As we wade into Day 2 of VMworld 2014, the conversation will likely leave Software Defined Data Centers and move onto the more exciting (for us at least) conversation regarding securing remote clients in a highly distributed and unpredictable work … Continued
Now that employees have won the battle of the personal smartphone at work, some are now thinking about how they’d like to use their beautiful, light, powerful laptop for work too — and not worry about deleting personal files (music, … Continued
Next Generation Client Container for the Cloud-driven Mobile Enterprise Now Available for Preview (Redwood City, Calif. – Feb. 24, 2015) – Moka5, the leading provider of next generation end-user computing solutions, today announced the availability of a Tech Preview for … Continued
Code Named Warlord, Moka5 v4.1 simplifies workspace management for the mobile enterprise (Redwood City, Calif. – September 10, 2014) – Moka5, the leading provider of next generation end-user computing solutions, today announced the launch of Warlord – Moka5 version 4.1 that … Continued
Code Named Warlord, Moka5 v4.1 simplifies workspace management for the mobile enterprise (Redwood City, Calif. – September 10, 2014) – Moka5, the leading provider of next generation end-user computing solutions, today announced the launch of Warlord – Moka5 version 4.1 … Continued
July 16, 2014 08:00 AM Eastern Daylight Time REDWOOD CITY, Calif.-(BUSINESS WIRE)-Moka5, the leading provider of next generation end-user computing solutions, today announced new cloud enhancements to its core infrastructure – Moka5 Enterprise AnyWare – enabling the widest range of deployment options … Continued
Conservative estimates say 20-30% of PCs are still running Windows XP, and are running just fine even after the April 8th deadline. So what’s the worry? Patch Tuesday, of course. We’ve arrived at the first of many patch Tuesdays with … Continued
Cakes, Photoshop, enterprise end-user computing security, some things are just better with layers. Moka5 has seven layers of security, each of which increases the overall protection of the enterprise environment. Imagine an encrypted and encapsulated workspace—a container of data and … Continued
Telecommunications organizations routinely deploy remote workers using field applications on smart local devices — a situation on the rise. Already an estimated 60% or more of telecommunications workers use personal devices and computers for business, according to Telecomm Reseller (an … Continued
The BYOD/PC phenomenon is on the rise across all industries, but this is particularly true of the energy sector. According to Oil and Gas IQ (an industry research group) more than 71% of energy workers are already using personal mobile … Continued
Secure the Data, Not the Device The Moka5 design principle assumes an un-trusted host. With Moka5 Enterprise AnyWare, the corporate workspace is separated from the host and runs within a secure container protected by AES256 encryption, 130+ security policies, integration … Continued
Overview M5 BareMetal is tailor-made for organizations seeking to simplify the management and security of endpoint systems while improving IT ROI and TCO along the way. M5 BareMetal is a policy-enforced, simply managed client-based containerization solution that uses Type 1 … Continued