Droplet Computing is a software-based container solution that works by taking your apps and installing them, unchanged, inside a secure, and isolated containerized environment. In turn, this containerized environment is portable and can be delivered to your device regardless of OS, executing locally and offline. Alternatively it can be delivered using Windows app publishing solutions for multi-user deployments.

Droplet Computing greatly simplifies and reduces the cost of delivering applications by achieving three things:
Compatibility
Droplet Containers run any Windows compatible generation of software application. So the legacy applications that your business still needs to run that run on Dos, Win XP or 7 will be able to seamless run on any platform Droplet supports.
Security
Droplet Containers wrap a layer of Security around your applications blocking all inbound traffic. The security of the container is frequently penetration tested both by our customers and by independent third party experts.
Compliance
Droplet works closely with its customers to help them achieve the level of compliance required to meet such standards as NIST, Cyber Essential Plus or other regulatory standards.
FEATURES
Any Windows App on Any Device
Droplet Computing containers enable the full version of a Windows app to be delivered to the device of choice, securely and with the familiarity and functionality the users need – even if the app is not written natively for that device.
Work Online & Offline Seamlessly
Droplet doesn’t stream applications to the target device, so they will continue to function when you are offline. Droplet interacts with any file sync and share program to maintain document consistency.
Be Invisible to the Host OS
Apps running in a Droplet Computing container are invisible to the host operating system, no longer presenting an attack surface.
Tried and Tested Security
Droplet Containers wrap a layer of security around your applications blocking all inbound traffic. The security of the container is frequently penetration tested by both our customers and independent third party experts.
Run legacy software on all devices
Your legacy applications can simply be installed directly into the Droplet Computing container unchanged, and then delivered using the application delivery mechanism you use currently. There is no need to refactor, package, sequence, or virtualize the applications to make them work.
Build Once, Deploy Many
With your applications containerized, you can deploy the container to as many devices as you want. Not only that, the very same container will run on a variety of different device platforms, without you having to change it. Droplet integrates into existing deployment tools such as SCCM or Endpoint Configuration Manager, Intune, Mobile Iron, FSLogix etc.
Upgrade Citrix Farms & Migrate Apps to the Cloud
With the Droplet multi-session container you can bring your legacy apps to a modern Citrix deployment, or any other multi session environment such as Windows Virtual Desktop. Droplet also allows you to run any apps in Azure, AWS, Google or IBM.
Secure Legacy Server Workloads
If you need to continue to run Legacy Server OS’s like 2003 or 2008 isolate and secure the entire layer inside a Droplet server container to achieve compliance and significantly reduce risk scores.
HOW IT WORKS
Your legacy applications can simply be installed directly into the Droplet Computing container unchanged, and then delivered using the application delivery mechanism you use currently, including virtual desktop technologies such as Microsoft WVD, Citrix Virtual Apps and Desktops and VMware Horizon View. There is no need to refactor, package, sequence, or virtualize the applications to make them work.
For maximum security for legacy client and server applications, Droplet Computing wraps a protective bubble around both the end-user applications and the tools used by administrators to manage the container. The key word here is isolation. The container runs as an app and runs the container abstracted from the host devices underlying operating system, in a similar way that an OS is abstracted from the hardware in a virtual machine environment using a hypervisor. This means that the container has no dependencies on that underlying OS and talks directly to the hardware. If the device OS becomes compromised or is attacked, (which should not happen as you would have deployed end point protection), there is no way that the container can be accessed.
