Endpoint

12/14/2017
12:00 AM
Dark Reading
Dark Reading
Products and Releases
50%
50%

IGEL Integrates Endpoint Computing Solutions With deviceTRUST

Through dynamic contextual awareness, corporate data remains secure and compliance and regulatory requirements are met when end-users roam between IGEL OS-powered endpoint devices.

SAN FRANCISCO – IGEL, an endpoint management software provider for the secure enterprise, today announced that it is the first manufacturer to integrate deviceTRUST’s dynamic context awareness technology into its endpoint computing solutions. With deviceTRUST and IGEL, IT organizations are now able to ensure that corporate data remains secure, and that compliance and regulatory requirements are met when end-users roam between their IGEL OS-powered endpoints. 

“Modern workspaces present significant challenges for IT organizations due to the diverse array of networks and devices users leverage to access their corporate networks. Added to that are the wide range of locations they are working from – customer sites, home offices and coffee shops and cafes, just to name a few,” said Matthias Haas, CTO, IGEL. “Regardless, data must be kept secure, and compliance and regulatory requirements must be met. This is why we are proud to be the first manufacturer to integrate deviceTRUST’s industry-leading dynamic context awareness technology.”

With deviceTRUST, IT organizations can control which business-critical applications and corporate data end-users are able to access, based on the location from which they are working. “For example, if a worker is accessing their corporate desktop from an unsecured Wi-Fi location, they may only gain limited access to their applications,” continued Haas. 

Simple, Dynamic and Integrated Context Awareness

With its patent-pending technologies, deviceTRUST delivers more than 200 hardware, software, network, security, performance and location contextual properties into virtual and physical workspaces. The contextual data is always kept up-to-date and any change triggers an action, making it easy for IT organizations to manage security and compliance as their users roam between locations.

“The growing adoption of application and desktop virtualization to meet the needs of a mobile workforces combined with the existing security, compliance and regulatory requirements is a challenge for many IT organizations,” said Sascha Goeckel, CEO deviceTRUST. “The IGEL-powered endpoints when paired with the detailed context information deviceTRUST provides, enables a secure and context aware access to the business resources that meet all requirements.”

Key Features and Benefits

deviceTRUST meets security, compliance and regulatory requirements by incorporating end-point and user context into business policies. Some of the key features and benefits of the solution include:

·       Single view of detailed context data via a centralized dashboard

·       Seamless integration into existing workspace management and reporting solutions

·       Fast and easy deployment with no additional infrastructure required

·       Subscription-based licensing 


·       Immediate ROI 


Availability

deviceTRUST is now available with IGEL OS 10.03.500 and can be activated via the IGEL Universal Management SuiteTM (UMS) management console. To experience the capabilities of the IGEL OS, the Universal Desktop ConverterTM (UDC) and the IGEL UMS, download here, or request free evaluation hardware.

Meet deviceTRUST at IGEL DISRUPT

deviceTRUST is a Gold-level sponsor for IGEL DISRUPT End User Computing Forum 2018 events taking place in EMEA and North America during the first quarter of 2018. Additionally, Sascha Goeckel, CEO of deviceTRUST will be presenting at IGEL DISRUPT EMEA, taking place in Bremen, Germany from January 17-19, 2018 and IGEL DISRUPT North America, taking place in Austin, Tex. from February 6-8, 2018. For more information and to register, click here.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
The Year in Security 2018
This Dark Reading Tech Digest explores the biggest news stories of 2018 that shaped the cybersecurity landscape.
Flash Poll
How Enterprises Are Attacking the Cybersecurity Problem
How Enterprises Are Attacking the Cybersecurity Problem
Data breach fears and the need to comply with regulations such as GDPR are two major drivers increased spending on security products and technologies. But other factors are contributing to the trend as well. Find out more about how enterprises are attacking the cybersecurity problem by reading our report today.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-6443
PUBLISHED: 2019-01-22
A vulnerability in Brocade Network Advisor Versions before 14.3.1 could allow an unauthenticated, remote attacker to log in to the JBoss Administration interface of an affected system using an undocumented user credentials and install additional JEE applications. A remote unauthenticated user who ha...
CVE-2018-6444
PUBLISHED: 2019-01-22
A Vulnerability in Brocade Network Advisor versions before 14.1.0 could allow a remote unauthenticated attacker to execute arbitray code. The vulnerability could also be exploited to execute arbitrary OS Commands.
CVE-2018-6445
PUBLISHED: 2019-01-22
A Vulnerability in Brocade Network Advisor versions before 14.0.3 could allow a remote unauthenticated attacker to export the current user database which includes the encrypted (not hashed) password of the systems. The attacker could gain access to the Brocade Network Advisor System after extracting...
CVE-2019-6507
PUBLISHED: 2019-01-22
An issue was discovered in creditease-sec insight through 2018-09-11. login_user_delete in srcpm/app/admin/views.py allows CSRF.
CVE-2019-6508
PUBLISHED: 2019-01-22
An issue was discovered in creditease-sec insight through 2018-09-11. role_perm_delete in srcpm/app/admin/views.py allows CSRF.