Droplet Computing was founded based on real-life customer feedback, where customers were looking at wanting to deploy any application on any device.
Droplet Never Trust for Legacy Servers
Droplet Server Containers secure legacy Windows NT, 2003, 2008 and 2012 operating systems but locking a bubble of security around the operating system that is only accessible by our client side container with encryption of the data in flight between the two to prevent any man in the middle attack vector.
All inbound ports are blocked. This means the Droplet Never Trust model protects against ransomware and zero day threats.
Want to know more?
Please contact us today for a 30 minute presentation to show how Droplet can help your organization solve the security and compliance challenges you face.
With the Droplet Computing Container App for server operating systems, an organization can easily take their business critical legacy Windows apps, install them into a container (no complicated packaging or virtualizing required), and deliver them to the end user by mean of publishing them from a server running an application publishing solution.
Why is this important to an organization?
Typically modern publishing platforms do not support legacy apps. Containerization enables an organization to move to the latest published application platforms such as Citrix Virtual Apps, Horizon Apps, RemoteApp, and other RDSH-based solutions. End users then have access to legacy, modern, and other apps that are delivered by the application platform. All delivered in a single user interface or workspace.
Droplet Computing containers require very little in the form of infrastructure, as the containers are delivered to the local device using your current deployment methods. As the container runs locally there is no requirement for large back-end servers or storage, you just need a file server on which to store your ready-built container images ready for deployment to end users.
Droplet Computing containers deliver an easy to navigate ‘app launcher’ workspace user interface, with the end users applications displayed as ’tiles’ for them to just click and run.
Installing an app into the container is a simple IT admin task. They simply point the container to the installer file for the application they want to install and follow the standard installation for that app. There is no complex packaging, sequencing, or virtualization required. It’s simply a “next, next, finish” approach.
By containerizing your Windows apps, you can now run them on the macOS unchanged, maintaining a familiar end user experience
Once containerized, applications will work cross-platform meaning you can switch between devices without having to rebuild or reinstall your applications. This means you can use the same container image on macOS, Windows, and Linux platforms.
Taking the stress out of software deployment
Enabling applications to be delivered securely, multi-platform, online and offline
Any Windows app on any device
The traditional desktop PC has changed into a laptop, Chromebook, tablet, or smartphone. However, end users want the full experience not the “cut-down” version. Droplet Computing containers enable the full version of a Windows app to be delivered to the device of choice, securely and with the familiarity and functionality the users need – even if the app is not written natively for that device.
Secure legacy server workloads
If you need to continue to run Legacy Server OS's like 2003 or 2008 isolate and secure the entire layer inside a Droplet server container to achieve compliance and significantly reduce risk scores.
Is it secure? Absolutely
Droplet Containers wrap a layer of Security around your applications blocking all inbound traffic. The security of the container is frequently penetration tested both by our customers and by independent third party experts. The last round of commissioned pen testing was conducted by the NCC Group PLC
Work online & offline seamlessly
Droplet has been designed in such a way that applications are not streamed to the target device and your installed application will continue to function when you are offline. Droplet interacts with any File sync and share program to maintain document consistency.
Be invisible to the host OS
Apps running in a Droplet Computing container are invisible to the host operating system so no longer present an attack surface.
Build once, deploy many
With your applications now containerized, you can deploy the container to as many devices as you want. Not only that, the very same container will run on a variety of different device platforms, without having to change it. For example, you could be running a Windows platform in the office and then continue from home on a Mac, using exactly the same container. Droplet integrates into any existing deployment tools such as SCCM or Endpoint Configuation Manager, Intune, Mobile Iron, FSLogix etc.
Run legacy software on all devices
Your legacy applications can simply be installed directly into the Droplet Computing container unchanged, and then delivered using the application delivery mechanism you use currently. There is no need to refactor, package, sequence, or virtualize the applications to make them work.
Upgrade Citrix farms or bring your apps to the cloud
With the Droplet multi-session container you can bring your legacy apps to a modern Citrix deployment, or any other multi session environment such as Windows Virtual Desktop. Droplet also allows you to run any apps in Azure, AWS, Google or IBM.
Take the first step. Get in touch.
Fill out the form below to request a call back:
Follow the latest releases, innovation and news
For more information check out our Resources section or follow us on social media