Secure Remote Access

The service allows access to the IT infrastructure securely and through a simple Internet browser. Access can be from any fixed or mobile device, without the need to install software packages or activate VPNs. Secure Remote Access (SRA) leverages the Customer’s current IT architecture and is enjoyed through a virtual appliance that can be activated on most hypervisors. The Service manages access from the outside, acting as a gateway, allowing connection to the classic back-end environment.

Overview

Simple and secure access based on 3 key features:

Gateway architecture

  • SRA is based on a simple virtual appliance to be activated in the Customer’s IT perimeter that acts as a gateway using standard protocols (e.g., RDP, CIFS) to communicate with the back-end.
  • Leverages Customer’s current IT architecture by providing access to legacy RDP applications and desktops, file servers, Web sites, Web-base applications

Ease of management and flexibility

  • The minimum configuration consists of a Linux virtual machine (4 vCPU – 4 GB RAM – 80 GB disk) not included in the price list; it must be activated @home or @Deda, leveraging existing (or expanding) IaaS resources.
  • It is available for all major hypervisors and public clouds and is easy to configure and manage
  • The “stackable” architecture allows up to 500 concurrent sessions to be managed; simply add vApps if more users/sessions are needed
  • Makes open APIs available for automation

Secure Access

  • The product uses the Client’s pre-configured user management system: Windows Active Directory or external Identity Provider (IdP)
  • MFA functionality via OTP (e.g., Google Authenticator) is enabled.

Frequent use cases

If the Client application was not built to run as a SaaS service, Secure Remote Access (SRA) provides the way to access your transformation project without changing the code; the application can be hosted at any cloud, public or private.

No installation, self provisioning and ease of use ensure minimal impact for access management on IT teams.

The benefits of Secure Remote Access
1
Integration

The solution uses the customer’s existing architecture and standard protocols

2
Governanceeffective

The virtual appliance fits into the customer’s IT perimeter

3
Flexibility

The solution lends itself to a variety of uses and has open APIs for automation

CONTACTS

We are ready to listen to you. Write to us, we are at your disposal.