Optisis
dsc
Beenius
CLOSE+

Secure remote access

Access your information system securely regardless of the time and place

Implement solutions for a secure and easy access to the information system.

elektronska_posta

E-mail

datoteka

Internal files and resources

ERP_sistemi

Business intelligence of the company – ERP

softwere

Web applications and the Internet

Advantages of a secure remote access

In addition to a quick response, take advantage of other secure remote access benefits by using the Pulse Secure solution.

  • Simple management and control
  • A single access point
  • Multi-factor authentication
  • A detailed allocation of roles and rights
  • Easy AD integration
  • Activity traceability
  • Client compliance checking (antivirus, security patches, etc.)

Operating systems

The secure remote access solution supports a variety of operating systems.

Safe access for the next generation

The Pulse Secure solution provides a one-stop-shop secure mobile access, simple remote access control, and excellent user experience.

Extra knowledge can come handy

Everything you need to know about setting up a secure remote access.

Secure remote access

A secure remote access protects the communication path from a remote device (computer, tablet, phone) to the company’s central information system for both employees and external stakeholders. The system must allow connectivity regardless of the place and time, from any communication device.

Who are the secure remote access users and what devices can such access be used on?

The secure remote access is used by employees as well as external contractors. The device allowed to access the system must have security patches installed and meet the security requirements of the company. It is only when these conditions are met that such a device can be allowed to access important company information through a sophisticated remote access system.

Which operating systems are supported?

This type of access supports the Windows, Mac OS X, Linux, iOS, Android and Windows Phone operating systems. Virtually any device with a web browser and Internet access can connect to the system.

Where does the access end and what does the system management look like?

The central device provides a single entry point of access through which remote logins of users’ devices are completed and recorded. The system is managed through a web browser both transparently and intuitively. Granular access allocation is provided based on the person who is logging into the system and on their used device. At the same time, the system records accesses and provides a complete overview of access history and statistical views based on the time of user’s login and session.

How does the remote device/user confirm their identity?

The integration into the information system is performed in several stages.
Stage 1: During the implementation of the secure channel, the system checks for the device type (i.e. operating system) and device compliance (i.e. antivirus protection, critical patches, registry entries, etc.).
Stage 2: Once the stage 1 compliance is guaranteed, the user must enter their login attributes. We recommend the use of 2-factor authentication or certificates.
Stage 3: When all conditions from stage 1 and stage 2 have been met, the system grants access to the user based on the type of device and the user’s membership in any group included in the active directory.

newsletterr

Need more information?

Our cybersecurity experts will answer all of your questions related to the establishment of a secure remote access solution to your information system.

Tailor-made remote access

Create your own solution guaranteeing a secure access to the information system and include the 2FA to prevent password abuse.

PLAN - PRICE

Description

Secure remote access (PCS)

Secure remote access tied to the active directory of the contracting entry (assigning the access based on AD groups)

Access to web applications (the Internet, Webmail), terminal access, file system access

Network access type (L3 VPN)

Clients compliance checks

Distributing access credentials (employees, external contractors, computers, mobile devices)

Secure Chat remote desktop sharing for safe message exchange

Secure remote access (PCS)

+ 2-factor SecureKey authenticator (2FA)

Secure remote access (PCS)

2-factor SecureKey authenticator - three ways to generate one-time passwords:

SMS

Mobile authenticator
Password generator

Secure remote access (PCS)
+ 2-factor SecureKey authenticator (2FA)

+ Pulse Workspace (BYOD)

Secure remote access

2-factor SecureKey authenticator
 

Solution designed for mobile devices: 

Protection for business applications

An application VPN (Per-app VPN)

Configuration of the VPN settings and e-mail on devices

Protect the access to your information system with 2FA

Disable attacks carried out by stolen or cracked passwords through 2-factor SecureKey authentication.

puzzle

Integration with Pulse Secure and other systems

lokacija_tu

Rather than being found in a cloud, the solution is implemented at your location.

tlesk

An inexpensive, simple solution

srce

Slovenian product/product of Slovenian specialist knowledge

checklist

Simple management and user interface

kakovost

Reference layouts

How to guarantee safe passwords?

There are three ways to create a one-time password.

Extra knowledge can come handy

Everything you need to know about setting up a 2-factor authentication.

Which authentication method is the most adequate in view of security?

We advise against the use of local passwords or passwords from the active directory only. The high level of security is secured through the use of certificates. The next security level is ensured by the use of one-time passwords or 2-factor authentication.

What are the characteristics of 2-factor authentication?

There are three login parameters when it comes to 2-factor authentication. When logging into the system, the user enters their username (1) and personal PIN code (2). When the system verifies both parameters as correct, the user enters a unique password (3) at the last stage of the login. This unique password is a password generated by an application (mobile authenticator) or a dedicated device (password-creator); also, it can be the password the user received via a text message (SMS).

How does the remote device/user confirm their identity?

The integration into the information system is performed in several stages:
Stage 1: During the implementation of the secure channel, the system checks for the device type (i.e. operating system) and device compliance (i.e. antivirus protection, critical patches, registry entries, etc.).
Stage 2: Once the stage 1 compliance is guaranteed, the user must enter their login attributes. We recommend the use of 2-factor authentication or certificates.
Stage 3: When all conditions from stage 1 and stage 2 have been met, the system grants access to the user based on the type of device and the user’s membership in any group included in the active directory.

komunikacija

Reduce security risks

Security risks are brought into the organisation by users of the information system. We would be happy to review your case and advise on the choice and implementation of an optimal technological solution that is both friendly and perfected in terms of function.

Our competency advantages

Experts

Our team of cybersecurity experts deploys optimal solutions for a secure remote access to your information system.

Certificates

Our experts have long-standing experience in establishing cyber solutions, constantly upgrading their knowledge in global trainings and courses.

Own laboratory

The technological solution is tested and verified in our own laboratory.

Technical support

We provide a 24/7 phone support from our service centre.

Partners in the field of technology

We work with global leaders in specific technology segments.

Explore further

CONTACT US
Arrow

I agree that you may permanently store personal data in the notification list of:

We will store and process your information in order to occasionally notify you of any specialist content and send you invitations to specialised events by e-mail. We will use your personal information confidentially and will not share it with any third parties. We address your privacy in accordance with the provisions of the GDPR and the Personal Data Protection Act.

You can withdraw your consent at any time upon receipt of the email or by sending an e-mail with the subject line "Cancelling my subscription" to marketing@smart-com.si. After processing the subscription cancellation request, Smart Com will stop sending you the content you have unsubscribed from.

For details on subscription cancellation, processing, and protecting personal information, see Legal notices.

x
Close
CLOSE+