skip to Main Content
IGEL Ready Showcase Logo

Filter by:


Tehama Virtual Office as a Service

Cloud-Based Virtual Rooms and Desktops

Organizations need access to global talent, and, in a world forever changed by COVID-19, they need to enable their employees to work from home. Yet, to grant global teams and third parties access to mission-critical and data-sensitive systems, the current solutions in the market like VPN, DaaS, VDI, or shipping managed laptops are costly, slow, and time-consuming. They require  professional services and lots of billable time to set up, and even so expose security vulnerabilities because of the complexity of piece parts cobbled together.

Contact Us

Product Details

No other solution on the market today connects remote workers with mission-critical and data-sensitive systems, in less than an hour, with unparalleled security, and a complete audit trail. Tehama provides compliant and secure virtual desktops on the cloud, enabling enterprises to quickly onboard, scale, manage, and audit a global workforce.


First, Tehama is the fastest way to launch role-based, ready-to-work, complete, productive, secure work environments for anyone, anywhere in the world. With other methods, it takes weeks or months. With Tehama’s cloud-based service, you can onboard remote workers in less than an hour with multi-level security and a complete audit trail.


Second, Tehama is the easiest way to onboard and enable remote workers. You don’t have to ship laptops to where the workers are, you don’t have to do extra tooling to the networking, and you don’t have to integrate a bunch of point products because it’s already done for you.


And third, Tehama is the most secure way to provide appropriate, controlled, compliant access for every role in your company to corporate desktops in the cloud.

With Tehama, you define secure virtual rooms in the cloud with complete virtualized infrastructure and policies.

Each Tehama room provides complete virtualized infrastructure and access-control policies to ensure data isolation, control, and security on a zero-trust model. This means:

1. Segmented network access significantly restricts even properly authenticated individuals from accessing network assets they should not. Also restricts from lateral network access any unauthorized malware that might gain the opportunity to browse the network looking to expand.

2. A firewall with dynamic IP/port resolution allows network administrators to specify which IP addresses and ports users can access.

3. Audit trails and access logs support regulation and compliance by enabling monitoring, session recording, and deep forensic analyses to provide full visibility into everything that happens in the virtual rooms.

This multi-layer security design complies with the Four Best Practices of Security:

1. Strong policy-based identity control—which means no sharing of privileged credentials.

2. An impenetrable, airlocked work environment—which means all work is done within the cloud perimeter.

3. Zero-trust network model—which locks down access by role and enables full monitoring and auditing capabilities.

4. Principle of least privilege—which allows no access to data except pixels, audio, keyboard, and mouse.

Once you create a secure virtual room, you can deploy it to anyone, anywhere in the world with one mouse click.

What a remote worker is able to do in the room is defined by security policies that you set to meet the needs of the different functional, organizational, and geographic use cases that exist in your business. 

For example, a contractor in Italy, a call center in the Philippines, a finance group in New York—all of these would get a different set of security policies controlling their access to apps, data, and infrastructure appropriately for their roles and locations. 

Tehama essentially acts as a virtual office, built and automated in the cloud, complete with virtual rooms and desktops prebuilt for specific roles and geographies that can be accessed as a service from anywhere in the world and used on-demand.


Extended Enterprise Framework

The continued use of VPNs reveals an approach to supply-chain security that doesn’t take into account the threats inherent to a gig workforce.

Today, thanks to remote workers, crowdsourcing, and global freelancers, the corporate circle of trust has expanded to include more people and devices than any enterprise can realistically hope to oversee. 

The extended enterprise, however, often doesn’t recognize itself as such, at least not in terms of its vulnerability to attack. This means that the typical security framework can’t tick off all the boxes necessary to protect its data. Tehama provides real answers for the security of the extended enterprise.

Tehama’s extended enterprise framework (EEF) is a comprehensive cybersecurity framework for IT service delivery that adheres to NIST 800-171, NIST- CSF Core, and US NCSL Breach Compliance requirements. As the diagram below shows, Tehama’s EEF provides multiple levels of security end-to-end from the enterprise infrastructure to the endpoint and back again, as well as full recording, auditing, and forensic capabilities to ensure compliance with all relevant data regulations.

Use Cases:

Future of work—remote work for all organizations: In today’s fast paced business environment and ever-changing global risks, organizations need to find solutions that can quickly respond to geo-political changes like adverse weather disasters and pandemics. These risks will require organizations to quickly ramp up and enable teams to work remotely from anywhere in the world. Tehama makes it easy to onboard remote workers by offering a secure alternative to shipping laptops and other devices, providing a significant cost savings and reducing the risk of stolen devices and data. 

Supply chain security (third-party service providers): As global business relies more and more on contract workers, the need for secure IT service delivery and access to global talent is becoming increasingly urgent. But to fully embrace this opportunity, a stronger cybersecurity posture is an absolute requirement. The Tehama platform gives customers a secure virtual workspace that meets the specific regulatory requirements they need, including SOC 2 Type II, NYCRR 500, HIPAA, and more. And, with a complete audit trail, if a problem occurs, the source can be identified quickly, investigated, and fixed. 

Global workforce enablement: Today’s enterprises need to increase their usage of global talent—but must balance that goal with the security challenges of providing third-party and/or remote development teams access to secured corporate assets. With Tehama, there is no need to ship laptops across the globe, so you can reduce costs and delays by avoiding IT infrastructure procurement and deployments. 

PII & intellectual property protection: Tehama focuses on protecting data and intellectual property from breaches and abuse. Tehama’s Secure Rooms prevent data from escaping. Users and Room owners have full visibility into all data and intellectual property used in the Room. Because data and IP never leave the Room, endpoint devices being lost or stolen don’t pose a threat to data breaches. 

Business continuity & pandemic planning: For some businesses, asking staff to work from home at the drop of a hat is relatively easy. But for others–especially those with a global workforce, sensitive corporate systems/IP, and traditional on-premise desktop deployments–it can be the stuff of nightmares. In the case of natural, human, or health hazards like the COVID-19 pandemic, organizations need a secure and compliant, cloud-based VDI to ensure staff can work productively (and securely) from virtually any location, at any time, no matter the situation. 

Secure executive travel: Many executives traveling abroad are looking to reduce the time it takes to go through immigration and national firewalls. Tehama is a utility-based virtual desktop that persists for the executive and is secure from end-to-end via any device. Executives can travel without a physical laptop and can load a secured Tehama Room through any device to access their persistent desktop without risk of having their laptops stolen or compromised by malicious state or third-party actors. 

Dark Web Investigations: Conducting dark web research isn’t easy: not only must investigators meticulously track and audit all their online activities, but everything must be done anonymously–or you risk blowing the whole case. Dark web investigations require a strong chain of custody backed by strict and auditable compliance controls. Tehama enables investigators to stay one step ahead with a single, secure platform for dark web research. 

Additional Resources

Back To Top