Telecommuting Solution

    04-11-2022

Application background

With the development of network technology, mobile terminals and smart terminals, more and more mobile devices began to enter the enterprise IT environment, and telecommuting has become a major trend. Telecommuting requires employees to have secure access to service data with secure identity verification and strict permission control no matter where they are and what kind of terminal they use. This new office model enables employees to get rid of time and space constraints and further improve work collaboration and efficiency. Such a trend brings numerous opportunities to enterprise-grade mobile applications.

Challenges and trends

Mobile devices enable users to process businesses through any network at any time anywhere, but the traditional information technology applications are subject to various technical restrictions and cannot directly adapt to mobile needs. In most cases, the only way to completely solve the mobile device access problem is to redevelop the application system, acquire multiple sets of network devices and servers, and go through redeployment. However, doing so is difficult and costly.

At the same time, the security risks associated with telecommuting are higher compared to traditional networks, and the relatively open network nodes, diversity of access devices, etc., may pose a degree of threat to the economic interests of enterprises. Network security protection is one of the major reasons for the further development of telecommuting.

H3C telecommuting solution

In response to the business access needs and security requirements, H3C proposes a "multi-purpose" telecommuting solution based on next-generation firewall devices. With next-generation firewall devices as VPN gateways, multiple client access methods are provided, supporting multi-factor authentication combinations. Meanwhile, security protection capabilities of the next-generation firewall are integrated to save enterprise construction costs and enable enterprises to gain higher competitiveness in global business.

User benefits

Secure VPN access: It supports multiple operating systems of different devices and access of multiple clients (browser, inode, enterprise app, etc.). It supports TLS1.3 encryption protocol and flexible multi-factor (password, certificate, USBKey, and SMS) authentication combinations to provide stronger security capabilities.

Deep security risk analysis: Security risk visualization performs deep correlation analysis of applications and attack chains, and easily deals with advanced malicious threats.

Efficient detection of encrypted traffic: Direct detection of encrypted traffic or deep detection of uninstalled SSL is to deal with all kinds of malicious commands and control connections.

Precise control of unknown applications: Permissions are granted to the minimum extent by default, and only the required remote access services are granted. Unknown applications are blocked.

Asset risk dynamic assessment: Asset risk visualization performs dynamic assessment of enterprise asset risks and proposes disposal strategies.

Needs of custom businesses: It supports the integration with enterprise WeChat, Ding, WeChat and enterprise app to meet the custom business needs of enterprises, and supports IPv6 to meet the dual-stack business transformation of enterprises.

新华三官网