ID Control, the specialist in strong and easy authentication and encryption has integrated its’ solutions with Securepoint, the Unified Threat Management solution which protects the gate to your network resources or your remote office from a mixture of risks and threats.
Sensitive information from your network or application can now be securely exchanged with Securepoint’s VPN access to the right persons, who are really who they proclaim to be.
A lot of organizations that offer remote working facilities to their clients, subsidiaries, branche offices, suppliers or employees enable private tunnels to internal network resources or applications through VPN. Securepoint manages the network related security threats and risks in a blended easy protective approach and provides the VPN from one centrally managed secure point at the gate. Together with ID Control users need to authenticate themselves when accessing the VPN, which was before with only a user name and password, which is a relatively weak authentication mechanism. ID Control empowers the authentication procedure by providing strong authentication tokens with dynamic passwords on your mobile phone or on a hardware token. Next to One Time Password authentication the user’s legal binding digital signature on a USB token can be used to sign-on to the access of Securepoint’s VPN. ID Control’s solutions are affordable and very user-friendly and available for Securepoint’s VPN but also for web based email and other services such as web application, network and remote desktop access.
Hans Kortekaas, CEO of ID Control, says that unauthorized access is probably the most significant vulnerability to your organizations’ network environment. This can put the availability of your network, the confidentiality of business data inside your network, and your entire business activity at risk. And it also exposes your company and its management to potential compliance issues with regulations and data privacy laws. Controlling the identity and access of the users to VPN are ranked high in priority on the list of security measures nowadays. With ID Control and Securepoint in place, confidentiality, integrity, and proof of origin of any communication before entering the tunnel into your network can be ensured.