© 2012 All rights reserved to Ceedo. Flexible Desktops. Dynamic Workplace. Ceedo for Citrix Optimal User Experience & Maximum IT Control Ceedo for Call.

Slides:



Advertisements
Similar presentations
SETTING THE SCENE…… Video talking about desktop and problems companies have HP Confidential 25 March 2017.
Advertisements

Powerful and convenient management for Windows Mobile ® 6.1 devices in an enterprise environment. These features include: Centralized, over-the-air device.
© 2012 All rights reserved to Ceedo. Flexible Desktops. Dynamic Workplace. Ceedo for Call Center Call Center on a Stick Ceedo for Call Center Presentation.
©2010 Check Point Software Technologies Ltd. | [Restricted] ONLY for designated groups and individuals Visions for 2010 Anna Russell & Andy Clark.
©2013 Check Point Software Technologies Ltd. | [Unrestricted] For everyone Best Practices to Secure the Mobile Enterprise Macy Torrey
© 2012 All rights reserved to Ceedo. Flexible Desktops. Dynamic Workplace. Ceedo Client Workspace Concept and Technology Overview Ceedo Client Workspace.
!! Are we under attack !! Consumer devices continue to invade *Corporate enterprise – just wanting to plug in* Mobile Device Management.
© 2011 All rights reserved to Ceedo. Take Your Products and Services to the Next Level.
Identify risks with mobile devices: Portable data storage Wireless connections 3 rd party applications Data integrity Data availability 2.
2  Industry trends and challenges  Windows Server 2012: Modern workstyle, enabled  Access from virtually anywhere, any device  Full Windows experience.
© 2011 All rights reserved to Ceedo. Ceedo - Flexible Computing Certificate-Based Authentication (CBA - 2FA) The organization MUST be able to positively.
© 2012 All rights reserved to Ceedo. Enhanced Mobility with Tighter Security.
© 2012 All rights reserved to Ceedo. Flexible Desktops. Dynamic Workplace. Ceedo Client Offerings For Service Providers Ceedo Client Workspace Virtualization.
 What Is Desktop Virtualization?  How Does Application Virtualization Help?  How does V3 Systems help?  Getting Started AGENDA.
The future of Desktops Transform Your Desktop with Virtualization.
Building and Deploying Safe and Secure Android Apps for Enterprise Presented by Technology Consulting Group at Endeavour Software Technologies.
Windows 8: Windows To Go Overview Zvezdan PavkovicTanya Koval Senior ConsultantArchitect WCL333.
Understand Virtualized Clients Windows Operating System Fundamentals LESSON 2.4.
Securing Remote Network Access FirePass ®. Business Case VirginiaCORIS is an initiative to modernize the way that offender information is managed, to.
Transform your desktop with virtualization. 22 Agenda Evolution of VDI VDI Solution VDI Use Cases Questions & Answers.
-How To leverage Virtual Desktop for Manageability & Security -Desktop Computing “as a service” Andreas Tsangaris CTO, PERFORMANCE
Data Encryption Overview South Seas Corporation Jared Owensby.
March 2010 Zero Client Maximum Savings, Maximum Flexibility Copyright 2010 FUJITSU TECHNOLOGY SOLUTIONS.
1Copyright 2011 FUJITSU Zero Clients Maximum Savings, Maximum Flexibility.
The Evolution of the Kaspersky Lab Approach to Corporate Security Petr Merkulov, Chief Product Officer, Kaspersky Lab Kaspersky Lab Cyber Conference, Cancun,
SP2 Mikael Nystrom. Agenda Översikt Installation.
Page Copyright Giritech A/S an – Excitor company.
©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone Endpoint Security Current portfolio and looking forward October 2010.
Week #10 Objectives: Remote Access and Mobile Computing Configure Mobile Computer and Device Settings Configure Remote Desktop and Remote Assistance for.
Mobility Without Vulnerability: Secure and Enable Your Mobile Users, Apps, and Devices David Clapp – Intuitive.
Course 201 – Administration, Content Inspection and SSL VPN
Real Security for Server Virtualization Rajiv Motwani 2 nd October 2010.
Chapter 2 Information Security Overview The Executive Guide to Information Security manual.
Market Trends Enterprise Web Applications Cloud Computing SaaS Applications BYOD Data Compliance Regulations 30 Second Elevator Pitch Web browsers have.
RSA Security Validating Users and Devices to Protect Network Assets Endpoint Solutions for Cisco Environments.
Introduction to the Virtual Desktop Pilot at Fermilab.
Virtual Desktops and Flex CSU-Pueblo Joseph Campbell.
Introducing Quick Heal Endpoint Security 5.2. “Quick Heal Endpoint Security 5.2 is designed to provide simple, intuitive centralized management and control.
1 FirePass 6.0 Sales Training. 2 Agenda FirePass 6.0 Release Highlights Packaging & Pricing Product Availability Q&A.
PROJECT PAPER ON BLUEFIRE MOBILE SECURITY. BY PONNURU VENKATA DINESH KUMAR STUDENT ID # A0815 PROFESSOR – VICKY HSU CS-426.
Copyright © 2011 EMC Corporation. All Rights Reserved. MODULE – 6 VIRTUALIZED DATA CENTER – DESKTOP AND APPLICATION 1.
Module 8 Configuring Mobile Computing and Remote Access in Windows® 7.
What is Driving the Virtual Desktop? VMware View 4: Built for Desktops VMware View 4: Deployment References…Q&A Agenda.
©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone Network Access Technology: Secure Remote Access S Prasanna Bhaskaran.
Security Infrastructure Overview - VPN Suresh Ramasamy.
1 Introduction to Microsoft Windows 2000 Windows 2000 Overview Windows 2000 Architecture Overview Windows 2000 Directory Services Overview Logging On to.
One Platform, One Solution: eToken TMS 5.1 Customer Presentation November 2009.
V-Alliance Solution Overview Years of Business Success.
WSV Problem Background 3. Accelerated Protocols and Workloads 4. Deployment and Management 2. BranchCache Solution Modes 5. BranchCache Protocols.
VMware View 4 Built for Desktops. Copyright © 2009 VMware Inc. All rights reserved. Confidential and proprietary. AGENDA  The Desktop Revolution is Here.
Citrix Secure Gateway v1.1 Customer Presentation Aug 2002 Customer Presentation Aug 2002.
Adam Hall Technology Strategist Gavin Bennett Systems Engineer – Citrix NZ Session Code: SVR309.
Microsoft Virtual Academy Preparing for the Windows 8.1 MCSA Module 5: Managing Devices & Resource Access.
Desktop Virtualization —An Elegant Solution Presented by Cloud Computing. Endless Possibilities. August 10, 2012.
IS3220 Information Technology Infrastructure Security
©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. Securing Your Data in Endpoint and Mobile Environments Frank Suijten Security.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
Information Systems Design and Development Security Precautions Computing Science.
Get2Modern A plan for Windows XP & Office 2003 EOS migration in SMB Microsoft Confidential. NDA required.
A Quick Tour of Ceedo Deliver environments to un-managed PCs.
A Quick Tour of Ceedo Safe Browsing and Remote Access Protection.
Contents Software components All users in one location:
Unified Management Agent (UMA)
Self-service enrollment for Windows desktops
Forefront Security ISA
Flexible Computing For Dynamic Desktops
Check Point Connectra NGX R60
Implementing Client Security on Windows 2000 and Windows XP Level 150
IT Management, Simplified
IT Management, Simplified
Presentation transcript:

© 2012 All rights reserved to Ceedo. Flexible Desktops. Dynamic Workplace. Ceedo for Citrix Optimal User Experience & Maximum IT Control Ceedo for Call Center Presentation The Problem Ceedo for Citrix quick overview Ceedo for Citrix security measures

© 2012 All rights reserved to Ceedo. Flexible Desktops. Dynamic Workplace. End-users are required to install all the components that make up your remote connection infrastructure on there own. Including: Citrix Receiver VPN SSL Two Factor Authentication Browser configuration etc. Novice end-users may result in high helpdesk costs Unmanaged PCs pose potential security risks Managing the remote PCs is virtually impossible as they are beyond the IT’s reach

© 2012 All rights reserved to Ceedo. Flexible Desktops. Dynamic Workplace. Plug-and-Play Citrix Receiver with Beefed-Up Security Mount all the applications that make up your remote Citrix solution on a centrally managed workspace that can be fitted on 2FA and Encrypted USB devices (and even turn encrypted devices into 2FA devices…) Citrix Receiver client 2FA Soft-token or device middleware Secure Browser (with add-ons) Antimalware scanners, AC, etc. Additional Apps (and add-ons) User rights and policies VPN SSL and related add-ons

© 2012 All rights reserved to Ceedo. Flexible Desktops. Dynamic Workplace. Plug-and-Play Centrally Managed Online/Offline Zero Footprint / Sandbox

© 2012 All rights reserved to Ceedo. Mitigating Risks and Elevating Security

© 2012 All rights reserved to Ceedo. Flexible Desktops. Dynamic Workplace. Use hardware with encryption and active anti-malware scan Add soft Two Factor Authentication (or deploy on physical 2FA hardware devices) Whitelist processes that are allowed to run in Ceedo (+MD5 signatures) Turn-on Ceedo’s antivirus detection and OS patch level. Use a VPN-SSL solution with strong Access Control benchmark settings Use an independent browser rather than the virtualized “mapped” IE Add to the internal browser safe browsing add-ons and configurations Configure Ceedo Enterprise to block writing to host drives, printers, etc. Leave the data in the datacenter or use Citrix’s ShareFile / similar solution Employ 3 rd party anti-malware, security applications, soft-biometric apps, etc. * In 2FA devices - Mount components on read-only partition

© 2012 All rights reserved to Ceedo. Flexible Desktops. Dynamic Workplace. User plugs in device Encrypted drive password check Encrypted drive runs antivirus scan Drive is decrypted Ceedo checks host antivirus, firewall, network connection, etc. Ceedo checks processes MD5 signature (continuous throughout session) Ceedo enforces host recourse accessibility and Ceedo updates Ceedo sandbox fires-up with independent runtime environment Second antivirus and/or antimalware scan Two Factor Authentication software/middleware VPN SSL (can include second access control check, such as Juniper SSL) External solution’s security (such as Citrix’s own security features)

© 2012 All rights reserved to Ceedo. Flexible Desktops. Dynamic Workplace. Device Binding Workspaces licenses are device-bound and cannot work if copied to unauthorized devices + most cases of copping a workspace will break it.

© 2012 All rights reserved to Ceedo. Flexible Desktops. Dynamic Workplace. Mount pre-configured, ready-to-run, plug-and- play PKI middleware and remote connection solutions on 2FA devices’ flash memory HARDWARE Extend 2FA USB devices with plug-n-play pre-configured Public Key Middleware and remote office applications such as Citrix Receiver, VNC, VPN-SSL tunnels, etc. Mount pre-configured, ready-to-run, plug-and- play 2FA security SOFTWARE tokens With software based 2FA solutions, such as RSA SecurID Software Token, installed into Ceedo’s Workspace, any portable storage device can turn into a 2FA device.

© 2012 All rights reserved to Ceedo.