Skip to main content

What is deviceTRUST?

Context-Aware security within Citrix Universal HMC, revolutionising Zero Trust with intelligent device context 

Traditional security approaches rely on static policies that can’t adapt to changing circumstances. deviceTRUST, included within Citrix Universal Hybrid Multi-Cloud (UHMC), transforms security by providing continuous, context-aware access control that adapts in real-time to device conditions, location, and compliance status – ensuring only trusted devices access your corporate resources. 

What exactly is deviceTRUST?

deviceTRUST consists of three integrated components that deliver intelligent, context-aware security:

Console provides the centralised management interface where administrators define security policies, configure device contexts, and monitor access decisions. The lightweight console simplifies complex security implementations through pre-built templates and intuitive policy creation.

Agent runs on endpoint devices and continuously evaluates device context, from hardware specifications and security posture to network location and compliance status. The agent provides real-time device intelligence that drives security decisions.

Client Extension integrates seamlessly with Citrix environments to enforce access policies based on the device context provided by the agent. This component ensures security decisions are implemented transparently without disrupting user productivity.

How deviceTRUST works in practice 

deviceTRUST operates by continuously evaluating device context and triggering automated responses based on your defined security policies. Unlike traditional security tools that make binary allow/deny decisions, deviceTRUST provides granular, adaptive control. 

 For example, a user accessing corporate applications from their managed laptop in the office might receive full access. The same user on a personal device from a coffee shop might have restricted copy/paste capabilities and limited application access. If that user then plugs in an unauthorised USB storage stick, deviceTRUST can automatically revoke access during the active session, informing the user why they have been disconnected. Remove the USB stick from the endpoint, the session restrictions lift, and the user can get back to where they left off. 

The system leverages real-time contextual information including device compliance status, geolocation, network security, hardware specifications, and security software presence to make intelligent access decisions that balance security with productivity. 

Essential Guide Webinar: On Demand

Maximising the value of NetScaler in Citrix Universal HMC – lessons from the field

Proven deployment flexibility 

deviceTRUST supports multiple deployment scenarios to match your infrastructure: 

VDI & DaaS environments: Secures virtual desktop and application access by ensuring only compliant devices can connect to your virtual infrastructure. 

Multi-Hop scenarios: Provides security across complex connection paths where users connect through multiple network hops or intermediary systems. 

Local device protection: Secures local applications and data on physical endpoints, extending zero trust principles to traditional desktop environments. 

This flexibility ensures deviceTRUST can secure your environment regardless of your current infrastructure or future migration plans. 

What problems does deviceTRUST solve? 

Corporate device detection: Many organisations struggle with unauthorised or unmanaged devices accessing virtual environments. deviceTRUST ensures only corporately managed or pre-defined known devices can access VDI, virtual applications, and DaaS, preventing malware exposure and data breaches. 

Real-time geoaccess control: Traditional security can’t respond to location changes during active sessions. deviceTRUST provides current geolocation-based access control, denying access from unauthorised locations and revoking access if users move to prohibited areas during sessions. 

Device compliance enforcement: Ensuring all connecting devices meet security and compliance standards across managed corporate devices, external partner devices, and BYOD is complex. deviceTRUST grants access only to secure and compliant devices, removing access if devices become non-compliant during sessions. 

Trusted network verification: Accessing corporate resources from unsecured networks poses significant risks. deviceTRUST guarantees secure access by allowing connections only from authorised and trusted networks, immediately revoking access if users connect from untrusted networks. 

Static security policies: Traditional security tools can’t adapt to changing circumstances. deviceTRUST provides dynamic, context-aware policies that adjust security posture based on real-time conditions. 

What does deviceTRUST replace?

deviceTRUST directly replaces or enhances several traditional security solutions:

  • Microsoft Conditional Access: Static policy-based access control
  • Okta Adaptive Authentication: Basic risk-based authentication
  • CrowdStrike Endpoint Detection: Endpoint-focused security observability without real-time enforcement
  • Traditional VPN Solutions: Network-level access without device context
  • Static Multi-Factor Authentication: Fixed authentication requirements regardless of risk
  • Separate Geolocation Tools: Standalone location-based access controls
  • Device Compliance Tools: Basic compliance checking without real-time enforcement
  • Network Access Control (NAC): Network-focused security without application context

Quantifiable cost savings

The financial benefits of deviceTRUST are substantial:

1

Reduced security incidents:

Context-aware security prevents breaches that static policies miss, avoiding average breach costs of £3.5-4.5 million per incident.
2

Consolidated security stack:

Replace multiple point security solutions with one integrated platform, reducing licensing costs by 40-60% compared to separate tools.
3

Decreased IT management overhead:

Automated, context-aware policies reduce manual security administration by up to 70%, freeing IT resources for strategic initiatives.
4

Improved compliance posture:

Real-time compliance enforcement reduces audit findings and potential regulatory fines.
5

Enhanced user productivity:

Seamless, transparent security doesn't interrupt user workflows, maintaining productivity whilst strengthening security.
6

Reduced help desk calls:

Intelligent access decisions eliminate many user access issues, reducing support overhead.

Citrix UHMC Value Accelerator Workshop

Ready to implement intelligent, context-aware security?

Contact us to discover how deviceTRUST within Citrix UHMC can transform your security posture whilst maintaining user productivity.
 
Already have UHMC? Let’s review what security capabilities you’re not using.

    The Citrix UHMC advantage

    As part of Citrix UHMC, deviceTRUST isn’t just another security tool – it’s an integrated component of your complete zero trust digital workspace platform. This integration provides:

    • Seamless integration: Works natively with Citrix Virtual Apps and Desktops, Gateway Service, and Adaptive Authentication
    • Unified policy management: Consistent security policies across your entire Citrix infrastructure
    • Enhanced monitoring: Integration with uberAgent provides comprehensive security and user experience analytics
    • Simplified deployment: Pre-configured templates optimised for Citrix environments
    • Consistent user experience: Security that adapts without disrupting productivity

    Rather than managing separate endpoint security, access control, and compliance tools from multiple vendors, Citrix UHMC with deviceTRUST provides a complete, integrated zero trust platform that reduces complexity whilst dramatically improving security posture.

    Looking to balance user productivity and risk?

    Get in touch to learn more about how deviceTRUST context aware access control improves security, user productivity and Citrix Universal HMC RoI. Call 0330 010 3443 or mail hello@clouddnagroup.com.