Likelihood to Recommend This product is well suited for any healthcare organization, especially one privately owned by the providers. Many of our providers were displeased with our efforts to use a product that forced sandboxing of Exchange information. Therefore, we needed something that was flexible enough that sandboxing could be used where desired but still allowed native OS integration where necessary.
Read full review Once we had got 20k plus users to blacklist. The data was too big. We wanted the results within some hours. When we used SDM and did all in one shot. It hardly took 2 hours. The same we presented to the clients in our weekly call. Got appreciation as well for that. Yes, just to summarize, even though we have huge datas, this helps us to fetch the results too easily. Thanks.
Read full review Pros It has efficient security control system. Easy to use and administer. It is very easy to install, it connects well with with other apps. SecureWeb Xenmobile provides secured access to the websites and eliminates the need of VPN. It connects very well with other apps. Read full review It handles software and the applications in all the platforms. It is very much useful for us when we have got many projects. We also blacklist the applications that creates any risk when triggered incident for us. It is a very convenient for us to handle as it gives an excellent security, even if we run any queries in the background. Read full review Cons issues with non apple, non samsung devices: if it is not setup with an apple or samsung phone, then the Certificate onboarding is a struggle/unable to be done. user-pin setup: for a user to be onboarded, requiring a PIN; there is a self service way but it is clunky and users prefer to call in instead of trying to follow the 15 step process via PDF if the certificate is ever lost, due to an upgrade via IOS or android, then the entire process [uninstall, reinstall] has to be done, which means downtime for the end user, and higher call volume when a service provider pushes an iOS update. David Reese ConnectCare Hospital Billing Claims Application Coordinator
Read full review At times whitelisting the applications creates a problem, now it has been improved more. No editable option once the data saved. License issue has been occurred initially. Even though license was there, we couldn't use it properly. Slow it recovered. Read full review Usability The software's usability is what we expected. We knew what our organization needed and Citrix was able to meet our needs. The ability to have the apps on a mobile device has been a great plus and Citrix seems to have really developed a software based on the every day needs of the user.
Read full review Support Rating Overall the support from the customer service team has been good. They are very timely and expert in resolving the tickets. They have appropriate knowledge to resolve issues in all stages to development. They were up to the point during the implementation stage of the XenMobile, all queries were answered in time to help finish the deployment. The support for last three years has been extraordinary in helping us use XenMobile effectively and efficiently.
Read full review Alternatives Considered With a zero trust solution for the entire digital workspace, you can continually monitor and assess session activities before, during, and after login. Reduce risk, gain more control over every session, and get deeper insights across your entire application landscape. To achieve this strong security posture across all environments, you need an application delivery solution that shares a common code base. This lets you implement consistent security policies across all your applications for comprehensive protection.
Read full review As I said, we can do the task in bulk which is the added advantage in this. At times alerts gets triggered in multiple like 1000 plus. We can't do it manually as it kills time. But by using this, we can do it on bulk within hours. So likewise, we also did in the same way. We can pull reports also from this (excel files). We showcased to clients wherein we got the appreciation also. Really liked. Thanks team!
Read full review Return on Investment Specific ROI was on us avoiding purchasing company managed cell phones - one of the most important drivers Makes on boarding, and especially offboarding remote users a heck of a lot easier w/the ability to wipe the container, even if not connected (via time setting) Easy access to internal resources - no need for separate vpn, etc... Read full review Pros: blacklist the applications that creates any risk when triggered incident for us. Cons: unable to whitelist as it is creating bug It is a very convenient for us to handle as it gives an excellent security, even if we run any queries in the background. Cons : NA Read full review ScreenShots