Go beyond Zero Trust with NeverTrust™
Secure, remote access to any x86 app, without the costs normally associated with traditional VDI
Droplet is a software based on containerisation, which creates a portable container that can be used to securely deliver any x86 Windows application to a wide range of operating systems.
Including Windows, MacOS, ChromeOS and Linux. Unlike similar app-delivery solutions Droplet has a very small footprint.

Key Business Benefits of Droplet
- Consistent: Same container runs unchanged on multiple platforms.
- Scalable and agile: Containers revolutionize the distribution of apps.
- Compliance: Easily achieve Cyber Essentials Plus and NIST accreditation
- Faster: Improved startup times, no hypervisor or virtual O/S required.
- Cost-effective: Lower demands on storage and compute resources.
- Easier to manage: Streamline the process of managing, reverting, and updating.
- Flexible: The flexibility to function in either a virtualised or bare-metal setting
- Secure: Securely deploy legacy or modern apps to any modern platform
Product Features and minimum hardware requirements | Droplet | App Streaming | App Packaging | VDI |
---|---|---|---|---|
Enables employees to work remotely | Y | Y | Y | Y |
Integrates with existing endpoint management solutions | Y | Y | Y | Y |
Simple Windows local desktop integration | Y | Y | Y | Y |
Deployment of modern applications | Y | Y | Y | Y |
Cross platform support (Windows, Linux, Chrome, Mac) | Y | Y | N | Y |
Encrypts all traffic between client and server (no extra cost) | Y | N | N | N |
Includes a fully configurable firewall (no extra cost) | Y | N | N | N |
100% compatibility with legacy applications | Y | N | N | N |
Supports older application frameworks (Flash, Java, .NET) | Y | N | N | N |
Zero-day and man in the middle threat protection | Y | N | N | N |
Simple setup and deployment | Y | N | N | N |
Enhanced security for legacy applications | Y | N | N | N |
Can be used to lock down users and devices (Secure BYOD) | Y | N | N | N |
Requires an internet connection, server farm and All flash SAN | N | Y | Y | Y |
Requires a connection broker at an extra cost | N | Y | Y | Y |
In Summary
Droplet can be used as a cost-effective, ultra secure method of enabling, secure remote access to any user on any device, anywhere, without the overheads or costs that you’d normally associated with deploying traditional virtual desktop solutions. And can be used as an out of the box, ready to use BYOD strategy, locking down both the user and the device and limiting what they can access and where they can go.
Use Case Resources
Deliver any x86 app, to any Operating System, Cloud Platform on any Hypervisor
Why Customers Choose Droplet To Replace Traditional Virtual Desktop Solutions
Droplet NeverTrust™ (beyond Zero Trust) containers can be used to securely migrate any x86 or 64-bit application to any operating system, including Windows11 and delivers them to the highest cyber accredited standards. Clients who’ve already adopted Droplet not only meet the latest cyber accreditation standards, they exceed them.
1 / Droplet containers help secure and deliver your mission critical apps.
2 / Our NeverTrust™ (beyond Zero Trust) network overlay layer controls access to your data paths.
3 / Our containers support any endpoint operating system, cloud or hypervisor.
4 / Every application is isolated away from the operating system and network.
5 / All network traffic is encrypted between our Droplet client and Droplet server
6 / By default, Droplet’s NeverTrust™ (beyond Zero Trust) perimeter layer blocks all inbound traffic.
7 / To protect your human layer, all admin rights are removed, by default.
Secure by Design ~ Droplet NeverTrust™ (beyond Zero Trust) containers is the only single security product that sits across the traditional 7 layered OSI security model.
Keep up to date
Sign up for Droplet NeverTrust email alerts and news!