Average Ratings 0 Ratings
Average Ratings 0 Ratings
Description
Ivanti User Workspace Manager provides a cohesive digital workspace that enhances desktop setup, streamlines migration processes, and secures user sessions across various environments including physical, virtual, and cloud-based systems. By utilizing a multi-threaded logon engine, it supersedes inefficient scripts and Group Policy configurations with context-aware personalization that ensures rapid logon experiences. Additionally, the on-demand profile management feature minimizes data bloat and prevents corruption by only loading essential information. The Application Control feature enforces dynamic lists of allowed and denied applications through pre-configured templates, ensuring that only verified executables can run, while the Privilege Management function allows specific applications to receive elevated permissions without revealing full administrative credentials. Furthermore, Roaming Office 365 caches boost performance during virtual sessions, and seamless help-desk integration facilitates self-service options for urgent privilege elevation or application access requests. The system's granular policies are designed to adjust based on factors such as time, location, device type, network conditions, and user context, ensuring a tailored user experience. Overall, this comprehensive solution not only enhances efficiency but also strengthens security across diverse working environments.
Description
RDS-Shield operates as an independent Windows Service that efficiently manages numerous server events while featuring a user-friendly Administration interface. There's no requirement to install Java, perform PHP updates, or download Microsoft C++ libraries or .NET, as everything necessary is bundled together with remarkable power. Simply download and install it to explore its capabilities. Say goodbye to the intricacies of Group Policy Objects (GPO) and Active Directory (AD). For instance, you can easily designate that all users within a specified group are placed in a highly secure user environment, while assigning one account to a secured user session, and allowing others to operate in Kiosk Mode. You have the ability to import Applocker rules effortlessly without accessing GPO, enable Homeland Access, set Working Hours, and manage Intrusion attempts. What you configure is what takes effect right away. Your settings are implemented instantly without the need for rebooting, logoff, or logon for those currently connected, and they will also apply to future accounts or users who are not currently connected. Are you ready to enhance your security measures with just a few easy clicks? Get started now and experience the simplicity of streamlined security management.
API Access
Has API
API Access
Has API
Integrations
Ivanti
Microsoft Office 2024
Pricing Details
No price information available.
Free Trial
Free Version
Pricing Details
$299 one-time payment
Free Trial
Free Version
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Vendor Details
Company Name
Ivanti
Founded
2017
Country
United States
Website
www.ivanti.com/products/user-workspace-manager
Vendor Details
Company Name
Marty Soft Conception
Founded
2008
Country
France
Website
rds-shield.com
Product Features
Desktop as a Service (DaaS)
Admin Console
Application Management
BYOL Management
Backup & Recovery
Cloud Encryption
Device Management
File Management
GPU Virtualization
Multi-Factor Authentication
Policy Management
Single Sign On
User Provisioning
Product Features
IT Security
Anti Spam
Anti Virus
Email Attachment Protection
Event Tracking
IP Protection
Internet Usage Monitoring
Intrusion Detection System
Spyware Removal
Two-Factor Authentication
Vulnerability Scanning
Web Threat Management
Web Traffic Reporting
Network Security
Access Control
Analytics / Reporting
Compliance Reporting
Firewalls
Internet Usage Monitoring
Intrusion Detection System
Threat Response
VPN
Vulnerability Scanning