Now that we’ve talked about the weather, let’s consider the additional requirements for mobile micro apps that handle sensitive data.
Mobile micro financial applications with one-click access to a substantial amount of personal net worth and healthcare micro apps that display the results of lab work and clinical visits are great examples of the need for strong transaction protection. Similarly, enterprise applications for time and billing, purchase approvals and line of business functions, which are increasingly being refactored to run as mobile micro apps, have similar security and privacy needs.
The user’s organization, which is making the app available to enhance productivity and convenience, is concerned about preventing compromise of the mobile device through vectors such as malicious ads by the external services that feed the app.
The mobile web app provider has similar concerns, needing to satisfy the application user as well as control delivery of content and services across an increasingly complex supply chain that integrates multiple sources. The mobile weather application factors in user location, preferences and acceptance of terms of service, and provides connectors to advertisements, social media and SMS. On the backend, sensors and data feeds need to be checked for availability and updates, as well as to ensure integrity against compromise. And, while meteorological information is usually not considered critical, there are times when its accurate and timely delivery is essential (Fig. 3).
To summarize the needs for protecting and optimizing mobile web properties:
- Enterprise policy control is essential for organizational management of mobile apps—especially for BYOD users.
- User experience must be superior and app response time near instantaneous to entice and retain users.
- Security and privacy must be protected and respected.
- Web application owners require visibility, orchestration and enhanced delivery across the entire virtual supply chain.
Micro mobile apps are proliferating in business scenarios as more employees bring personal devices to the workplace. To meet the diverse performance, management and security requirements for successfully delivering mobile applications, Citrix recommends enterprises employ a combination of Citrix Endpoint Management and Citrix ADC. While Citrix Endpoint Management provides a strong foundation of essential mobile device and application management capabilities, Citrix ADC delivers a high-performance user experience, additional layers of security and privacy protection and guaranteed availability for key solution components—including the Citrix Endpoint Management infrastructure itself.
Thinking back to our weather app example, there are several opportunities to optimize, secure and otherwise enhance the end-to-end solution using Citrix ADC and Citrix Endpoint Management.