Containment - An Overview
 
 
 
  - The
	container is an isolated operating environment for unknown and
	untrusted applications. 
 
  - Running
	an application in the container means that it cannot make changes to
	other processes, programs or data on your local computer.
	Applications in the container are executed under a carefully
	selected set of privileges and write to a virtual file system and
	registry instead of you real system. 
 
  - This
	delivers a smooth user experience by letting unknown applications
	run as normal while denying them the potential to cause damage. 
 
  - After
	an unknown application has been placed in the container, XCS also
	submits it to Xcitium Verdict Cloud for behavior analysis. Verdict Cloud tests
	include:
 
     
     
     
      - Verdict Cloud plugins and embedded detectors
 
      - Signature-based detection
 
      - Trusted
	vendor and certificate validation
 
   
    - If Xcitium Verdict Cloud discovers that a file is malicious then it is added to the
	antivirus black list. The file is quarantined on the local machine
	and the user is alerted.
 
 
  - Users
	can print documents from within the container. This is useful, for
	example, if a suspicious PDF has valid information that should be
	printed.
By uniquely deploying 'containment
as security', XCS offers improved security, fewer pop-ups and greater
ease of use than ever before.