Seamless Roaming or Always On: The Remote Access VPN Feature Digital Nomads May Be Missing

In remote working environments, the Digital Nomad isn’t tied to a desk or cubicle, but he has close relationships with his coworkers. The Digital Nomad works exclusively from mobile devices that connect wirelessly to the Internet, and she’s still able to finish all her tasks on time. For now, these workers are generally the exception to the rule, but that may not be the case for much longer. One-third of business leaders anticipate that by 2020, more than half of their full-time workforce will be working remotely. It’s not difficult to see why remote work is so popular. Today, Digital Nomads can be more nomadic than ever, setting up new mobile “offices” wherever there’s a network connection. They don’t even need a hard surface to put their device on or an outlet to plug into. But, what they do need for security purposes is a remote access VPN to enable a secure connection back to the corporate network. VPNs are reliable, but the problem is, network interruptions have long seemed inevitable. They get in the way and disrupt the user’s computing session. That’s when a VPN feature known as seamless roaming or always on comes into play, allowing a user to move between different networks without losing the connection. The Value of Seamless Roaming Whether you’re a finance executive fighting dead zones as you work on your laptop from a train, or a sales professional working from an airport across a spotty Wi-Fi connection, each time there’s a network disruption, the user has to manually restart the VPN connection to continue working. This is why seamless roaming is no...

Open Haus: Automatic Hotspot Logon

If you were a hacker targeting a network, which would be most appealing – a network contained in a residential building, an office or corporate facility, or a public place? The information contained on the network of a residential building probably wouldn’t be particularly valuable, and it would also be well-protected. You’d face even more security if trying to attack a corporate network, so that probably wouldn’t be your best option either. You’d probably target a public network – one in an airport, coffee shop or hotel – over which users dealing with sensitive information would try to connect, perhaps without having the same security protections they would have if they were in their home or office. Public networks can be vulnerable, and they do make popular targets. Consider all the possible threats – from snooping and evil twin schemes to narrowband jamming and replay attacks – hackers can deploy against these networks. It’s also important to consider that there are now many more public hotspots than there were even a few years ago – global Wi-Fi hotspots are expected to triple from 1.3 million in 2011 to 5.8 million this year. For business users in particular, hotspot connections are ideal for when they’re at day-long events (when using mobile data on their phone or tablet would quickly drain their battery) or when they travel abroad (to avoid costly roaming fees). For these users, and for anyone else who relies on hotspots for secure remote access, NCP engineering has integrated Automatic Hotspot Logon into its NCP Secure Client. How It Works A safeguard protecting the end device against attack...

[WEBINAR] Two-Factor Authentication for Tighter VPN Security

If you think that passwords for online profiles are effective at preventing security breaches, consider these two new statistics: The average person has 19 passwords Four in five people say they forget their passwords To counter password forgetfulness, users often take steps that leave network administrators cringing. They may duplicate one password over multiple accounts. They could use birthdays or other numbers that can be easily guessed. Or they might write them down, sometimes in plain sight. Actions like these make it that much easier for attackers to successfully breach a network, and indeed, many recent breaches share a common origin – an employee’s password that was copied, discovered or given away. To counter this wave of password theft, an avalanche of popular sites and apps, including Google, Amazon, Facebook and now even Snapchat, have replaced one-dimensional passwords with a form of user login credentials that help better protect sensitive information. Download Whitepaper Enter two-factor authentication. This approach combines two (or more) methods of credentials authentication to establish the unambiguous identification of each user, including: Something Users Know: Password, PIN, one-time password (OTP), certificate Something Users Have: Token or calculator (with OTP), soft token, text message (with OTP), machine/hardware certificate, smartcard, trusted platform module (TPM) Something Users Are: Fingerprint, face recognition, iris recognition, keystroke dynamics Network administrators have all these options at their disposal, and the idea is to pick at least one form of authentication from two of the lists. An administrator may even pick a factor from all three lists, or combine multiple items from each. With this additional protection, users gain the convenience of anywhere-anytime access without...

NCP Channel Alliance Partner Program Takes Center Stage at Channel Link 2015

Given that three in four executives now say Bring-Your-Own-Device (BYOD) initiatives pose the greatest security risk to their companies, it shouldn’t be surprising that companies have tasked their IT departments with finding effective ways to guarantee secure remote access for users. Often, this means network administrators have to identify partner vendors that can provide secure remote access solutions, including VPNs. Here at NCP engineering, we’ve heard enough customer success stories to know that our NCP Secure Entry Clients are the centerpiece around which any remote access infrastructure should be built. That’s why we’re proud to be attending Tech Data’s Channel Link 2015, June 17-20, in Dallas, where we’ll be sharing information about our Channel Alliance Partner Program. The program, which has been in place since 2009, now includes 42 North American partners – 14 of which are new – that are able to access services from NCP, including business transformation training, advice on how to better incorporate cloud solutions into their current offerings, and training to simplify hosting and managed services concepts. NCP’s appearance at Channel Link comes just a few months after we reached a distribution agreement with Tech Data, one of the world’s largest wholesale distributors of technology products. Through the agreement, NCP is better able to meet demand from North American service providers in the channel for secure remote access. Specifically, end users are able to tap into our market-leading remote access VPN client, equipped with one-click logon, a fast connection, and always-on reliability. Together, the Channel Alliance Partner Program that we’ll be featuring at Channel Link, along with the Tech Data agreement, showcase NCP’s ability...

NCP Continues Award Streak for Remote Access VPN Products in 2013

At NCP, we’re committed to helping organizations overcome the complexities of managing, maintaining and securing remote access, no matter how simple or complex their remote access environments are. And while positive feedback from customers is always a good thing, it’s equally rewarding to be recognized by industry-leading associations and magazines, as was recently the case on two separate occasions. Last week, NCP engineering was named a finalist in the ‘Best New Product or Service – Software –  Security Solution’ category in the prestigious 2013 American Business Awards. Further establishing its leadership in the industry, NCP was also named a ‘Gold’ winner in Security Products‘ Govies awards, which honor outstanding government security products in a variety of categories. NCP’s award-winning Secure Enterprise Management (SEM) 3.0 solution was recognized in both programs for its single point of network administration to control organizations’ entire IPsec and SSL VPN networks and its full Network Access Control (NAC) management. SEM 3.0 grants organizations the ability to provide unparalleled network security with NCP Advanced Authentication, which enables powerful Two-Factor Authentication with a One-Time Password that users receive via SMS from the NCP Advanced Authentication Connector. This eliminates the need for enterprises to use other third-party solutions, instead enabling Two-Factor Authentication with only a mobile phone. It also supports a broad range of operating systems, including Windows 8/7/Vista/XP, Windows Mobile/Phone, Android, Mac OS X, iOS, BlackBerry, Symbian and Linux. The recent award wins are a testament to NCP’s commitment to creating VPN products that meet customer demand and provide the flexibility to enable mobile communications while ensuring maximum security. NCP is constantly working to create solutions...