Daas and VDI continue to provide anwhere, secure access from any device to corporate workspaces. As the user is more mobile than ever before, security, compliance, and licensing requirements demand additional contextual control over virtual applications and desktops. Join this webinar to see how Ivanti and Device Trust can help.
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
Contextual Security and Application Control for Virtualized Desktops
1. Welcome to the Webinar
Contextual Security and Application Control for Virtualized Desktops
Tim Cox
Principal Sales Engineer
Ivanti
Jens Schmidt
Sales Manager
deviceTRUST
Sascha Goeckel
Pre-Sales Manager
deviceTRUST
2. Agenda
• Welcome
• Ivanti Application Control
• deviceTRUST Contextual Security
• Live Demo
• Summary
3. Established in 1985
Privately owned
Headquarters in Salt Lake City, UT.
~1,900 employees in 23 countries
27,500+ customers, 47.5M+ endpoints
1,500+ partners
10 acquisitions since 2012
7. WHAT IS APPLICATION CONTROL™, AND HOW CAN IT HELP
ENTERPRISE BUSINESSES?
1. Remove administrative rights
2. Stay up-to-date on business objectives through
operational security practices
3. Control network access to critical applications
and data
… ALL WITHOUT AFFECTING the user’s workflow and productivity, yet also
helping to enable their relationship with IT.
8. APPLICATION CONTROL:
KEY DIFFERENTIATORS AND FOCUSES
Runs ‘Headless’ and Secure by Design
On the workspace, just an agent and configuration
are needed, backend optional.
Works online OR offline.
Protection against uninstallation.
Agnostically Awesome
Works on any Windows OS (version applicable).
Works across any platform; physical, virtual,
datacenter, or cloud.
Say Goodbye to Traditional Whitelisting
Trusted Ownership ensures those applications
installed by trusted installers can run without
needing to whitelist them.
Quickly apply to any scenario
Protect against File-Based (Ransomware) & File-
Less Malware
Trusted Ownership creates a layer of ‘zero-trust’;
everything is blocked from executing except
authorized applications.
Confidently Control Licensed Applications
Ensure only those needing access to licensed applications
can run them
9. APPLICATION CONTROL: PRIVILEGE MANAGEMENT
Facilitate the removal of admin rights
from enterprise
Allow the execution of applications that cannot run with
standard user rights
Not just to admin, to any rights level that is needed
Allow users access to the tools they need,
without excess rights
Defrag the drive, change time, etc.
Support personal applications while allowing it
the control they require.
Known good locations containing known good apps
Elevation of active x installs
Apps within Internet Explorer
10. APPLICATION CONTROL: TRUSTED OWNERSHIP
On any windows system, there are certain accounts
that are trusted to introduce new software, where
everything they install is inherently ‘owned’:
The system account
Local admin
Trusted installer
“Administrators” groups (Local or Active Directory)
(Add your own users or groups from your environment)
As a fundamental security model of the Windows OS,
with application control, if the file is not owned by a
trusted ‘owner’, it won’t be allowed to execute.
WELCOME TO DYNAMIC WHITELISTING
11. APPLICATION CONTROL: POWER BEYOND PRIVILEGE
Contextual based control
SHA1/SHA2 Whitelisting
Metadata support
Certificate Support
Secure dialog box support
Passive mode
URL Redirection
Licensing / Compliance control
Software Asset Management
Application Network Access control
Windows 10 Support
Windows App Store Support
Prevent configured apps from being
terminated
Windows services protections
Application installation/uninstallation
protections
AD and OU Support
Scripted rules
Scriptable agents and console
Enterprise auditing
App V support
Citrix / Terminal Server Support
Registered allocated Windows altitude Driver
https://msdn.microsoft.com/en/us/library/windows/hardware/dn265170(v=vs.85).aspx
Certified MS Product
SCCM integration
AD/GPO deployment
SCOM Management packs
15. About us
• German-based ISV founded in January 2016
• Customers from the verticals Finance, Healthcare,
Transport & Government with up to 63,000 licensed
users
• Germany’s most active seed stage investor High-Tech
Gründerfonds (HTGF) invested in July 2017
Headquarter Office
HUB31, Darmstadt DE
Development Office
The Innovation Centre, Daresbury UK
26. Use Case Overview
• Conditional access based on context (network, Wi-Fi security, geolocation,
location, hardware used, corporate endpoint etc.)
• Contextual application access (e.g. with Ivanti Application Control)
• Location based resource mapping
• Wi-Fi roaming based default printer management
• Device-based licensing (e.g. Microsoft Visio license compliance)
• External partner access
• Improve usability
• Optimize screen saver configuration
• Inform user about endpoint is going out of battery
• Location aware Google Chrome Search Provider & Google Maps home
• Context everywhere (double-hop support)
• …
27. Live Demo
• Check out our Use Case videos:
• Website: https://deviceTRUST.com/Ivanti
• YouTube: https://www.youtube.com/channel/UCQIXvqqMDNjkcQQR48F7CDQ
28. Thank you
Internet: https://devicetrust.com
Email: sales@devicetrust.com
Twitter: @deviceTRUST
Contacts: Jens Schmidt
Email: jens.schmidt@devicetrust.com
Mobil: +49 (1520) 4457309
Sascha Goeckel
Email: sascha.goeckel@devicetrust.com
Mobil: +49 (151) 20522308
Do you like to know more about our solution, please contact us:
Editor's Notes
The Ivanti DNA… what makes us what we are, and unique in the industry, is the result of the organic work we’ve done over the years, as well as the strategic acquisitions we have made, each of which added capabilities in our 5 areas of focus:
IT Asset Management
IT Service Management
Operational Security
Unified Endpoint Management
Supply Chain enablement