The Information Security Specialists

Remote & Mobile Access

A member of the team requests remote access, the benefits to the company include greater flexibility of the workforce, reduced overhead costs, reduced carbon footprint and increased productivity. That’s the positive side, but what about the negative?

A laptop is stolen from someone’s home, a VPN system allows connections from an infected machine or a BlackBerry with passwords saved is lost. There is now a race against time to either secure the corporate defences to prevent unauthorised access or confirm with the service desk if that particular laptop was upgraded with the latest hard disk encryption being rolled out to the mobile workforce. Not only do you need to consider confidentiality and integrity of the emails and the data they contain but also the availability of the solution. All of which can be compromised in the wrong situations.

Every proactive organisation will have a policy and procedure in place to effectively deal with instances such as these (and if you don’t then NTA can provide assistance here) but what about mitigating any potential issues before they arise? Prevention is always cheaper, and more stress free, than cure.

We can offer a broad range of security assessment services to help ensure that any methods by which your network can be accessed remotely are as secure as possible and do not represent points of weakness and vulnerability. The broad service areas are briefly described below, if you need further information then please contact us.

Remote Access Gateways– With assessments covering SSL, IPSec, P2P, PPTP and LLTP VPNs, Citrix Secure Gateway, WebMail and OWA from pre- and post-authenticated perspectives we can provide peace of mind no matter what technology you have, or will be, implemented.

Mobile Device Security Assessment – With the rise of mobile devices such as BlackBerry’s, Android phones, iPhones’, iPads’ and Windows mobile devices there is an increasing number of methods to connect to the corporate network. What if these devices are infected, lost, stolen or simply misconfigured? A security assessment of the deployment can help answer those questions and reduce the security exposure.

Laptop Security Assessment – There doesn’t seem to be a month that goes by without a revelation from one organisation or another about thousands of personal records being exposed after a laptop has been lost or stolen. But there are other risks that need to be guarded against that could compromise the rest of the corporate network and the information your company holds.

English French German Italian Portuguese Russian Spanish
Call us now on
01634 721855

Latest News

I wish to highlight the outstanding work that your consultant undertook whilst doing the ICT Health Check for the Council.

View all Testimonials

Particularly notable was the level of technical knowledge displayed by NTA’s consultants, and we were also impressed that they were willing to share this knowledge with the network team.

View all Testimonials

We have found NTA to be an excellent supplier, offering a very good service at a competitive price. A key differentiator is that they are happy to answer any questions...

View all Testimonials

I have found NTA to be an approachable knowledgeable partner, and have no hesitation in recommending their services.

View all Testimonials

The NTA testing programme was a success on all fronts.

View all Testimonials

The quality of both the initial work and follow-up advice and guidance was excellent, and NTA provided full lifecycle support to the development and delivery of our Online Services portfolio.

View all Testimonials

On one occasion our third-party did not believe the vulnerability was an issue - having had their software tested by another well-known security testing company - and NTA Monitor were...

View all Testimonials

NTA Monitor are very supportive, especially regarding general questions about Information Security issues such as hacking and vulnerabilities.

View all Testimonials

NTA Monitor has been a trusted supplier for a number of years and we have found them to be approachable, helpful and understanding of our needs relating to information security.

View all Testimonials