Compliance Reporting
At its core, deviceTRUST protects digital workplaces and uses devices as an additional security factor. If the context meets the respective security requirements, certain actions are triggered. Other actions are triggered if the context does not meet the respective security requirements. In addition to the active control of the digital workspace, deviceTRUST can also send…
Read MoreDynamic Redirection Control
Amazon Workspaces and Citrix Virtual Apps and Desktops have a built-in, granular policy engine. This engine allows you to configure the user’s rights and resources in a secure way. deviceTRUST supports the dynamic, Context-based, in-session control of your environment’s policies. Allow your users to redirect their local drives only when they utilize a secure device…
Read MoreCorporate Device Detection
Companies and institutions must often know which devices access their remote environments. These requirements can be based on external or internal regulatory requirements and extended security approaches. deviceTRUST uses specific indicators to identify corporate devices uniquely. By using granular domain membership information or serial numbers, you receive precise information about whether the device is self-managed…
Read MoreSilo Optimization
deviceTRUST Contextual Security allows to control and manage access to all applications within a few central silos based on the context.
Read MoreCompliant Backend Access
Central IT systems such as databases, file servers or email systems are often administered by company employees or external service providers. These systems are often accessed via a Microsoft RDP connection. Since with such connections there is no information by default about the device used, its security status, the network connection used or the location,…
Read MoreUnauthorized USB Device
To eliminate this security risk, companies using deviceTRUST have the option of allowing only authorized removable USB devices.
Read MoreDynamic Lock Screen
deviceTRUST enables the dynamic configuration of different idle time intervals depending on the environment in which the employee is located.
Read MoreConditional Application Access
Regardless of whether applications are provided remotely, locally or via the cloud, with deviceTRUST Conditional Application Access, user access to applications can be controlled at all times.
Read MoreBYOD for Remote Environments
deviceTRUST allows conducting a security check of the devices used when users access the virtual workspaces environment without need of endpoint management.
Read MoreTime-based Access Control
deviceTRUST only enables access to desktops, applications and resources according to the agreed project phases and times, with the time-based access individually adapted to the different requirements of the company.
Read More