Today, the minimum security and compliancy requirements for any business are far beyond the adoption of anti-virus and a firewall.
Assure your IT environment and confidential data is securely stored behind a strong authentication and not just a simple login and password. These are too easy to break. With Multi-factor authentication, you authenticate with something you know (your password), something you have (e.g. a token generated key) and something you are (your login name).
Encrypting data you send over the public internet is an absolute minimum. Chances for non-encrypted data to be fetched and abused are real. All traffic should be covered in HTTPS, where the ’s’ stands for secure. Practically, it often comes down to using an ‘SSL certificate’. This is based on an asymmetric system with two ‘keys’ to encrypt communications: a ‘public’ key and a ‘private’ key.
Knowing where your sensitive data is also means getting control over shadow IT. All too often, IT departments reduce employee flexibility that much (e.g. sharing of large documents by email) that employees will reside to alternative paths: Gmail, WeTransfer and this is where businesses lose track of their (confidential) data.
Since May 2018 all businesses in the European Union must comply with GDPR. But also beyond the EU, similar regulations are in place or on their way. GDPR goes far beyond IT, but IT will be required as a supporting and enabling role.
Built-in into Awingu comes a ‘one-time password’ generator that can be coupled with the ‘Google Authenticator’ app on a smartphone. Awingu also offers built-in integration with ’Let’s Encrypt’ a free SSL certificate service. Other MFA services can be integrated, and so is the use of own SSL certificates.
Awingu runs inside the browser. As such, there is no local data on the device (if you don’t want to). This is obviously a big benefit from a security and compliancy point of view.
Awingu can aggregate legacy apps, SaaS and documents. All logins are routed via Awingu. Furthermore, Awingu offers built-in the ability to share documents (that includes large ones) in a secure and controlled way.
Awingu will give a real-time and historical view on who has opened what application, when and where. Anomaly detections in usage behavior are furthermore reported and flagged.
Smart online workspace will optimize the user-experience based on the users’s context, e.g. push a mandatory “strong authentication”when logging in from outside the company network
Awingu enables users to work from anywhere, on any device. Aside from being easy to use and optimizing efficiency, IT Security Experts such as Jan Guldentops also praise Awingu for its security measures. With Awingu, you only have one front door – and you hold the key.
As a ‘total supplier’, EYE4U not only delivers the necessary hardware (camera’s, server towers, etc.) and installation, but also the surveillance software that allows their customers to monitor their system. They chose Awingu as an added and highly secure layer to connect with that software, together with the added benefit of providing access to their surveillance system from any device.
As a unified workplace solution, Awingu covers many angles. Authentication is one of them. In this blog post, we’ll zoom into Awingu as a platform that enables Single-Sign-On authentication to legacy systems instead of Awingu as a ‘workspace’ platform.
Expectations of our “workspace” are evolving. The age-mix of businesses is shifting with a much bigger concentration of ‘millennials’. A study from PWC suggests 50% of the global workforce will be constituted of millennials. These millennials bring whole new expectations in flexibility, mobility, and BYOD – and these come on top of the overall business dynamics in the 21st century, resulting in the adoption of cloud services, AI-based. In parallel, businesses are constantly under pressure of cyber attacks.Clearly, the way we secured our business and workspaces yesterday, will not be suitable for tomorrow (or today). It will require a new mix of tools and way of working.
Did you just buy something online via a new e-commerce shop? Or maybe you tried an online service for photo manipulation? The explosion of services on the internet has been a game changer for over 4 billion people on Earth, and it keeps growing rapidly. But each of these services as a simple question: please sign-up. Choose a login and password. This is where our brain gets challenged. What password should I use? Shall I make a new one? Shall I re-use the one I already have in use? I think you already know which one’s more popular.
In an in-depth investigation into the IT security of Belgian companies, Awingu was able to identify 8.803 organizations that run a high risk of hacking. We did specific research on IP addresses that were connected to unprotected Remote Desktop Servers (based on the Remote Desktop Protocol). Microsoft’s RDP is a very popular server-based computing technology, but in its bare form, it offers insufficient protection. By implementing Awingu on top of RDP, you can greatly reduce the security risk of your IT environment.
Given FTP is ‘free’ it was also widely adopted by businesses in the past. Today, many businesses still use FTP to exchange files with contractors, customers, etc. Where FTP software might be free, and cheap storage can be used in-house or in the public cloud, the consequences of a lack of security can be very, very vast.
Do you have any more questions about Awingu? Reach out to our Awingurus!