NeverTrust™ vs Zero Trust
Windows 10 support officially ends on Oct 14th, 2025, after this date, organisations will no longer receive technical support, new features, or any future security updates or fixes.
Extended security updates (ESU) are available at an extra cost, but they’ll not include any new features, and general support, which will be restricted to specific scenarios.
And, from April 2024, to attain the latest cyber certification CE v3,1 any software installed on devices that are in scope, must be supported by the vendor or must be removed or isolated away from your network. So, how does Droplet help overcome these particular challenges?
In summary
- Droplet is a software solution based on containerisation technology
- When installed we enable secure access to any x86 application or plugin
- Droplet also supports USB, serial and PCI port connectivity to OT devices
- Our portable container supports any operating system, cloud platform, or hypervisor.
- Including Windows – MacOS – ChromeOS – Linux – AWS – Azure – Google Cloud
- Droplet can securely migrate any WinXP – Win7 or Win10 apps to Win11
- Any app or plugin accessed via Droplet, can automatically pass CE-CE+ or NIS2
Droplet NeverTrust™ – Applications Delivered – Secure By Design
Droplet uses it’s built in NeverTrust™ security focused tools to migrate, protect and secure any x86 app or plugin, especially apps that may be seen as an easy target for threat actors
Our Droplet NeverTrust™ toolset includes:
- Isolation – To meet the minimum requirements of Cyber Essentials v3.1, we create an isolation layer between our container and the operating system or hypervisor we’re installed on.
- Encryption – To prevent additional security breaches, by default, we automatically encrypt all traffic between a Droplet endpoint device and our Droplet Server Appliance (DSA)
- Rights Access – Only a Droplet user can access a Droplet app, by default we block all inbound traffic, any unauthorised connection is seen as external traffic and automatically blocked.
- Privilege Access – By default, Droplet trusts nobody, every Droplet user is completely locked down and can’t add, modify or delete applications, which are streamed via our (DSA)
Droplet has already helped many organisations who’ve failed a recent cyber certification, by migrating their problem x86 apps to the latest modern day operating systems, and as a result helped them achieve the highest levels of cyber certification, up to CE – CE+ and NIS2 status.
Droplet NeverTrust™ (beyond Zero Trust) containers can be used to securely migrate any x86 or 64-bit application to any operating system.
Including Windows11 and delivers them to the highest cyber accredited standards. Clients who’ve already adopted Droplet not only meet the latest cyber accreditation standards, they exceed them.
1 / Droplet containers help secure and deliver your mission critical apps.
2 / Our NeverTrust™ (beyond Zero Trust) network overlay layer controls access to your data paths.
3 / Our containers support any endpoint operating system, cloud or hypervisor.
4 / Every application is isolated away from the operating system and network.
5 / All network traffic is encrypted between our Droplet client and Droplet server.
6 / By default, Droplet’s NeverTrust™ (beyond Zero Trust) perimeter layer blocks all inbound traffic.
7 / To protect your human layer, all admin rights are removed, by default.
Secure by Design ~ Droplet NeverTrust™ (beyond Zero Trust) containers is the only single security product that sits across the traditional 7 layered OSI security model.
Keep up to date
Sign up for Droplet NeverTrust email alerts and news!