Applications
  • 2 Minutes to read
  • Dark
    Light
  • PDF

Applications

  • Dark
    Light
  • PDF

Article Summary

Applications play a crucial role in Splashtop Secure Workspace as they represent network and application resources that administrators can grant users access to. Administrators can associate specific conditional policies with each application to ensure secure and controlled access to these resources. There are multiple types of applications that can be defined and managed within Splashtop Secure Workspace: private applications, public applications and cloud browser applications.

Private applications are network resources that are not directly accessible from the internet. Examples include web servers, remote desktops, and SSH Daemons that reside within a private network. To enable access to private applications, Splashtop Secure Workspace utilizes Connectors, which mediate access through the Splashtop Secure Workspace Global Edge Network. For private applications, users have the option to access them either through network access or browser access. Network access requires establishing a secure tunnel using the Splashtop Secure Workspace desktop application and then launching a native desktop application. Alternatively, browser access allows users to directly access private applications using a web browser without the need for the desktop client. Administrators can also configure an application to support both network and browser access.

Administrators have the flexibility to assign different credentials to applications using dynamic credential assignment. This feature allows users to access privileged accounts, such as admin or service accounts, without having direct knowledge of the actual credentials. Administrators can assign credentials from their personal vault or the organization's vault to the application and the associated user groups.

Public applications, on the other hand, are typically Software-as-a-Service (SaaS) applications like Dropbox, Box.com, Office 365, and Google Workspace. Administrators can integrate these applications with Splashtop Secure Workspace by assigning the Identity Provider (IDP) from the SaaS application, enabling single sign-on functionality. They can also assign entitlements and conditional access policies to enforce corporate security policies for these applications. Dynamic Name ID capabilities support privilege account sharing for public applications.

Cloud Browser applications, a key component of secure workspace solutions, facilitate web isolation, also known as Cloud-based Browser Isolation (CBI). This security approach detaches the user's device from direct interaction with the internet by conducting all web activities within a secure, cloud-hosted environment. This strategy of segregating internet browsing activity shields data, devices, and networks from a variety of internet-originated risks, including:

  • Malicious software and digital extortion schemes transmitted via the web
  • Newly emerging security threats for which patches or fixes are not yet available
  • Weaknesses in web browsers, including issues with add-on software
  • Harmful files obtained from internet downloads
  • Dangerous URLs embedded in deceptive email campaigns
  • And numerous other threats

Furthermore, Cloud Browsers do more than just isolate threats from web content. They also manage isolated privileged access. This includes allowing third parties (such as contractors and partners) to access a company’s private applications or SaaS accounts, and facilitating shared account access across multiple teams. By sandboxing this privileged access, Cloud Browsers help prevent data leaks.

By provisioning both public, private applications and cloud browser applications within Splashtop Secure Workspace, users benefit from a unified workspace that allows convenient access to all necessary applications. Whether accessing internal network resources or external SaaS applications, Splashtop Secure Workspace ensures a secure and efficient experience while maintaining compliance with corporate security policies, providing users with a cohesive and streamlined work environment.

Add public application
Add private application
Add Discovered Applications
Cloud Browser Application


Was this article helpful?