Platform Overview

A next-generation DaaS solution built for securing a global workforce

How it works

The Tehama platform creates secure virtual rooms and desktops on the cloud that connect remote workers to mission-critical and data-sensitive systems using an encrypted Tehama gateway.

At the core of the platform is a unique architecture that creates a secure perimeter around a virtual room, and within that room, users can access secure virtual desktops.

Each Tehama Room includes all the controls and capabilities required to quickly onboard, manage, scale, secure, and audit a global workforce or third-party vendor.

The Tehama Room operates as a virtual extension of your secured business infrastructure in the cloud. The result is more security, more control, more isolation—with almost no set-up time and an endless amount of savings in software licensing costs.

Tehama Secure Virtual Room Diagram explaining how it works

Support any workload with multiple desktop configurations

Tehama offers both Windows and Linux virtual desktops that meet any workload need, from standard office use to graphics-heavy computing, and everything in between. 

Protect sensitive assets with dynamic firewall rules

Firewall rules allow you to customize access to virtual desktops and applications, and adapt and respond intelligently to shifting conditions.

Ensure compliance
with built-in policy controls 

Policies enforce users to meet certain entry requirements before gaining access to a desktop or room, helping organizations meet specific regulatory requirements like SOC 2 Type II, GDPR, OSFI, FIPS, 23 NYCRR 500,  and HIPAA.

Collaborate & share information securely with the File Vault

The File Vault allows users to securely transfer and share files with other desktops in the Room.  Files are continuously scanned for malicious content, with an auditable view over which files are uploaded and downloaded within a room.

Log all activities using session recordings and the Activity Stream

Everything that happens in a Tehama Room is fully visible using session recordings and detailed audit logging. This means every activity is perfectly witnessed in real-time, providing hard evidence for regulators or auditors looking to prove compliance.

Maintain full control of privileged credentials using the secrets vault

Each Tehama Room includes a secrets vault that provides secure storage and retrieval for access credentials, eliminating the need to distribute credentials through insecure channels like email. Secrets are accessible only from within a desktop in the Room.

Protect against IP & data theft with zero-trust access controls

Using tools such as segregated network access, endpoint isolation, multi-factor authentication and least privilege permissions, all intellectual property and data within a Tehama Room is kept safe and secure. 

Connect remote workers to systems with a Tehama Gateway

The Tehama Gateway establishes a secure channel between a Tehama Room and your organization’s private network, connecting workers with mission-critical data. 

Additional features

The following features are also included in the Tehama platform, at no extra cost:

  • Ongoing malware and virus protection
  • Single sign-on support
  • Ability to create custom desktop images
  • Group policy management
  • Automated patches and upgrades
  • Standard support
Tehama Session Recordings
Tehama Activity Stream

Secure, audit and optimize end-user devices with Tehama Desktop Intelligence and Automation

Tehama Desktop Intelligence and Automation (DIA) is an add-on service that helps secure, audit and optimize end-user devices. 

With this add-on service, administrators can centrally manage all virtual desktops, as well as physical devices. 

Built-in dashboards provide deep visibility into desktop health and performance, while scripts allow you to create actions and automate delivery across desktops. 

Tehama Desktop Intelligence and Automation

Our subscription and consumption-based pricing options present a lower overall total cost of ownership and higher overall value when compared with the other legacy VDI and DaaS solutions out there. The flexibility of our elastic consumption model means your desktop needs can scale up or down without requiring a monthly minimum commitment.

Tehama vs. our competitors

No matter how organizations facilitate remote work—be it via legacy DaaS, Virtual Desktop Infrastructure (VDI) or Virtual Private Networks (VPNs)—these solutions are typically full of hidden costs and complexities. Worst of all, you’re left to fend for yourself when it comes to the most important aspect of remote work: securing it.

Today’s legacy VDI and DaaS providerslike Citrix, VMware and Microsoftdo not offer a complete solution for securing remote work and connecting remote teams to data.  With any of our competitors, you would need to integrate multiple vendor solutions to do what Tehama’s single platform does. 

One hour to productivity

Tehama provides all the components required to quickly and securely onboard and manage your global workforce—improving time-to-value and scalability, while reducing downtime for users and improving the overall employee experience.
Icon of a cloud with the Tehama logo

STEP 1

Create a Tehama Room

The Tehama Room is created in the cloud in less than 15 minutes and works with any hybrid (cloud or on-prem) infrastructure.

Icon of silhouettes with + signs

STEP 2

Invite Users

Easily add employees or third-party vendors and have them enroll within minutes.

Icon of a lock with connected dots around it

STEP 3

Grant Access to Resources

Define network segmentations, credential, firewall, and file policies to enforce compliance and regulations.

Icon of a desktop window with code

STEP 4

Add Users to a Desktop

Provide fully-provisioned, virtual desktops that can be shared between workers.

Icon of a timer with a cog

STEP 5

Start Work

Get to work, and have complete confidence that every move is being audited.

Test it out today with Tehama’s free 30-day trial.