Secure & compliant BYOD for all endpoint environments

What is Secure Remote Worker?

A software-based solution that locks down a user’s personal Windows device to deliver a secure and compliant BYOD workspace.
Play Video

A secure, temporary workspace on any Windows device

When Secure Remote Worker is launched on the user’s personal Windows device, the user is temporarily placed in a secure, isolated workspace session.

Lockdown policies are applied to this session and access to the underlying operating system is removed.

Once the user exits Secure Remote Worker, lockdown policies are removed and access to the underlying OS is restored.

Key features

Segregates personal and corporate data to stop contamination

Prevents corporate data being saved to the personal device

Software-based: no dual-booting or USB drives needed

Single-click installer for fast deployment and onboarding

Execution prevent stops malware & unathorized apps / services

USB storage filter, watermarking, data encryption and more

How does SRW work?

Employee launches secure, isolated, and IT-managed session on any personal Windows device, logging them out of their personal user profile.

Employee is logged into a corporate profile within a secure workspace with no admin privileges, where they access VDI / DaaS or local applications.

Apps, services, & URLs can be whitelisted or blacklisted within the secure workspace, preventing malware un-approved services from running.

All data created during the secure session is saved to a hidden, BitLocker encrypted temporary drive that cannot be read by unapproved processes.

Data Loss Prevention (DLP): infiltration and exfiltration of data is prohibited. Data can be set to self-delete post-session.
External USB storage devices can be blocked without stopping the use of other USB devices such as headphones or keyboards.
When the employee is finished working, they close the secure session and are logged back into their personal profile on the device exactly as it was.

Secure Remote Worker is compatible with major VDI / DaaS vendors

“If there is anything that has put our customers at ease I would say it’s ThinScale and our partnership. We are installing Secure Remote Worker as our key security enforcement.”
Dev Mudaliar

Global CIO, Teleperformance

Product architecture

Frequently asked questions

Learn more about Secure Remote Worker

This behaviour can be configured by the IT team, giving you full control over what services and apps are allowed to run during the secure session. When the secure session ends, any background services or apps that had been running prior to the session will be resumed.
If malware is already running on the device, then it will be stopped as soon as the secure session is launched. This includes screen-scrapers and keyloggers which sit on the endpoint. Only IT-approved services and apps can run during a secure session.
As long as the VDA is deployed, they will not be able to be to do this. ThinScale’s VDA (Virtual Desktop Agent) checks each time there is an attempt to access the VDI / DaaS to ensure that the secure session is running on the device. If it is not, the connection is blocked.
No. ThinScale’s Dual Persona technology enforces complete segregation between personal and work-related data, with zero chance of contamination in either direction.
ThinScale’s solutions can be remotely wiped from the device by your IT team, removing the ability to launch a secure session and revoking access to the corporate network. This is crucial when managing a remote / WFH workforce.

Yes, customers have the option to utilize the ThinScale Cloud or host their own management server.

Continue your research

Compliance reports
All ThinScale solutions are regularly pen-tested and help maintain compliance with PCI DSS, HIPAA, and GDPR. Read our compliance reports from Coalfire.
Product information
Want to learn more about the product? Read our technical datasheet to understand the key features and benefits in more detail.
More use cases
What else can ThinScale do for you? Check out our full list of use cases.

Ready to see Secure Remote Worker in action?