Secure Untrusted Devices
Ensure the management and security of untrusted devices are in alignment with regulatory compliance standards such as: PCI DSS, HIPAA, and GDPR.
Protect your IT infrastructure against common attack vectors and vulnerabilities associated with untrusted devices accessing your corporate network.
Our software solution leverages the Windows OS. No USB drives or dual-booting required.
De-risking untrusted devices
A device that is not issued or managed by your IT team often won’t meet your security configurations and standards (encryption, authentication, access).
It may also be running out-dated or unsupported applications and firmware that are vulnerable to attack.
ThinScale gives your IT team the control needed to configure strict access policies and enforce key software updates and patching.
How does ThinScale secure untrusted devices?
Apps, services, & URLs can be whitelisted or blacklisted within this secure workspace, to prevent malware or unapproved services from running.
All data created during the secure session is saved to a hidden, BitLocker encrypted temporary drive that cannot be read by unapproved processes.
Key security features
Secure isolated sessions
Launches a secure, compliant, IT-controlled and configured session on any Windows device where users can access their virtual workspace
Stops malware before it starts
Execution Prevention stops unauthorized applications, services and malware from running on the endpoint
Data loss prevention and encryption
Data is saved to a temporary drive that is inaccessible to unauthorized processes, and all data can be set to delete after each session
Control access to VDI / DaaS
Access to the corporate network is only possible when a secure session is running, giving your IT team total control over its cybersecurity posture
Frequently asked questions
Learn more about how ThinScale secures untrusted devices
Yes, customers have the option to utilize the ThinScale Cloud or host their own management server.