Endpoint

12/14/2017
12:00 AM
Dark Reading
Dark Reading
Products and Releases
50%
50%

IGEL Integrates Endpoint Computing Solutions With deviceTRUST

Through dynamic contextual awareness, corporate data remains secure and compliance and regulatory requirements are met when end-users roam between IGEL OS-powered endpoint devices.

SAN FRANCISCO – IGEL, an endpoint management software provider for the secure enterprise, today announced that it is the first manufacturer to integrate deviceTRUST’s dynamic context awareness technology into its endpoint computing solutions. With deviceTRUST and IGEL, IT organizations are now able to ensure that corporate data remains secure, and that compliance and regulatory requirements are met when end-users roam between their IGEL OS-powered endpoints. 

“Modern workspaces present significant challenges for IT organizations due to the diverse array of networks and devices users leverage to access their corporate networks. Added to that are the wide range of locations they are working from – customer sites, home offices and coffee shops and cafes, just to name a few,” said Matthias Haas, CTO, IGEL. “Regardless, data must be kept secure, and compliance and regulatory requirements must be met. This is why we are proud to be the first manufacturer to integrate deviceTRUST’s industry-leading dynamic context awareness technology.”

With deviceTRUST, IT organizations can control which business-critical applications and corporate data end-users are able to access, based on the location from which they are working. “For example, if a worker is accessing their corporate desktop from an unsecured Wi-Fi location, they may only gain limited access to their applications,” continued Haas. 

Simple, Dynamic and Integrated Context Awareness

With its patent-pending technologies, deviceTRUST delivers more than 200 hardware, software, network, security, performance and location contextual properties into virtual and physical workspaces. The contextual data is always kept up-to-date and any change triggers an action, making it easy for IT organizations to manage security and compliance as their users roam between locations.

“The growing adoption of application and desktop virtualization to meet the needs of a mobile workforces combined with the existing security, compliance and regulatory requirements is a challenge for many IT organizations,” said Sascha Goeckel, CEO deviceTRUST. “The IGEL-powered endpoints when paired with the detailed context information deviceTRUST provides, enables a secure and context aware access to the business resources that meet all requirements.”

Key Features and Benefits

deviceTRUST meets security, compliance and regulatory requirements by incorporating end-point and user context into business policies. Some of the key features and benefits of the solution include:

·       Single view of detailed context data via a centralized dashboard

·       Seamless integration into existing workspace management and reporting solutions

·       Fast and easy deployment with no additional infrastructure required

·       Subscription-based licensing 


·       Immediate ROI 


Availability

deviceTRUST is now available with IGEL OS 10.03.500 and can be activated via the IGEL Universal Management SuiteTM (UMS) management console. To experience the capabilities of the IGEL OS, the Universal Desktop ConverterTM (UDC) and the IGEL UMS, download here, or request free evaluation hardware.

Meet deviceTRUST at IGEL DISRUPT

deviceTRUST is a Gold-level sponsor for IGEL DISRUPT End User Computing Forum 2018 events taking place in EMEA and North America during the first quarter of 2018. Additionally, Sascha Goeckel, CEO of deviceTRUST will be presenting at IGEL DISRUPT EMEA, taking place in Bremen, Germany from January 17-19, 2018 and IGEL DISRUPT North America, taking place in Austin, Tex. from February 6-8, 2018. For more information and to register, click here.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
You Break It, They Buy It: Economics, Motivations Behind Bug Bounty Hunting
Ericka Chickowski, Contributing Writer, Dark Reading,  1/19/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
The Year in Security: 2017
A look at the biggest news stories (so far) of 2017 that shaped the cybersecurity landscape -- from Russian hacking, ransomware's coming-out party, and voting machine vulnerabilities to the massive data breach of credit-monitoring firm Equifax.
Flash Poll
[Strategic Security Report] How Enterprises Are Attacking the IT Security Problem
[Strategic Security Report] How Enterprises Are Attacking the IT Security Problem
Enterprises are spending more of their IT budgets on cybersecurity technology. How do your organization's security plans and strategies compare to what others are doing? Here's an in-depth look.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2017-0290
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

CVE-2016-10369
Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

CVE-2016-8202
Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

CVE-2016-8209
Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

CVE-2017-0890
Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.