Without something like ACE, a company would have to supply a remote user or contractor with an entirely separate computer, Mullany said.
"It allows you to completely control the user environment at a very fundamental level," he said.
To keep proprietary information from spreading to computers outside a company, ACE can be configured to block access to USB memory devices, floppy drives, printers or other devices that could be used to save or print information stored on corporate networks. In addition, it enables outsiders use a company's approved software collection, making it harder for foreign computers to infect corporate networks with viruses or other dangerous software.
The link for this article located at Stephen Shankland CNET News.com is no longer available.