How to Enable Secure Remote Access, Without Opening Ports for RDP

Many companies need to allow users to access their internal company desktop computers from external locations. A common approach is to open ports in the firewall, enabling inbound RDP traffic.…

Read the article

7 Problems to Tackle with Any Remote Access Solution

In 2020 when the world’s largest automotive manufacturer needed an extra 12,000 additional users of remote access, doing anything normal went out of the window.

Read the article

How to Future Proof Your Secure Remote Working Strategies

Category: Remote access security / Date: 13 October 2020

Once upon a time, we all used company-owned devices for work. These were connected to the network and managed by IT. But the world has changed. More of us than ever before are remote workers — and we…

Read the article

Remote working without VPN

Category: Remote access security / Date: 16 April 2020

When it comes to home and remote working, as a default many companies implement a VPN strategy in the belief that this a totally secure solution for network security when remote access is required.…

Read the article

The modern-proof alternative to MAC address filtering

Category: IT Security / Date: 19 March 2020

When you’re an IT manager, you’ve probably heard of MAC address filtering. Today, many organisations still use it to manage IT access, by letting in all whitelisted MAC addresses while keeping out…

Read the article

Digital certificates- the most important NAC feature explained

Category: network access control / Date: 20 February 2020

When talking about Network Access Control, we often mention digital certificates. When entering a company network, they’re like the passport that proofs you’re a trusted user using a trusted device.…

Read the article

The fall of Mobile Device Management and the rise of the app container

Category: IT Security / Date: 16 January 2020

When I talk to IT managers, we often discuss the grip they lack. Co-workers run around with privately owned laptops and phones, that differ in operating system, update pace and settings. IT managers…

Read the article

Don’t trust the fort! The zero-trust model explained

Category: Remote access security / Date: 19 December 2019

As a rule, remote workers and their devices can’t be trusted. You simply can’t know who’s on the other side or what network they’re on. This is why we always recommend to not use VPN, as this creates…

Read the article

What is Remote Access Control? (No, it’s not a stupid question)

Category: IT Security / Date: 14 November 2019

Many people understand the concept of remote access. It’s working without being physically present at the office, right? Well yeah, sort of. But if you’re responsible for securing this remote access,…

Read the article

This is how you make remote access work [5 focus points]

Category: IT Security / Date: 17 October 2019

So your employees want to work from home. Great! Remote workers have the potential to deliver great work in less time, without occupying all of your company computers and eating all the granola bars…

Read the article
Page 1 of 3
1 2 3