Ceedo’s Threat Containment Platform

Ceedo’s Threat Containment Platform protects against malware using a revolutionary combination of application containerization and context-based access controls. Instead of relying on virus signatures or trying to detect suspicious behavior, Ceedo isolates containerized processes and applies context-based access controls on the boundaries of the container to protect the host from code-and-data running in the container. Solutions built on the Platform utilize existing computing resources on the host (no server infrastructure required), offer transparent protection, and are easy to install, use and administer.

Ceedo Solutions for Business Users

MalwareLocker protects against Web-borne threats. It runs Web-facing applications, including Web browsers, email client and other applications inside an isolated virtual environment – a container – creating a security perimeter around the application and related data. Users continue to use protected applications as they otherwise would, while all interactions between the application and the host computer are filtered through intelligent security checkpoints that ensure all potential threats are confined to the container. The outcome is a highly effective protection measure against malware infections, as anything that happens in the container stays in the container, and will not affect the host machine.

Read More

Ceedo Cloud Management System is a web-based management system that allows administrators to compose and configure policies for MalwareLocker units and assign them to remote users/ and user groups form a central location. Once setup, the administrator can invite users to install MalwareLocker and control them remotely, including updates, remote wipes and more.

Read More

Ceedo Solutions for Personal Users

MalwareLocker protects against Web-borne threats. It runs Web-facing applications, including Web browsers, email client and other applications inside an isolated virtual environment – a container – creating a security perimeter around the application and related data. Users continue to use protected applications as they otherwise would, while all interactions between the application and the host computer are filtered through intelligent security checkpoints that ensure all potential threats are confined to the container. The outcome is a highly effective protection measure against malware infections, as anything that happens in the container stays in the container, and will not affect the host machine.

Read More

CeedoVault is a purpose-built solution to provide effective protection against ransomware. CeedoVault monitors file accesses from all processes on the host, and before any modification is made, creates a current copy of the file, which is written to a secured location on the host, inaccessible to the ransomware. By ensuring that the user always has a current version of their files in a secured location, the ransomware is reduced to a nuisance, as all files can be easily restored when the attack is over.

Read More