CEEDO ENTERPRISE. Portable Flexible Reliable



Similar documents
SECURE ACCESS TO THE VIRTUAL DATA CENTER

VMware End User Computing Horizon Suite

Enterprise Desktop Solutions: VMware View 4.5

Proven LANDesk Solutions

Why Switch from IPSec to SSL VPN. And Four Steps to Ease Transition

Desktop Virtualization Strategy

Dell SonicWALL Secure Virtual Assist: Clientless remote support over SSL VPN

VMware ThinApp Application Virtualization Made Simple

Accessing the Media General SSL VPN

Permeo Technologies WHITE PAPER. HIPAA Compliancy and Secure Remote Access: Challenges and Solutions

DigitalPersona Pro Enterprise

VMware ThinApp Agentless Application Virtualization Overview W HITE P APER

Ceedo Virtualization Technology Overview

SA Series SSL VPN Virtual Appliances

Driving Company Security is Challenging. Centralized Management Makes it Simple.

VMware Horizon FLEX 1.5 WHITE PAPER

Citrix MetaFrame Presentation Server 3.0 and Microsoft Windows Server 2003 Value Add Feature Guide

Encryption Buyers Guide

Three Ways to Secure Virtual Applications

APPLICATION VIRTUALIZATION TECHNOLOGIES WHITEPAPER

Vs Encryption Suites

Top Desktop Management Pain Points

BYOD BEST PRACTICES GUIDE

GTS Software Pty Ltd. Remote Desktop Services

NetWrix USB Blocker. Version 3.6 Administrator Guide

Workspace Manager 2014 Module Comparison Chart

Remote-Access VPNs: Business Productivity, Deployment, and Security Considerations

MyUSBOnly User Guide Menu

Global security intelligence. YoUR DAtA UnDeR siege: DeFenD it with encryption. #enterprisesec kaspersky.com/enterprise

Professional Integrated SSL-VPN Appliance for Small and Medium-sized businesses

TRUSTED IDENTITIES, MANAGED ACCESS Implementing an Identity and Access Management Strategy for the Mobile Enterprise. Introduction.

MOBILITY & INTERCONNECTIVITY. Features SECURITY OF INFORMATION TECHNOLOGIES

Any Software Any Language Instantly!

Authentication Solutions. Versatile And Innovative Authentication Solutions To Secure And Enable Your Business

Extending Threat Protection and Control to Mobile Workers with Cloud-Based Security Services > White Paper

Licensing Windows for Virtual Desktops

Kaseya IT Automation Framework

Enterprise Solution for Remote Desktop Services System Administration Server Management Server Management (Continued)...

SSL-Based Remote-Access VPN Solution

Authentication Solutions VERSATILE AND INNOVATIVE AUTHENTICATION SOLUTIONS TO SECURE AND ENABLE YOUR BUSINESS

Sophistication of attacks will keep improving, especially APT and zero-day exploits

Top Four Considerations for Securing Microsoft SharePoint

Windows Phone 8 Security Overview

Cisco IOS SSL VPN: Router-Based Remote Access for Employees and Partners

Citrix XenApp, MDOP, and Configuration Manager

Clean VPN Approach to Secure Remote Access for the SMB

EasyConnect. Any application - Any device - Anywhere. Faster, Simpler & Safer Networks

Solution Recipe: Improve PC Security and Reliability with Intel Virtualization Technology

ARCHITECT S GUIDE: Comply to Connect Using TNC Technology

Cisco IOS SSL VPN: Router-Based Remote Access for Employees and Partners

EXTENDING THREAT PROTECTION AND CONTROL TO MOBILE WORKERS

Accelerating Microsoft Windows 7 migrations with Citrix XenApp

Information Technology Solutions. Managed IT Services

Deploy secure, corporate access for mobile device users with the Junos Pulse Mobile Security Suite

An Analysis of Propalms TSE and Microsoft Remote Desktop Services

INTRODUCING KERIO WINROUTE FIREWALL

CONSUMERIZATION OF IT BYOD and Cloud-based File Storage

Flexible Identity Federation

Best Practices for Secure Mobile Access

White Paper. Anywhere, Any Device File Access with IT in Control. Enterprise File Serving 2.0

Installation Procedure For McAfee Agent

Endpoint Virtualization. Workspace Management: Simplify IT Organizations. Data Sheet Symantec TM Workspace Streaming 6.1

Uni Desktop. An Introduction to Uni Systems Hosted Desktop Solution offering. White Paper Solution Brief

Clean VPN Approach to Secure Remote Access

IDENTITY & ACCESS. BYOD and Mobile Security Seizing Opportunities, Eliminating Risks in a Dynamic Landscape

Microsoft Terminal Server and Citrix Presentation Server Deployment Environments

ADDING STRONGER AUTHENTICATION for VPN Access Control

Getting Started with Symantec Endpoint Protection

VMware/Hyper-V Backup Plug-in User Guide

GoldKey Software. User s Manual. Revision WideBand Corporation Copyright WideBand Corporation. All Rights Reserved.

Aventail Connect Client with Smart Tunneling

Secure Your Mobile Device Access with Cisco BYOD Solutions

Centralized Self-service Password Reset: From the Web and Windows Desktop

An Oracle White Paper July Oracle Desktop Virtualization Simplified Client Access for Oracle Applications

When enterprise mobility strategies are discussed, security is usually one of the first topics

BlackBerry 10.3 Work and Personal Corporate

TRANSITIONING ENTERPRISE CUSTOMERS TO THE CLOUD WITH PULSE SECURE

Securing Corporate Data and Making Life Easier for the IT Admin Benefits of Pre Boot Network Authentication Technology

How To Manage A Corporate Device Ownership (Byod) On A Corporate Network (For Employees) On An Iphone Or Ipad Or Ipa (For Non-Usenet) On Your Personal Device

Secure Virtual Assist/ Access/Meeting

YOUR DATA UNDER SIEGE. DEFEND IT WITH ENCRYPTION.

Desktop Application Virtualization and Application Streaming: Function and Security Benefits

Take Back Control in IT. Desktop & Server Management (DSM)

Windows Phone 8.1 in the Enterprise

Secure Access Portal. Getting Started Guide for using the Secure Access Portal. August Information Services

Transcription:

CEEDO ENTERPRISE Portable Flexible Reliable Deliver corporate-managed applications sandboxed in preconfigured and centrally managed Workspaces that can be mounted on any portable device.

About Ceedo Enterprise... 3 Superior Technology for Superior Performance... 4 The 'Workspace'... 4 Self-Contained and Zero-Install... 4 Sandboxing... 5 Portability... 5 Compatibility... 5 Business Implementations... 6 Ubiquitous Computing... 6 Corporate Applications on Unmanaged PCs... 6 Security... 7 Safe Productivity: A Fortified Extension of the Organization... 7 Portable Security: Two-Factor Authentication (2FA) and Safe Browsing... 8 Q&A Recap... 9 What does Ceedo Enterprise do?... 9 Who uses Ceedo Enterprise?... 9 What is Ceedo Enterprise's user experience like?... 9 What are the most common scenarios that Ceedo Enterprise is used in?... 10 Manage corporate applications on unmanaged PCs... 10 Remove the need for issuing corporate laptops... 10 Home office, roaming users, and non-corporate devices... 10 Extend Two-Factor Authentication (2FA) devices... 10 Deploy VoIP, VPN, and Unified Communications applications... 10 Disaster Recovery scenarios... 10 Enhance security for remote computing... 11 Secure browsing solutions... 11 Can Ceedo Workspaces be customized and branded?... 11 How does Ceedo Enterprise work?... 11 How is Ceedo different from competing solutions?... 11 Conclusion... 13 2012 Ceedo Flexible Computing www.ceedo.com Tel: +972.7.3223.2200 Fax: +972.7.3223.2232 Page 1

Ceedo Enterprise Summary... 13 About Ceedo... 13 2012 Ceedo Flexible Computing www.ceedo.com Tel: +972.7.3223.2200 Fax: +972.7.3223.2232 Page 2

About Ceedo Enterprise ABOUT CEEDO ENTERPRISE Deliver Centrally-managed Workspaces and desktop applications on portable devices Introduced in 2008, Ceedo Enterprise is one of the most advanced and celebrated portable computing platforms on the market today. Equipped with unique technology, Ceedo Enterprise is built from the ground-up to suit various business needs and designed to address diverse portable computing scenarios ranging from laptop replacement, home office enabler to extending two-factor authentication solutions, and more. Ceedo Enterprise was developed as a portable computing solution which allows organizations to equip portable storage devices, such as USB flash drives, with zero-install, plug-andplay, secure environments that can be plugged into any PC and launch a centrally-managed pool of corporate applications with enterprise-level user-rights policies and security specifications. Apart from its basic function as a portable "computer-on-astick," Ceedo Enterprise is extremely flexible, and can be fitted to solve a myriad of IT challenges and be used for different purposes such as disaster recovery solution, cloud application deployment platform, corporate security, remote office connection, and other more specific cases per business. For instance, Ceedo Enterprise is also used for deploying zeroinstall Public Key middleware and secure, pre-configured remote office software on Two-Factor Authentication (2FA) devices, and as a means of providing end-users with secure browsing solutions. Self-Contained A complete Workspace including all required components, applications and plug-ins. Plug-and-Play Runs entirely from the portable device with nothing installed on the PC just plug-and-play with zero configuration! Intricate User-Rights Management Allows for remote management of numerous configuration options, including blocking access to drives and printers. Data Security Can be hosted in a read-only partition, preventing tampering and malware infections. Zero Footprint Data and applications remain on the device. When unplugged, everything shuts down automatically, leaving no trace on the host. Central Management Includes a complete suite of tools for remote provisioning, updating and web-based user management. 2012 Ceedo Flexible Computing www.ceedo.com Tel: +972.7.3223.2200 Fax: +972.7.3223.2232 Page 3

Superior Technology for Superior Performance SUPERIOR TECHNOLOGY FOR SUPERIOR PERFORMANCE The Features that Manifest as Solutions The 'Workspace' Ceedo Enterprise utilizes a type of technology, we dubbed 'Workspace Virtualization,' which encapsulates the entire application layer of a Windows operating system into a self-sustained virtual runtime environment that provides the applications running within it with all the resources and functionalities usually provided by the underlying OS, and that can run without installing anything into the operating system itself. Self-Contained and Zero-Install Probably the most important feature of the Virtual Workspace is its complete independence from the host OS which allows it to run on practically any Windows-based PC (XP SP2 and above) without installing any components, and without infiltrating the host PC in an obstructive manner this makes it a completely agentless system with regards to the host. On the other hand, since Ceedo virtualizes the entire application layer, the Virtual Workspace itself can be thought of as its own agent, meaning that Ceedo enjoys the best of both worlds: having an agentless infrastructure that can run on any system without installing anything, including an agent, while at the same time retaining all of the management capabilities that an installed agent would provide. 2012 Ceedo Flexible Computing www.ceedo.com Tel: +972.7.3223.2200 Fax: +972.7.3223.2232 Page 4

Superior Technology for Superior Performance Sandboxing Ceedo's Virtual Workspaces are encapsulated in a flexible sandbox which allows for varying degrees of transparency in terms of host resource utilization. This means that an administrator can set the level of interconnectivity the Virtual Workspace is allowed to have with the host, including, among other things, access to and from local drives, printers, network resources, and more. In addition, the sandbox also ensures a zero-footprint which enables Ceedo Workspaces to work on PCs without leaving any trace behind, even if the device is unplugged abruptly, or the PC shuts down unexpectedly. Portability Beyond Ceedo's ability to function in the exact same way on any Windows OS, regardless of version, language and installed applications, Ceedo utilizes only the User Mode of the host operating system. This means that Ceedo Workspaces can run on any PC without requiring administrator rights. Furthermore, its fast throughput, allows it to run in real time from storage devices, while being managed from the cloud, and its light-weight foundations which amount to only ~10MB, enables Ceedo to be installed even on devices with modest storage capacities. All of the above means that Ceedo can be carried around on portable storage devices and run directly from the device without changing anything or leaving any trace on the host PC they run on. Compatibility Ceedo Workspaces emulate the runtime environment a regular Windows OS would provide applications with, meaning that almost any Windows desktop application* can run from within Ceedo's environment with no need to specifically package or tweak it in any special way in order for it to function. The emulated virtual runtime environment also means that Ceedo works exactly the same on any Windows version (XP2+) and regardless of host language, settings, installed application and account privileges. *Not including Kernel-Mode applications 2012 Ceedo Flexible Computing www.ceedo.com Tel: +972.7.3223.2200 Fax: +972.7.3223.2232 Page 5

Business Implementations BUSINESS IMPLEMENTATIONS Ubiquitous Computing Corporate Applications on Unmanaged PCs Ceedo Enterprise allows companies to extend the reach of their application and user-rights management capabilities beyond the organization's boundaries. Organizations that deploy Ceedo Enterprise can provide end-users with portable storage devices, fitted with centrally-managed corporate applications, that extend the reach of the IT management and user productivity onto unmanaged and noncorporate PCs. This allows, on the one hand, users to use any PC, anywhere, at any time, both on and offline, regardless of the host's account privileges, natively installed applications, etc., and on the other hand, allows IT departments to centrally manage and control the devices, their applications, and the user-rights policies. Implemented successfully as: Laptop replacement Portable workforce enabler Safe computing and browsing platform for secured Workplaces Extending twofactor authentication solutions Business continuity solution in times of disaster Ceedo Enterprise is equipped with an advanced set of authoring and management tools that can create and deliver Workspaces, application installations, policies, and more, to specific users, user groups, or an entire workforce, with a click of a button using state of the art web-based consoles that allow companies to extend the reach of their application and user rights management capabilities. Cloud application deployment (streaming hosted workspaces) And more 2012 Ceedo Flexible Computing www.ceedo.com Tel: +972.7.3223.2200 Fax: +972.7.3223.2232 Page 6

Business Implementations Security Safe Productivity: A Fortified Extension of the Organization Data Leakage Prevention Ceedo's flexible sandboxing technology allows corporations to have varying degrees of computing freedom. For instance, banking and governmental institutions, that are constrained by regulations that limit user-portability can deliver to end-users sealed environments which are completely opaque to their surroundings, eliminating data-leakage and unauthorized access to and from the host environment, including printing, drive access, and more. Implemented successfully for: Running sensitive applications in sandboxed solutions Extending Two- Factor Authentication devices and solutions Enabling safe browsing solutions Enabling safe remote office and desktop connection solutions Enhancing Security Deploying Ceedo Enterprise in conjunction with complimentary security applications such as kiosk mode add-ons for a browser, VPN SSL add-ons, password and data encryption software, etc., can ensure users will always run properly configured and centrally-managed security applications that will allow them to enjoy enterprise-class portable security such as: sandboxed browsing for remote access to web-based systems, safe remote desktop connections, etc., as well as safe productivity, such as productivity and communication software which can run on unmanaged PCs while being protected from the various threats associated with portable computing. User-Rights Enforcement Apart from allowing for both portable security and safe productivity solutions, Ceedo Enterprise also extends the reach of the organization's security infrastructure and regulations, allowing IT Administrators to granularly manage user-rights and privileges, such as: access permissions to local drives, printers, network assets, time limits, and elaborate conditions, such as the ability to disable the environment when working on PCs with no anti-virus installed. The user-rights policies are enforced remotely from the cloud, according to users' ID or group affiliation. 2012 Ceedo Flexible Computing www.ceedo.com Tel: +972.7.3223.2200 Fax: +972.7.3223.2232 Page 7

Business Implementations Zero-Footprint Portability Once launched, the Workspace fires up an independent runtime environment which runs directly from the portable storage device on which Ceedo was installed. It does not write any data to the host OS, does not require any client installation before running, and uses only the User-Mode part of the host OS meaning that once the portable device is unplugged, nothing is left behind on the host PC, even if the environment is unplugged while still running. This means that no matter what users do, and which information they access from which PC, they will never leave any trace behind that might breach the organization's security requirements. Portable Security: Two-Factor Authentication (2FA) and Safe Browsing Two-Factor Authentication and Remote Office Using Ceedo Enterprise, IT departments can offer a centrally-managed, selfcontained Workspace, with pre-configured components hosted on 2FA devices. The various sandboxed components can be hosted in a read-only partition on the device's flash memory, and include the device's own Public Key middleware client that will run with zero configuration and installation on the side of the end-user, as well as different components required for safe and secure remote office connections, such as a sandboxed browser in locked-down kiosk mode, a VPN SSL tunnel client, encryption software, remote desktop clients, and more. Safe Browsing Ceedo Enterprise's technological features are extremely useful for organizations, such as e-banking companies, that wish to allow users to use web-based management and productivity systems beyond the organization's protected boundaries. Using a combination of 3 rd party encryption and security software, with Ceedo's built-in sandbox and strict user-rights enforcement, employees can access intranet systems in a safe and secure manner while mitigating security risks and data leakage threats. 2012 Ceedo Flexible Computing www.ceedo.com Tel: +972.7.3223.2200 Fax: +972.7.3223.2232 Page 8

Q&A Recap Q&A RECAP What does Ceedo Enterprise do? Ceedo Enterprise provides IT departments with the means to deploy secure and managed applications, enclosed in sandboxed Workspaces that can be installed on USB thumb-drives or other forms of portable storage, and launched by end-users on any PC by simply plugging the devices in, all without installing anything, and without leaving any trace behind once the device is unplugged. Who uses Ceedo Enterprise? In the corporate world, Ceedo Enterprise-based solutions are used by businesses of all sizes and fields. The following constitutes a short list of the business needs common to most of our clients: Companies that wish to provide their employees, customers, and partners with a set of managed business applications without issuing company-owned PCs or laptops. Companies whose end-users must have a full PC working environment when they are unable to come to the office. Companies that wish to deploy tightly secured IT environments for a specific set of business needs, such as: remote desktop clients, unified communications, two-factor authentication solutions, and other security-related or security-enhanced portable computing scenarios. What is Ceedo Enterprise's user experience like? With Ceedo, the end-user gets a personalized, rich computing environment that can run on any PC. And since there is no software installed on the host, Ceedo Enterprise is easily migrated from PC to PC, regardless of version, language, or account privileges. Once launched, Ceedo Enterprise provides the user with a docking toolbar and a start menu which allows launching applications, easily accessing various options such as help files and the online application repository all in a plug-and-play fashion. 2012 Ceedo Flexible Computing www.ceedo.com Tel: +972.7.3223.2200 Fax: +972.7.3223.2232 Page 9

Q&A Recap What are the most common scenarios that Ceedo Enterprise is used in? Manage corporate applications on unmanaged PCs Ceedo Enterprise is used to deliver centrally-managed applications to and enforce user-rights on roaming users who use unmanaged PCs such as personal laptops, home and public PCs, etc. Ceedo Workspaces running on PCs allow constant updating and roll-out of new applications without impacting, or being impacted by, the host operating system. Additionally, when running Workspaces from external encrypted hardware, all the applications become portable and highly secured, as well as pre-configured according to company needs, and enforced with user-rights that adhere to company regulations. Remove the need for issuing corporate laptops Ceedo enables enterprises to equip internal and external employees (contractors, temps, etc.), as well as sales channels, business partners and points of sale with just the essential business applications, allowing organizations to avoid the high costs incurred by laptops prices, management and data leakage threats. Home office, roaming users, and non-corporate devices An employee taking his laptop home is a common practice these days, exposing enterprises to the risk of theft and damage. Although home PC s can be used for work, they cannot easily reproduce the productivity of the office workspace. Extend Two-Factor Authentication (2FA) devices Ceedo enterprise allows for the deployment of 2FA devices that once plugged into a PC, automatically run the 2FA device's middleware and other required security applications in sandboxed Workspaces that can be managed centrally from the cloud. Deploy VoIP, VPN, and Unified Communications applications Deployment of Unified Communications (UC) desktop applications such as VoIP, Presence and VPN clients is a key concern for IT managers, and can greatly impact the future success of a UC project. Disaster Recovery scenarios One of the most difficult challenges of any disaster recovery plan is restoring the enterprise software and reestablishing a productive desktop workspace. Ceedo provides a fast, simple, and highly affordable solution for equipping users for uninterrupted business continuity. 2012 Ceedo Flexible Computing www.ceedo.com Tel: +972.7.3223.2200 Fax: +972.7.3223.2232 Page 10

Q&A Recap Enhance security for remote computing Many security solutions that allow users to use corporate computing assets outside of the organization, such as remote office access tools, secure web-based tools, etc., demand that the end-users install and configure various software components - usually by themselves - on each PC they use. Ceedo Enterprise allows IT Administrators to deploy entire pre-configured Workspaces that allow users to simply plug-and-play their remote access solutions and start working securely. Secure browsing solutions Ceedo Enterprise allows users to safely access business portals and sensitive web-based platforms while mitigating security risks, lowering the risk of identity theft, and unauthorized access to confidential resources by deploying pre-configured, plug-and-play, sandboxed and encrypted Workspaces equipped with tight user-rights enforcement policies, an independent sandboxed browser in lockeddown kiosk mode, and various 3rd party security software, all centrally-managed from the cloud. Can Ceedo Workspaces be customized and branded? Yes. Ceedo has a multitude of branding and customization options for the enterprise and service provider. All the components of Ceedo's interface, such as window colors, toolbars and splash screens can be customized and branded to the customer s specifications. How does Ceedo Enterprise work? Ceedo Enterprise utilizes a groundbreaking form of virtualization which enables complete Workspaces to support internally installed applications, allowing them to be portable and compatible with any Windows OS by isolating them from the underlying operating system on which they run and providing them with all the resources usually provided by an underlying OS. Installed applications Application virtualization How is Ceedo different from competing solutions? Desktop virtualization Companies that are competing directly with Ceedo Enterprise to provide offline portability for end-users, employ one of two virtualization technologies: Application Virtualization or Desktop Virtualization. In Application Virtualization solutions, applications must be individually packaged in self-sustained bubbles that are separately deployed to end-points Workspace virtualization 2012 Ceedo Flexible Computing www.ceedo.com Tel: +972.7.3223.2200 Fax: +972.7.3223.2232 Page 11

Q&A Recap and/or portable devices, and employ various, sometimes cumbersome, workarounds in order to provide inter-communication and natural user experience capabilities. Furthermore, once central management is required, Application Virtualization also requires an installed component on the end-point which eliminates the benefits of zero-installed environments. Desktop Virtualization, on the other hand, virtualizes the hardware itself, meaning not only that applications are still traditionally installed with all the known issues associated with traditional application deployment, but also the deployed packages are resource hungry, requiring significant storage space, as well as requiring installed components on the host. Unlike Application and Desktop Virtualization, Ceedo's Workspace Virtualization encapsulates the entire application layer of the OS along with all the resources usually provided by an underlying OS. The Workspace allows applications to be installed into Justin the same manner as a regular OS would, providing the Desktop Virtualization advantages of intercommunication, behavior and manageability, but at the same time providing the lightweight infrastructure, sandboxed compatibility and portability associated with Application Virtualization. 2012 Ceedo Flexible Computing www.ceedo.com Tel: +972.7.3223.2200 Fax: +972.7.3223.2232 Page 12

Conclusion CONCLUSION Ceedo Enterprise Summary With over 4,000,000 users worldwide using Ceedo's products, Ceedo Enterprise is undoubtedly one of the leading solutions for portable computing, remote security and adjacent topics in the world today. Ceedo Enterprise's ability to deliver reliable and flexible managed Workspace, enables IT departments to provision complete computing environments on portable devices with advanced remote management capabilities and the capacity to answer the most challenging computing scenarios in terms of portability, security, and over all savings in help desk and management costs. With an addressable market ranging from moderate small and medium enterprises to large organizations and an ability to answer a myriad of business needs and computing scenarios, Ceedo has been successfully adopted by leading system integrators and key IT market players, as well as being endorsed by technological and business partners of leading manufacturers, service providers, IT security firms, and more. About Ceedo Founded in 2005, Ceedo Technologies develops innovative, flexible, and easy-to-use solutions that overcome complicated challenges facing modern IT by utilizing its proprietary virtualization technology. To-date, Ceedo's products have been shipped to over 4,000,000 users worldwide as solutions for portable computing, application deployment, security enhancement, and more. Ceedo's versatility and reliability, has earned Ceedo partnerships with key market players such as: McAfee, Avaya, Imation and Citrix to name just a few, and customers in all sectors and of all types and sizes. Visit our website at www.ceedo.com to learn more and get an evaluation version. Or contact our sales team: sales@ceedo.com +972-7-322-322-00. 2012 Ceedo Flexible Computing www.ceedo.com Tel: +972.7.3223.2200 Fax: +972.7.3223.2232 Page 13