LANCOM Trusted Access Client
LANCOM Trusted Access is the trusted network access security solution for enterprise networks. It enables secure and scalable access to enterprise applications for employees in the office, at home, or on the road, protecting modern hybrid working from anywhere, anytime. The LANCOM Trusted Access solution adapts to increasing security requirements in your organization and enables both cloud-managed VPN client networking for access to entire networks and the move to a Zero Trust security architecture for comprehensive network security. Based on granular access rights, users are only granted access to applications that have been assigned to them (Zero Trust principle). Existing systems for managing users and user groups (Active Directory) can be fully integrated into the LANCOM Management Cloud (LMC). For smaller networks, the LMC alternatively offers internal user management. LANCOM Trusted Access 100% GDPR compliant and scales for small businesses as well as for very large networks with several thousand users.
- Flexibly scalable secure network access solution for enterprise networks, that adapts to increasing security requirements
- Choice of granular access control to dedicated applications (Zero Trust principle) or entire networks (cloud-managed VPN client)
- Lateral protection from internal spread of malware in connection with micro-segmentation
- Migrates seamlessly into existing installations by integrating existing user databases in the company
- Endpoint security and multi-factor authentication for a high level of security
- Easy access to external cloud applications via single sign-on (SSO) without entering additional credentials
- Full integration into the LANCOM Management Cloud (LMC) for zero-touch deployment and auto-configuration for easy and fast rollout of new remote access connections
- 100% GDPR compliant – data traffic runs without decoupling via an external cloud
With access granted according to the Zero Trust principle “as much as necessary, as little as as possible“, the LANCOM Trusted Access Client protects networks from threats and their spread. This means: No blind trust based on successful network
access. The LANCOM Trusted Access Client allows access controls to be implemented at a very granular level (“software-defined perimeter“, SDP). This means that users can only access the applications and resources they need to perform their work, and that each access must be explicitly authorized.
Switching from classic VPN clients to a zero-trust model usually means a costly complete rebuild of a network‘s entire security architecture. However, this is not the case with LANCOM Trusted Access. LANCOM Trusted Access allows a direct transition to a Zero Trust security architecture, because this solution grows with your security requirements. Whether you need cloud-managed VPN client networking for wide-ranging network access or want to take the step to a comprehensive Zero Trust security architecture, LANCOM Trusted Access offers exactly the right configuration levels.
The LANCOM Trusted Access Client can optionally also be used as a cloud-managed VPN client, thus enabling the VPN connections of mobile employees to be managed securely and centrally. This means that configuration updates can be carried out easily and efficiently, or new users can be added or removed simply, without the need for an IT administrator or the end device to be physically on site. This convenient management coupled with transparent user monitoring via the LANCOM Management Cloud reduces your operating costs, as all of your company‘s VPN clients are centrally accessible at a glance.
Before a user is granted access, endpoint security can be verified (operating system version, anti-virus, local firewall). Each user must also have their identity verified before being granted access…
Before a user is granted access, endpoint security can be verified (operating system version, anti-virus, local firewall). Each user must also have their identity verified before being granted access to an application or resource. Applications and resources are not made visible network-wide, making the network invisible to attackers. Additionally, two-factor or multi-factor authentication with fingerprint, facial recognition, or an authentication app on the smartphone may be required at login.
User authentication is performed via a central user database (“identity provider“, e.g. an Active Directory such as Microsoft Entra ID (formerly Azure AD)). User groups taken over from the identity provider can be…
User authentication is performed via a central user database (“identity provider“, e.g. an Active Directory such as Microsoft Entra ID (formerly Azure AD)). User groups taken over from the identity provider can be provided with individual access rights to the permitted applications. The validity period of an authentication can be set, and clients can also be blocked manually or automatically. For small companies without a central user database, user management integrated into the LANCOM Management Cloud is available as an alternative.
The LANCOM Management Cloud (LMC) provides fully integrated management of all LANCOM network components (routers / gateways, firewalls, switches, and access points) including the LANCOM Trusted Access Client. The…
The LANCOM Management Cloud (LMC) provides fully integrated management of all LANCOM network components (routers / gateways, firewalls, switches, and access points) including the LANCOM Trusted Access Client. The management of the underlying security policies for all users in the network is also carried out centrally via the LMC. A LANCOM Trusted Access Real-Time Dashboard is available to administrators for comprehensive diagnostics and troubleshooting. The dashboard displays active connections with user name, IP address, device name, and user group, and provides additional information such as compliance status and last login. Furthermore, clients can be blocked both manually and automatically, information on the number of users and blocked connection requests is available, as well as central license management and monitoring.
The LANCOM Trusted Access Client handles the login processes for passwordprotected applications: Via single sign-on (SSO), users can access external web applications conveniently and securely after…
The LANCOM Trusted Access Client handles the login processes for passwordprotected applications: Via single sign-on (SSO), users can access external web applications conveniently and securely after logging on once to the Active Directory – without having to re-enter their credentials. This ensures particularly user-friendly and fast work processes.
The LANCOM Trusted Access Client and the LANCOM Management Cloud (LMC) are developed in Germany, and all cloud data is also hosted in data centers in Germany. Only the data exchange for user authentication takes place…
The LANCOM Trusted Access Client and the LANCOM Management Cloud (LMC) are developed in Germany, and all cloud data is also hosted in data centers in Germany. Only the data exchange for user authentication takes place via the LMC; all other user data runs directly between the LANCOM Trusted Access Client and the LANCOM Trusted Access Gateway – without decoupling via an external cloud. The LANCOM Trusted Access Client thus stands for the highest level of data security and data protection. It is subject to and complies with European legal standards, is therefore DSGVO compliant, and is a convincing IT security solution engineered in Germany.
In the comprehensive package of information materials, you can learn what makes LTA special and which current challenges LTA solves with the various expansion stages. Or learn everything you need to know about LTA directly from the source in an exclusive webinar. Register now for the live presentation by LANCOM CTO Christian Schallenberg!
LANCOM Trusted Access adapts to your desired security level and scales with your needs. For technical implementation, determine your appropriate LTA expansion level, use helpful tutorial videos, or benefit from a 30-day free LTA trial!
What matters in network security
An essential part of a company's IT infrastructure is ensuring network security. Used effectively, it reliably fends off unauthorized access, data manipulation, or data theft with blackmail, system paralysis (DDoS attacks), and other damage caused by hackers, malware, and viruses. Read more about what risks and threats lurk and what immediate measures you can take to maintain the security of your network.
Survey of modern network management
„When we talk about the future, we’re talking about the cloud. Migrating from on-premises to the cloud gives companies new opportunities to be faster, more costeffective, more flexible and more scalable. But what is the current situation with regard to network management in companies? What are the challenges users are facing? These questions, and others, are analysed and presented in the “Modern network management” study." techconsult study from 2022
Efficient site connectivity with maximum security with LANCOM SD-WAN
Traditional static and manually configured network infrastructures no longer meet the requirements for the highest network availability, maximum data security, and fast time-to-service requirements. On the other hand, a software-defined wide area network (SD-WAN for short) provides decisive advantages for the networking of companies with numerous sites.
Most questions can be resolved best in direct contact: We look forward to answering your questions and requests by phone or via the contact form.
Inside Sales International Team
+49 (0)2405 49936 122