Five Challenges - One Solution

G/On Virtual Access solves the five challenges of secure access.

Getting access to IT resources isn't difficult. The challenge is to make it secure while keeping complexity and cost under control.

 

 Authentication

  G/On's end-to-end solution integrates two-factor, mutual authentication. The hardware token can either be G/On's unique USB-based authentication and connectivity device OR G/On can use the PC   itself as the hardware token.

   

Device Isolation and Management

Contrary to traditional VPN based solutions G/On does NOT make the remote PC part of the network. G/On connects users virtually to their applications, their office PC or to their virtualized desktop.

The optional G/On Secure Desktop boots the PC from a locked down Linux operating system and creates a fully known and managed environment on the remote PC.

   
Data Protection and Integrity

Instead of using VPN tunneling protocols such as IPSec, SSL, L2TP and PTPP, G/On establishes a protected, virtual connection between user and the application.

   
Network Access Control and Logging

G/On improves the protection of your company network considerably. First of all, the G/On Server only responds to traffic from known and approved devices and it will onlycommunicate with users following a successful two-factor authentication.

   
Application Authorization and User Management

The G/On Management tool enables IT administrators to manage Authentication Policies and Authorization Policies. Authorization Policies defines which applications users have access to when they are authenticated.

 

 

Popup window for inform