+ All Categories
Home > Documents > The Right Access for the Right People to the Right Applications under the Right Circumstances.

The Right Access for the Right People to the Right Applications under the Right Circumstances.

Date post: 18-Jan-2016
Category:
Upload: jonah-randolf-rice
View: 217 times
Download: 0 times
Share this document with a friend
Popular Tags:
33
The Right Access for the Right People to the Right Applications under the Right Circumstances.
Transcript
Page 1: The Right Access for the Right People to the Right Applications under the Right Circumstances.

The Right Access for the Right People to the Right Applications under the Right

Circumstances.

Page 2: The Right Access for the Right People to the Right Applications under the Right Circumstances.

Vad är det vi vill göra?

Secure Access - from everywhere

Page 3: The Right Access for the Right People to the Right Applications under the Right Circumstances.

From user...

to application

Page 4: The Right Access for the Right People to the Right Applications under the Right Circumstances.

Firewall/Perimeter

Internet

My PC in the officeTerminal Server

CitrixApplication Server

Page 5: The Right Access for the Right People to the Right Applications under the Right Circumstances.

IN PRACTICEG/On

Page 6: The Right Access for the Right People to the Right Applications under the Right Circumstances.

G/On in practice – USB Token1. Insert your G/On USB Token into your Windows,

Mac or Linux PC

2. Start G/On by clicking on the G/On icon

Page 7: The Right Access for the Right People to the Right Applications under the Right Circumstances.

G/On in practice

Mutual verification

Are you one of my G/On clients?

Am I talking to the right Server?

Page 8: The Right Access for the Right People to the Right Applications under the Right Circumstances.

G/On in practice

3. Log in with your normal user ID and password

Page 9: The Right Access for the Right People to the Right Applications under the Right Circumstances.

G/On in practice

4. Your personal menu is made available with the specific applications you have access to.

Page 10: The Right Access for the Right People to the Right Applications under the Right Circumstances.

G/On - Peace of mind

5. Work with a peace of mind. You know you are accepted. You know the connections are encrypted.

You know you have the right applications. And...

Page 11: The Right Access for the Right People to the Right Applications under the Right Circumstances.

Nothing is left behind…

Page 12: The Right Access for the Right People to the Right Applications under the Right Circumstances.

G/On in practice - iPad1. Navigate to your G/On Client for iPad

2. Start G/On by tapping the G/On icon

Page 13: The Right Access for the Right People to the Right Applications under the Right Circumstances.

G/On in practice

Mutual verification

Are you one of my G/On clients?

Am I talking to the right Server?

Page 14: The Right Access for the Right People to the Right Applications under the Right Circumstances.

G/On in practice

3. Log in with your normal user ID and password

Page 15: The Right Access for the Right People to the Right Applications under the Right Circumstances.

G/On in practice

4. Your personal menu is made available with the specific applications you have access to.

Page 16: The Right Access for the Right People to the Right Applications under the Right Circumstances.

G/On - Peace of mind

5. Work with a peace of mind. You know you are accepted. You know the connections are encrypted.

You know you have the right applications. And...

Page 17: The Right Access for the Right People to the Right Applications under the Right Circumstances.

Nothing is left behind…

Page 18: The Right Access for the Right People to the Right Applications under the Right Circumstances.

SOLUTIONSG/On

Page 19: The Right Access for the Right People to the Right Applications under the Right Circumstances.

SolutionsWorking from home

Use the keyboard and the screen of your PC at home to work directly on your office PC.

Page 20: The Right Access for the Right People to the Right Applications under the Right Circumstances.

SolutionsWork when you travel

Use any PC, a laptop you bring along, or your iPad

Page 21: The Right Access for the Right People to the Right Applications under the Right Circumstances.

SolutionsGet the job done... On the spot

Use your iPad to enter the sales order, job order, report the completion of your job, or read your mail and calendar.

Page 22: The Right Access for the Right People to the Right Applications under the Right Circumstances.

SolutionsFor external contractors, remote offices, partners...

They use their own PC or iPad to get access to the specific applications you decide.

Page 23: The Right Access for the Right People to the Right Applications under the Right Circumstances.

SolutionsFor all employees

Bringing their own favorite device

Page 24: The Right Access for the Right People to the Right Applications under the Right Circumstances.

THE INFRASTRUCTUREG/On

Page 25: The Right Access for the Right People to the Right Applications under the Right Circumstances.

Get away from this…

Page 26: The Right Access for the Right People to the Right Applications under the Right Circumstances.

…and use this

Contrary to VPN and LAN access, G/On does not create network level access for the user and the physical device.

Internet

Firewall

Applicationservers

Page 27: The Right Access for the Right People to the Right Applications under the Right Circumstances.

0000 0000 0000 000000/00

What is your personal device?

Page 28: The Right Access for the Right People to the Right Applications under the Right Circumstances.

Two-factor authentication…

…you hold the ”keys” in your hand…

...and you know your user ID and your password.

Page 29: The Right Access for the Right People to the Right Applications under the Right Circumstances.

BENEFITS AND VALUEG/On

Page 30: The Right Access for the Right People to the Right Applications under the Right Circumstances.

Benefits and valueIncrease user satisfaction and productivity

Get a simplified, uniform, and transparent security model

Maximize business agility

Lower the cost of ownership

Prepare for the future

Page 31: The Right Access for the Right People to the Right Applications under the Right Circumstances.

LICENSE MODEL AND SUPPORTG/On

Page 32: The Right Access for the Right People to the Right Applications under the Right Circumstances.

License model

UAL =User Access Licens

TAL = Token Access Licens

Token

Client Features

Server Features

Page 33: The Right Access for the Right People to the Right Applications under the Right Circumstances.

Giritech Technical Support


Recommended