130 likes | 348 Views
Ceedo Enterprise Security Features. Enhanced Mobility with Tighter Security. Security Features Built Into the Syste m. Security features woven into the fabric of our technology. Components: End-User’s Workspace.
E N D
Ceedo Enterprise Security Features Enhanced Mobility with Tighter Security
Security Features Built Into the System Security features woven into the fabric of our technology
Components: End-User’s Workspace • Sandbox ModeCeedo's Virtual Runtime Environment (AKA the ‘Workspace’) is self-contained, independent and isolated from the host OS. Meaning: • Complete separation of Registry and File System • Inter-connectivity with the host can be configured and controlled • Zero Footprint: Once unplugged nothing is left behind User Data Customizations Applications Host Apps Virtual Runtime Environment User Data Customizations Applications
Components: End-User’s Workspace • Device BindingCeedo Workspaces cannot be copied from the device. Moving/duplicating workspaces can only be done using the Ceedo Enterprise Manager management console. Ceedo
Configurable Security Options Granular management of detailed security options, remotely pushed from the cloud in light-weight policy files Ceedo Policy File
Configurable Security Options Data Leakage Prevention • Data ContainmentAdministrators can configure Ceedo Enterprise to block writing to drives and devices outside of the Workspace. • Opaque SandboxFile explorer: Administrators can set the transparency level of the sandbox to prevent end-users from viewing any of the local drives. Ceedo Policy File
Configurable Security Options • Network shares and drivesAdministrator can set the Workspace to deny access to all resources available on the network • PrintingAdministrators can prevent Workspace applications from accessing the host’s printer • Disable drag and dropAdministrators can negate drag and drop options of files and data to and from Ceedo’s Workspace and its resident apps. • Disable copying to clipboardAdministrators can the copy-and-paste function from working when crossing data to and from the host. Data Leakage Prevention – Host Resources
Configurable Security Options • Anti-Virus Related ConditionsAdministrators can prevent the Workspace from launching if: • An antivirus isn’t installed on the host • If the host’s antivirus is not enabled • If the host’s antivirus is not up to date • Process EnforcementAdministrators can prevent or allow the launch of specific processes from within the workspace • Windows Version ControlAdministrators can prevent the Workspace from working on different Windows versions. Conditional Workspace and Process Launching
Citrix Receiver VPN SSL Add-on PKI Middleware Configured Browser Data & User Policies Security Solutions Using Ceedo Using Ceedo Enterprise in conjunction with complimentary solutions and applications to enhance security
Security Enhancement with Ceedo Enterprise • Deploy Ceedo Enterprise on hardware encrypted USB Flash Drives such as: Imation, IronKey, McAfee and SafeNet • Beef-up hardware level encryption with 3rd party encryption applications such as: • Encrypt the entire workspace with TrueCrypt • Encrypt passwords with KeyPass • Encrypt files with PrivateFile • Encrypt the file system with E-Capsule Private Safe Data and Application Encryption
Security Enhancement with Ceedo Enterprise • Mount pre-configured, ready-to-run, plug-and-play PKI middleware and remote office solutions on 2FA devices’ flash memoryExtend 2FA USB devices with plug-n-play pre-configured Public Key Middleware and remote office applications such as Citrix Receiver, VNC, VPN-SSL tunnels, etc. • Mount pre-configured, ready-to-run, plug-and-play software based 2FA security tokensWith software based 2FA solutions, such as RSASecurID Software Token, installed into Ceedo’s Workspace, any portable storage device can turn into a 2FA device. Two Factor Authentication (2FA) Solutions Citrix Receiver VPN SSL Add-on PKI Middleware Configured Browser Data & User Policies USB Flash 2FA Device
Security Enhancement with Ceedo Enterprise • Deploy plug-and-play, sand-boxed and encrypted workspaces equipped with user-rights enforcement, an independent sandboxed browser and zero-footprint security software. • Deploy plug-and-play Workspaces with: • Browser in kiosk-mode • Secure browsing add-ons • 2FA Public Key • Encryption software • Productivity tools • User rights policies Safe Browsing Solutions Public Key Software VPN SSL Add-on Kiosk-Mode Browser Data & User Policies User Data User-Rights Policies Customizations Applications Encryption Software Additional Software Sandboxed Workspace Read Only Read/Write