The purpose of this model is to compare the cost of ownership for the IronKey Workspace devices for Windows to Go, Virtual Desktop Interface (VDI) solutions and laptops for an environment in which temporary workers are provisioned for a period of six months or three years. Please make your selections or enter values and on the assumptions page, or simply accept the default values. A cost comparison will be shown on the Comparison and Cost Per User pages.

BASIC ASSUMPTIONS
$
$
IRONKEY WINDOWS TO GO ASSUMPTIONS

$
LAPTOP ASSUMPTIONS
$
$
VDI ASSUMPTIONS
Servers to host PCs (4 CPUs/server, 4 cores/CPU)
Comparison of Cost

6 mo 1 yr 2 yr 3 yr 3 yr
Total of Years
IronKey Row 2 Row 3 Row 4
VDI Row 2 Row 3 Row 4
Laptop Row 2 Row 3 Row 4

COST PER USER : 6 MONTHS


COST PER USER : 3 YEARS

IronKey Workspace W300

IronKey Workspace 300 enables users to boot a fully functioning Microsoft Windows 8.1 desktop directly from a ruggedized IronKey USB flash drive. The W300 delivers 5X the read/write speeds required for Windows To Go certification, features Microsoft BitLocker software encryption and can be easily deployed and provisioned. Centralized device management capabilities are not provided with the W300. Learn More

  Read the White Paper

IronKey Workspace W500

IronKey Workspace W500 is the Windows To Go solution protected by IronKey’s hardware encryption. It is centrally managed and provisioned through the optional on-premise IronKey Enterprise Management Server and Provisioning Tool. Users can depend upon the Microsoft-certified Windows To Go solution that delivers a Windows 8.1 desktop protected by a ruggedized IronKey USB flash drive. Learn More

  Read the White Paper

IronKey Workspace W700

IronKey Workspace W700 enables you to deploy ruggedized, portable workspaces with confidence by delivering military-grade security, hardware encryption, support for CAC/PIV login and optional enterprise-class provisioning and centralized management. IronKey Workspace W700 drives feature FIPS 140-2 Level 3 validation, so you can be confident you’re complying with regulatory requirements for securing data. Learn More

  Read the White Paper


Responsive image