VPN & mobile security

Unencrypted data on the internet is easy to intercept. We install and operate a variety of encryption procedures to allow external access to company data. In this way, even connections to mobile devices can be secured.

Connect to work securely, any time, anywhere

A secure network connection any time and anywhere is the big challenge for mobile work and integration of remote offices, particularly in COVID-19 times.

Contact

*Mandatory field
*Mandatory field

Benefits

Secure

Cutting-edge encryption technologies

High-performance

High-performance solutions that make the most of existing connections

Stable

Needs-based solutions all the way to high-availability solutions

Pallas encryption procedures

We render our services with professional operating standards and agreed service levels (SLA)

Transport layer security (TLS), formerly called secure sockets layer (SSL), is an encryption protocol for secure data transfer over the Internet. This protocol allows a virtual private network (VPN) to be established that enables secure remote access to company applications or resources. Web traffic via HTTPS (hypertext transfer protocol secure) is encrypted using TLS/SSL.

IPsec is another technical basis for encrypting and setting up a VPN. For some applications, it may well make sense to use both TLS/SSL and IPsec. IPsec is a standard on a deeper OSI level (open systems interconnection) than SSL and can be implemented more independently of the application. Plus, no other tool needs to be installed on the client and downloaded before setting up the connection.

Mobile or home workplaces are securely connected to the company network using VPN technology (SSL or IPsec). As with VPN, an encrypted communication channel (tunnel) is set up between the remote system and the company network. Data can be securely transferred through this channel. Access can be restricted on the level of ports and IP addresses.

In a site-to-site VPN, whole networks are coupled to each other, e.g. the different locations of a company. Users can access data at all locations, depending on their rights.

Authentication as identity verification is indispensable, especially for secure connection of mobile or home workplaces to the company network. Authentication can be done using conventional password procedures or better still using what is known as strong two-factor authentication. Here, a security token guarantees that only authorised users obtain access.

Secure integration of mobile devices like smartphones, pads, and tablets calls for particular attention these days. Pallas uses various systems for necessary mobile device management (MDM), to enable encrypted access to email systems and company data and to keep mobile devices compliant.

Vendors & Certifications

Pioneering products and solutions from the world’s leading vendors

Checkpoint
Checkpoint

Check Point

Check Point is a leading provider of cyber security solutions to governments and corporate enterprises globally. Check Point’s solutions protect customers from 5th generation cyber-attacks with an industry leading catch rate of malware, ransomware and advanced targeted threats. Check Point offers a multilevel security architecture, “Infinity Total Protection with Gen V advanced threat prevention”, this combined product architecture defends an enterprises’ cloud, network and mobile devices.

We also provide

The following services might also be of interest to you

3protect

Kontakt

*Pflichtfeld

Contact

*Mandatory

Contact

*Mandatory field

Download

Thank you for your interest!

You can download the product sheet by clicking the button below.

Kontakt

*Pflichtfeld

Contact

*Mandatory field

Contact

*Mandatory field