Skip to main content
Device Trust

Trusted identity. Trusted device.

Phishing-resistant authentication proves who is signing in. Device trust proves the machine they're on meets your security standards — without managing, monitoring, or controlling it.

See Pricing
Beyond Identity

For when you also need to verify the device

A user with a valid passkey signing in from a laptop with no disk encryption, no firewall, and an outdated OS is a verified identity on a compromised device. You need both.

Identity verified

Passkeys prove who the person is. Biometric verification on a hardware-bound credential. Phishing resistant. Replay resistant.

Device unknown

Is the disk encrypted? Is the firewall on? Is the OS patched? Without device trust, you're authorizing access blind.

Both verified

Device trust closes the gap. The right person, on a compliant device, accessing the right application. That's zero trust.

How It Works

Four signals. One compliance decision.

The Trustaige agent runs on macOS, Windows, and Linux. It checks four security signals and reports a pass or fail to the server. That's all it does.

Disk Encryption

FileVault on macOS. BitLocker on Windows. LUKS on Linux. If the disk isn't encrypted, a stolen laptop means exposed data.

Firewall

macOS Application Firewall. Windows Defender Firewall. UFW or firewalld on Linux. A device without a firewall is open to network-level attacks.

Screen Lock

An unlocked, unattended laptop is an open door. Screen lock verification ensures the device locks automatically when left idle.

OS Version

Unpatched operating systems carry known vulnerabilities. OS version checks ensure devices are running supported, patched software.

Enforcement

Compliance is enforced at authentication

Device trust isn't a dashboard you check manually. It's enforced every time a user authenticates to a protected application. Non-compliant device? Access denied.

User signs in

Passkey verified

Device checked

Posture evaluated

Access granted

Or denied

Per-application policies

Require device trust for your most sensitive applications โ€” admin panels, financial systems, source code repositories โ€” while leaving lower-risk apps unrestricted.

Continuous compliance

The agent reports posture at regular intervals. If a device falls out of compliance between authentications, the next sign-in is blocked until the issue is resolved.

Privacy

Device posture, not device data

Traditional device management (MDM) gives your IT team the ability to remotely wipe devices, read installed apps, track location, and control features. The Trustaige agent does none of that.

What the agent checks

  • Disk encryption enabled
  • Firewall active
  • Screen lock configured
  • OS version supported

What the agent never does

  • Remotely wipe or lock your device
  • Read files, emails, or messages
  • List installed applications
  • Track location
  • Install profiles or certificates
  • Control device features or settings

Transparency by design

The agent shows a menu bar icon with a "What We Collect" disclosure that lists every signal it reports. Users can see their compliance status in real time. The agent can be uninstalled at any time — it's consent-based, not forced.

Platforms

Cross-platform

The Trustaige agent runs on macOS, Windows, and Linux. On macOS it includes a native menu bar interface. On all platforms, it collects the same four signals and reports to the same server.

macOS

Native menu bar app. FileVault, Application Firewall, screen lock, and OS version. Universal binary for Intel and Apple Silicon.

Windows

Background service. BitLocker, Windows Defender Firewall, screen lock, and OS version.

Linux

Headless daemon. LUKS disk encryption, UFW/firewalld, screen lock, and OS version.

Device trust applies to desktop and laptop devices where sensitive work happens — the machines with access to admin panels, code repositories, and financial systems. Mobile devices authenticate via the browser without requiring an agent.

Use Cases

Built for organizations that care about privacy

BYOD environments

Employees won't accept MDM on personal devices. The Trustaige agent checks security posture without managing or surveilling the device. Users install it voluntarily and can remove it anytime.

Contractor and vendor access

You can't install MDM on devices you don't own. But you can require that contractors' laptops meet your security baseline before they access your systems.

Privacy-regulated industries

GDPR, CCPA, and sector-specific regulations require data minimization. The agent collects only four boolean signals โ€” the minimum needed to verify device security hygiene.

Remote and distributed teams

Remote employees work from home networks, co-working spaces, and airports. Device trust ensures every laptop meets your security baseline regardless of where — or how — the team works.

Verify the person and the device

Combine phishing-resistant authentication with privacy-first device trust. No passwords. No surveillance. No compromise.

See Pricing