Endpoint

12/14/2017
12:00 AM
Dark Reading
Dark Reading
Products and Releases
50%
50%

IGEL Integrates Endpoint Computing Solutions With deviceTRUST

Through dynamic contextual awareness, corporate data remains secure and compliance and regulatory requirements are met when end-users roam between IGEL OS-powered endpoint devices.

SAN FRANCISCO – IGEL, an endpoint management software provider for the secure enterprise, today announced that it is the first manufacturer to integrate deviceTRUST’s dynamic context awareness technology into its endpoint computing solutions. With deviceTRUST and IGEL, IT organizations are now able to ensure that corporate data remains secure, and that compliance and regulatory requirements are met when end-users roam between their IGEL OS-powered endpoints. 

“Modern workspaces present significant challenges for IT organizations due to the diverse array of networks and devices users leverage to access their corporate networks. Added to that are the wide range of locations they are working from – customer sites, home offices and coffee shops and cafes, just to name a few,” said Matthias Haas, CTO, IGEL. “Regardless, data must be kept secure, and compliance and regulatory requirements must be met. This is why we are proud to be the first manufacturer to integrate deviceTRUST’s industry-leading dynamic context awareness technology.”

With deviceTRUST, IT organizations can control which business-critical applications and corporate data end-users are able to access, based on the location from which they are working. “For example, if a worker is accessing their corporate desktop from an unsecured Wi-Fi location, they may only gain limited access to their applications,” continued Haas. 

Simple, Dynamic and Integrated Context Awareness

With its patent-pending technologies, deviceTRUST delivers more than 200 hardware, software, network, security, performance and location contextual properties into virtual and physical workspaces. The contextual data is always kept up-to-date and any change triggers an action, making it easy for IT organizations to manage security and compliance as their users roam between locations.

“The growing adoption of application and desktop virtualization to meet the needs of a mobile workforces combined with the existing security, compliance and regulatory requirements is a challenge for many IT organizations,” said Sascha Goeckel, CEO deviceTRUST. “The IGEL-powered endpoints when paired with the detailed context information deviceTRUST provides, enables a secure and context aware access to the business resources that meet all requirements.”

Key Features and Benefits

deviceTRUST meets security, compliance and regulatory requirements by incorporating end-point and user context into business policies. Some of the key features and benefits of the solution include:

·       Single view of detailed context data via a centralized dashboard

·       Seamless integration into existing workspace management and reporting solutions

·       Fast and easy deployment with no additional infrastructure required

·       Subscription-based licensing 


·       Immediate ROI 


Availability

deviceTRUST is now available with IGEL OS 10.03.500 and can be activated via the IGEL Universal Management SuiteTM (UMS) management console. To experience the capabilities of the IGEL OS, the Universal Desktop ConverterTM (UDC) and the IGEL UMS, download here, or request free evaluation hardware.

Meet deviceTRUST at IGEL DISRUPT

deviceTRUST is a Gold-level sponsor for IGEL DISRUPT End User Computing Forum 2018 events taking place in EMEA and North America during the first quarter of 2018. Additionally, Sascha Goeckel, CEO of deviceTRUST will be presenting at IGEL DISRUPT EMEA, taking place in Bremen, Germany from January 17-19, 2018 and IGEL DISRUPT North America, taking place in Austin, Tex. from February 6-8, 2018. For more information and to register, click here.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
WSJ Report: Facebook Breach the Work of Spammers, Not Nation-State Actors
Curtis Franklin Jr., Senior Editor at Dark Reading,  10/19/2018
The Browser Is the New Endpoint
Rajesh Ranganathan, Product Manager at ManageEngine,  10/23/2018
Good Times in Security Come When You Least Expect Them
Joshua Goldfarb, Co-founder & Chief Product Officer, IDRRA ,  10/23/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Flash Poll
The Risk Management Struggle
The Risk Management Struggle
The majority of organizations are struggling to implement a risk-based approach to security even though risk reduction has become the primary metric for measuring the effectiveness of enterprise security strategies. Read the report and get more details today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-10839
PUBLISHED: 2018-10-16
Qemu emulator <= 3.0.0 built with the NE2000 NIC emulation support is vulnerable to an integer overflow, which could lead to buffer overflow issue. It could occur when receiving packets over the network. A user inside guest could use this flaw to crash the Qemu process resulting in DoS.
CVE-2018-13399
PUBLISHED: 2018-10-16
The Microsoft Windows Installer for Atlassian Fisheye and Crucible before version 4.6.1 allows local attackers to escalate privileges because of weak permissions on the installation directory.
CVE-2018-18381
PUBLISHED: 2018-10-16
Z-BlogPHP 1.5.2.1935 (Zero) has a stored XSS Vulnerability in zb_system/function/c_system_admin.php via the Content-Type header during the uploading of image attachments.
CVE-2018-18382
PUBLISHED: 2018-10-16
Advanced HRM 1.6 allows Remote Code Execution via PHP code in a .php file to the user/update-user-avatar URI, which can be accessed through an "Update Profile" "Change Picture" (aka user/edit-profile) action.
CVE-2018-18374
PUBLISHED: 2018-10-16
XSS exists in the MetInfo 6.1.2 admin/index.php page via the anyid parameter.