Droplet - Solving Application Compatibility Issues on Desktops or Servers
Droplet is an application containerisation solution that allows you to migrate your users to Windows 10, 11 or Server 2022 without worrying about application compatibility issues. 16Bit and 32Bit applications can be securely locally run or via a browser, maintaining your user experience and application functionality.
Features
- Browser based application containerisation
- Droplet hosted applications to work offline
- Transfer Windows NT, XP and W7 applications to Droplet
- 16Bit and 32Bit applications run on 64Bit Windows 10
- Interaction with Desktop can be restricted
- Standardise your applications across Windows and Android
- Droplet container can be time limited for restricted applications
Benefits
- Applications transfered to droplet can be hosted on any OS
- Offline operation and file sync when on network
Pricing
£12.95 to £25.90 a user a month
- Education pricing available
- Free trial available
Service documents
Request an accessible format
Framework
G-Cloud 13
Service ID
9 5 4 8 8 7 3 5 8 9 9 4 2 8 3
Contact
APPTechnology
Martin Sweeney
Telephone: 0207 469 4053
Email: martin.sweeney@apptechnology.co.uk
Service scope
- Service constraints
- None
- System requirements
- Buyer can supply own OS licensing for internal container use
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- 24 / 7 support
- User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- WCAG 2.1 AA or EN 301 549
- Phone support
- Yes
- Phone support availability
- 24 hours, 7 days a week
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
-
Technical account manager appointed to subscription customers.
Various support models available based on application function and business criticality, on a per customer basis. - Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- Implementation training is given to transfer solution administration and application onboarding to customers resources. Additional professional services are available for onboarding of applications to the Droplet container.
- Service documentation
- Yes
- Documentation formats
- End-of-contract data extraction
- Droplet subscription licensing controls the containers access, access to the droplet container is removed once subscription finishes.
- End-of-contract process
- No offboarding costs are involved.
Using the service
- Web browser interface
- No
- API
- No
- Command line interface
- No
Scaling
- Scaling available
- Yes
- Scaling type
- Automatic
- Independence of resources
- Each Droplet container is processed locally on the user machine / hardware. Additional user demand does not impact on the users service.
- Usage notifications
- Yes
- Usage reporting
Analytics
- Infrastructure or application metrics
- No
Resellers
- Supplier type
- Reseller providing extra support
- Organisation whose services are being resold
- APP-UX Limited
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- Up to Security Clearance (SC)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Supplier-defined controls
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- Another external penetration testing organisation
- Protecting data at rest
- Other
- Other data at rest protection approach
- Browser based container is temporary and session terminates on application closure.
- Data sanitisation process
- No
- Equipment disposal approach
- In-house destruction process
Backup and recovery
- Backup and recovery
- No
Data-in-transit protection
- Data protection between buyer and supplier networks
- Private network or public sector network
- Data protection within supplier network
- IPsec or TLS VPN gateway
Availability and resilience
- Guaranteed availability
- Once distributed from the cloud, Droplet application containers do not require connectivity, therefore are not subject to uptime guarantee limits.
- Approach to resilience
- Once distributed, Droplet application containers can operate offline. based on specific configuration any changes to an application's data can be synced to your environment when the hardware connects to your physical network.
- Outage reporting
- No
Identity and authentication
- User authentication
- Username or password
- Access restrictions in management interfaces and support channels
- Supplier-defined controls
- Access restriction testing frequency
- At least once a year
- Management access authentication
- Username or password
- Devices users manage the service through
- Directly from any device which may also be used for normal business (for example web browsing or viewing external email)
Audit information for users
- Access to user activity audit information
- You control when users can access audit information
- How long user audit data is stored for
- Between 6 months and 12 months
- Access to supplier activity audit information
- You control when users can access audit information
- How long supplier audit data is stored for
- Between 6 months and 12 months
- How long system logs are stored for
- Between 6 months and 12 months
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- No
- Cyber essentials plus
- Yes
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- No
- Security governance approach
- Cyber Essential Plus and internal standards
- Information security policies and processes
-
As Droplet application containers are hosted on a user hardware, we do not store or process any customer data.
Internal policies and processes are supplier defined controls.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
- Supplier-defined controls
- Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
- Supplier-defined controls
- Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
- Supplier-defined controls
- Incident management type
- Supplier-defined controls
- Incident management approach
- Supplier-defined controls
Secure development
- Approach to secure software development best practice
- Supplier-defined process
Separation between users
- Virtualisation technology used to keep applications and users sharing the same infrastructure apart
- No
Energy efficiency
- Energy-efficient datacentres
- No
Social Value
- Fighting climate change
-
Fighting climate change
As per APPtechnology Environmental, Sustainability and Waste Policy v2 May 2021 - Covid-19 recovery
-
Covid-19 recovery
As per APPtechnology Business Continuity Plan v4 May 2021 - Tackling economic inequality
-
Tackling economic inequality
The Company has formulated a policy called “Remuneration Policy” to ensure the payment of equitable, competitive remuneration to all Directors, Key Managerial Personnel and employees of the Company which is based on individual performance, Company’s benchmark, Industry practices and performance of the Company as a whole. - Equal opportunity
-
Equal opportunity
As per APPtechnology Equal Opportunities Policy v2 May 2021
Pricing
- Price
- £12.95 to £25.90 a user a month
- Discount for educational organisations
- Yes
- Free trial available
- Yes
- Description of free trial
- Limited PoC at no cost