YS::Desktop's Security Domain architecture gives IT administrators the precision, visibility, and control they need to enforce security policies across complex environments—without operational overhead.
The Challenge
The Challenge IT Teams Face
In large organizations, IT teams struggle with managing multiple parallel information systems set up to protect data confidentiality and criticality.
Traditionnal Approach
Manual intervention required
IT Team
Confidential
10
OT
50
Critical
200
Standard
10k
YS::Desktop Transforms Endpoint Management
By consolidating what would have been many physical workstations into a single, streamlined platform. Because every virtual machine is mandatorily linked to a clearly defined Security Domain, IT gains unprecedented oversight and control.
Solution
Multiple Security Domains One Central Command
YS::Desktop gives IT teams a single interface to define, deploy, and manage all security policies across every domain and every endpoint in your fleet.
Central Management
Corporate Domain
VM Windows
USB
VPN
Development Domain
VM Linux
USB
VPN
VM Windows
USB
VPN
VM Linux
USB
VPN
Audit Domain
VM Windows
USB
VPN
Auth
VM Linux
USB
VPN
Auth
Autorized
Blocked
Mandatory
Optionnal
Security Domains: Complete Isolation by Design
Each Security Domain is a strict boundary containing one or more VMs. Everything within a domain belongs exclusively to that domain—no exceptions, no leaks.
What you control
Granular policies that adapt to your security requirements
Device Access Permissions
USB storage, webcams, card readers, and more with granular filtering. Even for composite devices!
Network Access Rules
Cut hardware costs and reduce IT support tickets related to device multiplication.
Pre-authentication Requirements
Optional unlock codes for cryptographic domain protection with an additional secret provided by the user
Network Modes
NAT or Bridge, depending on your architecture needs
Mandatory Governance
Zero Gaps: Every VM Lives in a Domain
Unlike traditional approaches where VMs can exist outside policy boundaries, YS::Desktop makes Security Domains mandatory.
Traditionnal Approach
Group Master
Users
Users
Users
Users
Outside Policy Boundaries
VM2
VM3
Security blind spots
With YS::Desktop
Security Domain A
VM1
VM2
Security Domain B
VM3
100% coverage guaranteed
Eliminates Security Blind Spots
This architectural decision eliminates one of the biggest sources of security incidents: the "forgotten" VM that escapes governance. There is no such thing as an unmanaged VM.
Adaptive Security
Dynamic Policies That Adapt Automatically
Policies aren't static. They respond intelligently to context, ensuring your security posture stays current as users move between office zones, industrial environments, home, and remote locations.
Office Environment
External
Public place
Home
Industrial Area
Sensitive Zone
Office
Automatically applied policies :
VPN
Optionnal
Required
Pre-Auth
Disable
Required
USB Ports
Allowed
Blocked
Network
NAT
Isolated
Bridge + VLAN
Virtual Machines:
VM Confidential
VM OT
VM Dev
VM Corporate
Real-time automatic update
Network Posture
Different rules when connected via WiFi vs. wired vs. disconnected
Location Awareness
Policies adjust based on SSID or NAC certificate validation
Zero User Friction
Changes apply instantly in the background—no reboots, no user intervention required
Advanced Protection
Defense in Depth
For sensitive environments requiring additional protection
Cryptographic Unlock Codes
Enforce cryptographic unlock codes at first VM access per domain (pre-authentication)
VM
Access granted
TPM Integration
Integrate with physical TPM for hardware-backed secrets
Secret
A
4
2
X
Hardware
Layered Controls
Layer domain-level controls with in-VM security measures for true defense in depth
Domain Policy
Network Rules
Device Control
VM Security
Built With IT Operations in Mind
Four core principles that make YS::Desktop the choice for enterprise IT teams
Consistency
Apply the same security rules you use for physical network segmentation
Scalability
Manage thousands of endpoints from one console
Auditability
Clear domain boundaries make compliance verification straightforward
Flexibility
Create as many domains as you have separate IT environments
Choose a More Manageable and Secure IT Estate
YS::Desktop not only simplifies management and supervision across your entire infrastructure but also eliminates complexity and potential blind spots.