Containment - An Overview
- The container is an isolated operating environment for unknown and untrusted applications.
- Running an application in the container means that it cannot make changes to other processes, programs or data on your local computer. Applications in the container are executed under a carefully selected set of privileges and write to a virtual file system and registry instead of you real system.
- This delivers a smooth user experience by letting unknown applications run as normal while denying them the potential to cause damage.
- After an unknown application has been placed in the container, CCS also submits it to Valkyrie for behavior analysis. Valkyrie tests include:
- Valkyrie plugins and embedded detectors
- Signature-based detection
- Trusted vendor and certificate validation
- If Valkyrie discovers that a file is malicious then it is added to the antivirus black list. The file is quarantined on the local machine and the user is alerted.
- Users can print documents from within the container. This is useful, for example, if a suspicious PDF has valid information that should be printed.
By uniquely deploying 'containment as security', CCS offers improved security, fewer pop-ups and greater ease of use than ever before.