A global leader in the field of smart energy was looking for a better secure remote access solution to provide access to a sensitive and internal application and to replace the existing virtual private network (VPN). It was crucial that the new solution would ensure access for employees as well as third-parties, all without exposing the network and its assets to risk.
To improve productivity and more effectively leverage their remote workforce, the company wanted to enable their customer service and sales teams to securely access the internal application from anywhere, using any device — including unmanaged devices.
The required secure access solution had to include encryption, to address privacy concerns, and to ensure easy implementation with minimal impact on users and business operations.
Improve secure access of remote users
No encryption available
Internal access only
A secure access solution
Onsite and remote users
Managed and unmanaged device
Simple and risk-free implementation
Enhanced security
Secure access for employees WFH, partners and suppliers
Secure access from any device
End-to-end encryption
MFA and SSO
Unique privileged access management (PAM) rights
Session recording and supervised access
Full integration with active directory
Contextual data to improve forensics and investigations
10 minutes implementation and configuration process
Global implementation
Secure access to over 150 systems
~2000 diverse users
Complete visibility and control of access and usage
Improved user experience
Cyolo was ultimately chosen to provide the company’s mobile and remote workforce with safe and secure access to sensitive and internal applications, replacing its existing VPN. Following a 10 minute implementation and configuration process, the internal application system was published through the Cyolo broker, enabling access for every approved user without exposing the organizational network.
Balancing between security and user experience is always a challenge, and Cyolo was designed to ensure smooth self-service user enrollment and user login. Cyolo’s solution was fully integrated with the company’s active directory, which automatically set the access authorizations. In addition, Cyolo's multi-factor authentication (MFA) was set, and during onboarding, users are prompted with an MFA requirement. Once done, access is granted with a smooth single-sign-on (SSO) process.
To ensure secure external access, Cyolo added a protection layer that prevents malicious actors from exploiting the system's vulnerabilities and accessing data, and reduces the risk of cyber-attacks. Cyolo’s zero-trust secure access is based on the user ID and the device ID, and evaluates other factors that provide context to ensure dynamic, risk- based, accurate access. Cyolo ensures security, agility and productivity, without compromising business needs and without imposing on the users. Cyolo provides end-to-end encryption and at no stage is any data visible, or stored on Cyolo's cloud broker. All the sensitive data remains secure within the enterprise network. In addition, Cyolo provided unique privileged access management (PAM) rights to the company's administrators, while ensuring the organization data and sensitive assets safe, even in a case of a compromised admin account.
The successful implementation of Cyolo’s secure access solution and the impact of COVID-19 on business operations, led to the expansion of Cyolo’s solution in the organization. As more and more employees, partners and suppliers were sent to work from home, the company decided to use Cyolo to ensure secure remote access, using unmanaged devices, without giving access to the network and risking sensitive assets.
Cyolo is currently deployed globally, providing ~2000 onsite and remote users, including partners and third parties, fully encrypted secure access, to over 150 applications and servers. Admins have complete visibility and control, which they did not previously have. They have the ability to monitor every user and any device that access their systems with real-time alerts. When an anomaly or threat is identified, they have all the data and tools needed for context-based forensics and fast response. As a global leader in its industry, the company has quickly and securely adapted its business to the new post-2020 reality, reducing the risk of cyber threats and maintaining business agility.
- Company's CISO