Containment - An Overview
- The
container is an isolated operating environment for unknown and
untrusted applications.
- Running
an application in the container means that it cannot make changes to
other processes, programs or data on your local computer.
Applications in the container are executed under a carefully
selected set of privileges and write to a virtual file system and
registry instead of you real system.
- This
delivers a smooth user experience by letting unknown applications
run as normal while denying them the potential to cause damage.
- After
an unknown application has been placed in the container, CCS also
submits it to Valkyrie for behavior analysis. Valkyrie tests
include:
- Valkyrie
plugins and embedded detectors
- Signature-based detection
- Trusted
vendor and certificate validation
- If
Valkyrie discovers that a file is malicious then it is added to the
antivirus black list. The file is quarantined on the local machine
and the user is alerted.
- Users
can print documents from within the container. This is useful, for
example, if a suspicious PDF has valid information that should be
printed.
By uniquely deploying 'containment
as security', CCS offers improved security, fewer pop-ups and greater
ease of use than ever before.