Home page » Securing workstations

Securing workstations

Workstation security is a major issue for CIO. Indeed, workstations are regularly the gateway to cyber attacks and are often infected by unintentional malware installations. A breach of part of the company's data can be very damaging and have major repercussions on the company's survival. Let's take a closer look at how to better manage endpoint security with ceBox

capture d’écran 2022 03 23 à 18.21.42

The problems of securing workstations

ceBox est un allié de taille pour optimiser la sécurité des postes de travail. Premièrement, ceBox permet d’homogénéiser l’ensemble du parc informatique de l’organisation grâce à la gestion centralisée des OS et applications. Puis, la solution permet de rapidement déployer les mises à jour, patch de sécurité et les nouveaux outils, ce qui permet à la DSI d’être réactive en matière de sécurité. En cas de cyberattaque, la DSI peut décider de redémarrer l’ensemble du parc pour se débarrasser du malware et arrêter sa propagation.

As part of the recovery process following a cyber attack, the ceBox solution makes it possible to redeploy all healthy workstations in a few minutes, even remotely thanks to the centralised management console.

As part of a business continuity plan, the solution guarantees production continuity, even in the event of a virus attack, with a simple reboot of the user machine.

In the event of a cyber attack, the CIO can decide to reboot the entire fleet to get rid of the malware and stop its propagation . In the event of an internet outage, workstations continue to function.

1. Stop the spread of the threat

The workstation administrator can stop the entire workstation fleet from his centralised administration console. This step is crucial because it stops the propagation of the malware/virus and ensures that the next time the workstations are started, they will not be infected. Indeed, since the ceBox solution works in "Read-Only" mode, any installation carried out after the workstation has been started is not retained. The computer gets rid of the "temporary" cache at each shutdown

2. Installation of the security patch

The IT team must now edit the master image(s), which are images prepared by the CIO containing an OS and applications. An organisation may have several of these. Depending on the type of threat, the workstation administrator installs the security patch provided by the publisher, updates the OS, the software or the antivirus. The next time the system is started, all workstations will start up on a secure image.

3. Deploying the secure image

The workstation administrator can finalise the deployment of the secure images to all his sites and workstations. This action is very fast thanks to the versioning system. Indeed, with ceBox, the whole image does not go down to each site. Only the differential is downloaded: once per site then on each workstation in the LAN. The workstations then start up on a secure image that is free of any malicious installation.

That's it!

With ceBox, the CIO can quickly implement security decisions. A Wannacry-type cyber attack can be identified and dealt within only 1 to 2 hours with the ceBox solution on hundreds of workstations and sites.

Switch to ceBox now.

Convinced ? It's time to satisfy your customers, your employees, your CFO and your CEO!

Discover the other (excellent) reasons to switch to ceBox.

Every day our customers find new good reasons
to use ceBox, and you?

 

Request a demo

Download XiVO

Want to discover and try the XiVO solution?
We propose you to download it for free in a few clicks!

Technical support Wisper
Billing Wisper

Contact us by email at :
compta@wisper.io



logo xivo
Vous allez recevoir un lien de téléchargement par mail !
Bonne découverte,
L'équipe Wisper
logo xivo

Bonjour, Vous pouvez télécharger notre solution XiVO via ce lien :

Bonne installation et bonne découverte !
L’équipe Wisper