Product Advantages

  • On-Demand Creation

    Virtual desktops can be created on demand and are easy to manage. After desktops are created, the system sends notification emails to you.
    Virtual desktops can be created on demand and are easy to manage. After desktops are created, the system sends notification emails to you.
  • Ubiquitous Access

    Desktops can be accessed anytime, anywhere, and on any device. Workspace is compatible with all popular types of software and peripherals.
    Desktops can be accessed anytime, anywhere, and on any device. Workspace is compatible with all popular types of software and peripherals.
  • Simplified O&M

    Huawei experts are responsible for infrastructure O&M, freeing you from complex maintenance operations required by conventional PCs and VDIs.
    Huawei experts are responsible for infrastructure O&M, freeing you from complex maintenance operations required by conventional PCs and VDIs.
  • Enhanced Security

    Data is stored with multiple copies in data centers instead of user terminals, delivering better security than conventional PCs.
    Data is stored with multiple copies in data centers instead of user terminals, delivering better security than conventional PCs.

Application Scenarios

  • Mobile Office

  • Government/Enterprise Office

  • Development and Testing

  • Temporary Office

Mobile Office

Mobile Office

Delivers consistent desktop office experience no matter where you are, at home or outside the office, perfect for those on frequent business trips.

Advantages

Mobile Network Access
Access desktops from the Internet or mobile network anytime, anywhere.
Access from Various Terminals
Access desktops from PCs, tablets, and smart phones.

Related Services

Government/Enterprise Office

Government/Enterprise Office

Ensures consistent office experience for enterprise headquarters, branches, or mobile offices, and even for those who go on business trips.

Advantages

Quick Access from Branch Locations
Branches can rapidly access the unified desktop system for the office via the Internet.
Enhanced Enterprise Office Security
Enterprise data is stored in on-premises data centers only, preventing data leakage.

Related Services

Development and Testing

Development and Testing

Enables quick build of unified development and testing desktop environment using custom templates and ensures the security of R&D data.

Advantages

Unified Development and Testing Environment
Preinstall development and testing software using custom desktop images.
Isolation of Data from Clients
Source codes are not transferred to or stored on clients, reducing the risk of information leakage.

Related Services

Temporary Office

Temporary Office

Rapidly provisions desktops for temporary employees and releases the desktops when they leave. You only need to pay for what you lease for the time the resources are used.

Advantages

On-Demand Provisioning
Manage, provision, and delete desktop instances whenever you need.
Easy to Use
Perform the easy-to-follow instructions in the email to get your cloud desktops up in no time at all.

Related Services

Functions

  • Mobile Access

    Lightning-fast access to cloud desktops from mobile devices anywhere in the world.
    Lightning-fast access to cloud desktops from mobile devices anywhere in the world.
  • AD Integration

    By integrating AD domain controllers for authentication, your employees can seamlessly access internal systems.
    By integrating AD domain controllers for authentication, your employees can seamlessly access internal systems.
  • Mobile access anytime, anywhere
    Mobile access anytime, anywhere
    Cloud desktops can be accessed from the Internet, mobile network, VPN, or Direct Connect.
    Cloud desktops can be accessed from the Internet, mobile network, VPN, or Direct Connect.
  • Access from various terminals
    Access from various terminals
    You can access cloud desktops using various smart terminals, such as TCs, iPhones, iPads, Android smart phones, tablets, Windows PCs, and Mac computers.
    You can access cloud desktops using various smart terminals, such as TCs, iPhones, iPads, Android smart phones, tablets, Windows PCs, and Mac computers.
  • Interconnecting with enterprise AD
    Interconnecting with enterprise AD
    You can interconnect the existing AD system with Workspace for user authentication, keeping the existing account system unchanged. Note: This function must be used with the VPN service.
    You can interconnect the existing AD system with Workspace for user authentication, keeping the existing account system unchanged. Note: This function must be used with the VPN service.
  • Making use of LiteAD
    Making use of LiteAD
    LiteAD is a free service that provides basic catalog services and user management functions required by desktops.
    LiteAD is a free service that provides basic catalog services and user management functions required by desktops.
  • Accessing local applications and devices
    Accessing local applications and devices
    Using the VPN service, you can connect the enterprise network to the VPC so your cloud desktops in the VPC can access the enterprise's local applications and devices, such as the ERP system and local printer.
    Using the VPN service, you can connect the enterprise network to the VPC so your cloud desktops in the VPC can access the enterprise's local applications and devices, such as the ERP system and local printer.
  • Peripheral Redirection

    You can use peripheral redirection to redirect local devices to cloud desktops.
    You can use peripheral redirection to redirect local devices to cloud desktops.
  • Data Protection

    Data remains fully protected when being transferred from clients to the cloud data center.
    Data remains fully protected when being transferred from clients to the cloud data center.
  • Dedicated virtual peripheral channels
    Dedicated virtual peripheral channels
    You can seamlessly use diverse peripherals on cloud desktops using printer, clipboard, and file redirections, and others.
    You can seamlessly use diverse peripherals on cloud desktops using printer, clipboard, and file redirections, and others.
  • Peripheral port control
    Peripheral port control
    Peripheral redirection can be configured using parameters. All read-write operations can be configured on demand to suit different security demands.
    Peripheral redirection can be configured using parameters. All read-write operations can be configured on demand to suit different security demands.
  • Universal USB channels
    Universal USB channels
    Universal USB channels enable USB redirection and can be used by some dedicated peripherals for transmission.
    Universal USB channels enable USB redirection and can be used by some dedicated peripherals for transmission.
  • Data stored on the cloud
    Data stored on the cloud
    Data is not stored on user terminals, and only video and audio code streams are transmitted to clients, preventing data leakage.
    Data is not stored on user terminals, and only video and audio code streams are transmitted to clients, preventing data leakage.
  • Data HA
    Data HA
    Distributed cloud storage technology and multi-level backup ensure up to 99.9999999% data reliability.
    Distributed cloud storage technology and multi-level backup ensure up to 99.9999999% data reliability.
  • End-to-end security control
    End-to-end security control
    Workspace provides a wide array of security hardening measures, including transmission encryption, user authentication, network isolation, and port restriction.
    Workspace provides a wide array of security hardening measures, including transmission encryption, user authentication, network isolation, and port restriction.

Recommended Configurations

Standard

Task worker Public terminal

Limited application scenarios

  • CPU

    2 cores

  • Memory

    4 GB

  • System disk

    80 GB

  • Data disk

    100 GB

$52.40 USD /month

Learn more >
Advanced

Knowledge worker Heavy workload

Heavy workload scenarios

  • CPU

    4 cores

  • Memory

    8 GB

  • System disk

    80 GB

  • Data disk

    100 GB

$92.30 USD /month

Learn more >
Luxury

Software developer Heavy workload

Heavy workload/High performance scenarios

  • CPU

    8 cores

  • Memory

    16 GB

  • System disk

    80 GB

  • Data disk

    100 GB

$165.20 USD /month

Learn more >
Usage Guides

Provides Scalable, On-demand Computing Resources

Learn More