Comprehensive Use Cases

 

Check out the following use cases and see how deviceTRUST's contextual security solution can be used to easily enable business requirements without compromising security, compliance and regulatory requirements.

deviceTRUST Use Case Home Office

Home Office

Employees must be able to work from their home office with unrestricted access to all necessary applications, identical to when they are working within the corporate network.

Read more
deviceTRUST Use Case External Partners

External Partners

Employees of external partners and suppliers should have access to applications and resources that are provided in the virtual workspace of the company.

Read more
deviceTRUST - Time Based Access

Time-based Access

Requirements Employees and external partners should only have access to applications and resources provided in the company’s virtual workspace at certain times. A difference must be made between internal and external access, access from different countries / time zones and…

Read more
devicetrust use case lizenz compliance

License Compliance

Enterprise applications that are licensed per device (e.g. Microsoft Project or Microsoft Visio) are made available on virtual workspaces for a dedicated group of users.

Read more
deviceTRUST Use Case Silo Optimization

Silo Optimization

Users access their virtual workspace from different locations. This includes access from within the company as well as from outside while travelling or from the home office.

Read more
deviceTRUST Use Case Compliance Check

Compliance Check

Companies enable their users with different devices to access their virtual workspace in order to work productively with their applications and resources.

Read more
deviceTRUST Use Case BYOD

Bring Your Own Device (BYOD)

Companies enable their users with private devices to access their virtual workspace in order to work productively with their applications and resources.

Read more
deviceTRUST Use Case Compliant Application Access

Compliant Application Access

Many industries, such as healthcare, insurance, government, and finance, have strict compliance and regulatory requirements for accessing virtual workspaces and the applications available within them.

Read more
deviceTRUST Use Case Unauthorized USB Drives

Unauthorized USB Drives

Users of the virtual workspace must be able to exchange files with a USB memory stick plugged into their device.

Read more
deviceTRUST Use Case Compliant Backend Access

Compliant Backend Access

The administration and maintenance of central IT systems, such as databases, file servers or mail systems, is carried out by company employees or external service providers.

Read more
deviceTRUST Use Case Locationaware Printing

Location-aware Printing

Printing in virtual workspace environments still poses a great challenge, because employees work on different devices and locations within the company building.

Read more
deviceTRUST Use Case Meeting Room

Meeting Room

If a user is in a meeting room, the activation time for the screen saver is very often too short, because, for example, longer discussions are held with the participants during a presentation.

Read more
deviceTRUST Use Case Dynamic Policies

Dynamic Policies

In local and virtual workspaces, policies from different vendors, such as Microsoft, Citrix and VMware, are used to manage the user environment.

Read more