User`s manual

Workstation User’s Manual
458 VMware, Inc.
Use Cases for Pocket ACE
UsethefollowingscenariostodeterminewhentousePocketACEandwhichkindsof
policiestosetforvarioussituations:
ProvidingaccesstoemployeesworkingremotelyEmployeesoftenusetheir
ownhomecomputerforaccessingenterpriseresourcesremotely.Unmanaged
clientscanbeinfectedbymalwareorspyware.Inaddition,thereisariskoflost
dataifaremoteuserdownloadssensitivedatatoapersonalcomputer.Thereis
alsotheaddedburdenofdepl
oyingandmanagi
ngthesoftwareneededbyremote
users.
UsingPocketACE,ITadministratorscandeployatrusted,managed,andmore
securevirtualdesktopinstancetoremoteusers.ThevirtualdiskofthePocketACE
canbeencryptedtominimizetheriskoflostdata.Bysettingspec
ificnetwork
quarantinepolicies,administratorscanstrictlycontroltrafficbetweenthe
untrustedclientandPocketACEinstance,protectingtheenterprisefromcreating
acompromisedhost.
IncreasingthesecurityandmobilityofmobileusersMobileusersoftenaccess
orcarrysensitivedataoutsidetheenterpriseusinglaptopsorothermobiledevices.
ThequestionforITorganizationsisnotif,butwhen,amobileuserslaptopwillbe
lostorstolen,leadingtothelossofsensitiveorco
nfidentialdata.
UsingPocketACEtodeployadesktopenvironmenttomobileusers,IT
administratorscanreducetheriskoflostdatawhilealsoincreasingusers’mobility
becausePocketACEinstancecanbeusedwithanysupportedx86system.A
desktopinstancewithanencrypteddiskcanbedeployedtom
obileusers.Using
ACEManagementServer,alostorstolenPocketACEcanbedisabledremotely.
Providingtemporaryaccesstocontractworkersusinguntrustedhosts
Contractorsandbusinesspartnersoftenconnecttotheenterprisenetworkfrom
unknownoruntrustedclients.PocketACEcanbeusedtoprovideastandardized,
trusted,andmanagedenvironmenttotheseuserswhileenablingsafeconnectivity
toenterpriseresources.
Forcontractors,thePo
cketACEinstanc
ecanbeconfiguredtobeavailableonly
duringthelengthofthecontract.Whentheexpirationdateisreached,the
contractorcannolongerusethePocketACEinstance.