Skip to main content
TrustRadius
Citrix Endpoint Management

Citrix Endpoint Management
Formerly XenMobile

Overview

What is Citrix Endpoint Management?

Citrix Endpoint Management (formerly XenMobile), is a UEM and enterprise mobility management application for securing mobile applications and devices.

Read more
Recent Reviews

TrustRadius Insights

XenMobile is a versatile solution that offers a range of use cases for users across different industries and departments. One of the …
Continue reading
Read all reviews
Return to navigation

Pricing

View all pricing
N/A
Unavailable

What is Citrix Endpoint Management?

Citrix Endpoint Management (formerly XenMobile), is a UEM and enterprise mobility management application for securing mobile applications and devices.

Entry-level set up fee?

  • No setup fee

Offerings

  • Free Trial
  • Free/Freemium Version
  • Premium Consulting/Integration Services

Would you like us to let the vendor know that you want pricing?

12 people also want pricing

Alternatives Pricing

What is Microsoft Intune?

Microsoft Intune (formerly Microsoft Endpoint Manager), combining the capabilities of the former Microsoft System Center Configuration Manager, SCCM or ConfigMgr, is presented as a unified endpoint management option. Microsoft Intune is an endpoint management solution for mobile devices, an MDM…

What is Automox?

Automox is an endpoint management solution from the company of the same name in Boulder. Cloud-based and globally available, Automox enforces OS & third-party patch management, security configurations, and custom scripting across Windows, Mac, and Linux from a single console. With it, IT and SecOps…

Return to navigation

Product Demos

Citrix Endpoint Management DEMO - Android Enterprise Managed Device Workprofile.

YouTube

Citrix Endpoint Management Android Enterprise BYOD Demo

YouTube

Citrix Endpoint Management DEMO - Windows10 Modern Management and WindowsComplianceService

YouTube

Citrix Endpoint Management Configure Microsoft Outlook by CEM App Config Policy and .admx file

YouTube

Android Enterprise Launcher Technical Preview Demo

YouTube

Citrix Endpoint Mangement Configure Citrix Workspace App by CEM App Config Policy and .admx file

YouTube
Return to navigation

Product Details

What is Citrix Endpoint Management?

Citrix Endpoint Management Technical Details

Operating SystemsUnspecified
Mobile ApplicationNo
Return to navigation

Comparisons

View all alternatives
Return to navigation

Reviews and Ratings

(32)

Community Insights

TrustRadius Insights are summaries of user sentiment data from TrustRadius reviews and, when necessary, 3rd-party data sources. Have feedback on this content? Let us know!

XenMobile is a versatile solution that offers a range of use cases for users across different industries and departments. One of the primary use cases for XenMobile is synchronizing corporate email with personal mobile devices, allowing users to stay connected and access work-related emails conveniently and securely. Users appreciate the ease with which they can set up and manage their email accounts, enhancing their productivity and ensuring they never miss an important message.

In addition to email synchronization, XenMobile offers several other useful features that users find valuable. These include Secure Web, Secure Notes, and Secure Tasks, which provide added security when accessing web content or creating and managing sensitive information. Users appreciate the peace of mind that comes with knowing their browsing activities and personal data are protected.

Another key use case for XenMobile is the ability to push VPN or WiFi configurations to specific sets of users. This feature enables IT departments to seamlessly deliver secure network access to employees based on their roles and responsibilities. Sales, marketing, and engineering users especially benefit from this functionality as it allows them to connect securely to relevant networks while on the go.

XenMobile serves as a unified interface for users, simplifying administration tasks for IT teams. Its intuitive design and user-friendly interface make it easy for administrators to manage multiple apps and endpoints in one centralized view. This streamlined approach not only saves time but also enhances efficiency by reducing complexity in managing mobile devices across the organization.

Furthermore, XenMobile empowers organizations to deliver a fully digital workspace experience, integrating various applications and resources into a single cohesive platform. This consolidation enhances productivity and efficiency by providing users with seamless access to all the tools they need in one place.

With its secure solutions, XenMobile enables IT departments to react swiftly and scale effectively while ensuring data protection. The software's robust security measures are highly appreciated by businesses across different verticals, as it allows employees to connect to workplace resources through their personal devices without compromising sensitive data.

In conclusion, XenMobile offers a wide range of use cases that cater to the needs of different industries and departments. From synchronizing corporate email to pushing secure configurations and providing a unified interface for administration, the software enhances productivity, simplifies management tasks, and ensures secure access to workplace resources. Users commonly find XenMobile to be a valuable investment in terms of cost and value, making it a popular choice for organizations looking to optimize their mobile application delivery and management.

HIPAA Compliance: Multiple users have expressed their satisfaction with the product's ability to manage email synchronization in a HIPAA compliant way, which is of utmost importance for their organization. They appreciate that XenMobile ensures the necessary security measures are in place to protect sensitive information.

Secure Access: Many reviewers have specifically highlighted XenMobile's capability to provide secure access to internal websites through Secure Web. This feature eliminates the need for cumbersome VPN authentication, streamlining the process and enhancing overall productivity.

Easy to Use User Interface: Users widely agree that XenMobile offers an intuitive user interface that is not only easy to navigate but also straightforward to administer. This simplicity makes it convenient for both administrators and end-users, saving time and effort.

Difficult Installation Process: Some users have found the installation process of XenMobile to be challenging, especially when transitioning from another MDM product. The documentation for installing the Secure Hub client, which handles all transactions, was either inadequate or non-existent. Users had to develop their own documentation and troubleshooting logs were not very helpful.

Issues with Troubleshooting: Several reviewers have mentioned that troubleshooting with XenMobile can be hit or miss due to various issues. Troubleshooting logs were hard to interpret and stayed for a long time. Additionally, there was no documented module available for troubleshooting, making it difficult for users to resolve issues on their own.

Challenges in Device Deployment: Deploying XenMobile on all mobile devices proved to be a challenge for many users. Non-Apple and non-Samsung devices encountered issues, particularly with certificate onboarding. Furthermore, setting up a user PIN during onboarding was considered a complicated 15-step process by some users who preferred calling for assistance instead.

Based on user reviews, the most common recommendations for XenMobile are:

  1. Compare XenMobile with other options. Users recommend comparing XenMobile with other alternatives and considering various factors, such as features, pricing, and support. This will help determine if XenMobile is the best fit for their specific needs.

  2. Keep XenMobile up to date. Reviewers highlight the importance of keeping XenMobile updated in order to take advantage of new features and enhancements. They suggest having enough Netscaler skills and ensuring the application is regularly maintained to fully leverage the platform.

  3. Consider implementation difficulty and need. Users advise considering the level of effort required to implement XenMobile and assess whether the application is necessary within the network. They mention that upfront work and the tediousness of updating apps should be factored into the decision-making process.

By considering these common recommendations, potential users can make a more informed decision about whether XenMobile aligns with their requirements and overall goals.

Attribute Ratings

Reviews

(1-4 of 4)
Companies can't remove reviews or game the system. Here's why
Score 9 out of 10
Vetted Review
Verified User
Incentivized
Use Cases are Sales, Marketing, and Engineering users. Resolve simple/unified interface and administration. It helps our company with multiple apps and endpoints in a very unified view. We aimed to deliver a fully digital workspace for our users enabling productivity and efficiency. It is beyond secured solutions ensuring [our] IT department could react and scale quickly.
  • Security
  • Mobility
  • Low TCO
  • Android Solutions
  • MAC OS issues with file transfers
  • Sound enablement
Malware on unmanaged and BYO devices can pose a serious risk to corporate resources. Citrix Secure Private Access provides the security controls you need to protect sensitive data—without compromising the employee experience. Monitoring access to applications creates complications for users and IT alike. Citrix Secure Private Access lets you go beyond SSO to provide adaptive authentication, without compromising the user experience.
  • Security
  • Authentication
  • Single interface
  • Financial Efficiency
  • Licensing Rationalization
  • Simplification generating productivity
With a zero trust solution for the entire digital workspace, you can continually monitor and assess session activities before, during, and after login. Reduce risk, gain more control over every session, and get deeper insights across your entire application landscape. To achieve this strong security posture across all environments, you need an application delivery solution that shares a common code base. This lets you implement consistent security policies across all your applications for comprehensive protection.
Avast Business Antivirus, Azure Bot Service (Microsoft Bot Framework), Cisco Secure Malware Analytics (Threat GRID)
Jamaal Dickerson | TrustRadius Reviewer
Score 10 out of 10
Vetted Review
Verified User
Citrix Endpoint Management is used across all of our locations and it has made it very easy to sign in and access what they need just about anywhere. This has allowed us to integrate things much more and has really been worth incorporating into our business. Our workflow is much more automated.
  • Mobile access is an excellent plus!
  • Password and data synchronization makes the job easier.
  • Secure data.
  • Sometimes the sign in times out.
I would definitely recommend anyone looking for this type of software to go with Citrix Endpoint Management. The user interface has really been thought through and is very user friendly. It has automated our work place and is a great resource to have. Citrix has been wonderful to have as we are never really consistently in one location.
  • Ability to access data anywhere.
  • Cut down on time.
Citrix Endpoint Management has given us exactly what we needed plus more! The connectivity options, mobile availability and security has bypassed our needs by far. It has been a very positive experience to use Citrix and no one in our office seems to have any complaints or issues using Citrix.
The support for Citrix has been great when we've needed help. Most of the software is self sufficient and is easy to navigate through, such as settings, connection center, preferences, profile, etc. but when we have needed help and reached out to customer service they were able to identify our needs and address them.
The software's usability is what we expected. We knew what our organization needed and Citrix was able to meet our needs. The ability to have the apps on a mobile device has been a great plus and Citrix seems to have really developed a software based on the every day needs of the user.
SAP Business Warehouse, SAP Ariba Procurement, GoToMeeting
David Reese | TrustRadius Reviewer
Score 7 out of 10
Vetted Review
Verified User
Incentivized
Xenmobile is a mobile device management system keeping our email accessable to personal devices without making the device completely locked down and completely wiped in case of breach or end of employment. it allows for the best of both worlds.
  • security: it allows remote wipe of a device
  • compartmentalization: when xenmobile is on the device, it can setup its own client, or have a set portion of the local mail client.
  • mobile support: with a web-based admin portal, no software needs to be setup on a PC to admin remotely [good for on-call techs]
  • issues with non apple, non samsung devices: if it is not setup with an apple or samsung phone, then the Certificate onboarding is a struggle/unable to be done.
  • user-pin setup: for a user to be onboarded, requiring a PIN; there is a self service way but it is clunky and users prefer to call in instead of trying to follow the 15 step process via PDF
  • if the certificate is ever lost, due to an upgrade via IOS or android, then the entire process [uninstall, reinstall] has to be done, which means downtime for the end user, and higher call volume when a service provider pushes an iOS update.
I think this is a solid product for a limited BYOD scenario where you want to keep personal and professional business separate. If you're looking for full BYOD with the addition of any Android devices [pixel, lightning, etc.,] you will have issues with profile addition.
  • We've moved from the Blackberry enterprise server to a xenmobile fueled active-data format. saving the cost of the BES and allowing us to be more flexible on devices.
  • We are moving away from providing devices to allowing employees to use personal devices [through XenMobile], saving us 3 million dollars a year [roughly].
  • Our call center has had increased call volume with mobile devices during the move, since the addition to more supported devices equals more time per call, we have seen a negative effect there.
Xenmobile was just more flexible; allowing us to use different devices and change our active data sync. The cost of a Blackberry enterprise server was also prohibitive, so we moved to XxenMobile.
Score 10 out of 10
Vetted Review
Verified User
Incentivized
We use XenMobile across our entire organization. This allows us to stop buying separate company managed cell phones for remote access, allows us secure management of email, access to internal resources, as well as enabling secure file share via share file. Overall, it's been a very worthwhile investment in terms of cost/value.
  • Secure email container - easily manage on/off boarding of remote employee access
  • Secure access to internal resources
  • Secure file share
  • Free / Busy functionality would be great
  • Interface changes more than I'd like
  • Better calendaring interface - more like Outlook would be nice.
Specifically avoid buying company managed cell phones - this could pay for itself in a year or two. Enable BYOD - very effective for iPad users and others using unmanaged endpoints. Securely managing company IP vis a vie remote users - much easier to on and offboard access. Also a great way to securely share files.

  • Specific ROI was on us avoiding purchasing company managed cell phones - one of the most important drivers
  • Makes on boarding, and especially offboarding remote users a heck of a lot easier w/the ability to wipe the container, even if not connected (via time setting)
  • Easy access to internal resources - no need for separate vpn, etc...
We couldn't get AirWatch to work for us, installation on the devices was much too complex, and support was lacking. I've heard other companies didn't have as much of an issue, but we certainly did. Mobile Iron was evaluated at the surface, but we never brought it in for a formal eval due to time constraints.
Return to navigation