SECURE APPLICATION DELIVERY

PROTECT USER ACCOUNTS, KEY APPLICATIONS
AND SENSITIVE CORPORATE AND PERSONAL DATA

SIMPLY AND RELIABLY

Home » Virtual workplace » Secure application delivery

GUARANTEED PROTECTION OF USER ACCOUNTS

Systems for multiple user identification (authentication) have been used for years outside of traditional banking applications. In a time when data and data analytics are becoming an important competitive advantage, it’s no surprise that multi-factor authentication (typically two-factor authentication) is a common security standard to keep the contents of user accounts safe.

JUST A PASSWORD IS NOT ENOUGH. REALLY.

Secure application delivery - multi-factor authentication / two-factor authentication | ORBIT

DO MORE

HOW Multifactor Authentication can help you

RSA SecurID

Bulletproofing your account

Multi-factor authentication uses a combination of several authentication mechanisms, but always relies on simple security logic:

  • What you know – for example, password, PIN…
  • What you have – typically a HW or SW token, a mobile app…
  • Who you are – biometrics (face scan, fingerprint…)

Different combinations entail different organisational and financial requirements. That’s why we help our clients choose the right mix of mechanisms – taking into account the key nature of the provided (web) services, data, applications or desktops.

The widest range of multi-factor authentication options, from HW/SW token to mobile apps (PTA, biometrics), FIDO key, SMS to phone call, is offered by RSA’s RSASecurID® technology, which has been dedicated to secure access for more than 40 years. That is why ORBIT chose it as a partner.

ASG WORKSPACES

One-time password in practice

Typical company information environment? Dozens of apps, hundreds of services and tons of data. Each application has its own login credentials, services are provided from different sources and data is stored in different places. And the user? He must deal with all that…

…or an integration portal providing unified access to cloud services, enterprise virtualized applications, desktops and data will solve the complexity. With ASG Workspaces technology from ASG Technologies, we guarantee clients secure multi-factor single sign on access via a web interface from any device, anytime, anywhere.

PKI CARD

Digital keys not only for doors

PKI (Public Key Infrastructure) is a time-tested and affordable technology for securing digital and physical access. A smart card system with secure access information allows users to enter selected locations (e.g. buildings) or technologies (e.g. internet banking).

PKI cards have been experiencing a renaissance in recent years due to higher levels of security/authentication. We recommend our clients to rely on BlueX tool from AET’s elDManagement tool.

MICROSOFT 365

A modern toolkit with its own security

Microsoft 365 (formerly Office 365) is accessible from anywhere. But this means that it must be secured wherever it is. Multi-factor authentication (tailored to the environment) has thus become an integral part of all modern adoptions of this system.

A variety of secure connection options are available – the free Microsoft Authenticator mobile app, a physical OATH token, SMS or a phone call. We can help you set up Azure Multi-Factor Authentication to protect access to your data and applications within Microsoft 365, wherever you are and on whatever device.

“Based on the need of increasing remote access security, we implemented RSA SecurID technology and the SMS authentication method. The original solution for securing the remote desktop of insurance agents was then extended as a standard technology to secure VPN access for all internal users and external partners of Kooperativa pojišt’ovna, Česká podnikatelská pojišt’ovna, VIG-RE reinsurance and Global Experty.”

Bohumil Kolář
Head of Technical Support Department, Kooperativa pojišt’ovna, a.s., Vienna Insurance Group

Secure Application Delivery - Identity and Access Management | ORBIT

PRACTICAL
IDENTITY AND ACCESS MANAGEMENT

The number of corporate systems, applications and services is growing day by day. Complexity is rampant. And with it, a volume of digital identities with constant proof of identity. Users expect to access all applications and data with a single login. The consequence? Without the Single Sign On portal and automated administration system, your network administrator won’t be able to withstand the risk of error forever.

DO NOT RISK. HELP THE ADMINISTRATORS AND GIVE THE USERS WHAT THEY WANT.

MORE INFORMATION

WHAT ACCESS AND DIGITAL IDENTITY MANAGEMENT CAN DO FOR YOU

PRINCIP SINGLE SIGN ON

One portal, one login
The highly secure Single Sign On (SSO) portal provides a single point of access to your company’s applications and data. Users log in using a proven authentication method only once, without having to fill in their login details again in subsequent applications. It does not matter whether the application is local, terminal, SaaS/Cloud or web-based. With StoreFront, Gateway and Workspace from Citrix, your worries are over.

BlueX eID MANAGEMENT

Digital Identity Lifecycle Management

The BlueX workflow system is the foundation of user identity lifecycle management across applications, services and devices eIDManagement from AET. Its typical scenarios cover all phases of the cycle from the creation of an identity through its monitoring, changes or blocking to its termination and de-registration. The comfort of the administrator does not change whether there are 50 or 50 million identities. The solution significantly reduces the risk of attacks and misuse, a value that can be worth its weight in gold in the digital age.

NECESSARY APPLICATION AND DATA SECURITY

The growing value hidden in enterprise data is an increasingly tempting target for cyber attackers. The myth of the past that a secure network perimeter would protect a company from external threats has ceased to be applied. The progressive webification of applications is forcing companies to deal with the increasingly widespread phenomenon of application layer attacks. Effective protection is provided by the self-learning Citrix Next Generation Firewall.

MAKE SURE YOUR APPS ARE DELIVERED AND SECURE.

Secure Application Delivery - Application and Data Security | ORBIT

MORE INFORMATION

SECURE APPLICATION DELIVERY WITH CITRIX NEXT GENERATION FIREWALL

WEB APPLICATION FIREWALL

The new generation of protection

The Citrix ADC Application Firewall (Next Generation Firewall) does not replace the network firewall, but adds a new level of protection. The self-learning mechanism filters all application communication between the client and server, understands the logic of web applications and thus detects an ongoing attack. At that point, the application is automatically removed from the web server and… the attacker doesn’t see it at all. So your apps stay safe.

LOAD BALANCER

No more outages and unavailability

Much of business today is, by and large, “data driven”. Every minute of unavailability is critical. This brings with it the need to have applications and systems available at all times. The ideal solution for load distribution, maximizing availability and response speed is Load Balancer. In addition to a high level of intelligent protection, Citrix ADC provides you with better web application availability and performance at a reasonable cost.

ANY APPLICATION DELIVERY

Reliable delivery of any application

We live in the age of hybrid IT. The user does not care where the application or system is running on. That’s why it’s important to deliver it to them through one reliable channel, in one consistent way. Citrix ADC delivers your applications and systems whether they run in the public cloud or on-premise, whether they are virtualized or containerized.

Logo Česká spořitelna“By integrating Citrix ADC technology into our existing virtual desktop environment, we were able to ensure the delivery of all applications to our users in a short period of time during the COVID-19 pandemic. And not only on devices under our management, but also on private “BYOD” devices. All this with the same quality as if the user was working from an office or branch office, through all the authentication methods we use and in compliance with all the security requirements, even without the use of a VPN.”

Jakub Adamec
Digital Workplace Designer, Česká spořitelna

ARE YOU CONSIDERING HOW TO COMPREHENSIVELY SECURE THE ENTIRE ENDPOINT?
CITRIX WORKSPACE CAN HELP YOU WITH THE SOLUTION

CITRIX HDX Proprietary protocol

• encrypts the entire data stream
• regardless of the application
• has never been broken

SECURE BROWSER Sandbox Browser

• is hosted in Citrix Cloud
• is not connected to the infrastructure
• is 100% unbreakable

SPYWARE PROTECTION Secure communication

• preventing keystroke capture
• with screen recording
• also for untrusted devices

YOUR BANK ACCOUNT IS PERFECTLY SECURE. HOUSE ALSO.
YOUR WORK ACCOUNT AND APPLICATIONS REQUIRE THE SAME CARE.

DOES SECURE APPLICATION DELIVERY MAKE SENSE TO YOU?

It does to me. And since 2018, I have been helping to protect ORBIT clients’ systems, accounts, applications and data. With the motto “IT for business”, we are constantly looking for ways to apply technology that would be beneficial both for the companies and their employees. We are happy to help you too.

SECURE APPLICATION DELIVERY IS NO LONGER A PRIVILEGE,
BUT A NECESSITY.

Petr ČUDA
Secure Application Delivery Specialist
Petr Čuda | ORBIT

CONTACT ME

    Name *
    Last name *
    E-mail *
    Phone
    Company
    Work position in company
     
    Your message for us *
     *fields marked with an asterisk are mandatory

    RELYING ON SECURE APPLICATION DELIVERY

    logo Zentiva | ORBIT
    logo UPC | ORBIT
    logo HELLA | ORBIT
    logo Czech Aerosol | ORBIT
    logo Marks & Spencer | ORBIT

    Encyklopedie cloudu

    Icon
    Encyklopedie cloudu
    Zavřít

    Cloud encyclopedia

    Icon
    Cloud encyclopedia
    Close
    Loading...