Citrix Endpoint Management Overview

Citrix Endpoint Management is the #8 ranked solution in our list of top Enterprise Mobility Management (EMM) tools. It is most often compared to Microsoft Intune: Citrix Endpoint Management vs Microsoft Intune

What is Citrix Endpoint Management?

XenMobile is a comprehensive solution to manage mobile apps, data and devices, available both on-premises and in the cloud. Users have single-click access to all of their apps from a unified corporate app store and IT can easily configure, secure and support mobile devices. With XenMobile technology, IT can meet their compliance and control needs while giving users the freedom to experience work and life their way.

Citrix Endpoint Management is also known as MobileManager, Zenprise, XenMobile.

Buyer's Guide

Download the Enterprise Mobility Management (EMM) Buyer's Guide including reviews and more. Updated: May 2021

Citrix Endpoint Management Customers

Miami Marlins, Exelon, Louisville Gas and Electric Company and Kentucky Utilities Company (LG&E and KU), Flex, Chevron Phillips Chemical Company

Citrix Endpoint Management Video

Filter Reviews

Filter by:
Filter Reviews
Filter Unavailable
Company Size
Filter Unavailable
Job Level
Filter Unavailable
Filter Unavailable
Filter Unavailable
Order by:
  • Date
  • Highest Rating
  • Lowest Rating
  • Review Length
Showingreviews based on the current filters. Reset all filters
Information Technology Executive at a healthcare company with 1,001-5,000 employees
Real User
Top 10
This solution is a guardian in helping secure and localize critical data and applications

What is our primary use case?

Endpoint management is used for multiple things. One would be for my VPN gateway. Second, it is used for security. Using it, I do not have to put our data and our applications on laptops or other third-party devices. Data and applications are always in the data center. Endpoint Security is always the guardian and mostly always used to access patient applications — which we need extra security on. Endpoint Security helps us to accomplish those goals.

Pros and Cons

  • "The product is capable of acting in many different ways to help secure architecture."

    What other advice do I have?

    First and foremost, anyone considering this product has to gather their complete use case and know for certain exactly what they really want to do. Based on that, they can align their use-case needs with the different products in the category. From that vantage they can see which of the viable solutions actually address their requirements. The next thing to do is look at the capability to scale in terms of a roadmap. This is not only looking at the number of licenses but the other enterprise-wide capabilities as well. For example, they may need to look at capabilities for doing load balancing…
    Director at a tech services company with 51-200 employees
    Top 5
    Secure email and web applications are appreciated by our customers

    What is our primary use case?

    We use this solution to deliver enterprise applications to users' mobile devices, iPads, and Android tablets.

    How has it helped my organization?

    XenMobile MAM, with inbuilt Secure Mail and Secure Web applications, is liked by our customers.

    What is most valuable?

    Several features in this solution are excellent. ShareFile, in particular, is valuable with its ease of sharing, and the best category security that is in the hands of users.

    What needs improvement?

    Remote control of this solution needs improvement. End-point management needs more features for Windows 10. Support for inventory management of Apple devices should be added.

    For how long have I used the solution?

    Three years.