Splashtop Secure Workspace Overview
  • 3 Minutes to read
  • Dark
    Light
  • PDF

Splashtop Secure Workspace Overview

  • Dark
    Light
  • PDF

Article Summary

Splashtop Secure Workspace (SSW) is a software platform that allows IT departments to manage access to resources anywhere—regardless of whether those resources are on site in an internal network, in a private or public cloud, or from a software-as-a-service provider.
safari_2880x1800_2.png

It is a high-performance, hyper-resilient, cloud-native, hardware-free network and security platform. It helps organizations provide secure access to the internet and their private network infrastructure and digital assets, including local and cloud resources, from end-point to data center to cloud. SSW offers a rich set of modern capabilities that enhance security while providing convenient access. Its integrated and flexible identity system, rich application support, wide range of clients and mobile apps, built-in credential management, and unique third-party access feature place it in a class of its own.

Splashtop Secure Workspace provides a unified approach to secure access, incorporating client and clientless support, network and application control, unified application provisioning (including SaaS and private applications), a single universal policy across user identity, device, application, and location, and end-to-end visibility and observability.

Key Benefits:

Simplify and Secure Access: Our Zero Trust access model ensures secure access to private applications, SaaS applications and network in real-time by enforcing the principle of least privilege. Administrators can easily set up policies within a single control panel to provide end-to-end security, including client security posture, authentication, authorization, conditional access, and privileged access.

Reduce Hardware with Browser-Based Application Access: Our solution provides secure access to web and network applications, including SSH, RDP, VNC, Telnet, and Kubernetes, all through a browser without the need for additional agents to be installed. This is achieved through zero-trust access. Our solution also offers mobile apps and browser extensions to enhance the user experience when accessing browser-based applications.

Simplify Work with Unified Network Access: Our solution guarantees zero-trust private access and internet access through the Splashtop Secure Workspace desktop application, which is available on major operating systems. The Secure Workspace desktop application not only ensures zero-trust network access to SaaS applications, private applications, and the internet, but also enhances the end user experience.

Speed Up User Onboarding and Application Provisioning: Our solution allows IT administrators to rapidly assign various applications (SaaS or private) to different user groups, along with the necessary network and security controls. End users can then access their entitled corporate applications through a unified app launcher, which boosts their productivity. When combined with SSW's Secrets Manager, end users can quickly and securely access their applications without compromising security.

Simplify Identity Access Management (IAM): Our solution includes built-in user and group management, customizable user onboarding, and advanced IAM controls. These controls include conditional authentication, conditional multi-factor authentication, integration with multiple identity providers (including enterprise-based providers such as Google Workspace, Microsoft Azure AD, Okta, and social-based providers such as Facebook, Google, and Microsoft), support for SAML, OIDC, OAuth, and SCIM/JIT provisioning for both users and groups.

Protect Access with Device Enrollment and Posture Enforcement: Device configuration enables administrators to manage the process of enrolling devices, while Device Posture Check improves network security by only allowing employees to connect with devices that meet certain security standards— OS versions, firewall status, disk encryption state, the validity of anti-virus software, and more.

Simplify Deployment with a Zero-Touch Experience: Unlike most ZTNA and VPN solutions that require complicated gateway deployment, firewall/router configuration, or complicated IP address planning within the private network, our solution provides a simple connector deployment model. It has many deployment options to fit your infrastructure and is a zero-touch user experience.

Conveniently Provide Secure Third-party/Privileged Access: Our solution ensures secure access for third parties by utilizing anonymous access links or third-party controlled identity providers, granting access to privileged systems, with session recording for peace-of-mind and compliance, without exposing login credentials to the third-party user.

Influence Secure Behavior with Secure-by-Design Password Management: Our Zero-knowledge password manager for businesses provides secure storage, sharing, and access to login credentials and other sensitive data. The sensitive information is protected by a strong authentication key derived from a master password known only to the user, and Zero Trust policies can be enforced by the IT administrator to protect access to the password and the sensitive data.


Was this article helpful?