Today, when employees, contractors, or customers use an unmanaged PC to connect to your web application, web service, VPN, or remote desktop, the open flow of data between the host machine and the organizational resource is a data leak waiting to happen.
Locally stored files such as SSL certificates, cookies, saved passwords, biometric data, as well as actual documents, are at the mercy of users’ intentions and how exposed their own machines are. In addition, burdening the security concerns even further is the the extremely limited ability to control the host PC, its health, the applications that are on it, and of course, the operations users are allowed to perform.
With CeedoWorkspace, organizations can deliver plug-n-play self-contained computing environments, along with the applications needed to connect to the organization, such as 2FA, Remote Connection Clients, add-ons, certificates, and more, all embedded in a highly controlled isolated runtime, stored inside an encrypted secure container.
With a push of a button, CeedoWorkspace can install 3rd party software, such as HIPS and VPN clients if they are needed, make sure the host has an up-to-date and running antivirus and firewall, check update history, and lock the entire CeedoWorkspace Container so only the intended user can open it on the machine it was set up on.
The workspace can control various user actions, it can hide data from the host processes, run the applications under a separate demoted user account, and be wiped out remotely using Ceedo’s Management Console.