What does it do?

A software-only solution that locks down a user’s personal Windows device to enable compliant, secure BYOD for remote endpoint environments.

Key Benefits

Launch secure sessions on personal devices without USB drives or dual-booting

Single-click installation allows rapid deployment to personal machines

Compliance with PCI, HIPAA, & GDPR on the endpoint

Centrally manage, configure, and update employee-owned devices

Eliminate device procurement and logistics costs with Secure BYOD

Reduce onboarding time and increase employee headcount with our Validation Tool

SRW is compatible with

Key Features

Personal Device Lockdown

In ‘worker mode’, a temporary, secure workspace is launched, locking the user out from their underlying OS. Our Dual Persona technology completely segregates the personal and corporate usage of the device. 

Write Filter

Prevent data leakage on personal devices. The Write Filter prevents any data on the secure session from being saved or moved to the personal device.

Endpoint Validation Tool

Inspect the personal device during hiring and prior to onboarding to determine whether the device meets your requirements. Any remediation can be done before granting access.

Single Click Installer

Onboard your users into their secure environments quickly with little to no intervention from IT by providing them with a link to install Secure Remote Worker.

Malware Prevention

Secure Remote Worker enforces advanced whitelisting & blacklisting for apps and services so the majority of malicious software like screen scrapers or keyloggers is prevented.

USB Device Blocking

USBs are one of the main causes of security breaches and data leakages. Secure Remote Worker blocks mass storage devices but allows peripherals such as keyboards, headsets, etc.

Personal Device Lockdown

In ‘worker mode’, Secure Remote Worker launches a temporary, secure workspace that completely locks the user out from their underlying OS.

Write Filter

Prevent data leakage on personal devices. The Write Filter prevents any data on the secure session from being saved or moved to the personal device.

Endpoint Validation Tool

Inspect the personal device during hiring and prior to onboarding to determine whether the device meets your requirements. Any remediation can be done before granting access.

Single Click Installer

Onboard your users into their secure environments quickly with little to no intervention from IT by providing them with a link to install Secure Remote Worker.

Malware Prevention

Secure Remote Worker enforces advanced whitelisting and blacklisting for applications and services on personal devices. Meaning the majority of malicious software, like screen scrapers or keyloggers, are prevented.

USB Device Blocking

USB devices are often seen as one of the main causes of security breaches and data leakage within an organization. Secure Remote Worker blocks mass storage devices but allows peripherals such as keyboards, headsets, etc.

| Dev Mudaliar

Global CIO,
Teleperformance

 

If there is anything that has put our customers at ease I would say its ThinScale and our partnership. We are installing Secure Remote Worker as our key security enforcement.

If there is anything that has put our customers at ease I would say its ThinScale and our partnership. We are installing Secure Remote Worker as our key security enforcement.

|Dev Mudaliar

Global CIO,
Teleperformance

How SRW works

When Secure Remote Worker is launched on the user’s personal Windows device, the user is temporarily placed in a secure workspace session where lockdown policies are applied and access to the underlying operating system is removed.

Once the user exits Secure Remote Worker, lockdown policies are removed and access to the underlying OS is restored.

secure remote worker by thinscale

Secure Remote Worker architecture

Secure Remote Worker use cases

Deliver multiple business benefits by easily, efficiently, and securely enabling work at home programs and BYOD ‘Bring Your Own Device’ initiatives.

BPO

Security & Compliance

Remote & Home Working

BYOD

Get started with

Secure Remote Worker.

Software-Only Endpoint Security Solutions

Secure Remote Worker

Turns personal Windows devices into a software-defined thin client for secure remote access and BYOD. 

ThinKiosk

Converts existing Windows devices into secure, centrally managed thin clients. 

IntelliPerform

Optimizes the use of desktop infrastructure resources to maximize device performance across your estate. 

Hire from anywhere & work from anywhere with cutting edge security software by ThinScale

Download our guide

Scalable, Secure, Hybrid & Remote Work

Secure Remote Worker

Turns personal Windows devices into a software-defined thin client for secure remote access and BYOD.

ThinKiosk

Converts existing Windows devices into secure, centrally managed thin clients. 

IntelliPerform

Optimizes the use of desktop infrastructure resources to maximize device performance across your estate. 

By Use Case

(NEW) Device Analytics

The first responder's toolkit for IT teams

BYOD

Secure, controlled Bring Your Own Device

Remote & Home Working

Desktop & Application delivery for WfH

Hybrid Working

Seamless IT experiences at home & in-office

PC Repurposing

Convert existing devices into thin clients

Security & Compliance

True endpoint security for your entire estate

Desktop as a Service (DaaS)

Simplify and accelerate your DaaS deployment

By Industry

BPO

We work with contact centers, IT services, healthcare, financial services and other CX providers to secure and enhance their IT operations.

Blog

Advice and learnings for CX industry leaders

Analyst Reports

Leading analysts support ThinScale

Featured Resources

Increasing role of BYOD in CXM

Everest Group report on key trends, challenges & opportunities.

Read more

Shipping devices is a bad idea

An alternative approach to equipping and onboarding new employees.

Read more

Resources

Loading...