Device Security for Web Access

As long as a person is authenticated most users have seamless access to cloud services and content. Therefore, it’s equally important to also secure devices used by your brokers/agents, vendors and consultants – as well as your own employees in a hybrid workplace.

Device security is a cornerstone for Zero Trust.

platform
How it Works
Ensure is a U.S. patented technology for organizations to educate, assess, and enforce the security of unmanaged devices.
img

Trust through Education and self-assessment

A first step is to assess the level of security of external devices. This is done through a series of questions shown at a portal login. Each assessment is combined with education.

Ensure provides insights and suggestions for how to improve the device security. The system has a suggested default setting for the cadence of educational prompts. You can use these default flows, or you easily create your own.

Finally, the device security can be verified and validated by the Ensure app. The app is called upon at subsequent logins to verify the current device security status.

platform-works
  • Your antivirus is turned on
  • Your hard drive is encrypted
  • Your firewall is turned on
  • Your OS is not up-to-date
img img
img
Web based Admin

The system populates itself as external devices log in. Consequently, there is no need to on- or off-board devices. Each device is assessed or validated irrespectively of who is behind the keyboard.

Compliance statistics can be uploaded through an API. There is no ongoing admin once policies are set. It’s a true Plug-and-play!

img
Compliance Dashboard

You don’t need to train your technicians for the administration of the system. Once implemented, it automatically educates, verifies and denies non-compliant devices access unless they have the required security settings in place.

Real-time monitoring is available through the Ensure dashboard.

Third-party Devices
Ensure supports PCs running Windows 10 and 11 Home, Pro, and Enterprise as well as Mac OS, smartphones and tablets running newer versions of iOS and Android.

Ensure supports most browsers: Edge, Google Chrome, Firefox, UC Browser and Safari.
img
img
Device Security Detection & Self-Remediation

The Ensure Assessment App collects key technical details, including IP address, date, time, browser type, and a unique Ensure device ID. It checks for operating system updates, encryption status, active anti-malware and firewall protection, and ensures all user accounts are password protected. It can also block users if a Remote Access software is active. No personal data is collected, and IP addresses can be excluded upon request. Once installed, all future security checks run seamlessly in the background.

Ensure is vendor-agnostic, identifying security vulnerabilities across all device types and operating systems. It also verifies that Android devices are not rooted.

Results are shared directly with the user, who is given the opportunity to self-remediate any identified security issues.

Features
img
Install a JavaScript

All you need is two lines of code:  The dashboard contains an implementation guide, as well as the JavaScript to activate Ensure on your web portal. There is also a Java script library available for a seamless integration with websites using FIDO or WebAuth authentication standards at login.

Once installed, your web login portal is secured by the Ensure technology. Each device will be prompted to read the educational popups and/or download an agent depending on your configuration of the system.

Statistics

Real-time device security statistics can be downloaded from the platform or accessed through an API.

  • Overall compliance
  • Education engagement
  • Verified devices
  • Non-compliant devices
  • Compliance verticals
Set your own security policy

Customize the security settings to correspond to your third-party risk management program.

  • Anti-Malware check enabled
  • Encryption check enabled
  • Firewall check enabled
  • Lockscreen check is enabled
  • Passphrase check enabled
  • Remote Access Software check i enabled
  • Updates check enabled
  • Rooted check enabled
Ready to get started?
It only takes a few minutes to set up.