Find the desired product help

Containment - An Overview


  • The container is an isolated operating environment for unknown and untrusted applications.
  • Running an application in the container means that it cannot make changes to other processes, programs or data on your local computer. Applications in the container are executed under a carefully selected set of privileges and write to a virtual file system and registry instead of you real system.
  • This delivers a smooth user experience by letting unknown applications run as normal while denying them the potential to cause damage.
  • After an unknown application has been placed in the container, CCS also submits it to Valkyrie for behavior analysis. Valkyrie tests include:
  • Static analysis
  • Dynamic analysis
  • Valkyrie plugins and embedded detectors
  • Signature-based detection
  • Trusted vendor and certificate validation
  • Reputation system
  • Human expert analysis
  • If Valkyrie discovers that a file is malicious then it is added to the antivirus black list. The file is quarantined on the local machine and the user is alerted.
  • Users can print documents from within the container. This is useful, for example, if a suspicious PDF has valid information that should be printed.
By uniquely deploying 'containment as security', CCS offers improved security, fewer pop-ups and greater ease of use than ever before.