Product Advantages
Unified Management and Easy Maintenance
There is no need to equip dedicated front-end maintenance personnel. All Cloud Laptop maintenance operations are performed on the management console in a visualized manner. Cloud Laptop activation, system re-installation, mirror upgrade and other operations can be carried out simply at one click. The automatic batch method can realize fast and large-scale deployment.
Strengthened Security, Autonomous and Controllable
Network access uses VPC, security group, ACL, and host firewall for network isolation and access control. The firewall is used to implement security audit and monitoring.
Independent and Leading, Offering Optimal Cloud Experience
The self-developed CLINK secure transmission protocol features low latency, high image quality, and low bandwidth occupation, and can be used smoothly in weak network environments.
Access Anytime and Anywhere
Users can have quick access to cloud resources via the Cloud Laptop App on the terminal to enjoy data sharing, mobile office, entertainment and other features anytime and anywhere.
Scenarios
- Secure Office Scenario
- Scenarios of Outsourcing Development
- Public Cloud Laptop Scenario
- Mobile Office Scenarios
- It is necessary to restrict the behavior of employees to a certain extent so as to prevent in advance the data out of sensitive posts from security risks, and the processing of such data shall be followed by audit afterwards, which requires the support of versatile management functions.
- Cloud Laptop + management and control policies + eShield (optional, see product features for details)
- 1. Private network and WAN are available for access on demand;
- 2. Unauthorized devices are prevented from accessing Cloud Laptop through peripheral control policies detailed to brands and models;
- 3. Strengthen the deterrence in advance, in-process control and post-audit to prevent information leakage by means of FileCrypto, screen watermarking, login authentication and login audit;
- 4. Enhance the behavior control on employees taking up sensitive posts by applying components such as black/whitelist, security group, and Behavior Control;
- 5. Provide personalized policies including clipboard permission, Cloud Laptop toolbar permission and shutdown restoration to help enterprises achieve more refined and personalized data security management;
- What is Cloud Laptop? What are the specifications of Cloud Laptop? What functions does Cloud Laptop have? more
Product Introduction
- How to download Cloud Laptop? How to use Cloud Laptop client? How to order Cloud Laptop? more
Operation Guide
- Use of Cloud Laptop GPU Use of CDA File encryption service more
Best Practices