Simplified Workspace Security
Despite all the regulations, tools, advice, and security frameworks; organizations are still experiencing loss of valuable, sensitive data – many times due to basic failures such as patching. As device ownership and location becomes ever more confused, it is time to take a new approach to reduce risks, ensure compliance, and enable new business practices.
Most available solutions come up short on a number of fronts: they focus exclusively on either PCs or phones/tablets and cram so many agents trying to manage the physical device and all its parameters that it severely impacts user productivity. Moreover, neither type of solution effectively isolates personal data and applications from corporate ones during actual use.
Moka5 takes a radically different approach by focusing on managing and securing only corporate data and applications, never relying on the state of the physical device for protection.
Moka5 solutions simplify IT security by providing a secure desktop container for a fully-configured, managed, and encrypted corporate workspace. Because Moka5 assumes the host is never trustworthy, it’s architected to keep out malware and viruses that may reside on that host. Moreover, Moka5 fully isolates corporate data and applications from the personal, making it easier to minimize data leakage and implement initiatives such as a secure BYOD/PC program. In addition, Moka5 enables secure access to corporate data across multiple devices regardless of network. Whether using public internet or private VPN, all browser sessions and data are fully-encrypted ensuring all transactions remain secure.
Benefits of the Moka5 for Simplified Workspace Security:
- Built-in anti-malware. Constantly monitor for key loggers and screen scrapers with built-in anti-malware, ensuring these cannot compromise the container without interfering with anti-malware tools on the host computer or inside the workspace.
- Built-in data leak prevention. Policy-enforced container keeps corporate data separate from personal files, including the ability to prevent copy/paste, white list USB devices, and control printing.
- Built-in disk encryption. AES 256 encryption of the container ensures compliance with data security standards and privacy regulations, equivalent to whole disk encryption of a corporate-managed computer.
- Tamper-resistance and copy protection. Keep the corporate workspace from being moved or edited.
- Reliable access control. LDAP/AD integration, two-factor authentication support ensures that you can use your existing access control processes.
- Revoke / wipe. IT can remotely disable access or wipe LivePC containers or set a “time bomb” to automatically revoke access to or completely wipe a container.
- 100% patch compliance. Disk-level delta updates to the container itself ensures all updates to the image (new software, patches, OS configuration changes) are applied correctly, the first time, to every workspace.