Network Computing is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Citrix Offers Free Encryption For Virtualized Application Data

At its Synergy user group meeting in San Francisco this week, Citrix Systems unveiled an encryption feature for virtualized applications running under its XenApp Server in the data center.

Corporate applications, such as Siebel Systems, PeopleSoft and SAP, are virtualized by XenApp and often used to generate large amounts of data about a business' customers. All data created using the virtualized applications by end users' home computers or mobile laptops is encrypted and stored in a "safe zone" folder. If for any reason the computer is lost, the data remains inaccessible to an unauthorized user and can be wiped off a machine's hard drive upon reconnection to the company's network.

SAP's Marge Breya provides a demonstration of the latest BusinessObjects Explorer On Demand, as well as two brand new products not even in beta yet: Kona (a cloud-based BI tool) and 12 Sprints (a collaborative decision making tool, also in the cloud) Startup Marketcetera Offers Buy Side Traders An Open Source Software Platform For Algorithmic Trading nformationWeek's Andrew Conry-Murray spoke with Mike Rowland about Joe Tucci's speech at the EMC World convention in Las Vegas. Mike is the Creative Support Manger of Cabela's.

SAP's Marge Breya provides a demonstration of the latest BusinessObjects Explorer On Demand, as well as two brand new products not even in beta yet: Kona (a cloud-based BI tool) and 12 Sprints (a collaborative decision making tool, also in the cloud)
Citrix Systems CIO Paul Martine cited the safe zone feature of Xen App as an example of why he was confident he could allow 1,400 Citrix employees to equip themselves with a computer of their own choosing and allow them to access corporate applications. No matter where they were or what happened to their machines, the data would be protected.

"If I lose my laptop, I lose the device but not the data," Martine noted in an interview at Moscone Center on the second day of the user group conference.

  • 1