© 2012 All rights reserved to Ceedo. Flexible Desktops. Dynamic Workplace. Ceedo Client Workspace Concept and Technology Overview Ceedo Client Workspace.

Slides:



Advertisements
Similar presentations
Powerful and convenient management for Windows Mobile ® 6.1 devices in an enterprise environment. These features include: Centralized, over-the-air device.
Advertisements

© 2012 All rights reserved to Ceedo. Flexible Desktops. Dynamic Workplace. Ceedo for Call Center Call Center on a Stick Ceedo for Call Center Presentation.
©2013 Check Point Software Technologies Ltd. | [Unrestricted] For everyone Best Practices to Secure the Mobile Enterprise Macy Torrey
Working with Disks and Devices
CeedoDesktop Advanced Layering for VDI. Cloud Computing Virtualization Solutions VDI New computing concepts and advanced technologies are making the impossible.
!! Are we under attack !! Consumer devices continue to invade *Corporate enterprise – just wanting to plug in* Mobile Device Management.
Copyright © 2012 AirWatch, LLC. All rights reserved. Proprietary & Confidential. Mobile Content Strategies and Deployment Best Practices.
© 2011 All rights reserved to Ceedo. Take Your Products and Services to the Next Level.
2  Industry trends and challenges  Windows Server 2012: Modern workstyle, enabled  Access from virtually anywhere, any device  Full Windows experience.
© 2011 All rights reserved to Ceedo. Ceedo - Flexible Computing Certificate-Based Authentication (CBA - 2FA) The organization MUST be able to positively.
© 2012 All rights reserved to Ceedo. Enhanced Mobility with Tighter Security.
© 2012 All rights reserved to Ceedo. Flexible Desktops. Dynamic Workplace. Ceedo for Citrix Optimal User Experience & Maximum IT Control Ceedo for Call.
© 2012 All rights reserved to Ceedo. Flexible Desktops. Dynamic Workplace. Ceedo Client Offerings For Service Providers Ceedo Client Workspace Virtualization.
 What Is Desktop Virtualization?  How Does Application Virtualization Help?  How does V3 Systems help?  Getting Started AGENDA.
Avaya – Proprietary. Use pursuant to the terms of your signed agreement or Company policy. idEngines® Avaya Identity Engines And Mobile Device Management.
The future of Desktops Transform Your Desktop with Virtualization.
An Approach to Secure Cloud Computing Architectures By Y. Serge Joseph FAU security Group February 24th, 2011.
Windows 8: Windows To Go Overview Zvezdan PavkovicTanya Koval Senior ConsultantArchitect WCL333.
Understand Virtualized Clients Windows Operating System Fundamentals LESSON 2.4.
Transform your desktop with virtualization. 22 Agenda Evolution of VDI VDI Solution VDI Use Cases Questions & Answers.
-How To leverage Virtual Desktop for Manageability & Security -Desktop Computing “as a service” Andreas Tsangaris CTO, PERFORMANCE
Desktop Virtualisation Sarah Mannion Desktop Technical Specialist Microsoft UK
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
Remote Networking Architectures
Barracuda Networks Steve Scheidegger Commercial Account Manager
©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone Endpoint Security Current portfolio and looking forward October 2010.
© 2005,2006 NeoAccel Inc. Training Access Modes. © 2005,2006 NeoAccel Inc. Agenda 2. Access Terminals 6. Quick Access Terminal Client 3. SSL VPN-Plus.
Week #10 Objectives: Remote Access and Mobile Computing Configure Mobile Computer and Device Settings Configure Remote Desktop and Remote Assistance for.
Mobility Without Vulnerability: Secure and Enable Your Mobile Users, Apps, and Devices David Clapp – Intuitive.
Course 201 – Administration, Content Inspection and SSL VPN
Real Security for Server Virtualization Rajiv Motwani 2 nd October 2010.
1 Managed Security. 2 Managed Security provides a comprehensive suite of security services to manage and protect your network assets –Managed Firewall.
Chapter 2 Information Security Overview The Executive Guide to Information Security manual.
Osama Shahid ( ) Vishal ( ) BSCS-5B
RSA Security Validating Users and Devices to Protect Network Assets Endpoint Solutions for Cisco Environments.
Introduction to the Virtual Desktop Pilot at Fermilab.
PROJECT PAPER ON BLUEFIRE MOBILE SECURITY. BY PONNURU VENKATA DINESH KUMAR STUDENT ID # A0815 PROFESSOR – VICKY HSU CS-426.
Week #7 Objectives: Secure Windows 7 Desktop
Successful Deployment and Solid Management … Close Relatives Tim Sinclair, General Manager, Windows Enterprise Management.
© 2012 The McGraw-Hill Companies, Inc. All rights reserved. 1 Third Edition Chapter 5 Windows XP Professional McGraw-Hill.
Copyright © 2011 EMC Corporation. All Rights Reserved. MODULE – 6 VIRTUALIZED DATA CENTER – DESKTOP AND APPLICATION 1.
Module 8 Configuring Mobile Computing and Remote Access in Windows® 7.
What is Driving the Virtual Desktop? VMware View 4: Built for Desktops VMware View 4: Deployment References…Q&A Agenda.
©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone Network Access Technology: Secure Remote Access S Prasanna Bhaskaran.
Safeguarding OECD Information Assets Frédéric CHALLAL Head, Systems Engineering Team OECD.
1 Introduction to Microsoft Windows 2000 Windows 2000 Overview Windows 2000 Architecture Overview Windows 2000 Directory Services Overview Logging On to.
One Platform, One Solution: eToken TMS 5.1 Customer Presentation November 2009.
Module 15 Managing Windows Server® 2008 Backup and Restore.
V-Alliance Solution Overview Years of Business Success.
Citrix Secure Gateway v1.1 Customer Presentation Aug 2002 Customer Presentation Aug 2002.
About Softex Mission Statement: “To provide innovative security software products and solutions for computing devices” Softex was founded in 1992 by IBM.
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
Windows for the Enterprise Boris Ulík Technology Solutions Professional Microsoft Slovakia.
VPN. CONFIDENTIAL Agenda Introduction Types of VPN What are VPN Tokens Types of VPN Tokens RSA How tokens Work How does a user login to VPN using VPN.
©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. Securing Your Data in Endpoint and Mobile Environments Frank Suijten Security.
Computer Security Sample security policy Dr Alexei Vernitski.
Moving Small Business Server into the Future. STANDARD Workload Optimized DATACENTER Virtualization Optimized Virtualization SKUs ESSENTIALS Small Business,
A Quick Tour of Ceedo Deliver environments to un-managed PCs.
Clouding with Microsoft Azure
A Quick Tour of Ceedo Safe Browsing and Remote Access Protection.
Chapter 6: Securing the Cloud
BEST CLOUD COMPUTING PLATFORM Skype : mukesh.k.bansal.
Next-Generation Desktop Strategy Windows Optimised Desktop
Flexible Computing For Dynamic Desktops
Check Point Connectra NGX R60
Licensing Windows for Virtrual Desktops
Implementing Client Security on Windows 2000 and Windows XP Level 150
Productive + Hybrid + Intelligent + Trusted
IT Management, Simplified
IT Management, Simplified
Presentation transcript:

© 2012 All rights reserved to Ceedo. Flexible Desktops. Dynamic Workplace. Ceedo Client Workspace Concept and Technology Overview Ceedo Client Workspace Virtualization Technology About Ceedo The Ceedo Client Concept The Workspace Ceedo Enterprise overview and use cases Security overview

© 2012 All rights reserved to Ceedo. Flexible Desktops. Dynamic Workplace. We are a privately held company, established in 2005 We specialize in developing IT solutions, aimed at the toughest issues confronting modern IT Our products are based on our proprietary run-time virtualization technology – Workspace Virtualization

© 2012 All rights reserved to Ceedo. Flexible Desktops. Dynamic Workplace. Our products have been shipped to over 4,000,000 users worldwide (consumer and businesses alike)

© 2012 All rights reserved to Ceedo. Managed Workspaces for Productivity and Security Beyond the Organization

© 2012 All rights reserved to Ceedo. Flexible Desktops. Dynamic Workplace. Zero-install portable computing environment that can run Windows applications in plug-n- play mode on any PC, and with central management…

© 2012 All rights reserved to Ceedo. Flexible Desktops. Dynamic Workplace. Supports any type of portable device including: Encrypted USB Drives

© 2012 All rights reserved to Ceedo. Flexible Desktops. Dynamic Workplace. Supports any type of portable device including: Two-Factor Authentication Devices

© 2012 All rights reserved to Ceedo. Flexible Desktops. Dynamic Workplace. Supports any type of portable device including: Locally installed, and more...

© 2012 All rights reserved to Ceedo. Flexible Desktops. Dynamic Workplace. Mount Applications on Portable Devices

© 2012 All rights reserved to Ceedo. Flexible Desktops. Dynamic Workplace. Mount Applications on Portable Devices Workspaces Regular installation into workspace Workspace deployed on portable device

© 2012 All rights reserved to Ceedo. Flexible Desktops. Dynamic Workplace. Let users work from anywhere

© 2012 All rights reserved to Ceedo. Flexible Desktops. Dynamic Workplace. Manage Apps/Workspaces Remotely

© 2012 All rights reserved to Ceedo. Workspace Virtualization

© 2012 All rights reserved to Ceedo. Flexible Desktops. Dynamic Workplace. Most virtualization technologies focus on separating specific layers or components of the stack. Virtualize Applications Each app is packaged separately Lots of configuration and packaging overhead Problems for apps to inter-communicate Management requires installed agent

© 2012 All rights reserved to Ceedo. Flexible Desktops. Dynamic Workplace. Most virtualization technologies focus on separating specific layers or components of the stack. Virtualize ApplicationsVirtualize Users But the user is this…

© 2012 All rights reserved to Ceedo. Flexible Desktops. Dynamic Workplace. Most virtualization technologies focus on separating specific layers or components of the stack. Virtualize DesktopsVirtualize ApplicationsVirtualize Users Heavy Extra Licenses

© 2012 All rights reserved to Ceedo. Flexible Desktops. Dynamic Workplace. We focus on converging these layers and treating them as a single block…

© 2012 All rights reserved to Ceedo. Flexible Desktops. Dynamic Workplace. Provides the environment with OS-like resources (not VM): apps are installed normally (no special packaging needed) and inter-communicate freely. Can provide varying degrees of transparency to the host (resource access, processes, etc.). Cross-windows compatibility (Windows 2000 and above). Does not effect or pollute the hosts OS (including user-installed apps) Can be fitted for plug-n-play mode on USB drives, streamed at file level from the cloud, or installed locally. Self-contained Sandboxed Compatible Unobtrusive Versatile

© 2012 All rights reserved to Ceedo. Implementations, Features and Benefits Ceedo Client family Unmanaged Desktops / USB on a Stick

© 2012 All rights reserved to Ceedo. Flexible Desktops. Dynamic Workplace. Ceedo Enterprise Workspaces are deployed to portable devices with central management allowing administrators to manage corporate applications on un-managed PCs. Used as lap-top replacement (PC on a Stick) Or for special needs: Ceedo for Citrix Ceedo for Avaya Secure browsing/remote connections… Ceedo Personal Workspaces are embedded on portable devices for consumers as PC on a Stick. OEMs, manufacturers and suppliers + Ceedos online shop. Applications Policies Ceedo management tools Main mission: Dealing with portability, home PCs, and allows for managing applications on unmanaged machines beyond the organizations boundary. Or as OEM supplement for portable device…

© 2012 All rights reserved to Ceedo. Flexible Desktops. Dynamic Workplace. A centrally managed Workspace that can be mounted on portable devices or installed locally. Prepared by simply installing apps into the workspace and freezing it. Admin can control host workspace relations Block access to drives, printers, removable drives, etc. Prevent from running on PCs without anti-virus. Prevent specific processes from running. And more… User can run without admin rights in a plug-and- play fashion. Zero footprint + Full sandbox

© 2012 All rights reserved to Ceedo. Flexible Desktops. Dynamic Workplace. Laptop replacement / roaming users / home office enabler Allow contactors to use corporate applications Disaster recovery / backup system during critical infrastructure failure Used for pin-point solutions with specific components Ceedo for Citrix: Mount Citrix Receiver, a sandboxed browser, VPN-SSL and PKI middleware - on Two-Factor Authentication devices or Encrypted drives. Ceedo for Call Center: VoIP, messaging, VPN SSL, etc. for call center employees. Ceedo for Safe Browsing: A sandboxes browser pre-configured with self-certificates and made to run a specific URL, with VPN SSL, fully sandboxed, etc. And: deploy applications to end-points… Plug-and-Play Centrally Managed Online/OfflineSecure

© 2012 All rights reserved to Ceedo. Mitigating Risks and Elevating Security

© 2012 All rights reserved to Ceedo. Flexible Desktops. Dynamic Workplace. Use hardware with encryption and active anti-malware scan Add soft Two Factor Authentication (or deploy on physical 2FA hardware devices) Whitelist processes that are allowed to run in Ceedo (+MD5 signatures) Turn-on Ceedos antivirus detection and OS patch level. Use a VPN-SSL solution with strong Access Control benchmark settings Use an independent browser rather than the virtualized mapped IE Add to the internal browser safe browsing add-ons and configurations Configure Ceedo Enterprise to block writing to host drives, printers, etc. Leave the data in the datacenter or use Citrixs ShareFile / similar solution Employ 3 rd party anti-malware, security applications, soft-biometric apps, etc. * In 2FA devices - Mount components on read-only partition

© 2012 All rights reserved to Ceedo. Flexible Desktops. Dynamic Workplace. User plugs in device Encrypted drive password check Encrypted drive runs antivirus scan Drive is decrypted Ceedo checks host antivirus, firewall, network connection, etc. Ceedo checks processes MD5 signature (continuous throughout session) Ceedo enforces host recourse accessibility and Ceedo updates Ceedo sandbox fires-up with independent runtime environment Second antivirus and/or antimalware scan Two Factor Authentication software/middleware VPN SSL (can include second access control check, such as Juniper SSL) External solutions security (such as Citrixs own security features)

© 2012 All rights reserved to Ceedo. Flexible Desktops. Dynamic Workplace. Device Binding Workspaces licenses are device-bound and cannot work if copied to unauthorized devices + most cases of copying a workspace will break it.

© 2012 All rights reserved to Ceedo. Flexible Desktops. Dynamic Workplace. Mount pre-configured, ready-to-run, plug-and- play PKI middleware and remote connection solutions on 2FA devices flash memory HARDWARE Extend 2FA USB devices with plug-n-play pre-configured Public Key Middleware and remote office applications such as Citrix Receiver, VNC, VPN-SSL tunnels, etc. Mount pre-configured, ready-to-run, plug-and- play 2FA security SOFTWARE tokens With software based 2FA solutions, such as RSA SecurID Software Token, installed into Ceedos Workspace, any portable storage device can turn into a 2FA device.

© 2012 All rights reserved to Ceedo.