Untrusted Device | 3rd Party Device Estate
Many organizations frequently have devices accessing the corporate network which are not issued or managed by their IT team.
These devices often do not meet the required security standards (encryption, authentication, access controls etc).
ThinScale enables IT to enforce their security standards and access controls on untrusted devices.
Security and access controls for untrusted devices
Whether it’s an agency or contractor, 3rd parties often require short term access to your virtual environment.
In addition to malware, they may be running out-dated or unsupported applications, firmware, and firewalls which introduce vulnerabilities into your infrastructure.
ThinScale addresses these unique challenges by creating secure, isolated sessions on any Windows device, strictly controlled by your IT team.
How does ThinScale secure untrusted devices?
The user is logged into a corporate profile (controlled by your IT team) within a secure workspace, to access VDI / DaaS (or local apps).
Apps, services, & URLs can be whitelisted or blacklisted within this secure workspace, to prevent malware or unapproved services from running.
All data created during the secure session is saved to a hidden, bit-locker encrypted temporary drive that cannot be read by unapproved processes.
Key security features
Secure isolated sessions
Launches a secure, compliant, IT-controlled and configured session on any Windows device where users can access their virtual workspace​
Stops malware before it starts
Execution Prevention stops unauthorized applications, services and malware from running on the endpoint
Data loss prevention and encryption
Data is saved to a temporary drive that is inaccessible to unauthorized processes, and all data can be set to delete after each session
Control access to VDI / DaaS
Access to the corporate network is only possible when a secure session is running, giving your IT team total control over its cybersecurity posture