Workstation User’s Manual
458 VMware, Inc.
Use Cases for Pocket ACE
UsethefollowingscenariostodeterminewhentousePocketACEandwhichkindsof
policiestosetforvarioussituations:
Providingaccesstoemployeesworkingremotely–Employeesoftenusetheir
ownhomecomputerforaccessingenterpriseresourcesremotely.Unmanaged
clientscanbeinfectedbymalwareorspyware.Inaddition,thereisariskoflost
dataifaremoteuserdownloadssensitivedatatoapersonalcomputer.Thereis
alsotheaddedburdenofdepl
oyingandmanagi
ngthesoftwareneededbyremote
users.
UsingPocketACE,ITadministratorscandeployatrusted,managed,andmore
securevirtualdesktopinstancetoremoteusers.ThevirtualdiskofthePocketACE
canbeencryptedtominimizetheriskoflostdata.Bysettingspec
ificnetwork
quarantinepolicies,administratorscanstrictlycontroltrafficbetweenthe
untrustedclientandPocketACEinstance,protectingtheenterprisefromcreating
acompromisedhost.
Increasingthesecurityandmobilityofmobileusers–Mobileusersoftenaccess
orcarrysensitivedataoutsidetheenterpriseusinglaptopsorothermobiledevices.
ThequestionforITorganizationsisnotif,butwhen,amobileuser’slaptopwillbe
lostorstolen,leadingtothelossofsensitiveorco
nfidentialdata.
UsingPocketACEtodeployadesktopenvironmenttomobileusers,IT
administratorscanreducetheriskoflostdatawhilealsoincreasingusers’mobility
becausePocketACEinstancecanbeusedwithanysupportedx86system.A
desktopinstancewithanencrypteddiskcanbedeployedtom
obileusers.Using
ACEManagementServer,alostorstolenPocketACEcanbedisabledremotely.
Providingtemporaryaccesstocontractworkersusinguntrustedhosts–
Contractorsandbusinesspartnersoftenconnecttotheenterprisenetworkfrom
unknownoruntrustedclients.PocketACEcanbeusedtoprovideastandardized,
trusted,andmanagedenvironmenttotheseuserswhileenablingsafeconnectivity
toenterpriseresources.
Forcontractors,thePo
cketACEinstanc
ecanbeconfiguredtobeavailableonly
duringthelengthofthecontract.Whentheexpirationdateisreached,the
contractorcannolongerusethePocketACEinstance.
Kommentare zu diesen Handbüchern