B2B Tech Talk with Ingram Micro
B2B Tech Talk with Ingram Micro

Episode · 2 weeks ago

Unpacking the benefits of secure private access solutions with Manny and Marisa

ABOUT THIS EPISODE

Employing Secure Private Access (SPA) could be the solution you’re looking for when it comes to connectivity with on-premises web apps. No VPN, no scaling issues, no headache. 

Organizations are moving away from VPNs and looking for a more stable and secure option—Citrix is fulfilling that need. 

Shelby Skrhak speaks with Manny Benitez, principal sales engineer, Americas Channel Team, and Marisa Torch, sales engineer, both of Citrix, about: 

- What differentiates Citrix from competitors 

- Weighing SPA against VPNs 

- Who benefits from using SPA solutions 

To join the discussion, follow us on Twitter @IngramTechSol #B2BTechTalk 

Listen to this episode and more like it by subscribing to B2B Tech Talk on Spotify,Apple Podcasts or Stitcher. Or, tune in on our website.

You're listening to B two B tech talk with Ingram Micro, the place to learn about new technology and technological advances before they become mainstream. This podcast is sponsored by Ingram Micro's imagine next. It's not about the destination, it's about going someplace you never thought possible. Go to imagine next DOT INGRAM MICRO DOT com to find out more. Let's get into it. Welcome to B two B tech talk with Ingram micro. I'm your host, shelby scure Hawk, and our guest today are Mandy Benitas, principal sales engineer, and Marissa Torch, sales engineer, both of Citrix. Mannie, Marissa, welcome money. Thank you, nice to be here. So today we are talking about citrix security offering. So, Marissa, you know, how is SPA, or secure private access, really helping Ingram micro partners to get to their zero trust,...

...e t n a strategy? So one of the first supports to remember about zero trust is that nothing is inherently trusted, like before covid and whatnot, and for older company styles, and so with that nothing is inherently trusted. With sp a we're going to be checking all types of factors, like where is that device or the user. What time and day are they logging in? Do they have like a nine to five job? Where are they logging in at midnight? Also ties in with security analytics so we can analyze their behaviors, gave some things abnormal, even check if they're operating systems up to date. So all of these things to determine if the user can have access to and, depending on those factors, what they do have access to just from S P a. So many. How is sp a kind of moving with the industry to secure, non virtualized and non posted APPs? Good questions. Shall be thank you for that. So you know, Citrix is very well known in the industry for virtualizing APPS desktops. With sp a we're...

...extending that now into every application right and that includes web applications and sassapps such as workday and salesforce, private web and sassaps such as Internet sites or, you know, internal web financial sites and things like that, and then also TCP apps such as sap or databases, and even access to TCP report groups that administrators can use, such as telmet or SSh in order to administer devices. So it really covers the whole gamut of applications. Now. So we're not just securing the virtual APPs, we're securing all of the APPS well, so versa. Do you need to be a current CITRIX USER TO USE SP a? You don't. That's what's perfect about it. It's truly meant for everybody. It's a stand alone service that can secure and protect all your APPS and resources. You don't need, Um, the traditional like desktop as a service as such. It is offering to offer this as well. Obviously, different vendors things can get a bit tricky, but you can just uses as...

...a stand alone with everything else they're using in your environment. Also, I'll ask you, manny. You know what makes then sp a different from other competitors offerings? Yeah, so, you know, with citrics were always focused on the user experience and this is where I think sp a differentiates itself from the other offerings out there. Of course, we offer granular controls in how we can apply policies. One of the things that that is very unique to the citrics offering to secure private access is that it has a built in enterprise browser, and this is something that is getting a lot of attention across the industry because enterprises are realizing that, you know, having a built in secure browser that is used specifically for workouts is much better than using the built in native browsers in the OSS. That is an interesting, interesting feature of that Mersa. I wonder if you can kind of go over some of the other features of the S P A. Yeah, for sure. So one of...

...the key parts of SPA is that there's adaptive authentication and access. And so once you're authenticated, depending on how you authenticated and whatnot, and those factors I listed earlier, like time, location and use your group, that determines what access to apps you have. So let's say you're logging in on company property, you can have access to all your APPS, but if you're logging in from home, maybe just have limited access to semapps. So everything can be customizable. Like many mentioned, there's an enterprise browser. I actually use this every day. I love how it separates from my personal chrome browser, from my enterprise browser, and so I can keep everything separate and whatnot and it works just like my regular browser. You can do bookmarks, favorite tabs, everything just like it, and the Admin can implement security controls on a tab per tab basis. And so let's say I launched facebook. That's gonna launch and I protected session, but then if I go to one of my like salesforce dot com, that's just gonna open up in a regular tab.

And so that granular control comes into play again. And then also we have VPN lists direct access to our resources. So let's say you're an administrator and you need access to, let's say the sequel database, you don't have to go into the office anymore access it or use that in secure VPN tunnel. One administrator can just give you access to that using the secure agent and that's all you have access to, not other resources, depending on what you need. And then also it's just a secure way to access all your APPS, secure tunnel. Everything's over four, four, three and whatnot. Well, Manny Marissa touched on this. The VPN. You know security, or or maybe insecurity, but why an S P A and not a VPN? Another great question. Yeah, so what we're seeing in the industry is that organizations are looking to move away from VPN and that's why, you know, we introduced sp a and there's a reason for that. Right. So vpns are hard to manage and maintain and they don't scale very well. Right. And...

...so what winds up happening is that the organizations typically, when they deploy a VPN, they use in all or nothing strategy, right. The analogy that we like to use as the hotel analogy, right, so most of vpns are like would be like handing a hotel guest the hotel manager's key, right, where they could now go to any room open up any door, whereas S P a uses, you know, the hotel analogy, right, where we give the guest a key for their room for a limited time. And that's how SPO works, right. We give just access to the resources they need to do their work and we can monitor and maintain that access based on the different control elements that we use. That is a good analogy and it uses an idea that we're familiar with, you know. I think of the network security of the past. Yeah, I mean I think employees did get used to you know, they're able to access whatever and get to whatever. So I think looking at this shift from VPN TO S P A, Marissa, let me ask then, who is s p a? Four mede.

Is it appropriate for for all businesses? It definitely is, because everyone does need to be worried about security. I know a lot of partners or smaller partners are not enterprise level. But even if your company itself is on a target, likely the vendors you're using could be as well, and so you want to make sure that your access to those resources are always secure. Like Gartner projected that by of organizations worldwide would have experienced attacks on their software supply chains, and so that's definitely something partners should be worried about, and so making sure that the access to it and making sure your customers access to those resources is secure and nothing in your supply chain or on your end affects them is so important. So not just protecting the partner, but the partners, partners or the partners, you know, customers, being able to secure that entire chain. There exactly, manny, I know that you know talking about the security aspects of that. You know that is certainly a big play to...

...this, but I guess for the partners or resellers listening, how do you sell sp a? It's a good question. Yeah, so spa is giving partners an opportunity to create a unique security offering that will help them differentiate their business right and so they're now going to be able to go to their customers and offer a secure connection mechanism which is going to provide end to end security for all of the customer applications, regardless of where those applications live, right regardless of whether they're in a data center, in a public cloud or in private networks with PCP APPs. So it basically covers the gamut of the customer use case and allows the partners to deliver a unique offering that can help any customer protect their APPS. You know, the other side of that is the cost, right. So what we find is that, especially in the SMB market, customers are very cost conscious, but with this offering you can add that extra layer of security in a in a very affordable way. Right. This is not going to break to thank for those end users and you can...

...be able to provide consistent, secure access to all of their applications. So, when we look at this offering from Citrix Merissa, why would or why should citrix be a part of a partner's security solution? So such as has always been a security focus. We've been around for thirty plus years and I like to think it's because we know what we're doing by now, and so some of the offerings we have is um secure Internet access, or s I a. that's the cloud delibered service that provides secure access to u weapons assaps that size immediately. With spa as well, we have security analytics, like I mentioned earlier, assesses the user behavior and applies its actions to protect the company information, that enterprise brotters that we touched on earlier. We also have application delivery and security offerings like our net scalor a d c m, our a D M offering and the SD Wan. So all of these products is what we've built to help our partners and customers protect their resources and the access...

...to set resources, and what we're working on now is making those cloud delivered and more easy to configure and distribute to the masses as well. So, as we do start to wrap up our our episode, I guess I'll kind of give it over to you guys for any final thoughts. I mean, Marissa, or or many, if there were any takeaways to to take from today's episode about S P A, about this offering from Citrix, why citrix and and what the inherent value is? What would you say? I'm happy to feel that one. That's okay, Mirsa. So you know the question comes up sometimes about. You know, well, why should citrics be part of my security solution? And the truth is that virtual APSE and desktops have always been secured by design right. They have always been seen as sort of the apex for securing work applications. The industry is moving in a direction where we're adding more and more web and Sassat, and so citrics is doing the thing thing right. We're moving to help customers protect all of these different applications...

...wherever they live, and so we're adding a lot of security services to our portfolio. Secure private access is the one that we're talking about here today, but we also have secure Internet access. We have analytics for security for the datas users. We have, of course, enterprise browser built into the WORKSPACE APP UM. We have citrics web APP and API Protection Service, which helps protect public websites from attacks. And then we have the application delivery and security service, which is currently available on a tows and helps manage the aws environment and provide APP protection in a public cloud environment. And so, you know, what we're seeing is that our teams are focused on delivering more security solutions to help address these use cases that the customers are bringing to us in terms of securing their their APPs and their work. Something I like to add is uh, with all the security offerings, where we're going now is we're going towards intent based configuration, and so that's what sp a does so well,...

...is that you don't have to necessarily know how to configure every policy. It's just radio buttons and check marks. Do you want to restrict printer drives? Do you want to have no copy paste in this APP procession? And as the administrator, you can just click that and you know it's going to be configured and it's going to run, and so that is beautiful and what makes it accessible for all. Well, for listeners who wanted to find out more about what we talked today. Are Our follow up how can they reach out? You can shoot us an email. Our emails are set up the same as the trick, so it'd be Marissa Dot Org, just a tricks dot com, manny up and needs as a tricks dot com. Yeah, always, always happy to talk about SP A. it's a very cool product. Well, manny and Marissa, thank you so much for joining me. Thank you so much, thank you, shelby, my pleasure, and thank you, listeners for tuning in. And subscribing to be two be tech talk with Ingram micro. If you like this episode or have a question, please join the discussion on twitter with the Hashtag B two B Tech Talk. Until next...

...time, I'm Shelby Skat Hawk. You've been listening to B two B tech talk with Ingram micro. This episode was sponsored by Ingram Micro's imagine next. B Two B tech talk is a joint production with sweet fish media and Ingram micro. Ingram micro production handled by Laura Burton and Christine Fan. To not miss an episode, subscribe today on your favorite podcast platform.

In-Stream Audio Search

NEW

Search across all episodes within this podcast

Episodes (447)