Blog Check out our blog to learn more about our company and how you can use your devices as a security factor

All
  • All
  • General
  • Use Case
logo_stratodesk

Stratodesk and deviceTRUST Announce Their Collaboration Delivering the Most Secure Endpoint Environment

Stratodesk and deviceTRUST have partnered together to bring real-time, conditional access to Stratodesk endpoints.

Read More...
deviceTRUST_ZeroTrust

A Higher Maturity Level for Your Zero Trust Strategy

All hell is breaking loose outside. Almost daily, there are reports by authorities, companies and institutions about having been targeted by a cyberattack, sometimes with drastic consequences for business operations.

Read More...
deviceTRUST_Website

Welcome to our new deviceTRUST Homepage!

At the beginning of 2023, we present our new deviceTRUST Homepage – more informative, up-to-date and responsive. In addition to the changes in appearance and technology, we have prepared fresh content for you. From now on you will find all…

Read More...

Better Together – Microsoft Azure AD and deviceTRUST

Microsoft Azure Active Directory (now Microsoft Entra ID), commonly known as Azure AD, is a system in Microsoft Azure that enables identity management to configure user and group access to services and resources. With deviceTRUST Contextual Security, administrators now have…

Read More...

Conditional Application Access with deviceTRUST

In this blog article we show how allowed applications can be controlled very easily – depending on the context of access, device and user. All controls are applied dynamically, not only for login or reconnection, but at any time. Shown are different usage scenarios of our customers, based on different context information.

Read More...

Application Allow Lists with deviceTRUST

This blog article is about application allow listing. We show how the required allow lists can be created easily and automatically. For this purpose, we use a new technology that is based on the “Authorized Owner” principle. In addition, we show further possibilities for the automatic detection of applications to be allowed and how the application allow lists can be updated at any time, e.g. via a secure integration interface.

Read More...

Microsoft AppLocker Management with deviceTRUST

In this blog article, we show how deviceTRUST can be used to effectively administer all aspects of a Microsoft AppLocker configuration from within a single management console. We also show the methods that can be used to configure different platforms and how deviceTRUST can address the MDM interface in Windows 10 to enable offline capability and configuration without group policies.

Read More...

deviceTRUST Heroes: 5 questions for Michael

Our product and our company can only be as good as the people behind it. In the deviceTRUST Heros interviews, we introduce them to you one by one.

Read More...
use_case_time-based_access_control

Time is context

What is time? Is it money, free time or work? Does one have it and can one lose it? According to Einstein, it is relative and physicists generally define it as what clocks measure. The annual discussion about summer and winter time regularly makes us ask who sets the clocks and determines which time is the right one.

Read More...
Story

The deviceTRUST Story

Dare to do something different and break new ground – that’s what we wanted to do in mid-2015 in search of new professional challenges. We, that is Jens Schmidt, Jon Allsop and Sascha Göckel the three founders of deviceTRUST GmbH.

Read More...