Blog Check out our blog to learn more about our company and how you can use your devices as a security factor
- All
- General
- Use Case

Protection Against “Layer 8” – How deviceTRUST Increases Security With Technical Measures
Information security starts with people. This statement, or a very similar one, sounds like the mantra of every IT security officer who regularly points out to his colleagues the importance of complying with the instructions in force. So-called “Security Awareness Training” is being offered for this purpose. However, it usually falls short when the users no longer remember what they have learned at the latest.

Amazon WorkSpaces and deviceTRUST:
Better together!
deviceTRUST supports WSP and the related SDK for Amazon WorkSpaces and AppStream from day one! Read here how you can use deviceTRUST with Amazon WSP to make your remote desktops and apps even more secure!

deviceTRUST supports Windows 365 Cloud PC!
With Windows 365 Cloud PC, Microsoft adds an easy-to-manage and easy-to-consume virtual desktop offering to their stack. The one-click-style deployment makes it a valid tool for many types of businesses and end users. Cloud PC is a Microsoft AVD-based tool. Due to sharing the same underlying technologies, deviceTRUST has been ready to support Cloud PC from day one!

deviceTRUST - An effective solution for enhancing a multi-factor authentication strategy
Multi-factor authentication (MFA) is an important security measure that adds an additional layer of protection to the authentication process. By requiring users to provide multiple factors to verify their identity, MFA makes it much more difficult for attackers to gain unauthorized access to sensitive information and resources.
Stratodesk and deviceTRUST Announce Their Collaboration Delivering the Most Secure Endpoint Environment
Stratodesk and deviceTRUST have partnered together to bring real-time, conditional access to Stratodesk endpoints.

A Higher Maturity Level for Your Zero Trust Strategy
All hell is breaking loose outside. Almost daily, there are reports by authorities, companies and institutions about having been targeted by a cyberattack, sometimes with drastic consequences for business operations.

Welcome to our new deviceTRUST Homepage!
At the beginning of 2023, we present our new deviceTRUST Homepage – more informative, up-to-date and responsive. In addition to the changes in appearance and technology, we have prepared fresh content for you. From now on you will find all…

Better Together – Microsoft Azure AD and deviceTRUST
Microsoft Azure Active Directory (now Microsoft Entra ID), commonly known as Azure AD, is a system in Microsoft Azure that enables identity management to configure user and group access to services and resources. With deviceTRUST Contextual Security, administrators now have…
Conditional Application Access with deviceTRUST
In this blog article we show how allowed applications can be controlled very easily – depending on the context of access, device and user. All controls are applied dynamically, not only for login or reconnection, but at any time. Shown are different usage scenarios of our customers, based on different context information.
Application Allow Lists with deviceTRUST
This blog article is about application allow listing. We show how the required allow lists can be created easily and automatically. For this purpose, we use a new technology that is based on the “Authorized Owner” principle. In addition, we show further possibilities for the automatic detection of applications to be allowed and how the application allow lists can be updated at any time, e.g. via a secure integration interface.