Untrusted Device | 3rd Party Device Estate

Many organizations frequently have devices accessing the corporate network which are not issued or managed by their IT team.

These devices often do not meet the required security standards (encryption, authentication, access controls etc).

ThinScale enables IT to enforce their security standards and access controls on untrusted devices.

Play Video

Security and access controls for untrusted devices

Whether it’s an agency or contractor, 3rd parties often require short term access to your virtual environment.

In addition to malware, they may be running out-dated or unsupported applications, firmware, and firewalls which introduce vulnerabilities into your infrastructure.

ThinScale addresses these unique challenges by creating secure, isolated sessions on any Windows device, strictly controlled by your IT team.

How does ThinScale secure untrusted devices?

A secure, isolated, and IT-managed session is launched on any untrusted device running on the Windows OS.

The user is logged into a corporate profile (controlled by your IT team) within a secure workspace, to access VDI / DaaS (or local apps).

Apps, services, & URLs can be whitelisted or blacklisted within this secure workspace, to prevent malware or unapproved services from running.

All data created during the secure session is saved to a hidden, bit-locker encrypted temporary drive that cannot be read by unapproved processes.

Data Loss Prevention (DLP): the infiltration and exfiltration of data is prohibited. Data can be set to self-delete post-session.
External USB storage devices can be blocked without stopping the use of other USB devices such as headphones or keyboards.
When the user is finished working, they close the secure session and are logged back into their personal profile on the device, exactly as it was.

Key security features

Secure isolated sessions

Launches a secure, compliant, IT-controlled and configured session on any Windows device where users can access their virtual workspace​

Stops malware before it starts

Execution Prevention stops unauthorized applications, services and malware from running on the endpoint

Data loss prevention and encryption

Data is saved to a temporary drive that is inaccessible to unauthorized processes, and all data can be set to delete after each session

Control access to VDI / DaaS

Access to the corporate network is only possible when a secure session is running, giving your IT team total control over its cybersecurity posture

There’s so much more you can achieve with ThinScale

Secure access to VDI / DaaS
Virtual desktops are vulnerable to threats on the endpoint itself like keyloggers and screen-scrapers. We make them secure.
Unified endpoint management
Configure and manage your entire estate from a single pane of glass, push patches and updates when available, and more.
Device analytics
Get real-time data on key performance metrics to identify and resolve device issues faster than ever, especially for a WFH/hybrid workforce.

Continue your research

Compliance reports
All ThinScale solutions are regularly pen-tested and help maintain compliance with PCI DSS, HIPAA, and GDPR. Read our compliance reports from Coalfire.
Product information
Want to learn more about the product? Read our technical datasheet to understand the key features and benefits in more detail.
More use cases
What else can ThinScale do for you? Check out our full list of use cases.

Ready to see ThinScale in action?