Home page » Your needs » Securing workstations

Securing workstations

Workstation security is a major issue for CIO. Indeed, workstations are regularly the gateway to cyber attacks and are often infected by unintentional malware installations. A breach of part of the company's data can be very damaging and have major repercussions on the company's survival. Let's take a closer look at how to better manage endpoint security with ceBox

capture d’écran 2022 03 23 à 18.21.42

The problems of securing workstations

ceBox is an important ally to optimize the security of workstations. Firstly, ceBox allows to homogenize the whole computer park of the organization thanks to the centralized management of OS and applications. Then, the solution allows to quickly deploy updates, security patches and new tools, which allows the IT department to be reactive in terms of security. In the event of a cyber attack, the IT department can decide to restart the entire fleet to get rid of the malware and stop its propagation.

As part of the recovery process following a cyber attack, the ceBox solution makes it possible to redeploy all healthy workstations in a few minutes, even remotely thanks to the centralised management console.

As part of a business continuity plan, the solution guarantees production continuity, even in the event of a virus attack, with a simple reboot of the user machine.

In the event of a cyber attack, the CIO can decide to reboot the entire fleet to get rid of the malware and stop its propagation . In the event of an internet outage, workstations continue to function.

1. Stop the spread of the threat

The workstation administrator can stop the entire workstation fleet from his centralised administration console. This step is crucial because it stops the propagation of the malware/virus and ensures that the next time the workstations are started, they will not be infected. Indeed, since the ceBox solution works in "Read-Only" mode, any installation carried out after the workstation has been started is not retained. The computer gets rid of the "temporary" cache at each shutdown

2. Installation of the security patch

The IT team must now edit the master image(s), which are images prepared by the CIO containing an OS and applications. An organisation may have several of these. Depending on the type of threat, the workstation administrator installs the security patch provided by the publisher, updates the OS, the software or the antivirus. The next time the system is started, all workstations will start up on a secure image.

3. Deploying the secure image

The workstation administrator can finalise the deployment of the secure images to all his sites and workstations. This action is very fast thanks to the versioning system. Indeed, with ceBox, the whole image does not go down to each site. Only the differential is downloaded: once per site then on each workstation in the LAN. The workstations then start up on a secure image that is free of any malicious installation.

That's it!

With ceBox, the CIO can quickly implement security decisions. A Wannacry-type cyber attack can be identified and dealt within only 1 to 2 hours with the ceBox solution on hundreds of workstations and sites.

Switch to ceBox now.

Convinced ? It's time to satisfy your customers, your employees, your CFO and your CEO!

Discover the other (excellent) reasons to switch to ceBox.

Every day our customers find new good reasons
to use ceBox, and you?


Technical support Wisper
Billing Wisper

Contact us by email at :