Ahmed Sallam

VP of Product Strategy / CTO, Client Virtualization
  1. Citrix® Enterprise Mobility Management Support for Intel® Device Protection Technology

    Citrix and Intel have had a long history of successful mutual joint collaboration. Many of Citrix products take full and direct advantage of Intel’s hardware-assisted technologies. To name a few: Citrix® Xen Project™ open source hypervisors has entertained long time supported from Intel with Intel being an active member of its steering committee. Xen has become the virtualization platform of choices for large publics cloud vendors ...

    Read More

  2. Citrix collaboration with ARM Holdings unifying ARM v8A 64 bits servers architecture.

    In this rapidly growing Internet of Things environment, many things that we do every day, such as checking email accounts, posting onto social media sites, browsing web pages, and searching web indexes or portals—are not compute-intensive. They do however; have high I/O throughput and memory footprint requirements. IT architects working at this scale typically use cluster techniques to run massively parallel workloads that distribute ...

    Read More

  3. Intel and Citrix collaboration to bring support for hardware accelerated nesting of hypervisors into market – XenClient CTO Series

            Citrix has realized a while ago that newer usage models are emerging that would require two or more Virtual Machine Monitors (VMMs) to be hosted on the same client system. Citrix has been heavily engaged with Intel® to take advantage of new hardware capabilities designed to accelerate nesting of hypervisors (VMMs). Specifically, the 4th generation of Intel vPro Technology—which is available in 4th generation Intel® ...

    Read More

  4. Citrix CTO Series – XenClient XT as an open extensible platform of innovation for virtualization systems security

    AhmedSallam

              Traditional anti-malware products have suffered from some fundamental flaws that limit their effectiveness. First of all, relying on signatures is, by definition, a reactive approach; there cannot be a signature until the malware exists. Secondly, it is impossible to guarantee detection of malware running with root privileges when the detection system is running at the same privilege level. In other words, if a rootkit is ...

    Read More

  5. XenClient CTO Series – Intelligent Desktop Virtualization as an enabler for next generation computing experience – Part 3

    In the last post of the XenClient CTO blog series, I discussed how the sharing of hardware and software resources results in security challenges for IT.  System virtualization provides unique advantages that can address these challenges. Essentially, system virtualization decouples the operating system from the underlying hardware, thus allowing running of multiple, concurrent operating systems on the same client device and server hardware. This was ...

    Read More

  6. XenClient CTO Series – Intelligent Desktop Virtualization as an enabler for next generation computing experience – Part 2

    In the first part of this XenClient CTO blog series (http://blogs.citrix.com/?p=174194383), I discussed how the evolution of the traditional computing model led to the sharing of hardware and software resources. Without a doubt, sharing of hardware and software resources is the root cause of various forms of malicious computer security threats and malware attacks, to list a few: The browser spyware mess that was created once ...

    Read More

  7. XenClient CTO Series – Intelligent Desktop Virtualization as an enabler for next generation computing experience – Part 1

            It has been almost six years now since I came to the conclusion that system virtualization is a mandatory technology for addressing key challenges with the traditional computing model. Not only that, virtualization facilitates the shift towards modern, safer computing, opens doors wide-open widely for new types of end user experiences and simplifies the work of IT administrators. The computing architecture envisioned for Personal Computers (PCs) ...

    Read More

  8. XenClient CTO Blog Series: Citrix Platforms as a Secure End-to-End Online Voting Solution – Part 1

    It’s Election Day today! I cast my vote earlier today. The voting process was very simple. I stopped by a neighbor’s house and the whole procedure did not take more than five minutes. When I arrived at the office, I realized that it was about time to reignite the discussion about secure online voting. I have worked in the security space for many years and would make sense ...

    Read More

  9. XenClient CTO Blog Series: XenClient 3rd Party Service VM Security Demo at Citrix Synergy SF 2012

    XenClient  (or XC for short) is Citrix's offering for local desktop virtualization, providing increased security and simplified management for corporate laptops. XenClient was designed from the ground-up to be open and extensible. This starts by using open source technologies such as Xen, the Linux kernel and many more technologies. Next XC employs a unique Service VM architecture allowing the system to be extended via functional disaggregation. These Service VMs are generally small purpose built VMs that provide new services to the platform or to the local virtual ...

    Read More