Remote access to your network, applications and data

A solution that provides secure access to Citrix, Remote Desktop, and Web services while bypassing the complexity and security concerns associated with traditional VPNs

G/On - Remote Access Solution

G/On empowers secure remote access. It utilises a Software-Defined Perimeter (SDP) model, establishing personalised connections between users and resources. It prioritises security by avoiding direct device-to-network access.

GOn Page - Security (RED)

Built-in Security

G/On adopts a zero-trust model and robust security measures to safeguard against unauthorised access and cyber threats

GOn Page - Scalability (RED)

Scalability Simplified

As your organisation grows, G/On effortlessly scales without adding complexity.

GOn Page - VPNs (RED)

No More Redundant VPNs

G/On renders traditional VPNs obsolete by providing a more secure and user-centric solution

GOn Page - Access (RED)

True Mobility

G/On empowers your team with seamless, secure access to resources, regardless of location
GOn Page - User Friendly (RED)

User-Friendly Management

G/On's interface is intuitive, simplifying user management and administrative tasks
GOn Page - Implementation (RED)

Swift Implementation

G/On ensures rapid integration, allowing for quick deployment without complications

Effortless Integration

Bridge the gap between on-site control and modern remote work requirements. G/On’s zero-trust model not only ensures secure access but also robustly shields on-premises resources from unauthorized usage and data breaches.

Experience a straightforward and efficient remote work environment that connects seamlessly to your on-premises resources.

Welcome simplicity and cost-effectiveness. Transparent pricing and an all-encompassing solution ensure you achieve peak efficiency without pressuring your budget.


The G/On Advantage

G/On is a unified solution, custom-designed to address the unique challenges within specific industry sectors. It streamlines remote access management while maintaining a high level of security. It bolsters compliance adherence by aligning with industry regulations, strengthening user authentication, and enhancing endpoint security through isolation techniques. Additionally, it effectively minimises risks associated with third-party interactions by establishing secure connections.

The G/On Security Model

G/On's security model embraces the understanding that potential adversaries possess in-depth knowledge of systems. It employs cryptographic techniques and logical reasoning to fortify central services, ensuring reliable security properties.

1 Application-Level Proxy

Application-Level Proxy

G/On expands its security coverage by offering specialised support for RDP, ICA, and HTTP(S) protocols. Through deep protocol inspection, G/On enforces proper protocol usage, guarding against attacks on server vulnerabilities.
2 Server Network Isolation

Server Network Isolation

By utilising a proxy-based approach, G/On prevents external programs from establishing direct connections to internal services. The Gateway server(s) regulates allowable connections, bolstering security against potential attacks.

3 Two-Factor Authentication

Two-Factor Authentication

G/On enforces two-factor authentication to counter password vulnerabilities. The combination of factors strengthens security, while the server refrains from revealing which factor failed, ensuring protection against targeted attacks.

4 Strict Access Policies

Strict Access Policies

Services within the security perimeter are tightly controlled by access policies. These policies, whether tied to user groups in a directory or set within G/On, are rigorously enforced by the Gateway server(s), enhancing security.

5 Simplicity & Transparency

Simplicity & Transparency

The G/On model maintains a simple network architecture, reinforcing its security properties. Access to services is exclusively routed through the G/On Gateway server(s), creating a clear and secure pathway

G/On Technical Specifications

Get the in-depth technical specifications by clicking the button below

Software-Defined Perimeter

Software-Defined Perimeter (SDP) relies on two fundamental principles:

  • The first pillar is Identity-Centric Design, which places a primary focus on user identity and authorisation levels. This approach marks a shift from the conventional device-centric perspective to a more user-centric one.
  • The second pillar is built on Zero-Trust Principles, incorporating the concept of least privilege. This minimises the potential attack surface and enhances the visibility of IT teams.


Non-Intrusive Security

G/On is built on a non-intrusive basis. It protects corporate data without invasive software while respecting device owner privacy.

In the context of hybrid work scenarios, Bring Your Own Device (BYOD) policies, and third-party access, these non-intrusive security measures come into play. They offer protection for corporate data without the need for invasive software installation, respecting the privacy of device owners.

Additionally, these measures effectively segregate sensitive data, facilitating secure third-party access while maintaining the overall security of the data.

Remote working

Enhanced Remote Work with G/On and Citrix

While Citrix may seem like a comprehensive solution, its original design as a Presentation Server was not intended for remote work. Consequently, Citrix demands a complex and costly remote access layer in the form of one or more Citrix Gateways, along with a separate 2-factor authentication solution, to facilitate secure remote operations.

Enter G/On —your facilitator for seamless Citrix integration. G/On eliminates the necessity for an additional remote access layer by directly integrating with Citrix Virtual Delivery Agents (VDA’s) and directly presenting all accessible Citrix applications in the G/On menu – without the need for Citrix Gateways. Users can swiftly connect to Citrix applications, enjoying unparalleled smart card security and unprecedented speed. Furthermore, once logged in, users won’t need to re-authenticate throughout the working day, as long as the smart card remains inserted in the computer. Simply removing the G/On smart card token disconnects all Citrix applications, with the ease of reconnection available for users at any subsequent time.


Addressing the Needs of Modern Organisations

Authenticate user access to remote applications on a zero trust basis

Flexible Authentication in G/On

Authenticate user access to remote applications on a zero trust basis - with all of the flexibility you need.

Often, organisations need help providing appropriate access to their various users who require different levels of authentication, which results in security risks or access restrictions that hinder productivity. T he answer is clear: introduce a flexible relationship between authentication and authorisation. With this approach, you can now use multiple authentication factors to determine the authorisation level providing greater security and ease of access.

Unlocking Secure Access Across Multiple Industries 

Supporting the challenges of remote work, countering emerging cyber threats and safeguarding data

GOn Page - User Friendly (RED)

Public Sector

Managing large-scale deployments on many devices across multiple locations is a challenge. How do you ensure employees have the right access levels to sensitive information and adhere to regulatory standards like GDPR? All this must be accomplished within the constraints of budget limitations and legacy systems, which can impede the adoption of cost-effective remote work solutions.

GOn Page - Finance (RED)

Finance Sector

Remote work comes with risks that require smart security measures. Home networks and personal devices need special attention to keep data safe. Collaborating with partners can expose vulnerabilities in shared tech while managing customer data requires clear rules and limited access. 
GOn Page - Healthcare (RED)


Patient data is a hot target for cybercriminals, with ransomware and data breaches on the rise. The problem is many healthcare organisations rely on outdated systems due to tight budgets, making them easy prey for bad actors. These breaches didn't just cause security concerns; they hit financially, costing an average of $10.1 million

Contact us for more information