We have looked at solutions that are purely based within the teleworker's domain, but we are also taking the view that some organizations of the larger variety may wish to impose server-based network and system security solutions on their remote users.
From the teleworker's viewpoint, if these products are centrally installed and the end result is easy to use and secure then it will have achieved its objective, but that is not to say it will be the only required security solution for the user to contend with. Here we look at a means to provide strong authentication and have a secure file transfer system in place.
SSH Secure Shell for Workstations is the client-side application of SSH Secure Shell (see our March internet security Group Test) and basically sits on your employee's machine so that while they are teleworking all communications between the office are secure.
SSH Secure Shell for Workstations works both in the Windows and Unix environment and when ordering the software you can choose your preferred OS. It provides transparent authentication and encryption and enables files to be transferred securely to and from your server.
The workstation GUI is both intuitive and easy to use. This will encourage your users to perform secure file transfers by drag-and-dropping files to and from the remote server, making it the most simple of tasks.
Users also benefit from interoperability with PKI and RSA SecurID, which they may already be familiar with. Of course, many end-users are not that IT literate, but this solution really is easy to use. Once installed, which entails following the online prompts, it is ready to roll.
The Windows version of SSH Secure Shell for Workstations 3.2 is bundled with SSH Accession Lite. This provides the authentication agent, which gives easy and efficient authentication methods using public-key cryptography, and does not require a password.
For the organization that has both the need for solid security and flexible working this solution is going to sit well on the administrator's wish list. It is a practical and highly scaleable system of authentication using powerful encryption. It also offers, for those larger and more distributed companies, a choice of several languages for their users.
From the end-user perspective easy to use and navigate.
It lacked documentation in paper form on this occasion, although we know that this is usually of a high standard.
A solid and worthwhile approach to remote authentication for both user and organizational data security.