SECURE CONTRACTOR ACCESS

Give contractors an easy, secure and cost-effective access to your IT systems on their own device.

why awingu for contractoRS?

No need to buy and manage hardware for your contractors. No need to spend time installing complex agents or clients on devices that are not under your control. Thanks to Awingu, your contractors can work on your applications, desktops and file shares through the browser of their own device in full security.

No desktop agents of clients to install or manage

Users can access applications, desktops and files via their browser. Just authenticate with the built-in Awingu MFA and get started. This also means getting a lot less support tickets, and you don’t need to take any risks accessing a device that is not owned or managed by your IT department.

Secure usage without local data, and granular usage control

Contractors access your IT systems via a device that is not under your control. And that’s fine. Nothing is running locally on their device, they only access these systems they have the right to access, and  you can block things like copy/paste and printing.

Fully audited, incl. optional recording

Your contractors can access confidential data? No problem, Awingu offers a built-in usage audit. You’ll have a log on what systems were accessed when. You can optionally even record full sessions for full visibility.

Cost-effective BYOD

Why buy hardware for your contractors? They probably already have a device anyway. With Awingu, you can reduce up to 44% on your End-user Computing for contractors.

Context-Aware access

Limit access to your systems for your home countries? That’s perfectly possible with Awingu’s context-awareness.

We were looking for a tool capable of making parts of our IT available to our subcontractors, while maintaining the necessary data security requested by our purchasers. We were instantly surprised by the features offered by Awingu, especially since it met all our budgetary constraints.

Alexandre Delhom (IT Manager, SUD AERO) Tweet

EXPLORE REFERENCE CUSTOMERS THAT USE AWINGU FOR CONTRACTORS

DEPLOY IN 3 SIMPLE STEPS

Set up Awingu in your backend

Install the Awingu virtual appliance in the cloud of your choice (private, public or hybrid) and plug in your existing infrastructural components such as your AD, application and file servers, etc.

+/- 2 hours

Upload and activate your license keys

Once your environment is ready and you want to go live, you can convert your Awingu product keys into the Awingu license via our end-user license activation portal and upload it to the appliance.

1 minute

Roll out and inform your users

Inform your users about the existence of the digital workplace and instruct them on how to set up their multi-factor authentication and how they must use Awingu via the Awingu User Guide.

5 minutes

READ OUR BLOG POSTS

BYOD and Awingu reduce end-user computing TCO with 44%

A study performed by Awingu shows that combining Awingu and a sensible BYOD policy can save you up to 45% in end-user computing costs. Even if BYOD is not your default policy for all employees, it’s worth investigating what user-groups can be equipped productively.

“FRIENDS DON’T LET FRIENDS USE VPN” – TECHNOLOGY MADE FOR THE NINETIES ISN’T SUITED FOR 2020

“Friends don’t let friends use VPN.” I read this claim in a blog post by Matthew Sullivan (whom I give all creative credits) and was immediately sold into the line. In this blog post we’ll discuss why classic VPN (Virtual Private Network) solutions are not ‘good enough’ anymore for businesses to enable remote working and teleworking.

GET IN TOUCH!

Do you have any more questions about Awingu? Reach out to our Awingurus!

florien
Florien
mathieu
Mathieu