A next-generation DaaS solution built for securing a global workforce
How it works
The Tehama platform creates secure virtual rooms and desktops on the cloud that connect remote workers to mission-critical and data-sensitive systems using an encrypted Tehama gateway.
At the core of the platform is a unique architecture that creates a secure perimeter around a virtual room, and within that room, users can access secure virtual desktops.
Each Tehama Room includes all the controls and capabilities required to quickly onboard, manage, scale, secure, and audit a global workforce or third-party vendor.
The Tehama Room operates as a virtual extension of your secured business infrastructure in the cloud. The result is more security, more control, more isolation—with almost no set-up time and an endless amount of savings in software licensing costs.
Support any workload with multiple desktop configurations
Tehama offers both Windows and Linux virtual desktops that meet any workload need, from standard office use to graphics-heavy computing, and everything in between.
Protect sensitive assets with dynamic firewall rules
Firewall rules allow you to customize access to virtual desktops and applications, and adapt and respond intelligently to shifting conditions.
with built-in policy controls
Policies enforce users to meet certain entry requirements before gaining access to a desktop or room, helping organizations meet specific regulatory requirements like SOC 2 Type II, GDPR, OSFI, FIPS, 23 NYCRR 500, and HIPAA.
Collaborate & share information securely with the File Vault
Log all activities using session recordings and the Activity Stream
Maintain full control of privileged credentials using the secrets vault
Protect against IP & data theft with zero-trust access controls
Using tools such as segregated network access, endpoint isolation, multi-factor authentication and least privilege permissions, all intellectual property and data within a Tehama Room is kept safe and secure.
Connect remote workers to systems with a Tehama Gateway
The Tehama Gateway establishes a secure channel between a Tehama Room and your organization’s private network, connecting workers with mission-critical data.
The following features are also included in the Tehama platform, at no extra cost:
- Ongoing malware and virus protection
- Single sign-on support
- Ability to create custom desktop images
- Group policy management
- Automated patches and upgrades
- Standard support
Secure, audit and optimize end-user devices with Tehama Desktop Intelligence and Automation
Tehama Desktop Intelligence and Automation (DIA) is an add-on service that helps secure, audit and optimize end-user devices.
With this add-on service, administrators can centrally manage all virtual desktops, as well as physical devices.
Built-in dashboards provide deep visibility into desktop health and performance, while scripts allow you to create actions and automate delivery across desktops.
Our subscription and consumption-based pricing options present a lower overall total cost of ownership and higher overall value when compared with the other legacy VDI and DaaS solutions out there. The flexibility of our elastic consumption model means your desktop needs can scale up or down without requiring a monthly minimum commitment.
Tehama vs. our competitors
No matter how organizations facilitate remote work—be it via legacy DaaS, Virtual Desktop Infrastructure (VDI) or Virtual Private Networks (VPNs)—these solutions are typically full of hidden costs and complexities. Worst of all, you’re left to fend for yourself when it comes to the most important aspect of remote work: securing it.
Today’s legacy VDI and DaaS providers—like Citrix, VMware and Microsoft—do not offer a complete solution for securing remote work and connecting remote teams to data. With any of our competitors, you would need to integrate multiple vendor solutions to do what Tehama’s single platform does.
|Built-in Capabilities||Tehama||Legacy DaaS||Legacy VDI|
|Zero-Trust Network Isolation|
|Multi-Factor Authentication & Endpoint Isolation|
|Least Privilege Permissions|
|Data & IP Protection|
|Deep Forensic Auditing|
|Regulatory Compliance and Auditing|
One hour to productivity
Create a Tehama Room
The Tehama Room is created in the cloud in less than 15 minutes and works with any hybrid (cloud or on-prem) infrastructure.
Easily add employees or third-party vendors and have them enroll within minutes.
Grant Access to Resources
Define network segmentations, credential, firewall, and file policies to enforce compliance and regulations.
Add Users to a Desktop
Provide fully-provisioned, virtual desktops that can be shared between workers.
Get to work, and have complete confidence that every move is being audited.