user-shieldEmployee Device Trust

The Problem

When an employee gets phished, the attacker steals their credentials, and often walks right in. Traditional security layers fail at the one moment that matters most: the login from an unfamiliar device.

  • Schools: Staff with access to student records, grades, and financial aid data

  • Construction: Project managers with access to bids, contracts, and payroll systems

  • Healthcare: Administrative staff accessing patient scheduling and billing portals

  • Logistics: Dispatchers and warehouse staff using fleet management and inventory systems

  • Professional Services: Accountants, lawyers, and consultants accessing client-sensitive portals

These organizations share a common vulnerability: non-technical employees accessing sensitive web applications who are prime phishing targets.

Here's why existing defenses fail when credentials are compromised:

Defense
Why It Fails After Phishing

Passwords

Stolen directly — the attacker has the exact credentials

SMS/Email MFA

Intercepted by real-time phishing proxies (EvilGinx, Modlishka)

TOTP Codes

Captured in real-time by adversary-in-the-middle kits

IP Allowlisting

Attackers use residential proxies to match the victim's geo-region

Session Cookies

Stolen via phishing kits that harvest tokens post-authentication

triangle-exclamation

The Solution: Device Trust as a Security Layer

Guardian Stack's visitorId creates a persistent, tamper-resistant device identity for every browser that touches your internal applications. When an attacker phishes an employee's password and MFA token, there's one thing they cannot steal: the device fingerprint.

How It Stops Phishing-Based Account Takeover

  1. Employee logs in from their work machine - Guardian silently records the device's visitorId

  2. Device becomes trusted after initial verification, linked to the employee's account

  3. Attacker phishes credentials and attempts to log in from their own machine

  4. Guardian sees: unknown visitorId, VPN detected, possible VM or browser tampering

  5. System blocks or challenges - even though the password and MFA token are valid

What Guardian Detects on the Attacker's Device

The attacker's environment almost always triggers multiple risk signals:

  • Unknown visitorId - The device has never been seen before for this account

  • VPN detected - Attackers route traffic through VPNs to mask their true location

  • Browser tampering - Anti-detect browsers and spoofed user agents trigger tampering signals

  • Virtualization - Many attackers operate from virtual machines to isolate their activity

  • Incognito mode - Commonly used to avoid leaving traces

  • Privacy settings - Aggressive fingerprint resistance configurations

circle-info

Key insight: Phishing steals credentials, not devices. Guardian Stack turns the device itself into an authentication factor that cannot be phished, forwarded, or replayed.


Implementation Guide

Step 1: Frontend - Identify the Device on Every Login

Install the Guardian JS SDK on your internal web application's login page:

Trigger identification when the employee submits their login form:

Step 2: Backend - Verify Device Trust Before Granting Access

Install the Guardian Server SDK:

Create a login endpoint that evaluates device trust alongside credentials:

Step 3: Device Risk Assessment

Build a risk scoring function using Guardian's detection signals:

Step 4: Device Trust Enrollment

When a new device passes verification, enroll it as trusted:


Real-World Examples

School: Protecting Student Records

Scenario: A school administrator's credentials are phished via a fake password reset email. The attacker tries to access the student information system to steal records.

What happens when the attacker tries to log in:

Construction Company: Protecting Bid and Payroll Systems

Scenario: A project manager's credentials are stolen via a spear-phishing email disguised as a subcontractor invoice. The attacker wants access to bid pricing and payroll data.

Role-Based Device Policies

Scenario: Different employee roles require different levels of device trust enforcement.

IT Admin Dashboard: Device Fleet Visibility

Scenario: IT admin needs to see all trusted devices across the organization, revoke compromised devices, and monitor login anomalies.


Database Schema


Deployment Patterns

Pattern 1: Login-Only Protection (Quick Start)

Add device trust checks only at the login endpoint. This is the fastest way to protect against phished credentials with minimal code changes.

Best for: Organizations that want immediate protection without modifying their entire application.

Pattern 2: Continuous Session Monitoring

Re-verify device identity on every sensitive action, not just at login. This catches session hijacking and stolen session tokens.

Best for: Organizations with high-value data (student records, financial systems, healthcare).

Pattern 3: Tiered Access Based on Device Trust

Allow login from any device, but restrict what data the user can access based on device trust level.

Best for: Organizations where employees sometimes need to access systems from personal or shared devices.


How This Stops Real Attack Scenarios

Scenario 1: Real-Time Phishing Proxy (EvilGinx)

The attacker sets up a phishing page that proxies requests to your real login page in real-time, capturing both the password and the MFA token as the employee enters them.

Without Guardian: Attacker replays the captured session cookie and gets full access.

With Guardian: The proxied session has the employee's visitorId (since the browser was the employee's). But when the attacker uses the stolen session cookie from their own browser, Guardian sees a completely different visitorId. The session is invalidated.

Scenario 2: Credential Stuffing from Breached Databases

The attacker obtains employee credentials from a third-party data breach (password reuse) and attempts to log in via automated scripts.

Without Guardian: If the password works, the attacker gets in.

With Guardian: Bot detection fires (automated script), visitorId is unknown, likely VPN and VM signals. Login blocked immediately.

Scenario 3: Insider Sharing Credentials

An employee shares their login with an unauthorized person (e.g., a subcontractor logging into a system they shouldn't have access to).

Without Guardian: The unauthorized person logs in successfully.

With Guardian: The unauthorized person's device has a different visitorId. They're prompted for device verification, and IT admin is notified of a new device enrollment attempt.


Best Practices

Do

  • Enroll devices during onboarding — When an employee first sets up their account, register their primary work device as trusted

  • Set expiration policies — Require re-verification every 30–90 days based on role sensitivity

  • Monitor continuously — Don't just check at login; verify device trust on sensitive actions

  • Alert IT admins — Automatically notify when high-risk logins are blocked or new devices are detected

  • Log everything — Maintain a full audit trail of device enrollments, revocations, and blocked attempts

  • Revoke on termination — Include device trust revocation in your employee offboarding checklist

Don't

  • Don't replace MFA — Guardian is an additional layer, not a replacement for multi-factor authentication

  • Don't trust VPN signals alone — Some legitimate employees use VPNs; combine signals for risk scoring

  • Don't block immediately on medium risk — Challenge first, block only on high-risk combinations

  • Don't forget shared devices — Kiosks and shared workstations need different policies (tie trust to the device, not the user)

  • Don't expose visitorId to employees — Keep device identity server-side only


Conclusion

Phishing is the #1 attack vector for a reason — it works. Passwords get stolen. MFA tokens get intercepted. Session cookies get hijacked. But the one thing an attacker cannot steal through a phishing email is the employee's physical device.

Guardian Stack's device trust layer gives you:

  • Phishing resilience — Stolen credentials are useless without the trusted device

  • Zero friction for employees — Recognition is silent; trusted devices log in normally

  • Visibility for IT — See every device accessing your systems, revoke instantly

  • Role-based enforcement — Stricter policies for sensitive roles, flexible for general staff

  • Audit trail — Complete log of every device enrollment, login attempt, and security event

The key insight: Identity is not just who you are — it's what device you're on. By making the device an authentication factor, you close the gap that phishing exploits.


circle-check

Last updated

Was this helpful?