SlideShare a Scribd company logo
1 of 22
Download to read offline
Sierra vApp:
Browser Isolation
2
Addressing the Modern Workforce
Web-delivered
malware
Threats in encrypted web
traffic, web-based email
Sensitive corporate
apps
Lack of control or
security over web apps,
mobile apps
High risk
access
Banks spend $ buying credit
cards from dark web, IT &
SecOps researching threats
3
What’s Needed
Seamless browser
isolation for PC and
mobile devices
Scan, detonate file
downloads; inspect SSL-
pinned sites
Security controls for
web & mobile apps
Use multi-factor auth,
geolocation, watermark
Audit trail of all user
access
Reduce risk of data leakage
without needing to integrate
MDM, VPN, server logs
4
VDI Isn’t the Solution
Expensive
VDI Shortcomings
PC apps not suited for
touch input or mobile
screen sizes
VDI = $1000/user/year
Citrix + MS CAL
Not designed for
Edge, Expensive
Cloud Hosting
1 Microsoft Desktop OS $187 per user, Citrix $100 per user
High Compute
Resources
Designed for
Windows
5
vApp Browser
Isolation
There is a solution…
6
Provide remote access to:
• Android, Apple iOS and Windows
Phone with client apps
• Any HTML 5-enabled device
vApp services hosts Linux desktop apps & Browser on remote servers
Centralize app management to:
▪ Eliminate need to install End-Point
security and other expenses
Isolation and Secure Data Storage
7
Lower TCO, Cloud, Edge & In-house
High Performance & Light weight Docker based
solution
Security like Dual Factor Authentication, 4096 SSL,
Load Balancing require expensive 3rd party solution
Optimized for B/W & Latency sensitive apps
Lower TCO. <$15 Per-User
8
Isolation and Secure Data Storage
Sierra vApp Shield
4096-bit ECDHE
Encryption
Dual factor
authentication
Sierra vApp:
• Access any where from both Mobile and
Desktop
• Integrated Solution
• Secure File transfer
End user
9
Universal Isolation solution for Desktop and
Mobile
Security
Gateway
Clients
Authentication
Server
10
Browser Isolation: Cloud & Edge Ready
• Simplified Management
and Remote
administration
• Can be deployed in the
Cloud or Edge.
• Unified solution,
allowing user to migrate
to host with closest
geographical proximity
Firewall
Management
Server Farm
Power Users
IT Admin
Kiosk User
Scale To Cloud
REST APIs
Scale To Edge
11
Browser Isolation – Scaling with Docker
• Each Instance is fully isolated with
Docker
• No host dependency
• OpenGL, Display and Audio are all
rendered within a self-contained
Image/Container
• Can be deployed in Edge for lower
latency
• Transparent HTTP Proxy Mode
• Remote Desktop Mode
Sierra-X
Pulse Audio
User Input
Camera & GPS
12
Strong Authentication
Prevent unauthorized access with:
• Client certificates
• One-time password (sent via text message)
• Restricting access based on geographic location
• Brute force login protection
• Geofencing
• Telco Network Access Check & SIM check
Ensure only legitimate users access your data
MMR, Low
Latency
And Other
Highlights
14
Video Rendered as Display -vs-
MMR
Codec
Final
Composition via
GLES API
m.youtube.com
Display Data Stream from Cloud
m.youtube.com
Codec
m.youtube.c
om
Display Data + Encoded Video in Separate Channels
m.youtube.com
Without MMR
▪ Low Quality
▪ High
Bandwidth
▪ High Server
consumption
MMR
▪ High Quality
▪ Low Bandwidth
▪ No Server Load
▪ 4K@60fps
Video
15
DTLS with Error resiliency – Low Latency
Data
Ack
N/W
Latency
Time
TCP/SSL
▪ End to End data latency
will be 2-4x higher than
network latency
▪ Doesn’t handle burst
traffic
Data
DTLS
▪ Error resiliency is built in
VMI protocol itself
▪ No re-transmission
▪ Data is delivered as quick
as possible
16
Edge Optimized
Security, Performance, Scalability
17
Cloud, Edge, In-house
WIFI,MicroCell
On-siteDevices
On-prem Server
Edge Network
(<20msec latency)
RoamingUsers
Storage,
Managemen
t
Hyper Scale Cloud for non-latency
sensitive Apps like Browser, Email
18
Best In Class Solution
Performance Features Sierraware
Low Latency <90msec
Support HW GPU P
Lower Cost with Application Virtualization P
Adaptive Frame Refresh P
30/60fps
Native Font Rendering Apps, Webpages are
identical to native Device
19
Enhanced Security
Security Features Sierraware
Integrated Antivirus P
End-to-End Certificate Pinning for Man-in-
Middle Protection
P
Client App Tampering Check P
Encrypted Server Storage P
Native Two-Factor Authentication P
Passthrough Client Certificate P Push Client Cert to
Hosted Apps automatically
Watermark P
20
User Experience
Features Sierraware
Multimedia Re-direction 4K@60fps P
Wallpaper and User profile Sync P
Virtual Launcher & Hardware Button P
Background Notifications P
Pixel Style launcher and Native
Android User experience
P
Support for I/O All native I/Os like Camera, GPS,
Touch/Tilt, Audio are supported
Support apps like Skype, Kakao P
21
Easy Administration and Flexible
Features Sierraware
Lost Device Tracking P
Zero Configuration P
Active Directory Integration P
App based policy Each app can have separate
network, geofencing policies
User session recording P
REST API for scripting P
On Demand Scaling P
22
The End
www.sierraware.com

More Related Content

What's hot

KVM-Over-IP
KVM-Over-IPKVM-Over-IP
KVM-Over-IP
Codero
 
Capstone Final Presentation
Capstone Final PresentationCapstone Final Presentation
Capstone Final Presentation
shawn kelly
 
Multi domain security-management_technical_presentation
Multi domain security-management_technical_presentationMulti domain security-management_technical_presentation
Multi domain security-management_technical_presentation
davebrosnan
 
Datasheet Kerio Control
Datasheet Kerio ControlDatasheet Kerio Control
Datasheet Kerio Control
rkoscak
 
3DConsulting_Presentation
3DConsulting_Presentation3DConsulting_Presentation
3DConsulting_Presentation
Joseph Baca
 

What's hot (20)

Sonicwall wireless & sra
Sonicwall wireless & sraSonicwall wireless & sra
Sonicwall wireless & sra
 
KVM-Over-IP
KVM-Over-IPKVM-Over-IP
KVM-Over-IP
 
Capstone Final Presentation
Capstone Final PresentationCapstone Final Presentation
Capstone Final Presentation
 
EdgeWallFlyer2016
EdgeWallFlyer2016EdgeWallFlyer2016
EdgeWallFlyer2016
 
Multi domain security-management_technical_presentation
Multi domain security-management_technical_presentationMulti domain security-management_technical_presentation
Multi domain security-management_technical_presentation
 
Bezpečnostní architektura F5
Bezpečnostní architektura F5Bezpečnostní architektura F5
Bezpečnostní architektura F5
 
Dell sonicwall connected security
Dell sonicwall connected securityDell sonicwall connected security
Dell sonicwall connected security
 
SQX Solution Day 2013 Q2 - Milestone Update
SQX Solution Day 2013 Q2 - Milestone UpdateSQX Solution Day 2013 Q2 - Milestone Update
SQX Solution Day 2013 Q2 - Milestone Update
 
Sophos Wireless Protection Overview
Sophos Wireless Protection OverviewSophos Wireless Protection Overview
Sophos Wireless Protection Overview
 
Webinar remote access_no_vpn_pitfalls_111517
Webinar remote access_no_vpn_pitfalls_111517Webinar remote access_no_vpn_pitfalls_111517
Webinar remote access_no_vpn_pitfalls_111517
 
F5 DDoS Protection
F5 DDoS ProtectionF5 DDoS Protection
F5 DDoS Protection
 
Datasheet Kerio Control
Datasheet Kerio ControlDatasheet Kerio Control
Datasheet Kerio Control
 
Sophos synchronized security in action @Netpluz CS Event Nov 2017
Sophos synchronized security in action @Netpluz CS Event Nov 2017Sophos synchronized security in action @Netpluz CS Event Nov 2017
Sophos synchronized security in action @Netpluz CS Event Nov 2017
 
DefCon 25 - The Key Management Facility of the Root Zone DNSSEC KSK
DefCon 25 - The Key Management Facility of the Root Zone DNSSEC KSKDefCon 25 - The Key Management Facility of the Root Zone DNSSEC KSK
DefCon 25 - The Key Management Facility of the Root Zone DNSSEC KSK
 
Novinky F5
Novinky F5Novinky F5
Novinky F5
 
The Future Mobile Security
The Future Mobile Security The Future Mobile Security
The Future Mobile Security
 
Check Point designing a security
Check Point designing a securityCheck Point designing a security
Check Point designing a security
 
Fortinet sandboxing
Fortinet sandboxingFortinet sandboxing
Fortinet sandboxing
 
3DConsulting_Presentation
3DConsulting_Presentation3DConsulting_Presentation
3DConsulting_Presentation
 
Business Mobility - otevřete svou mysl k tomu, co je možné
Business Mobility - otevřete svou mysl k tomu, co je možnéBusiness Mobility - otevřete svou mysl k tomu, co je možné
Business Mobility - otevřete svou mysl k tomu, co je možné
 

Similar to Sierraware browser isolation

Common DataPower use cases, incl Caching with XC-10 appliance.
Common DataPower use cases, incl Caching with XC-10 appliance.Common DataPower use cases, incl Caching with XC-10 appliance.
Common DataPower use cases, incl Caching with XC-10 appliance.
sflynn073
 
ISS SA le presenta los Escenarios para IdentityGuard de Entrust
ISS SA le presenta los Escenarios para IdentityGuard de EntrustISS SA le presenta los Escenarios para IdentityGuard de Entrust
ISS SA le presenta los Escenarios para IdentityGuard de Entrust
Information Security Services SA
 
Presentation network design and security for your v mware view deployment w...
Presentation   network design and security for your v mware view deployment w...Presentation   network design and security for your v mware view deployment w...
Presentation network design and security for your v mware view deployment w...
solarisyourep
 

Similar to Sierraware browser isolation (20)

Citrix Enterprise Access Infrastructure
Citrix Enterprise Access InfrastructureCitrix Enterprise Access Infrastructure
Citrix Enterprise Access Infrastructure
 
Desafíos de la Ciberseguridad en un ecosistema digitalmente transformado
Desafíos de la Ciberseguridad en un ecosistema digitalmente transformadoDesafíos de la Ciberseguridad en un ecosistema digitalmente transformado
Desafíos de la Ciberseguridad en un ecosistema digitalmente transformado
 
Schneider-Electric & NextNine – Comparing Remote Connectivity Solutions
Schneider-Electric & NextNine – Comparing Remote Connectivity SolutionsSchneider-Electric & NextNine – Comparing Remote Connectivity Solutions
Schneider-Electric & NextNine – Comparing Remote Connectivity Solutions
 
Dragnet overview
Dragnet overviewDragnet overview
Dragnet overview
 
Citirx Day 2013: Citrix Enterprise Mobility
Citirx Day 2013: Citrix Enterprise MobilityCitirx Day 2013: Citrix Enterprise Mobility
Citirx Day 2013: Citrix Enterprise Mobility
 
Cyberoam SSL VPN
Cyberoam SSL VPNCyberoam SSL VPN
Cyberoam SSL VPN
 
Sangfor SSL VPN Datasheet
Sangfor SSL VPN DatasheetSangfor SSL VPN Datasheet
Sangfor SSL VPN Datasheet
 
Mersive Solstice SDS Management Software
Mersive Solstice SDS Management SoftwareMersive Solstice SDS Management Software
Mersive Solstice SDS Management Software
 
Living bits and things 2013 - Using peer-to-peer and distributed technologies...
Living bits and things 2013 - Using peer-to-peer and distributed technologies...Living bits and things 2013 - Using peer-to-peer and distributed technologies...
Living bits and things 2013 - Using peer-to-peer and distributed technologies...
 
Ssl Vpn presentation at CoolTech club
Ssl Vpn presentation at CoolTech clubSsl Vpn presentation at CoolTech club
Ssl Vpn presentation at CoolTech club
 
Hypori Performance Webinar
Hypori Performance WebinarHypori Performance Webinar
Hypori Performance Webinar
 
Sunray Presentation
Sunray PresentationSunray Presentation
Sunray Presentation
 
Checkpoint Overview
Checkpoint OverviewCheckpoint Overview
Checkpoint Overview
 
Common DataPower use cases, incl Caching with XC-10 appliance.
Common DataPower use cases, incl Caching with XC-10 appliance.Common DataPower use cases, incl Caching with XC-10 appliance.
Common DataPower use cases, incl Caching with XC-10 appliance.
 
How many way to sale f5 for enterprise
How many way to sale f5 for enterpriseHow many way to sale f5 for enterprise
How many way to sale f5 for enterprise
 
ISS SA le presenta los Escenarios para IdentityGuard de Entrust
ISS SA le presenta los Escenarios para IdentityGuard de EntrustISS SA le presenta los Escenarios para IdentityGuard de Entrust
ISS SA le presenta los Escenarios para IdentityGuard de Entrust
 
ISS SA le presenta los escenarios para IdentityGuard de Entrust
ISS SA le presenta los escenarios para IdentityGuard de EntrustISS SA le presenta los escenarios para IdentityGuard de Entrust
ISS SA le presenta los escenarios para IdentityGuard de Entrust
 
What's new in Citrix XenApp 7.5 und XenDesktop 7.5?
What's new in Citrix XenApp 7.5 und XenDesktop 7.5?What's new in Citrix XenApp 7.5 und XenDesktop 7.5?
What's new in Citrix XenApp 7.5 und XenDesktop 7.5?
 
Presentation network design and security for your v mware view deployment w...
Presentation   network design and security for your v mware view deployment w...Presentation   network design and security for your v mware view deployment w...
Presentation network design and security for your v mware view deployment w...
 
Plnog 3: Zbigniew Skurczyński - Wirtualizacja i optymalizacja infrastruktury
Plnog 3: Zbigniew Skurczyński -  Wirtualizacja i optymalizacja infrastrukturyPlnog 3: Zbigniew Skurczyński -  Wirtualizacja i optymalizacja infrastruktury
Plnog 3: Zbigniew Skurczyński - Wirtualizacja i optymalizacja infrastruktury
 

More from Sierraware

More from Sierraware (9)

Cloud gaming
Cloud gamingCloud gaming
Cloud gaming
 
Moving Beyond MDM: Why Legacy Mobile Security Products Don't Work
Moving Beyond MDM: Why Legacy Mobile Security Products Don't WorkMoving Beyond MDM: Why Legacy Mobile Security Products Don't Work
Moving Beyond MDM: Why Legacy Mobile Security Products Don't Work
 
Your Shortcut to BYOD Success
Your Shortcut to BYOD SuccessYour Shortcut to BYOD Success
Your Shortcut to BYOD Success
 
Mobile Security for Banking and Finance
Mobile Security for Banking and FinanceMobile Security for Banking and Finance
Mobile Security for Banking and Finance
 
Mobile App Virtualization 101
Mobile App Virtualization 101Mobile App Virtualization 101
Mobile App Virtualization 101
 
Roadmap to Healthcare HIPAA Compliance and Mobile Security for BYOD
Roadmap to Healthcare HIPAA Compliance and Mobile Security for BYODRoadmap to Healthcare HIPAA Compliance and Mobile Security for BYOD
Roadmap to Healthcare HIPAA Compliance and Mobile Security for BYOD
 
Cut BYOD Costs Using Virtual Mobile Infrastructure - VMI
Cut BYOD Costs Using Virtual Mobile Infrastructure - VMICut BYOD Costs Using Virtual Mobile Infrastructure - VMI
Cut BYOD Costs Using Virtual Mobile Infrastructure - VMI
 
SierraVMI Virtual Mobile Infrastructure (VMI). Android-based VDI.
SierraVMI Virtual Mobile Infrastructure (VMI). Android-based VDI.SierraVMI Virtual Mobile Infrastructure (VMI). Android-based VDI.
SierraVMI Virtual Mobile Infrastructure (VMI). Android-based VDI.
 
Sierraware ARM hypervisor
Sierraware ARM hypervisor Sierraware ARM hypervisor
Sierraware ARM hypervisor
 

Recently uploaded

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Recently uploaded (20)

2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 

Sierraware browser isolation

  • 2. 2 Addressing the Modern Workforce Web-delivered malware Threats in encrypted web traffic, web-based email Sensitive corporate apps Lack of control or security over web apps, mobile apps High risk access Banks spend $ buying credit cards from dark web, IT & SecOps researching threats
  • 3. 3 What’s Needed Seamless browser isolation for PC and mobile devices Scan, detonate file downloads; inspect SSL- pinned sites Security controls for web & mobile apps Use multi-factor auth, geolocation, watermark Audit trail of all user access Reduce risk of data leakage without needing to integrate MDM, VPN, server logs
  • 4. 4 VDI Isn’t the Solution Expensive VDI Shortcomings PC apps not suited for touch input or mobile screen sizes VDI = $1000/user/year Citrix + MS CAL Not designed for Edge, Expensive Cloud Hosting 1 Microsoft Desktop OS $187 per user, Citrix $100 per user High Compute Resources Designed for Windows
  • 6. 6 Provide remote access to: • Android, Apple iOS and Windows Phone with client apps • Any HTML 5-enabled device vApp services hosts Linux desktop apps & Browser on remote servers Centralize app management to: ▪ Eliminate need to install End-Point security and other expenses Isolation and Secure Data Storage
  • 7. 7 Lower TCO, Cloud, Edge & In-house High Performance & Light weight Docker based solution Security like Dual Factor Authentication, 4096 SSL, Load Balancing require expensive 3rd party solution Optimized for B/W & Latency sensitive apps Lower TCO. <$15 Per-User
  • 8. 8 Isolation and Secure Data Storage Sierra vApp Shield 4096-bit ECDHE Encryption Dual factor authentication Sierra vApp: • Access any where from both Mobile and Desktop • Integrated Solution • Secure File transfer End user
  • 9. 9 Universal Isolation solution for Desktop and Mobile Security Gateway Clients Authentication Server
  • 10. 10 Browser Isolation: Cloud & Edge Ready • Simplified Management and Remote administration • Can be deployed in the Cloud or Edge. • Unified solution, allowing user to migrate to host with closest geographical proximity Firewall Management Server Farm Power Users IT Admin Kiosk User Scale To Cloud REST APIs Scale To Edge
  • 11. 11 Browser Isolation – Scaling with Docker • Each Instance is fully isolated with Docker • No host dependency • OpenGL, Display and Audio are all rendered within a self-contained Image/Container • Can be deployed in Edge for lower latency • Transparent HTTP Proxy Mode • Remote Desktop Mode Sierra-X Pulse Audio User Input Camera & GPS
  • 12. 12 Strong Authentication Prevent unauthorized access with: • Client certificates • One-time password (sent via text message) • Restricting access based on geographic location • Brute force login protection • Geofencing • Telco Network Access Check & SIM check Ensure only legitimate users access your data
  • 14. 14 Video Rendered as Display -vs- MMR Codec Final Composition via GLES API m.youtube.com Display Data Stream from Cloud m.youtube.com Codec m.youtube.c om Display Data + Encoded Video in Separate Channels m.youtube.com Without MMR ▪ Low Quality ▪ High Bandwidth ▪ High Server consumption MMR ▪ High Quality ▪ Low Bandwidth ▪ No Server Load ▪ 4K@60fps Video
  • 15. 15 DTLS with Error resiliency – Low Latency Data Ack N/W Latency Time TCP/SSL ▪ End to End data latency will be 2-4x higher than network latency ▪ Doesn’t handle burst traffic Data DTLS ▪ Error resiliency is built in VMI protocol itself ▪ No re-transmission ▪ Data is delivered as quick as possible
  • 17. 17 Cloud, Edge, In-house WIFI,MicroCell On-siteDevices On-prem Server Edge Network (<20msec latency) RoamingUsers Storage, Managemen t Hyper Scale Cloud for non-latency sensitive Apps like Browser, Email
  • 18. 18 Best In Class Solution Performance Features Sierraware Low Latency <90msec Support HW GPU P Lower Cost with Application Virtualization P Adaptive Frame Refresh P 30/60fps Native Font Rendering Apps, Webpages are identical to native Device
  • 19. 19 Enhanced Security Security Features Sierraware Integrated Antivirus P End-to-End Certificate Pinning for Man-in- Middle Protection P Client App Tampering Check P Encrypted Server Storage P Native Two-Factor Authentication P Passthrough Client Certificate P Push Client Cert to Hosted Apps automatically Watermark P
  • 20. 20 User Experience Features Sierraware Multimedia Re-direction 4K@60fps P Wallpaper and User profile Sync P Virtual Launcher & Hardware Button P Background Notifications P Pixel Style launcher and Native Android User experience P Support for I/O All native I/Os like Camera, GPS, Touch/Tilt, Audio are supported Support apps like Skype, Kakao P
  • 21. 21 Easy Administration and Flexible Features Sierraware Lost Device Tracking P Zero Configuration P Active Directory Integration P App based policy Each app can have separate network, geofencing policies User session recording P REST API for scripting P On Demand Scaling P