When it comes to remote access security, there are several options available to consider. Your ATS account representative can help you identify which of these solutions might work best for you:
Virtual Private Network (VPN) – Companies can utilize a VPN as a means to provide remote offices or users with secure access to their networks through Layer Two Tunneling Protocol (L2TP) which is a private, encrypted tunnel from the outside into the network. This tunnel is created over public IP lines. Another type of VPN to consider is a secure sockets layer (SSL) VPN. The SSL VPN uses a web browser to create that private tunnel so no specialized software needs to be downloaded on the client’s device.
Network Access Control (NAC) – NAC is a complement to the VPN. A NAC product reviews all users attempting to access the network and verifies the genuine user. NACs also review the user’s system security to ensure they are compliant with the company’s security policy before allowing that user to access the network.
User Authentication/Key Fob – A key fob is a token device that enforces two-factor authentication for remote users.
Encryption – Utilizing encryption technologies on laptops and mobile devices can ensure the data is useless should the device fall into the wrong hands.