How Device Trust is Key to Securing Cloud Access

Device trust is the process of analyzing whether a device should be trusted and therefore is authorized to do something.
It’s critical that the devices accessing company data are trustworthy. Determining which devices should be trusted is a unique decision made by each organization depending on their risk tolerance and compliance requirements.
Different levels of trust are required for low-risk and high-risk resources. Furthermore, compliance requirements are dependent on industry regulations and types of company and customer data that the organization collects and needs to protect.
For example, healthcare professionals shouldn’t be able to access sensitive patient medical records from unmanaged, personal machines with unencrypted disks, because that violates HIPAA requirements. However, it doesn’t infringe on HIPAA requirements for healthcare professionals to access their HR benefits from their phone. Each organization has unique standards they need to enforce, but it’s difficult to maintain these standards on some devices.


















By clicking 'Download Now' you agree to our Terms of Use. We take your privacy seriously. For more information please read our Privacy Policy. By registering with the Enterprise Guide you will automatically receive our weekly Product Update and Technology Insider eNewsletters.

Copyright 2021 Enterprise Guide. All Rights Reserved. Terms of Use | Privacy Policy