Our vision is to see Giritech technology established as a standard component for securing access to applications and services, enabling companies to simplify and consolidate their infrastructure and remove the patchwork of products they have been forced to use to secure their company network.

Giritech’s vision of IT Infrastructure simplification and consolidation.

Giritech believes that traditional IT infrastructure architecture is due for a paradigm shift. Today, companies are building and maintaining a local area network (LAN) designed as a “fortress” to protect the LAN and isolate it from the surrounding world. However, this approach worked well before the rise of the Internet but has now demonstrated its shortcomings.

The Internet is incapable of dealing with a new generation of users and the explosion in the use of: social networking, entirely new devices, cloud computing, inter company collaboration, use of outsourcing and external contractors, telecommuting, and the waves of new business models and needs coming at us ever faster. Company networks and the Internet are melting together with the result is that the LAN perimeter comes apart and leaves businesses exposed to data loss, data theft, virus attacks, misuse of corporate IT resources and other acts that negatively impact financial situations and reputations.

The root cause of the problems with today’s technology is that it forces users to distinguish between being “inside” the LAN versus being “outside” that is, being on the Internet. As users move back and forth they experience a significant difference between these two environments and are forced to understand and obey stringent rules for how to behave in the different environments.

It is a part of Giritech’s vision that all users work from outside the LAN, connecting through the Internet. There should never be a user directly connected to the company LAN. Giritech’s technology is designed specifically to give users secure virtual connections from the Internet to corporate resources where their their device is isolated from the company network and prevented direct network level access. This approach allows the opportunity for IT simplifications and flexibility of significant and dramatic proportions:

  1. Rather than protecting a LAN, companies can focus on protecting their server rooms and data storage centers.
  2. Companies can let their employees choose a device of their own preference. Some people prefer Windows PCs, others prefer Mac’s, others like Linux and now many people begin to prefer the user experience of iPad and similar devices.
  3. Instead of preventing users from having access to the Internet from the company LAN, companies will benefit from their employees using the explosion of new personal productivity tools available on the Internet. Companies may even encourage users to take advantage of these and to concentrate their own internal IT resources on developing and maintaining company specific applications critical to the business. E-Mail, Calendar, Word processing etc are moving away from being corporate applications to becoming personal productivity tools.
  4. Rather than spending money and resources on IT infrastructure, businesses can focus on gaining more value out of IT and taking advantage of new tools available in the “cloud” or developed internally.
  5. Employees and users will no longer be concerned about being “inside” the LAN or “outside.” Employees and users will always work the same way and have the same user experience. The company is in 100% control of what company resources users have access to depending on where the user is and from which device they connect.
  6. As physical user devices do not get network level access to the company network, IT departments do not need to worry about the status of the user device. It is up to the individual users to protect their own device. The company can still decide which resources are available for access depending on the status of the device. If the device is not properly protected there is no access.
  7. In place of expending resources on protecting the company LAN, the company can make its resources available to users as software services and start operating their own infrastructure in the “cloud”. That gives the company total freedom to place their computing resources in any facility ─ their own or outsourced.

Popup window for inform