A solution that provides secure access to Citrix, Remote Desktop, and Web services while bypassing the complexity and security concerns associated with traditional VPNs
G/On empowers secure remote access. It utilises a Software-Defined Perimeter (SDP) model, establishing personalised connections between users and resources. It prioritises security by avoiding direct device-to-network access.
G/On adopts a zero-trust model and robust security measures to safeguard against unauthorised access and cyber threats
As your organisation grows, G/On effortlessly scales without adding complexity.
G/On renders traditional VPNs obsolete by providing a more secure and user-centric solution
Bridge the gap between on-site control and modern remote work requirements. G/On’s zero-trust model not only ensures secure access but also robustly shields on-premises resources from unauthorized usage and data breaches.
Experience a straightforward and efficient remote work environment that connects seamlessly to your on-premises resources.
Welcome simplicity and cost-effectiveness. Transparent pricing and an all-encompassing solution ensure you achieve peak efficiency without pressuring your budget.
G/On is a unified solution, custom-designed to address the unique challenges within specific industry sectors. It streamlines remote access management while maintaining a high level of security. It bolsters compliance adherence by aligning with industry regulations, strengthening user authentication, and enhancing endpoint security through isolation techniques. Additionally, it effectively minimises risks associated with third-party interactions by establishing secure connections.
G/On's security model embraces the understanding that potential adversaries possess in-depth knowledge of systems. It employs cryptographic techniques and logical reasoning to fortify central services, ensuring reliable security properties.
By utilising a proxy-based approach, G/On prevents external programs from establishing direct connections to internal services. The Gateway server(s) regulates allowable connections, bolstering security against potential attacks.
G/On enforces two-factor authentication to counter password vulnerabilities. The combination of factors strengthens security, while the server refrains from revealing which factor failed, ensuring protection against targeted attacks.
Services within the security perimeter are tightly controlled by access policies. These policies, whether tied to user groups in a directory or set within G/On, are rigorously enforced by the Gateway server(s), enhancing security.
The G/On model maintains a simple network architecture, reinforcing its security properties. Access to services is exclusively routed through the G/On Gateway server(s), creating a clear and secure pathway
Software-Defined Perimeter (SDP) relies on two fundamental principles:
G/On is built on a non-intrusive basis. It protects corporate data without invasive software while respecting device owner privacy.
In the context of hybrid work scenarios, Bring Your Own Device (BYOD) policies, and third-party access, these non-intrusive security measures come into play. They offer protection for corporate data without the need for invasive software installation, respecting the privacy of device owners.
Additionally, these measures effectively segregate sensitive data, facilitating secure third-party access while maintaining the overall security of the data.
While Citrix may seem like a comprehensive solution, its original design as a Presentation Server was not intended for remote work. Consequently, Citrix demands a complex and costly remote access layer in the form of one or more Citrix Gateways, along with a separate 2-factor authentication solution, to facilitate secure remote operations.
Enter G/On —your facilitator for seamless Citrix integration. G/On eliminates the necessity for an additional remote access layer by directly integrating with Citrix Virtual Delivery Agents (VDA’s) and directly presenting all accessible Citrix applications in the G/On menu – without the need for Citrix Gateways. Users can swiftly connect to Citrix applications, enjoying unparalleled smart card security and unprecedented speed. Furthermore, once logged in, users won’t need to re-authenticate throughout the working day, as long as the smart card remains inserted in the computer. Simply removing the G/On smart card token disconnects all Citrix applications, with the ease of reconnection available for users at any subsequent time.
Authenticate user access to remote applications on a zero trust basis
Authenticate user access to remote applications on a zero trust basis - with all of the flexibility you need.
Often, organisations need help providing appropriate access to their various users who require different levels of authentication, which results in security risks or access restrictions that hinder productivity. T he answer is clear: introduce a flexible relationship between authentication and authorisation. With this approach, you can now use multiple authentication factors to determine the authorisation level providing greater security and ease of access.
Supporting the challenges of remote work, countering emerging cyber threats and safeguarding data
Managing large-scale deployments on many devices across multiple locations is a challenge. How do you ensure employees have the right access levels to sensitive information and adhere to regulatory standards like GDPR? All this must be accomplished within the constraints of budget limitations and legacy systems, which can impede the adoption of cost-effective remote work solutions.