:38:17.430
akshaykakar: To ensure that customers are not not overwhelmed which is multiple conversations with different vendors.

00:38:18.120 –> 00:38:32.520
akshaykakar: i’ve personally in my boss lives i’ve spoken to customers, where they were very happy when when two or more vendors, can I join forces came together as one to solve the customers problem was is the customer having to do all that multi flexing so.

00:38:33.180 –> 00:38:40.380
Andy Whiteside: i’ll add to that real quickly to vendors that you probably already going to have in house, seeing them come together and solve challenges for you is a win, win.

00:38:40.770 –> 00:38:51.090
akshaykakar: Yes, exactly and that’s the that’s the goal we’re trying to get the Google guy and the folks at Google chrome os talk to the folks at citrix get familiar with each other stuff.

00:38:51.480 –> 00:38:59.760
akshaykakar: And then it’s just as you’re saying the customer probably is already familiar with both the technology is now one plus one is equal to three years and so that’s basically what it is yeah.

00:39:00.870 –> 00:39:05.940
Andy Whiteside: So Ben as we start to finish up your any additional comments around what do you see citrix and Google doing.

00:39:07.980 –> 00:39:19.170
Ben Rogers: Well, what i’m what i’m kind of starting to get fascinated with it you’ve seen Google get into the education market like no other, you know and they kind of have become a dominant force in that market.

00:39:19.830 –> 00:39:25.350
Ben Rogers: I see that starting to happen in other markets you’re starting to see Google get more prevalent in healthcare.

00:39:25.800 –> 00:39:38.040
Ben Rogers: finance, so I think the same way they’ve gone after education and dominated that market, they have the possibility of doing these other markets as well, so i’m glad to see that our company is partnering up with them.

00:39:38.430 –> 00:39:45.420
Ben Rogers: And I think the two solutions could really flip some windows environments man, I mean I don’t mean that as a threat to Microsoft but.

00:39:45.810 –> 00:39:58.020
Ben Rogers: It could be really interesting if you could go into a shopping go, you can do the same thing today with cheaper products lightweight os is with a more secure environment it’s kind of a win so.

00:39:58.200 –> 00:40:08.190
Andy Whiteside: i’ve been I want to challenge, some of you said you said, Google going into education like no other I think at our age right we saw somebody else do that, it turned into a pretty pretty lucrative company this point.

00:40:11.010 –> 00:40:11.970
You know i’m saying.

00:40:13.470 –> 00:40:14.460
Ben Rogers: Like apple.

00:40:14.520 –> 00:40:21.240
Andy Whiteside: The they’re just doing what apple did except they’re not going to limit themselves to education and the consumer market they’re going they’re going for a bigger chunk of it.

00:40:23.340 –> 00:40:23.880
Ben Rogers: Oh yeah.

00:40:29.280 –> 00:40:30.090
I think.

00:40:31.260 –> 00:40:36.000
Ben Rogers: I think they’re never really strong domain commercially they never took the business idea.

00:40:37.290 –> 00:40:37.860
Ben Rogers: And they were.

00:40:42.540 –> 00:40:48.390
Ben Rogers: or or ecosystem personal they did some education Google or in the deep.

00:40:49.560 –> 00:40:53.940
Andy Whiteside: yeah all right bill, you want to any additional comments.

00:40:54.150 –> 00:41:00.450
Bill Sutton: Now i’m pretty much agree with the most of everything that Ben said had to say there I you know I certainly think that there’s a.

00:41:00.900 –> 00:41:09.570
Bill Sutton: there’s a place for the Google chrome os and I think that that more and more companies are going to take a look at it, I know that in my past i’ve had a couple of companies that were early adopters of.

00:41:09.930 –> 00:41:26.340
Bill Sutton: The chrome os for access to citrix Apps and desktops, but I think that it’s certainly it’s compelling for a lot of companies to look at something that’s more secure and easier to use and easier to manage for their employees to use to access their resources yeah.

00:41:26.550 –> 00:41:37.680
Andy Whiteside: No it’s true hundred percent well actually I appreciate you joining us before you go, is there any other topics specifically to this one or comments this one or other topics you’d like to maybe use this platform to bring up.

00:41:38.490 –> 00:41:47.970
akshaykakar: No, thank you for having me here and yeah I just just let’s let’s keep the conversation open and as more sessions that you’d like to have sex with people, you can do so.

00:41:48.750 –> 00:42:00.300
Andy Whiteside: we’ll keep an eye out for your blogs for this topic and beyond these topics and beyond, but if you have something that that did you write that you want to highlight to us and asked that we bring it back on that would be awesome this has been a really good conversation.

00:42:01.140 –> 00:42:01.950
akshaykakar: Thank you so much.

00:42:03.060 –> 00:42:05.010
Andy Whiteside: And with that guys will call today, thank you.

00:42:06.450 –> 00:42:06.810
Ben Rogers: Everybody.

00:42:07.320 –> 00:42:07.740
bye bye.