Welcome!

News Feed Item

HOB’s Remote Access Solutions Provide a Secure Alternative to File Sharing Services

The implementation of file sharing services has become increasingly common in the workplace. With file sharing capabilities, employees are able to access corporate resources to work collaboratively with others in multiple locations and on various devices. While enterprises benefit from their employees’ increased productivity and their employees enjoy better work-life balance, IT administrators must navigate around the increased security risks associated with file sharing services.

To satisfy employee demand, an increasing number of companies opt to use cloud file sharing services to enable employees to access corporate files on personal devices. While file sharing and remote access solutions both provide a mechanism to achieve remote working, the technology and security infrastructure are vastly different. Three conclusive security risks associated with cloud based file sharing are evident: the use of consumer-grade products, reliance on a third party data host and the lack of awareness of security protocols. HOB, the market leader in pure software-based remote access solutions, offers IT administrators an effective, convenient and reliable option that mitigates all of these security risks and provides additional benefits: HOB Remote Desktop Virtual Private Network (RD VPN).

The use of consumer-grade products for file sharing purposes is concerning to IT teams as these are designed for personal use and typically offer a lower level of encryption. Secondly, reliance on a cloud hosting company puts an enterprise at a disadvantage through the potential exposure of sensitive corporate data by employees or hackers. Subsequently, the use of third party cloud hosting strips in-house IT security teams of the ability to validate the stringency and efficacy of the security measures placed on enterprise data.

For IT administrators tasked with providing a highly secure and user friendly solution, HOB RD VPN is the ideal solution. This secure remote access solution uses a standard web browser to provide remote users access to web applications, file systems and the enterprise network. As HOB RD VPN does not require the installation of client software on the end user's computer, it can be used to access centrally stored files from anywhere and with almost any device.

Additionally, HOB RD VPN eliminates the risks associated with outsourcing sensitive practices to a third party. Instead, corporate resources remain stored in a secure corporate data center with strictly controlled access. Subsequently, this grants IT teams visibility and authority over who is permitted on a network, which increases their ability to detect and expose security threats.

As the workplace continues to evolve and mobile working gains prevalence, HOB RD VPN is the most secure and highly scalable communications mechanism for secure data transmission. The security standard of HOB RD VPN was just recently accredited by the German Federal Office for Information Security which certified HOB RD VPN according to the Common Criteria Evaluation Assurance Level 4+. Not only does it offer secure, convenient remote access to users, HOB’s proprietary SSL implementation “HOB–SSL” is a simple, safe and effective way to facilitate IT teams’ ability to enforce security policies and minimize risks, while enabling access to enterprise data.

To learn more about the benefits of HOB’s remote access solutions, download the free e-book, “How VPNs Help Providing Secure Mobile Workplaces”.

For additional information and news online, HOB offers many opportunities to stay up-to-date. Find more information on secure remote access, mobile working, cloud computing and IT security on the HOB Trendtalk Blog, Google+, Facebook and Twitter.

About HOB, Inc.

HOB, Inc. is a fully owned subsidiary of HOB GmbH & Co. KG. It was founded in New Jersey in April 2000 and is currently headquartered in Hawthorne, NY. HOB GmbH & Co. KG is a German medium-sized company, developing innovative and multiply rewarded software solutions that are marketed worldwide. The core competencies of the successful company HOB, founded in 1964, comprise server-based computing, secure remote access, VoIP and virtualization. HOB products are deployed in small, mid-sized and large enterprises. Further, some HOB products are certified according to Common Criteria. HOB remote access solutions received the quality mark from TeleTrust “IT Security Made in Germany.”

More Stories By Business Wire

Copyright © 2009 Business Wire. All rights reserved. Republication or redistribution of Business Wire content is expressly prohibited without the prior written consent of Business Wire. Business Wire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
Get deep visibility into the performance of your databases and expert advice for performance optimization and tuning. You can't get application performance without database performance. Give everyone on the team a comprehensive view of how every aspect of the system affects performance across SQL database operations, host server and OS, virtualization resources and storage I/O. Quickly find bottlenecks and troubleshoot complex problems.
Regulatory requirements exist to promote the controlled sharing of information, while protecting the privacy and/or security of the information. Regulations for each type of information have their own set of rules, policies, and guidelines. Cloud Service Providers (CSP) are faced with increasing demand for services at decreasing prices. Demonstrating and maintaining compliance with regulations is a nontrivial task and doing so against numerous sets of regulatory requirements can be daunting task...
Without a clear strategy for cost control and an architecture designed with cloud services in mind, costs and operational performance can quickly get out of control. To avoid multiple architectural redesigns requires extensive thought and planning. Boundary (now part of BMC) launched a new public-facing multi-tenant high resolution monitoring service on Amazon AWS two years ago, facing challenges and learning best practices in the early days of the new service. In his session at 19th Cloud Exp...
"We build IoT infrastructure products - when you have to integrate different devices, different systems and cloud you have to build an application to do that but we eliminate the need to build an application. Our products can integrate any device, any system, any cloud regardless of protocol," explained Peter Jung, Chief Product Officer at Pulzze Systems, in this SYS-CON.tv interview at @ThingsExpo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
The cloud promises new levels of agility and cost-savings for Big Data, data warehousing and analytics. But it’s challenging to understand all the options – from IaaS and PaaS to newer services like HaaS (Hadoop as a Service) and BDaaS (Big Data as a Service). In her session at @BigDataExpo at @ThingsExpo, Hannah Smalltree, a director at Cazena, provided an educational overview of emerging “as-a-service” options for Big Data in the cloud. This is critical background for IT and data professionals...
Internet of @ThingsExpo has announced today that Chris Matthieu has been named tech chair of Internet of @ThingsExpo 2017 New York The 7th Internet of @ThingsExpo will take place on June 6-8, 2017, at the Javits Center in New York City, New York. Chris Matthieu is the co-founder and CTO of Octoblu, a revolutionary real-time IoT platform recently acquired by Citrix. Octoblu connects things, systems, people and clouds to a global mesh network allowing users to automate and control design flo...
You are moving to the Cloud. The question is not if, it’s when. Now that your competitors are in the cloud and lapping you, your “when” better hurry up and get here. But saying and doing are two different things. In his session at @DevOpsSummit at 18th Cloud Expo, Robert Reeves, CTO of Datical, explained how DevOps can be your onramp to the cloud. By adopting simple, platform independent DevOps strategies, you can accelerate your move to the cloud. Spoiler Alert: He also makes sure you don’t...
President Obama recently announced the launch of a new national awareness campaign to "encourage more Americans to move beyond passwords – adding an extra layer of security like a fingerprint or codes sent to your cellphone." The shift from single passwords to multi-factor authentication couldn’t be timelier or more strategic. This session will focus on why passwords alone are no longer effective, and why the time to act is now. In his session at 19th Cloud Expo, Chris Webber, security strateg...
"We are an all-flash array storage provider but our focus has been on VM-aware storage specifically for virtualized applications," stated Dhiraj Sehgal of Tintri in this SYS-CON.tv interview at 19th Cloud Expo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
The WebRTC Summit New York, to be held June 6-8, 2017, at the Javits Center in New York City, NY, announces that its Call for Papers is now open. Topics include all aspects of improving IT delivery by eliminating waste through automated business models leveraging cloud technologies. WebRTC Summit is co-located with 20th International Cloud Expo and @ThingsExpo. WebRTC is the future of browser-to-browser communications, and continues to make inroads into the traditional, difficult, plug-in web co...
Redis is not only the fastest database, but it has become the most popular among the new wave of applications running in containers. Redis speeds up just about every data interaction between your users or operational systems. In his session at 18th Cloud Expo, Dave Nielsen, Developer Relations at Redis Labs, shared the functions and data structures used to solve everyday use cases that are driving Redis' popularity.
Enterprise IT has been in the era of Hybrid Cloud for some time now. But it seems most conversations about Hybrid are focused on integrating AWS, Microsoft Azure, or Google ECM into existing on-premises systems. Where is all the Private Cloud? What do technology providers need to do to make their offerings more compelling? How should enterprise IT executives and buyers define their focus, needs, and roadmap, and communicate that clearly to the providers?
Amazon has gradually rolled out parts of its IoT offerings, but these are just the tip of the iceberg. In addition to optimizing their backend AWS offerings, Amazon is laying the ground work to be a major force in IoT - especially in the connected home and office. In his session at @ThingsExpo, Chris Kocher, founder and managing director of Grey Heron, explained how Amazon is extending its reach to become a major force in IoT by building on its dominant cloud IoT platform, its Dash Button strat...
"We are a custom software development, engineering firm. We specialize in cloud applications from helping customers that have on-premise applications migrating to the cloud, to helping customers design brand new apps in the cloud. And we specialize in mobile apps," explained Peter Di Stefano, Vice President of Marketing at Impiger Technologies, in this SYS-CON.tv interview at 19th Cloud Expo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
Complete Internet of Things (IoT) embedded device security is not just about the device but involves the entire product’s identity, data and control integrity, and services traversing the cloud. A device can no longer be looked at as an island; it is a part of a system. In fact, given the cross-domain interactions enabled by IoT it could be a part of many systems. Also, depending on where the device is deployed, for example, in the office building versus a factory floor or oil field, security ha...