MXI & Ceedo Solution

Ceedo’s virtual workspace integrates with MXI Security’s encrypted drives to provide a low-TCO laptop alternative that allows any unmanaged Windows PC to be used securely as a provisioned and IT-managed working environment. Industry-leading Encrypted USB product line to deliver flexible computing solutions for a wide variety of scenarios, including teleworking, remote access and disaster recovery. In an increasingly complex IT world, maintaining laptop PCs is an expensive endeavor. But as it turns out - most of the cost comes from the constant hours spent installing, removing, updating and troubleshooting software.
On top of the direct IT maintenance time lost, there is also employee downtime and lost productivity while waiting for IT personnel to address the user's issues and needs. On top of the direct IT maintenance time lost, there is also employee downtime and lost productivity while waiting for IT personnel to address the user's issues and needs. By isolating the workspace - the user's applications, data, and associated resources - from the PC hardware and operating system, Ceedo Enterprise provides enterprises with a highly secure "work anywhere - anytime" computing solution that is simpler and more affordable to provision and manage. Deploying Ceedo Enterprise on an MXI Security USB device enables businesses to provide their employees, contractors and partners with protected anytime, anywhere access to mission-critical business applications.
What is a Virtual Workspace?
Ceedo Enterprise encapsulates a set of standard Windows applications within a pre-configured, secure and portable virtual workspace. When the MXI Encrypted USB device carrying Ceedo Enterprise is plugged into any Windows PC, it allows users to start working immediately – with instant access to office software, CRM, PLM and other essential applications, including one-click remote access through VPN or Citrix.
Features
Fast, flexible provisioning of mission critical applications
Ceedo Enterprise workspaces run securely from the USB device—users can work on their applications on any Windows PC.High performance and usability
Workspaces are easy to authenticate, access and use, with quick access to and use, with quick access to applications and data.Secure Portable Storage
Removable USB storage is protected using Advanced Encryption Standard (AES)-256 hardware encryption.Enterprise-scale central management
Ceedo management system deploys, updates, and manages Ceedo Enterprise workspaces; MXI ACCESS Enterprise manages the Encrypted USB drives.No second operating system
Lightweight virtual workspace utilizes the host PC’s resources (network, printing, etc.) while being isolated from malware and data leakage.Optional Biometric Authentication
Prevent unauthorized access to Ceedo Enterprise workspace data—Two-factor authentication requires users to authenticate using a password and fingerprintZero-footprint
When the user leaves, they take their environment with them, and no trace of their presence remains on the host.Optional PKI Token Operation
Secure key and certificate stores, hardware key generation, digital signing, and a range of other user PKI operations are possible within the virtual workspace.
Capacities available
8 |
16 |
32 |
64 |
GB |
Frequently Asked Questions
Why is strong authentication so important?
Encrypting data is not enough to ensure that your information is secure. If the authentication to access the data is weak then the strength of the encryption or the size of the encryption key is irrelevant. To ensure that your data stays encrypted and does not fall into the wrong hands, strong authentication is necessary to protect the encryption key and thus the overall data. By combining password, biometric, and/or smart card authentication with hardware that automatically locks down if too many authentications fail, significant levels of security are added to protect your encrypted information. Furthermore, with authentication performed in hardware, software attacks are ineffective.
Why is a truly portable device so important?
True portability means the device can be used on any machine regardless of operating system, including unsecured public or shared systems. As long as USB mass storage is supported on the host machine, then the device will operate like any USB storage device. The hardware implementation of authentication and transparent encryption means that no locally installed software is needed and the device has the same mobility as a regular flash drive.
Why is hardware-based encryption so important?
Hardware encryption offers more security and portability than software-based encryption. With software encryption, the data is processed on the host computer where it can be exposed to malicious software. By contrast, hardware encryption occurs within the trusted environment of the device. Because hardware-based encryption happens on the device transparently, no software needs to be installed and the flash drive is as fully portable as a regular, unencrypted USB device.
Why is AES-256 encryption so important?
AES-256 encryption with 256-bit keys offers the strongest data protection available in a FIPS-approved symmetric encryption algorithm. The National Security Agency (NSA) considers the design of AES-256 and the strength of its key sizes sufficient for protecting its classified information. CNSS Policy No. 15 states that key sizes of 128, 192, and 256 bits are sufficient for SECRET classification, while only 192 and 256 bits are sufficient for TOP SECRET. See CNSS Policy No. 15, Fact Sheet No. 1
