Remote Access Security Solutions

Uniquely simplified.

Remote Access Security Solutions

Take your business continuity to the next level with our ready to use remote access solutions. Every solution listed below is developed with these principles in mind:

  • Don’t compromise on security
  • Leave no traces of company data on any (un)managed device
  • Simplify access to company resources by employees
  • Remove IT Management complexity

SecureDesktop - Remote access service

Soliton SecureDesktop is a remote desktop access tool that enables employees to access their company-internal computers on the go. Users can access their Windows and Mac computers from any other Windows, Mac, iOS or Android device. Users will be able to control their remote computer and access all their applications, files, and data as usual, as if they are physically in the office.

MailZen - Mobile data security

MailZen is an app for iOS and Android devices employees can use to synchronize PIM data (email, calendar, contacts,…) and to access company resources like internal web applications or file shares. The app prevents corporate data being leaked or copied as the data is kept securely in an encrypted container. A central management portal applies strong security policies on the container app without any need for an MDM. Together with a Secure Gateway it enforces high data security on all company data without exposing any internal service to the internet.


In one integrated solution, G/On features two-factor authentication, data encryption, network protection, and application access and authorization. Compared to a “best of breed” approach where multiple, different products are pieced together, G/On makes it much simpler to implement, manage and control access to company data and applications. There is no need for VPN, G/On provides two-factor mutual device and user authentication If required, it can connect a user identity to a device.

SecureBrowser Pro

SecureBrowser Pro is a browser that can be used to securely access company internal web sites, without the risk of losing data. The SecureBrowser Pro connects to a SecureGateway inside the network, if required using two-factor authentication. DNS name resolving and single sign logon are performed by SecureGateway as well, making the remote browsing experience seamless. SecureBrowser cannot be used for Internet browsing, nor is it possible to use any other browser than SecureBrowser for internal browsing, so the two are completely separated from each other.

SecureFile is an option to SecureGateway that allows users to browse for, and open, locally installed files. The SecureBrowser cache is discarded after closing down and policies determine what sites users are able to reach.


WrappingBox is a Windows-based platform that allows remote working with locally installed applications, without the risk of data loss. WrappingBox connects to a SecureGateway inside the network, if required using two-factor authentication and includes the SecureBrowser Pro. WrappingBox is able to launch locally installed applications, like Microsoft Office(tm), to run in a protected mode, so they cannot access the local disks or network. Instead, all information that is saved or cached, is encrypted and stored inside WrappingBox so it can be used offline. After closing WrappingBox, users get the choice to either upload, keep or delete locally stored files.



FileZen is a secure file sharing platform that helps businesses overcome problems of sharing data between employees and customers. The dedicated secure appliance allows your business to retain complete control of your data, and transfers large files quickly and easily. FileZen allows sharing of a single files or a complete folder, using a simple web-based user interface.

Available in hardware and virtual machine.

Expand your knowledge on remote access security
White Paper
Secure Remote Working: Device Management versus Secure Containers

Many employees want or need to use personal devices for work. But for IT teams this can be a security headache. Do you use device management or install a secure container?

If you’re unsure about the best strategy to enable secure remote working, our white paper has the answers. It explores the pros and cons of device management and secure containers, including actionable advice to help you choose the best approach for your organisation.

White Paper
Secure Remote Working with the Zero-Trust Approach

Remote working is fast becoming the new normal for many organisations. But supporting employees to work securely outside the office relies on having the right approach.

Our white paper outlines the reasons to adopt a “zero-trust” approach. It explores the benefits of building a software-defined parameter around your network — and how this ensures your remote workers aren’t unwittingly exploited by hackers, inadvertently contaminating the network or causing a data leak.

Take control over your remote network access

Single integrated app

Users only get a single application ensuring complete separation of business and personal data. The app has 2-factor authentication, prevents data loss or leakage, increases productivity and comes with a short learning curve for the end-user.


No need for a VPN or MDM

The device is no longer part of the company network. The connection between the device and the internal servers is established through the gateway. No need for Internet, no need for VPN, or MDM. The client is always separated from the internal network for increased security.


Easily deployed and managed

The solutions are device and operating system independent making it very easy to deploy. Set up is done within a day, a new client is pushed to a new device in just a few minutes. IT administrators only need to manage the app, not the device. As simple as that.



The single integrated app supports BYOD and Corporate Owned Private Enabled policies. Enforces separate policies for the different user groups. Provides IT management with total visibility and full control of who has access to the corporate data and applications.

Remote access security – the technical view of it
  • Mutual authentication between client and gateway creating a secure connection
  • Gateway protects the servers and the network from cyber-attacks and from unauthorized access
  • Gateway separates the client from the network, the remote device is never part of the network
  • Gateway exchanges information with the network and enables secure access to the network resources
  • Remote access client can be installed by end-user
  • User access is based on permission rules or Active Directory group membership
Crave for more content?
Subscribe to our IT security blog and get our latest blogs delivered to your inbox.
Loading posts...
Sort Gallery
Enter your email here