The best features Apache Guacamole offers, in my experience, include the documentation, which is really in-depth. The second thing is their protocols. Their protocols are really efficient, and they also gave us the ability to customize it. The speed of accessing the server and the response rate between the client and server is really fast. That's one of the best experiences, and I got the opportunity to even modify it.
I customized Apache Guacamole because, due to us being in a security business, we had to secure whatever the protocols and whatever amount of data we were sending. So I had to encrypt those protocols in between because Apache Guacamole uses a canvas type of protocol to communicate in between. I had to encrypt it, and whenever there is any amount of packet sent to the guacd server and the Apache Guacamole client, it had to be encrypted. That's what I did, and I modified those protocols.
Apache Guacamole has a really great impact on our product. The requirement our customers had was very specific in that they do not want any of the customers or any of the guests or the restriction of organizations having an agent on the system. This was a bit of a problem, due to which our market at that point was inaccessible. There was a boundary between it. Apache Guacamole helped us cross that boundary. Leveraging that technology, we were able to expand our product surface area and the customers we can access.
Apache Guacamole impacted our organization positively, as we had a particular client, not just one client, but there were a list of two to three clients for this feature. As soon as we got the requirement, we hastened our development, and as soon as the development was completed, we were able to get those contracts for their company. As soon as we got the contract, they deployed our technology and started utilizing it.
We have specific metrics regarding time saved and increased security after deploying Apache Guacamole for those clients. For example, I am a product company, a fabric clothing company, and I have some designs which I have created. If some other person comes, for example, I have brought an SOC analyst and another person who needs to access our database or servers securely to validate or do whatever work they have. But what if they are third-party services and while they are doing some proctoring or whatever they are doing, they are accessing our system? We have a need that we cannot let them access without secure access. We need to provide them secure access, and their organization has a policy that you cannot install anything on your system. What our technology did was it used blockchain and all that web3 technology. Using our technology, what the user company, the main company can do is just create a user on our portal and give them the link or our website address. They will go into the website address, enter the ID and password and all that. As soon as the security credentials are verified, they will be able to access the server securely via their web browsers. It impacted a lot, and it provided us three additional clients which were already waiting, plus more clients which we marketed to.