Supported Platforms

Citrix Virtual Desktops und Apps

Citrix Virtual Desktops and Apps (CVAD) combined with Citrix Cloud provides an easy way to quickly provision virtual desktops and applications within the data center or via the cloud to enable secure remote work. Together with deviceTRUST contextual security, administrators now have a powerful new way to securely and intelligently enforce all security, compliance and regulatory requirements when accessing your environment.

Compliance check

Ensures that only devices that meet all security and compliance requirements can be used. This includes a variety of different information for compliance checking such as antivirus and firewall status, OS update status, device and user certificates, domain membership, device management server, country, etc.

Full device support

In addition to the usual operating systems such as Microsoft Windows and Apple macOS, other operating systems such as Ubuntu, IGEL OS, Unicon eLux, Apple iOS and Chrome OS are also fully supported by deviceTRUST.

Compliant application access

Apply configuration defaults and policies to control available options and resources. This makes it very easy, for example, to apply policies to control the session idle time depending on the context of access or the location-dependent connection of session printers.

Configuration defaults

Apply configuration defaults and policies to control available options and resources. This makes it very easy, for example, to apply policies to control session idle time depending on the context of access, or to connect session printers based on location.

Contextual Citrix policies

Citrix policies can be fully contextually defined to control Citrix product functionality, such as client drive mapping or copy and paste.

Real time

The deviceTRUST context is always up to date. Context changes can be detected not only during login and when reconnecting to the session, but also during the session runtime to launch predefined actions.

Diverse context

For the context definition, a variety of information from the physical device, the connected network, the location, the time of day, as well as information about the user themselves can be used. In addition, external information is supported, such as from Microsoft SharePoint lists, databases, text files, etc.

Status report

You can quickly and easily create visibility of accesses via predefined and ready-to-use dashboards for Splunk, Graylog and ELK Stack.

Works without endpoint management

deviceTRUST does not require device management, whether for corporate-owned or BYOD devices. Optionally however, the installation of our client extension can also be done via your endpoint management system.

No additional infrastructure required

No additional infrastructure is required to use deviceTRUST, whether local or cloud-based installation.

With it, deviceTRUST brings together all the context and control you need to protect your Citrix Virtual Desktops and Apps (CVAD) workspaces while providing the modern access your users demand.