Network Secure Gateway What is the Network Secure Gateway ? It is in essence Secure remote access to PC’s and resources on your network. This includes.

Slides:



Advertisements
Similar presentations
Anders Vinger, University of Oslo Personal Data Recovery The pain of laptops.
Advertisements

WEB AND WIRELESS AUTOMATION connecting people and processes InduSoft Web Solution Welcome.
Updating User Details and Password Tutorial 5. Step 1.1 From the Energy Infrastructure Portal Home Page, click the Enter Site link to access the Portal.
Watts up ?. NET. Watts up.NET Overview Ideal for remote monitoring, the built-in web server allows data to be accessed via the internet. Connect the.
Requesting Withdrawal of a Submitted Application Tutorial 4.
General Operation and Facts As of 3/24/2014. Virtual Desktop 1. What is a Virtual Desktop? 2. Why VDI? 3. Installing the Virtual Desktop 4. Accessing.
Module 6: Configuring Windows XP Professional to Operate in a Microsoft Network.
Wi-Fi Security January 21, 2008 by Larry Finger. Wi-Fi Security Most laptops now come with built-in wireless capability, which can be very handy; however,
OAAIS Enterprise Information Security Security Awareness, Training & Education (SATE) Program or UCSF Campus VPN.
Welcome to EDINA Digimap Digimap is an EDINA service offering online access to a range of spatial data. It is authenticated using Athens and is available.
Remote Access SSL VPN Stewart Duncan Technical Manager.
Avoid DCOM and Tunnel Across Firewalls and Networks Presenters: Kevin Rutherford, Senior Applications Engineer Colin Winchester, VP Operations  OPC DA.
Proprietary & Confidential How to enable Windows Remote Desktop Connection.
NetComm Wireless VPN Functionality Feature Spotlight.
4-1 PSe_4Konf.503 EAGLE Getting Started and Configuration.
Viewer Software Viewer software is a remote viewer software for control the DVR. -This software supports the multiple functions of the network. -It can.
Course 201 – Administration, Content Inspection and SSL VPN
ISpot Subscriber Gateway Overview. Typical Network Diagram Illustrating iSpots in Multiple hotspot locations.
Worldwide Product Marketing Group United States - Spain - UK - France - Germany - Singapore - Taipei Barricade™ VPN Broadband Routers (4 and 8 port)
1 The SpaceWire Internet Tunnel and the Advantages It Provides For Spacecraft Integration Stuart Mills, Steve Parkes Space Technology Centre University.
Chapter 4.  NT came with a new way to organize hard drives and files, called the NT File System (NTFS). Before NTFS, all versions of Windows used an.
Configuring a Web Server. Overview Overview of IIS Preparing for an IIS Installation Installing IIS Configuring a Web Site Administering IIS Troubleshooting.
CHAPTER 2 PCs on the Internet Suraya Alias. The TCP/IP Suite of Protocols Internet applications – client/server applications The client requested data.
Chapter 14: Remote Server Administration BAI617. Chapter Topics Configure Windows Server 2008 R2 servers for remote administration Remotely connect to.
Learning In A Techno World How Safe is Your Cyberspace?
Microsoft Internet Security and Acceleration (ISA) Server 2004 is an advanced packet checking and application-layer firewall, virtual private network.
Week 1 – Seneca Networking Environment. Agenda Overview of Seneca Server names How to access servers Terminal Emulation (Putty) Browser – IE, Netscape,
Csci5233 Computer Security1 Bishop: Chapter 27 System Security.
Remote Administration Remote Desktop Remote Assistance Remote Server Administration Tools.
Home Media Network Hard Drive Training for Update to 2.0 By Erik Collett Revised for Firmware Update.
Troubleshooting Windows Vista Security Chapter 4.
| nectar.org.au NECTAR TRAINING Module 5 The Research Cloud Lifecycle.
Installing SIGNZ on a stand- alone machine. These slides will guide you through the installation of the SIGNZ ‘server’ and ‘client’ components on one machine.
MCTS Guide to Microsoft Windows Server 2008 Applications Infrastructure Configuration (Exam # ) Chapter Four Windows Server 2008 Remote Desktop Services,
Networked Information Systems Network Security. Network Physical Security File server failure can severely affect network users. Server security: Locked.
Downloading and Installing Autodesk Revit 2016
Step 1 Log in with your username and password Adding direct links to online archives from your VLE.
 Simpletranscript.com is an application to ease those cumbersome processes for the Student as well as the Universities to share transcripts online. 
Grid Chemistry System Architecture Overview Akylbek Zhumabayev.
MCTS Guide to Microsoft Windows Server 2008 Applications Infrastructure Configuration (Exam # ) Chapter Five Windows Server 2008 Remote Desktop Services,
Sudarshan Yadav Sr. Program Manager, Microsoft
Remote Administration Remote Desktop Remote Desktop Gateway Remote Assistance Windows Remote Management Service Remote Server Administration Tools.
LDAP Authentication Copyright © Liferay, Inc. All Rights Reserved. No material may be reproduced electronically or in print without written permission.
"The majority of users in a typical enterprise simply want frequent, location-independent access to a few key applications, such as , calendar and.
Internet (THEnet ISP Gateway) Home PC Home Laptop Wireless AP/RouterVPN Concentrator Firewall Hub (running WireShark for Monitoring) Work Server Work PCs.
SIMSWeb “Internet Remote Access” The most advanced central station software in the universe !
Citrix Secure Gateway v1.1 Customer Presentation Aug 2002 Customer Presentation Aug 2002.
Mohammed F & Aya. Peer-to-peer network are usually common in homes and small businesses and are not necessarily expensive. On a peer-to-peer network each.
TCOM Information Assurance Management Software Hacking.
ITGS Network Architecture. ITGS Network architecture –The way computers are logically organized on a network, and the role each takes. Client/server network.
Activity 4 Protecting Ourselves. Keeping Safe There are lots of different ways we can be at risk on the Internet. How can we protect ourselves and keep.
Module 10: Windows Firewall and Caching Fundamentals.
Step 1 Having previously registered, log in with your username and password Adding direct links to online archives from your VLE.
The Shaw Group Inc. WebVPN - Access Anywhere Users Manual.
Introduction Password Tracker is an application allows us to keep track of our web account password on a USB drive or on a Hard Disk in encrypted manner.
Lecture 6 (Chapter 16,17,18) Network and Internet Security Prepared by Dr. Lamiaa M. Elshenawy 1.
EasyAccess 2.0 A secured way to remotely access your Weintek HMIs and their PLCs Wherever they are on the globe.
Barracuda SSL VPN Remote, Authenticated Access to Applications and Data.
Barracuda SSL VPN Remote, Authenticated Access to Applications and Data Version 2.6 | July 2014.
Barracuda SSL VPN Remote, Authenticated Access to Applications and Data.
How to install Norton Anti-Virus 2017?
Barracuda SSL VPN Remote, Authenticated Access to Applications and Data.
Installing Citrix Receiver
Configuring ALSMS Remote Navigation
Remote Access: Guide for Windows
Telnet/SSH Connecting to Hosts Internet Technology.
Chapter 27: System Security
REDCap and Data Governance
School to Home Connection
Access Anywhere Users Manual.
Presentation transcript:

Network Secure Gateway What is the Network Secure Gateway ? It is in essence Secure remote access to PC’s and resources on your network. This includes anything on your Network. Built on top of Windows Technologies with added security.

Advantages of the Network Secure Gateway Users can access all resources and systems remotely anytime and from anywhere over the internet. Use the same systems, applications. Data doesn’t have to leave the organisation, less data protection issues. Consistent Environment for users. Can Save time and money.

Advantages of the Network Secure Gateway continued…… No issues with different version types with software. Less chance of Users losing work. Users can create and test resources on the Network from home. MIS system can be accessed from home for updating,completing or generating reports.

Advantages of the Network Secure Gateway continued…… Integrated with AD using your Standard. Network Username and Password. Using simple encrypted dual factor. Authentication for selected resources. Built in Threshold of PC’s available feature. Many other built in features.

Advantages of the Network Secure Gateway continued…… Users could work from home if this was necessary (extreme weather or Illness etc.) Organisation has better control over what resources are available and when.

How does it work ? Internet Network without MIS Resources User not using secure app User using secure app Network with MIS Resources

How does it work without Secure App ? The user goes to the organisations Network Secure Gateway Login Page. Logs in using there network username password. Selects resource (PC or Group of PC’S) and Logs in if required. Same username and password.

The user double clicks the Network Secure App and this loads the Gateway Login Page. The App also does encrypted first factor Authentication. User logs in using there network username password. (second factor Authentication) Selects resource (PC or group of PC’S) and Logs in if required. Same username and password. How does it work using the Secure App ?

Login

Click Agree

Click Resource

Click Connect

Type Domain name (LHS) and username and password.

Logged into the Network

How’s it secure ? Only accepts SSL traffic over Https on port 443 the same as secure banking sites etc. SSL Tunnel using RDP connection on PC’s. Various penetration tests run no issues found. LEA also run penetration tests every few months showing no issues.

How’s it secure continued…. Using the Encrypted App you can separate different levels of Access for users. Users without the App can’t access certain resources and can’t even see these resources.

NETWORK SECURE GATEWAY SECURITY Only Excepts SSL Traffic Internal Network Network Secure Gateway Internet SSL Tunnel

Overview Secure Remote access to everything on your Network. Dual factor Encrypted Authentication where required. Simple for users to access. You control who accesses what and when.