Presentation is loading. Please wait.

Presentation is loading. Please wait.

ViPNet Product Presentation

Similar presentations


Presentation on theme: "ViPNet Product Presentation"— Presentation transcript:

1 ViPNet Product Presentation
ViPNt ViPNet Product Presentation Infotecs GmbH 2008

2 In reality this means a lot more:
Ideal would be… 1 Initial situation: your company uses an internal network (LAN) with various domestic locations and others abroad. The field service is running around with laptops. Homeworkers connect regularly to the HQ through the Internet. Requirement: everybody associated with the company has to communicate in a secure and cost effective environment over the internet with practically no restrictions. In reality this means a lot more: you need to communicate by with your colleagues in confidence that nobody can read, manipulate or destroy your correspondence. you are traveling a lot on business. This means you want to connect through your laptop to your company network from every possible location – whether it is from the hotel, internet cafe, car, train or plane or elsewhere – as if you were sitting in your office room

3 Ideal would be… 2 Your own and the sensitive data of your clients are invisible to hackers. „Chatting“(Instant Messaging) ist not outlawed by your company – actually it is welcomed as an every-day communication tool because it is efficient, easy to handle and safe. Access to the company‘s internal website, CRM-system etc. is secure and simple. You do not have scruples communicating sensitive information using , chat, telephone or video over the internet. You know that NOBODY has insight into this sensitive information apart from the intended recipient. No SPAM ! Even within the company unauthorized persons could never compromise your communication – including the system administrator.

4 The usual situation If you do not dispose of a simple solution including VPN and firewall your reality when communicating over the internet comes down to this: Any person who has access to a PC within your company network can – with the help of small utilities which you can easily get for free from the Internet – spy on your files, hack passwords, manipulate or steal financial data etc. - this threat is INSIDE your organization! When you surf the internet specialists can do the same from the outside – this threat is OUTSIDE your organization. Your PC or the whole network resembles a house with open doors and windows.

5 The solution: a VPN with additional functions
VPN is an acronym for "Virtual Private Network„. A VPN enables the VPN-users to communicate sensitive information to each other in a secure and encrypted manner. Every VPN must fulfill the following basic security requirements: confidentiality: protection against unauthorised access to data integrity: protection against data modification and manipulation authentication: ensuring that communication takes place only between the intended and identified sender and recipient availability and access: data is available and accessible to authorized persons only as required

6 Who needs a VPN-solution ? 1
Organizations wanting to use the internet for cost saving reasons and for an increase in flexibility in communication as an alternative to dedicated communication lines. Organizations with different locations, branches, international presence, field service, home workers etc. Organizations and user groups with a demand for confidential communication (keywords: industrial espionage, company management, contracts, quotations, concepts, patients and client data and others). Organizations having to comply with IT-security legislation. Organizations which to the present day have not considered using the internet for security reasons.

7 Who needs a VPN-solution ? 2
Companies in need of a verifiable, simple and secure access to their own ressources (CRM, ERP, internal websites etc.) using the internet. ViPNet-VPN can also be used to enhance client loyalty. ViPNet-VPN offers companies a tool for providing business models as an ASP. The private user is not the classic VPN-client but is often connected to the company (mostly relatives or other people close to the company.)

8 What is ViPNet ? 1 VipNet is a software based VPN-solution WITH ADDED VALUE FEATURES reaching far beyond the classic VPN. ViPNet is integrated into the existing network environment. No additional hardware, i.e. PC, routers etc. have to be added. srgvdrgtd

9 ViPNet-VPN is a software based VPN
What is ViPNet? 2 ViPNet-VPN is a software based VPN which differs from classic VPN-solutions by the following key points: client-to-client connectivity integrated communication applications unlimited scalability ease of implementation in existing network environments localizations flexible pricing cross-platform support

10 ViPNet consists of 3 software modules:
ViPNet modules 1 ViPNet modules 1 ViPNet consists of 3 software modules:

11 ViPNet modules functions:
ViPNet Manager / Administrator Administrative software configures and manages the VPN, remote software and key’s upgrades installed on every VPN-user’s PC, enables transparent client-to-client or client-to-site connections for any user’s application programs, secures user’s data. Enables real time total protection of IP traffic ViPNet Client End-user software VPN-gateway with integrated corporate firewall, which also operates as an IP-address server within the VPN, as well as a Mail, Proxy and Tunnel server for secured connections ViPNet Coordinator Software for server or corporate gateway

12 Classic VPN

13 ViPNet VPN Server-to-Server Client-to-Server
Client-to-Client traffic encryption + ViPNet Technology =

14 ViPNet Client ViPNet Client Personal Firewall Network traffic
End user Software Personal Firewall Network traffic encryption device A reliable protection of a user’s computer/server against both outside and LAN-borne attacks, including the ability to: Enables the protection (confidentiality, authenticity and integrity) of any traffic (generated by applications/control systems or OS traffic) going between any VPN objects, like workstations, information servers, application servers, networked machines or other nodes. filter the traffic by specified parameters (“white” and “black” lists of parties seeking connection, ports, protocols, user’s application make a VPN user invisible to external parties (the “stealth” feature) detect intruders using the built-in IDS system detect and block launching of malicious “spooks”.

15 Communication Server that can be used as:
ViPNet Coordinator ViPNet Coordinator Communication Server that can be used as: IP-address resolution server within the VPN VPN Proxy server Tunnel Firewall NAT traversal Internet lock/access server Secure mail server

16 ViPNet Management ViPNet Administrator ViPNet Manager
Includes the following software modules: ∙Network Control Center ∙Key Center Integrated certificate authority (CA) Perfect for large networks creation ViPNet Administrator Is a light version of ViPNet Administrator. Does not require any intimate knowledge of network administration. The "Creating a ViPNet" wizard is included in the module. Perfect for small and medium networks creation. ViPNet Manager

17 Network Control Center (NCC)
specifies VPN nodes, defines users and connections allowed between users, compiles address book and user rights databases for different VPN nodes based on the company requirements, NCC defines corporate security policies for each specific VPN node and the powers of users/ local administrators with respect to modifying those policies locally enables a secured automated delivery (with acknowledged receipt) to deployed network nodes of newly-compiled or modified, user rights databases and key-related information generated at the Key Center (e.g., symmetric keys, user certificates, lists of revoked certificates, etc.) automatically updates ViPNet software on remote locations; remote access to event logs of ViPNet Client and ViPNet Coordinator

18 Key Center (KC) Key Center (KC)
generates and subsequently updates initial key sets and passwords for network objects and users. The password can be stored on smart-cards, touch memory, e-tokens and other media issues X.509 digital certificates for authentication of different network objects, including outside users

19 ViPNet is offered in 3 packages:
ViPNet packages 1 infotecs ViPNet is offered in 3 packages: For connecting any number of LANs and mobile users over ViPNet VPN. Contains all functions for design and administration of a VPN with unlimited scalability. ViPNet Administrator contains proprietary certificate authority. Target group: Large enterprises, ASPs and ISPs For connecting any number of LANs and mobile users over ViPNet VPN. Contains preconfigured security settings. ViPNet Manager contains “Creating a ViPNet” wizard. Target group: small and medium enterprises. For tunneling IP/network traffic between remote offices or LANs. ViPNet Tunnel is used when no administrator access to the LANs is required. Target group: VPN-users of any size requiring a pure VPN tunnel solution between office networks.

20 ViPNet packages 2 ∞    ∞  2 2  10  8  1*  20 ViPNet Packet
Administrator Manager Coordinator Client IP Tunnel ViPNet CUSTOM  ∞ ViPNet OFFICE Demo ViPNet TUNNEL Demo  2 2 ViPNet OFFICE Light Standard  10  8 ViPNet TUNNEL  1*  20 * ViPNet TUNNEL package consists of one ViPNet Client in order to set up a ViPNet Manager administrative workstation. ** ViPNet OFFICE and ViPNet TUNNEL can be extended further from the Standard Packet

21 5 technical reasons to choose ViPNet
5 technical reasons „Why ViPNet?“ ViPNet additionally focuses on client-to-client connections. As most competitors manufacturing VPN-solutions offer only server-to-server or client-to-server connections, they rarely offer solutions, which take into account the threat from inside LANs. The unique and over many years proven ViPNet technology allows VPN connections through corporate or local firewalls and proxy using NAT and NAPT. ViPNet uses strong 256-bit encryption based on a proprietary combination of symmetric and asymmetric key exchange procedures. Supports 4 encryption algorithms – AES, GOST, 3DES and DES. Every ViPNet module, which connects with the Internet, communicates through the integrated personal firewall and IDS. Cross-platform support for MS Windows, Linux and Sun. The ViPNet Client runs on Windows or Linux and can communicate with ViPNet installed on a Windows, Linux or Sun workstation/server.

22 5 commercial reasons to choose ViPNet
5 commercial reasons „Why ViPNet?“ In contrast to classic VPN-solutions ViPNet provides value added features, which extend it into being an additional communication management tool by using integrated secure communication applications and other functions. Additional security features like digital signatures, personal firewall, internet connection lock, Watch Dog and protection during the boot process turn the classic VPN into a ViPNet-fortress, which protects your data and communication from hackers, espionage, virus attacks and internal or global threats. Easy configuration, a user friendly interface, which is partly integrated into the Windows interface, makes every-day work with the ViPNet-VPN a comfortable and understandable task without having to be an IT-specialist or security guru. As ViPNet is a pure software solution the implementation of the VPN does not require any hardware extensions or restructuring of the network resulting in no additional costs or interruptions of the workflow. Flexible price structure due to the possibility of adapting the ViPNet software configuration to the specific need of the customer.

23 Internet Protocol (IP) Network Adapter Driver
Boot protection One of the important characteristics of the ViPNet-software module is the full control over the traffic being exercised already during the boot process. This control is possible due to the interaction of the ViPNet-Module with all drivers of the network adapters. The ViPNet login process takes place BEFORE the Windows-login, including initialisation of the keys The advantages of these measures are obvious: FTP SMTP IP Telephony during and after the boot process of the PC no network attacks are possible, as ViPNet has an integrated firewall with IDS SSL TCP UDP network login is completely secured by the VPN, which itself is totally transparent for all network applications Internet Protocol (IP) ViPNet Driver Network Adapter Driver

24 ViPNet Client Monitor tool bar with the most important applications
configuration and administration list of ViPNet users and their traffic rules (users which are online are highlighted)

25 Security levels The integrated personal firewall of the ViPNet Client offers 5 security levels. Security level 1 allows only ViPNet-VPN traffic. Security level 3 is the default mode („Boomerang mode“) filtering all IP-adresses, ports and protocols.

26 Settings Settings enable the ViPNet user to easily integrate the client software into an existing network structure. This characteristic is especially important for the mobile user who has to connect to the own VPN-network from different network environments and through third-party firewalls, proxies and connection devices (like DSL modem, etc).

27 ViPNet user secure applications
Communication tools ViPNet user secure applications Web-Link Business-Mail File Exchange Conference Chat (IM)

28 ViPNet Chat / Instant Messaging
Send button Here you can add users to the chat or organize a chat conference. List of chat participants These attributes confirm the status of the message : S=Sent, D=Delivered, R=Read All current sessions All messages of the current session Field to enter messages

29 ViPNet Business Mail These attributes confirm whether a message has been delivered and/or read. S=Sent, E=Encrypted, R=Read Every message is numbered to facilitate search options. Address book Inbox and Outbox as in every classic client. All messages are encrypted. After decryption you can read the contents here.

30 ViPNet File Exchange File Exchange and Business-Mail are integrated into the context menu. With a convenient right click on to any document files are easily sent to the recipient. In the File Exchange window the ViPNet-User can determine recipients, organize received files and check the status of sent files.

31 Web Link Unauthorized persons without a ViPNet Client or valid keys cannot access this address. The web server stays invisible. If on a ViPNet Client or a Coordinator a Web-Server is installed the ViPNet-Users benefit from a completely secure portal which is accessible only to authorized users. CRM- and ERP-systems, databases and intranet pages can be accessed from any ViPNet-PC in a secure fashion.

32 Contact mail: support@infotecs.biz or check www.infotecs.biz
Questions? Questions? Contact mail: or check


Download ppt "ViPNet Product Presentation"

Similar presentations


Ads by Google