Below you will find answers to some of our most commonly received questions. Click here to download an Executive Summary.
Key features of The Sixth Flag:
Encrypted user data, throw-away desktops, and patent-pending watermarking technology provide security at every turn. Read more about our Cell Structure Security model
Easy, centralized management with no software to install so that users can literally use any device with a browser.
Subscription-based billing with no hardware to purchase means a predictable budget without capital outlay.
- Proprietary Watermarking Technology
When you log in to The Sixth Flag desktop, it can be optionally "watermarked" with a uniquely identifying pattern. This pattern allows you to identify the screen session, and therefore the user and source, of any screen capture or photograph. Watermarking highly discourages data theft and helps prevent the sharing of unauthorized content. Let us show you how watermarking works and the many other ways you can use this technology.
The Sixth Flag makes sense for any organization that is looking to leverage the benefits of virtual desktops and hosted applications but desires to:
- Reduce upfront costs and move to an OpEx model with predictable economics
- Lower the total cost of ownership of virtual desktops and hosted apps
- Gain flexibility and agility, and speed their time of delivery
- Provide a great end user experiencing without sacrificing IT security and control
The Sixth Flag is a web-based, cost effective, "throw-away" desktop with exclusive watermarking capabilities for today's mobile and remote global workforce. The offering provides a unique solution specifically designed to address the increasing challenges faced by today’s distributed workforce. With nothing more than a browser, users can access their cloud-based corporate desktop, whether from a laptop, PC desktop or tablet. Because user data is not stored on the local device, loss of a device does not represent compromised sensitive company data. Using TSF’s solution, organizations can manage the configuration and software installed on the desktop, including popular office productivity and line of business applications. TSF supports a complete Microsoft-based desktop user experience, including print and file management and more.
All you need is a current web browser. At the end of every computing session, all user information is encrypted, stored and the desktop is, in effect, destroyed. Subsequently, every time you log in, you receive a fresh desktop with your data and settings intact. Any persistent threat that has found its way on to the desktop is deleted along with the desktop at the session's end.
Proprietary watermarking technology allows system administrators to uniquely identify the source of data theft through screen captures and photography. Embedding a user's identity and other data in the screen session discourages the unauthorized disclosure of proprietary information.
Contact us to see a demo of watermarking and its many uses.
The Sixth Flag Desktop as a Service is a global service.
The Sixth Flag (TSF) implements three layers of security to your virtual presence:
- At login through one-time credentials.
- During the virtual desktop session by encrypting the data that moves back and forth through the cloud.
- At logout by encrypting the stored data and destroying the virtual desktop after each use. By destroying the workspace after logout, you close the door on attacks and destroy any persistent threat that may have made it onto the desktop.
Yes. Users work with a full WindowsTM desktop.
Access your TSF Desktop from any computer, laptop, or tablet that has internet access. The only requirement is a current internet browser. User desktops follow the user, not the device. Devices can be procured either by the technology team or by each individual user, saving the both the user and the IT team procurement time and shipping costs.
Users' devices never need to be handled by you since the company software and security settings are centrally managed in the cloud.
As part of your subscription, we handle your desktop operating license requirements. Because of Microsoft licensing constraints, the desktop operating system is actually a server license, but we have not encountered any significant limitations resulting from this. Users will experience their desktop in a manner that is consistent with what they are used to.
Please contact us if you need further information.