Upload
kurtis-pinckney
View
217
Download
1
Tags:
Embed Size (px)
Citation preview
© 2012 All rights reserved to Ceedo.
Ceedo Enterprise Security Features
Enhanced Mobility with Tighter Security
© 2012 All rights reserved to Ceedo.
Security Features Built Into the SystemSecurity features woven into the fabric of our technology
© 2012 All rights reserved to Ceedo.
Ceedo - Flexible Computing
Components: End-User’s Workspace
Sandbox ModeCeedo's Virtual Runtime Environment (AKA the ‘Workspace’) is self-contained, independent and isolated from the host OS.
Meaning:• Complete separation of Registry and File System• Inter-connectivity with the host can be configured and controlled• Zero Footprint: Once unplugged nothing is left behind
Host Apps
ApplicationsCustomizations
User Data
ApplicationsCustomizations
User Data
Virtual Runtime
Environment
© 2012 All rights reserved to Ceedo.
Ceedo - Flexible Computing
Components: End-User’s Workspace
Device BindingCeedo Workspaces cannot be copied from the device. Moving/duplicating workspaces can only be done using the Ceedo Enterprise Manager management console.
Ceedo
© 2012 All rights reserved to Ceedo.
Configurable Security OptionsGranular management of detailed security options,
remotely pushed from the cloud in light-weight policy files
Ceedo Policy File
© 2012 All rights reserved to Ceedo.
Ceedo - Flexible Computing
Configurable Security Options
Data Leakage Prevention
Ceedo Policy File
Data ContainmentAdministrators can configure Ceedo Enterprise to block writing to drives and devices outside of the Workspace.
Opaque SandboxFile explorer: Administrators can set the transparency level of the sandbox to prevent end-users from viewing any of the local drives.
© 2012 All rights reserved to Ceedo.
Ceedo - Flexible Computing
Configurable Security Options
Network shares and drivesAdministrator can set the Workspace to deny access to all resources available on the network
PrintingAdministrators can prevent Workspace applications from accessing the host’s printer
Disable drag and dropAdministrators can negate drag and drop options of files and data to and from Ceedo’s Workspace and its resident apps.
Disable copying to clipboardAdministrators can the copy-and-paste function from working when crossing data to and from the host.
Data Leakage Prevention – Host Resources
© 2012 All rights reserved to Ceedo.
Ceedo - Flexible Computing
Configurable Security Options
Anti-Virus Related ConditionsAdministrators can prevent the Workspace from launching if:• An antivirus isn’t installed on the host• If the host’s antivirus is not enabled• If the host’s antivirus is not up to date
Process EnforcementAdministrators can prevent or allow the launch of specific processes from within the workspace
Windows Version ControlAdministrators can prevent the Workspace from working on different Windows versions.
Conditional Workspace and Process Launching
© 2012 All rights reserved to Ceedo.
Security Solutions Using CeedoUsing Ceedo Enterprise in conjunction with complimentary
solutions and applications to enhance security
CitrixReceiver
PKIMiddleware
ConfiguredBrowser
VPN SSLAdd-on
Data & UserPolicies
© 2012 All rights reserved to Ceedo.
Ceedo - Flexible Computing
Security Enhancement with Ceedo Enterprise
Deploy Ceedo Enterprise on hardware encrypted USB Flash Drives such as: Imation, IronKey, McAfee and SafeNet
Beef-up hardware level encryption with 3rd party encryption applications such as:• Encrypt the entire workspace with TrueCrypt• Encrypt passwords with KeyPass• Encrypt files with PrivateFile • Encrypt the file system with E-Capsule Private Safe
Data and Application Encryption
© 2012 All rights reserved to Ceedo.
Ceedo - Flexible Computing
Security Enhancement with Ceedo Enterprise
Mount pre-configured, ready-to-run, plug-and-play PKI middleware and remote office solutions on 2FA devices’ flash memoryExtend 2FA USB devices with plug-n-play pre-configured Public Key Middleware and remote office applications such as Citrix Receiver, VNC, VPN-SSL tunnels, etc.
Mount pre-configured, ready-to-run, plug-and-play software based 2FA security tokensWith software based 2FA solutions, such as RSA SecurID Software Token, installed into Ceedo’s Workspace, any portable storage device can turn into a 2FA device.
Two Factor Authentication (2FA) Solutions
USB Flash
CitrixReceiver
PKIMiddleware
ConfiguredBrowser
VPN SSLAdd-on
Data & UserPolicies
2FADevice
© 2012 All rights reserved to Ceedo.
Ceedo - Flexible Computing
Deploy plug-and-play, sand-boxed and encrypted workspaces equipped with user-rights enforcement, an independent sandboxed browser and zero-footprint security software.
Deploy plug-and-play Workspaces with:• Browser in kiosk-mode• Secure browsing add-ons • 2FA Public Key• Encryption software• Productivity tools• User rights policies
Security Enhancement with Ceedo Enterprise
Safe Browsing Solutions
ApplicationsCustomizations
User DataUser-Rights Policies
Sandboxed Workspace
Read/WriteRead Only
Kiosk-ModeBrowser
VPN SSLAdd-on
Public KeySoftware
EncryptionSoftware
AdditionalSoftware
Data & UserPolicies
© 2012 All rights reserved to Ceedo.
Thank You.