Software Bundle ViPNet Secure Remote Access Arrangement using ViPNet Mobile © Infotecs.

Slides:



Advertisements
Similar presentations
ViPNet Product Presentation
Advertisements

Unified Communications Bill Palmer ADNET Technologies, Inc.
Caltech Proprietary Videoconferencing Security in VRVS 3.0 and Future Videoconferencing Security in VRVS 3.0 and Future Kun Wei California Institute of.
All rights reserved © 2000, Alcatel 1 CPE-based VPNs Hans De Neve Alcatel Network Strategy Group.
RASPro is a secure high performance remote application delivery platform through a perfect combination of application hosting and application streaming.
Voice and Data Encryption over mobile networks July 2012 IN-NOVA TECNOLOGIC IN-ARG SA MESH VOIP.
Authenticating Users. Objectives Explain why authentication is a critical aspect of network security Explain why firewalls authenticate and how they identify.
Guide to Network Defense and Countermeasures Second Edition
1 Intel / Shiva VPN Solutions Stephen Wong System Engineer.
 SONA ENTERPRISE was founded in 2008 as a manufacturer and developer of high performance, versatile wireless solutions for Wireless Internet Service.
Setting Up a Virtual Private Network Chapter 9. Learning Objectives Understand the components and essential operations of virtual private networks (VPNs)
1.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 1: Introducing Windows Server.
Information Security 1 Information Security: Security Tools Jeffy Mwakalinga.
Module 5: Configuring Access for Remote Clients and Networks.
Nada Abdulla Ahmed.  SmoothWall Express is an open source firewall distribution based on the GNU/Linux operating system. Designed for ease of use, SmoothWall.
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
Introduction to ISA 2004 Dana Epp Microsoft Security MVP.
1 © NOKIA Presentation_Name.PPT / DD-MM-YYYY / Initials Company Confidential The Internet offers no inherent security services to its users; the data transmitted.
Firewall Configuration Strategies
A Security Pattern for a Virtual Private Network Ajoy Kumar and Eduardo B. Fernandez Dept. of Computer Science and Eng. Florida Atlantic University Boca.
Information Security 1 Information Security: Demo of Some Security Tools Jeffy Mwakalinga.
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
In this section, we'll cover one of the foundations of network security issues, It talks about VPN (Virtual Private Networks). What..,Why..,and How….?
Business Data Communications, Fourth Edition Chapter 10: Network Security.
Hands-On Microsoft Windows Server 2003 Networking Chapter 1 Windows Server 2003 Networking Overview.
Guide to Computer Network Security
Copyright Microsoft Corp Ramnish Singh IT Advisor Microsoft Corporation Secure Remote Access Challenges, Choices, Best Practices.
Page Copyright Giritech A/S an – Excitor company.
Barracuda Networks Steve Scheidegger Commercial Account Manager
© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod3_L7 1 Network Security 2 Module 6 – Configure Remote Access VPN.
Virtual Private Network prepared by Rachna Agrawal Lixia Hou.
Introducing Kerio Control Unified Threat Management Solution Release date: June 1, 2010 Kerio Technologies, Inc.
Polycom Conference Firewall Solutions. 2 The use of Video Conferencing Is Rapidly Growing More and More people are adopting IP conferencing Audio and.
 2013, Infotecs ViPNet Technology Advantages.  2013, Infotecs GmbH In today’s market, along with the ViPNet technology, there are many other technologies.
Hands-On Microsoft Windows Server 2008 Chapter 1 Introduction to Windows Server 2008.
LINUX Security, Firewalls & Proxies. Course Title Introduction to LINUX Security Models Objectives To understand the concept of system security To understand.
Intranet, Extranet, Firewall. Intranet and Extranet.
CHAPTER 2 PCs on the Internet Suraya Alias. The TCP/IP Suite of Protocols Internet applications – client/server applications The client requested data.
Virtual Private Network (VPN). ©2001 Check Point Software Technologies Ltd. - Proprietary & Confidential “ If saving money is wrong, I don’t want.
TRUSTPORT PRODUCT PORTFOLIO Marcela Parolkova Sales Director.
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
VPN Protocol What is a VPN? A VPN is A network that uses Internet or other network service to transmit data. A VPN includes authentication and.
P RESENTED B Y - Subhomita Gupta Roll no: 10 T OPICS TO BE DISCUSS ARE : Introduction to Firewalls  History Working of Firewalls Needs Advantages and.
Virtual Private Network (VPN) Topics Discussion What is a VPN? What is a VPN?  Types of VPN  Why we use VPN?  Disadvantage of VPN  Types of.
1 CHAPTER 2 LAWS OF SECURITY. 2 What Are the Laws of Security Client side security doesn’t work Client side security doesn’t work You can’t exchange encryption.
Lecture 16 Page 1 Advanced Network Security Perimeter Defense in Networks: Virtual Private Networks Advanced Network Security Peter Reiher August, 2014.
Module 9: Fundamentals of Securing Network Communication.
Selling Strategies Microsoft Internet Security and Acceleration (ISA) Server 2004 Powerful Protection for Microsoft Applications.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,
Total Threat Protection Securing All Your Threat Vectors Hartford Tech Summit.
INFORMATION SECURITY MANAGEMENT P ROTECTION M ECHANISMS - C RYPTOGRAPHY.
OLMEK Mach 2006 Olmek is an innovative solution developed by Item Centric to protect digital data’s storage and exchange with an unprecedented level of.
©2001 Check Point Software Technologies Ltd. - Proprietary & Confidential outline What is a VPN? What is a VPN?  Types of VPN.
Understand Network Isolation Part 2 LESSON 3.3_B Security Fundamentals.
NetModule Cloud Solution Professional M2M Networking out of the Cloud © 2014 NetModule AG Slide 1.
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter One Introduction to Exchange Server 2003.
INFORMATION SECURITY MANAGEMENT P ROTECTION M ECHANISMS - C RYPTOGRAPHY.
1 6 Chapter 6 Implementing Security for Electronic Commerce.
IP Security (IPSec) Matt Hermanson. What is IPSec? It is an extension to the Internet Protocol (IP) suite that creates an encrypted and secure conversation.
SemiCorp Inc. Presented by Danu Hunskunatai GGU ID #
Short Customer Presentation September The Company  Storgrid delivers a secure software platform for creating secure file sync and sharing solutions.
Top 5 Open Source Firewall Software for Linux User
Methods to overcome corporate firewall restrictions
OLMEK Building a confidential and secure communication between a Bank and its customers March 2006.
Welcome To : Group 1 VC Presentation
Guide to Computer Network Security
RASPro is a secure high performance remote application delivery platform through a perfect combination of application hosting and application streaming.
Virtual Private Network
K!M SAA LOGICAL SECURITY Strong Adaptive Authentication
Presentation transcript:

Software Bundle ViPNet Secure Remote Access Arrangement using ViPNet Mobile © Infotecs

Problem Statement Arrange secure remote access to the Corporate local network resources (mail server, CRM-system, ERP- system) from Pocket PCs on the base of Windows Mobile operating system, which use cryptographic information security tools Arrange secure remote access to the Corporate local network resources (mail server, CRM-system, ERP- system) from Pocket PCs on the base of Windows Mobile operating system, which use cryptographic information security tools

Problem Statement Graph

What is ViPNet How to Implement?

ViPNet – is a software bundle for building a network security system of corporate networks on the base of Windows and Linux operating systems. It implements: Generation of secure networks structure and centralized configuration management, unlimited scalability; Information encryption on the network and application levels (all IP traffic: video-, audio- conferences, file exchange, electronic mail and more); Access distribution to the information resources (internetworking and personal firewalls, virtual subnetworks, trusted access to the data bases); What is ViPNet

How to implement?

What is ViPNet Client Mobile?

o Cryptographic tool for encryption/decryption of any IP traffic (outgoing or incoming to the PDA through the network interface; o Firewall which allows to filter both open and encrypted IP traffic outgoing or incoming to the PDA; o Transparent for the high-level applications; o Do not load CPU and RAM; o Possibility to joint function together with other security infrastructure, built on the base of ViPNet Products: ViPNet Coordinator, ViPNet Client and so on.

ViPNet Software Implementation

5 technical reasons Why ViPNet? ViPNet technology is client-to-client oriented as most competitive VPN solutions provide only server-to-server or client-to-server connections. Such approach ensures that any security policy can be implemented in the secure network, even if protection is needed inside the LAN. Big emphasis ViPNet puts on the system functioning using different network equipment. ViPNet technology allows VPN connections through any corporate or local firewalls and proxies using NAT and NAPT which simplifies the process of software installation and configuration. ViPNet uses strong 256-bit encryption. Key system is based on combination of symmetric and asymmetric key generation procedures. ViPNet Supports 4 encryption algorithms – AES, GOST, 3DES and DES. Each ViPNet modules has a built-in firewall and an IDS, which makes it possible to build a secure distributed system of personal firewalls. To solve the problem of IP address conflict between LANs included in one VPN, ViPNet offers advanced virtual address system. 5 technical reasons «Why ViPNet?»

The advantages of this measure are obvious : during and after the boot process of the PC no network attacks are possible, as ViPNet has an integrated firewall with IDS network login is completely secured by the VPN (as ViPNet driver is activated before the login to the operating system), which itself is totally transparent for all network applications One of the important characteristics of ViPNet technology is the full control over the network traffic being accomlished already during the boot process. This control is possible due to the deep intagration of ViPNet driver into the TCP/IP stack of the operating system Security during boot process

5 commercial reasons Why ViPNet? In contrast to classic VPN-solutions ViPNet provides value added features, which extend it into being an additional communication management tool by using integrated secure communication applications and other functions, such as: secure instant messenger, file exchange, proprietary mail service with digital signature support and more. Additional network security features like IDS, personal firewall, application control, internet connection lock and protection during the boot process turn the classic VPN into a ViPNet-fortress, which protects your data and communication from the majority of internal or global threats which is quit cost effective for the security system in general. User friendly interface makes every-day work with ViPNet applications easy and do not require any advanced skills from the user. As ViPNet is a pure software solution the implementation of the VPN does not require any hardware extensions or restructuring of the network resulting in no additional costs or interruptions of the workflow. Flexible pricing allows to form the most cost effective solution regarding the specific needs of each customer. 5 commercial reasons «Why ViPNet?»

Infotecs = 100% ViPNet Infotecs is a developer and a full possessor of the rights for ViPNet Products: Regular software updates Prompt reaction on detected bugs Software overpatching/development after customers request Infotecs offers full complex of technical support service: Software installation Consultation by and telephone Personal manager fixation to the customer Visiting the customer for the complicated issues solving Infotecs has a training courses for the customers specialists on ViPNet software products exploitation: Online presentations Seminars

Thank you for your attention! If you have any questions, please ask Maria Ratsin Product Manager Infotecs