7 Delicious Layers of Enterprise End-User Computing Security You Need to be Considering

Here’s how we look at the seven layers of security:


Security Layer #1 – Anti-Virus Scan of Host PC
Malware has become increasingly vicious and an attack can instantly cripple an organization and cost millions of dollars to clean up. In order support this need, Moka5 partnered with security leader AVG. Moka5’s built-in AVG anti-virus constantly monitors for key loggers and screen scrapers, and ensues that these are not present on the host computer at startup.

Security Layer #2 – Full Virtual Machine Encapsulation
With full virtual machine encapsulation, a policy-enforced container keeps corporate data separate from personal files. Although the virtual machine “borrows” what it physically needs from the host (CPU, RAM, keyboard, mouse, monitor, etc.), the operating system, applications and data are kept separate. Not only does this prevent viruses and malware on the host from infecting the container, but it also helps eliminate data leaks and IP loss.

Security Layer #3 – AES-256 Encryption
If encryption is enabled, Moka5 will encrypt all LivePC containers using AES (128-bit or 256-bit) encryption. AES-256 encryption of the container ensures compliance with data security standards and privacy regulations.

Security Layer #4 – Tamper Resistance and Copy Protection
Taper-resistance and copy protection keep the container itself or its metadata from being moved or edited.

Security Layer #5 – Active Directory credentials or Two-Factor Authentication
LDAP/AD integration and two-factor authentication support ensures that you can use your existing access control processes.

Security Layer #6 – Seamless Updates and Granular Policies
130+ granular security policies give IT full control over the container, allowing them to configure data security in the way that best meets their unique requirements. These security protections can be tailored for specify users or applied across an entire organization.

Security Layer #7 – Remote Kill
The ability to remote revoke or remote kill allows IT to wipe the encrypted container from lost or stolen devices over the Internet or though a timeout mechanism.


Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )


Connecting to %s

%d bloggers like this: