contents

hardware
 
NCP Launches New Hybrid VPN Platform

NCP has extended its Secure Enterprise Solution with an additional remote access component, the SSL - VPN Server. With integration of the IPSec and SSL technologies in a unique VPN solution, NCP is now able to address the different remote access requirements of its customers with maximum flexibility.

The solution offers a centralised management system with endpoint security for all access methods, users, resources and devices. The software is available as a complete solution with both components. The two components, IPSec and SSL, however are also available individually and can be purchased for immediate delivery via NCP partners.

The SSL-VPN Server is modularly structured and contains the function modules, web proxy, remote file access and cache protection. In addition, the port forwarding and endpoint policy enforcement modules can also be licensed.

The web proxy functionality enables authorised remote users to securely access intranet resources via an SSL connection. With remote file access, the user has possibilities that are similar to the file explorer under Microsoft Windows. Files can be uploaded and downloaded or renamed. It is also possible to create or delete directories. When using internet explorer, the cache protection module protects the data transferred to the end devices from theft. All web pages downloaded from the corporate network will be deleted automatically after the user disconnects.

The port forwarding module is an aid in using client /server applications on the TCP/IP protocol. An auxiliary programme is required on the computer for this. The NCP SSL thin client is downloaded automatically from the SSL VPN Server to access different applications and servers concurrently during one session.

The NCP Secure Enterprise Management system is required in addition to use endpoint security. Via the "Endpoint Policy Enforcement" plugin policies are created that react dynamically to the respective access scenario of the user, and that restrict use rights for applications as needed (e.g. access from an external end device). Integration in existing authentication policies is executed via RADIUS server, LDAP server, Active Directory, or RSA ACE. Authentication occurs via user ID/password, one-time password tokens (OTP) or certificates.



write your comments about the article :: © 2007 Computing News :: home page