ThinScale 8.4: Smarter, Safer, and Easier IT Management

We’re excited to announce the latest ThinScale 8.4 release, packed with powerful features designed to improve security, enhance network control, and simplify IT administration. Let’s explore what’s new: What’s New? Geolocation-Based Access Policies  Take control of where and how users access your environment. Our brand-new Geolocation Access Policies allow you to enforce location-based checks, including: … Read more

Managing remote employees with ThinScale

UEM for your remote employees

Unified endpoint management (UEM) is not a new concept. However, it is one that has seen a major shift in definition over the last few years. The influx of demand (and need) for remote work has led to UEM taking into account more features. The ideal UEM platform has changed from being endpoint management for … Read more

ThinScale’s Single Click Installer: Quickly secure endpoints at scale

Manage devices from the cloud with ThinScale Device Portal

Whether they have decided to convert existing endpoints to thin clients or you’ve decided to lockdown employee-owned devices for BYOD, IT teams will face the issue of deployment – specifically, how they can install the security software onto devices themselves. While there are a multitude of options for devices within the corporate network, such as … Read more

Secure browsers: Safe browsers for enterprise

Secure browsers are protected and controlled browsers built for enterprise use and are critical tools in fortifying the security posture in organizations. In this blog we will be going through the advantages offered by secure browsers, and specifically, how ThinScale can offer an enterprise browsing experience with our dedicated secure browser. The core focus of … Read more

UEM in the cloud with the ThinScale Device Portal

Maintaining control over your endpoint deployments is a vital part of endpoint security. Unified Endpoint Management (UEM) solutions allow IT teams to troubleshoot, deploy updates, and maintain visibility over their entire endpoint environment. However, UEM solutions often have their own needs and issues. We are happy to say we solved these issues with the new … Read more

ThinScale’s Virtual Desktop Agent – The access control you need

Virtual Desktop Agent

ThinScale Technology has always been at the forefront of endpoint security, specifically in breach & data leakage prevention. Securing endpoints ensures that even pre-existing malware is prevented from running on ThinScale machines. But what about end users who decide to try to circumvent this security? How can IT teams ensure a user with valid credentials does … Read more

ThinScale Cloud: Flexible, fast & powerful endpoint management

The ThinScale Cloud provides a browser-based portal that provides companies powerful endpoint management as well as faster IT deployment, quicker access to corporate resources, easier support, and automated updates. This blog will go through an overview of the cloud, its main components, and some of the benefits it will bring to your organization. Exploring the … Read more

Process Security: The Answer to Complex Endpoint Security Use Cases

ThinScale Provides complete flexibility when securing endpoint environments

Securing endpoints without breaking application compatibility or simply affecting productivity is an ongoing challenge for modern IT departments. Often, concessions must be made, either by restricting or losing app functionality or loosening security protocol and making exceptions for vital LoB apps. Striking the perfect balance between robust security policies and workload requirements is crucial. ThinScale’s … Read more

Role-based administration and why it is vital for true IT security

Secure your IT admins with ThinScale

Risks to environments with unlimited admin privileges Security breaches are often times worst case scenarios for organizations. However, they are more common than you may think. Since last year, there have been 817 data breaches in the US alone. The truth is a lot of these breaches can be avoided if proper cybersecurity principles are … Read more