Integrated network security with strong authentication permits only the right users to have access to private or confidential resources.
(PRWEB) February 28, 2010
A lot of organizations that offer remote working facilities to their clients, subsidiaries, branche offices, suppliers or employees enable private tunnels to internal network resources or applications through VPN. Securepoint manages the network related security threats and risks in a blended easy protective approach and provides the VPN from one centrally managed secure point at the gate. Together with ID Control users need to authenticate themselves when accessing the VPN, which was before with only a user name and password, which is a relatively weak authentication mechanism. Sensitive information from your network or application can now be securely exchanged with Securepoint’s VPN access to the right persons, who are really who they proclaim to be. ID Control empowers the authentication procedure by providing strong authentication tokens with dynamic passwords on your mobile phone or on a hardware token. Next to One-Time Password authentication the user’s legal binding digital signature on a USB token can be used to sign-on to the access of Securepoint’s VPN. ID Control’s solutions are affordable and very user-friendly and available for Securepoint’s VPN but also for web based email and other services such as web application, network and remote desktop access.
Hans Kortekaas, CEO of ID Control, states that unauthorized access is probably the most significant vulnerability to your organizations’ network environment. Weak authentication can put the availability of your network, the confidentiality of business data inside your network, and your entire business activity at risk. Without two- or three-factor authentication the company and its management are exposed to potential compliance issues with regulations and data privacy laws. Controlling the identity and access of the users to VPN are ranked high in priority on the list of security measures nowadays. With ID Control and Securepoint in place, confidentiality, integrity, and proof of origin of any communication before entering the tunnel into your network can be ensured.
Securepoint, http://www.securepoint.de, founded in 1997, is the fastest growing Unified Threat Management (UTM) solution in Germany and develops and markets innovative IT-Security-Technology for the total protection of an organization’s network. Securepoint UTM-security solutions (Unified Threat Management) with Firewall, IDS, VPN, Virus protection, web content/spam filtering and high availability features meet all of the security demands and wishes of today’s IT security manager. Securepoint excels in the easy web based configuration and administration of the system for all security modules. Securepoint is available as appliance, or Software which can be installed on any computer or server, or VMWare image. All Securepoint solutions are distributed over a network of 2.000 partners securing already more than 32.000 networks worldwide. Customers range from small businesses, lawyers and doctors, to large industries and ministries.
ID Control, http://www.idcontrol.com located in The Hague, provides strong and easy authentication tokens and unified authentication management. The range of strong authentication tokens for secure online access is composed of HandyID, MessageID, KeystrokeID, the ID Control OTP Key and USB Token. HandyID is an OTP generating application running on your mobile device, the ID Control OTP Key is an OTP generating hardware token, the ID Control USB Token stores and generates digital signatures and OTPs and KeystrokeID recognizes users on the basis of their typing behaviour while logging in. At the same time ID Control offers e-mail encryption, decryption and authentication with MailID which uses MessageIDs One Time Passwords (OTP) via SMS for opening up e-mail with attachments.