On-Demand Creation

Virtual desktops can be created on demand and are easy to manage. After desktops are created, the system sends notification emails to recipients.

Ubiquitous Access

Desktops can be accessed anytime, anywhere, and on any device. Workspace is compatible with all popular types of software and peripherals.

Simplified O&M

Huawei experts are responsible for infrastructure O&M, freeing you from complex maintenance operations required by conventional PCs and VDIs.

Enhanced Security

Data is stored with multiple copies in data centers instead of user terminals, delivering better security than conventional PCs.

Application Scenarios

  • Mobile Office

  • Government/Enterprise Office

  • Development and Testing

  • Temporary Office

Mobile Office

Mobile Office

Provides consistent desktop office experience no matter when you are at home or outside the office, perfect for those frequently on business trips.


  • Mobile Network Access

    You can access desktops from the Internet or mobile network anytime, anywhere.

  • Access from Various Terminals

    You can access desktops from PCs, tablets, and smart phones.

Related Services


Government/Enterprise Office

Government/Enterprise Office

Ensures consistent office experience for enterprise headquarters, branches, or mobile offices, and even for those who go on business trips.


  • Quick Access from Branch Locations

    Branches can rapidly access the unified desktop system for office from the Internet.

  • Enhanced Enterprise Office Security

    Enterprise data is stored in on-premise data centers only, preventing data leakage.

Related Services



Development and Testing

Development and Testing

Enables quick build of unified development and testing desktop environment using custom templates and ensures the security of R&D data.


  • Unified Development and Testing Environment

    Preinstall development and testing software using custom desktop images.

  • Isolation of Data from Clients

    Source codes are not transferred or stored to clients, reducing the risk of information leakage.

Related Services




Temporary Office

Temporary Office

Rapidly provisions desktops for temporary employees and releases the desktops when they leave. You only need to pay for what you lease for the time the resources are used.


  • On-Demand Provisioning

    Manage, provision, and delete desktop instances whenever you need.

  • Easy to Use

    Perform the easy-to-follow instructions in the email to get your cloud desktops up in no time at all.

Related Services



Remote Access

Lightning-fast access to cloud desktops from mobile devices anywhere in the world.

  • Mobile access anytime, anywhere

    Cloud desktops can be accessed from the Internet, mobile network, VPN, or Direct Connect.

  • Access from various terminals

    You can access cloud desktops using various smart terminals, such as TCs, iPhones, iPads, Android smart phones, tablets, Windows PCs, and Mac terminals.

AD Integration

By integrating AD domain controllers for authentication, your employees can seamlessly access internal systems.

  • Interconnecting with enterprise AD

    You can interconnect the existing AD system with Workspace for user authentication, keeping the existing account system unchanged. Note: This function must be used with the VPN service.

  • Accessing local applications and devices

    Using the VPN service, you can connect the enterprise network to the VPC so your cloud desktops in the VPC can access the enterprise's local applications and devices, such as the ERP system and local printer.

  • Making use of LiteAD

    LiteAD is a free service that provides basic catalog services and user management functions required by desktops.

Peripheral Redirection

You can use peripheral redirection to redirect local devices to cloud desktops.

  • Dedicated virtual peripheral channels

    You can seamlessly use diverse peripherals on cloud desktops using printer, clipboard, and file redirections, as well as others.

  • Universal USB channels

    Universal USB channels enable USB redirection and can be used by some dedicated peripherals for transmission.

  • Peripheral port control

    Peripheral redirection can be configured using parameters. All read-write operations can be configured on demand to suit different security demands.

Data Protection

Data remains fully protected when being transferred from clients to the cloud data center.

  • Data stored on the cloud

    Data is not stored on user terminals, and only video and audio code streams are transmitted to clients, preventing data leakage.

  • End-to-end security control

    Workspace provides a wide array of security enhancement measures, including transmission encryption, user authentication, network isolation, and port restriction.

  • Data HA

    Distributed cloud storage technology and multi-level backup ensure up to 99.9999999% data reliability.

Recommended Configurations


Limited application scenarios

CPU2 cores
Memory4 GB
System disk60 GB
Data disk100 GB
Task worker
Public terminal


Heavy workload scenarios

CPU4 cores
Memory8 GB
System disk60 GB
Data disk150 GB
Knowledge worker
Heavy workload


Heavy workload/High performance scenarios

CPU8 cores
Memory16 GB
System disk60 GB
Data disk200 GB
Software developer
Heavy workload