© 2011 All rights reserved to Ceedo. Ceedo - Flexible Computing Certificate-Based Authentication (CBA - 2FA) The organization MUST be able to positively.

Slides:



Advertisements
Similar presentations
Powerful and convenient management for Windows Mobile ® 6.1 devices in an enterprise environment. These features include: Centralized, over-the-air device.
Advertisements

© 2012 All rights reserved to Ceedo. Flexible Desktops. Dynamic Workplace. Ceedo for Call Center Call Center on a Stick Ceedo for Call Center Presentation.
© 2012 All rights reserved to Ceedo. Flexible Desktops. Dynamic Workplace. Ceedo Client Workspace Concept and Technology Overview Ceedo Client Workspace.
Working with Disks and Devices
Copyright © 2012 AirWatch, LLC. All rights reserved. Proprietary & Confidential. Mobile Content Strategies and Deployment Best Practices.
© 2011 All rights reserved to Ceedo. Take Your Products and Services to the Next Level.
Sophos Mobile Control SophSkills Session Name: Thomas Lippert – Product Management DPG Date: 17-Feb-2011.
Ljubomir Ivaniš CPU d.o.o.
© 2012 All rights reserved to Ceedo. Enhanced Mobility with Tighter Security.
© 2012 All rights reserved to Ceedo. Flexible Desktops. Dynamic Workplace. Ceedo for Citrix Optimal User Experience & Maximum IT Control Ceedo for Call.
© 2012 All rights reserved to Ceedo. Flexible Desktops. Dynamic Workplace. Ceedo Client Offerings For Service Providers Ceedo Client Workspace Virtualization.
Avoid data leakage, espionage, sabotage and other reputation and business risks without losing employee performance and mobility.
Avaya – Proprietary. Use pursuant to the terms of your signed agreement or Company policy. idEngines® Avaya Identity Engines And Mobile Device Management.
Securing. Agenda  Hard Drive Encryption  User Account Permissions  Root Level Access  Firewall Protection  Malware Protection.
The future of Desktops Transform Your Desktop with Virtualization.
Windows 8: Windows To Go Overview Zvezdan PavkovicTanya Koval Senior ConsultantArchitect WCL333.
Jeff Patton & Doug Whiteley It Service Group IT Roundtable July 15 th, 2009 Thin Clients & Terminal Services.
Understand Virtualized Clients Windows Operating System Fundamentals LESSON 2.4.
Configuring Windows Vista Security Chapter 3. IE7 Pop-up Blocker Pop-up Blocker prevents annoying and sometimes unsafe pop-ups from web sites Can block.
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
March 2010 Zero Client Maximum Savings, Maximum Flexibility Copyright 2010 FUJITSU TECHNOLOGY SOLUTIONS.
Alcatel Identity Server Alcatel SEL AG. Alcatel Identity Server — 2 All rights reserved © 2004, Alcatel What is an Identity Provider?  
Mobility for the Enterprise
NETOP ONDEMAND What’s new in version 2.1? DECEMBER 09 NETOP ONDEMAND1.
Nicola Ferrini IT PRO Trainer
Smart Card Deployment David Gautrey IT Manager – Microsoft New Zealaand Microsoft Corporation.
SP2 Mikael Nystrom. Agenda Översikt Installation.
©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone Endpoint Security Current portfolio and looking forward October 2010.
Course 201 – Administration, Content Inspection and SSL VPN
May 30 th – 31 st, 2006 Sheraton Ottawa. Microsoft Certificate Lifecycle Manager Saleem Kanji Technology Solutions Professional - Windows Server Microsoft.
Your storage on the ground; Your files in the cloud.
Cloud Computing All Copyrights reserved to Talal Abu-Ghazaleh Organization
Copyright © 2011 EMC Corporation. All Rights Reserved. MODULE – 6 VIRTUALIZED DATA CENTER – DESKTOP AND APPLICATION 1.
XPand your capabilities with Citrix ® MetaFrame XP ™ for Windows ®, Feature Release 2.
What is Driving the Virtual Desktop? VMware View 4: Built for Desktops VMware View 4: Deployment References…Q&A Agenda.
MCTS Guide to Microsoft Windows Server 2008 Applications Infrastructure Configuration (Exam # ) Chapter Four Windows Server 2008 Remote Desktop Services,
Name Company A Day in the Life… A Demonstration of Application Delivery.
1 Introduction to Microsoft Windows 2000 Windows 2000 Overview Windows 2000 Architecture Overview Windows 2000 Directory Services Overview Logging On to.
How to use Remote Desktop and Remote Support. What is remote desktop? Remotely control your computer from another office, from home, or while traveling.
One Platform, One Solution: eToken TMS 5.1 Customer Presentation November 2009.
Copyright © cs-tutorial.com. Overview Introduction Architecture Implementation Evaluation.
DaaS (Desktop as a Service) Last Update: July 15 th, 2015.
Introduction TO Network Administration
Lesson 18: Configuring Security for Mobile Devices MOAC : Configuring Windows 8.1.
Active Directory. Computers in organizations Computers are linked together for communication and sharing of resources There is always a need to administer.
VPN. CONFIDENTIAL Agenda Introduction Types of VPN What are VPN Tokens Types of VPN Tokens RSA How tokens Work How does a user login to VPN using VPN.
©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. Securing Your Data in Endpoint and Mobile Environments Frank Suijten Security.
© ExplorNet’s Centers for Quality Teaching and Learning 1 Explain the purpose of Microsoft virtualization. Objective Course Weight 2%
Tomaž Čebul Principal Consultant Microsoft Bring Your Own Device, kaj pa je to?
Introducing Windows Vista Lesson 1. Skills Matrix Technology SkillObjective DomainObjective # Understanding Windows Vista System Requirements Identify.
A Quick Tour of Ceedo Deliver environments to un-managed PCs.
Clouding with Microsoft Azure
Barracuda SSL VPN Remote, Authenticated Access to Applications and Data Version 2.6 | July 2014.
A Quick Tour of Ceedo Safe Browsing and Remote Access Protection.
Unit 3 Virtualization.
Secure Connected Infrastructure
Contents Software components All users in one location:
Introduction to Cloud Computing
Introduction to Computers
SVTRAININGS. SVTRAININGS Features of SCCM  Application management  Provides a set of tools and resources that can help you create, manage, deploy, and.
Unit 27: Network Operating Systems
Flexible Computing For Dynamic Desktops
CERN Certificates platform Emmanuel Ormancey / Anatoly Gladkov
Getting Started.
Getting Started.
Managing Services with VMM and App Controller
Implementing Client Security on Windows 2000 and Windows XP Level 150
Level 3 Extended Diploma Unit 13 Computer Systems Architecture
System Center Marketing
SCCM in hybrid world Predrag Jelesijević Microsoft 7/6/ :17 AM
Presentation transcript:

© 2011 All rights reserved to Ceedo. Ceedo - Flexible Computing Certificate-Based Authentication (CBA - 2FA) The organization MUST be able to positively determine users’ ID for security CBA requires Public Key Identification (PKI) hardware (USB smart card chip) and middleware Installation and Configuration Issues Citrix Installation might suffer conflicts and related issues (incompatibility, conflicting versions, etc.) If the connection runs through VPN SSL – users will require plug-ins and/or specific browser version Additional plug-ins might be required for organizational portal (.net, Java, etc.) If a self-signed certificate (server certificate) is used, users have to configure end-point’s browser Data Leakage Hard to manage where users export data to (machines/media) and how they use it A misconfigured machine might be used by unauthorized personal for accessing sensitive data

© 2011 All rights reserved to Ceedo. Ceedo - Flexible Computing Certificate-Based Authentication (CBA - 2FA) The organization MUST be able to positively determine users’ ID for security CBA requires Public Key Identification (PKI) hardware (USB smart card chip) and middleware Installation and Configuration Issues Citrix Installation might suffer conflicts and related issues (incompatibility, conflicting versions, etc.) If the connection runs through VPN SSL – users will require plug-ins and/or specific browser version Additional plug-ins might be required for organizational portal (.Net, Java, etc.) If a self-signed certificate (server certificate) is used, users have to configure end-point’s browser Data Leakage Hard to manage where users export data to (machines/media) and how they use it A misconfigured machine might be used by unauthorized personal for accessing sensitive data Tough security issues. Data compromise. High helpdesk costs. Hard to manage.

© 2011 All rights reserved to Ceedo. Ceedo - Flexible Computing Additional Software Home PCLaptop/Any PCBranch PCsContractors Self-Signed Certificate VPN SSL Add-on & URL Receiver Client 2FA Middleware Data & User Policies Citrix Farm / IT Dept. Traditional technologies demand that each component will be distributed separately to EACH end-point: 2FA Middleware Citrix Receiver Client (for both managed and unmanaged machines) VPN SSL add-on for browser Self-signed certificate Additional required plug-ins/software Unmanaged machines are handled by the end user. Novice/non-savvy users will probably require helpdesk services. 2FA Hardware End User Helpdesk What a mess…

© 2011 All rights reserved to Ceedo. Ceedo - Flexible Computing Additional Software Home PCLaptop/Any PCBranch PCsContractors Self-Signed Certificate VPN SSL Add-on & URL Receiver Client 2FA Middleware Data & User Policies Citrix Farm / IT Dept. Middleware Citrix Receiver Client (for both managed and unmanaged machines) VPN SSL add-on for browser Self-signed certificate Additional required plug-ins/software Are all mounted on one device… Centrally managed… In plug-and-play mode… On a single device for any platform at any time. 2FA Hardware End User But what if… Helpdesk This is exactly what Ceedo for Citrix is!

© 2011 All rights reserved to Ceedo. Ceedo - Flexible Computing Administrator pre-configures components, apps in a Ceedo for Citrix workspace and installs it on a flash drive or USB token. USB drives or installation package delivered to end-users (usually in a read-only partition). Users plug in devices and start working immediately! Zero-install and zero footprint - nothing is left behind after USB is unplugged. Workspaces can be managed remotely from the cloud. Solution: Pack everything into a plug-and-play platform on USB drive or 2FA device! Ceedo Workspace Receiver Client Sandboxed Browser Self-Signed Certificate VPN SSL Add-on & URL PKI Middleware Additional Software Data & User Policies Home PCLaptop/Any PCBranch PCsContractors

© 2011 All rights reserved to Ceedo. Ceedo - Flexible Computing Device architecture (varies) Flash memory on 2FA device or regular USB drive Partitioned to Read Only and Read/Write Read Only: Ceedo workspace, 2FA Middleware or software and all other applications and components. Read/Write: User Data and customizations. Management System CEM: Creates Ceedo workspaces and their policies. CPC: Creates application packages. CCMS: Assigns users and groups with devices, workspaces, edits and creates policies, aggregates usage data, and more (web-based)… Virtual Runtime Environment Acts as a surrogate OS Runs all components within a sandbox Works entirely in User Mode No admin rights or installation required Cross windows platforms

© 2011 All rights reserved to Ceedo. Ceedo - Flexible Computing Plug-and-Play zero-install Citrix Receiver on a flash memory of a 2FA device (or any USB thumb-drive). Encrypted data, sandboxed apps and enables configuring user-rights policies enforcement (access to drives, printers, etc.). Includes a built-in pre-configured browser, plug-ins and additional software. Allows for remote management of policies and component updates. Roam from PC to PC, regardless of OS version and user privileges.