Space Hellas Logo   Home | Investor Relations | News | Download | Contact   Search  go         
  Company
  System Integration
  Solutions & Services
Telecoms & Networking
Telecom Services
IT Solutions
Information Security
Security Systems
Applications
Infrastructure
Solutions & Services Leaflets
  Sectors
  Technical Services
  Customer Support
  R & D
  Careers
SpacePhone - Fixed, Mobile and Internet Services
Space Hellas PULSE - Maximize IT Performance - Guarantee Security Compliance
Space Hellas GUARDIAN - Maximize your Site's Security
Space Hellas among the top System Intengrators in Europe
Space Hellas Twitter Space Hellas Facebook Space Hellas Linkedin

Remote Access Security

There is increasingly a need for remote users to the access internal resources of an organization. According to Gartner Group, by 2010, 80% of primary business activities involve exchanging data in real time via remote users. These users can be administrators, normal users or collaborators of the organization. On the other hand, the number and variety of devices used to connect to the infrastructure is rapidly growing: from mobile phones / smart phones, laptops, tablets to Internet Cafe or Internet Browser.

Risks:

Enabling remote connections provides flexibility to an organization, but greatly increases the risk of leakage or loss of critical information. In the absence of strong authentication mechanisms, malicious users can take control of the organization’s sensitive information. The mobile devices host applications that are supported by code that has not been designed according to security standards, but has only focused on the functionality of implemented service, thus leaving the devices vulnerable. In the process of remote access, «Man in the middle attacks» have been observed during which an intermediate user can intercept all the exchanged information.

At the same time, remote user access is often implemented through an "insecure" network such as public wireless networks. Consequently, malicious users can gain access to the internal network of the organization. In most cases, an organization first offers remote access and then sets the rules and policies that affect security. As a result, both the IT infrastructure and the user himself and his devices are unprepared.

Solutions:

SSL VPN products, strong authentication mechanisms, Data Leakage Prevention (DLP) solutions, Encryption Devices, Endpoint Security (host based firewall, IPS), Unified Threat Management Firewalls.

Perimeter Security
Intranet and Data Centre Security
Endpoint Security
Remote Access Security
Web Banking Security
ATM Security
Unified Communications Security
Virtualization Security
Secure Wireless Infrastructure
Vulnerability and Penetration Testing
Security Auditing and Compliance
Managed Security Services
Cooperations
 
 
Space Hellas ISO certifications
© Space Hellas 2017 | Privacy Policy | Sitemap