Secure Remote Access

Are you worried about users working remotely with unmanaged devices that can compromise security? 

Are you being inundated with support calls from users who don't understand why they can't get to their corporate data when their VPN loses its connection?  

Simplify Work From Home Security

REMOTE ACCESS SECURITY

Are you interested in revolutionizing remote file server access security?

In this article, we'll explore how CentreStack elegantly resolves security concerns related to the increasing number of employees working from home to achieve two critical outcomes:

1. Simplify remote access to the point where users need no training. Get rid of VPN headaches and support calls. Give users a mapped drive that feels the same as sitting in the office directly connected to the file server.

2. Make remote access just as secure as working in the office by insulating corporate networks from unmanaged devices. This eliminates the threat from unmanaged networks and devices that can be easily hijacked to create Trojan horses that use VPN connections as infiltration conduits.

Credit: An analysis done by FlexJobs and Global Workplace Analytics

REMOTE WORK GROWTH

More People Working from Home

Even before the pandemic increased pressure to work from home, remote work has been quietly establishing itself as the new norm. In the US, for example, it has grown by 91 percent over the past decade. In fact, from 2014 to 2019, it rose by 44 percent (Flexjobs, 2020). We don't need statistics to know that these numbers skyrocketed in 2020. And there's plenty of evidence that working from home is here to stay, even after the Main Street economy reopens. This point is reinforced by the corresponding shift in focus to Remote Access for managed service providers that used to be primarily focused on Security and Backup as their most important practice areas.

Increased Security Risks of Working From Home

It's a bit ironic then that even though remote access has in many cases supplanted security as a top of mind concern for IT departments and service providers, it has introduced new security challenges that can be expensive to resolve. For example, some of the biggest problems we've heard from our IT partners include:

Increased security risks of remote access from unmanaged devices over VPN

Increased support and training costs for remote workers using VPN

Loss of control and security when cloud storage replaces VPNs for remote access.

Remote Access from Unmanaged Devices

IT departments can protect corporate data by ensuring that corporate devices are correctly updated and that the proper firewalls, antivirus software, and other defensive mechanisms are in place to protect the devices and networks they manage. But when an employee has to work remotely from an unmanaged device, or an unsafe network, the risks increase. Those devices become soft targets for hackers and are more likely to be infected with malicious software. In a sense, they become Trojan horses carrying malicious payloads when they connect to the corporate network over a VPN.

Increased Support and Training Costs for Remote Workers

These security issues lead to increased costs as IT departments have to indirectly manage home networks for their remote workers and address the increased number of support calls from VPN connection issues. There's also the potential increase in cost if they provide remote workers with a properly managed device which they can use to connect to the corporate network

check out the incredible

CentreStack Solution

CentreStack adds secure remote access and file sharing, disaster prevention and recovery, to file servers on-premises with easy cloud migration to private cloud storage. It is the real cloud file server solution you have been looking for! 

Remote Access

CentreStack bridges file servers and cloud storage for secure remote access without the need of a VPN.

Web Access

Accessing files and folders directly from within a web browser as if it is as interactive as from a desktop drive.

Mobile Access

CentreStack leverage cloud storage for secure mobile file sharing from a web browser or from a mobile application.

Hybrid Access

CentreStack sets up a hybrid deployment between local file servers and cloud storage that can be seamlessly converted to cloud-only.

Why CentreStack is Better For Secure Remote Access?

CentreStack resolves these issues:

Drive Mapping

Providing a mapped drive over HTTPS to keep unmanaged endpoints off the corporate network.

Data Protection

Mitigating ransomware with file versioning and behavioral heuristics, and with version control and backup.

Central Management

Controlling unmanaged endpoints with device management and access policies

How-it-works Diagram

How does it work?

End users get a mapped drive that mimics onsite behavior. Simultaneously, the corporate network is never exposed to the unmanaged endpoint since it can only connect to file shares the user can access. Furthermore, access can only occur via an HTTPS connection to the CentreStack server in the DMZ (the safe area between the external and internal firewalls). There is no direct connection to the internal network!

The user feels that they are still working on the corporate network (with help from technical tricks like smart caching of frequently used files and data compression), even though the device is never allowed to access the corporate network.

"It’s really easy for my users. I can just tell clients, go to your “M” folder, all your files are there. They just get it. They can also download the app on any mobile device - it’s just really simple to set up and to use. It's also easy to manage and easy to sell."

Lori Hardtke

President, ByteWize Inc.

CentreStack Security Benefits

By keeping files on the hosted file server and maintaining Active Directory and NTFS permission, productivity is increased without sacrificing security!


DATA PRIVACY

Data stays on hosted file servers. Remote access is governed by existing permissions. Data privacy is further maintained through isolated management of users and access rights in each tenant.

ACCESS CONTROLS

Use existing AD users and NTFS folder permissions with a simple interface to identify remotely accessible file shares that automatically appear in user's mapped drives

COMPLIANCE

CentreStack allows admins to run HIPAA or GDPR compliance checks and generate reports demonstrating compliance for file access and collaboration.

Never Pay For Ransomware

CentreStack also provides file versioning and behavioral heuristics, guaranteeing that your files can never be held hostage by ransomware. The behavioral heuristic allows administrators to set a frequency threshold beyond which the offending device gets quarantined. For example, an administrator can choose to quarantine any device which changes more than 20 files in a 10-minute window, limiting the scope of impact for ransomware to 20 files. And since CentreStack provides file versioning, these files can be quickly restored to their previous state.

Control Unmanaged Endpoints

Finally, CentreStack's management console provides policy-based administrative controls that prevent or protect against suspicious behavior on the client. These include:

STOP EXECUTABLES

The ability to stop executables and zip files from being run from the mapped drive

AUDIT TRACE

Auditing and reporting to keep track of any suspicious behavior

ENDPOINT PROTECTION

Endpoint encryption, remote wipe, and other data loss prevention features

Core Value

Privacy

The remote access solution extends the current internal Windows file server's reach to remote locations via HTTPS and web protocols. It is privacy by default.

Ownership

The same corporation owns the internal Windows file server and existing IT infrastructure, including the new CentreStack server, and the files and folders on the file server are privately owned.

Seamless

The internal Windows file server is the data repository for the newly added remote file access service. For employees, the files at work are the same files available remotely on mobile devices.

Compliance

Since files never leave the current on-premise file servers, it is much easier to pass compliance auditing. The new remote access server is the only component that need additional work.

Permission Control

The same NTFS permissions that was in place to protect the internal Windows file server files will be the same permission control in place to protect the remote file access service.

Secure Remote Access Features

Boost productivity for mobile workforces when they need to remote access corporate file servers.

Drive Mapping

Users have the familiar drive mapping interface for remote access to files.

File Locking

Global file locking facilitates team collaboration by locking active files that are being edited.

Endpoint Protection

Files and folders from corporate file servers cached on remote devices are subject to encryption and remote wipe.

Cloud Backup

Folders from the edge device can be back up to central corporate file servers and the on-ramp to private clouds.

Folder Permissions

Define different permissions for folders at different levels of the directory structure or inherit from NTFS permissions directly.

Mobile File Sharing

Web browser-based file manager and mobile applications make web and mobile access to files easy.

User Rights

From internal Active Directory users to external clients and partners, you can define user rights for folder sharing.

Version Control

Shared folders are put under version control and notifications are available for users subscribed to the folders.

SHARE THIS PAGE

Ready to boost mobile productivity and enable the workforce to work from home today?