Identity & Access Management
Identity & Access Management
With the advent of telecommuting, remote workspaces, and the 24-hour workday, businesses are finding that their employees need access to information from outside the gateway. Secure Remote Access allows these authorized users to safely interact with information on your network. Providing this remote access, however, opens organizations to multiple vulnerabilities. Remote Access Security Solutions are designed to proactively manage these vulnerabilities while keeping your business productive, flexible -- and protected.
Enabling Secure Remote Access within your organization can deliver benefits and cost savings due to increased productivity (users can access files outside of the office), reduced risk (you determine the authorized users and their access level), reduced overhead expenses (less office space and lower energy costs, for example), and allows for flexible work scheduling.
When Modcomp evaluates and recommends a Secure Remote Access Solution, we ensure that your remote access design matches your security policy, protect the network from leakage or theft of sensitive data, and plan for the additional traffic demands so the system adequately support the needs of remote workers.
There are several options to consider when choosing a Remote Access Security Solution…
Virtual Private Network (VPN)
Simply put, VPN provides your employees with secure remote access to your organization’s network. There are two types of VPN. The first creates a private, encrypted tunnel via Layer 2 Tunneling Protocol (L2TP) over public IP lines. The second, Secure Sockets Layer (SSL), uses a Web browser to create a prototype tunnel, eliminating the need to download specialized software onto the employee’s device.
Network Access Control (NAC)
To ensure compliance with all security policies, NACs review and verify all users and systems attempting to access the network. If the user’s device is non-compliant but they have been granted access to defined network areas, the system will try to remediate the device.
User Authentication / Key Fob
A key fob is a token device that enforces two-factor authentication for remote users. To gain network access, the user enters a password and a code provided by the token device. A short-time-interval code refreshing maintains high security. Once authenticated, requested applications and data are “virtualized” to the user. The virtual session provides increased security, saves no data to the user’s system, and removes any trace of the session at the user’s end device.
Modcomp certified security specialists stand ready to guide your organization through every phase of choosing and leveraging the right Remote Access Security solutions for your unique IT environment. Our methodology includes:
- An initial “Discovery Meeting” where we discuss your goals, requirements, and budget, the first step to understanding how Modcomp can help.
- An Assessment & Review” of your existing environment and a mutual definition of the size and scope of the project requirements.
- Detailed vendor evaluations and recommendations, future environment design, and detailed implementation plan.
- Procurement, configuration, and deployment of the chosen solutions.
- Ongoing product lifecycle support, as well as other technical support as it relates to the Remote Access Security solutions we implemented for you.