Safe and Efficient Application Silos
deviceTRUST Contextual Security allows to control and manage access to all applications within a few central silos based on the context.
Read MoreSecure printing with Printer Mapping
Since employees work on different devices and in several locations, printing in virtual digital workspaces represents a big challenge. Normally, the default printer for employees is defined based on their role. The result is that documents are often not printed on the printer closest to them, so that documents containing personal data or sensitive information…
Read MoreCompliant Backend Access
Central IT systems such as databases, file servers or email systems are often administered by company employees or external service providers. These systems are often accessed via a Microsoft RDP connection. Since with such connections there is no information by default about the device used, its security status, the network connection used or the location,…
Read MoreOnly Authorized USB Drives
To eliminate this security risk, companies using deviceTRUST have the option of allowing only authorized removable USB devices.
Read MoreDynamic Lock Screen
deviceTRUST enables the dynamic configuration of different idle time intervals depending on the environment in which the employee is located.
Read MoreConditional Application Access
Regardless of whether applications are provided remotely, locally or via the cloud, with deviceTRUST Conditional Application Access, user access to applications can be controlled at all times.
Read MoreSecure Exception Rules for VIP Users
deviceTRUST increases security by ensuring that the VIP users’ devices actually follow the company’s security and compliance policy.
Read MoreBYOD for Remote Environments
deviceTRUST allows conducting a security check of the devices used when users access the virtual workspaces environment without need of endpoint management.
Read MoreTime-based Access Control
deviceTRUST only enables access to desktops, applications and resources according to the agreed project phases and times, with the time-based access individually adapted to the different requirements of the company.
Read MoreCooperation with External Partners
With the deviceTRUST Contextual Security, companies can make applications and resources available to external users via the digital workspace in accordance with security and compliance requirements.
Read More