Zero Trust requires Device Trust
Stealing users’ credentials is currently one of the most significant attack vectors. Even traditional multi-factor methods can often be copied or bypassed.
Use your devices as a security factor and bring your conditional access to the next level!
With deviceTRUST, you add an additional layer of security to your Zero Trust Strategy.
Context as a Factor
deviceTRUST Contextual Security is the layer to protect a company's data and resources and reduces the costs associated with managing and securing digital workspaces while keeping productivity high.
-
Real-time conditional access
Integrate deviceTRUST quick and easy into existing authentication systems without additional hardware components.
-
Context always up-to-date
Control access to workspaces, sessions and applications with deviceTRUST in real time and every situation.
-
Customizable to individual requirements
Customized configurations are provided by deviceTRUST to meet specific security and access control needs.
-
Without user interaction / distraction
Use devices as an additional layer of security with deviceTRUST and bypass classic layer-8 problems.
-
Runs exclusively in the customer's environment
Solutions are deployed exclusively within the customer's it environment, ensuring seamless integration and control.
-
Great user experience
device TRUST is a software only solution that adds great security to your users, without annoying your users with questions or interaction.
Real-Time Conditional Access
Based on your Context, deviceTRUST performs the Actions you need to protect your digital workspace
Workspaces
Use Conditional Workspace Access to control access to your digital workspaces.
Applications
Define individually which applications users are allowed to access within their digital workspaces.
Configuration
Configure users' digital workspaces beyond the standard security approach with Conditonal Configuration.
Leverage additional contextual properties from external sources for compliance reporting and enrichment of other systems.
Read more in datasheet
deviceTRUST adds an additional level of security to your Zero Trust strategy. Rich context information and multiple actions via a central management interface across all deployment methods
Download Data SheetSecurity Check - Use Case
The Security & Compliance Check offers the possibility to configure, the option that employees are only able to access their digital workspace with their devices if these are managed by the company or that critical applications can only be used if the WLAN is sufficiently encrypted.
Read more at devicetrust.comCorporate Device Detection - Use Case
Companies and institutions must often know which devices access their remote environments. These requirements can be based on external or internal regulatory requirements and extended security approaches.
Read more at devicetrust.comConditional Application Access - Use Case
Regardless of whether applications are provided remotely, locally or via the cloud, with deviceTRUST Conditional Application Access, user access to applications can be controlled at all times, including the termination of applications during a session
Read more at devicetrust.comGeolocation & Geofencing - Use Case
In a mobile work environment, employees can access their digital workspace from anywhere. But due to security and compliance reasons, some specific applications and resources should often only be used if the employee’s device is at a defined location.
Read more at devicetrust.comWorking from Home
Working from home is now an integral part of almost every employment relationship. To also guarantee productivity under this form of work, employees must be able to access all necessary applications and resources without restriction when working from home, in an identical way as when working within the company network.
Read more at devicetrust.comCooperation with External Partners - Use Case
With the deviceTRUST Contextual Security, companies can make applications and resources available to external users via the digital workspace in accordance with security and compliance requirements.
Read more at devicetrust.comBYOD for Remote Environments - Use Case
deviceTRUST allows conducting a security check of the devices used when users access the virtual workspaces environment without need of endpoint management. Thus, it can be ensured that access is only permitted if the device is in a secure state, for example, if the firewall is activated.
Read more at devicetrust.comUnauthorized USB Device - Use Case
If removable USB devices are allowed for data exchanges, there is a risk of malware getting into the company network via unknown devices.
Read more at devicetrust.comDynamic Lock Screen - Use Case
A screensaver can be used to protect digital workspaces from unauthorized access. Although only one idle time interval can be configured by default, deviceTRUST enables the dynamic configuration of different idle time intervals depending on the environment in which the employee is located.
Read more at devicetrust.comCompliance Reporting - Use Case
In addition to the active control of the digital workspace, deviceTRUST can also send any evaluated information to your individual logging system (e.g. Splunk, ELK Stack, Graylog or Azure Log Analytic). With the possibility to send the context properties to such systems, you always have visibility about the compliance status of your devices.
Find out more at devicetrust.comCompliant Backend Access - Use Case
deviceTRUST allows companies to grant administrators and external service providers fast and cost-efficient access to backend servers while complying with all security requirements – even in so-called multi-hop scenarios.
Find out more at devicetrust.comContextual Firewall Configuration - Use Case
With context-based Windows firewall , deviceTRUST can help with network (micro-) segmentation. This allows for granular network control on each machine – not only on central network components.
Read more at devicetrust.comSecure printing with Printer Mapping - Use Case
Since employees work on different devices and in several locations, printing in virtual digital workspaces represents a big challenge.
Read more at devicetrust.comSilo Optimization - Case Study
deviceTRUST Contextual Security allows to control and manage access to all applications within a few central silos based on the context. As a result, the number of different application silos can be significantly reduced, thus minimizing costs and efforts.
Read more at devicetrust.comAre you ready to optimize your Zero Trust Strategy?
We support you all the way, from the concept to implementation and operation.