Endpoint

12/14/2017
12:00 AM
Dark Reading
Dark Reading
Products and Releases
50%
50%

IGEL Integrates Endpoint Computing Solutions With deviceTRUST

Through dynamic contextual awareness, corporate data remains secure and compliance and regulatory requirements are met when end-users roam between IGEL OS-powered endpoint devices.

SAN FRANCISCO – IGEL, an endpoint management software provider for the secure enterprise, today announced that it is the first manufacturer to integrate deviceTRUST’s dynamic context awareness technology into its endpoint computing solutions. With deviceTRUST and IGEL, IT organizations are now able to ensure that corporate data remains secure, and that compliance and regulatory requirements are met when end-users roam between their IGEL OS-powered endpoints. 

“Modern workspaces present significant challenges for IT organizations due to the diverse array of networks and devices users leverage to access their corporate networks. Added to that are the wide range of locations they are working from – customer sites, home offices and coffee shops and cafes, just to name a few,” said Matthias Haas, CTO, IGEL. “Regardless, data must be kept secure, and compliance and regulatory requirements must be met. This is why we are proud to be the first manufacturer to integrate deviceTRUST’s industry-leading dynamic context awareness technology.”

With deviceTRUST, IT organizations can control which business-critical applications and corporate data end-users are able to access, based on the location from which they are working. “For example, if a worker is accessing their corporate desktop from an unsecured Wi-Fi location, they may only gain limited access to their applications,” continued Haas. 

Simple, Dynamic and Integrated Context Awareness

With its patent-pending technologies, deviceTRUST delivers more than 200 hardware, software, network, security, performance and location contextual properties into virtual and physical workspaces. The contextual data is always kept up-to-date and any change triggers an action, making it easy for IT organizations to manage security and compliance as their users roam between locations.

“The growing adoption of application and desktop virtualization to meet the needs of a mobile workforces combined with the existing security, compliance and regulatory requirements is a challenge for many IT organizations,” said Sascha Goeckel, CEO deviceTRUST. “The IGEL-powered endpoints when paired with the detailed context information deviceTRUST provides, enables a secure and context aware access to the business resources that meet all requirements.”

Key Features and Benefits

deviceTRUST meets security, compliance and regulatory requirements by incorporating end-point and user context into business policies. Some of the key features and benefits of the solution include:

·       Single view of detailed context data via a centralized dashboard

·       Seamless integration into existing workspace management and reporting solutions

·       Fast and easy deployment with no additional infrastructure required

·       Subscription-based licensing 


·       Immediate ROI 


Availability

deviceTRUST is now available with IGEL OS 10.03.500 and can be activated via the IGEL Universal Management SuiteTM (UMS) management console. To experience the capabilities of the IGEL OS, the Universal Desktop ConverterTM (UDC) and the IGEL UMS, download here, or request free evaluation hardware.

Meet deviceTRUST at IGEL DISRUPT

deviceTRUST is a Gold-level sponsor for IGEL DISRUPT End User Computing Forum 2018 events taking place in EMEA and North America during the first quarter of 2018. Additionally, Sascha Goeckel, CEO of deviceTRUST will be presenting at IGEL DISRUPT EMEA, taking place in Bremen, Germany from January 17-19, 2018 and IGEL DISRUPT North America, taking place in Austin, Tex. from February 6-8, 2018. For more information and to register, click here.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
White House Cybersecurity Strategy at a Crossroads
Kelly Jackson Higgins, Executive Editor at Dark Reading,  7/17/2018
The Fundamental Flaw in Security Awareness Programs
Ira Winkler, CISSP, President, Secure Mentem,  7/19/2018
Number of Retailers Impacted by Breaches Doubles
Ericka Chickowski, Contributing Writer, Dark Reading,  7/19/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-14505
PUBLISHED: 2018-07-22
mitmweb in mitmproxy v4.0.3 allows DNS Rebinding attacks, related to tools/web/app.py.
CVE-2018-14500
PUBLISHED: 2018-07-22
joyplus-cms 1.6.0 has XSS via the manager/collect/collect_vod_zhuiju.php keyword parameter.
CVE-2018-14501
PUBLISHED: 2018-07-22
manager/admin_ajax.php in joyplus-cms 1.6.0 has SQL Injection, as demonstrated by crafted POST data beginning with an "m_id=1 AND SLEEP(5)" substring.
CVE-2018-14492
PUBLISHED: 2018-07-21
Tenda AC7 through V15.03.06.44_CN, AC9 through V15.03.05.19(6318)_CN, and AC10 through V15.03.06.23_CN devices have a Stack-based Buffer Overflow via a long limitSpeed or limitSpeedup parameter to an unspecified /goform URI.
CVE-2018-3770
PUBLISHED: 2018-07-20
A path traversal exists in markdown-pdf version <9.0.0 that allows a user to insert a malicious html code that can result in reading the local files.