Zero-trust remote access solution for secure hybrid working

Zero-trust remote access solution for secure hybrid working - image by Franz Bachinger on Pixabay

Share post

The new LANCOM Trusted Access Client enables secure and scalable network access for employees in the office, at home or on the go, thereby protecting modern hybrid working from anywhere and at any time.

Through complete integration into the LANCOM Management Cloud, commissioning and configuration are “zero-touch” for easy and quick rollout of new remote access connections. The LANCOM Trusted Access solution dynamically adapts to increasing security requirements.

Zero trust from SMEs to enterprises

LANCOM Trusted Access supports both classic full network access as a VPN client as well as the migration to a zero trust security architecture with comprehensive network security - for small commercial businesses through to large enterprise customers. Up to 3 devices are supported per network participant.

Granular access control based on the zero trust principle

By granting access according to the zero trust principle of “as much as necessary, as little as possible”, the LANCOM Trusted Access Client protects networks from threats and their spread. This means: No blind trust based on successful network access. The LTA client verifies each user and only grants access to dedicated applications activated for a user group. This minimizes attack opportunities and prevents lateral spread of security threats in the network.

Use as a cloud-managed VPN client

For full access to a network, the LANCOM Trusted Access Client can also be used as a cloud-managed VPN client in order to securely and centrally manage the VPN connections of mobile employees.

Cloud management

In all operating modes, security profiles, client configuration and monitoring are rolled out via the LANCOM Management Cloud, which acts as a central point and centrally manages all LANCOM network components. Configuration changes can be made easily and efficiently and new users can be easily added or removed without the IT administrator and end device having to be physically on site. This practical administration paired with transparent user monitoring via the LANCOM Management Cloud reduces operating costs because all clients in the network are centrally accessible and accessible at a glance.

Integration of existing user databases

Network user authentication occurs via a central user database (“Identity Provider”, for example an Active Directory such as Microsoft Entra ID, formerly Azure AD). Alternatively, user management integrated into the LANCOM Management Cloud is available for smaller companies without a central user database.

Endpoint security and multi-factor authentication

Before a user is granted access, endpoint security can also be checked in terms of operating system version, virus protection and local firewall. Each user must also have their identity verified and have strong authentication before gaining access to an application or resource. Applications and resources are not exposed across the network, keeping the network invisible to attackers. In addition, two-factor or multi-factor authentication with fingerprint, facial recognition or an authentication app on the smartphone may be required when logging in.

Complete integration into the LANCOM Management Cloud

The LANCOM Management Cloud offers fully integrated management of all LANCOM network components (routers / gateways, firewalls, switches and access points) including the LANCOM Trusted Access Client. The management of the underlying security policies for all users in the network is also carried out centrally via the LMC. A LANCOM Trusted Access Real-Time Dashboard is available to administrators for comprehensive diagnostics and troubleshooting.

100% digital sovereignty, 100% GDPR compliant

The LANCOM Trusted Access Client and the LANCOM Management Cloud are developed in Germany, and all cloud data is hosted in local data centers. Only the data exchange for user authentication takes place via the LANCOM Management Cloud; all other user data runs directly between the LANCOM Trusted Access Client and LANCOM Trusted Access Gateway - without being decoupled via an external cloud. The LANCOM Trusted Access Client therefore stands for the highest level of data security and data protection. It is subject to and complies with European legal standards, is therefore GDPR-compliant and an IT security solution “Made in Germany”.

More at Lancom-Systems.de

 


About LANCOM Systems

LANCOM Systems GmbH is a leading European manufacturer of network and security solutions for business and administration. The portfolio includes hardware (WAN, LAN, WLAN, firewalls), virtual network components and cloud-based software-defined networking (SDN). Software and hardware development as well as production take place mainly in Germany, as is the hosting of the network management. Particular attention is paid to trustworthiness and security. The company has committed itself to ensuring that its products are free from backdoors and is the bearer of the “IT Security Made in Germany” quality mark initiated by the Federal Ministry of Economics.


 

Matching articles on the topic

Cybersecurity platform with protection for 5G environments

Cybersecurity specialist Trend Micro unveils its platform-based approach to protecting organizations' ever-expanding attack surface, including securing ➡ Read more

Data manipulation, the underestimated danger

Every year, World Backup Day on March 31st serves as a reminder of the importance of up-to-date and easily accessible backups ➡ Read more

Printers as a security risk

Corporate printer fleets are increasingly becoming a blind spot and pose enormous problems for their efficiency and security. ➡ Read more

The AI ​​Act and its consequences for data protection

With the AI ​​Act, the first law for AI has been approved and gives manufacturers of AI applications between six months and ➡ Read more

Windows operating systems: Almost two million computers at risk

There are no longer any updates for the Windows 7 and 8 operating systems. This means open security gaps and therefore worthwhile and ➡ Read more

AI on Enterprise Storage fights ransomware in real time

NetApp is one of the first to integrate artificial intelligence (AI) and machine learning (ML) directly into primary storage to combat ransomware ➡ Read more

DSPM product suite for Zero Trust Data Security

Data Security Posture Management – ​​DSPM for short – is crucial for companies to ensure cyber resilience against the multitude ➡ Read more

Data encryption: More security on cloud platforms

Online platforms are often the target of cyberattacks, such as Trello recently. 5 tips ensure more effective data encryption in the cloud ➡ Read more