BEZPEČNÉ DORUČOVÁNÍ APLIKACÍ

CHRAŇTE UŽIVATELSKÉ ÚČTY, KLÍČOVÉ APLIKACE
I CITLIVÁ FIREMNÍ A OSOBNÍ DATA

JEDNODUŠE A SPOLEHLIVĚ

Home » Secure application delivery

ZARUČENÁ OCHRANA UŽIVATELSKÝCH ÚČTŮ

Systems for multiple user identification (authentication) have been used for years outside of traditional banking applications. At a time when data and data analytics are becoming an important competitive advantage, it’s no surprise that multi-factor authentication (typically two-factor authentication) is a common security standard to keep the contents of user accounts safe.

JEN HESLO NESTAČÍ. OPRAVDU.

Bezpečné doručování aplikací – multifaktorová autentizace / dvoufaktorové ověření | ORBIT

DO MORE

JAK VÁM POMŮŽE VÍCEFAKTOROVÁ AUTENTIZACE

RSA SecurID

Bulletproofing your account

Multi-factor authentication uses a combination of several authentication mechanisms, but always relies on simple security logic:

  • What you know – for example, password, PIN…
  • What you have – typically a HW or SW token, a mobile app…
  • Who you are – biometrics (face scan, fingerprint…)

Different combinations entail different organisational and financial requirements. That’s why we help our clients choose the right mix of mechanisms – taking into account the key nature of the provided (web) services, data, applications or desktops.

The widest range of multi-factor authentication options, from HW/SW token to mobile apps (PTA, biometrics), FIDO key, SMS to phone call, is offered by RSA’s RSASecurID® technology, which has been dedicated to secure access for more than 40 years. That is why ORBIT chose her as a partner.

ASG WORKSPACES

One-time.password in practice

Typical company information environment? Dozens of apps, hundreds of services and tons of data. Each application has its own login credentials, services are provided from different sources and data is stored in different places. And the user? He’s just got to get by…

…or an integration portal providing unified access to cloud services, enterprise virtualized applications, desktops and data will solve the complexity. With ASG Workspacestechnology fromASG Technologies, we guarantee clients secure multi-factor single sign on accessvia a web interface from any device, anytime, anywhere.

PKI CARD

Digital keys not onlyfor doors

PKI(Public Key Infrastructure) is a time-tested and affordable technology for securing digital and physical access. A smart card system with secure access information allows users to enter selected locations (e.g. buildings) or technologies (e.g. internet banking).

PKI cards are experiencing a renaissance in recent years due to higher levels of security/authentication. We recommend our clients to rely on BlueXtool from AET’s elDManagementtool.

MICROSOFT 365

A modern toolkit withits own security

Microsoft 365(formerly Office 365) is accessible from anywhere. But this means that it must be secured wherever it is. Multi-factor authentication (tailored to the environment) has thus become an integral part of all modern adoptions of this system.

A variety of secure connection options are available – the free Microsoft Authenticator mobile app, a physical OATH token, SMS or a phone call. We can help you set up AzureMulti-Factor Authentication to protect access to your data and applications within Microsoft 365, wherever you are and on whatever device.

„As part of the need to increase remote access security, we implemented RSA SecurID technology and the SMS authentication method. The original solution for securing the remote desktop of insurance agents was then extended as a standard technology to secure VPN access for all internal users and external partners of Kooperativa pojišt’ovna, Česká podnikatelská pojišt’ovna, VIG-RE reinsurance and Global Experty.“

Bohumil Kolář
Head of Technical Support Department, Kooperativa pojišt’ovna, a.s., Vienna Insurance Group

Bezpečné doručování aplikací – správa identit a přístupů | ORBIT

PRAKTICKÁ
SPRÁVA IDENTIT A PŘÍSTUPŮ

The number of corporate systems, applications and services is growing day by day. Complexity is rampant. And with it, a multitude of digital identities with constant proof of identity. Users expect to access all applications and data with a single login. The consequence? Without the Single Sign On portal and automated administration system, your network administrator won’t be able to withstand the risk of error forever.

NERISKUJTE. POMOZTE SPRÁVCŮM A DEJTE UŽIVATELŮM, CO CHTĚJÍ.

MORE INFORMATION

CO VÁM PŘINESE SPRÁVA PŘÍSTUPU A DIGITÁLNÍ IDENTITY

PRINCIP SINGLE SIGN ON

One portal, one login
The highly secure Single Sign On (SSO) portal provides a single point of access to your company’s applications and data. Users log in using a proven authentication method only once, without having to fill in their login details again in subsequent applications. It does not matter whether the application is local, terminal, SaaS/Cloud or web-based. With StoreFront, Gateway and Workspace from Citrix, your worries are over.

BlueX eID MANAGEMENT

Digital Identity Lifecycle Management

The BlueX workflow system is the foundation of user identity lifecycle management across applications, services and devices eIDManagement from AET. Its typical scenarios cover all phases of the cycle from the creation of an identity through its monitoring, changes or blocking to its termination and de-registration. The comfort of the administrator does not change whether there are 50 or 50 million identities. The solution significantly reduces the risk of attacks and misuse, a value that can be worth its weight in gold in the digital age.

NEZBYTNÉ ZABEZPEČENÍ APLIKACÍ A DAT

The growing value hidden in enterprise data is an increasingly tempting target for cyber attackers. The myth of the past that a secure network perimeter would protect a company from external threats has fallen. The progressive webification of applications is forcing companies to deal with the increasingly widespread phenomenon of application layer attacks. Effective protection is provided by the self-learning Citrix Next Generation Firewall.

NA DORUČOVÁNÍ A ZABEZPEČENÍ APLIKACÍ SI DEJTE ZÁLEŽET.

Bezpečné doručování aplikací – zabezpečení aplikací a dat | ORBIT

MORE INFORMATION

BEZPEČNÉ DORUČOVÁNÍ APLIKACÍ S CITRIX NEXT GENERATION FIREWALL

WEB APPLICATION FIREWALL

The new generation of protection

The Citrix ADC Application Firewall (Next Generation Firewall) does not replace the network firewall, but adds a new level of protection. The self-learning mechanism filters all application communication between the client and server, understands the logic of web applications and thus detects an ongoing attack. At that point, the application is automatically removed from the web server and… the attacker doesn’t see it at all. So your apps stay safe.

LOAD BALANCER

No more outages and unavailability

Much of business today is, by and large, „data driven“. Every minute of unavailability is critical. This brings with it the need to have applications and systems available at all times. The ideal solution for spreading the load, maximizing availability and response speed is Load Balancer. In addition to a high level of intelligent protection, Citrix ADC provides you with better web application availability and performance at a reasonable cost.

ANY APPLICATION DELIVERY

Reliable delivery of any application

We live in the age of hybrid IT. The user does not care where the application or system is running from. That’s why it’s important to deliver it to them through one reliable channel, in one consistent way. Citrix ADC delivers your applications and systems whether they run in the public cloud or on-premises, whether they are virtualized or containerized.

Logo Česká spořitelna„By integrating Citrix ADC technology into our existing virtual desktop environment, we were able to ensure the delivery of all applications to our users in a short period of time during the COVID-19 pandemic. And not only on devices under our management, but also on private BYOD devices. All this with the same quality as if the user were working from an office or branch office, through all the authentication methods we use and with all the security requirements met, even without the use of a VPN.“

Jakub Adamec
digital workplace designer, Česká spořitelna

ZVAŽUJETE, JAK KOMPLEXNĚ ZABEZPEČIT CELÝ KONCOVÝ BOD?
S ŘEŠENÍM VÁM POMŮŽE CITRIX WORKSPACE

CITRIX HDX Proprietární protokol

• šifruje celý datový tok
• bez ohledu na aplikace
• nebyl nikdy prolomen

SECURE BROWSER Prohlížeč v Sandboxu

• je umístěn v Citrix Cloudu
• není propojen s infrastrukturou
• je 100% neprolomitelný

SPYWARE OCHRANA Zabezpečená komunikace

• zamezující odchytu stisků kláves
• s nahráváním obrazovky
• i pro nedůvěryhodná zařízení

BANKOVNÍ ÚČET MÁTE SKVĚLE ZABEZPEČENÝ. DŮM TAKÉ.
STEJNOU PÉČI VYŽADUJE I VÁŠ PRACOVNÍ ÚČET A APLIKACE.

DÁVÁ VÁM BEZPEČNÉ DORUČOVÁNÍ APLIKACÍ SMYSL?

I do. And since 2018, I have been helping to protect ORBIT clients‘ systems, accounts, applications and data. Under the motto „IT for business“, we are constantly looking for ways to apply technology for the benefit of companies and their people. We are happy to help you too.

BEZPEČNÉ DORUČOVÁNÍ APLIKACÍ UŽ NENÍ VÝSADOU,
ALE NUTNOSTÍ.

Petr ČUDA
Specialista na bezpečné doručování aplikací
Petr Čuda | ORBIT

NA POMOC ORBITu S BEZPEČNÝM DORUČOVÁNÍM APLIKACÍ SPOLÉHAJÍ

logo Zentiva | ORBIT
logo UPC | ORBIT
logo HELLA | ORBIT
logo Czech Aerosol | ORBIT
logo Marks & Spencer | ORBIT

Encyklopedie cloudu

Icon
Encyklopedie cloudu
Zavřít

Cloud encyclopedia

Icon
Cloud encyclopedia
Close
Loading...