deviceTRUST boosts Citrix security with context-aware access control

Streamline your zero trust strategy with deviceTRUST. Continuous contextual access ensures only compliant devices and applications access company data—without interrupting users.

women working on laptop in car

Discover the key benefits

  • wrench

    Productivity

    deviceTRUST contextual security protects company data and resources, reduces digital workspace management costs, and maintains productivity.

  • icon chart

    Seamless

    Integrate deviceTRUST quick and easy into existing authentication systems without additional hardware components.

  • settings and wrench icon

    Customizable

    Customized configurations are provided by deviceTRUST to meet specific security and access control needs.

  • 2 wrenches

    Efficient

    deviceTRUST's streamlined three-component architecture—Console, Agent and Client Extension supports your zero trust digital workspace strategy.

Product documentation: deviceTRUST

Find detailed guides, new release information, and troubleshooting resources for all deviceTRUST releases.

View deviceTRUST documentation

Everything you need for zero trust

Context

Always-current device context

Define and maintain a granular, always up-to-date context for every device. Leveraging device-related information, you can create custom contexts tailored to your needs, whether it's a single data point or a combination of multiple properties. This flexible, easy-to-configure framework continuously evaluates all device properties, ensuring the information you need for access management is always current and available to support your zero trust approach.

deviceTRUST console new policy screenshot

Real-time action

Templates

Deployment scenarios

Whether it's a local PC, laptop, VDI, or DaaS environment, deviceTRUST allows for individualized and always up-to-date configuration and security.

Explore the deployment scenarios:

See how deviceTRUST can help

Corporate device detection

THE BUSINESS CHALLENGE:

Many organizations struggle with securing access to their virtual environments like VDI, virtual applications, and DaaS. Unauthorized or unmanaged devices pose a threat, increasing the risk of malware exposure, cyberattacks, and expensive data breaches. This vulnerability makes it difficult to maintain regulatory compliance, leaving businesses open to fines and reputational damage.

THE SOLUTION:

deviceTRUST provides a reliable solution by ensuring only corporately managed or pre-defined known devices can access these virtual environments. By leveraging specific device information, deviceTRUST achieves accurate detection, preventing unauthorized access and mitigating the associated security risks. This extensive control allows organizations to secure their virtual infrastructure and maintain compliance.

Real-time geoaccess

THE BUSINESS CHALLENGE:

Organizations must control access to sensitive data based on device location. Without geolocation-based access control, unauthorized access from unexpected or high-risk locations becomes a threat. The inability to verify user location creates security vulnerabilities.

THE SOLUTION:

deviceTRUST provides current geolocation-based access control, allowing organizations to secure their data. By using real-time location properties, deviceTRUST enables immediate actions, such as denying access during logon from unauthorized locations. It also allowed for the revocation of access during an active session if a user’s location changes to a prohibited area, ensuring continuous security and mitigating potential risks.

Secure and compliant devices

THE BUSINESS CHALLENGE:

Businesses need to ensure that all devices connecting to their network meet required security and compliance standards. This extends across all device types, including managed corporate devices, external partner devices, and BYOD devices. Ongoing safeguarding the compliance of a range of devices is crucial to prevent security breaches and maintain regulatory compliance.

THE SOLUTION:

deviceTRUST ensures access is granted only to secure and compliant devices. By leveraging real-time contextual information about each device, deviceTRUST can deny access at logon if security or compliance requirements are not met. Additionally, it can remove access during an active session if a device becomes non-compliant, providing ongoing protection and mitigating potential risks.

Trusted network connections

THE BUSINESS CHALLENGE:

Accessing corporate resources from unsecured or unauthorized networks poses risks, including data breaches, malware attacks, etc. Organizations must ensure that users connect from trusted and secure networks to protect data and maintain a strong security posture. The challenge lies in effectively verifying and controlling network access in real time.

THE SOLUTION:

deviceTRUST guarantees secure access to corporate VDI, virtual applications, and DaaS environments by allowing connections only from authorized and trusted networks. Leveraging real-time network evaluations, deviceTRUST prevents unauthorized access by immediately denying access at logon or revoking access during a session if a user connects from an untrusted network. This strengthens security, supports compliance efforts, and protects valuable corporate resources.

Citrix Tech Zone

Learn from experts, gain insight from fellow users, and contribute to knowledge on Citrix technologies and integrations for more successful Citrix deployments.

man riding bike