We think you have liked this presentation. If you wish to download it, please recommend it to your friends in any social system. Share buttons are a little bit lower. Thank you!
Presentation is loading. Please wait.
Published byKurtis Pinckney
Modified over 2 years ago
© 2012 All rights reserved to Ceedo. Enhanced Mobility with Tighter Security
© 2012 All rights reserved to Ceedo. Security features woven into the fabric of our technology
© 2012 All rights reserved to Ceedo. Ceedo - Flexible Computing Sandbox Mode Ceedo's Virtual Runtime Environment (AKA the ‘Workspace’) is self-contained, independent and isolated from the host OS. Meaning: Complete separation of Registry and File System Inter-connectivity with the host can be configured and controlled Zero Footprint: Once unplugged nothing is left behind
© 2012 All rights reserved to Ceedo. Ceedo - Flexible Computing Device Binding Ceedo Workspaces cannot be copied from the device. Moving/duplicating workspaces can only be done using the Ceedo Enterprise Manager management console.
© 2012 All rights reserved to Ceedo. Granular management of detailed security options, remotely pushed from the cloud in light-weight policy files
© 2012 All rights reserved to Ceedo. Ceedo - Flexible Computing Data Leakage Prevention Data Containment Administrators can configure Ceedo Enterprise to block writing to drives and devices outside of the Workspace. Opaque Sandbox File explorer: Administrators can set the transparency level of the sandbox to prevent end- users from viewing any of the local drives.
© 2012 All rights reserved to Ceedo. Ceedo - Flexible Computing Network shares and drives Administrator can set the Workspace to deny access to all resources available on the network Printing Administrators can prevent Workspace applications from accessing the host’s printer Disable drag and drop Administrators can negate drag and drop options of files and data to and from Ceedo’s Workspace and its resident apps. Disable copying to clipboard Administrators can the copy-and-paste function from working when crossing data to and from the host. Data Leakage Prevention – Host Resources
© 2012 All rights reserved to Ceedo. Ceedo - Flexible Computing Anti-Virus Related Conditions Administrators can prevent the Workspace from launching if: An antivirus isn’t installed on the host If the host’s antivirus is not enabled If the host’s antivirus is not up to date Process Enforcement Administrators can prevent or allow the launch of specific processes from within the workspace Windows Version Control Administrators can prevent the Workspace from working on different Windows versions. Conditional Workspace and Process Launching
© 2012 All rights reserved to Ceedo. Using Ceedo Enterprise in conjunction with complimentary solutions and applications to enhance security
© 2012 All rights reserved to Ceedo. Ceedo - Flexible Computing Deploy Ceedo Enterprise on hardware encrypted USB Flash Drives such as: Imation, IronKey, McAfee and SafeNet Beef-up hardware level encryption with 3 rd party encryption applications such as: Encrypt the entire workspace with TrueCrypt Encrypt passwords with KeyPass Encrypt files with PrivateFile Encrypt the file system with E-Capsule Private Safe Data and Application Encryption
© 2012 All rights reserved to Ceedo. Ceedo - Flexible Computing Mount pre-configured, ready-to-run, plug-and- play PKI middleware and remote office solutions on 2FA devices’ flash memory Extend 2FA USB devices with plug-n-play pre- configured Public Key Middleware and remote office applications such as Citrix Receiver, VNC, VPN-SSL tunnels, etc. Mount pre-configured, ready-to-run, plug-and- play software based 2FA security tokens With software based 2FA solutions, such as RSA SecurID Software Token, installed into Ceedo’s Workspace, any portable storage device can turn into a 2FA device. Two Factor Authentication (2FA) Solutions
© 2012 All rights reserved to Ceedo. Ceedo - Flexible Computing Deploy plug-and-play, sand-boxed and encrypted workspaces equipped with user-rights enforcement, an independent sandboxed browser and zero- footprint security software. Deploy plug-and-play Workspaces with: Browser in kiosk-mode Secure browsing add-ons 2FA Public Key Encryption software Productivity tools User rights policies Safe Browsing Solutions
© 2012 All rights reserved to Ceedo.
© 2012 All rights reserved to Ceedo. Flexible Desktops. Dynamic Workplace. Ceedo for Citrix Optimal User Experience & Maximum IT Control Ceedo for Call.
© 2012 All rights reserved to Ceedo. Flexible Desktops. Dynamic Workplace. Ceedo for Call Center Call Center on a Stick Ceedo for Call Center Presentation.
© 2012 All rights reserved to Ceedo. Flexible Desktops. Dynamic Workplace. Ceedo Client Workspace Concept and Technology Overview Ceedo Client Workspace.
© 2011 All rights reserved to Ceedo. Ceedo - Flexible Computing Certificate-Based Authentication (CBA - 2FA) The organization MUST be able to positively.
© 2012 All rights reserved to Ceedo. Flexible Desktops. Dynamic Workplace. Ceedo Client Offerings For Service Providers Ceedo Client Workspace Virtualization.
© 2011 All rights reserved to Ceedo. Take Your Products and Services to the Next Level.
Week #10 Objectives: Remote Access and Mobile Computing Configure Mobile Computer and Device Settings Configure Remote Desktop and Remote Assistance for.
Module 8 Configuring Mobile Computing and Remote Access in Windows® 7.
Your storage on the ground; Your files in the cloud.
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter Four Configuring Outlook and Outlook Web Access.
Powerful and convenient management for Windows Mobile ® 6.1 devices in an enterprise environment. These features include: Centralized, over-the-air device.
MCTS Guide to Microsoft Windows Server 2008 Applications Infrastructure Configuration (Exam # ) Chapter Four Windows Server 2008 Remote Desktop Services,
1 Introduction to Microsoft Windows 2000 Windows 2000 Overview Windows 2000 Architecture Overview Windows 2000 Directory Services Overview Logging On to.
You can run that from a USB Drive ? Portable Applications: the good, the bad and the ugly Jeff Gimbel © 2007.
Deploying Chromebooks RICK NICHOLAS A.
©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone Endpoint Security Current portfolio and looking forward October 2010.
Understand Virtualized Clients Windows Operating System Fundamentals LESSON 2.4.
PROJECT PAPER ON BLUEFIRE MOBILE SECURITY. BY PONNURU VENKATA DINESH KUMAR STUDENT ID # A0815 PROFESSOR – VICKY HSU CS-426.
Welcome to Xandros Desktop Version 2.0. What is Xandros? The New Standard – Xandros is the award winning new standard for Desktop Operating System software.
Multiboot System under Windows XP – Ubuntu – Windows 7 Qiong LIN - 28 April 2012.
Working with Disks and Devices Lesson 4. Objectives Describe MBR and GPT partition styles Describe basic and dynamic disks Describe the 4 types of dynamic.
There are many leading online sources that are providing reliable encryption solution for your online as well as offline file security through smart software.
One Platform, One Solution: eToken TMS 5.1 Customer Presentation November 2009.
Microsoft ® Official Course First Look Clinic Overview of Windows 8 By Ragowo Riantory, S.Kom, MCP.
Lesson 18: Configuring Security for Mobile Devices MOAC : Configuring Windows 8.1.
Page 1 Printing & Terminal Services Lecture 8 Hassan Shuja 11/16/2004.
SSL VPN. Module Objectives By the end of this module participants will be able to: Identify the VPN technologies available on the FortiGate device Identify.
Data Encryption Overview South Seas Corporation Jared Owensby.
Hands-On Virtual Computing Chapter 1 Introduction to Virtual Computing.
About PKI Key Stores Dartmouth College PKI Lab. Key Store Defined Protected “vault” to hold user’s private key with their copy of their x.509 certificate.
About the Presentations The presentations cover the objectives found in the opening of each chapter. All chapter objectives are listed in the beginning.
Windows 8: Windows To Go Overview Zvezdan PavkovicTanya Koval Senior ConsultantArchitect WCL333.
© 2012 The McGraw-Hill Companies, Inc. All rights reserved. 1 Third Edition Chapter 6 Today’s Windows Windows Vista and Windows 7 McGraw-Hill.
Remote Accessing Your Home Computer Using VNC and a Dynamic DNS Name.
Mobility Without Vulnerability: Secure and Enable Your Mobile Users, Apps, and Devices David Clapp – Intuitive.
Page Copyright Giritech A/S an – Excitor company.
Overview of Microsoft ISA Server. Introducing ISA Server New Product—Proxy Server In 1996, Netscape had begun to sell a web proxy product, which optimized.
©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. Securing Your Data in Endpoint and Mobile Environments Frank Suijten Security.
Information Security 1 Information Security: Security Tools Jeffy Mwakalinga.
CSC190 Introduction to Computing Operating Systems and Utility Programs.
Managing Applications, Services, Folders, and Libraries Lesson 4.
Avoid data leakage, espionage, sabotage and other reputation and business risks without losing employee performance and mobility.
®® Microsoft Windows 7 for Power Users Tutorial 11 Installing, Updating, and Configuring Software.
Securing Windows 7 Lesson 10. Objectives Understand authentication and authorization Configure password policies Secure Windows 7 using the Action Center.
Chapter 14 Supporting Windows 2000 Professional. 14 You Will Learn… n About the different operating systems within the Windows 2000 suite n About the.
Chapter 9 Operating Systems Discovering Computers 2016 Tools, Apps, Devices, and the Impact of Technology.
Script Kiddies; CybercrimeCyber-espionage; Cyber-warfare CybercriminalsState sponsored actions; Unlimited resources Attacks on fortune 500All sectors.
1 Overview of Microsoft Windows 2000 Multipurpose OS Reduces total cost of ownership (TCO)
OAAIS Enterprise Information Security Security Awareness, Training & Education (SATE) Program or UCSF Campus VPN.
© 2017 SlidePlayer.com Inc. All rights reserved.