We think you have liked this presentation. If you wish to download it, please recommend it to your friends in any social system. Share buttons are a little bit lower. Thank you!
Presentation is loading. Please wait.
Published byElyse Greenhow
Modified over 2 years ago
© 2012 All rights reserved to Ceedo. Flexible Desktops. Dynamic Workplace. Ceedo for Call Center Call Center on a Stick Ceedo for Call Center Presentation About Ceedo Ceedo for Call center quick overview Ceedo for Call center security measures
© 2012 All rights reserved to Ceedo. Flexible Desktops. Dynamic Workplace. Call centers are costly to purchase and maintain: Real estate Rent, property tax, etc. Office supplies Desks, cubical, chairs, pens, etc. PC and peripherals From the PC to headsets (OS licenses/purchase/upgrades) Power consumption Computers, AC, lights, elevators, etc. Employees’ costs (commuting expenses, coffee, water, toilets, etc. etc.) IT and helpdesk Fixing hardware
© 2012 All rights reserved to Ceedo. Flexible Desktops. Dynamic Workplace. Put Your Call Center on a Stick – And Your Employees at Home! Mount all the applications that make up your call center environment on a centrally managed workspace that can be fitted on any USB device, and work on any Windows PC! VoIP Applications Remote Access Apps (Citrix Receiver) Secure Browser (company portal…) User-rights policies Authentication software More Unified Communication Apps VPN SSL
© 2012 All rights reserved to Ceedo. Flexible Desktops. Dynamic Workplace. Plug-and-Play Centrally Managed Online/Offline Zero Footprint / Sandbox
© 2012 All rights reserved to Ceedo. Flexible Desktops. Dynamic Workplace. Low CAPEX and OPEX with fast ROI Redistribute organizational resources to growth factors Availability and flexibility during peek hours Smooth integration with other CC resources (CTI, reports) Usage monitoring and complete central management Fast recovery and business continuity at disaster time Representative will work from his home (bad weather, snow storms)
© 2012 All rights reserved to Ceedo. Mitigating Risks and Elevating Security
© 2012 All rights reserved to Ceedo. Flexible Desktops. Dynamic Workplace. Use hardware with encryption and active anti-malware scan Add soft Two Factor Authentication (or deploy on physical 2FA hardware devices) Whitelist processes that are allowed to run in Ceedo (+MD5 signatures) Turn-on Ceedo’s antivirus detection and OS patch level. Use a VPN-SSL solution with strong Access Control benchmark settings Use an independent browser rather than the virtualized “mapped” IE Add to the internal browser safe browsing add-ons and configurations Configure Ceedo Enterprise to block writing to host drives, printers, etc. Leave the data in the datacenter or use Citrix’s ShareFile / similar solution Employ 3 rd party anti-malware, security applications, soft-biometric apps, etc. * In 2FA devices - Mount components on read-only partition
© 2012 All rights reserved to Ceedo. Flexible Desktops. Dynamic Workplace. User plugs in device Encrypted drive password check Encrypted drive runs antivirus scan Drive is decrypted Ceedo checks host antivirus, firewall, network connection, etc. Ceedo checks processes MD5 signature (continuous throughout session) Ceedo enforces host recourse accessibility and Ceedo updates Ceedo sandbox fires-up with independent runtime environment Second antivirus and/or antimalware scan Two Factor Authentication software/middleware VPN SSL (can include second access control check, such as Juniper SSL) External solution’s security (such as Citrix’s own security features)
© 2012 All rights reserved to Ceedo. Flexible Desktops. Dynamic Workplace. Device Binding Workspaces licenses are device-bound and cannot work if copied to unauthorized devices + most cases of copping a workspace will break it.
© 2012 All rights reserved to Ceedo. Flexible Desktops. Dynamic Workplace. Mount pre-configured, ready-to-run, plug-and- play PKI middleware and remote connection solutions on 2FA devices’ flash memory HARDWARE Extend 2FA USB devices with plug-n-play pre-configured Public Key Middleware and remote office applications such as Citrix Receiver, VNC, VPN-SSL tunnels, etc. Mount pre-configured, ready-to-run, plug-and- play 2FA security SOFTWARE tokens With software based 2FA solutions, such as RSA SecurID Software Token, installed into Ceedo’s Workspace, any portable storage device can turn into a 2FA device.
© 2012 All rights reserved to Ceedo.
© 2012 All rights reserved to Ceedo. Flexible Desktops. Dynamic Workplace. Ceedo for Citrix Optimal User Experience & Maximum IT Control Ceedo for Call.
© 2012 All rights reserved to Ceedo. Flexible Desktops. Dynamic Workplace. Ceedo Client Workspace Concept and Technology Overview Ceedo Client Workspace.
© 2012 All rights reserved to Ceedo. Enhanced Mobility with Tighter Security.
© 2012 All rights reserved to Ceedo. Flexible Desktops. Dynamic Workplace. Ceedo Client Offerings For Service Providers Ceedo Client Workspace Virtualization.
© 2011 All rights reserved to Ceedo. Ceedo - Flexible Computing Certificate-Based Authentication (CBA - 2FA) The organization MUST be able to positively.
Windows 8: Windows To Go Overview Zvezdan PavkovicTanya Koval Senior ConsultantArchitect WCL333.
What is Driving the Virtual Desktop? VMware View 4: Built for Desktops VMware View 4: Deployment References…Q&A Agenda.
!! Are we under attack !! Consumer devices continue to invade *Corporate enterprise – just wanting to plug in* Mobile Device Management.
Module 8 Configuring Mobile Computing and Remote Access in Windows® 7.
Week #10 Objectives: Remote Access and Mobile Computing Configure Mobile Computer and Device Settings Configure Remote Desktop and Remote Assistance for.
One Platform, One Solution: eToken TMS 5.1 Customer Presentation November 2009.
What Is Desktop Virtualization? How Does Application Virtualization Help? How does V3 Systems help? Getting Started AGENDA.
The future of Desktops Transform Your Desktop with Virtualization.
VMware View 4 Built for Desktops. Copyright © 2009 VMware Inc. All rights reserved. Confidential and proprietary. AGENDA The Desktop Revolution is Here.
©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. Securing Your Data in Endpoint and Mobile Environments Frank Suijten Security.
© 2011 All rights reserved to Ceedo. Take Your Products and Services to the Next Level.
Mobility Without Vulnerability: Secure and Enable Your Mobile Users, Apps, and Devices David Clapp – Intuitive.
Desktop in the Clouds Using Virtualization to Extend Client Outreach and Protect Data.
Copyright 2009 FUJITSU TECHNOLOGY SOLUTIONS Virtual Workplace Elevator Pitch Gernot Fels May 2009.
RSA Security Validating Users and Devices to Protect Network Assets Endpoint Solutions for Cisco Environments.
Understand Virtualized Clients Windows Operating System Fundamentals LESSON 2.4.
Chapter 2 Securing Network Server and User Workstations.
Citrix Secure Gateway v1.1 Customer Presentation Aug 2002 Customer Presentation Aug 2002.
Data Encryption Overview South Seas Corporation Jared Owensby.
©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone Network Access Technology: Secure Remote Access S Prasanna Bhaskaran.
Real Security for Server Virtualization Rajiv Motwani 2 nd October 2010.
©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone Endpoint Security Current portfolio and looking forward October 2010.
1 Chapter 11: Data Centre Administration Objectives Data Centre Structure Data Centre Structure Data Centre Administration Data Centre Administration Data.
March 2010 Zero Client Maximum Savings, Maximum Flexibility Copyright 2010 FUJITSU TECHNOLOGY SOLUTIONS.
Working with Disks and Devices Lesson 4. Objectives Describe MBR and GPT partition styles Describe basic and dynamic disks Describe the 4 types of dynamic.
Chapter 2 Information Security Overview The Executive Guide to Information Security manual.
©2010 Check Point Software Technologies Ltd. | [Restricted] ONLY for designated groups and individuals Visions for 2010 Anna Russell & Andy Clark.
NetModule Cloud Solution Professional M2M Networking out of the Cloud NetModule Cloud Router 1.
Introduction to the Virtual Desktop Pilot at Fermilab.
DaaS (Desktop as a Service) Last Update: July 15 th, 2015.
PROJECT PAPER ON BLUEFIRE MOBILE SECURITY. BY PONNURU VENKATA DINESH KUMAR STUDENT ID # A0815 PROFESSOR – VICKY HSU CS-426.
Desktop Virtualization —An Elegant Solution Presented by Cloud Computing. Endless Possibilities. August 10, 2012.
TRUSTPORT PRODUCT PORTFOLIO Marcela Parolkova Sales Director.
The Remote Workplace Designing, deploying, and supporting the remote workplace environment Presented by: John Milhoan Information Technology Cooperative,
2 Industry trends and challenges Windows Server 2012: Modern workstyle, enabled Access from virtually anywhere, any device Full Windows experience.
A Quick Tour of Ceedo Deliver environments to un-managed PCs.
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
NetModule Cloud Solution Professional M2M Networking out of the Cloud © 2014 NetModule AG Slide 1.
Copyright © 2005 VMware, Inc. All rights reserved. VMware Virtualization Phil Anthony Virtual Systems Engineer
Transform your desktop with virtualization. 22 Agenda Evolution of VDI VDI Solution VDI Use Cases Questions & Answers.
SemiCorp Inc. Presented by Danu Hunskunatai GGU ID #
©2013 Check Point Software Technologies Ltd. | [Unrestricted] For everyone Best Practices to Secure the Mobile Enterprise Macy Torrey
IT as a Service (ITaaS) by Evolve IP Managed Services Last Update: May 19, 2015.
POWERED BY Avatara Team Background CompleteCloud Overview Next Steps A G E N D A.
© 2016 SlidePlayer.com Inc. All rights reserved.