We think you have liked this presentation. If you wish to download it, please recommend it to your friends in any social system. Share buttons are a little bit lower. Thank you!
Presentation is loading. Please wait.
Published byKurtis Pinckney
Modified over 6 years ago
© 2012 All rights reserved to Ceedo. Enhanced Mobility with Tighter Security
© 2012 All rights reserved to Ceedo. Security features woven into the fabric of our technology
© 2012 All rights reserved to Ceedo. Ceedo - Flexible Computing Sandbox Mode Ceedo's Virtual Runtime Environment (AKA the ‘Workspace’) is self-contained, independent and isolated from the host OS. Meaning: Complete separation of Registry and File System Inter-connectivity with the host can be configured and controlled Zero Footprint: Once unplugged nothing is left behind
© 2012 All rights reserved to Ceedo. Ceedo - Flexible Computing Device Binding Ceedo Workspaces cannot be copied from the device. Moving/duplicating workspaces can only be done using the Ceedo Enterprise Manager management console.
© 2012 All rights reserved to Ceedo. Granular management of detailed security options, remotely pushed from the cloud in light-weight policy files
© 2012 All rights reserved to Ceedo. Ceedo - Flexible Computing Data Leakage Prevention Data Containment Administrators can configure Ceedo Enterprise to block writing to drives and devices outside of the Workspace. Opaque Sandbox File explorer: Administrators can set the transparency level of the sandbox to prevent end- users from viewing any of the local drives.
© 2012 All rights reserved to Ceedo. Ceedo - Flexible Computing Network shares and drives Administrator can set the Workspace to deny access to all resources available on the network Printing Administrators can prevent Workspace applications from accessing the host’s printer Disable drag and drop Administrators can negate drag and drop options of files and data to and from Ceedo’s Workspace and its resident apps. Disable copying to clipboard Administrators can the copy-and-paste function from working when crossing data to and from the host. Data Leakage Prevention – Host Resources
© 2012 All rights reserved to Ceedo. Ceedo - Flexible Computing Anti-Virus Related Conditions Administrators can prevent the Workspace from launching if: An antivirus isn’t installed on the host If the host’s antivirus is not enabled If the host’s antivirus is not up to date Process Enforcement Administrators can prevent or allow the launch of specific processes from within the workspace Windows Version Control Administrators can prevent the Workspace from working on different Windows versions. Conditional Workspace and Process Launching
© 2012 All rights reserved to Ceedo. Using Ceedo Enterprise in conjunction with complimentary solutions and applications to enhance security
© 2012 All rights reserved to Ceedo. Ceedo - Flexible Computing Deploy Ceedo Enterprise on hardware encrypted USB Flash Drives such as: Imation, IronKey, McAfee and SafeNet Beef-up hardware level encryption with 3 rd party encryption applications such as: Encrypt the entire workspace with TrueCrypt Encrypt passwords with KeyPass Encrypt files with PrivateFile Encrypt the file system with E-Capsule Private Safe Data and Application Encryption
© 2012 All rights reserved to Ceedo. Ceedo - Flexible Computing Mount pre-configured, ready-to-run, plug-and- play PKI middleware and remote office solutions on 2FA devices’ flash memory Extend 2FA USB devices with plug-n-play pre- configured Public Key Middleware and remote office applications such as Citrix Receiver, VNC, VPN-SSL tunnels, etc. Mount pre-configured, ready-to-run, plug-and- play software based 2FA security tokens With software based 2FA solutions, such as RSA SecurID Software Token, installed into Ceedo’s Workspace, any portable storage device can turn into a 2FA device. Two Factor Authentication (2FA) Solutions
© 2012 All rights reserved to Ceedo. Ceedo - Flexible Computing Deploy plug-and-play, sand-boxed and encrypted workspaces equipped with user-rights enforcement, an independent sandboxed browser and zero- footprint security software. Deploy plug-and-play Workspaces with: Browser in kiosk-mode Secure browsing add-ons 2FA Public Key Encryption software Productivity tools User rights policies Safe Browsing Solutions
© 2012 All rights reserved to Ceedo.
This course is designed for system managers/administrators to better understand the SAAZ Desktop and Server Management components Students will learn.
Powerful and convenient management for Windows Mobile ® 6.1 devices in an enterprise environment. These features include: Centralized, over-the-air device.
© 2012 All rights reserved to Ceedo. Flexible Desktops. Dynamic Workplace. Ceedo for Call Center Call Center on a Stick Ceedo for Call Center Presentation.
© 2012 All rights reserved to Ceedo. Flexible Desktops. Dynamic Workplace. Ceedo Client Workspace Concept and Technology Overview Ceedo Client Workspace.
Working with Disks and Devices
!! Are we under attack !! Consumer devices continue to invade *Corporate enterprise – just wanting to plug in* Mobile Device Management.
© 2011 All rights reserved to Ceedo. Take Your Products and Services to the Next Level.
Microsoft ® Official Course First Look Clinic Overview of Windows 8 By Ragowo Riantory, S.Kom, MCP.
2 Industry trends and challenges Windows Server 2012: Modern workstyle, enabled Access from virtually anywhere, any device Full Windows experience.
© 2011 All rights reserved to Ceedo. Ceedo - Flexible Computing Certificate-Based Authentication (CBA - 2FA) The organization MUST be able to positively.
© 2012 All rights reserved to Ceedo. Flexible Desktops. Dynamic Workplace. Ceedo for Citrix Optimal User Experience & Maximum IT Control Ceedo for Call.
© 2012 All rights reserved to Ceedo. Flexible Desktops. Dynamic Workplace. Ceedo Client Offerings For Service Providers Ceedo Client Workspace Virtualization.
Avoid data leakage, espionage, sabotage and other reputation and business risks without losing employee performance and mobility.
Objectives Overview Define an operating system
Information Security 1 Information Security: Security Tools Jeffy Mwakalinga.
Building and Deploying Safe and Secure Android Apps for Enterprise Presented by Technology Consulting Group at Endeavour Software Technologies.
Windows 8: Windows To Go Overview Zvezdan PavkovicTanya Koval Senior ConsultantArchitect WCL333.
Understand Virtualized Clients Windows Operating System Fundamentals LESSON 2.4.
OAAIS Enterprise Information Security Security Awareness, Training & Education (SATE) Program or UCSF Campus VPN.
Script Kiddies; CybercrimeCyber-espionage; Cyber-warfare CybercriminalsState sponsored actions; Unlimited resources Attacks on fortune 500All sectors.
© 2021 SlidePlayer.com Inc. All rights reserved.