Remote Access Security Solutions

Uniquely simplified.

SOL20062901_overview_RAC-02

Remote Access Security Solutions

Take your business continuity to the next level with our ready to use remote access solutions. Every solution listed below is developed with these principles in mind:

  • Don’t compromise on security

  • Leave no traces of company data on any (un)managed device

  • Simplify access to company resources by employees

  • Remove IT Management complexity

SecureDesktop - Remote access service

Soliton SecureDesktop is a remote desktop access tool that enables employees to access their company-internal computers on the go. Users can access their Windows and Mac computers from any other Windows, Mac, iOS or Android device. Users will be able to control their remote computer and access all their applications, files, and data as usual, as if they are physically in the office.

Icon

MailZen - Mobile data security

MailZen is an app for iOS and Android devices employees can use to synchronize PIM data (email, calendar, contacts,…) and to access company resources like internal web applications or file shares. The app prevents corporate data being leaked or copied as the data is kept securely in an encrypted container. A central management portal applies strong security policies on the container app without any need for an MDM. Together with a Secure Gateway it enforces high data security on all company data without exposing any internal service to the internet.

mob_ico_APP_MailZen

G/ON

In one integrated solution, G/On features two-factor authentication, data encryption, network protection, and application access and authorization. Compared to a “best of breed” approach where multiple, different products are pieced together, G/On makes it much simpler to implement, manage and control access to company data and applications. There is no need for VPN, G/On provides two-factor mutual device and user authentication If required, it can connect a user identity to a device.

Gon_logo

SecureBrowser

SecureBrowser is a browser that can be used to securely access company internal web sites, without the risk of losing data. The SecureBrowser connects to a SecureGateway inside the network, if required using two-factor authentication. DNS name resolving and single sign logon are performed by SecureGateway as well, making the remote browsing experience seamless. SecureBrowser cannot be used for Internet browsing, nor is it possible to use any other browser than SecureBrowser for internal browsing, so the two are completely separated from each other.

SecureFile is an option to SecureGateway that allows users to browse for, and open, locally installed files. The SecureBrowser cache is discarded after closing down and policies determine what sites users are able to reach.

Product_portfolio_534x400_SSB

Expand your knowledge on remote access security

tumbnail_DeviceManagementVS
White Paper

Secure Remote Working: Device Management versus Secure Containers

Many employees want or need to use personal devices for work. But for IT teams this can be a security headache. Do you use device management or install a secure container?

If you’re unsure about the best strategy to enable secure remote working, our white paper has the answers. It explores the pros and cons of device management and secure containers, including actionable advice to help you choose the best approach for your organisation.

tumbnail_Zero-Trust
White Paper

Secure Remote Working with the Zero-Trust Approach

Remote working is fast becoming the new normal for many organisations. But supporting employees to work securely outside the office relies on having the right approach.

Our white paper outlines the reasons to adopt a “zero-trust” approach. It explores the benefits of building a software-defined parameter around your network — and how this ensures your remote workers aren’t unwittingly exploited by hackers, inadvertently contaminating the network or causing a data leak.

Take control over your remote network access

ico_RA_01

Single integrated app

Users only get a single application ensuring complete separation of business and personal data. The app has 2-factor authentication, prevents data loss or leakage, increases productivity and comes with a short learning curve for the end-user.

ico_RA_02

No need for a VPN or MDM

The device is no longer part of the company network. The connection between the device and the internal servers is established through the gateway. No need for Internet, no need for VPN, or MDM. The client is always separated from the internal network for increased security.

ico_RA_03

Easily deployed and managed

The solutions are device and operating system independent making it very easy to deploy. Set up is done within a day, a new client is pushed to a new device in just a few minutes. IT administrators only need to manage the app, not the device. As simple as that.

ico_RA_04

BYOD

The single integrated app supports BYOD and Corporate Owned Private Enabled policies. Enforces separate policies for the different user groups. Provides IT management with total visibility and full control of who has access to the corporate data and applications.

Remote access security – the technical view of it

  • Mutual authentication between client and gateway creating a secure connection
  • Gateway protects the servers and the network from cyber-attacks and from unauthorized access
  • Gateway separates the client from the network, the remote device is never part of the network
  • Gateway exchanges information with the network and enables secure access to the network resources
  • Remote access client can be installed by end-user
    User access is based on permission rules or Active Directory group membership
Infographic_Remote access security
Crave for more content?
Subscribe to our IT security blog and get our latest blogs delivered to your inbox.