Zero Trust Network Access

ZTNA taken one step further: ZTRA – Zero Trust Remote Access

Where, when and how people work today has not only changed dramatically since the corona pandemic. In the past, the distinction between professional and private life was much easier, today the transitions are very often fluid.

In the early days of IT, there were far fewer options when it came to handling applications and data. There was the central computer on which the applications were installed and the data was stored. Access was via a keyboard and a stupid terminal, no connection to the outside world. To put it bluntly, a padlock is enough to protect applications and data.

With the PC workstation, servers and internet access, data protection has become much more complicated, and it has been reinforced by the risk factor internet. Suddenly, in addition to possible data leaks (e.g. data theft by employees), there was also the risk that data could actually be “extracted” via the Internet.

The maximum challenge is now posed by modern end devices (notebooks, tablets, smartphones), the outsourcing of applications and data to the cloud and new forms of work such as home office and mobile work.

Traditionally, companies react to changed requirements such as the home office by purchasing their own laptops or tablets (expensive) and setting up additional VPN access (complex, high support effort). The spiral of costs continues unchecked.

Scroll down

ZTNA and ZTRA much cheaper and easier

Leave the data where it can be better “guarded” – in the company or in a cloud environment that can be controlled by the company. This also makes the implementation of the GDPR requirements easier.

Then you use SparkView in the company to be able to access the applications and data, because SparkView works in principle like a terminal in the browser, i.e. the application to be operated is on the target system and the data remains there. No additional software has to be installed on the user’s end device, nor on the target systems.

Only keyboard and mouse inputs are sent from the client, and the screen content is then transferred to the user’s browser. The computing power is done by the target system, e.g. a Windows desktop or server. The data remains on the company’s server.

In addition to a significantly lower bandwidth requirement, this also means that much cheaper end devices can be used, e.g. Chromebooks or tablets.

The argument that the user in the home office needs his own computer with VPN access for data protection reasons does not apply either. Because what happens if you give your employees notebooks to take home so that they can dial into the company infrastructure via VPN? You get full access to all network resources and thus all data – target missed. Notebook gone = data leak!

Additional security through two-factor authentication

Hacker attacks are becoming more and more commonplace and also more intelligent, and it is not just large companies that are attacked on a daily basis.

Usernames and passwords alone are no longer enough to effectively protect your company from such attacks.

The two-factor authentication significantly improves the security against attacks, because in addition to what you know (user name, password) you also need another component (e.g. a smartphone) to get access to your company resources.

In principle, it works like paying by credit card. You can only take the “goods” with you if you have a card and know the PIN.

It is therefore essential that you add two-factor authentication to the login process for security.

With ConeXa, we offer you a solution that is installed and supported on site, thereby ensuring full control of the company over all important components for secure remote access. Of course, ConeXa works harmoniously with SparkView.

Both solutions together form the core of our Zero Trust Remote Access offer.

If you are already using or want another 2FA solution, SparkView can also be integrated there.

Scroll down

Contact us