Use Cases Valuable use cases for your digital workspace

All Scenarios
  • All Scenarios
  • Local
  • Remote
  • SaaS

Security Check

The Security & Compliance Check offers the possibility to configure, the option that employees are only able to access their digital workspace with their devices if these are managed by the company or that critical applications can only be used if the WLAN is sufficiently encrypted.

Read More

Corporate Device Detection

Companies and institutions must often know which devices access their remote environments. These requirements can be based…

Read More

Conditional Application Access

Regardless of whether applications are provided remotely, locally or via the cloud, with deviceTRUST Conditional Application Access, user access to applications can be controlled at all times.

Read More

Geolocation & Geofencing

deviceTRUST contextual location determination offers a wide variety of options for determining the location of a device being used and for controlling the dynamic access to desktops, applications and resources.

Read More

Working from Home

deviceTRUST guarantees that digital workspaces can only be accessed from validated environments. Unauthorized access, even with stolen login information, is thus reliably prevented.

Read More

Cooperation with External Partners

With the deviceTRUST Contextual Security, companies can make applications and resources available to external users via the digital workspace in accordance with security and compliance requirements.

Read More

BYOD for Remote Environments

deviceTRUST allows conducting a security check of the devices used when users access the virtual workspaces environment without need of endpoint management.

Read More

Unauthorized USB Device

To eliminate this security risk, companies using deviceTRUST have the option of allowing only authorized removable USB devices.

Read More

Dynamic Lock Screen

deviceTRUST enables the dynamic configuration of different idle time intervals depending on the environment in which the employee is located.

Read More

Dynamic Redirection Control

Amazon Workspaces and Citrix Virtual Apps and Desktops have a built-in, granular policy engine. This engine allows…

Read More

Time-based Access Control

deviceTRUST only enables access to desktops, applications and resources according to the agreed project phases and times, with the time-based access individually adapted to the different requirements of the company.

Read More

Compliant Backend Access

Central IT systems such as databases, file servers or email systems are often administered by company employees…

Read More

Contextual Firewall Configuration

With context-based Windows firewall , deviceTRUST can help with network (micro-) segmentation. That way, native Windows firewall…

Read More

Compliance Reporting

At its core, deviceTRUST protects digital workplaces and uses devices as an additional security factor. If the…

Read More

Silo Optimization

deviceTRUST Contextual Security allows to control and manage access to all applications within a few central silos based on the context.

Read More