SECURE REMOTE VPN ACCESS
Enable controlled access to your network from anywhere on the Internet
Put simply, a Secure Remote VPN Access (also sometimes referred to as Internet VPN) provides a secure, private connection between two devices. It’s the ideal way to extend your private network across the internet to a remote site or branch office or to provide staff, partners or suppliers with secure and controlled access to information or applications located on your network.
No matter how sensitive your data, Secure Remote VPN Access can solve most potential security issues through a combination of encryption and tunnelling functions. What’s more, it’s got great flexibility and works with our Broadband Cable Modem, DSL and Leased Line Managed Internet Access connections.
The security provided by Secure Remote VPN Access is not mutually exclusive from our Managed Authentication Service and often deployed at same time to ensure a secure connection and the positive identity of end users.
We use award-winning Palo Alto technology to deliver our Secure Remote VPN Access services. Set up is simple. We supply, configure and install a secure access device - at your head office or data centre and at the remote access sites you want to securely connect. Remote workers simply receive a software client (program) to establish a secure connection to your head office.
Get in touch
Discuss your needs with our dedicated team
Benefits of secure remote VPN access
Reduce costs
A single Secure Remote VPN Access solution can be implemented to manage multiple solutions for various scenarios
Bespoke design and 24/7 management
We work with you to design and install the service and management is run by a team of committed security specialists with over a decade of experience in providing information security services
Minimise disaster disruption
In the event of a disaster, our Secure Remote VPN Access solution can support the rapid and remote relocation of your people, to make sure your business doesn’t miss a beat
Access detailed records
We provide detailed auditing records to facilitate security reviews and regulatory compliance
Award-winning hardware
We employ industry-leading, award-winning Palo Alto integrated security technology to deliver our Secure Remote VPN Access services
Comprehensive SLA for connectivity and security
We act as a single service provider for both your connectivity and security, ensuring tightly integrated solutions and a single point of responsibility
Increased ROI
An effective security solution significantly reduces threats, and as a result, can decrease downtime, lost business and reduce the need to employ skilled security specialists
The techie bit
Secure Remote Access VPN
VPN type
Secure Remote VPN Access security for connecting users on laptops, smartphones and tablets
Device
Various end user devices supported
Software
GlobalProtect™ network security client for endpoints, from Palo Alto Networks®
Installation
Plug and play - no additional software or hardware installation
Authentication
Can be integrated in to existing authentication systems and our Managed Authentication Service to provide strong end user authentication
Encryption
Edge to Client
User constituency
Anytime, anywhere access for employees, remote workers, contractors, suppliers, customers, business partners
Reporting
GlobalProtect automatically establishes a connection to the head office thus providing visibility of all network traffic, for applications, and across all ports and protocols for each user
Scalability
Easily deployed and highly scalable to support thousands of remote workers
Site-to-site VPN
VPN type
Secure Remote VPN Access for site-to-site connections
Device
Secure access device at each site provides an always-on VPN connection that is transparent to the end user
Software
No additional software needed
Installation
Simply connect two devices. Requires your software or hardware
Authentication
Two-way authentication using digital certificates to ensure high levels of authentication
Encryption
Edge to Edge
User constituency
Limited to a predefined and controlled user base; internal and site-to-site communications
Reporting
Full visibility of all network traffic for all applications, and across all ports and protocols for each nailed up site-to-site VPN
Scalability
Scales to support multiple site-to-site VPNs