How a Remote Access VPN Extends the Reach of Your IT Staff

What do the federal government’s Office of Personnel Management (OPM), Ashley Madison and Target have in common? They may seem entirely unrelated on the surface, but each organization has been a target of a high-profile data breach within the last year. Each new cyberattack is more proof that the threat landscape has diversified, leaving no industry, system or organization immune to vulnerabilities. The landscape would suggest that, now more than ever, organizations need nimble network security systems, supported by a disciplined IT staff that can keep up with the shifting state of cybersecurity. Unfortunately, while the threat landscape has clearly expanded in recent years, the IT security industry has yet to catch up and adapt to the quick rate of change. Across the board, there is a clear security skills shortage that has left IT professionals and their organizations without the necessary talent that they now require. In fact, 44 percent of organizations say that they have an inadequate number of networking and security staff with strong knowledge of both security and networking technology. Looking beyond these numbers, the problem is not necessarily a lack of skills, but rather, many organizations do not have ample personnel to field growing IT requests and security needs within their companies. To overcome this shortage, many organizations are seeking technologies that can augment their IT departments, without requiring extensive management by IT staff. Companies need easy-to-use solutions that largely run on their own and can be managed seamlessly – whether they are preventing a network hack or data breach, or merely enabling a company to function on a daily basis. Let’s take a...

NCP engineering Earns ‘Champion’ Rating in techconsult Report

This year, cyberattacks are expected to rain down at a rate of more than 117,000 per day, adding up to more than 42.8 million total incidents. As these attacks are launched and subsequently investigated, the root cause of many of them will turn out to be the result of employee action – basic human error – such as accidentally violating a remote access policy. With these figures in mind, the new report “Security Solution Vendors 2015,” conducted by German analyst firm techconsult, analyzes the entire network, data, storage and endpoint security landscape, while identifying top providers and solutions that are on the front lines protecting businesses from these 42.8 million attacks. The report bodes well for NCP engineering and our remote access VPN solutions. Techconsult found that NCP “dominates” the network security space, while highlighting how NCP’s Secure Enterprise Solution “win…clearly against the competition” from other VPN solution providers. This assessment is reflected by NCP’s presence in the “Champion” quadrant, comprising all security solution vendors, based on evaluations from the market and users, as well as experts. NCP also earns a “Champion” rating when only network security vendors – those with VPN, external firewalls and Unified Threat Management (UTM) solutions – are assessed. NCP is the top solution provider in this quadrant, and we stand out for our 100 percent user satisfaction rating. In the Virtual Private Network quadrant, NCP again earns top marks and a “Champion” rating, with the report noting, “NCP has been able to set itself above the rest with the experts’ evaluations based on its excellent solution assessment as well as its company-specific framework conditions.”...

Remote Access Technology: Improving Quality of Life at Work and at Home

Recently, there’s been a lot of chatter surrounding an article on the “false dichotomy between work and luxury.” The author’s argument, that deferred living is negatively impacting happiness and quality of life for millions of people, and that embracing remote working policies could be the answer, is intriguing. What exactly is meant by “deferred living?” Well, think of all the things that you’d love to be able to do – everything that people put off until retirement when (hopefully) they have enough money saved up and free time to do as they please. The reality is, however, that we never end up doing a great many of those things. Physical ailments, financial setbacks, familial obligations and a laundry list of other issues often prevent us from getting to do everything we want. The author also points out that many people actually love to work and enjoy the sense of accomplishment they can achieve on a regular basis in their careers, but that there are things that dampen that positivity. Long and tedious commutes into and from work, whether by car or public transportation, are certainly no fun. Then, there is the non-stop parade of meetings and distractions that continuously pull you away from whatever momentum you’ve built on a particular project. By embracing remote working, we can actually reinvigorate the workforce, reignite the creativity that long commutes and endless interruptions snuff out, and reimagine the way entire industries operate. Eliminating time wasted on travel, being able to connect to company servers from home through a secure VPN and customizing your workspace to improve your own productivity will make your...

Cyber Monday: Why Network Security is the Best Gift of All

Each year, as millions of Americans are busy surfing the web to find the best Cyber Monday deals, hackers are preparing to take advantage of enterprises when their network security is at its weakest point. It is crucial, then, for enterprises to secure their networks during this time of year, because breaches can be incredibly damaging to a business. According to Demetrios Lazarikos, IT threat strategist from RSA, “This time of year is not just an opportunity for retail fraud, but an opportunity to launch attacks that take advantage of business logic vulnerabilities, DDoS [distributed denial-of-service] attacks, and more sophisticated attacks as well.” Hackers are now increasingly breaching networks with Advanced Persistent Threats (APTs), and the holiday season is an ideal time of year for cyber criminals to use them, along with other methods, to exploit myriad lapses in network security. Due to a combination of higher than average network usage and IT administrators being out of the office, enterprises are often unable to react quickly to attacks during the holidays. In fact, 81 percent of hackers surveyed at a recent DefCon said they’re more active during the winter for those very reasons. It’s no wonder, then, that according to a new study by the Ponemon Institute, 64 percent of organizations said they see significant increases in attack activity during the holidays. But, it is more surprising to learn that despite the fact that they are vulnerable, more than 70 percent of enterprises are not taking the necessary precautions in anticipation of increased attacks. To prevent network breaches during the holidays, an enterprise should implement a comprehensive security framework...

NCP Continues Award Streak for Remote Access VPN Products in 2013

At NCP, we’re committed to helping organizations overcome the complexities of managing, maintaining and securing remote access, no matter how simple or complex their remote access environments are. And while positive feedback from customers is always a good thing, it’s equally rewarding to be recognized by industry-leading associations and magazines, as was recently the case on two separate occasions. Last week, NCP engineering was named a finalist in the ‘Best New Product or Service – Software –  Security Solution’ category in the prestigious 2013 American Business Awards. Further establishing its leadership in the industry, NCP was also named a ‘Gold’ winner in Security Products‘ Govies awards, which honor outstanding government security products in a variety of categories. NCP’s award-winning Secure Enterprise Management (SEM) 3.0 solution was recognized in both programs for its single point of network administration to control organizations’ entire IPsec and SSL VPN networks and its full Network Access Control (NAC) management. SEM 3.0 grants organizations the ability to provide unparalleled network security with NCP Advanced Authentication, which enables powerful Two-Factor Authentication with a One-Time Password that users receive via SMS from the NCP Advanced Authentication Connector. This eliminates the need for enterprises to use other third-party solutions, instead enabling Two-Factor Authentication with only a mobile phone. It also supports a broad range of operating systems, including Windows 8/7/Vista/XP, Windows Mobile/Phone, Android, Mac OS X, iOS, BlackBerry, Symbian and Linux. The recent award wins are a testament to NCP’s commitment to creating VPN products that meet customer demand and provide the flexibility to enable mobile communications while ensuring maximum security. NCP is constantly working to create solutions...

eWeek Explains How NCP’s VPN Client Supports Android BYOD Security

Enterprises know they’ll have happier employees if they embrace BYOD rather than prohibit it. Welcoming BYOD can be better for business output, too—the trick is to find the tools that keep employees productive when they’re using their own smartphones, tablets or laptops to access the corporate network remotely. In his recent reviews of NCP’s managed IPsec VPN clients compatible with Android (version 4.0 and higher), eWeek journalist Jeff Cogswell set out to determine just how well NCP’s VPN supports BYOD. The result? Not just a pass, but one with flying colors. Cogswell was particularly sold on a few of NCP’s product features that make it suited for welcoming Android-based mobile devices into the enterprise. For one, the installation was a quick and painless process. Right away, Cogswell connected to NCP’s test server and his own VPN server, which is OpenBSD. He also tested it with a Cisco server, and it worked in all cases—the fact that NCP’s Secure Enterprise Android Client is compatible with all common VPN gateways is a huge plus, since IT departments are increasingly compelled to support various platforms. The eWeek reviewer was also relieved that his smartphone didn’t have to be rooted; in fact, he said it’s a significant differentiator between NCP’s offering and other Android apps: “I have spent a lot of time using Android devices in recent years, and what struck me as particularly interesting is that your phone doesn’t need to be rooted. Rather, Android supports the networking tasks that this VPN client requires. That’s a huge plus.” Cogswell highlighted many other benefits, including how the client allows you to choose the...