Endpoint management and security has become very complex over the last few decades, using multiple agents for patch, configuration, software distribution and license management, data leak prevention, and whole disk encryption. In addition, with Macs now in the enterprise and major projects like OS migrations every 5-8 years, it’s easy to see how endpoint management has created excessive operational expenses, complexity, and even caused the downtime it was supposed to prevent. This is even more complicated in lab and kiosk environments where systems need to be frequently “reset” to a clean, but secure state.

Moka5 solutions deliver user- and data-centric management and security for today’s enterprise consumer, eliminating the need to manage the endpoint itself. No more sending technicians out to kiosks or bringing laptops in from the field, spending days updating them in bulk or relying on heavy agent-based client management tools. Using Moka5 to replace endpoint management with workspace management ensures all your endpoints are up to date and secure, now – not when they happen to be in town. And with full remote wiping capability, lost or stolen devices are never a problem with Moka5.

Benefits of the Moka5 for Computer Labs & Kiosks:

  • Single image management. Manage and secure a single corporate workspace instead of 100’s, 1,000s, or 10,000s of endpoints, regardless of who owns the device and whether it is a Windows or a Mac PC.
  • Rejuvenation. Reduce IT support costs with ability for end users to quickly reset to a clean workspace without losing their work files.
  • “Instant” updates. OS and application patches, software updates, and even entirely new apps are downloaded in the background and appear “instantly” the next time the user logs in to their workspace.
  • Revoke / wipe. IT can remotely disable access or wipe LivePC containers or set a “time bomb” to automatically revoke access to or completely wipe a container.
  • 100% patch compliance. Disk-level delta updates to the container itself ensures all updates to the image (new software, patches, OS config changes) are applied correctly, the first time.
  • Clean starts. Every time a user boots up they are starting from the clean downloaded OS image, eliminating any malware that infected the OS at last use.
  • Locally executed. Unlike VDI, everything takes place on the user’s computer for better performance and seamless transitions between online and offline use.
  • Reliable access control. LDAP/AD integration, two-factor authentication support ensures that you can use your existing access control processes.