2 In reality this means a lot more: Ideal would be… 1Initial situation: your company uses an internal network (LAN) with various domestic locations and others abroad. The field service is running around with laptops. Homeworkers connect regularly to the HQ through the Internet.Requirement: everybody associated with the company has to communicate in a secure and cost effective environment over the internet with practically no restrictions.In reality this means a lot more:you need to communicate by with your colleagues in confidence that nobody can read, manipulate or destroy your correspondence.you are traveling a lot on business. This means you want to connect through your laptop to your company network from every possible location – whether it is from the hotel, internet cafe, car, train or plane or elsewhere – as if you were sitting in your office room
3 Ideal would be… 2Your own and the sensitive data of your clients are invisible to hackers.„Chatting“(Instant Messaging) ist not outlawed by your company – actually it is welcomed as an every-day communication tool because it is efficient, easy to handle and safe.Access to the company‘s internal website, CRM-system etc. is secure and simple.You do not have scruples communicating sensitive information using , chat, telephone or video over the internet. You know that NOBODY has insight into this sensitive information apart from the intended recipient.No SPAM !Even within the company unauthorized persons could never compromise your communication – including the system administrator.
4 The usual situationIf you do not dispose of a simple solution including VPN and firewall your reality when communicating over the internet comes down to this:Any person who has access to a PC within your company network can – with the help of small utilities which you can easily get for free from the Internet – spy on your files, hack passwords, manipulate or steal financial data etc.- this threat is INSIDE your organization!When you surf the internet specialists can do the same from the outside – this threat is OUTSIDE your organization.Your PC or the whole network resembles a house with open doors and windows.
5 The solution: a VPN with additional functions VPN is an acronym for "Virtual Private Network„.A VPN enables the VPN-users to communicate sensitive information to each other in a secure and encrypted manner.Every VPN must fulfill the following basic security requirements:confidentiality: protection against unauthorised access to dataintegrity: protection against data modification and manipulationauthentication: ensuring that communication takes place only between the intended and identified sender and recipientavailability and access: data is available and accessible to authorized persons only as required
6 Who needs a VPN-solution ? 1 Organizations wanting to use the internet for cost saving reasons and for an increase in flexibility in communication as an alternative to dedicated communication lines.Organizations with different locations, branches, international presence, field service, home workers etc.Organizations and user groups with a demand for confidential communication (keywords: industrial espionage, company management, contracts, quotations, concepts, patients and client data and others).Organizations having to comply with IT-security legislation.Organizations which to the present day have not considered using the internet for security reasons.
7 Who needs a VPN-solution ? 2 Companies in need of a verifiable, simple and secure access to their own ressources (CRM, ERP, internal websites etc.) using the internet.ViPNet-VPN can also be used to enhance client loyalty.ViPNet-VPN offers companies a tool for providing business models as an ASP.The private user is not the classic VPN-client but is often connected to the company (mostly relatives or other people close to the company.)
8 What is ViPNet ? 1VipNet is a software based VPN-solution WITH ADDED VALUE FEATURES reaching far beyond the classic VPN.ViPNet is integrated into the existing network environment. No additional hardware, i.e. PC, routers etc. have to be added.srgvdrgtd
9 ViPNet-VPN is a software based VPN What is ViPNet? 2ViPNet-VPN is a software based VPNwhich differs from classic VPN-solutions by the following key points:client-to-client connectivityintegrated communication applicationsunlimited scalabilityease of implementation in existing network environmentslocalizationsflexible pricingcross-platform support
10 ViPNet consists of 3 software modules: ViPNet modules 1ViPNet modules 1ViPNet consists of 3 software modules:
11 ViPNet modules functions: ViPNet Manager / AdministratorAdministrative softwareconfigures and manages the VPN, remote software and key’s upgradesinstalled on every VPN-user’s PC, enables transparent client-to-client or client-to-site connections for any user’s application programs, secures user’s data. Enables real time total protection of IP trafficViPNet ClientEnd-user softwareVPN-gateway with integrated corporate firewall, which also operates as an IP-address server within the VPN, as well as a Mail, Proxy and Tunnel server for secured connectionsViPNet CoordinatorSoftware for server or corporate gateway
14 ViPNet Client ViPNet Client Personal Firewall Network traffic End user SoftwarePersonal FirewallNetwork trafficencryption deviceA reliable protection of a user’s computer/server against both outside and LAN-borne attacks, including the ability to:Enables the protection (confidentiality, authenticity and integrity) of any traffic (generated by applications/control systems or OS traffic) going between any VPN objects, like workstations, information servers, application servers, networked machines or other nodes.filter the traffic by specified parameters (“white” and “black” lists of parties seeking connection, ports, protocols, user’s applicationmake a VPN user invisible to external parties (the “stealth” feature)detect intruders using the built-in IDS systemdetect and block launching of malicious “spooks”.
15 Communication Server that can be used as: ViPNet CoordinatorViPNet CoordinatorCommunication Server that can be used as:IP-address resolution server within the VPNVPN Proxy serverTunnelFirewallNAT traversalInternet lock/access serverSecure mail server
16 ViPNet Management ViPNet Administrator ViPNet Manager Includes the following software modules:∙Network Control Center ∙Key CenterIntegrated certificate authority (CA)Perfect for large networks creationViPNet AdministratorIs a light version of ViPNet Administrator.Does not require any intimate knowledge of network administration.The "Creating a ViPNet" wizard is included in the module.Perfect for small and medium networks creation.ViPNet Manager
17 Network Control Center (NCC) specifies VPN nodes, defines users and connections allowed between users, compiles address book and user rights databases for different VPN nodesbased on the company requirements, NCC defines corporate security policies for each specific VPN node and the powers of users/ local administrators with respect to modifying those policies locallyenables a secured automated delivery (with acknowledged receipt) to deployed network nodes of newly-compiled or modified, user rights databases and key-related information generated at the Key Center (e.g., symmetric keys, user certificates, lists of revoked certificates, etc.)automatically updates ViPNet software on remote locations;remote access to event logs of ViPNet Client andViPNet Coordinator
18 Key Center (KC) Key Center (KC) generates and subsequently updates initial key sets and passwords for network objects and users. The password can be stored on smart-cards, touch memory, e-tokens and other mediaissues X.509 digital certificates for authentication of different network objects, including outside users
19 ViPNet is offered in 3 packages: ViPNet packages 1infotecsViPNet is offered in 3 packages:For connecting any number of LANs and mobile users over ViPNet VPN. Contains all functions for design and administration of a VPN with unlimited scalability. ViPNet Administrator contains proprietary certificate authority.Target group: Large enterprises, ASPs and ISPsFor connecting any number of LANs and mobile users over ViPNet VPN. Contains preconfigured security settings. ViPNet Manager contains “Creating a ViPNet” wizard.Target group: small and medium enterprises.For tunneling IP/network traffic between remote offices or LANs. ViPNet Tunnel is used when no administrator access to the LANs is required.Target group: VPN-users of any size requiring a pure VPN tunnel solution between office networks.
20 ViPNet packages 2 ∞ ∞ 2 2 10 8 1* 20 ViPNet Packet AdministratorManagerCoordinatorClientIP TunnelViPNet CUSTOM ∞∞ViPNet OFFICE DemoViPNet TUNNEL Demo 22ViPNet OFFICELightStandard 10 8ViPNet TUNNEL 1* 20* ViPNet TUNNEL package consists of one ViPNet Client in order to set up a ViPNet Manager administrative workstation.** ViPNet OFFICE and ViPNet TUNNEL can be extended further from the Standard Packet
21 5 technical reasons to choose ViPNet 5 technical reasons „Why ViPNet?“ViPNet additionally focuses on client-to-client connections. As most competitors manufacturing VPN-solutions offer only server-to-server or client-to-server connections, they rarely offer solutions, which take into account the threat from inside LANs.The unique and over many years proven ViPNet technology allows VPN connections through corporate or local firewalls and proxy using NAT and NAPT.ViPNet uses strong 256-bit encryption based on a proprietary combination of symmetric and asymmetric key exchange procedures. Supports 4 encryption algorithms – AES, GOST, 3DES and DES.Every ViPNet module, which connects with the Internet, communicates through the integrated personal firewall and IDS.Cross-platform support for MS Windows, Linux and Sun. The ViPNet Client runs on Windows or Linux and can communicate with ViPNet installed on a Windows, Linux or Sun workstation/server.
22 5 commercial reasons to choose ViPNet 5 commercial reasons „Why ViPNet?“In contrast to classic VPN-solutions ViPNet provides value added features, which extend it into being an additional communication management tool by using integrated secure communication applications and other functions.Additional security features like digital signatures, personal firewall, internet connection lock, Watch Dog and protection during the boot process turn the classic VPN into a ViPNet-fortress, which protects your data and communication from hackers, espionage, virus attacks and internal or global threats.Easy configuration, a user friendly interface, which is partly integrated into the Windows interface, makes every-day work with the ViPNet-VPN a comfortable and understandable task without having to be an IT-specialist or security guru.As ViPNet is a pure software solution the implementation of the VPN does not require any hardware extensions or restructuring of the network resulting in no additional costs or interruptions of the workflow.Flexible price structure due to the possibility of adapting the ViPNet software configuration to the specific need of the customer.
23 Internet Protocol (IP) Network Adapter Driver Boot protectionOne of the important characteristics of the ViPNet-software module is the full control over the traffic being exercised already during the boot process.This control is possible due to the interaction of the ViPNet-Module with all drivers of the network adapters. The ViPNet login process takes place BEFORE the Windows-login, including initialisation of the keysThe advantages of these measures are obvious:FTPSMTPIPTelephonyduring and after the boot process of the PC no network attacks are possible, as ViPNet has an integrated firewall with IDSSSLTCPUDPnetwork login is completely secured by the VPN, which itself is totally transparent for all network applicationsInternet Protocol (IP)ViPNet DriverNetwork Adapter Driver
24 ViPNet Client Monitor tool bar with the most important applications configuration and administrationlist of ViPNet users and their traffic rules(users which are online are highlighted)
25 Security levelsThe integrated personal firewall of the ViPNet Client offers 5 security levels. Security level 1 allows only ViPNet-VPN traffic.Security level 3 is the default mode („Boomerang mode“) filtering all IP-adresses, ports and protocols.
26 SettingsSettings enable the ViPNet user to easily integrate the client software into an existing network structure. This characteristic is especially important for the mobile user who has to connect to the own VPN-network from different network environments and through third-party firewalls, proxies and connection devices (like DSL modem, etc).
27 ViPNet user secure applications Communication toolsViPNet user secure applicationsWeb-LinkBusiness-MailFile ExchangeConferenceChat (IM)
28 ViPNet Chat / Instant Messaging Send buttonHere you can add users to the chat or organize a chat conference.List of chat participantsThese attributes confirm the status of the message :S=Sent, D=Delivered, R=ReadAll current sessionsAll messages of the current sessionField to enter messages
29 ViPNet Business MailThese attributes confirm whether a message has been delivered and/or read. S=Sent, E=Encrypted, R=ReadEvery message is numbered to facilitate search options.Address bookInbox and Outbox as in every classic client.All messages are encrypted. After decryption you can read the contents here.
30 ViPNet File ExchangeFile Exchange and Business-Mail are integrated into the context menu. With a convenient right click on to any document files are easily sent to the recipient.In the File Exchange window the ViPNet-User can determine recipients, organize received files and check the status of sent files.
31 Web LinkUnauthorized persons without a ViPNet Client or valid keys cannot access this address. The web server stays invisible.If on a ViPNet Client or a Coordinator a Web-Server is installed the ViPNet-Users benefit from a completely secure portal which is accessible only to authorized users. CRM- and ERP-systems, databases and intranet pages can be accessed from any ViPNet-PC in a secure fashion.
32 Contact mail: firstname.lastname@example.org or check www.infotecs.biz Questions?Questions?Contact mail: or check