Cloud Laptop

Cloud Laptop is an innovative product combining cloud computing technology and terminals. Supported by the quality cloud-network and using the self-developed CLINK data transmission protocol,it is equipped with multiple data security protection mechanism,which can help to bring you safe and efficient use experience. Due to the fact that it provides one-click deployment, flexible configuration, and centralized management and control functions, Cloud Laptop is widely applied in office, education, and medical care scenarios.

  • Product Advantages
  • Features
  • Scenarios
  • Help

Product Advantages

Unified Management and Easy Maintenance

There is no need to equip dedicated front-end maintenance personnel. All Cloud Laptop maintenance operations are performed on the management console in a visualized manner. Cloud Laptop activation, system re-installation, mirror upgrade and other operations can be carried out simply at one click. The automatic batch method can realize fast and large-scale deployment.

Strengthened Security, Autonomous and Controllable

Network access uses VPC, security group, ACL, and host firewall for network isolation and access control. The firewall is used to implement security audit and monitoring.

Independent and Leading, Offering Optimal Cloud Experience

The self-developed CLINK secure transmission protocol features low latency, high image quality, and low bandwidth occupation, and can be used smoothly in weak network environments.

Access Anytime and Anywhere

Users can have quick access to cloud resources via the Cloud Laptop App on the terminal to enjoy data sharing, mobile office, entertainment and other features anytime and anywhere.

Features
Multiple Policy Combinations Cloud Laptop provides rich customized policies for various personalized needs of enterprises, which can help to simplify the management process of their IT systems, and improve the ability of information security protection.
Use of Pooled Laptop Cloud Laptop can be shared. Pooled Laptop can be used to meet resource-sharing requirements in the scenarios that do not require dedicated data of users, for example, audio-visual education rooms at school, call centers, etc.
eShield (Public Beta) eShield is specially used on Cloud Laptop to provide Internet boundary protection, which can support the unified security control for Cloud Laptop to access the Internet. eShield can function for various purposes such as intrusion prevention (IPS), Anti-Virus (AV), access control, online behavior management and VPN.
AppManager It helps enterprises’ administrators monitor the application environment on the office Cloud Laptop, manage and control Apps, and protect enterprises from the risks of information security. It is also furnished with the function of App distribution, which can help users quickly install industrial Apps.
FileCrypto FileCrypto is the first file encryption security solution for scenarios on the Cloud Laptop. The files in Cloud Laptop can be encrypted silently in real time via the highly secured encryption algorithm. It can protect the internal sensitive and confidential data files from leakage while ensuring users' normal use of Cloud Laptops.

Scenarios

< >
  • Secure Office Scenario
  • Scenarios of Outsourcing Development
  • Public Cloud Laptop Scenario
  • Mobile Office Scenarios
Scenario characteristics
  • It is necessary to restrict the behavior of employees to a certain extent so as to prevent in advance the data out of sensitive posts from security risks, and the processing of such data shall be followed by audit afterwards, which requires the support of versatile management functions.
Recommended solution
  • Cloud Laptop + management and control policies + eShield (optional, see product features for details)
Solution Advantages
  • 1. Private network and WAN are available for access on demand;
  • 2. Unauthorized devices are prevented from accessing Cloud Laptop through peripheral control policies detailed to brands and models;
  • 3. Strengthen the deterrence in advance, in-process control and post-audit to prevent information leakage by means of FileCrypto, screen watermarking, login authentication and login audit;
  • 4. Enhance the behavior control on employees taking up sensitive posts by applying components such as black/whitelist, security group, and Behavior Control;
  • 5. Provide personalized policies including clipboard permission, Cloud Laptop toolbar permission and shutdown restoration to help enterprises achieve more refined and personalized data security management;