Employees often have to travel to the offices of their future customers. During negotiating with them, they have to access a sensitive information. If the ways they use to connect to the head office are insecure, malicious programs or people can easily access this data. This would be detrimental at least to the business interests of the organization. For this reason, a secure connection with internal resources is very important and how to build its protection is the main purpose of this solution.
What you need:
What solution we offer you
To compete successfully, your business needs to be accessible to all types of users, including employees, customers, and partners, regardless of where they are located or daytime. Our proposal solves this challenge by helping you increase user access without compromising security or control.
The solution simplifies and guarantees on-line asset allocation, helps control customer access to web-based and traditional business applications. Authorized users are granted authenticated access to portals, web-based products, and corporate applications. IT administrators have access to centralized, policy-based authentication management and access privileges. Furthermore, the solution supports a wide range of platforms and directory services, and is flexible enough to work even in the most complex and various computing environments of different manufacturers. Support for basic identification standards such as SAML, WS-Federation and Liberty Alliance is included.
To help you manage access to vital data in your business, the solution provides:
We offer a complete access control solution that provides secure access to Web and corporate applications. It also provides seamless single sign-on, based on industry standards such as Seamless Assertions Markup Language (SAML), WS-Federation, and Liberty Alliance protocols, combining simplified deployment and management with advanced capabilities such as multi-factor authentication, role-based access, Web single sign-on, data encryption, and SSLVPN. It Integrates with Novell eDirectory or Microsoft Active Directory.
Non-functional featuresThe proposed access control solution has the following non-functional features:
IT projects and IS
IT infrastructure and IP networks
Virtualization and Reservation
Identities and Authentication
Task management and Website
National cluster for intelligent transport and energy systems /NCITES/
Services and solutions
News and events
Courses and trainings