Never-Trust vs Zero-Trust
Why Customers Choose Droplet To Replace Traditional Virtual Desktop Solutions
Secure, remote access to any x86 app, without the costs normally associated with traditional VDI
Droplet is a software based on containerisation, which creates a portable container that can be used to securely deliver any x86 Windows application to a wide range of operating systems, including Windows, MacOS, ChromeOS and Linux. Unlike similar app-delivery solutions Droplet has a very small footprint.
Key Business Benefits of Droplet
- Consistent: Same container runs unchanged on multiple platforms.
- Scalable and agile: Containers revolutionize the distribution of apps.
- Compliance: Easily achieve Cyber Essentials Plus and NIST accreditation
- Faster: Improved startup times, no hypervisor or virtual O/S required.
- Cost-effective: Lower demands on storage and compute resources.
- Easier to manage: Streamline the process of managing, reverting, and updating.
- Flexible: The flexibility to function in either a virtualised or bare-metal setting
- Secure: Securely deploy legacy or modern apps to any modern platform
Product Features and minimum hardware requirements | Droplet | App Streaming | App Packaging | VDI |
---|---|---|---|---|
Enables employees to work remotely | Y | Y | Y | Y |
Integrates with existing endpoint management solutions | Y | Y | Y | Y |
Simple Windows local desktop integration | Y | Y | Y | Y |
Deployment of modern applications | Y | Y | Y | Y |
Cross platform support (Windows, Linux, Chrome, Mac) | Y | Y | N | Y |
Encrypts all traffic between client and server (no extra cost) | Y | N | N | N |
Includes a fully configurable firewall (no extra cost) | Y | N | N | N |
100% compatibility with legacy applications | Y | N | N | N |
Supports older application frameworks (Flash, Java, .NET) | Y | N | N | N |
Zero-day and man in the middle threat protection | Y | N | N | N |
Simple setup and deployment | Y | N | N | N |
Enhanced security for legacy applications | Y | N | N | N |
Can be used to lock down users and devices (Secure BYOD) | Y | N | N | N |
Requires an internet connection, server farm and All flash SAN | N | Y | Y | Y |
Requires a connection broker at an extra cost | N | Y | Y | Y |
In Summary
Droplet can be used as a cost-effective, ultra secure method of enabling, secure remote access to any user on any device, anywhere, without the overheads or costs that you’d normally associated with deploying traditional virtual desktop solutions. And can be used as an out of the box, ready to use BYOD strategy, locking down both the user and the device and limiting what they can access and where they can go.
Keep up to date
Sign up for Droplet NeverTrust email alerts and news!