How to Ensure Compliance
Highly-encrypted access
Choose between our streaming or client solution for user access to deployed desktops and software applications, depending on requirements. Both technologies are a more secure and simpler alternative to cumbersome VPNs.
- With streaming, data is not processed on uncontrollable end user devices
- Enable secure bring-your-own-device (BYOD)
- Eliminate the need for additional endpoint management software
- Client solution for strongly latency-sensitive applications and users
Zero Trust Architecture (ZTA)
Best practices in IT security: The oneclick™ platform is based on the principles of a Zero Trust Architecture. This means that no user who wants access to resources or services in the network is trusted. Every access, whether from outside or inside, is reliably authenticated.
- Logging in to a cloud portal with our streaming solution or via a client on the end device
- Your choice: Share only resources for maximum system hardening or individual network segments
- When accessing via streaming, users do not know where they are in the network
- Continuous checking of trust status during a user session
Security policies and identity provider
With the help of policies, you can additionally secure sensitive applications. To authenticate users, you can use third-party identity services in addition to the oneclick™ login. For this purpose, oneclick™ supports the OpenID Connect and OAuth2 standards.
- Authorize / restrict access from specific IP addresses
- Add SMS or TOTP as second factor
- Allow login with Azure AD, Okta, XignSys or other identity providers
- Flexible use of groups