the right access for the right people to the right applications under the right circumstances

33
The Right Access for the Right People to the Right Applications under the Right Circumstances.

Upload: jonah-randolf-rice

Post on 18-Jan-2016

221 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: The Right Access for the Right People to the Right Applications under the Right Circumstances

The Right Access for the Right People to the Right Applications under the Right

Circumstances.

Page 2: The Right Access for the Right People to the Right Applications under the Right Circumstances

Vad är det vi vill göra?

Secure Access - from everywhere

Page 3: The Right Access for the Right People to the Right Applications under the Right Circumstances

From user...

to application

Page 4: The Right Access for the Right People to the Right Applications under the Right Circumstances

Firewall/Perimeter

Internet

My PC in the officeTerminal Server

CitrixApplication Server

Page 5: The Right Access for the Right People to the Right Applications under the Right Circumstances

IN PRACTICEG/On

Page 6: The Right Access for the Right People to the Right Applications under the Right Circumstances

G/On in practice – USB Token1. Insert your G/On USB Token into your Windows,

Mac or Linux PC

2. Start G/On by clicking on the G/On icon

Page 7: The Right Access for the Right People to the Right Applications under the Right Circumstances

G/On in practice

Mutual verification

Are you one of my G/On clients?

Am I talking to the right Server?

Page 8: The Right Access for the Right People to the Right Applications under the Right Circumstances

G/On in practice

3. Log in with your normal user ID and password

Page 9: The Right Access for the Right People to the Right Applications under the Right Circumstances

G/On in practice

4. Your personal menu is made available with the specific applications you have access to.

Page 10: The Right Access for the Right People to the Right Applications under the Right Circumstances

G/On - Peace of mind

5. Work with a peace of mind. You know you are accepted. You know the connections are encrypted.

You know you have the right applications. And...

Page 11: The Right Access for the Right People to the Right Applications under the Right Circumstances

Nothing is left behind…

Page 12: The Right Access for the Right People to the Right Applications under the Right Circumstances

G/On in practice - iPad1. Navigate to your G/On Client for iPad

2. Start G/On by tapping the G/On icon

Page 13: The Right Access for the Right People to the Right Applications under the Right Circumstances

G/On in practice

Mutual verification

Are you one of my G/On clients?

Am I talking to the right Server?

Page 14: The Right Access for the Right People to the Right Applications under the Right Circumstances

G/On in practice

3. Log in with your normal user ID and password

Page 15: The Right Access for the Right People to the Right Applications under the Right Circumstances

G/On in practice

4. Your personal menu is made available with the specific applications you have access to.

Page 16: The Right Access for the Right People to the Right Applications under the Right Circumstances

G/On - Peace of mind

5. Work with a peace of mind. You know you are accepted. You know the connections are encrypted.

You know you have the right applications. And...

Page 17: The Right Access for the Right People to the Right Applications under the Right Circumstances

Nothing is left behind…

Page 18: The Right Access for the Right People to the Right Applications under the Right Circumstances

SOLUTIONSG/On

Page 19: The Right Access for the Right People to the Right Applications under the Right Circumstances

SolutionsWorking from home

Use the keyboard and the screen of your PC at home to work directly on your office PC.

Page 20: The Right Access for the Right People to the Right Applications under the Right Circumstances

SolutionsWork when you travel

Use any PC, a laptop you bring along, or your iPad

Page 21: The Right Access for the Right People to the Right Applications under the Right Circumstances

SolutionsGet the job done... On the spot

Use your iPad to enter the sales order, job order, report the completion of your job, or read your mail and calendar.

Page 22: The Right Access for the Right People to the Right Applications under the Right Circumstances

SolutionsFor external contractors, remote offices, partners...

They use their own PC or iPad to get access to the specific applications you decide.

Page 23: The Right Access for the Right People to the Right Applications under the Right Circumstances

SolutionsFor all employees

Bringing their own favorite device

Page 24: The Right Access for the Right People to the Right Applications under the Right Circumstances

THE INFRASTRUCTUREG/On

Page 25: The Right Access for the Right People to the Right Applications under the Right Circumstances

Get away from this…

Page 26: The Right Access for the Right People to the Right Applications under the Right Circumstances

…and use this

Contrary to VPN and LAN access, G/On does not create network level access for the user and the physical device.

Internet

Firewall

Applicationservers

Page 27: The Right Access for the Right People to the Right Applications under the Right Circumstances

0000 0000 0000 000000/00

What is your personal device?

Page 28: The Right Access for the Right People to the Right Applications under the Right Circumstances

Two-factor authentication…

…you hold the ”keys” in your hand…

...and you know your user ID and your password.

Page 29: The Right Access for the Right People to the Right Applications under the Right Circumstances

BENEFITS AND VALUEG/On

Page 30: The Right Access for the Right People to the Right Applications under the Right Circumstances

Benefits and valueIncrease user satisfaction and productivity

Get a simplified, uniform, and transparent security model

Maximize business agility

Lower the cost of ownership

Prepare for the future

Page 31: The Right Access for the Right People to the Right Applications under the Right Circumstances

LICENSE MODEL AND SUPPORTG/On

Page 32: The Right Access for the Right People to the Right Applications under the Right Circumstances

License model

UAL =User Access Licens

TAL = Token Access Licens

Token

Client Features

Server Features

Page 33: The Right Access for the Right People to the Right Applications under the Right Circumstances

Giritech Technical Support