Why continue to purchase laptops for contractors, independent agents, consultants, and other long-term third party workers that most likely already have a work computer owned by their direct employer or franchise? Instead, provide them with a copy of your corporate workspace inside a secure container and eliminate the capital expense and hassle of the full PC lifecycle – acquisition, provisioning, updating, and disposal.

IT’s corporate policies regarding their organization’s contractor workforce must protect critical IP, eliminate IP/data leakage, secure corporate access, protect the network from malware infections or unauthorized intrusions, and, for corporate-owned devices, simplify endpoint management. In short – maintain centralized control while distributing trust out to the contractors.

The key to success is providing a secure, containerized workspace for easy IT management, security policy enforcement, and offline capability that is separate from the contractor’s other work or personal space.

Moka5 is the only solution available today that offers a single infrastructure for centrally managing locally-executed virtual workspaces on Windows, Macs, and bare metal. This eliminates the need for massive datacenter infrastructure, enables easy offline use of the virtual desktop, and can operate on low-bandwidth / high-latency network connections.

Moka5 enables organizations to quickly, confidently, and securely provision, and subsequently de-provision workers no matter where they are located, how they are “employed,” or who owns the device. This provides maximum workforce flexibility.

Benefits of the Moka5 for Contractors and Independent Agents:

  • Single image management. Manage and secure a single corporate workspace instead of 100’s, 1,000s, or 10,000s of endpoints, regardless of who owns the device and whether it is a Windows or a Mac PC.
  • Rejuvenation. Reduce IT support costs with ability for end users to quickly reset to a clean workspace without losing their work files.
  • Revoke / wipe. IT can remotely disable access or wipe LivePC containers or set a “time bomb” to automatically revoke access to or completely wipe a container.
  • 100% patch compliance. Disk-level delta updates to the container itself ensures all updates to the image (new software, patches, OS config changes) are applied correctly, the first time.
  • Locally executed. Unlike VDI, everything takes place on the user’s computer for better performance and seamless transitions between online and offline use.
  • Built-in anti-malware. Constantly monitor for key loggers and screen scrapers with built-in anti-malware, ensuring these cannot compromise the container without interfering with anti-malware tools on the host computer or inside the workspace.
  • Built-in data leak prevention. Policy-enforced container keeps corporate data separate from personal files, including the ability to prevent copy/paste, white list USB devices, and control printing.
  • Built-in disk encryption. AES 256 encryption of the container ensures compliance with data security standards and privacy regulations, equivalent to whole disk encryption of a corporate-managed computer.
  • Tamper-resistance and copy protection. Keep the corporate workspace from being moved or edited.
  • Reliable access control. LDAP/AD integration, two-factor authentication support ensures that you can use your existing access control processes.
  • Self-service provisioning. Users download the corporate workspace from anywhere through a secure web portal and can be initially provisioned and authenticated without network access (since they won’t have their secure corporate workspace to access the network until after the provisioning).
  • User-friendly download controls. Only push updates to users that need them, enable users to delay downloads if they need to, and ensure adequate hardware prior to download to minimize difficulties for mobile employees.