Questo sito utilizza i cookies

Secure Access is Oplon Networks' answer to replace dangerous VPNs, guarantee secure access to Web services, Linux / UNIX and Windows machines and thus prevent the intrusion and spread of viruses in data centers and corporate networks. Secure Access can be used from any device and without installing any client, just use any web browser to have access to all the services available.

DVI
REMOTE DESKTOP

Metodo di autenticazione che richiede a un utente di fornire almeno due fattori di verifica per poter accedere a un sito web, a un'applicazione o a una risorsa.

MFA

Metodo di autenticazione che richiede a un utente di fornire almeno due fattori di verifica per poter accedere a un sito web, a un'applicazione o a una risorsa.

PAM

Componente dell'Identity and Access Management che si occupa di proteggere, controllare, monitorare e gestire le attività privilegiate sulle risorse IT

ZTNA

Soluzione di sicurezza IT che fornisce accesso remoto sicuro alle applicazioni, ai dati e ai servizi di un'organizzazione in base a criteri di controllo degli accessi chiaramente definiti.

UNIFIED WORK SPACE

Unified workspaces prevede un'esperienza di lavoro digitale coerente e contestuale, consente l'accesso alle applicazioni e ai dati indipendentemente dal tempo e dal luogo.

VDI
REMOTE DESKTOP

Work environment that allows employees to access an organization's applications and services from anywhere
Metodo di autenticazione che richiede a un utente di fornire almeno due fattori di verifica per poter accedere a un sito web, a un'applicazione o a una risorsa.

MFA

An authentication method that requires a user to provide at least two verification factors in order to access a website, application or resource.
Metodo di autenticazione che richiede a un utente di fornire almeno due fattori di verifica per poter accedere a un sito web, a un'applicazione o a una risorsa.

PAM

A component of Identity and Access Management that deals with protecting, controlling, monitoring and managing privileged activities on IT resources.
Componente dell'Identity and Access Management che si occupa di proteggere, controllare, monitorare e gestire le attività privilegiate sulle risorse IT

ZTNA

An IT security solution that provides secure remote access to an organisation's applications, data and services based on clearly defined access control policies.
Soluzione di sicurezza IT che fornisce accesso remoto sicuro alle applicazioni, ai dati e ai servizi di un'organizzazione in base a criteri di controllo degli accessi chiaramente definiti.

UNIFIED WORK SPACE

Access your remote desktops via a browser. Control any Linux or Windows machine and access the file system natively.
Unified workspaces prevede un'esperienza di lavoro digitale coerente e contestuale, consente l'accesso alle applicazioni e ai dati indipendentemente dal tempo e dal luogo.

GATEWAY

RAG - Remote Access Gateway
WAG - Web Access Gateway

Simple and robust architecture

OSA architecture is simple, it aims to guarantee safety and privacy to your data while fully respecting every GDPR policy.
Moreover, the solution is built to counteract the most modern cyber-attack, which often resorts to AI in order to violate Cloud systems, putting at risk the confidentiality of your information. The virtual appliance OSA lives inside your perimeter, making no difference if it’s in-cloud, on-premises or hybrid-cloud based. It will grant you full ownership over your data without the risk of it being disclosed externally. With Oplon Secure Access, safety is granted by using just and only the browser, it doesn’t require neither the use of VPNs, nor the installation of plugins or extensions, letting you forget exhaustingly endless calls with the help desk for connection problems. From today, thanks to OSA, you can connect to datacenters in simplicity while maintaining the highest level of protection.

Fig. Oplon secure Access Architecture

REMOTE DESKTOP

Access your remote desktops via the browser. Control any Linux or Windows machine and natively access the file system.

Access your remote desktops via the browser. Control any Linux or Windows machine and natively access the file system.

WEB APPLICATIONS

Protect all your company's web applications and services with Multi-Factor Authentication.

Protect all your company's web applications and services with Multi-Factor Authentication.

SSH SERVICE

Your remote shell on the browser. Access all your machines via SSH and perform file download and upload operations.
Your remote shell on the browser. Access all your machines via SSH and perform file download and upload operations.
Secure Access is Oplon Networks' answer to replace dangerous VPNs, guarantee secure access to Microsoft Windows and Linux / UNIX machines, Web services (PHP/.NET ....) and thus prevent the intrusion and spread of viruses in data centers and corporate networks.
Secure Access can be used from any device and without installing any client, just use any web browser to have access to all the services available.

SIMPLE AND EASY TO USE

SIMPLE AND EASY TO USE

Title Arrow
Watch these short videos to discover how easy it is to use Oplon Secure Access:

File Managing operations in full

Create, move, rename and delete any files and folders within the browser without external applications

Online File Editor

With OSA you can edit files directly within your browser.

HyperCopy File Transfer

Moving files between machines is super easy, just use the HyperCopy feature, built into the File Manager menu.

SSH Broadcast Mode

Scrivi contemporaneamente su più shell evitando di ripetere più volte gli stessi comandi su più macchine.

MAIN FEATURE

MAIN FEATURES

Title Arrow

Access Rights

The operator will have access to a set of resources predetermined by a figure called Manger. These resources can be grouped in logical contexts such as the network topology, or they can be grouped by service areas such as e-commerce, restricted areas. This allows you to authorize the user with a specific profile, from the beginning, exclusively to a set of applications of his competence, applying the criteria of the Zero Trust Architecture and to revoke it when they are no longer needed, avoiding leaving "doors open". It also facilitates the understanding of the infrastructure, simplifies its maintenance as much as possible and avoids authorization errors.

Copy and Paste

The 'copy' and 'paste' function has been carefully studied to guarantee the same experience of the tools normally used up till now. For the copy operations it is sufficient to select the desired text, while the paste is activated with right click (or from the keyboard using CTRL + Shift + V). All this takes place without enabling the clipboard reading, giving Secure Access maximum security.

Upload and Download (File management)

Upload and Download have been made simple and contextual. Just select the File Manager icon of the relevant session to open a menu that will allow you to browse the file system, upload files with a simple 'Drag and Drop' and download files remotely, locally. Simplicity and security, all transfers and all operations are tracked on the centralized database available to Managers.

Usability and Accessibility

The layout of the work sessions on the web browser is aided by the Layout Manager which allows you to tile the windows. The operator is able to increase his productivity by organizing the workspace as he sees fit and switching from one context to another with a click, with the facilitation of zooming and resizing added to applications for which they are not natively available. Oplon Secure Access provides the same usability that the browser also makes available for Windows / Linux interfaces. To increase the characters just press CTRL + and to decrease them CTRL –

Multi-Factor Authenication

Oplon Secure Access include una piattaforma MFA ad alta sicurezza, l’utente è identificato in maniera sicura con un secondo fattore di autenticazione a scelta tra App per smartphone (Apple/Android) con riconoscimento biometrico, la più sicura oggi esistente sul mercato, oppure tramite email.

HOW TO REPLACE A VPN

HOW TO REPLACE A VPN

Title Arrow

0

Scenario with a VPN

Datacenter

1

Migration to Oplon Secure Access

Datacenter

2

New scenario with Oplon Secure Access

Datacenter

WHY USE OPLON SECURE ACCESS

WHY USE OPLON SECURE ACCESS

Title Arrow

1

NO POSSIBILITY OF VIRUS OR RANSOMWARE TRANSMISSION

No VPN that connects the operator directly to the data center. With Oplon Secure Access, security is guaranteed by default by using the browser.

2

NO INSTALLATION AND/OR MAINTENANCE OF VPN CLIENTS AND SERVERS

With Oplon Secure Access, the only client you need to use is your favorite. The operator will not have to install anything, making the help desk operations less expensive.

3

INABILITY TO DISCLOSE LOGIN AND PASSWORD

Login and password must no longer be disclosed to administrators and end users. Oplon Secure Access takes care of access, both in protected internal WEB services, Remote Desktop and Consoles with remote shell, in a centralized and authenticated manner for any user. The credentials remain protected, access can also be timed, or assigned and revoked by the administrator.

4

TRACKING OF ALL OPERATIONS FOR ANY USER

Oplon Secure Access performs a total and unmodifiable tracking of operations performed by the user, including file upload/download operations. This allows, for example, to be complaint with the GDPR regulations regarding root or administrative access of Linux/Unix devices.

5

INABILITY TO USE TOOLS NOT CONTROLLED OR AUTHORIZED BY CORPORATE

For the external connection, operators often use third party products that do not provide any guarantees, often saving the credentials. With Oplon Secure Access it is enough to simply use the browser and only remember the access password, that is that of the multi-factor authentication. The credentials safe remains secure and not accessible within the company system.

ALREADY OUR CUSTOMER?

We're ready to help, whether you need support, additional services, or answers to your questions about our products and solutions. For support, please follow the link below.
SUPPORT REQUEST

ANY QUESTIONS?

We can answer any questions you may have, provide product demos, and find the perfect solution for you.

* required fields
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.