Solutions for Access Control Challenges
Solutions for Next Gen Remote Access

Secure Access to Authorized Applications, not Entire Networks

Precision Access

Remote user visibility is limited to only the applications they’re authorized to access.

Transparent MFA

No phone to respond to. No token to enter. Defeats credential theft. Is transparent to users.

Trust Assessment

Identifies compromised PCs and prevents access.

Secure Remote Worker Access

“PrecisionAccess stood out because of its granular ability to easily and effectively isolate internal servers from unauthorized external users.”

Problem: Traditional VPN Solutions Undermined Security and Added Complexity

Nokia shares and co-develops proprietary product designs with partners and customers, which means granting access to hundreds of engineers worldwide. The security team had to keep up with hundreds of VPN links to ensure proper access without increasing exposure to external threats. They spent considerable time managing access to a complex patchwork of networks while continuously training 3rd parties on the use of tokens and proper access procedures.

Solution: Trusted Access Control to Enhance Security and Reduce User Frustration

Their security team discovered Vidder after they evaluated various approaches, none of which gave them the option for application-centric protection across multiple corporate networks. They deployed Trusted Access Control and established transparent MFA access to individual applications as needed, without exposing other apps or devices on the network to advanced threats. No access to applications was allowed until device trust was validated. The result was a significant reduction in the cost and resources required to defeat adversaries while making their apps more accessible to high value partners.

Read more about Nokia’s PA Deployment.

Precision Third Party Access

“With Vidder we can now meet stringent compliance and security requirements in AWS.”

Problem: Third Parties Needed Ongoing Access to Sensitive Applications

A health care services company was challenged with securing supply chain partner, contractor and field health worker access to centralized health record and workflow management applications. Their users needed easy and quick access to sensitive applications as they moved from location to location.

Traditional multifactor authentication and VPN solutions were too cumbersome and costly and gave users access to entire networks, exposing other apps on the network to new attack vectors. Compromised endpoints could result in adversaries gaining access to patient data.

Solution: Trusted Access Control for Enhanced Security and Convenient Access

The security team chose Vidder to easily protect their critical applications with transparent multifactor authentication and trust assessment. Integration with their identity management system meant users were given easy access 24/7 to apps needed to perform their work without exposing an entire network.

Audit and compliance burdens were much easier to manage and users hardly noticed their devices were being assessed for trustworthiness (in milliseconds) before access was granted.

Read more about Vidder’s Trusted Remote Access.

Precision BYOD Access

“Employee-owned devices were introducing new attack vectors at an escalating pace. There was no way we could keep up without Vidder.”

Problem: Employee Personal Devices Posed Additional Security Risks

The security team at a diversified global brand was tasked with managing employees access from personal devices across hundreds of offices globally. Preventing access from personal devices was not an option as worker efficiency was greatly enhanced with BYOD access. The team had very little control of the software running on their employee-owned devices, but still needed to maintain their network security while enabling access.

Solution: Trusted Access Control to Block Unauthorized Device Access

They deployed Vidder to provide users with precise access to specific applications based on role. Trusted Access Control allowed them to assure the identity of each user via transparent MFA, restrict access for the BYOD device to specific applications, and assess the trust state of unmanaged PCs. The result was secure BYOD access without requiring complete device control.