Neoteris Instant Virtual Extranet
February 01, 2003
- Ease of Use:
- Value for Money:
- Overall Rating:
Well documented, easy to install and configure; simple to set up user groups and authentication processes.
The need to reconfigure the firewall may put some off, but it is worth doing to get this appliance in place.
Solid security, secure authentication, replacing the need for a VPN or extranet installation, scaleable and user-friendly for secure remote access.
Hardware located in the main office on your LAN can allow remote workers punctual and user-specific access to work areas that need to remain secure during any remote communication periods. The ability to use this type of access improves productivity and ensures that employees are able to work remotely without compromising your network security.
The Neoteris Instant Virtual Extranet (IVE) Access 3000 is a hardware device designed to provide web-based application when needed, but also to provide employees with email and messaging, file share, etc., as if they were sitting at their desk.
The Neoteris IVE provides a robust level of security and is easy to install. The company information you provide forms the basis for a self-signed digital certificate, or you can import an existing certificate. The IVE can integrate with MS ActiveDirectory, RADIUS servers, or LDAP directories. Alternatively the administrator may use the local user accounts defined through the administrator console to ensure that your users are able to connect via a web browser. One thing that the IVE requires that some units do not is reconfiguration of the firewall, however this isn't too arduous.
Once ready, the IVE acts as an intermediary between your remote users and any internal requests that require authentication. It replaces the traditional VPN and there is no client software to consider. Replacing the need to introduce an extranet, the IVE provides a scalable and cost-effective alternative with secure authenticated access. It also reduces any potential downtime that can occur.
Authentication can be achieved by RADIUS, RSA ACE Windows NT domain or Active Directory, LDAP or UNIX NIS, so there is plenty of choice, and you can utilize policy-based privileges to your authenticated users through user groups while maintaining rules for length of access via filtering techniques. Traffic is also secured via SSL and user authentication is secured using encryption. Timing out sessions is also configurable so an idle session can be terminated too. There is a lot more to this appliance than we are able to cover in a group test, but we'd certainly advocate a serious look against traditional VPN or extranets. It may be something worth considering.
SC Webcasts UK
Information Security Manager
Infosec People - Hammersmith, West London
Information Security Risk Manager, £45-55k + bens
Infosec People - West Midlands, England, Coventry
SOC Analyst, Aldershot, £55-63k + benefits
Infosec People - England, Aldershot, Hampshire
Security Architect, Cardiff - to £70k Basic
Infosec People - Cardiff, Wales
Interim CISO (Chief Information Security Officer) - Cyber Security Director
CYBER EXECS - London (Central), London (Greater)
Sign up to our newsletters
SC Magazine UK Articles
- Gooligan ad fraud malware infects 1.3M Android users, installs over 2M unwanted apps
- Met Police grab suspect with phone unlocked to get hold of data
- Cyber-security must reflect risk not just regulation
- Data centres are on the move - where will they end up?
- The information security implications of M&A deals
- SC Awards Europe 2016 winners announcements!
- ISIS radicalises 'lone wolves' through strong social media presence
- Updated: How will Brexit affect the cyber-security industry in UK and Europe?
- 9.2 million medical records for sale on darkweb
- Microsoft Office 365 hit with massive Cerber ransomware attack, report
- Over 400,000 phishing sites have been detected each month in 2016
- TalkTalk customers urged to get routers swapped over hacker fears
- Report: Mirai 'is just the tip of the iceberg'
- Avalanche takedown involved searches in 40 countries
- India Supreme Court calls on tech giants to curb sexual assault, cyber-crime