FLAGSHIP · 01

TruWorkspace
Zero Trust™

Every device, every user, every app — wrapped in a Zero Trust architecture. Secure modern collaboration without the streamed desktop.

ModelZero Trust Network Access
Deploy4–6 weeks
Scale25 → 2,500 users
Managed24 / 7 Canadian SOC
A Canadian team weighing modern collaboration options
FROM PERIMETER TO IDENTITY
The problem

The old DaaS playbook is breaking.

Streamed desktops made sense when apps lived on a file server. Today's work — Copilot, Teams, SharePoint, AI at the edge — demands local compute and native access. Trying to force it through a VDI pipe adds cost, latency, and user revolt.

The TruPoint approach

Let endpoints be endpoints. Make the perimeter identity.

TruWorkspace Zero Trust wraps every user and device in continuous verification. Cloudflare enforces the edge, Entra ID governs identity, Intune manages state, and ESET + NinjaOne defend the endpoint — all orchestrated as one service.

The architecture

Four layers. One policy brain.

Every access decision flows through the same policy engine — no matter where the user, device, or app happens to be.

USERS & DEVICES
Windows 11
macOS
iOS / Android
Contractor BYOD
ZERO TRUST EDGE
Cloudflare ZTNAIdentity-aware proxy
Entra IDPasswordless MFA · conditional access
IntuneMDM · MAM · device compliance
ESET XDREndpoint detection & response
YOUR RESOURCES
Microsoft 365
SharePoint / OneDrive
Line-of-business SaaS
TruPoint Private Cloud
POLICY · EVALUATED · EVERY REQUEST
What's included

A coherent stack, delivered as one service.

01

Cloudflare Zero Trust

Private access to every internal app without VPNs. Secure web gateway, CASB, browser isolation, and DNS filtering — all running on Cloudflare's global edge.

  • ZTNA private access
  • Gateway + CASB
  • Browser isolation
02

Microsoft Entra ID

Passwordless authentication, conditional access policies, and risk-based MFA. Identity becomes your new perimeter — continuously verified on every request.

  • Passkey / Windows Hello
  • Conditional access
  • Identity governance
03

Microsoft Intune

Device compliance, app protection, and configuration baselines. Only managed, healthy endpoints get to touch your data — enforced continuously, not once at login.

  • MDM for corporate
  • MAM for BYOD
  • Compliance baselines
04

ESET XDR

Next-gen endpoint protection with extended detection and response, fed into our SOC. Attacks are detected, contained, and responded to around the clock.

  • Behavioural NGAV
  • EDR telemetry
  • SOC-led response
05

NinjaOne RMM

Unified patching, remote management, and endpoint visibility. Drift, patch gaps, and misconfigurations are caught before they become risk.

  • Automated patching
  • Remote support
  • Asset & lifecycle
06

Canadian SOC

24/7 monitoring by Canadian analysts, not offshore tier-1s. Alerts are triaged, contained, and communicated by people you know — from the country your data sits in.

  • 24/7 monitoring
  • Incident response
  • Monthly executive reports
Outcomes

What changes, and what it's worth.

VPN replaced
100%

Clients typically retire legacy VPN within 30 days of cutover, reclaiming licence spend and removing a top breach vector.

Attack surface reduction
~80%

Measured against open-port and identity-assertion baselines using Cloudflare Analytics + Entra ID risk signals.

User friction

Passwordless + SSO removes 40+ logins per user, per week. Support desk password-reset tickets typically drop by 70%.

How we deploy

Four to six weeks. No big-bang migration.

W1

Discovery & baseline

Architecture review, identity audit, device inventory. We document the as-is and agree the target state.

W2

Identity & edge pilot

Entra ID tenant hardening, Cloudflare tenant provisioned, pilot user group cut over to ZTNA.

W3-4

Endpoint enrolment

Intune co-management, ESET + NinjaOne rolled out across all corporate devices. BYOD wave follows.

W5-6

Cutover & SOC handoff

Legacy VPN decommissioned, runbooks finalized, 24/7 SOC monitoring begins. TAM relationship begins.

Hands working on a laptop in a modern office
CLIENT · PROFESSIONAL SERVICES · 140 USERS

Our team gave up their VPN in two weeks and our insurance broker renewed us with a premium reduction the next quarter. TruPoint stripped out three legacy products and replaced them with one architecture we actually understand.

Daniel KwanDirector of IT, Canadian professional services firm · 140 users
Next step

Let's map your Zero Trust path.

30-minute discovery. We'll show you where you are and what a 6-week cutover would look like.

Book a Discovery Call See TruCompliance