www.secure-it.com.my

MXI Products
MXI & Ceedo Solution
Wednesday, 26 January 2011 08:56
MXI and Ceedo Solution

Ceedo’s virtual workspace integrates with MXI Security’s encrypted drives to provide a low-TCO laptop alternative that allows any unmanaged Windows PC to be used securely as a provisioned and IT-managed working environment.  Industry-leading Encrypted USB product line to deliver flexible computing solutions for a wide variety of scenarios, including teleworking, remote access and disaster recovery.  In an increasingly complex IT world, maintaining laptop PCs is an expensive endeavor. But as it turns out - most of the cost comes from the constant hours spent installing, removing, updating and troubleshooting software. On top of the direct IT maintenance time lost, there is also employee downtime and lost productivity while waiting for IT personnel to address the user's issues and needs.

On top of the direct IT maintenance time lost, there is also employee downtime and lost productivity while waiting for IT personnel to address the user's issues and needs.  By isolating the workspace - the user's applications, data, and associated resources - from the PC hardware and operating system, Ceedo Enterprise provides enterprises with a highly secure "work anywhere - anytime" computing solution that is simpler and more affordable to provision and manage. Deploying Ceedo Enterprise on an MXI Security USB device enables businesses to provide their employees, contractors and partners with protected anytime, anywhere access to mission-critical business applications.

What is a Virtual Workspace?

Ceedo Enterprise encapsulates a set of standard Windows applications within a pre-configured, secure and portable virtual workspace. When the MXI Encrypted USB device carrying Ceedo Enterprise is plugged into any Windows PC, it allows users to start working immediately – with instant access to office software, CRM, PLM and other essential applications, including one-click remote access through VPN or Citrix.

  • Fast, flexible provisioning of mission critical applications - Ceedo Enterprise workspaces run securely from the USB device—users can work on their applications on any Windows PC.
  • High performance and usability - Workspaces are easy to authenticate, access and use, with quick access to and use, with quick access to applications and data.
  • Secure Portable Storage - Removable USB storage is protected using Advanced Encryption Standard (AES)-256 hardware encryption.
  • Enterprise-scale central management - Ceedo management system deploys, updates, and manages Ceedo Enterprise workspaces; MXI ACCESS Enterprise manages the Encrypted USB drives.
  • No second operating system - Lightweight virtual workspace utilizes the host PC’s resources (network, printing, etc.) while being isolated from malware and data leakage.
  • Optional Biometric Authentication - Prevent unauthorized access to Ceedo Enterprise workspace data—Two-factor authentication requires users to authenticate using a password and fingerprint.
  • Zero-footprint - When the user leaves, they take their environment with them, and no trace of their presence remains on the host.
  • Optional PKI Token Operation - Secure key and certificate stores, hardware key generation, digital signing, and a range of other user PKI operations are possible within the virtual workspace.
Capacities available 1, 2, 4, 8, 16, 32 & 64GB

 

Last Updated ( Wednesday, 26 January 2011 09:20 )
 


Page 9 of 13

Did You Know

arrow Identity theft is the top consumer complaint in the USA according to the Federal Trade Commission.

arrow US consumers reported fraud loss totalling more than $1.1 billion in 2006.

arrow Credit card fraud (25%) was the most common form of reported identity theft in the US in 2006.

arrow More than 100 000 people are affected by identity theft each year in the UK

arrow According to Privacy Rights Clearinghouse, more than 350 data loss incidents involving more than 140 million records have occurred since February 2005

arrow Organisations are obliged by law to take take adequate steps to ensure the proper disposal of data


mxi-3devices0

Visitors

mod_vvisit_countermod_vvisit_countermod_vvisit_countermod_vvisit_countermod_vvisit_countermod_vvisit_countermod_vvisit_countermod_vvisit_counter
Now: 2024-04-29 14:43

Who's Online

We have 373 guests online
You are here  :