SlideShare a Scribd company logo
1 of 3
Download to read offline
Solution Brief
Hopedot VOS (Secure PC)




Business Challenge:
We all know that virus affection and assault or man-made accident may lead to
uncontrollable disaster for enterprise. Even though IT department has made great
efforts to maintain a clean intranet environment, it’s not always easy for enterprise
and staffs to avoid business information leakage or privacy exposure in this
information age, especially when USB flash drives are widely used, remote access
is available and staffs usually work on different PCs inside or outside of office.
Even worse, virus assault may cause the breakdown of system and job stagnation.



Hopedot VOS Solution:

Hopedot VOS is an ideal solution to realize secure workspace environment.

Using Hopedot VOS Security Edition, you can install and run applications, browse
the Web or email on a virtual operating system, which is completely isolated from
host PC system. No virus affection occurs by these two systems.

All private information, browse record and operation history will be stored and
encrypted in the virtual system. No footprints will be left in the host system and
trace is impossible.

Applications, files and data will be encrypted into one single file and they can only
be accessed by logging in to your Hopedot VOS account.

The data importing and exporting between the virtual system and the host system
can be managed by access control to prevent from information leakage.


                                                                                        1
Hopedot VOS supports screenlock function. No one can glance at your operating
applicants and confidential data when you have to leave for a while.


Data and files will be erased if wrong logging password continually happens to a
certain times. Thus, no leakage of information occurs even though the Hopedot
VOS enabled device is lost.




Benefits

1, Isolated virtual operating system guarantees a clean, sandboxed and secure
workspace.

2, Complete control by IT department over the managed secure workspace.
Access control to make sure company’s confidential data in safety.

3, No job stagnation during disaster recovery. Easy to re-establish a productive
desktop workspace.

4, The secure workspace is portable by installing Hopedot VOS in a storage
device. Information leakage outside of office can be avoided




                                                                                   2
Now, Try Out Hopedot VOS
To download a trial version of Hopedot VOS Security Edition, pls visit:
http://www.hopedot.com/products/download.html

To learn more about Hopedot VOS solutions and customization service, pls visit:
http://www.hopedot.com/customize.html


About Hopedot VOS
Based on virtualization, isolation, automatic recovery and encryption technology
etc., Hopedot VOS has become an ideal solution for virtual workspace. It enables
users to create a virtual environment similar to Windows OS. In this virtual
environment, users can install and run applications without any modification or
repacking. Hopedot VOS can be installed on any storage devices and then used on
any PC. Most importantly, no traces of user’s operations on Hopedot VOS will be
left so that your local system will never be affected. Having been widely applied
by consumers and enterprises worldwide, Hopedot VOS products and services is
playing an important role in mobile and secure virtualization workspace solution.



Hopedot Electronics Co., Ltd
608, Block A, No. 11,
Caipin Road, Luogang District,
Guangzhou, P.R China 510000
T: +86-20-32057518-675
Fax: +86-20-32068698
www.hopedot.com

© 2012 Hopedot Technologies, Ltd. All rights reserved.
                                                                                    3

More Related Content

Viewers also liked

Cerpen Ruang Rindu
Cerpen Ruang RinduCerpen Ruang Rindu
Cerpen Ruang Rindusri_
 
Kloning Manusia
Kloning ManusiaKloning Manusia
Kloning Manusiasri_
 
Team Building Survey Results
Team Building Survey ResultsTeam Building Survey Results
Team Building Survey Resultsalingerman
 
Bloom's taxonomy for dr mathur
Bloom's taxonomy for dr mathurBloom's taxonomy for dr mathur
Bloom's taxonomy for dr mathurDivya Gigy
 
Soksay Seminar: Religion & culture
Soksay Seminar: Religion & cultureSoksay Seminar: Religion & culture
Soksay Seminar: Religion & cultureKaye Alejandrino
 
The Nature and Structure of Language
The Nature and Structure of LanguageThe Nature and Structure of Language
The Nature and Structure of LanguageKaye Alejandrino
 
Cross CulturUnderstanding by heri
Cross CulturUnderstanding by heriCross CulturUnderstanding by heri
Cross CulturUnderstanding by heriHery Batring
 
Lesson 3: Roles of Educational Technolgy in Learning
Lesson 3:  Roles of Educational Technolgy in LearningLesson 3:  Roles of Educational Technolgy in Learning
Lesson 3: Roles of Educational Technolgy in LearningKaye Alejandrino
 

Viewers also liked (9)

Cerpen Ruang Rindu
Cerpen Ruang RinduCerpen Ruang Rindu
Cerpen Ruang Rindu
 
Kloning Manusia
Kloning ManusiaKloning Manusia
Kloning Manusia
 
Dave 3 presentation
Dave 3 presentationDave 3 presentation
Dave 3 presentation
 
Team Building Survey Results
Team Building Survey ResultsTeam Building Survey Results
Team Building Survey Results
 
Bloom's taxonomy for dr mathur
Bloom's taxonomy for dr mathurBloom's taxonomy for dr mathur
Bloom's taxonomy for dr mathur
 
Soksay Seminar: Religion & culture
Soksay Seminar: Religion & cultureSoksay Seminar: Religion & culture
Soksay Seminar: Religion & culture
 
The Nature and Structure of Language
The Nature and Structure of LanguageThe Nature and Structure of Language
The Nature and Structure of Language
 
Cross CulturUnderstanding by heri
Cross CulturUnderstanding by heriCross CulturUnderstanding by heri
Cross CulturUnderstanding by heri
 
Lesson 3: Roles of Educational Technolgy in Learning
Lesson 3:  Roles of Educational Technolgy in LearningLesson 3:  Roles of Educational Technolgy in Learning
Lesson 3: Roles of Educational Technolgy in Learning
 

Similar to Hopedot VOS secure workspace solution

Beyond BYOD
Beyond BYODBeyond BYOD
Beyond BYODWorksPad
 
Cortado Corporate Server 7.2 - EN
Cortado Corporate Server 7.2 - ENCortado Corporate Server 7.2 - EN
Cortado Corporate Server 7.2 - ENolivier lussac
 
10 Risky Employee Practices - Security solutions
10 Risky Employee Practices - Security solutions10 Risky Employee Practices - Security solutions
10 Risky Employee Practices - Security solutionsFuji Xerox Singapore
 
Hexnode Unified Endpoint Management
Hexnode Unified Endpoint ManagementHexnode Unified Endpoint Management
Hexnode Unified Endpoint ManagementHexnode
 
We don’t panic.
We don’t panic.We don’t panic.
We don’t panic.WJN
 
4 Types Of Desktop Virtualization .pdf
4 Types Of Desktop Virtualization .pdf4 Types Of Desktop Virtualization .pdf
4 Types Of Desktop Virtualization .pdfHost It Smart
 
Storware KODO - Enterprise Endpoint Data Protection v3.6
Storware KODO - Enterprise Endpoint Data Protection v3.6Storware KODO - Enterprise Endpoint Data Protection v3.6
Storware KODO - Enterprise Endpoint Data Protection v3.6Bartosz Bredy
 
Storware KODO - Enterprise Collaboration & Data Protection for mobile workforce
Storware KODO - Enterprise Collaboration & Data Protection for mobile workforceStorware KODO - Enterprise Collaboration & Data Protection for mobile workforce
Storware KODO - Enterprise Collaboration & Data Protection for mobile workforcePawel Maczka
 
Infowatch endpoint security
Infowatch endpoint securityInfowatch endpoint security
Infowatch endpoint securityhassan latifi
 
Hexnode Windows Management solution
Hexnode Windows Management solutionHexnode Windows Management solution
Hexnode Windows Management solutionHexnode
 
Android vs i os features
Android vs i os featuresAndroid vs i os features
Android vs i os featuresGuang Ying Yuan
 
Phantosys overview - Intelligent Desktop Virtualization
Phantosys overview - Intelligent Desktop VirtualizationPhantosys overview - Intelligent Desktop Virtualization
Phantosys overview - Intelligent Desktop VirtualizationJose Bittencourt
 
Cloud backup-for-endpoint-devices
Cloud backup-for-endpoint-devicesCloud backup-for-endpoint-devices
Cloud backup-for-endpoint-devicesIcomm Technologies
 
Enterprise Mobility (Admin)
Enterprise Mobility (Admin)Enterprise Mobility (Admin)
Enterprise Mobility (Admin)Microsoft
 
Comodo advanced endpoint protection
Comodo advanced endpoint protectionComodo advanced endpoint protection
Comodo advanced endpoint protectionDavid Waugh
 

Similar to Hopedot VOS secure workspace solution (20)

Windows 10: Security Focus (part II)
Windows 10: Security Focus (part II)Windows 10: Security Focus (part II)
Windows 10: Security Focus (part II)
 
BH SA A4 Brochure
BH SA A4 BrochureBH SA A4 Brochure
BH SA A4 Brochure
 
Beyond BYOD
Beyond BYODBeyond BYOD
Beyond BYOD
 
Cortado Corporate Server 7.2 - EN
Cortado Corporate Server 7.2 - ENCortado Corporate Server 7.2 - EN
Cortado Corporate Server 7.2 - EN
 
10 Risky Employee Practices - Security solutions
10 Risky Employee Practices - Security solutions10 Risky Employee Practices - Security solutions
10 Risky Employee Practices - Security solutions
 
Hexnode Unified Endpoint Management
Hexnode Unified Endpoint ManagementHexnode Unified Endpoint Management
Hexnode Unified Endpoint Management
 
We don’t panic.
We don’t panic.We don’t panic.
We don’t panic.
 
4 Types Of Desktop Virtualization .pdf
4 Types Of Desktop Virtualization .pdf4 Types Of Desktop Virtualization .pdf
4 Types Of Desktop Virtualization .pdf
 
Storware KODO - Enterprise Endpoint Data Protection v3.6
Storware KODO - Enterprise Endpoint Data Protection v3.6Storware KODO - Enterprise Endpoint Data Protection v3.6
Storware KODO - Enterprise Endpoint Data Protection v3.6
 
Storware KODO - Enterprise Collaboration & Data Protection for mobile workforce
Storware KODO - Enterprise Collaboration & Data Protection for mobile workforceStorware KODO - Enterprise Collaboration & Data Protection for mobile workforce
Storware KODO - Enterprise Collaboration & Data Protection for mobile workforce
 
Infowatch endpoint security
Infowatch endpoint securityInfowatch endpoint security
Infowatch endpoint security
 
Hexnode Windows Management solution
Hexnode Windows Management solutionHexnode Windows Management solution
Hexnode Windows Management solution
 
Android vs i os features
Android vs i os featuresAndroid vs i os features
Android vs i os features
 
unit5final
unit5finalunit5final
unit5final
 
Phantosys overview - Intelligent Desktop Virtualization
Phantosys overview - Intelligent Desktop VirtualizationPhantosys overview - Intelligent Desktop Virtualization
Phantosys overview - Intelligent Desktop Virtualization
 
Cloud backup-for-endpoint-devices
Cloud backup-for-endpoint-devicesCloud backup-for-endpoint-devices
Cloud backup-for-endpoint-devices
 
Enterprise Mobility (Admin)
Enterprise Mobility (Admin)Enterprise Mobility (Admin)
Enterprise Mobility (Admin)
 
NWSLTR_Volume8_Issue2
NWSLTR_Volume8_Issue2NWSLTR_Volume8_Issue2
NWSLTR_Volume8_Issue2
 
Comodo advanced endpoint protection
Comodo advanced endpoint protectionComodo advanced endpoint protection
Comodo advanced endpoint protection
 
Romote PC Access
Romote PC Access Romote PC Access
Romote PC Access
 

Recently uploaded

Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 

Recently uploaded (20)

Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 

Hopedot VOS secure workspace solution

  • 1. Solution Brief Hopedot VOS (Secure PC) Business Challenge: We all know that virus affection and assault or man-made accident may lead to uncontrollable disaster for enterprise. Even though IT department has made great efforts to maintain a clean intranet environment, it’s not always easy for enterprise and staffs to avoid business information leakage or privacy exposure in this information age, especially when USB flash drives are widely used, remote access is available and staffs usually work on different PCs inside or outside of office. Even worse, virus assault may cause the breakdown of system and job stagnation. Hopedot VOS Solution: Hopedot VOS is an ideal solution to realize secure workspace environment. Using Hopedot VOS Security Edition, you can install and run applications, browse the Web or email on a virtual operating system, which is completely isolated from host PC system. No virus affection occurs by these two systems. All private information, browse record and operation history will be stored and encrypted in the virtual system. No footprints will be left in the host system and trace is impossible. Applications, files and data will be encrypted into one single file and they can only be accessed by logging in to your Hopedot VOS account. The data importing and exporting between the virtual system and the host system can be managed by access control to prevent from information leakage. 1
  • 2. Hopedot VOS supports screenlock function. No one can glance at your operating applicants and confidential data when you have to leave for a while. Data and files will be erased if wrong logging password continually happens to a certain times. Thus, no leakage of information occurs even though the Hopedot VOS enabled device is lost. Benefits 1, Isolated virtual operating system guarantees a clean, sandboxed and secure workspace. 2, Complete control by IT department over the managed secure workspace. Access control to make sure company’s confidential data in safety. 3, No job stagnation during disaster recovery. Easy to re-establish a productive desktop workspace. 4, The secure workspace is portable by installing Hopedot VOS in a storage device. Information leakage outside of office can be avoided 2
  • 3. Now, Try Out Hopedot VOS To download a trial version of Hopedot VOS Security Edition, pls visit: http://www.hopedot.com/products/download.html To learn more about Hopedot VOS solutions and customization service, pls visit: http://www.hopedot.com/customize.html About Hopedot VOS Based on virtualization, isolation, automatic recovery and encryption technology etc., Hopedot VOS has become an ideal solution for virtual workspace. It enables users to create a virtual environment similar to Windows OS. In this virtual environment, users can install and run applications without any modification or repacking. Hopedot VOS can be installed on any storage devices and then used on any PC. Most importantly, no traces of user’s operations on Hopedot VOS will be left so that your local system will never be affected. Having been widely applied by consumers and enterprises worldwide, Hopedot VOS products and services is playing an important role in mobile and secure virtualization workspace solution. Hopedot Electronics Co., Ltd 608, Block A, No. 11, Caipin Road, Luogang District, Guangzhou, P.R China 510000 T: +86-20-32057518-675 Fax: +86-20-32068698 www.hopedot.com © 2012 Hopedot Technologies, Ltd. All rights reserved. 3