Hoppa till innehåll
Context_on_white
 

Zero Trust requires Device Trust

Stealing users’ credentials is currently one of the most significant attack vectors. Even traditional multi-factor methods can often be copied or bypassed.

Use your devices as a security factor and bring your conditional access to the next level!

With deviceTRUST, you add an additional layer of security to your Zero Trust Strategy.

 

Context as a Factor

deviceTRUST Contextual Security is the layer to protect a company's data and resources and reduces the costs associated with managing and securing digital workspaces while keeping productivity high.

  • Real-time conditional access

    Integrate deviceTRUST quick and easy into existing authentication systems without additional hardware components.

  • Context always up-to-date

    Control access to workspaces, sessions and applications with deviceTRUST in real time and every situation.

  • Customizable to individual requirements

    Customized configurations are provided by deviceTRUST to meet specific security and access control needs.

  • Without user interaction / distraction

    Use devices as an additional layer of security with deviceTRUST and bypass classic layer-8 problems.

  • Runs exclusively in the customer's environment

    Solutions are deployed exclusively within the customer's it environment, ensuring seamless integration and control.

  • Great user experience

    device TRUST is a software only solution that adds great security to your users, without annoying your users with questions or interaction.

Real-Time Conditional Access

Based on your Context, deviceTRUST performs the Actions you need to protect your digital workspace

Conditional_Application_Access_white

Workspaces

Use Conditional Workspace Access to control access to your digital workspaces.

Conditional_Application_Access_white

Applications

Define individually which applications users are allowed to access within their digital workspaces.

Conditional_Configuration_white

Configuration

Configure users' digital workspaces beyond the standard security approach with Conditonal Configuration.

External_Systems
 
External Systems

Leverage additional contextual properties from external sources for compliance reporting and enrichment of other systems.

Read more in datasheet

deviceTRUST adds an additional level of security to your Zero Trust strategy. Rich context information and multiple actions via a central management interface across all deployment methods

Download Data Sheet

Security Check - Use Case

The Security & Compliance Check offers the possibility to configure, the option that employees are only able to access their digital workspace with their devices if these are managed by the company or that critical applications can only be used if the WLAN is sufficiently encrypted.

Read more at devicetrust.com

Corporate Device Detection - Use Case

Companies and institutions must often know which devices access their remote environments. These requirements can be based on external or internal regulatory requirements and extended security approaches.

Read more at devicetrust.com

Conditional Application Access - Use Case

Regardless of whether applications are provided remotely, locally or via the cloud, with deviceTRUST Conditional Application Access, user access to applications can be controlled at all times, including the termination of applications during a session

Read more at devicetrust.com

Geolocation & Geofencing - Use Case

In a mobile work environment, employees can access their digital workspace from anywhere. But due to security and compliance reasons, some specific applications and resources should often only be used if the employee’s device is at a defined location.

Read more at devicetrust.com

Working from Home

Working from home is now an integral part of almost every employment relationship. To also guarantee productivity under this form of work, employees must be able to access all necessary applications and resources without restriction when working from home, in an identical way as when working within the company network.

Read more at devicetrust.com

Cooperation with External Partners - Use Case

With the deviceTRUST Contextual Security, companies can make applications and resources available to external users via the digital workspace in accordance with security and compliance requirements.

Read more at devicetrust.com

BYOD for Remote Environments - Use Case

deviceTRUST allows conducting a security check of the devices used when users access the virtual workspaces environment without need of endpoint management. Thus, it can be ensured that access is only permitted if the device is in a secure state, for example, if the firewall is activated.

Read more at devicetrust.com

Unauthorized USB Device - Use Case

If removable USB devices are allowed for data exchanges, there is a risk of malware getting into the company network via unknown devices.

Read more at devicetrust.com

Dynamic Lock Screen - Use Case

A screensaver can be used to protect digital workspaces from unauthorized access. Although only one idle time interval can be configured by default, deviceTRUST enables the dynamic configuration of different idle time intervals depending on the environment in which the employee is located.

Read more at devicetrust.com

Compliance Reporting - Use Case

In addition to the active control of the digital workspace, deviceTRUST can also send any evaluated information to your individual logging system (e.g. Splunk, ELK Stack, Graylog or Azure Log Analytic). With the possibility to send the context properties to such systems, you always have visibility about the compliance status of your devices.

Find out more at devicetrust.com

Compliant Backend Access - Use Case

deviceTRUST allows companies to grant administrators and external service providers fast and cost-efficient access to backend servers while complying with all security requirements – even in so-called multi-hop scenarios.

Find out more at devicetrust.com

Contextual Firewall Configuration - Use Case

With context-based Windows firewall , deviceTRUST can help with network (micro-) segmentation. This allows for granular network control on each machine – not only on central network components.

Read more at devicetrust.com

Secure printing with Printer Mapping - Use Case

Since employees work on different devices and in several locations, printing in virtual digital workspaces represents a big challenge.

Read more at devicetrust.com

Silo Optimization - Case Study

deviceTRUST Contextual Security allows to control and manage access to all applications within a few central silos based on the context. As a result, the number of different application silos can be significantly reduced, thus minimizing costs and efforts.

Read more at devicetrust.com

Are you ready to optimize your Zero Trust Strategy?

We support you all the way, from the concept to implementation and operation.

Let´s get in touch!