ViPNt - PowerPoint PPT Presentation

1 / 32
About This Presentation
Title:

ViPNt

Description:

The field service is running around with laptops. ... Internet spy on your files, hack passwords, manipulate or steal financial data ... – PowerPoint PPT presentation

Number of Views:71
Avg rating:3.0/5.0
Slides: 33
Provided by: info56
Category:
Tags: vipnt | hack

less

Transcript and Presenter's Notes

Title: ViPNt


1
ViPNt
ViPNet Product Presentation Infotecs GmbH 2008
2
Ideal would be 1
Initial situation your company uses an
internal network (LAN) with various domestic
locations and others abroad. The field service is
running around with laptops. Homeworkers connect
regularly to the HQ through the Internet.
Requirement everybody associated with the
company has to communicate in a secure and cost
effective environment over the internet with
practically no restrictions.
In reality this means a lot more
  • you need to communicate by email with your
    colleagues in confidence that nobody can read,
    manipulate or destroy your correspondence.
  • you are traveling a lot on business. This means
    you want to connect through your laptop to your
    company network from every possible location
    whether it is from the hotel, internet cafe, car,
    train or plane or elsewhere as if you were
    sitting in your office room.......

3
Ideal would be 2
  • Your own and the sensitive data of your clients
    are invisible to hackers.
  • Chatting(Instant Messaging) ist not outlawed by
    your company actually it is welcomed as an
    every-day communication tool because it is
    efficient, easy to handle and safe.
  • Access to the companys internal website,
    CRM-system etc. is secure and simple.
  • You do not have scruples communicating sensitive
    information using email, chat, telephone or video
    over the internet. You know that NOBODY has
    insight into this sensitive information apart
    from the intended recipient.
  • No SPAM !
  • Even within the company unauthorized persons
    could never compromise your communication
    including the system administrator.

4
The usual situation
If you do not dispose of a simple solution
including VPN and firewall your reality when
communicating over the internet comes down to
this
  • Any person who has access to a PC within your
    company network can with the help of small
    utilities which you can easily get for free from
    the Internet spy on your files, hack passwords,
    manipulate or steal financial data etc.
  • - this threat is INSIDE your organization!
  • When you surf the internet specialists can do the
    same from the outside this threat is OUTSIDE
    your organization.
  • Your PC or the whole network resembles a house
    with open doors and windows.

5
The solution a VPN with additional functions
VPN is an acronym for "Virtual Private Network.
A VPN enables the VPN-users to communicate
sensitive information to each other in a secure
and encrypted manner.
Every VPN must fulfill the following basic
security requirements
  • confidentiality protection against unauthorised
    access to data
  • integrity protection against data modification
    and manipulation
  • authentication ensuring that communication takes
    place only between the intended and identified
    sender and recipient
  • availability and access data is available and
    accessible to authorized persons only as required

6
Who needs a VPN-solution ? 1
  • Organizations wanting to use the internet for
    cost saving reasons and for an increase in
    flexibility in communication as an alternative to
    dedicated communication lines.
  • Organizations with different locations, branches,
    international presence, field service, home
    workers etc.
  • Organizations and user groups with a demand for
    confidential communication (keywords industrial
    espionage, company management, contracts,
    quotations, concepts, patients and client data
    and others).
  • Organizations having to comply with IT-security
    legislation.
  • Organizations which to the present day have not
    considered using the internet for security
    reasons.

7
Who needs a VPN-solution ? 2
  • Companies in need of a verifiable, simple and
    secure access to their own ressources (CRM, ERP,
    internal websites etc.) using the internet.
  • ViPNet-VPN can also be used to enhance client
    loyalty.
  • ViPNet-VPN offers companies a tool for providing
    business models as an ASP.
  • The private user is not the classic VPN-client
    but is often connected to the company (mostly
    relatives or other people close to the company.)

8
What is ViPNet ? 1
VipNet is a software based VPN-solution WITH
ADDED VALUE FEATURES
reaching far beyond the
classic VPN. ViPNet is integrated into the
existing network environment. No additional
hardware, i.e. PC, routers etc. have to be added.
9
What is ViPNet? 2
ViPNet-VPN is a software based VPN
which differs from classic VPN-solutions by the
following key points
  • client-to-client connectivity
  • integrated communication applications
  • unlimited scalability
  • ease of implementation in existing network
    environments
  • localizations
  • flexible pricing
  • cross-platform support

10
ViPNet modules 1
ViPNet modules 1
ViPNet consists of 3 software modules
11
ViPNet modules 2
ViPNet modules functions
ViPNet Manager / Administrator Administrative
software
configures and manages the VPN, remote software
and keys upgrades
installed on every VPN-users PC, enables
transparent client-to-client or client-to-site
connections for any users application programs,
secures users data. Enables real time total
protection of IP traffic
ViPNet Client End-user software
VPN-gateway with integrated corporate firewall,
which also operates as an IP-address server
within the VPN, as well as a Mail, Proxy and
Tunnel server for secured connections
ViPNet Coordinator Software for server or
corporate gateway
12
Classic VPN
13
ViPNet VPN
Server-to-Server Client-to-Server
Client-to-Client traffic encryption

ViPNet Technology
14
ViPNet Client
ViPNet Client
End user Software
Personal Firewall
Network traffic encryption device
A reliable protection of a users computer/server
against both outside and LAN-borne attacks,
including the ability to
Enables the protection (confidentiality,
authenticity and integrity) of any traffic
(generated by applications/control systems or OS
traffic) going between any VPN objects, like
workstations, information servers, application
servers, networked machines or other nodes.
  • filter the traffic by specified parameters
    (white and black lists of parties seeking
    connection, ports, protocols, users application
  • make a VPN user invisible to external parties
    (the stealth feature)
  • detect intruders using the built-in IDS system
  • detect and block launching of malicious spooks.

15
ViPNet Coordinator
ViPNet Coordinator
Communication Server that can be used as
  • IP-address resolution server within the VPN
  • VPN Proxy server
  • Tunnel
  • Firewall
  • NAT traversal
  • Internet lock/access server
  • Secure mail server

16
ViPNet Management
ViPNet Management
Includes the following software modules
Network Control Center Key Center Integrated
certificate authority (CA) Perfect for large
networks creation
ViPNet Administrator
Is a light version of ViPNet Administrator. Does
not require any intimate knowledge of network
administration. The "Creating a ViPNet" wizard
is included in the module. Perfect for small
and medium networks creation.
ViPNet Manager
17
Network Control Center (NCC)
Network Control Center (NCC)
  • specifies VPN nodes, defines users and
    connections allowed between users, compiles
    address book and user rights databases for
    different VPN nodes
  • based on the company requirements, NCC defines
    corporate security policies for each specific VPN
    node and the powers of users/ local
    administrators with respect to modifying those
    policies locally
  • enables a secured automated delivery (with
    acknowledged receipt) to deployed network nodes
    of newly-compiled or modified, user rights
    databases and key-related information generated
    at the Key Center (e.g., symmetric keys, user
    certificates, lists of revoked certificates,
    etc.)
  • automatically updates ViPNet software on remote
    locations
  • remote access to event logs of ViPNet Client and
  • ViPNet Coordinator

18
Key Center (KC)
Key Center (KC)
  • generates and subsequently updates initial key
    sets and passwords for network objects and users.
    The password can be stored on smart-cards, touch
    memory, e-tokens and other media
  • issues X.509 digital certificates for
    authentication of different network objects,
    including outside users

19
ViPNet packages 1
infotecs
ViPNet is offered in 3 packages
For connecting any number of LANs and mobile
users over ViPNet VPN. Contains all functions
for design and administration of a VPN with
unlimited scalability. ViPNet Administrator
contains proprietary certificate authority.
Target group Large enterprises, ASPs and ISPs
For connecting any number of LANs and mobile
users over ViPNet VPN. Contains preconfigured
security settings. ViPNet Manager contains
Creating a ViPNet wizard. Target group small
and medium enterprises.
For tunneling IP/network traffic between remote
offices or LANs. ViPNet Tunnel is used when no
administrator access to the LANs is required.
Target group VPN-users of any size requiring a
pure VPN tunnel solution between office networks.
20
ViPNet packages 2
ViPNet TUNNEL package consists of one ViPNet
Client in order to set up a ViPNet Manager
administrative workstation. ViPNet OFFICE and
ViPNet TUNNEL can be extended further from the
Standard Packet
21
5 technical reasons to choose ViPNet
5 technical reasons Why ViPNet?
  • ViPNet additionally focuses on client-to-client
    connections. As most competitors manufacturing
    VPN-solutions offer only server-to-server or
    client-to-server connections, they rarely offer
    solutions, which take into account the threat
    from inside LANs.
  • The unique and over many years proven ViPNet
    technology allows VPN connections through
    corporate or local firewalls and proxy using NAT
    and NAPT.
  • ViPNet uses strong 256-bit encryption based on a
    proprietary combination of symmetric and
    asymmetric key exchange procedures. Supports 4
    encryption algorithms AES, GOST, 3DES and DES.
  • Every ViPNet module, which connects with the
    Internet, communicates through the integrated
    personal firewall and IDS.
  • Cross-platform support for MS Windows, Linux and
    Sun. The ViPNet Client runs on Windows or Linux
    and can communicate with ViPNet installed on a
    Windows, Linux or Sun workstation/server.

22
5 commercial reasons to choose ViPNet
5 commercial reasons Why ViPNet?
  • In contrast to classic VPN-solutions ViPNet
    provides value added features, which extend it
    into being an additional communication management
    tool by using integrated secure communication
    applications and other functions.
  • Additional security features like digital
    signatures, personal firewall, internet
    connection lock, Watch Dog and protection during
    the boot process turn the classic VPN into a
    ViPNet-fortress, which protects your data and
    communication from hackers, espionage, virus
    attacks and internal or global threats.
  • Easy configuration, a user friendly interface,
    which is partly integrated into the Windows
    interface, makes every-day work with the
    ViPNet-VPN a comfortable and understandable task
    without having to be an IT-specialist or security
    guru.
  • As ViPNet is a pure software solution the
    implementation of the VPN does not require any
    hardware extensions or restructuring of the
    network resulting in no additional costs or
    interruptions of the workflow.
  • Flexible price structure due to the possibility
    of adapting the ViPNet software configuration to
    the specific need of the customer.

23
Boot protection
One of the important characteristics of the
ViPNet-software module is the full control over
the traffic being exercised already during the
boot process.
This control is possible due to the interaction
of the ViPNet-Module with all drivers of the
network adapters. The ViPNet login process takes
place BEFORE the Windows-login, including
initialisation of the keys
The advantages of these measures are obvious
FTP
SMTP
IP Telephony
  • during and after the boot process of the PC no
    network attacks are possible, as ViPNet has an
    integrated firewall with IDS

SSL
TCP
UDP
Internet Protocol (IP)
  • network login is completely secured by the VPN,
    which itself is totally transparent for all
    network applications

ViPNet Driver
Network Adapter Driver
24
ViPNet Client Monitor
tool bar with the most important applications
configuration and administration
list of ViPNet users and their traffic
rules (users which are online are highlighted)
25
Security levels
The integrated personal firewall of the ViPNet
Client offers 5 security levels. Security level 1
allows only ViPNet-VPN traffic. Security level 3
is the default mode (Boomerang mode) filtering
all IP-adresses, ports and protocols.
26
Settings
Settings enable the ViPNet user to easily
integrate the client software into an existing
network structure. This characteristic is
especially important for the mobile user who has
to connect to the own VPN-network from different
network environments and through third-party
firewalls, proxies and connection devices (like
DSL modem, etc).
27
Communication tools

ViPNet user secure applications
Web-Link
Business-Mail
File Exchange
Conference
Chat (IM)
28
ViPNet Chat / Instant Messaging

Send button
Here you can add users to the chat or organize a
chat conference.
List of chat participants
These attributes confirm the status of the
message SSent, DDelivered, RRead
All current sessions
All messages of the current session
Field to enter messages
29
ViPNet Business Mail

These attributes confirm whether a message has
been delivered and/or read. SSent, EEncrypted,
RRead
Every message is numbered to facilitate search
options.
Address book
Inbox and Outbox as in every classic email
client.
All messages are encrypted. After decryption you
can read the contents here.
30
ViPNet File Exchange

File Exchange and Business-Mail are integrated
into the context menu. With a convenient right
click on to any document files are easily sent
to the recipient.
In the File Exchange window the ViPNet-User can
determine recipients, organize received files and
check the status of sent files.
31
Web Link
Unauthorized persons without a ViPNet Client or
valid keys cannot access this address. The web
server stays invisible.
If on a ViPNet Client or a Coordinator a
Web-Server is installed the ViPNet-Users benefit
from a completely secure portal which is
accessible only to authorized users. CRM- and
ERP-systems, databases and intranet pages can be
accessed from any ViPNet-PC in a secure fashion.
32
Questions?
Questions? Contact mail
support_at_infotecs.bizor check
www.infotecs.biz
Write a Comment
User Comments (0)
About PowerShow.com