Download presentation
Presentation is loading. Please wait.
Published byJonah Randolf Rice Modified over 9 years ago
1
The Right Access for the Right People to the Right Applications under the Right Circumstances.
2
Vad är det vi vill göra? Secure Access - from everywhere
3
From user... to application
4
Firewall/Perimeter Internet My PC in the office Terminal Server Citrix Application Server
5
IN PRACTICE G/On
6
G/On in practice – USB Token 1.Insert your G/On USB Token into your Windows, Mac or Linux PC 2.Start G/On by clicking on the G/On icon
7
G/On in practice Mutual verification Are you one of my G/On clients? Am I talking to the right Server?
8
G/On in practice 3.Log in with your normal user ID and password
9
G/On in practice 4.Your personal menu is made available with the specific applications you have access to.
10
G/On - Peace of mind 5.Work with a peace of mind. You know you are accepted. You know the connections are encrypted. You know you have the right applications. And...
11
Nothing is left behind…
12
G/On in practice - iPad 1.Navigate to your G/On Client for iPad 2.Start G/On by tapping the G/On icon
13
G/On in practice Mutual verification Are you one of my G/On clients? Am I talking to the right Server?
14
G/On in practice 3.Log in with your normal user ID and password
15
G/On in practice 4.Your personal menu is made available with the specific applications you have access to.
16
G/On - Peace of mind 5.Work with a peace of mind. You know you are accepted. You know the connections are encrypted. You know you have the right applications. And...
17
Nothing is left behind…
18
SOLUTIONS G/On
19
Solutions Working from home Use the keyboard and the screen of your PC at home to work directly on your office PC.
20
Solutions Work when you travel Use any PC, a laptop you bring along, or your iPad
21
Solutions Get the job done... On the spot Use your iPad to enter the sales order, job order, report the completion of your job, or read your mail and calendar.
22
Solutions For external contractors, remote offices, partners... They use their own PC or iPad to get access to the specific applications you decide.
23
Solutions For all employees Bringing their own favorite device
24
THE INFRASTRUCTURE G/On
25
Get away from this…
26
…and use this Contrary to VPN and LAN access, G/On does not create network level access for the user and the physical device. Internet Firewall Application servers
27
0000 0000 00/00 What is your personal device?
28
Two-factor authentication… …you hold the ”keys” in your hand…...and you know your user ID and your password.
29
Multiple platforms
30
Multiple devices
31
BENEFITS AND VALUE G/On
32
Benefits and value Increase user satisfaction and productivity Get a simplified, uniform, and transparent security model Maximize business agility Lower the cost of ownership Prepare for the future
33
LICENSE MODEL AND SUPPORT G/On
34
License model UAL =User Access Licens TAL = Token Access Licens Token Client Features Server Features
35
Giritech Technical Support
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.