Information Security Solutions
- SIEM Solutions
- Virtual Private Network
- Email Security
- Data Protection
- Network Security
- System Security
- Penetration Testing
- Vulnerability Assessment
- ISMS Policy Templates
- ISO 27001 Consultancy
- BCP & DR Consultancy
- IT Audit consultancy
_________________________
VPN Connection Phases:
Phase I
- Authentication Method
- Encryption Method
- Data Integrity
- Diffie-Hillman Group
Phase II
- Encapsulation Mode
- Encryption Method
- Compression Method
- Perfect Forward Secrecy
VPN Protocols
- PPTP
- L2TP
- IPsec
- SOCKS
_________________________
What is SSL?
SSL - Secure Sockets Layer
-
Standard on the Internet for exchanging sensitive information between a website and the computer
-
Standard security technology for establishing an encrypted link between a web server and a browser
-
To protect the online transactions for the customers
_________________________
iSquare Information Security Solutions
Virtual Private Network (VPN)
What is VPN?
A virtual private network (VPN) is a computer network that uses a public telecommunication infrastructure such as the Internet to provide remote offices or individual users with secure access to their organization's network.
A virtual private network (VPN) is a secure, private connection through a public network
Why to use Virtual Private Network (VPN)?
- Secure Remote connection
- Low cost
- High Encryption
- Permanent Site to Site connection
- Easy to Manage/work
- Higher Bandwidth
iSquare Virtual Private Network (VPN) Solutions
- Design
- Setup
- Integration
- Implementation
- Customization
- Testing
- Managing
Types of VPN Connections:
VPN Client to Site Connectivity:
- To access the corporate network using the VPN dailup connection.
- Connection can be established using VPN client software via public internet
__________________________________________________
Cisco VPN Client Login Screen
__________________________________________________
VPN Site to Site Connectivity:
- Secure way to connect offices sited across the globe
- Encrypted data transfer through dedicated private tunnel in the internet
_________________________________________________________________________