Citrix - Digital Workspace Showdown
Citrix - Digital Workspace Showdown
Citrix - Digital Workspace Showdown
SHOWDOWN
Why Citrix Workspace™ is a better choice
than VMware Workspace ONE
Take a closer look at the dozen ways
that Citrix Workspace outperforms
VMware Workspace ONE.
Today’s workers expect the same flexibility and freedom in their
working lives that mobile and cloud technologies have brought to
their personal lives.
That, in a nutshell, is likely the primary reason why you’re looking into implementing a digital
workspace solution. Digital workspaces make work possible no matter where your workers
are located, or what devices or applications they use.
The fact is implementing digital workspaces has ramifications that ripple throughout the
organization. Can your chosen solution really give workers the seamless experiences they
expect? Does it give you the choices and flexibility you need to confidently and seamlessly
complete your march to digital transformation? Can you be sure that the workspaces and
the secrets in your data center stay safe when workers might use SaaS applications, visit
insecure websites, or engage in risky behaviors?
To handle all of the above, only Citrix Workspace will do. In fact there are 12 distinct
differences. Here, we lay them out in stark detail. Read on and ask yourself which is the
better choice for your organization.
They might not know they’re on a bandwidth-constrained connection, nor do they care. They just
want things to work.
Meanwhile, you need to deliver these great user experiences in a way that supports business
needs and improves productivity. That means providing flexibility for workers to access corporate
resources and collaborate, while you manage the infrastructure in an agile way that allows you to
scale quickly and cost-effectively.
Greater User
Productivity
Citrix VMware
Workspace Workspace ONE
1
2
SD-WAN technology delivers the
Performance optimum application-specific path
Users see their productivity
negatively impacted while waiting
Across across available networks. The Citrix
for files to load or the screen content
Constrained HDX™ protocol preserves the user
to fully render, and suffer from poor
experience under poor conditions,
Networks even for applications like Skype.
text and image quality.
3
Mobile users need multiple steps to
Mobile users can open Office files
open Office files attached to their
attached to Citrix Secure Mail and cut,
Integration with copy, and paste into other mobile apps.
VMware Boxer email and copy/paste
Microsoft Office Citrix file sync and sharing technology
content. VMware’s Content Locker
for file syncing and sharing does not
integrates with Microsoft Teams.
integrate with Microsoft Teams.
That means flexibility to adopt any combination of on-premises, public, and private cloud delivery
models. You can support whatever mobile devices your users prefer, allow them to work in more
places, provide more locations for them to store and access their work files, and enable them to
collaborate seamlessly with colleagues.
But choices can’t come at the cost of control. You need to be able to manage users, devices, data,
workloads, and networks centrally, so you’ll modernize while maximizing your existing investments.
Superior IT
Flexibility
Citrix VMware
Workspace Workspace ONE
5
All components of Workspace
Digital workspaces may be deployed
ONE each have a separate
Unified on premises or on public, private, or
management console, decreasing
Management hybrid clouds—all managed through
efficiency and making troubleshooting
a single pane of glass.
more complex.
7
Support for any device OS and choice
of containerization and mobile device Security concerns limit end users’
Device Support management platforms maximize options for devices and applications.
flexibility for protecting applications. Lack of mVPN and no bridgeless
/Application A unique mVPN and bridgeless integration with Intune MAM mean
Protection integration with Microsoft EMS/ greater risk for organizations with
Intune and Office 365 deliver the best mobile Office 365 users.
experience with high security.
8
Unique content collaboration allows
users to store and access their files Fewer connectors for different
stored behind the firewall or on public/ types of file storage limit user
User File private clouds such as Microsoft flexibility and may tempt them to go
Access SharePoint or OneDrive. Citrix content around security policies. Users are
collaboration allows users to share, unable to collaborate.
edit, and sync files.
The security concerns are partially addressed by use of virtual desktops, which keep the
applications and data in the data center. But only partially. Workers still need to access SaaS
applications, they could visit insecure websites, and the security model must account for
risky behaviors such as copying sensitive files onto removable drives or opening phishing
emails. These can expose your business to potential data breaches or other compliance risks.
The old approach of securing the perimeter has given way to the need to ensure end-to-
end security—to the ends of the earth, if need be. That means protecting apps and data and
controlling user access while supporting a growing number of devices and services.
More Security
Controls
Citrix VMware
Workspace Workspace ONE
9
The Citrix Secure Digital Perimeter
framework enables comprehensive,
integrated workspace security. No integrated network security or
End-to-End This includes network security and strong controls—in particular, secure
Security identity management / access control browsing or secure access controls—are
with single sign-on and multifactor available to protect SaaS applications.
authentication to protect both
endpoints and data in the data center.
10
Security teams can block access to Limited cloud application security
unsanctioned SaaS apps and the means that security-conscious
Cloud Internet and protect sensitive data organizations need to adopt third-
from actions such as copy/paste party solutions, increasing cost and
Application or download. A hardened browser complexity. With no copy/paste
Security protects against malware, data loss, restrictions or watermarking, sensitive
and end user behavior while the web data can be exfiltrated
filter controls website access. from SaaS apps.
11
Citrix Analytics uniquely aggregates
and correlates user interaction Limited analytics primarily focus on
User Behavior with applications, devices, networks, security of devices enrolled to AirWatch
Analytics and data to proactively identify and self-developed
and manage internal and mobile applications.
external threats.
12
Support for a risk-based security model
using scoring dynamically balances the Rather than machine learning and
needs of users to scoring, administrators must define
Security Model have rapid access to data against static thresholds, which are inflexible
IT’s need to secure and govern and error-prone.
the environment.
© 2018 Citrix Systems, Inc. All rights reserved. Citrix, the Citrix logo, and other marks appearing herein are
property of Citrix Systems, Inc. and/or one or more of its subsidiaries, and may be registered with the U.S. Patent
and Trademark Office and in other countries. All other marks are the property of their respective owner(s).