TrustRadius: an HG Insights company

Citrix Endpoint Management Reviews and Ratings

Rating: 8.1 out of 10
Score
8.1 out of 10

Community insights

TrustRadius Insights for Citrix Endpoint Management are summaries of user sentiment data from TrustRadius reviews and, when necessary, third party data sources.

Pros

HIPAA Compliance: Multiple users have expressed their satisfaction with the product's ability to manage email synchronization in a HIPAA compliant way, which is of utmost importance for their organization. They appreciate that XenMobile ensures the necessary security measures are in place to protect sensitive information.

Secure Access: Many reviewers have specifically highlighted XenMobile's capability to provide secure access to internal websites through Secure Web. This feature eliminates the need for cumbersome VPN authentication, streamlining the process and enhancing overall productivity.

Easy to Use User Interface: Users widely agree that XenMobile offers an intuitive user interface that is not only easy to navigate but also straightforward to administer. This simplicity makes it convenient for both administrators and end-users, saving time and effort.

Reviews

9 Reviews

Citrix Endpoint Management Review

Rating: 6 out of 10
Incentivized

Use Cases and Deployment Scope

We use Citrix Endpoint Management as our virtual access to our practice management connection to access our applications for both on site desktops as well as our remote workers and our remote locations.

Pros

  • Mobile device management/email/apps
  • Allows for mobile application management
  • Keeps the company protected with strict security

Cons

  • User Interface
  • Sometimes it runs slower than other times causing delays in our business
  • Uses a large amount of resources to function properly. May be the cause of the above mentioned comment

Likelihood to Recommend

It is well suited in healthcare, which is what we are, mainly we use it remotely between offices, remote users and on personal devices. Additionally, it is imperative we have the added security Citrix Endpoint Management offers.

Vetted Review
Citrix Endpoint Management
14 years of experience

Citrix Endpoint Management: your choice to securely manage your mobile devices

Rating: 8 out of 10
Incentivized

Use Cases and Deployment Scope

We use Citrix Endpoint Management in our organization to provide secure access to an internal application that needs to be used using only one specific device from each user. We need to control the location of each device and only allow connections from secure locations. We provide this service to about 200 users.

Pros

  • secure management for mobile devices
  • easy management use for help desk team
  • easy license management

Cons

  • the main dashboard may provide more meaningful information
  • some applications could be better integrated
  • mobile apps could all be integrated into only one app

Likelihood to Recommend

Citrix Endpoint Management is best suited for scenarios where we need to have complete control over our company mobile devices. It is great to fulfil our security office compliance standards. It helps us to trust the configuration setup and to focus on more important tasks like providing more business value. It also allows us to consolidate licences for different services.

From good to great with Citrix

Rating: 9 out of 10
Incentivized

Use Cases and Deployment Scope

Use Cases are Sales, Marketing, and Engineering users. Resolve simple/unified interface and administration. It helps our company with multiple apps and endpoints in a very unified view. We aimed to deliver a fully digital workspace for our users enabling productivity and efficiency. It is beyond secured solutions ensuring [our] IT department could react and scale quickly.

Pros

  • Security
  • Mobility
  • Low TCO

Cons

  • Android Solutions
  • MAC OS issues with file transfers
  • Sound enablement

Likelihood to Recommend

Malware on unmanaged and BYO devices can pose a serious risk to corporate resources. Citrix Secure Private Access provides the security controls you need to protect sensitive data—without compromising the employee experience. Monitoring access to applications creates complications for users and IT alike. Citrix Secure Private Access lets you go beyond SSO to provide adaptive authentication, without compromising the user experience.

Game changer in our organization!

Rating: 10 out of 10

Use Cases and Deployment Scope

Citrix Endpoint Management is used across all of our locations and it has made it very easy to sign in and access what they need just about anywhere. This has allowed us to integrate things much more and has really been worth incorporating into our business. Our workflow is much more automated.

Pros

  • Mobile access is an excellent plus!
  • Password and data synchronization makes the job easier.
  • Secure data.

Cons

  • Sometimes the sign in times out.

Likelihood to Recommend

I would definitely recommend anyone looking for this type of software to go with Citrix Endpoint Management. The user interface has really been thought through and is very user friendly. It has automated our work place and is a great resource to have. Citrix has been wonderful to have as we are never really consistently in one location.

A secured tool for corporate access

Rating: 9 out of 10
Incentivized

Use Cases and Deployment Scope

Citrix Endpoint Management is used across many verticals and departments. It is one place solution to synchronize corporate emails with personal mobile devices. It gives the user a secured environment to connect to workplace resources through their personal device. It provides security, fast access, and customization. It helps to virtualize systems and get them connected remotely through personal mobile, desktop, and laptop devices. Using it across multiple verticals makes the process more efficient and secure. Overall it is a very effective tool for accessing remotely and securely.

Pros

  • It has efficient security control system. Easy to use and administer.
  • It is very easy to install, it connects well with with other apps.
  • SecureWeb Xenmobile provides secured access to the websites and eliminates the need of VPN.
  • It connects very well with other apps.

Cons

  • It takes time to understand which features can be used to ensure compliance with the organizational access policies.
  • Logs are hard to troubleshoot, they stay for longtime. There is no documented module available to lead to troubleshooting.
  • It is hard to deploy on all mobile devices.

Likelihood to Recommend

If Citrix Endpoint Management is deployed across all verticals and departments, it is best suited as it provides the right access and security control to the user and the organization. Also, if the company can provide the same device across multiple verticals then it would be very easy to deploy and operate XenMobile. Using different personal devices leads to deployment challenges. Also it requires a higher broadband when used on a personal device on home or public internet. Also, XenMobile integration with non-Citrix products is a big challenge, as the integration doesn't work effectively and results in lags.

Xenmobile: flexible mobile data platform

Rating: 7 out of 10
Incentivized

Use Cases and Deployment Scope

Xenmobile is a mobile device management system keeping our email accessable to personal devices without making the device completely locked down and completely wiped in case of breach or end of employment. it allows for the best of both worlds.

Pros

  • security: it allows remote wipe of a device
  • compartmentalization: when xenmobile is on the device, it can setup its own client, or have a set portion of the local mail client.
  • mobile support: with a web-based admin portal, no software needs to be setup on a PC to admin remotely [good for on-call techs]

Cons

  • issues with non apple, non samsung devices: if it is not setup with an apple or samsung phone, then the Certificate onboarding is a struggle/unable to be done.
  • user-pin setup: for a user to be onboarded, requiring a PIN; there is a self service way but it is clunky and users prefer to call in instead of trying to follow the 15 step process via PDF
  • if the certificate is ever lost, due to an upgrade via IOS or android, then the entire process [uninstall, reinstall] has to be done, which means downtime for the end user, and higher call volume when a service provider pushes an iOS update.

Likelihood to Recommend

I think this is a solid product for a limited BYOD scenario where you want to keep personal and professional business separate. If you're looking for full BYOD with the addition of any Android devices [pixel, lightning, etc.,] you will have issues with profile addition.

Citrix XenMobile Review - Great ROI

Rating: 10 out of 10
Incentivized

Use Cases and Deployment Scope

We use XenMobile across our entire organization. This allows us to stop buying separate company managed cell phones for remote access, allows us secure management of email, access to internal resources, as well as enabling secure file share via share file. Overall, it's been a very worthwhile investment in terms of cost/value.

Pros

  • Secure email container - easily manage on/off boarding of remote employee access
  • Secure access to internal resources
  • Secure file share

Cons

  • Free / Busy functionality would be great
  • Interface changes more than I'd like
  • Better calendaring interface - more like Outlook would be nice.

Likelihood to Recommend

Specifically avoid buying company managed cell phones - this could pay for itself in a year or two. Enable BYOD - very effective for iPad users and others using unmanaged endpoints. Securely managing company IP vis a vie remote users - much easier to on and offboard access. Also a great way to securely share files.

Vetted Review
Citrix Endpoint Management
2 years of experience

XenMobile Bridges the Gap Between HIPAA and End Users.

Rating: 9 out of 10
Incentivized

Use Cases and Deployment Scope

Primarily, XenMobile is used by those users who desire to synchronize their corporate email with their personal mobile devices. We are doing a combination of native OS sync and sandbox Secure Email. Additionally, we're providing Secure Web, Secure Notes, and Secure Tasks to some users. We also use it to push VPN or WiFi configurations to that same set of users.

Pros

  • It gives us the ability to manage email synchronization in a HIPAA compliant way while providing the flexibility necessary for our organization.
  • Through Secure Web, XenMobile provides secure access to internal websites and eliminates the need for cumbersome VPN authentication.
  • Using Secure Mail, Notes, & Tasks, we can completely sandbox critical business information.

Cons

  • Installation was somewhat tricky, perhaps due to the fact that we were transitioning from another MDM product and needed to be able to support both during the transition.
  • It was not immediately clear what which components were necessary to ensure compliance to the access policies we had in mind.
  • Troubleshooting logs could be better. Very often, the troubleshooting is hit or miss. Documentation for the installation of the Secure Hub client, which brokers all transactions, was either non-existent or inadequate. We had to develop our own for the most part.

Likelihood to Recommend

This product is well suited for any healthcare organization, especially one privately owned by the providers. Many of our providers were displeased with our efforts to use a product that forced sandboxing of Exchange information. Therefore, we needed something that was flexible enough that sandboxing could be used where desired but still allowed native OS integration where necessary.

XenMobile - Master of all trades Jack of none.

Rating: 10 out of 10
Incentivized

Use Cases and Deployment Scope

Being a Citrix Consultant/Engineer I've implemented XenMobile across a variety of different industries and environments. Most companies I've dealt with have deployed the XenMobile solution across the entire organization. Thought I have seen XenMobile compartmentalized to only one section of the organization, but to me that kind of defeats the purpose of having a secure mobile application delivery solution.

Pros

  • Security - Top Notch when it comes to security and control
  • Application Delivery - XenMobile in conjunction with XenApp and XenDesktop can't be beat.
  • Worx Applications - Talk about a great suite of applications to make mobile apps better.

Cons

  • Deployment - XenMobile can be somewhat difficult and cumbersome to deploy.
  • I'd like to maybe see some XenMobile integration with Citrix Director. Make Director the one stop for monitoring across the entire Citrix Stack.

Likelihood to Recommend

As the world of information technology and information security is today, I cannot think of any scenario in which XenMobile wouldn't be a viable and much needed resource. In my opinion, companies who are not leveraging XenMobile are putting themselves, their data and their customers data at risk.