deviceTRUST

Zero Trust on Steroids
DeviceTrust revolutionizes conditional access and makes the device context an additional and unique security factor.

What is DeviceTrust?

Reach the next level of Zero Trust

Stealing login data is one of the most critical attack vectors. Even traditional multi-factor methods can often be copied or circumvented.

With DeviceTrust, you use your endpoints as an additional security factor and bring conditional access to the next level. DeviceTrust continuously and in real time collects more than 400 pieces of information about the user's device and the context of access and adds an additional, unique level of security to authentication. This effectively prevents unauthorized access even with stolen credentials.

The highlights are:

  • Device context as an additional factor for authentication and configuration

  • Actions based on <400 data points on the end device are possible

  • Real time — control and configure access to corporate resources without any delay

  • In addition, countless use cases also for greater productivity

  • Who is DeviceTrust suitable for?

    DeviceTrust is the unique additional endpoint security layer for companies that are already very well positioned or don't just want to leave context-related regulations to regulations on paper. The power amplifier that once again really adds value to security and productivity.

    Trusted by:

    Due to organizational requirements, for example, we are unable to grant employees working from home access to payment systems. To meet these requirements, we use DeviceTrust and grant access rights based on specified context information.

    Mathias Altensleben
    Berlin Steglitz-Zehlendorf District Office

    Around 10,000 people work on the platform every day, but no one of the users notices that. DeviceTrust simply works in the background to ensure that the correct permissions are activated and that people can work securely and stably.

    Marc Reissmann
    DB Systel

    DeviceTrust ensures that our employees can work securely even from their home office. Risks arising from cyber attacks can be successfully minimized in this way.

    Dominik Kletke
    KKH Kaufmännische Krankenkasse
    benefits

    Conditional Access in real time

    DeviceTrust supports you in implementing your next-level zero trust strategy in numerous use cases and on all common technology platforms.

    Real-Time Conditional Access

    DeviceTrust easily integrates with existing authentication and controls access to resources, sessions, and applications in real time. Trading in real time and the number of data points read out are unique selling points.

    Context as a Factor

    The device context with over 400 data points is a unique safety factor with unparalleled customization. Meeting specific safety requirements is therefore child's play.

    Powerful use cases

    Even outside of security. Whenever you have a use case where an action should be taken in response to the properties of endpoints in real time, DeviceTrust is highly likely to implement this use case.

    Don't rely on users

    Getting users to not use certain applications over unsecure WiFi by signing a policy is a thing of the past. Trust is good, technical advancement is better.

    Quick and easy implementation

    Software Only: DeviceTrust is a pure software product that only uses standardized components. Contexts and actions are created in a simple drag-and-drop editor.

    Get non-binding advice now

    Sure, you can wait a bit with Next-Level Zero Trust, but threats won't wait.

    That's why: Let's talk DeviceTrust. With clear recommendations, implementation strength and tried and tested procedures.

    performances

    Your partner for next-level Zero Trust

    As a partner, we implement the benefits of DeviceTrust for you so that you can use the full potential of DeviceTrust.

    DeviceTrust trial, setup and licensing
    Individual contexts and actions Done for You
    Design & implementation of system hardening
    Managed system hardening
    In action

    This is What Zero Trust looks like with deviceTRUST

    Use Cases
  • Accurate real-time geofencing for access only from validated environments, even with stolen credentials

  • Ensure compliance of unmanaged BYOD devices and external service providers, even in remote sessions

  • Secure printing with printer mapping

  • Time-based access control

  • Granular control of application access via context instead of countless application silos (application whitelisting)

  • Network micro-segmentation with context-based Windows Firewall control

  • And many more!

  • Features
  • Simple drag-and-drop editor for defining contexts

  • Supported setup and field-proven templates

  • Prepared properties for a wide range of operating systems and support for “custom properties”

  • Individual return values

  • Benefits
  • Quick and easy implementation

  • Visually and logically easy traceability

  • Complete individuality for your scenarios, supported by proven templates

  • Actions: In real time

    Based on your context, DeviceTrust performs the actions you need to protect your work environment. Actions include locking a user's session, controlling application access, and dynamically configuring the device. The context is read out at any time, which enables real-time response to context changes. You can also create your own actions.

    Features
  • Action sequences react to context changes at any time

  • By combining contexts with action sequences, you determine granularly when which action is relevant

  • Connect control (e.g. conditional access) with further actions (e.g. logging or mail to the help desk)

  • Benefits
  • DeviceTrust represents YOUR reality at any time

  • “Never trust — always verify” is fulfilled through real-time response

  • Support in situation analysis for users and help desk ensures a high level of acceptance.

  • Features
  • Targeted control of individual applications, whether locally installed or in the cloud

  • Include all device information and implement control at any time

  • Use of existing tools (e.g. MS Applocker, FSLogix, MS Conditional Access) for application control. It is also possible to connect third-party tools

  • Benefits
  • Compliance with legal, regulatory and licensing requirements

  • Users continue to use their workplace even when certain applications are not available.

  • By integrating it into your administrative concept, you can implement dynamic application control quickly and without problems

  • High user acceptance through transparency

    Your users want to use applications, not be prevented from using them. You want a functioning digital workplace without disruption and additional effort. DeviceTrust supports this request through transparency, individual user notifications and supporting messages, e.g. to the help desk.

    Features
  • Individual text display with explanation and corrective action

  • Sending information, e.g. as emails to the help desk and users

  • Forwarding of all information to central logging or ticketing systems

  • Benefits
  • Optimum user experience through supporting information while reducing attack surfaces

  • Clear remedy so that users can get back to work quickly and easily

  • Traceability of all controls for audits or business reporting

  • Find out why we recommend DeviceTrust to our customers

    Our managing director Thore talking to Marc Stieber, Sales Manager EMEA at DeviceTrust. Marc and Thore talk about why the “Context as a Factor” terminal device is so special and how you can use it to control access to sensitive applications and company data precisely and in real time, for example.

    Before we can show you videos, we need to let you know that when you watch the videos, data may be sent to the provider.

    Comparison

    Tired of the Basics?
    Go
    beyond Cyber Hygiene.

    Without DeviceTrust

    Uncertain conditional access due to significant time delay

    Basic properties with sometimes low granularity

    Security checks only for logins or at network borders

    Complex configuration; different tools for different systems

    Relying on users' “compliance with guidelines”

    With DeviceTrust

  • Strengthening the zero trust principle “Never Trust — Always Verify” through true real-time

  • Unique, invisible security layer for your digital workplaces

  • Individual and granular characteristics that optimally represent your use cases

  • Easy configuration and integration into existing management structures

  • One solution for everyone: integration with all remote platforms, local Windows workstations and Microsoft Entra ID

  • Usage guidelines are reinforced technically instead of relying on users

  • Optimum user experience through problem-solving support

  • Free endpoint security check

    Companies with best-practice endpoint management are demonstrably better protected. With the free Endpoint Security Check, you can find out how well your devices are protected.

    90%

    All successful ransomware attacks originate from poorly and unmanaged devices

    11x

    Higher probability of cyber attacks on > 20% unmanaged or poorly managed devices

    Learn details
    Case studies

    How Companies profit from our partnership

    01
    MECM+system hardening @ textile manuf.

    Managed MECM and system hardening for manufacturers of innovative textiles

    Manufacturing industry
    |
    >2,500
    staffs

    Challenge:

    • Small IT team needs specialized support to operate MECM
    • The team had recognized the importance of standard system hardening, but could not guarantee it themselves

    The solution:

    • Managed service for MECM with managed UEM and trouble shooting for international locations
    • Adapting the CIS standard to an individual environment
    • Regular system hardening as a service in accordance with CIS standards
    01
    Intune+system hardening @ game developer

    Intune Deployment and Managed Service Plus System Hardening for Game Developers

    Game development
    |
    >100
    staffs

    Challenge:

    • Customer was dissatisfied with the speed and expertise of the old service provider
    • Intune should be introduced and cyber security significantly improved

    The solution:

    • From the 1st Intune workshop to implementation and long-term support
    • Establishment and regular updates of security baselines,
    • Microsoft Defender for Endpoint Implementation and Managed Service
    • SOFTTAILOR as a new go-to partner
    01
    Patch Management @ Law Firm

    Patch Management as a Service for law firm

    Professional Services
    |
    >500
    staffs

    Challenge:

    • Customer wants to migrate to Intune
    • High importance of cybersecurity in a very sensitive environment
    • More than 200 applications must always be patched

    The solution:

    • Managed service for partially automated continuous updating of applications
    • Close integration into the vulnerability management process
    • Migrate software packages to Microsoft Intune
    01
    Software packaging @ Energy provider

    Application packaging aaS for energy suppliers

    energy supply
    |
    >1,500
    staffs

    Challenge:

    • Restructuring should separate the IT department and infrastructure from the existing
    • New IT department is being streamlined
    • The company is therefore unable to manage 350 applications itself

    The solution:

    • Application packaging aaSin close coordination with the internal IT department
    • Provision of a customer portal to view status
    • Considering high safety requirements
    Let's talk Endpoint

    The fastest pathr to Zero Trust with Context as a Factor

    Secure and productive endpoints in three steps.
    Learn what you need to do and how to get to more structure and secure and productive endpoints in the shortest possible way.
    1
    Get in touch

    Get in touch with us below and for a short and non-binding initial consultation.

    2
    Initial consultation

    In the initial discussion, we will discuss your requirements and requirements, and see whether DeviceTrust can implement your use cases.

    3
    Free trial


    We are launching the free trial period together, during which you will experience that DeviceTrust is likely to be an investment that pays off for your organization as well.

    blog

    Expert knowledge to go: 
Our latest blog posts

    Always a step ahead!

    We send IT decision makers and endpoint administrators hand-curated news, technical insights and practical tips about endpoint management & security that are not available anywhere else.

    DeviceTrust Frequently Asked Questions

    Wie integriert sich deviceTRUST in bestehende IT-Infrastrukturen?
    Welche Vorteile bietet deviceTRUST für Unternehmen?
    Unterstützt deviceTRUST verschiedene Betriebssysteme und Endgeräte?