Ceedo’s Containerized Workspace runs any designated process, and all of its child processes inside an isolated region running on the endpoint itself.
Use Ceedo Containers for:
- Prevention: Capture any attempt to write to, or change data on, the host computer
- Access Control: Run under its own private user account for adding Access Control to local data
- Volatility: Remove any data captured at the end of each session, making sure that any potential threats do not persist
- Accountability: Retain all the data generated in each session in “delta disks,” allowing for comparison before and after a suspected attack or potential user abuse