© 2012 all rights reserved to ceedo. enhanced mobility with tighter security

13
12 All rights reserved to Ceedo. Ceedo Enterprise Security Features Enhanced Mobility with Tighter Security

Upload: kurtis-pinckney

Post on 01-Apr-2015

217 views

Category:

Documents


1 download

TRANSCRIPT

Page 1: © 2012 All rights reserved to Ceedo. Enhanced Mobility with Tighter Security

© 2012 All rights reserved to Ceedo.

Ceedo Enterprise Security Features

Enhanced Mobility with Tighter Security

Page 2: © 2012 All rights reserved to Ceedo. Enhanced Mobility with Tighter Security

© 2012 All rights reserved to Ceedo.

Security Features Built Into the SystemSecurity features woven into the fabric of our technology

Page 3: © 2012 All rights reserved to Ceedo. Enhanced Mobility with Tighter Security

© 2012 All rights reserved to Ceedo.

Ceedo - Flexible Computing

Components: End-User’s Workspace

Sandbox ModeCeedo's Virtual Runtime Environment (AKA the ‘Workspace’) is self-contained, independent and isolated from the host OS.

Meaning:• Complete separation of Registry and File System• Inter-connectivity with the host can be configured and controlled• Zero Footprint: Once unplugged nothing is left behind

Host Apps

ApplicationsCustomizations

User Data

ApplicationsCustomizations

User Data

Virtual Runtime

Environment

Page 4: © 2012 All rights reserved to Ceedo. Enhanced Mobility with Tighter Security

© 2012 All rights reserved to Ceedo.

Ceedo - Flexible Computing

Components: End-User’s Workspace

Device BindingCeedo Workspaces cannot be copied from the device. Moving/duplicating workspaces can only be done using the Ceedo Enterprise Manager management console.

Ceedo

Page 5: © 2012 All rights reserved to Ceedo. Enhanced Mobility with Tighter Security

© 2012 All rights reserved to Ceedo.

Configurable Security OptionsGranular management of detailed security options,

remotely pushed from the cloud in light-weight policy files

Ceedo Policy File

Page 6: © 2012 All rights reserved to Ceedo. Enhanced Mobility with Tighter Security

© 2012 All rights reserved to Ceedo.

Ceedo - Flexible Computing

Configurable Security Options

Data Leakage Prevention

Ceedo Policy File

Data ContainmentAdministrators can configure Ceedo Enterprise to block writing to drives and devices outside of the Workspace.

Opaque SandboxFile explorer: Administrators can set the transparency level of the sandbox to prevent end-users from viewing any of the local drives.

Page 7: © 2012 All rights reserved to Ceedo. Enhanced Mobility with Tighter Security

© 2012 All rights reserved to Ceedo.

Ceedo - Flexible Computing

Configurable Security Options

Network shares and drivesAdministrator can set the Workspace to deny access to all resources available on the network

PrintingAdministrators can prevent Workspace applications from accessing the host’s printer

Disable drag and dropAdministrators can negate drag and drop options of files and data to and from Ceedo’s Workspace and its resident apps.

Disable copying to clipboardAdministrators can the copy-and-paste function from working when crossing data to and from the host.

Data Leakage Prevention – Host Resources

Page 8: © 2012 All rights reserved to Ceedo. Enhanced Mobility with Tighter Security

© 2012 All rights reserved to Ceedo.

Ceedo - Flexible Computing

Configurable Security Options

Anti-Virus Related ConditionsAdministrators can prevent the Workspace from launching if:• An antivirus isn’t installed on the host• If the host’s antivirus is not enabled• If the host’s antivirus is not up to date

Process EnforcementAdministrators can prevent or allow the launch of specific processes from within the workspace

Windows Version ControlAdministrators can prevent the Workspace from working on different Windows versions.

Conditional Workspace and Process Launching

Page 9: © 2012 All rights reserved to Ceedo. Enhanced Mobility with Tighter Security

© 2012 All rights reserved to Ceedo.

Security Solutions Using CeedoUsing Ceedo Enterprise in conjunction with complimentary

solutions and applications to enhance security

CitrixReceiver

PKIMiddleware

ConfiguredBrowser

VPN SSLAdd-on

Data & UserPolicies

Page 10: © 2012 All rights reserved to Ceedo. Enhanced Mobility with Tighter Security

© 2012 All rights reserved to Ceedo.

Ceedo - Flexible Computing

Security Enhancement with Ceedo Enterprise

Deploy Ceedo Enterprise on hardware encrypted USB Flash Drives such as: Imation, IronKey, McAfee and SafeNet

Beef-up hardware level encryption with 3rd party encryption applications such as:• Encrypt the entire workspace with TrueCrypt• Encrypt passwords with KeyPass• Encrypt files with PrivateFile • Encrypt the file system with E-Capsule Private Safe

Data and Application Encryption

Page 11: © 2012 All rights reserved to Ceedo. Enhanced Mobility with Tighter Security

© 2012 All rights reserved to Ceedo.

Ceedo - Flexible Computing

Security Enhancement with Ceedo Enterprise

Mount pre-configured, ready-to-run, plug-and-play PKI middleware and remote office solutions on 2FA devices’ flash memoryExtend 2FA USB devices with plug-n-play pre-configured Public Key Middleware and remote office applications such as Citrix Receiver, VNC, VPN-SSL tunnels, etc.

Mount pre-configured, ready-to-run, plug-and-play software based 2FA security tokensWith software based 2FA solutions, such as RSA SecurID Software Token, installed into Ceedo’s Workspace, any portable storage device can turn into a 2FA device.

Two Factor Authentication (2FA) Solutions

USB Flash

CitrixReceiver

PKIMiddleware

ConfiguredBrowser

VPN SSLAdd-on

Data & UserPolicies

2FADevice

Page 12: © 2012 All rights reserved to Ceedo. Enhanced Mobility with Tighter Security

© 2012 All rights reserved to Ceedo.

Ceedo - Flexible Computing

Deploy plug-and-play, sand-boxed and encrypted workspaces equipped with user-rights enforcement, an independent sandboxed browser and zero-footprint security software.

Deploy plug-and-play Workspaces with:• Browser in kiosk-mode• Secure browsing add-ons • 2FA Public Key• Encryption software• Productivity tools• User rights policies

Security Enhancement with Ceedo Enterprise

Safe Browsing Solutions

ApplicationsCustomizations

User DataUser-Rights Policies

Sandboxed Workspace

Read/WriteRead Only

Kiosk-ModeBrowser

VPN SSLAdd-on

Public KeySoftware

EncryptionSoftware

AdditionalSoftware

Data & UserPolicies

Page 13: © 2012 All rights reserved to Ceedo. Enhanced Mobility with Tighter Security

© 2012 All rights reserved to Ceedo.

Thank You.