Twingate is announcing a new feature called Device Security that makes it easy to consistently and securely establish "device trust" as part of a Zero Trust architecture. This feature allows companies to define what constitutes a trusted device and incorporate these definitions into access policies, ensuring that only users on secure devices can access protected resources. Twingate's approach to device trust is based on three key principles: comprehensively, consistently, and granularly. The company aims to make consistent, straightforward device security a reality for its customers, enabling them to adopt Zero Trust principles easily. Device Security allows admins to define trusted devices, configure specific Trusted Profiles that grant access when more security is required, and associate these profiles with Resource Policies to ensure only the right devices can access sensitive resources. This feature will be rolled out over the next few weeks and will enable customers to expand on their trust methods as needed.