CACI Remote Access CACI has a range of remote access tools for offsite employees who need to connect to resources inside the CACI private network. 2012.01.09.

Slides:



Advertisements
Similar presentations
McAfee One Time Password
Advertisements

Group Data Sharing Options Mount Auburn Hospital I.T
Lab4 Part2 Lau Ting Nga Virginia Tsang Pui Yu Wong Sin Man.
Authentication choices! Vincent van Kooten: Business Sales Manager Benelux Distributed by -
Polytechnic University of Tirana Faculty of Information Technology Computer Engineering Department Identification of on-line users and Digital Signature.
MITP 458 Application Layer Security By Techjocks.
In this section, we'll cover one of the foundations of network security issues, It talks about VPN (Virtual Private Networks). What..,Why..,and How….?
0-1 Team ?? Status Report (1 of 3) Client Contact –Point 1 –Point 2 Team Meetings –Point 1 –Point 2 Team Organization –Point 1 –Point 2 Team 1: Auraria.
Remote Access SSL VPN Stewart Duncan Technical Manager.
RSA SecurID November 10, 2005.
Meditech Remote Access Training September 2011 Page 1.
Windows XP Professional Deployment and Support Microsoft IT Shares Its Experiences Published: May 2002 (Revised October 2004)
CONNECTION SETTINGS FOR USE WITH THE MOTION COMPUTING MODEL-F5 TABLET COMPUTER AKA: SIMON October 8, 2011 (And other useful information.)
ASA 5505 SSL VPN Joe Cicero Northeast Wisconsin Technical College.
Dr. John P. Abraham Professor UTPA.  Particularly attacks university computers  Primarily originating from Korea, China, India, Japan, Iran and Taiwan.
Virtual Private Networks Alberto Pace. IT/IS Technical Meeting – January 2002 What is a VPN ? u A technology that allows to send confidential data securely.
Tools to Help You - Communication. 2 | CACI Information Solutions and Services | Date | CACI Proprietary Information Mail & Calendaring  Microsoft Exchange.
Welcome To Armstrong PC Connectivity Review Desktop Services COMPUTERBASEDTRAINING.
Self-Serve tools for... My password My login My Secondary Address*
Mobile and Wireless Communication Security By Jason Gratto.
Using cryptography to protect data in networks. Summary National Taras Shevchenko University of Kiev Ukraine Vsevolod Ievgiienko.
Corporate Information Systems Delivery of Infrastructure IT Services.
IT Infrastructure for Business
Access Points (Portal/URL Access) WebXpress PORTAL Internet Access – Using WebXpress URL 1 2 VPN Tunnel Intranet Access – WebXpress used as a backend repository.
Security Infrastructure Overview - VPN Suresh Ramasamy.
Dominick Bennese, Jyl Mangooni, Steve Lorson GROUP 5.
Module 5: Configuring Access for Remote Clients and Networks.
Class 6 Agenda Midterm Review Midterm Review –Questions –Toyota Case Computer Security Basics Computer Security Basics –Identification & Authentication.
GPO - WINDOWS SERVER AGENDA: Introduction Group Policy Overview Types of Group Policies/Objects Associated Technologies How to implement.
Lieberman Software Random Password Manager & Two-Factor Authentication.
Providing Teleworker Services
FIRM Fremont Investment & Loan Remote & Mobile Senior Executives and Above Presented by: Information Technology April xx, 2005.
Systems and Network Design Professional Services for NT Server and NetWare Networks.
Physician Instructions for Accessing Remotely: 1.Open your Internet Explorer. 2.In the address box, type in: 3.Follow.
CERN - European Organization for Nuclear Research Beyond ACB – VPN’s FOCUS June 13 th, 2002 Frédéric Hemmer & Denise Heagerty- IT Division.
©2001 Check Point Software Technologies Ltd. - Proprietary & Confidential outline What is a VPN? What is a VPN?  Types of VPN.
Chapter 40 Network Security (Access Control, Encryption, Firewalls)
General Concerns on WWW Security Name: Huaying Chen ID# Instructor: Dr Mort Anvari.
Create VPN in your PC and can surf any blocked website.
Website Design:. Once you have created a website on your hard drive you need to get it up on to the Web. This is called "uploading“ or “publishing” or.
Chapter 18 - Names For Computers Introduction People Prefer Names To Numbers Naming A Computer Can Be Difficult Or Fun Compuer Names Must be Unique –Each.
Microsoft IT Team & Enterprise Collaboration Kimberly Malone Group Program Manager Microsoft IT Collaboration Services.
February 2016 First Remote Access user guide to VPN.
VPN. CONFIDENTIAL Agenda Introduction Types of VPN What are VPN Tokens Types of VPN Tokens RSA How tokens Work How does a user login to VPN using VPN.
Aeries.net. Aeries.net is a web-based application designed to provide students, parents, school staff, and administrators easy access to information without.
Virtual Private Network (VPN) 1. A corporation with multiple geographic sites can use one of two approaches to building a corporate intranet. – Private.
Joe Knight’s Company VPN Policy. What is VPN? Virtual Private Network (VPN) will allow you all as users to remote into the network from home or anywhere.
Virtual Private Networks
Information Protection & Cyber Security
Integrating RSA SecurID into the Check Point Secure Virtual Network
The new dialup procedure requires the use of the EVPN client software to establish an active connection to the Lockheed Martin network. After January 31st,
NDMS AMS Authentication
Self-service enrollment for Windows desktops
Using iLocker.
Providing Teleworker Services
A few points to mention There are two Olympus machines!
Password: (Case sensitive) – #Basic123
Kent County Council Schools Bankline Presentation
Providing Teleworker Services
PGA TOUR Security Update
Providing Teleworker Services
Computer Technology Networks & Internet.
Cengage Learning: Computer Networking from LANs to WANs
Some services available to the citizens
Password Reset and Access Management

This is my sheet And this is my sheet.
Providing Teleworker Services
Contact Details Brand Name : How to Recover Gmail Password Location : California Pin code : Website :
Presentation transcript:

CACI Remote Access CACI has a range of remote access tools for offsite employees who need to connect to resources inside the CACI private network. 2012.01.09

Remote Access Remote Access Methods CACI Application Portal The CACI Intranet Portal https://portal.caci.com Internet + Token CACI Application Portal http://apps.caci.com Corporate Information Systems on My CACI https://my.caci.com/OurTeams/StaffOrgs/CIS Sites & Services Reference Sheet https://www.caci.com/caci-only/onboarding/docs/FUN_card.pdf Your supervisor/co-workers will work with you to determine what types of access you need There will be times that you will need to access CACI work applications and data when you are not in your office. The tools available to you are detailed in the Remote Access Solutions section of CIS@-a-Glance. Notes for Presenter: CACI Application Portal Apps.caci.com VPN – Virtual Private Network Allows users to connect with CACI network from non-CACI locations. Requires a secure token – an electronic device that generates a random number sequence that you use as a code to identify yourself to CACI’s network, a personal passcode and the software loaded on your laptop. You will need one if you routinely travel, work from home or work from government sites.

CACI Remote Access Summary A summary of the solutions available for CACI remote access is available for review.

Accessing CACI Business Systems – Remote Access Remote access to CACI systems requires Active Directory Username and Password (in some cases) Passcode = Your unique PIN and 6-digit SecurID code from your Secure Remote Access token Software Token Key Fob Token New: Remote access to CACI systems is available and requires your Active Directory username and a remote access passcode. The passcode is a combination of a 4 digit pin (created during your first login) and a randomly generated 6 digit code from a secure remote token. The CIS TAC can assist you when remotely connecting to CACI systems. OR

The CACI Intranet Portal https://portal.caci.com jmharvey 1111032848 The CACI Intranet Portal is the preferred secure remote access method Requires a SecurID token and internet access Access to corporate content and applications The CACI Intranet Portal provides secure access to corporate content, applications, resources, and services. To use it you need a Secure ID and PIN and access to the Internet.

Internet + Token Sites accessed with Internet + Token when outside the CACI network Does not require Intranet Portal or VPN client Requires a SecurID token and internet access jmharvey 1111032848 this-is-not-my-password

Need Assistance -> Contact the TAC! Wrap Up & Questions Questions? Need Assistance -> Contact the TAC! 703-679-3200 877-841-7909 cistac@caci.com Welcome to CACI! As a reminder, please feel free to contact the CIS TAC for any questions. Lastly, welcome to CACI!