Blog Check out our blog to learn more about our company and how you can use your devices as a security factor

All
  • All
  • General
  • Use Case
deviceTRUST_Blog

Protection Against “Layer 8” – How deviceTRUST Increases Security With Technical Measures

Information security starts with people. This statement, or a very similar one, sounds like the mantra of every IT security officer who regularly points out to his colleagues the importance of complying with the instructions in force. So-called “Security Awareness Training” is being offered for this purpose. However, it usually falls short when the users no longer remember what they have learned at the latest.

Read More...

Amazon WorkSpaces and deviceTRUST:
Better together!

deviceTRUST supports WSP and the related SDK for Amazon WorkSpaces and AppStream from day one! Read here how you can use deviceTRUST with Amazon WSP to make your remote desktops and apps even more secure!

Read More...

deviceTRUST supports Windows 365 Cloud PC!

With Windows 365 Cloud PC, Microsoft adds an easy-to-manage and easy-to-consume virtual desktop offering to their stack. The one-click-style deployment makes it a valid tool for many types of businesses and end users. Cloud PC is a Microsoft AVD-based tool. Due to sharing the same underlying technologies, deviceTRUST has been ready to support Cloud PC from day one!

Read More...

deviceTRUST - An effective solution for enhancing a multi-factor authentication strategy

Multi-factor authentication (MFA) is an important security measure that adds an additional layer of protection to the authentication process. By requiring users to provide multiple factors to verify their identity, MFA makes it much more difficult for attackers to gain unauthorized access to sensitive information and resources.

Read More...
logo_stratodesk

Stratodesk and deviceTRUST Announce Their Collaboration Delivering the Most Secure Endpoint Environment

Stratodesk and deviceTRUST have partnered together to bring real-time, conditional access to Stratodesk endpoints.

Read More...

A Higher Maturity Level for Your Zero Trust Strategy

All hell is breaking loose outside. Almost daily, there are reports by authorities, companies and institutions about having been targeted by a cyberattack, sometimes with drastic consequences for business operations.

Read More...

Welcome to our new deviceTRUST Homepage!

At the beginning of 2023, we present our new deviceTRUST Homepage – more informative, up-to-date and responsive. In addition to the changes in appearance and technology, we have prepared fresh content for you. From now on you will find all…

Read More...

Better Together – Microsoft Azure AD and deviceTRUST

Microsoft Azure Active Directory (now Microsoft Entra ID), commonly known as Azure AD, is a system in Microsoft Azure that enables identity management to configure user and group access to services and resources. With deviceTRUST Contextual Security, administrators now have…

Read More...

Conditional Application Access with deviceTRUST

In this blog article we show how allowed applications can be controlled very easily – depending on the context of access, device and user. All controls are applied dynamically, not only for login or reconnection, but at any time. Shown are different usage scenarios of our customers, based on different context information.

Read More...

Application Allow Lists with deviceTRUST

This blog article is about application allow listing. We show how the required allow lists can be created easily and automatically. For this purpose, we use a new technology that is based on the “Authorized Owner” principle. In addition, we show further possibilities for the automatic detection of applications to be allowed and how the application allow lists can be updated at any time, e.g. via a secure integration interface.

Read More...