Temporary workers, short term consultants, joint ventures, mergers and acquisitions, and many other business activities require no-hassle, secure provisioning and de-provisioning to maximize efficiency and productivity. Instead of purchasing or re-imaging computers, shipping them off, and then having to get them back a short time later – why not provide these temporary workers with a virtual copy of your corporate workspace protected by a secure container running on a PC or Mac - yours or theirs?

Being able to easily create, manage, and deploy new images to every employee’s computer or device in minutes and hours not days and weeks is key for deploying new infrastructure, ensuring on-going security, and enhancing end-user productivity.

Benefits of the Moka5 for Mergers and Acquisitions, Short-term Projects, and Temp Workers:

  • Self-service provisioning. Users download the corporate workspace from anywhere through a secure web portal and can be initially provisioned and authenticated without network access (since they won’t have their secure corporate workspace to access the network until after the provisioning).
  • Reliable access control. LDAP/AD integration, two-factor authentication support ensures that you can use your existing access control processes.
  • Rejuvenation. Reduce IT support costs with ability for end users to quickly reset to a clean workspace without losing their work files.
  • Revoke / wipe. IT can remotely disable access or wipe LivePC containers or set a “time bomb” to automatically revoke access to or completely wipe a container.
  • 100% patch compliance. Disk-level delta updates to the container itself ensures all updates to the image (new software, patches, OS configuration changes) are applied correctly, the first time.
  • Locally executed. Unlike VDI, everything takes place on the user’s computer for better performance and seamless transitions between online and offline use.
  • Built-in data leak prevention. Policy-enforced container keeps corporate data separate from personal files, including the ability to prevent copy/paste, white list USB devices, and control printing.
  • Tamper-resistance and copy protection. Keep the corporate workspace from being moved or edited.