• 6.0
Key Points
  • Security vulnerabilities on the end-user devices can’t compromise critical data
  • Ability to configure air gap isolation between untrusted end-user devices and the organization networks

Security vulnerabilities on the end-user devices don’t have the ability to compromise important business information.


EOW ensures that the applications are executed in the organization’s data center, and that business data is secured and isolated within the organization’s premises.

If desired, a complete air gap can be forced between the user device and the business application execution environment and data domain, and that only the user interaction (mouse, keyboard, clipboard and display) is allowed through. This ensures that in case of compromise of the end-user device (virus, ransomware or other malware) is self-contained and doesn’t affect critical data or other users’ devices.

Play Video
Look Inside

Untrusted End Device