Secure the access point and flexible working becomes a reality!
Providing Flexible Working Practices
Enabling employees to have greater flexibility with regard to their place of work is becoming increasingly important for both public sector bodies and their counterparts within the commercial marketplace.
The benefits employees enjoy as a result are the subject of continuing research and assessment. Improved staff morale features highly in all such studies. Employees are able to settle upon a much more rewarding and less stressful work/life balance, and evidence suggests that employee production improves as a result. Good staff morale is then, of course, a key contributor towards higher rates of staff retention.
The organisation itself also stands to benefit considerably from such an arrangement. Enabling employees to work from home, for example, means less cars on the road and lowered CO2 emissions. In addition, once the provision of remote working is set up and enabled, a proven means of maintaining work and services already exists in the event of an emergency situation, brought on, for example, by a severe bout of bad weather.
Unlocking the Property Potential
Perhaps the biggest potential, however, relates to property portfolios and associated footprint. By allowing staff to enjoy greater flexibility with regard to their workplace choices, organisations are able to contemplate a reduction in current office space needs.
Today You Can!
For public sector bodies, in particular, the security threats associated with ‘unmanaged’ personal home computers coming into contact with Government networks and data has traditionally prevented the benefits of remote working to be assessed to its true potential.
Whilst the provision of ‘managed’ laptops to some employees is a viable business proposition to counter the fact that home PCs may not be used, this is generally considered too expensive an option for all employees.
Trusted Client solves both issues. Trusted Client USB enables home PCs to access central data and networks in a secure manner whilst Trusted Client HDD provides a very low cost and secure alternative to a fully loaded PC.
The Trusted Client Product
“Beautifully implemented, this is a product as sophisticated as it is simple.” – Techworld
Trusted Client is Becrypt’s innovative answer to the IT Manager’s dilemma: how to provide secure remote access at a low cost. Trusted Client can transform an unmanaged machine, such as a home PC, into a secure remote access point.
Trusted Client is a self contained encrypted environment that allows employees to connect to an organisation’s network and data whilst preventing data loss and leakage. This secure isolated environment provides access to a corporation’s existing VPN infrastructure as well as backend applications such as Windows desktops and Microsoft applications.
Trusted Client is fully configurable to each organisation’s individual requirements and works with your existing corporate environment with little to no modification to existing systems - this is achieved through support for multiple third party remote access technologies.
Trusted Client can also be used in Business Continuity scenarios, making it an invaluable tool that supports and enforces a comprehensive Information Assurance strategy.
Trusted Client USB
Secure access from an ‘unmanaged’ home PC
The operating system is loaded onto a USB flash drive, which can then be used to boot the user’s Home PC/laptop (which cannot be trusted). This provides a segregated operating environment within an unmanaged end point device, whilst isolating any malware threats that may be resident on the hard drive. With Trusted Client USB, staff no longer need corporate laptops for home or occasional remote working; instead they can be issued with an inexpensive bootable USB stick, which is secure and easier to carry. This can provide cost savings in hardware as well as support, while increasing a user’s flexibility.
Trusted Client HDD
Secure, low cost access from a managed device.
The operating system is pre-loaded onto the hard drive of a designated machine, providing an organisation with a mechanism to convert standard Laptops or Netbooks into a low-cost mobile computing solution. This secure platform avoids the significant cost of full operating systems, applications, ongoing operational support and management. The small footprint and specifications needed by Trusted Client HDD mean you can also re-purpose existing equipment that may not be capable of running the latest Operating Systems available.
Under CESG guidelines, Trusted Client HDD is classified as a managed device.
Features & Benefits
|Secure remote network access enables users to work safely from any unmanaged PC||Flexible and mobile working capabilities to provide better service to customers, and better work/life balance for users|
|Working environment is totally isolated from the host machine||Absolutely no transference of data, which significantly reduces the risk of data loss or data leakage|
|Encrypted operating system and encrypted data storage – data saved to Trusted Client is automatically encrypted||Device and any data saved securely protected from unauthorised access|
|Strong authentication combined with 256 bit AES encryption||Government grade security options make Trusted Client suitable for protecting virtually any commercial information|
|Based on Open Source software and loaded on an off-the-shelf USB flash drive||Extremely cost effective solution with low hardware costs (particularly when compared with alternatives like laptops or PDAs), and no additional license fees for the operating system|
|Out of the Box integration with standard browsers, VMware, Citrix and Microsoft Terminal Services||Familiar look and feel boosts user acceptance, reduces training overheads and start up time giving fast access|
|Fully configurable with easy inclusion of additional plug-in applications||Highly configurable to meet the business requirements of each individual organisation|
|Central Management facilities for device deployment and repudiation||Low operational overheads and the ability to ‘kill’ a Trusted Client device remotely should the user’s rights be revoked|
How it works
Trusted Client has been designed with a modular approach, to allow third party components to be built into the environment. It may be configured to include only pre-specified applications, and to restrict the user to approved IP destinations, ports, and protocols, such as the corporate intranet, its virtual private network (VPN) or to specific hosts. Once the configuration of Trusted Client has been decided, a single install file is created allowing the organisation to quickly and securely build devices that are unique to its needs.
Request a free 30-day trial version