parallels-awingu

Corel (now Alludo) Acquires Awingu to Accelerate Its Secure Remote Workspace Offering. Read more

SECURE VPN ALTERNATIVE

Why are you using technology built in the nineties to enable and secure your business in 2022?

Zero Trust security with Awingu

Awingu is a core enabler for your business to adopt a Zero Trust IT Security strategy. Based on some really simple principles, Awingu will significantly increase security for remote access. Awingu is especially powerful when combined with a BYOD policy.

Secure authentication as default

Awingu comes with a built-in MFA at no extra cost that is super easy to activate.

Context-Aware RESTRICTIONS

Define in what context what apps/file shares can be accessed by which users (e.g. block access to ERP from all foreign countries).

No local data

Awingu is built on a server-based computing concept. There is no data stored locally on the device.

Fully audited

All usage going through Awingu is audited and available to the platform admin.

Granular usage controls

Not all users are equal. With Awingu it’s easy to give user (groups) different rights (e.g. file sharing, copying & pasting, download to desktop, etc.).

Encryption over HTTPS

Traffic between the browser and the Awingu platform is encrypted over HTTPS. Awingu also provides a built-in SSL certificate service at no extra cost.

Dr. Chase “Zero Trust” Cunningham about why we should get rid of insecure VPN solutions

Awingu scales very easily in times of need

Remote access is not a static given. It requires scaling up and down. Awingu allows to be be scaled very quickly.

  • Hardware requirements to run Awingu are limited (up to 500 concurrent sessions can run on 1 VM with 8Gb and 8vCPU), and also bandwidth requirements are limited with approx 100kbps up/down per user (/session).
  • Awingu roll-out does not require any local installations on the end-user device. As such, it does not create a big workload for your IT ops & support organization.
  • Awingu can be (securely) rolled-out to device that are not owned or managed by the IT department. This saves the time (and cost) to acquire new laptops in a time of peak demand.

DOWNLOAD OUR WHITE PAPER

"Zero Trust: what, why and how"

chase

Written by

Dr. Chase "Zero Trust" Cunningham

ZT whitepaper v1.6

Not only does VPN require a client to connect to the end users’ devices (who are not always tech-savvy enough to set it up effortlessly), but you are digging a tunnel to our environment. Awingu makes us feel comfortable about what happens to our data, and vice versa. Because Awingu works 100% through the browser, I know that I can make Awingu available to everyone, without fearing that my environment will be contaminated by what might be on the user’s device."

EXPLORE REFERENCE CUSTOMERS THAT USE AWINGU TO REPLACE VPN

DEPLOY IN 3 SIMPLE STEPS

Set up Awingu in your backend

Install the Awingu virtual appliance in the cloud of your choice (private, public or hybrid) and plug in your existing infrastructural components such as your AD, application and file servers, etc.

+/- 2 hours

Upload and activate your license keys

Once your environment is ready and you want to go live, you can convert your Awingu product keys into the Awingu license via our end-user license activation portal and upload it to the appliance.

1 minute

Roll out and inform your users

Inform your users about the existence of the digital workplace and instruct them on how to set up their multi-factor authentication and how they must use Awingu via the Awingu User Guide.

5 minutes

READ OUR BLOG POSTS

ZERO TRUST: THE NEW NORMAL

Zero Trust (ZT) is probably one of the most talked-about topics, terms, or buzzwords on the cybersecurity market today. If you have attended any conference across the globe in the last 2 years in the cyber circuit, it is highly likely that you have run across this Zero Trust “thing”. But what is Zero Trust? Where did the concept and idea originate and why should we be inundated with this onslaught of Zero Trust shenanigans?

“FRIENDS DON’T LET FRIENDS USE VPN” – TECHNOLOGY MADE FOR THE NINETIES ISN’T SUITED FOR 2020

“Friends don’t let friends use VPN.” I read this claim in a blog post by Matthew Sullivan (whom I give all creative credits) and was immediately sold into the line. In this blog post we’ll discuss why classic VPN (Virtual Private Network) solutions are not ‘good enough’ anymore for businesses to enable remote working and teleworking.

GET IN TOUCH!

Do you have any more questions about Awingu? Reach out to our Awingurus!

Jacqueline
🇪🇸
Jacqueline
tasneem vSquare_small
🌎
Tasneem
This website uses cookies. Read our transparent cookie policy!