Home › Device Trust Platform
Device Trust Platform · Free Tier Available

What is a Device Trust Platform?

A Device Trust Platform verifies the security posture of every endpoint before granting access to corporate resources. It combines device posture monitoring, endpoint compliance, and Zero Trust access signals into a single solution — filling the gap between EDR, MDM, and identity.

Why Zero Trust needs a Device Trust layer

Most Zero Trust implementations verify who is requesting access (identity) but not what device they're using. A user with valid credentials on a compromised or misconfigured device is a critical blind spot. A Device Trust Platform closes this gap.

🔐

Identity alone isn't enough

Valid credentials on an unpatched device with disabled firewall and no disk encryption is still a security risk. Device trust adds the missing hardware & configuration layer.

🧩

The missing layer

EDR detects threats. MDM manages devices. Identity verifies users. But who verifies the device's security posture before access? That's the Device Trust Platform.

Continuous, not one-time

Device posture changes constantly. A trusted device today may be non-compliant tomorrow. Continuous verification with real-time Security Score ensures ongoing trust.

The device trust gap in enterprise security

Today, most security stacks have separate tools for different problems. But there's no unified answer to a simple question: "Can we trust this device right now?"

Category Example tools What they do What they don't do
EDR CrowdStrike, SentinelOne Detect & respond to threats Don't verify security configuration
MDM Jamf, Intune Manage device policies & apps Invasive for BYOD, don't score posture
Identity Okta, Azure AD Verify user identity Don't verify device security state
Endpoint monitoring Fleet, osquery Query device state No compliance mapping, no trust scoring
Device Trust Platform Lorika Verify device posture + compliance + trust score The missing layer that connects everything

How Lorika implements Device Trust

Lorika is a Device Trust Platform that continuously verifies endpoint security posture and enables Zero Trust access decisions. One agent. One dashboard. One trust signal.

🔍

1. Assess — 190+ security checks

The agent runs 190+ checks across 8 categories: Auth, Network, Filesystem, Kernel, Software, Services, SSH, Audit. Every check maps to compliance controls.

📊

2. Score — Real-time Security Score

Each device gets a weighted Security Score (0-100) based on check results. Scores update continuously with a three-timer architecture: quick scans every 15 min, full scans every 60 min.

📋

3. Map — 8 compliance frameworks

Every check is pre-mapped to CIS Level 1, NIST 800-53, ISO 27001, SOC 2 Type II, and PCI DSS v4.0. Compliance evidence collected on autopilot.

🛡️

4. Decide — Trust or block

The Security Score becomes a trust signal for Zero Trust architectures. Three-tier trust: Compliant (full access), Limited (restricted), Blocked (remediate first). Integrates with Okta, Google Workspace, Azure AD.

Device Trust architecture

The Lorika agent is a single static binary (<10 MB) that runs silently on macOS, Windows, and Linux. Zero dependencies. Zero configuration. HMAC-SHA256 signed payloads.

💻

Endpoint agent

Go-based cross-platform agent. Runs as a system service. Three-timer architecture: heartbeat (3 min), quick scan (15 min), full scan (60 min). Delta compression reduces bandwidth by ~90%.

☁️

Cloud API

FastAPI backend with TimescaleDB. Ingests scan results, calculates Security Scores, maps compliance, tracks CVE vulnerabilities. Multi-tenant with RBAC.

📱

Dashboard

React-based fleet dashboard. Real-time scores, compliance status, vulnerability timeline, device drill-down, trend history. Available in English + Ukrainian.

What the Device Trust check covers

Lorika performs 190+ checks to determine whether a device can be trusted. Every check contributes to the weighted Security Score used for access decisions.

🔐

Auth & Access

Password policy, SSH hardening, brute-force protection, sudoers audit, MFA enforcement, admin group audit.

🌐

Network

Firewall status, open ports, 20+ dangerous exposed services, DNS-over-TLS, NTP config, NAT detection.

💾

Filesystem

Disk encryption (FileVault/LUKS/BitLocker), world-writable files, SUID/SGID binaries, sensitive file permissions.

⚙️

Kernel

ASLR, NX/DEP, SIP (macOS), Secure Boot, SELinux/AppArmor, core dump disabled, kernel module blacklist.

📦

Software

Pending OS updates, unattended upgrades, EOL OS detection, pending kernel reboot, untrusted repos.

🐳

Services & Docker

Screen lock timeout, antivirus/EDR presence, Docker daemon security, privileged containers, Content Trust.

🔑

SSH Hardening

Root login disabled, password auth disabled, MaxAuthTries, TCP forwarding, ClientAliveInterval.

📝

Audit & Logging

auditd running, log retention, syslog configured, privileged command audit rules.

When you need a Device Trust Platform

🏢

Zero Trust migration

You're implementing Zero Trust but your identity provider can't verify device security. Lorika provides the device trust signal that completes the picture.

📱

BYOD & contractors

MDM is too invasive for personal devices. Lorika takes a read-only, privacy-first approach — checks security posture without controlling the device.

📋

Compliance audits

You need continuous evidence for CIS, NIST, ISO 27001, SOC 2, or PCI DSS. Lorika maps every check to framework controls and collects evidence on autopilot.

🔄

EDR gap coverage

EDR detects threats but doesn't verify configurations. Lorika checks firewall, encryption, SSH, kernel hardening — things EDR doesn't assess.

🌍

Remote-first teams

Employees work from everywhere on mixed devices. Lorika gives you fleet-wide visibility across macOS, Windows, and Linux from a single dashboard.

🏦

Cyber insurance

Use the Security Score as objective evidence for policy pricing. Continuous monitoring replaces point-in-time assessments.

Device Trust vs other security tools

A Device Trust Platform is complementary to existing security tools, not a replacement. Understand how device trust fits into your stack.

Start verifying device trust today

Free forever for personal use. No credit card required. 190+ checks, 8 frameworks, real-time Security Score.

Create free account →