A VPN needs both a client and remote gateway. While NCP offers a complete solution with Secure Enterprise Client and Secure Enterprise VPN Server, some manufacturers only develop their own gateways. Client software is then purchased from another company such as NCP. This type of cooperation is rare in the security sector, as the compatibility of the products is very important and may not meet all the requirements of a given scenario. This is not the case at NCP which shows that partnerships without compromise can be achieved in the security sector. NCP has been working with Juniper Networks for many years and this partnership recently reached a new level of cooperation.
NCP has been named by Security Today magazine among the 2017 winners of its coveted Government Security Awards, also known as “The Govies”. The Govies recognize new security products across a spectrum of disciplines that share a common trait – they are all fundamentally important to IT professionals working in government agencies and their private sector partners. NCP is thrilled to receive top honors for its Secure Enterprise iOS Client, which took the Platinum award in the Network Security category. This achievement further underlines NCP’s dominance in Government remote access VPN solutions having triumphed in the same Govies category on numerous previous occasions.
People are often quick to adapt – now we don’t seem to blink an eyelid when we read news about another hacked server and the loss of a few million records of personal data. Only the most spectacular cases often attract our attention such as an attack on a high profile target like the German parliament or incidents where vast amounts of data were stolen, for example the Yahoo breach. And the bar is constantly being raised of what needs to happen to catch our attention. News which used to grab headlines throughout the media is now limited to specialist magazines or blogs. Nevertheless, companies are paying attention to such threats as a high priority. A study by PriceWaterhouseCoopers lists cybercrime as the second most reported economic crime. In the study, 32 percent of companies said they had already been victims of cybercrime and 34 percent expected an incident in their company over the next two years. Analysing the development of cybercrime in the last few years reveals interesting trends. A infographic on Bestvpn.com lists the 10 most serious incidents according to the impact or the quantity of stolen data. Although the list is based on incidents in America, the findings are impressive. Even the last place begins at 50 million data records stolen from the retailer Home Depot in 2014.
Large organizations today are experiencing a rapid evolution in technology that is challenging traditional security systems and infrastructures. Corporate networks that once only had to support the connectivity of desk-bound workstations and a small number of laptops must now cope with thousands of laptops, tablets and phones along with a rapidly growing population of IIoT/M2M devices. VPNs are an integral part of any mobile device and IIoT security strategy. To manage all of these VPNs easily and efficiently without compromising end-user security requires the IT department to embrace a variety of strategies.
Just a few days ago, news began circulating on the internet of a strange problem with Cisco routers which was easy to identify as it caused complete failure. Shortly afterwards, Cisco issued a warning for specific products which may still be functioning normally but could fail after approximately 18 months of operation without warning. Meanwhile, a list of affected devices has now been published online. But that’s far from the full story.
In recent years, the way we work has transformed. The rise of ever more powerful mobile devices has freed us from our desks. Our Internet-enabled smartphones and tablets allow us to remain constantly connected even while we are on the move. Sensing a business opportunity, carriers have responded by providing Wi-Fi hotspots for our convenience in public spaces everywhere – from coffee shops, restaurants, shopping malls, hotels and exhibition halls to trains, airports and even airplanes. Tempting as it may be to use them to reduce any idle time, public Wi-Fi hot spots are not without risks. There are over 100,000 unsecured public Wi-Fi hotspots around the world. Furthermore, employees often fail to follow best practices. It only takes one mistake for sensitive company data to be jeopardized. However, by deploying VPNs and following some simple guidelines it is possible for organizations to overcome these risks and ensure all employees are equipped to secure their mobile client connections.