The purpose of this model is to compare the cost of ownership for the IronKey
Workspace devices for Windows to Go, Virtual Desktop Interface (VDI) solutions and
laptops for an environment in which temporary workers are provisioned for a period
of six months or three years. Please make your selections or enter values and on
the assumptions page, or simply accept the default values. A cost comparison will be
shown on the Comparison and Cost Per User pages.
BASIC ASSUMPTIONS
IRONKEY WINDOWS TO GO ASSUMPTIONS
LAPTOP ASSUMPTIONS
VDI ASSUMPTIONS
Servers to host PCs (4 CPUs/server, 4 cores/CPU)
Comparison of Cost
|
6 mo |
1 yr |
2 yr |
3 yr |
3 yr Total of Years |
IronKey |
Row 2 |
Row 3 |
Row 4 |
|
|
VDI |
Row 2 |
Row 3 |
Row 4 |
|
|
Laptop |
Row 2 |
Row 3 |
Row 4 |
|
|
IronKey Workspace W300
IronKey Workspace 300 enables users to boot a fully functioning Microsoft Windows 8.1 desktop directly from a ruggedized IronKey USB flash drive. The W300 delivers 5X the read/write speeds required for Windows To Go certification, features Microsoft BitLocker software encryption and can be easily deployed and provisioned. Centralized device management capabilities are not provided with the W300. Learn More
Read the White Paper
IronKey Workspace W500
IronKey Workspace W500 is the Windows
To Go solution protected by IronKey’s hardware encryption. It is centrally
managed and provisioned through the optional on-premise IronKey Enterprise
Management Server and Provisioning Tool. Users can depend upon the
Microsoft-certified Windows To Go solution that delivers a
Windows 8.1 desktop protected by a ruggedized IronKey USB flash drive.
Learn More
Read the White Paper
IronKey Workspace W700
IronKey Workspace W700 enables you to
deploy ruggedized, portable workspaces with confidence by delivering
military-grade security, hardware encryption, support for
CAC/PIV login and optional enterprise-class provisioning and centralized
management. IronKey Workspace W700 drives feature FIPS 140-2 Level
3 validation, so you can be confident you’re complying with regulatory
requirements for securing data.
Learn More
Read the White Paper