1 / 13

Ceedo Enterprise Security Features

Ceedo Enterprise Security Features. Enhanced Mobility with Tighter Security. Security Features Built Into the Syste m. Security features woven into the fabric of our technology. Components: End-User’s Workspace.

alden
Télécharger la présentation

Ceedo Enterprise Security Features

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Ceedo Enterprise Security Features Enhanced Mobility with Tighter Security

  2. Security Features Built Into the System Security features woven into the fabric of our technology

  3. Components: End-User’s Workspace • Sandbox ModeCeedo's Virtual Runtime Environment (AKA the ‘Workspace’) is self-contained, independent and isolated from the host OS. Meaning: • Complete separation of Registry and File System • Inter-connectivity with the host can be configured and controlled • Zero Footprint: Once unplugged nothing is left behind User Data Customizations Applications Host Apps Virtual Runtime Environment User Data Customizations Applications

  4. Components: End-User’s Workspace • Device BindingCeedo Workspaces cannot be copied from the device. Moving/duplicating workspaces can only be done using the Ceedo Enterprise Manager management console. Ceedo

  5. Configurable Security Options Granular management of detailed security options, remotely pushed from the cloud in light-weight policy files Ceedo Policy File

  6. Configurable Security Options Data Leakage Prevention • Data ContainmentAdministrators can configure Ceedo Enterprise to block writing to drives and devices outside of the Workspace. • Opaque SandboxFile explorer: Administrators can set the transparency level of the sandbox to prevent end-users from viewing any of the local drives. Ceedo Policy File

  7. Configurable Security Options • Network shares and drivesAdministrator can set the Workspace to deny access to all resources available on the network • PrintingAdministrators can prevent Workspace applications from accessing the host’s printer • Disable drag and dropAdministrators can negate drag and drop options of files and data to and from Ceedo’s Workspace and its resident apps. • Disable copying to clipboardAdministrators can the copy-and-paste function from working when crossing data to and from the host. Data Leakage Prevention – Host Resources

  8. Configurable Security Options • Anti-Virus Related ConditionsAdministrators can prevent the Workspace from launching if: • An antivirus isn’t installed on the host • If the host’s antivirus is not enabled • If the host’s antivirus is not up to date • Process EnforcementAdministrators can prevent or allow the launch of specific processes from within the workspace • Windows Version ControlAdministrators can prevent the Workspace from working on different Windows versions. Conditional Workspace and Process Launching

  9. Citrix Receiver VPN SSL Add-on PKI Middleware Configured Browser Data & User Policies Security Solutions Using Ceedo Using Ceedo Enterprise in conjunction with complimentary solutions and applications to enhance security

  10. Security Enhancement with Ceedo Enterprise • Deploy Ceedo Enterprise on hardware encrypted USB Flash Drives such as: Imation, IronKey, McAfee and SafeNet • Beef-up hardware level encryption with 3rd party encryption applications such as: • Encrypt the entire workspace with TrueCrypt • Encrypt passwords with KeyPass • Encrypt files with PrivateFile • Encrypt the file system with E-Capsule Private Safe Data and Application Encryption

  11. Security Enhancement with Ceedo Enterprise • Mount pre-configured, ready-to-run, plug-and-play PKI middleware and remote office solutions on 2FA devices’ flash memoryExtend 2FA USB devices with plug-n-play pre-configured Public Key Middleware and remote office applications such as Citrix Receiver, VNC, VPN-SSL tunnels, etc. • Mount pre-configured, ready-to-run, plug-and-play software based 2FA security tokensWith software based 2FA solutions, such as RSASecurID Software Token, installed into Ceedo’s Workspace, any portable storage device can turn into a 2FA device. Two Factor Authentication (2FA) Solutions Citrix Receiver VPN SSL Add-on PKI Middleware Configured Browser Data & User Policies USB Flash 2FA Device

  12. Security Enhancement with Ceedo Enterprise • Deploy plug-and-play, sand-boxed and encrypted workspaces equipped with user-rights enforcement, an independent sandboxed browser and zero-footprint security software. • Deploy plug-and-play Workspaces with: • Browser in kiosk-mode • Secure browsing add-ons • 2FA Public Key • Encryption software • Productivity tools • User rights policies Safe Browsing Solutions Public Key Software VPN SSL Add-on Kiosk-Mode Browser Data & User Policies User Data User-Rights Policies Customizations Applications Encryption Software Additional Software Sandboxed Workspace Read Only Read/Write

  13. Thank You.

More Related