Working from home or remotely
Unencrypted data is easy to intercept online. We install and operate a range of encryption procedures to prevent external access to company data. This also secures the integration of mobile devices.
Our Enterprise Mobility Management is the ideal solution for integration of your smartphones and Windows-based devices. It allows you to keep track of devices, installed apps and versions at any time. You can easily ensure the required compliance through the use of extensive regulations.
Encryption for secure access
As part of our managed security services, we run many installations for our clients.
We provide our managed security services at the client’s premises or in our highly secure data centre with professional operating features and agreed service levels (SLA).
Transport Layer Security (TLS), formerly known as Secure Sockets Layer (SSL), is an encryption protocol for secure data transfer online. This protocol enables set-up of a Virtual Private Network (VPN), allowing secure remote access to company applications or resources. Online traffic via HTTPS (HyperText Transfer Protocol Secure) is encrypted using TLS/SSL.
IPsec is another technical basis for encryption and set-up of a VPN. For different application areas, it may make sense to use TLS/SSL and IPsec. The IPsec standard is on a lower OSI (Open Systems Interconnection) level than SSL and can thus be used irrespective of the application. In addition, there is no need to install another tool on the client that is downloaded when the connection is established.
Secure connections to the company network from mobile or home offices are established using VPN technology (SSL or IPsec). As with VPN, an encrypted communications connection (tunnel) is set up between the remote system and company network, which is used for the secure exchange of data. This allows access to be restricted at the level of ports and IP addresses.
A site-to-site VPN connects entire networks; e.g. between a company’s different locations. Users can then access data from every location, depending on their authorisation. The adjacent graphic shows different kinds of VPN access for use of hosted services.
Authentication is an essential identity check, particularly in the secure connection of mobile or home offices to the company network. Authentication can be performed with the conventional password process or – even better – strong two-factor authentication. A security token ensures that only authorised users gain access.
Secure integration of mobile devices, such as smartphones and tablets, requires special attention in the current climate. Pallas uses various systems for the required Enterprise Mobility Management (EMM) to enable encrypted access to email systems and company data, and to ensure mobile devices are compliant.
Vendors & Certifications
Pioneering products and solutions from the world’s leading vendors
The SonicWall Capture Cloud Platform seamlessly integrates security, management, analytics and real-time threat intelligence across the company’s portfolio of network, email, mobile and cloud security products. This approach enables our complete portfolio of high-performance hardware, virtual appliances and clients to harness the power, agility and scalability of the cloud.
Our products enable you to protect all the endpoints in your network – laptops, virtual desktops, servers, internet and email traffic, and mobile devices. Protection is provided by products tailored to your specific needs. In securing your network, we offer what no one else can: simplicity.
RSA Authentication Manager, available as a hardware or virtual appliance, enables multi-factor authentication with hardware or software token, on-demand authentication via SMS and risk-based authentication – external employees and partners are protected by means of invisible two-factor authentication and behaviour analysis. The entire SecurID environment is administered centrally via a web portal. The solution offers outstanding interoperability: more than 400 tested and documented technology integrations guarantee inclusion in your existing system landscape.
Check Point is a leading provider of cyber security solutions to governments and corporate enterprises globally. Check Point’s solutions protect customers from 5th generation cyber-attacks with an industry leading catch rate of malware, ransomware and advanced targeted threats. Check Point offers a multilevel security architecture, “Infinity Total Protection with Gen V advanced threat prevention”, this combined product architecture defends an enterprises’ cloud, network and mobile devices.