Home | Contact | Sitemap

Secure Office™ | Case studies | Professional Services | Career | Press & Media | Partners | Ordering


Secure Office
Complete Package

Certificate Authority
Smart Card System

PKI Authentication

Kryptonet™
Security Server
Operator Program
KPC Client/Server
Security Gateways
Kryapp 980

Secure Office
Workstation
Package

Secure Office
Client Package

Secure Office
Developers Kit

Documentation


Kryptonet Operator's Program/Security Server

3 Steps to a VPN

In three steps, a manager creates impenetrable VPN tunnels:

   1.Create a security group with a click in the       Access tree.
   2.Drag systems, users, subnets or other groups       onto the new group from the Resource tree.
   3.Select a predefined security policy template.

You’re done! Secure Office automatically establishes the encrypted tunnels, accords all security specifications contained in the policy to the new connections, and distributes the new configuration to every gateway device throughout the domain. You don't have to connect to each device separately and repeatedly enter new configuration data.

If desired, individual members of the group can also have additional, differing access rights or restrictions to other groups.

VPN monitoring / maintenance

The IT manager can monitor the VPN at a glance. In stark contrast to conventional VPN management programs, Secure Office’s administration provides a comprehensive view of the entire VPN, all managed resources and their security groupings as well as selectable views of each individual connection, each device, each system and all its accesses. Configuration changes are distributed to all units simultaneously as opposed to connecting one-by-one to each device. The Online Log window continually receives messages from all components with warning flags in the event of a security risk.

The status of all gateways all connections and all accesses is immediately viewable.
Modify an existing security policy by changing a single template; the change is automatically propagated to every instance of that template throughout the VPN.
Add systems behind a gateway with a single click; the new system is automatically included with every instance of the gateway and automatically inherits the rights of each security group where the gateway is represented. No additional configuration necessary.


KSS/administration Product Sheet (PDF-239KB)