product-logo

Ivanti User Workspace Manager

See all products by this partner 

Ivanti User Workspace manager helps IT professionals manage, secure and optimise their physical, virtual and cloud-based desktops.

Request Information

Compatibility

  • down-arrow Citrix Virtual Apps
    7.6, 7.11, 7.12, 7.14, 7.15 LTSR, 7.16, 7.17
  • down-arrow Citrix ADC
    11.0 VPX, 11.0 MPX, 10.5 VPX, 10.5 MPX, 10.1 VPX, 10.1 MPX, 10.0 VPX, 10.0 MPX, 11.1 VPX, 11.1 MPX, 12.0 VPX, 12.0 MPX, 12.1 VPX, 12.1 MPX
  • down-arrow Citrix Gateway
    11.0, 10.5, 10.1, 11.1, 12.0, 12.1
  • down-arrow Citrix Virtual Desktops
    7.6, 7.11, 7.12, 7.14, 7.15 LTSR, 7.16, 7.17

Product Details

Ivanti User workspace manager helps IT professionals manage, secure and scale their physical, virtual and cloud-based desktops including those applications and desktops delivered by Citrix Virtual Apps and Desktops, formerly XenApp and XenDesktop.

Whether delivered via published applications, dynamic desktops, streamed applications or physical installation, the user workspace management suite of products (Environment Manager, Application Manager, Performance Manager, DataNow and Insight), ensures each user has a consistent, secure and optimized working experience that requires minimal administration overhead.

Ivanti secured user workspace management helps prevent against malware and ransomware attacks and allows granular control over which applications can execute and with which privielages allowing IT to deploy more across Citrix technology. Intergation with Citrix Networking comes out of the box and combined Ivanti workspace management and Citrix can deliver more applications and desktops to more users.

The Citrix - Ivanti Relationship

As a key Global Solution Partner and a founding member of the Citrix Ready Program, Ivanti has been able to align its own product development in line with the strategic Citrix roadmap. This relationship ensures Ivanti customers are provided not only with secure user environment management solutions, but also future-proof technologies that they can confidently invest in for the long term.

Screenshots

screenshot

Features

Features of Secure User Environment Management

Personalization

  • Centrally manage and deliver users’ icons, bookmarks, dictionary, and other customizations to any workspace.
  • Achieve true persistence in non-persistent VDI.
  • Collect user snapshots to allow helpdesk rollback and self-healing.

Policy

  • Enhance your group policy and scripting strategy with just-in-time delivery.
  • Apply policy contextually based on user, time, location, device and other granular options, online or offline.
  • Leverage application lockdown capabilities, disabling menu items and keyboard functions such as Control-C or Print Screen.

Security & Compliance

  • Practice least privilege access with granular admin rights.
  • Experience a more scalable approach to whitelisting and blacklisting with next-generation Trusted Ownership™ technology.
  • Enforce application termination, such as enforcing program close when device switches from LAN to Wi-Fi.

Performance

  • Achieve fast logons with parallelized, just-in-time logon steps.
  • Apply granular system resource entitlement on virtualization servers.
  • Control runaway or rogue processes.

File Sync & Share

  • Achieve secure, enterprise-grade access, sync and share from any device. Control where files are stored and how they’re accessed.
  • Avoid the need for data migration and proprietary file types.

Analytics

  • Proactively measure and track all user environment metrics.
  • Identify roadblocks to the success of your IT projects.
  • Measure, identify, and make informed decisions to ensure continuous improvement of your desktop policies.