revokeandkill

Overview

M5 LivePC is a PC containerization solution that uses a “Type 2” hypervisor (meaning it sits on top of an operating system installed on the device) to deliver and manage a fully configured corporate Windows workspace that is highly secure and completely isolated from the underlying host. It is a fully containerized, locally executing Windows workspace that runs locally on PCs and Macs and is managed centrally from a single console.

LivePC provides a wide range of benefits for both enterprises and their end users. Today’s Windows management challenges are numerous, but LivePC is architected to meet these challenges.

Benefits include:

  • Infrastructure cost and overhead are minimal - delivering an industry-leading TCO for endpoint management and security services
  • All endpoints – regardless of location or network - are always patched, up-to-date and highly secured
  • IT now has enhanced control over how cloud-based services and data are accessed
  • Endpoint management, governed by golden image and granular policies, is simplified and more efficient
  • Remote and contract workers are easily supported with secure access using their own laptops, without IT ever having to touch their devices
  • Users get a superior experience, and their privacy is fully respected, because IT makes no changes to the host environments
Minimal Infrastructure Up to 14,000 LivePC containers can be supported from a single 8GB management server for a very cost-effective solution for organizations of all sizes.
Local execution Users can access corporate data and applications even offline – and be productive anywhere, anytime.
Strong security Fully protects corporate workspaces from unauthorized access and malware on untrusted endpoints. Additionally, IT can wipe the encrypted container off lost or stolen devices either by sending a signal from the Moka5 Server or by setting a time bomb for offline operation.
Policy enforcement Granular policy enforcement can be executed at the organizational, group, or individual level. Policy controls can be set as desired to prohibit file transfers via USBs, drag/drop, or copy/paste from secure container to host – stopping any potential data leakage in its tracks.
Data segregation Clear separation of enterprise and personal workspaces guards against data loss while protecting corporate data and user privacy.
Layering One golden image reduces the complexity and cost of distributing and patching operating systems and applications across myriad device types while preserving user-specific data and customization.
Rejuvenation Users can recover from a malware attack (break/fix) in just minutes on their own using the rejuvenation feature, lowering tech support costs while enjoying uninterrupted productivity.
Zero touch, automatic updates System layer updates are automatic on LivePC restart, giving IT confidence that critical software is always up to date on user devices. Managing the whole process directly from one central console, IT can automatically roll back the image to the previous working version if updates fail.
Self-service provisioning Speeding user on-boarding while saving IT time and money from manual PC provisioning.

 

Capabilities

M5 LivePC is a secure container delivered to both corporate-owned and user-owned Windows and Mac computers using client-side desktop virtualization. The M5 LivePC key capabilities include:

Local execution. LivePC ensures user productivity both online and offline by granting users secure access to corporate applications and data from any Mac or Windows-based PC.
Strong security. Key protection features include:

  • Built-in host anti-malware scanning and custom check scripts to ensure compliance before allowing access to the container
  • AES-256 bit encryption of the entire container
  • Active Directory and two-factor authentication integration for access controls
  • Data leakage controls that can manage things like USB, printer, and copy/paste access from the container
  • The ability to temporarily revoke access or permanently wipe the corporate container on any endpoint
Policy-enforcement. More than 130 management and security policies on a single, unified platform that can be optimized for all enterprise environments and requirements.
Data segregation. A clear separation of enterprise and personal workspaces protects corporate data as well as user privacy.
Layering architecture. M5 layering separates a single enterprise desktop image into virtual layers that can be managed individually.

  • Dynamically composited layers provide a single unified view of the system.
  • Standardization on a golden image, also called the system layer, consisting of a Windows OS and corporate applications shared by all users.
  • Separation of user data and user-installed applications from the golden image gives end-users the ability to personalize their workspaces with user-installed applications and user-generated data.
Rejuvenation Layering enables quick self-recovery, so users can easily restore the system and user-installed application layers after a malware attack while preserving the personal data layer.
Integration REST APIs enable customers to integrate revoke, unrevoked, and kill commands in to existing tools such as Service Desk or Systems Management solutions to improve productivity while limiting full access to the M5 management console. The self-service portal for users to download and install the container can also be integrated in to any existing web portals the organization may have, giving users a “one-stop shopping” experience.
Zero touch, automatic updates of delta changes to the system layer simplify all on-going patch and corporate application updates.
Self-service provisioning M5 endpoint provisioning is designed with user self-service in mind. The easy, guided step-by-step installation process streamlines IT’s support for provisioning virtual desktop to the users. Users can download the container anywhere and they will be warned if there are hardware or BIOS configuration conflicts prior to download. Administrators can also allow users to delay update downloads if they are on a slow or cellular network.

 

System Requirements
Guest OS: Microsoft Windows XP, Microsoft Windows 7 (32 bit or 64 bit)
Host OS: Windows 7 (64 bit), Windows 8 (64 bit), Windows 8.1, Mac OS X 10.7-10.9, bare metal
Management Server: Windows Server 2008 R2 SP2, Windows Server 2012
Database: SQL Server 2008 SP3 or R2 SP2, SQL Server 2012
Creator: Windows 7 (64 bit)
App Gateway: Windows Server 2008 R2 SP2, Windows Server 2012
Image Store: Windows Server 2008 R2 SP2, Windows Server 2012 (can be combined with Management Server and SQL Server for up to 500 users)
Web Console: Chrome 28, Firefox 25, Internet Explorer 8-10, Safari 5

Moka5: Containers vs. VDI
M5 at a glance

Datasheet:

M5 LivePC - Secure PC Container for the Enterprise that Works