Create your own awesome maps

Even on the go

with our free apps for iPhone, iPad and Android

Get Started

Already have an account?
Log In

Citrix Access by Mind Map: Citrix Access
0.0 stars - reviews range from 0 to 5

Citrix Access

XenDesktop

Local

Best For: Road warriors Personalized computing experience Working disconnected High-performance devices, How it Works: Virtual machine is installed to users device for use with or without a network connection. All changes are synchronized when the user is connected., Requirements: Capable processing power on users device and occasional network connectivity., We don't need to support devices not connected. I don't like the idea of IT having to install a virtual machine on peoples home computers.

Streamed

Best For: Task-based users Personalized computing experience Working while connected Standardized device environments, How it Works: Virtual hard drive image is streamed to standardized user devices and requires an active network connection when in use., Requirements: Capable processing on a diskless PC with a LAN-based network connection, Good for Wyse terminals?

Personal

Best For: Knowledge workers Personalized computing experience Working while connected Any device, including tablets and smartphones, How it Works: Personalized virtual machine hosted in the datacenter is remotely displayed to the users device over an active network connection., Requirements: Assigned datacenter processing resources and a network connection., This may be the best fit., I'm woring on a mindmap for the install.

Shared

Best For: Task-based workers Standardized computing experience Working while connected Any device, including tablets and smartphones, How it Works: Standardized desktop session hosted on Windows server is remotely displayed to the users device over an active network connection., Requirements: A fair share of server-based datacenter resources and a network connection., I would like to get away from profiles on a Windows Server

On-Demand Apps

Best For: Power users Self-service app delivery Working while connected or disconnected Any device, including tablets and smartphones, How it Works: Virtual applications are delivered to virtual or installed desktops as well as tablets and smartphones over any network connection., Requirements: Local or datacenter resources and a network connection., This may be a niche market for us

Licensing Models

User: Best when people need dedicated desktop access. One User Unlimited devices Unlimited connections to virtual desktops and apps

Device: Best when people share desktops or devices. Unlimited Users One Device Unlimited connections to virtual desktops and apps

Concurrent: Best for anonymous access or occasional use. Any User Any Device One connection to a virtual desktop or unlimited apps

The majority of our users are occasional. This is the licensing model we have right now. The Terminal Server licensing is per device., What Microsoft licensing do we need?

Citrix License Editions

VDI

Scalable VDI-only solution for delivering virtual desktops that includes: HDX technology, provisioning services, profile management, and StorageLink technology, Too Restrictive

Platinum

Comprehensive enterprise-class desktop virtualization solution with advanced management, monitoring and security., Platinum gives us the following over Enterprise, HDX SmartAccess, Service Monitoring (EdgeSite), HDX WAN Optimization, Advanced SmartAccess policy controls, Single Sign-On, SmartAuditor

Enterprise

Enterprise-class desktop virtualization solution with FlexCast delivery technology that delivers the right type of virtual desktop with on-demand applications to any user, anywhere., For the extra cost and added flexibility go with Platinum

Citrix Access Gateway

Citrix Access Gateway is a secure application access solution that provides administrators granular application-level control while empowering users with remote access from anywhere. It gives IT administrators a single point to manage access control and limit actions within sessions based on both user identity and the endpoint device, providing better application security, data protection, and compliance management.