<s>
Ceedo	B-Application
is	O
a	O
cybersecurity	O
company	O
based	O
in	O
Netanya	O
,	O
Israel	O
.	O
</s>
<s>
Ceedo	B-Application
uses	O
software	B-Operating_System
virtualization	I-Operating_System
technologies	I-Operating_System
to	O
create	O
application	O
containers	O
,	O
claiming	O
to	O
eliminate	O
or	O
reduce	O
endpoint	O
security	O
threats	O
like	O
viruses	O
or	O
ransomware	O
.	O
</s>
<s>
Ceedo	B-Application
Technologies	O
was	O
originally	O
founded	O
as	O
a	O
software	O
virtualization	O
platform	O
by	O
Dror	O
Wettenstein	O
in	O
2005	O
.	O
</s>
<s>
Since	O
then	O
,	O
Ceedo	B-Application
has	O
been	O
using	O
virtualization	O
technology	O
to	O
make	O
productivity	B-Application
tools	I-Application
for	O
individual	O
and	O
enterprise	O
use	O
.	O
</s>
<s>
Ceedo	B-Application
Personal	O
was	O
a	O
portable	O
operating	O
system	O
that	O
allowed	O
users	O
to	O
carry	O
applications	O
on	O
portable	O
media	O
(	O
such	O
as	O
USB	O
flash	O
drives	O
and	O
pocket	O
hard	O
drives	O
)	O
,	O
running	O
them	O
inside	O
a	O
virtual	O
environment	O
,	O
while	O
using	O
resources	O
from	O
the	O
host	O
PC	O
(	O
screen	O
,	O
processing	O
power	O
,	O
drives	O
,	O
internet	O
connection	O
,	O
printers	O
)	O
.	O
</s>
<s>
Ceedo	B-Application
Personal	O
has	O
been	O
licensed	O
by	O
consumer	O
storage	O
vendors	O
including	O
Lexar	O
,	O
Seagate	O
,	O
Verbatim	O
,	O
Maxell	O
,	O
ExcelStor	O
,	O
Venzero	O
and	O
others	O
.	O
</s>
<s>
Ceedo	B-Application
Personal	O
has	O
often	O
been	O
compared	O
to	O
another	O
product	O
,	O
U3	B-Application
,	O
similar	O
in	O
both	O
appearance	O
and	O
functionality	O
.	O
</s>
<s>
Introduced	O
in	O
2008	O
,	O
Ceedo	B-Application
Enterprise	O
was	O
a	O
version	O
of	O
Ceedo	B-Application
platform	O
designed	O
for	O
business	O
use	O
and	O
included	O
remote	O
management	O
capabilities	O
.	O
</s>
<s>
Ceedo	B-Application
Enterprise	O
was	O
designed	O
to	O
be	O
carried	O
primarily	O
on	O
encrypted	O
hardware	O
and	O
could	O
have	O
been	O
customized	O
and	O
pre-configured	O
.	O
</s>
<s>
Ceedo	B-Application
and	O
Citrix	B-Application
partnered	O
in	O
2008	O
to	O
create	O
a	O
portable	O
version	O
of	O
the	O
Citrix	B-General_Concept
XenApp	I-General_Concept
client	O
.	O
</s>
<s>
After	O
several	O
years	O
of	O
hiatus	O
,	O
Ceedo	B-Application
resumed	O
operations	O
in	O
2016	O
.	O
</s>
<s>
Ceedo	B-Application
has	O
several	O
patents	O
pending	O
for	O
its	O
virtualization	O
technology	O
.	O
</s>
<s>
Ceedo	B-Application
claims	O
to	O
protect	O
computers	O
from	O
being	O
compromised	O
(	O
from	O
both	O
known	O
and	O
unknown	O
malware	O
threats	O
,	O
including	O
zero-day	O
attacks	O
)	O
by	O
using	O
application	O
containers	O
.	O
</s>
<s>
Ceedo	B-Application
utilizes	O
application	O
containerization	O
technology	O
and	O
context-based	B-Protocol
access	I-Protocol
controls	I-Protocol
to	O
isolate	O
web-facing	O
applications	O
and	O
attempt	O
to	O
completely	O
separate	O
all	O
untrusted	O
content	O
from	O
the	O
host	O
.	O
</s>
<s>
Potential	O
malware	O
execution	O
is	O
privilege-restricted	O
that	O
way	O
and	O
confined	O
only	O
to	O
the	O
isolated	O
container	O
created	O
by	O
Ceedo	B-Application
.	O
</s>
<s>
Ceedo	B-Application
's	O
context-based	B-Protocol
approach	O
determines	O
context	O
by	O
looking	O
at	O
the	O
security	O
classification	O
of	O
the	O
application/process	O
requesting	O
to	O
operate	O
on	O
a	O
file	O
,	O
the	O
file	O
on	O
which	O
it	O
is	O
requesting	O
to	O
operate	O
,	O
and	O
the	O
nature	O
of	O
the	O
operation	O
(	O
i.e.	O
</s>
<s>
From	O
this	O
context	O
,	O
Ceedo	B-Application
derives	O
the	O
permissions	O
it	O
will	O
allow	O
the	O
requesting	O
application/process	O
,	O
the	O
boundaries	O
of	O
the	O
security	O
container	O
that	O
encapsulates	O
its	O
execution	O
and	O
the	O
isolation	O
policies	O
applied	O
to	O
its	O
boundaries	O
with	O
the	O
host	O
system	O
.	O
</s>
<s>
Ceedo	B-Application
containers	O
exist	O
solely	O
on	O
the	O
host	O
and	O
use	O
only	O
local	O
resources	O
.	O
</s>
<s>
MalwareLocker	O
is	O
currently	O
the	O
only	O
Ceedo	B-Application
product	O
.	O
</s>
<s>
It	O
uses	O
Ceedo	B-Application
application	O
containers	O
to	O
create	O
an	O
isolated	O
virtual	O
environment	O
and	O
a	O
security	O
perimeter	O
around	O
the	O
application	O
and	O
related	O
data	O
.	O
</s>
<s>
Ceedo	B-Application
claims	O
to	O
have	O
a	O
partnership	O
with	O
leading	O
firms	O
in	O
Content	B-General_Concept
Disarm	I-General_Concept
&	I-General_Concept
Reconstruction	I-General_Concept
field	O
.	O
</s>
<s>
This	O
technology	O
is	O
used	O
to	O
supplement	O
Ceedo	B-Application
containers	O
and	O
allow	O
users	O
to	O
safely	O
transfer	O
files	O
downloaded	O
from	O
the	O
Internet	O
.	O
</s>
<s>
Ceedo	B-Application
Cloud	O
Management	O
System	O
is	O
a	O
web-based	O
management	O
system	O
that	O
is	O
sold	O
together	O
with	O
MalwareLocker	O
,	O
allowing	O
administrators	O
to	O
compose	O
and	O
configure	O
policies	O
for	O
MalwareLocker	O
units	O
and	O
assign	O
them	O
to	O
remote	O
users	O
from	O
a	O
central	O
location	O
.	O
</s>
