DaaS Platform Overview

A next-generation Desktop as a Service solution built for securing a global workforce

How it works

The Tehama platform creates secure virtual rooms and desktops on the cloud that connect remote workers to mission-critical and data-sensitive systems using an encrypted Tehama gateway.

At the core of the platform is a unique architecture that creates a secure perimeter around a virtual room, and within that room, users can access secure virtual desktops.

Each Tehama Room includes all the controls and capabilities required to quickly onboard, manage, scale, secure, and audit a global workforce or third-party vendor.

The Tehama Room operates as a virtual extension of your secured business infrastructure in the cloud. The result is more security, more control, more isolation—with almost no set-up time and an endless amount of savings in software licensing costs.

Support any workload with multiple virtual desktop configurations

Tehama offers both Windows and Linux virtual desktops that meet any workload need, from standard office use to graphics-heavy computing, and everything in between.

Manage key security settings with centralized Room controls

Tehama’s Room Directory, zero-trust access controls, policy controls and dynamic firewall rules ensures your organization meets security and compliance requirements with no integration, infrastructure or additional IT administration.

Keep data protected with optional room features

Securely capture activity via session recordings in the Audit Vault, transfer files safely using the File Vault, and store privileged access credentials and firewall rules in the Secrets Vault. Utilize the App Vault to centralize application management and updates without requiring additional tooling or custom images.

Establish A Secure Channel Between A Tehama Room And Your Organization’s Private Network, Using the Tehama Gateway

The Tehama Gateway establishes a secure channel between a Tehama Room and your organization’s private network, connecting workers with mission-critical data. You can also enable Tehama’s Domain Join feature to integrate a Room with your existing Active Directory implementation.

Secure, audit and optimize end-user devices with Tehama Desktop Intelligence and Automation

Tehama Desktop Intelligence and Automation (DIA) is an add-on service that helps secure, audit and optimize end-user devices. 

With this add-on service, administrators can centrally manage all virtual desktops, as well as physical devices. 

Built-in dashboards provide deep visibility into desktop health and performance, while scripts allow you to create actions and automate delivery across desktops. 

Additional features

The following features are also included in the Tehama platform, at no extra cost:

  • Ongoing malware and virus protection
  • Single sign-on support
  • Ability to create custom desktop images
  • Group policy management
  • Automated patches and upgrades
  • Standard support
Tehama Session Recordings
Tehama Activity Stream

Our subscription and consumption-based pricing options present a lower overall total cost of ownership and higher overall value when compared with the other legacy VDI and DaaS solutions out there. The flexibility of our elastic consumption model means your desktop needs can scale up or down without requiring a monthly minimum commitment.

Tehama vs. our competitors

No matter how organizations facilitate remote work—be it via legacy DaaS, Virtual Desktop Infrastructure (VDI) or Virtual Private Networks (VPNs)—these solutions are typically full of hidden costs and complexities. Worst of all, you’re left to fend for yourself when it comes to the most important aspect of remote work: securing it.

Today’s legacy VDI and DaaS providerslike Citrix, VMware and Microsoftdo not offer a complete solution for securing remote work and connecting remote teams to data.  With any of our competitors, you would need to integrate multiple vendor solutions to do what Tehama’s single platform does. 

Built-in Capabilities Tehama Legacy DaaS Legacy VDI
Virtual Desktops
Zero-Trust Network Isolation
Multi-factor Authentication and Endpoint Isolation
Least Privilege Permissions
Data and IP Protection
Deep Forensic Auditing
Regulatory Compliance and Auditing