Specifications
Copyright © 2007 VMware, Inc. All rights reserved. 3
Pocket ACE Guide
Hardwareindependence.
Nativeapplicationcompatibility.ApplicationsinstalljustastheydoonaPC.
FIPS1402‐compliantdataandconfigurationencryption.Dataisfullyencryptedatalltimes.
Theabilitytosuspend,resume,andsnapshot.
Robustpolicymanagementincludingaccess,network,anddevicerights.
AbilitytodeployinstancestoPCsandlaptops,notjustportablemediadrives.
Robustmanagementtoolsforcreating,packaging,deploying,andmanagingACEinstances.
Examples Use Cases for Pocket ACE
ThefollowingsectionsdescribeexampleusesforPocketACEs.
Providing Secure Remote Access for Users Working Remotely Using Untrusted Hosts
Providingremoteaccessforemployeeswhoworkfromhomeintoday’senterpriseisnotuncommon.Itisalso
notuncommonfortheusertouseapersonallyownedcomputerforaccessingenterpriseresourcesremotely.
Typically,thisishandledonalaptopordesktopPCusingaweb‐basedSSLVPNsolution
oralocallyinstalled
VPNclient.Providingremoteaccessfromuntrustedorunmanagedclientsintroducesinherentrisktothe
enterprise.Unmanagedclientscanbeinfectedbymalwareorspyware.Inaddition,thereisariskoflostdata
ifaremoteuserweretodownloadsensitivedatatoapersonal
computer.Thereisalsotheaddedburdenof
deployingandmanagingthesoftwareneededbyremoteusers.
UsingPocketACE,ITadministratorscandeployatrusted,managed,andmoresecurevirtualdesktopinstance
toremoteusersneedingaccessfromuntrustedclients.ThevirtualdiskofthePocketACEcanbeencrypted
to
minimizetheriskoflostdata.Bysettingspecificnetworkquarantinepolicies,administratorscanstrictly
controltrafficbetweentheuntrustedclientandPocketACEinstance,protectingtheenterprisefromcreating
acompromisedhost.
Increasing the Security and Mobility of Mobile Users
Mobileusersintheenterpriseintroducethehighestriskoflosingsensitivedata.Mobileusersoftenaccessor
carrysensitivedataoutsidetheenterpriseusinglaptopsorothermobiledevices.ThequestionforIT
organizationsisnotif,butwhen,amobileuser’slaptopwillbelostorstolen,leadingto
thelossofsensitiveor
confidentialdata.
UsingPocketACEtodeployadesktopenvironmenttomobileusers,ITadministratorscanreducetheriskof
lostdatawhilealsoincreasingusers’mobility.Adesktopinstancewithanencrypteddiskcanbedeployedto
mobileusers,reducingtheriskofdata
beinglostorstolen.UsingtheACEManagementServer,alostorstolen
PocketACEcanbedisabledremotely.Inaddition,thePocketACEinstancecanbeusedwithanysupported
x86systembymobileusers,furtherincreasingtheirmobility.
Providing Temporary Access to Contract Workers Using Untrusted Hosts
Moreandmoreoften,contractorsorbusinesspartnersareconnectingtotheenterprisenetworkfrom
unknownoruntrustedclients.PocketACEcanbeusedtoprovideastandardized,trusted,andmanaged
environmenttotheseuserswhileenablingsafeconnectivitytoenterpriseresources.Forcontractors,thePocket
ACEinstancecanbeconfigured
tobeavailableonlyduringthelengthofthecontract.Whentheexpiration
timeisreached,thecontractorcannolongerusethePocketACEinstance.
Providing Access to Offshore Outsource Partners
Typically,offshorepartnersmanageandownthedesktopsystemstheyuse.Becausetheseresourcesare
ownedbyanoutsideorganization,theydonotfallunderstandardITpolicy.Insomecases,desktopsystems
arepurchased,imaged,andshippedtoanoffshorepartnerforaccessingtheenterprise.Thisisoftenalengthy
andcostlyprocess.