deviceTRUST 20.2.200 for Windows and macOS, and 20.1.200 for IGEL and eLux is now available. See the WindowsmacOSIGEL or eLux release notes for more information.

Comprehensive Use Cases

 

Check out the following use cases and see how deviceTRUST's contextual security solution can be used to easily enable business requirements without compromising security, compliance and regulatory requirements.

Home Office

Employees must be able to work from their home office with unrestricted access to all necessary applications, identical to when they are working within the corporate network.

Read more

External Partners

Employees of external partners and suppliers should have access to applications and resources that are provided in the virtual workspace of the company.

Read more

License Compliance

Enterprise applications that are licensed per device (e.g. Microsoft Project or Microsoft Visio) are made available on virtual workspaces for a dedicated group of users.

Read more

Silo Optimization

Users access their virtual workspace from different locations. This includes access from within the company as well as from outside while travelling or from the home office.

Read more

Compliance Check

Companies enable their users with different devices to access their virtual workspace in order to work productively with their applications and resources.

Read more

Bring Your Own Device (BYOD)

Companies enable their users with private devices to access their virtual workspace in order to work productively with their applications and resources.

Read more

Compliant Application Access

Many industries, such as healthcare, insurance, government, and finance, have strict compliance and regulatory requirements for accessing virtual workspaces and the applications available within them.

Read more

Unauthorized USB Drives

Users of the virtual workspace must be able to exchange files with a USB memory stick plugged into their device.

Read more

Compliant Backend Access

The administration and maintenance of central IT systems, such as databases, file servers or mail systems, is carried out by company employees or external service providers.

Read more

Location-aware Printing

Printing in virtual workspace environments still poses a great challenge, because employees work on different devices and locations within the company building.

Read more

Meeting Room

If a user is in a meeting room, the activation time for the screen saver is very often too short, because, for example, longer discussions are held with the participants during a presentation.

Read more

Dynamic Policies

In local and virtual workspaces, policies from different vendors, such as Microsoft, Citrix and VMware, are used to manage the user environment.

Read more