Migrating software to the latest operating systems can be a major challenge for many organisations due to software compatibility and budget, which in turn can be a headache for the infosec team and the risk and compliance manager.
For example: The latest version of Cyber Essentials v3.1 states that any unsupported software MUST be removed or isolated away from your network.
Droplets NeverTrust? approach to secure application delivery has aided many organisations in overcoming these obstacles whilst helping them achieve the highest levels of cyber certification, up to CE+ and NIST standards.
- Droplet is a software based on containerisation technology.
- We support: Windows - MacOS - ChromeOS and Linux end point operating systems.
- We can run on any cloud or hypervisor and an on premise Linux server.
- When installed we create a true isolation layer between us and the host operating system that we’re installed on.
- Our abstraction layer makes the containerised app or server ‘invisible’ to the host system.
- By default, all traffic between a Droplet client and Droplet server is encrypted.
- Droplet can be used to containerise any app or an entire server, irrespective of its age and deliver it to any endpoint device.
- Container performance is limited only by the resources of the server hardware.
- A single Droplet container can host many users and sessions, securely separated.
- Easy to deploy and less than 100MB in size using traditional methods such as SCCM etc.
- Run modern and legacy apps seamlessly from a single UI or shortcut on the user’s desktop
- Droplet securely migrates any x86 app to any supported Operating System or cloud platform.
- Droplet migrates any x86 software without the need to refactor or recode when upgrading.
- Any legacy or new app is containerised on a bit for-bit basis and occupies its own namespace.
- Host any X86-based OS securely and deliver it centrally, from the core to the edge endpoint.
- Run multiple users from minimal containers, driving concurrency for each remote container.
- The host Operating System (server or cloud) only interacts with the container on a low level.
- All handling of I/O and resource allocation, and is ‘oblivious’ to the contents of the Droplet container.
- As a result, Droplet is Cyber Essentials Plus V3.1 and NIST compliant, straight out of the box.
To arrange a demo session contact your local Droplet partner