We think you have liked this presentation. If you wish to download it, please recommend it to your friends in any social system. Share buttons are a little bit lower. Thank you!
Presentation is loading. Please wait.
Published byTrinity Millet
Modified over 2 years ago
© 2012 All rights reserved to Ceedo. Flexible Desktops. Dynamic Workplace. Ceedo for Citrix Optimal User Experience & Maximum IT Control Ceedo for Call Center Presentation The Problem Ceedo for Citrix quick overview Ceedo for Citrix security measures
© 2012 All rights reserved to Ceedo. Flexible Desktops. Dynamic Workplace. End-users are required to install all the components that make up your remote connection infrastructure on there own. Including: Citrix Receiver VPN SSL Two Factor Authentication Browser configuration etc. Novice end-users may result in high helpdesk costs Unmanaged PCs pose potential security risks Managing the remote PCs is virtually impossible as they are beyond the IT’s reach
© 2012 All rights reserved to Ceedo. Flexible Desktops. Dynamic Workplace. Plug-and-Play Citrix Receiver with Beefed-Up Security Mount all the applications that make up your remote Citrix solution on a centrally managed workspace that can be fitted on 2FA and Encrypted USB devices (and even turn encrypted devices into 2FA devices…) Citrix Receiver client 2FA Soft-token or device middleware Secure Browser (with add-ons) Antimalware scanners, AC, etc. Additional Apps (and add-ons) User rights and policies VPN SSL and related add-ons
© 2012 All rights reserved to Ceedo. Flexible Desktops. Dynamic Workplace. Plug-and-Play Centrally Managed Online/Offline Zero Footprint / Sandbox
© 2012 All rights reserved to Ceedo. Mitigating Risks and Elevating Security
© 2012 All rights reserved to Ceedo. Flexible Desktops. Dynamic Workplace. Use hardware with encryption and active anti-malware scan Add soft Two Factor Authentication (or deploy on physical 2FA hardware devices) Whitelist processes that are allowed to run in Ceedo (+MD5 signatures) Turn-on Ceedo’s antivirus detection and OS patch level. Use a VPN-SSL solution with strong Access Control benchmark settings Use an independent browser rather than the virtualized “mapped” IE Add to the internal browser safe browsing add-ons and configurations Configure Ceedo Enterprise to block writing to host drives, printers, etc. Leave the data in the datacenter or use Citrix’s ShareFile / similar solution Employ 3 rd party anti-malware, security applications, soft-biometric apps, etc. * In 2FA devices - Mount components on read-only partition
© 2012 All rights reserved to Ceedo. Flexible Desktops. Dynamic Workplace. User plugs in device Encrypted drive password check Encrypted drive runs antivirus scan Drive is decrypted Ceedo checks host antivirus, firewall, network connection, etc. Ceedo checks processes MD5 signature (continuous throughout session) Ceedo enforces host recourse accessibility and Ceedo updates Ceedo sandbox fires-up with independent runtime environment Second antivirus and/or antimalware scan Two Factor Authentication software/middleware VPN SSL (can include second access control check, such as Juniper SSL) External solution’s security (such as Citrix’s own security features)
© 2012 All rights reserved to Ceedo. Flexible Desktops. Dynamic Workplace. Device Binding Workspaces licenses are device-bound and cannot work if copied to unauthorized devices + most cases of copping a workspace will break it.
© 2012 All rights reserved to Ceedo. Flexible Desktops. Dynamic Workplace. Mount pre-configured, ready-to-run, plug-and- play PKI middleware and remote connection solutions on 2FA devices’ flash memory HARDWARE Extend 2FA USB devices with plug-n-play pre-configured Public Key Middleware and remote office applications such as Citrix Receiver, VNC, VPN-SSL tunnels, etc. Mount pre-configured, ready-to-run, plug-and- play 2FA security SOFTWARE tokens With software based 2FA solutions, such as RSA SecurID Software Token, installed into Ceedo’s Workspace, any portable storage device can turn into a 2FA device.
© 2012 All rights reserved to Ceedo.
© 2012 All rights reserved to Ceedo. Flexible Desktops. Dynamic Workplace. Ceedo for Call Center Call Center on a Stick Ceedo for Call Center Presentation.
© 2012 All rights reserved to Ceedo. Flexible Desktops. Dynamic Workplace. Ceedo Client Workspace Concept and Technology Overview Ceedo Client Workspace.
© 2012 All rights reserved to Ceedo. Enhanced Mobility with Tighter Security.
© 2012 All rights reserved to Ceedo. Flexible Desktops. Dynamic Workplace. Ceedo Client Offerings For Service Providers Ceedo Client Workspace Virtualization.
© 2011 All rights reserved to Ceedo. Ceedo - Flexible Computing Certificate-Based Authentication (CBA - 2FA) The organization MUST be able to positively.
©2013 Check Point Software Technologies Ltd. | [Unrestricted] For everyone Best Practices to Secure the Mobile Enterprise Macy Torrey
Legal Services National Technology Assistance Project.
| Toll-free: How to have both Productivity and Security for Remote Access Solution in a HIPAA Environment Tom.
I MPACT VAN BYOD EN M OBIELE DEVICES OP UW HUIDIGE DESKTOP EN CLIENT ARCHITECTUUR.
© 2012 VMware Inc. All rights reserved Confidential VMware Sales Byte Virtualization Expansion for Simplified Desktop Management.
Joey Snow Technical Evangelist Microsoft Corporation Session Code: WSV207.
Craig Ashley | Sr. Product Manager Michael Raymond | SDET II.
Branch Repeater 5.6, 5.7 & VPX Technical Presentation.
Microsoft and Community Tour 2011 – Infrastrutture in evoluzione Planning, Deploying and Managing a Microsoft VDI Infrastructure Level Advanced.
Markus Erlacher Technial Solution Professional, Microsoft Switzerland
Changing the paradigm Innovative approach to automating configuration management with proven, patented technology Versatile experience with 1000s of global.
ViPNt ViPNet Product Presentation Infotecs GmbH 2008.
Powerful and convenient management for Windows Mobile ® 6.1 devices in an enterprise environment. These features include: Centralized, over-the-air device.
2 Industry trends and challenges Windows Server 2012: Modern workstyle, enabled Access from virtually anywhere, any device Full Windows experience.
Software Bundle ViPNet Secure Remote Access Arrangement using ViPNet Mobile © Infotecs.
Trends in Endpoint Security by Richard Lau Trends in Endpoint Security by Richard Lau 29 September 2005.
Learning Objectives 13.1 Explain how businesses benefit from the use of information technology (IT) Describe the components that enable IT– networks,
Virtual Private Networks (VPNs) VPNs allow secure, remote, connections… but they don’t protect you from a compromised remote PC.
1 Symantec Endpoint Protection 12.1 Unrivaled Security. Blazing Performance. Built for Virtual Environments. May 2011.
How to protect your laptop, smartphone & other mobile devices CYBER SECURITY ON THE GO TCU Information Security Services.
© 2003 Microsoft Limited. All rights reserved. This presentation is for informational purposes only. Microsoft makes no warranties, express or implied,
ARMORINO Portable Privacy Platform. µcrypt µcrypt Armorino Information always has a value that constantly growing under pressure of new.
Wednesday, January 12th, 2011 Automating Inventory, Deployment and Configuration of Your Windows Infrastructure Dan Stolts, Microsoft Like most IT professionals,
Anders Vinger, University of Oslo Personal Data Recovery The pain of laptops.
© 2016 SlidePlayer.com Inc. All rights reserved.