Secure Remote Access

Expand all

The Risk

To stay competitive, organizations provide their employees, partners, and vendors with around the clock remote access, to corporate sensitive information and resources, from a diverse range of mobile devices (such as tablets and smart phones) and diverse locations.

To safeguard, therefore, the organization’s valuable resources the deployment of a clientless secure remote access solution has become mandatory.  These solutions provide, among other, controls such as granular policies based on the user’s identity and the health of their mobile device,strong user authentication, and encrypted communication between the user and the organization.

Furthermore, organizations not only need to examine how to protect their remote access capability, but also how they can achieve this goal as transparently as possible, avoiding user frustration.

At the same time, a number of information security and privacy regulations, such as PCI Security Standards, are being phased in and toughened. These new realities present organizations with a new set of challenges that have begun to pose a serious dilemma for the deployment of such solutions.

All of the above concerns have raised the issue of secure remote access control to a business imperative.

Protecting your Organization

Designing and deploying an effective secure remote and control access solution to protect the organization’s sensitive information and resources, is an extremely complex and challenging task for any organization. Odyssey has extensive experience and expertise in the implementation and deployment of several secure remote and control access solutions under its belt.

Our approach to deploying a Secure Remote and Control Access solution begins with a detailed examination of your network design and analysis of the services/ information that will be available to mobile users. During the analysis phase, the different types of mobile devices, which will be used by users accessing this information/ resources, will be defined. Going a step further, we will define the different types of user groups having access to different resources and information, the authentication methods that will be used, as well as the authorization criteria for allowing access to such users.

Doing it right: Our Secure Remote Access Solutions’ Key Features and Benefits

Our Secure Remote Access solutions are largely characterized by the following key features and benefits:

Key Features


Easy and secure clientless access to enterprise applications and resources

Provides clientless, secure and encrypted remote access for smart phones, tablets, PCs and laptops without the need of changing existing corporate servers’ configuration

Diverse types of mobile devices supported

Provides users the flexibility to access corporate resources using different types of mobile devices running different types of operating systems

Different user authentication methods supported

User authentication could be implemented either through an internal database or through integration with one of many dynamic authentication methods including Active Directory, RADIUS and LDAP, for providing Single Sign-On (SSO) capabilities. In addition user authentication could be intergraded with token-based authentication using RSA and Vasco

Web-based (clientless) and Network-level SSL-encrypted (on-demand client)

Services and/or resources can be provided to the remote users, even if the applications/resources are not internet/browser friendly

User and device type based resource authorization

User group access polices could be tailored to provide access to specificresources based on the user’s mobile device type and security posture

Any computer personal and/or laptop can be turned into your corporate desktop

Enhanced user productivity by turning any personal computer into your corporate desktop and/or laptop allowing users to securely access organizational resources from any place at any time

Application control within the secure workspace environment

Only pre-approved applications and/or functionality are allowed to run within the secure virtual environment, thus preventing the installation of malicious software. Users attempting to print and/or save documents from applications running within the protected environment could be controlled and audited

Centralized management, flexible policy creation and enforcement, actionable views, event monitoring and reporting

Minimizes compliance workload and reduces administrative costs.

Enables real time monitoring of suspected or actual attacks, generating contextual compliance reports and alerts


Remaining Secure – Support tailored to your needs

We very well understand that to remain effective, a security deployment requires constant monitoring, fine-tuning, updating and maintenance.  These requirements may prove a burden your organization may not be poised to undertake.  We have, therefore, structured our post-deployment services so that you may have the level of support you need, in order to achieve maximum return on your investment, with the least of worries. 

Our suite of post-deployment services range from simple Maintenance and Support, to full-fledged Managed Security & Outsourcing Services.

This solution comprises part of the “Design & Implement” phase of our Information Security Continuum (D&I).