We think you have liked this presentation. If you wish to download it, please recommend it to your friends in any social system. Share buttons are a little bit lower. Thank you!
Presentation is loading. Please wait.
Published byKurtis Pinckney
Modified over 2 years ago
© 2012 All rights reserved to Ceedo. Enhanced Mobility with Tighter Security
© 2012 All rights reserved to Ceedo. Security features woven into the fabric of our technology
© 2012 All rights reserved to Ceedo. Ceedo - Flexible Computing Sandbox Mode Ceedo's Virtual Runtime Environment (AKA the ‘Workspace’) is self-contained, independent and isolated from the host OS. Meaning: Complete separation of Registry and File System Inter-connectivity with the host can be configured and controlled Zero Footprint: Once unplugged nothing is left behind
© 2012 All rights reserved to Ceedo. Ceedo - Flexible Computing Device Binding Ceedo Workspaces cannot be copied from the device. Moving/duplicating workspaces can only be done using the Ceedo Enterprise Manager management console.
© 2012 All rights reserved to Ceedo. Granular management of detailed security options, remotely pushed from the cloud in light-weight policy files
© 2012 All rights reserved to Ceedo. Ceedo - Flexible Computing Data Leakage Prevention Data Containment Administrators can configure Ceedo Enterprise to block writing to drives and devices outside of the Workspace. Opaque Sandbox File explorer: Administrators can set the transparency level of the sandbox to prevent end- users from viewing any of the local drives.
© 2012 All rights reserved to Ceedo. Ceedo - Flexible Computing Network shares and drives Administrator can set the Workspace to deny access to all resources available on the network Printing Administrators can prevent Workspace applications from accessing the host’s printer Disable drag and drop Administrators can negate drag and drop options of files and data to and from Ceedo’s Workspace and its resident apps. Disable copying to clipboard Administrators can the copy-and-paste function from working when crossing data to and from the host. Data Leakage Prevention – Host Resources
© 2012 All rights reserved to Ceedo. Ceedo - Flexible Computing Anti-Virus Related Conditions Administrators can prevent the Workspace from launching if: An antivirus isn’t installed on the host If the host’s antivirus is not enabled If the host’s antivirus is not up to date Process Enforcement Administrators can prevent or allow the launch of specific processes from within the workspace Windows Version Control Administrators can prevent the Workspace from working on different Windows versions. Conditional Workspace and Process Launching
© 2012 All rights reserved to Ceedo. Using Ceedo Enterprise in conjunction with complimentary solutions and applications to enhance security
© 2012 All rights reserved to Ceedo. Ceedo - Flexible Computing Deploy Ceedo Enterprise on hardware encrypted USB Flash Drives such as: Imation, IronKey, McAfee and SafeNet Beef-up hardware level encryption with 3 rd party encryption applications such as: Encrypt the entire workspace with TrueCrypt Encrypt passwords with KeyPass Encrypt files with PrivateFile Encrypt the file system with E-Capsule Private Safe Data and Application Encryption
© 2012 All rights reserved to Ceedo. Ceedo - Flexible Computing Mount pre-configured, ready-to-run, plug-and- play PKI middleware and remote office solutions on 2FA devices’ flash memory Extend 2FA USB devices with plug-n-play pre- configured Public Key Middleware and remote office applications such as Citrix Receiver, VNC, VPN-SSL tunnels, etc. Mount pre-configured, ready-to-run, plug-and- play software based 2FA security tokens With software based 2FA solutions, such as RSA SecurID Software Token, installed into Ceedo’s Workspace, any portable storage device can turn into a 2FA device. Two Factor Authentication (2FA) Solutions
© 2012 All rights reserved to Ceedo. Ceedo - Flexible Computing Deploy plug-and-play, sand-boxed and encrypted workspaces equipped with user-rights enforcement, an independent sandboxed browser and zero- footprint security software. Deploy plug-and-play Workspaces with: Browser in kiosk-mode Secure browsing add-ons 2FA Public Key Encryption software Productivity tools User rights policies Safe Browsing Solutions
© 2012 All rights reserved to Ceedo.
© 2012 All rights reserved to Ceedo. Flexible Desktops. Dynamic Workplace. Ceedo for Citrix Optimal User Experience & Maximum IT Control Ceedo for Call.
© 2012 All rights reserved to Ceedo. Flexible Desktops. Dynamic Workplace. Ceedo for Call Center Call Center on a Stick Ceedo for Call Center Presentation.
© 2012 All rights reserved to Ceedo. Flexible Desktops. Dynamic Workplace. Ceedo Client Workspace Concept and Technology Overview Ceedo Client Workspace.
© 2011 All rights reserved to Ceedo. Ceedo - Flexible Computing Certificate-Based Authentication (CBA - 2FA) The organization MUST be able to positively.
© 2012 All rights reserved to Ceedo. Flexible Desktops. Dynamic Workplace. Ceedo Client Offerings For Service Providers Ceedo Client Workspace Virtualization.
© 2011 All rights reserved to Ceedo. Take Your Products and Services to the Next Level.
Week #10 Objectives: Remote Access and Mobile Computing Configure Mobile Computer and Device Settings Configure Remote Desktop and Remote Assistance for.
Module 8 Configuring Mobile Computing and Remote Access in Windows® 7.
Your storage on the ground; Your files in the cloud.
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter Four Configuring Outlook and Outlook Web Access.
Powerful and convenient management for Windows Mobile ® 6.1 devices in an enterprise environment. These features include: Centralized, over-the-air device.
MCTS Guide to Microsoft Windows Server 2008 Applications Infrastructure Configuration (Exam # ) Chapter Four Windows Server 2008 Remote Desktop Services,
1 Introduction to Microsoft Windows 2000 Windows 2000 Overview Windows 2000 Architecture Overview Windows 2000 Directory Services Overview Logging On to.
You can run that from a USB Drive ? Portable Applications: the good, the bad and the ugly Jeff Gimbel © 2007.
Deploying Chromebooks RICK NICHOLAS A.
©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone Endpoint Security Current portfolio and looking forward October 2010.
Understand Virtualized Clients Windows Operating System Fundamentals LESSON 2.4.
PROJECT PAPER ON BLUEFIRE MOBILE SECURITY. BY PONNURU VENKATA DINESH KUMAR STUDENT ID # A0815 PROFESSOR – VICKY HSU CS-426.
Welcome to Xandros Desktop Version 2.0. What is Xandros? The New Standard – Xandros is the award winning new standard for Desktop Operating System software.
Multiboot System under Windows XP – Ubuntu – Windows 7 Qiong LIN - 28 April 2012.
© 2017 SlidePlayer.com Inc. All rights reserved.