RemoteWorkForce ZTN
Introducing Remote WorkForce ZTN. The first true Zero Trust solution
Designed specifically for Small and Medium-sized Businesses
Zero Trust IT Security
Easy To Install
Easy To Administer
Easy To Use
Low Cost
What is Zero Trust?
Zero Trust is a security protocol that assumes any user, asset, or resource is untrustworthy and must be verified and continually evaluated before access is granted.
The best way to understand the Zero Trust concept is to contrast it with early LANs (Local Area Networks). Basically, LANs connect everyone in an organization to all printers, servers, applications, etc. Firewalls kept intruders out, but once on the network, you were trusted. Then, various IT security approaches (passwords, access control lists, etc.) were imposed to protect sensitive apps and data. Over time, the IT security infrastructure became more and more complex – but breaches, nonetheless, frequently occurred.
Zero Trust starts from a completely different perspective. Access is granted to each specific application, not to the entire network. Other resources on the network are not even visible, therefore they are inherently protected.
Zero Trust is a fundamental paradigm shift in IT security. The concept originated in 2003. Gartner, Forrester and even Google began to promote it around 2010. It has now achieved wide-spread acceptance. There is even a Presidential Directive requiring government agencies to adopt the Zero Trust model.
There are several major Zero Trust products on the market, but these were designed for large scale organizations and are too cumbersome and expensive for most SMBs. But SMBs need the same protection!
At Private Communications Corp. (PCC), we studied the Zero Trust specifications from the NIST (National Institute of Standards and Technology) and the Cloud Security Alliance. We designed our product to meet these requirements, but right-sized for typical needs of SMBs.
Remote WorkForce ZTN
Our Zero Trust Network (ZTN) is built upon the solid foundation of our Remote WorkForce VPN. Remote WorkForce VPN is a modern, cloud-based VPN which can replace legacy LANs, with superior features:
Designed for Work-From-Anywhere. Remote WorkForce VPN automatically establishes a secure, encrypted connection to protect corporate communications from anywhere, whether employees are at home, in a coffee shop, or on the road.
Built for Distributed Computing. In today’s environment, corporate IT resources may be:
- Inside the office LAN
- On a cloud-based network (AWS, Azure, GCP)
- SaaS applications (Salesforce, etc.)
Remote WorkForce VPN provides end-to-end encryption for all IT resources, without requiring back-hauls through the LAN for resources in the cloud. Routing to the appropriate network is handled automatically, simplifying access for users.
Remote WorkForce ZTN provides a true Zero Trust layer on top of our VPN. Employees only have access to IT resources that they are specifically authorized to use. Other corporate resources are not even visible and any unauthorized attempts to access them are blocked.
Both our VPN and ZTN are highly secure, using 256-bit encryption, Multi-Factor Authentication, and malware filtering. Both include reporting to enable managers to know when an employee is working and what they are doing online.
How it works
An administrator in the organization first enters the following information:
- Users (name, email address, group)
- Networks (LANs, AWS/Azure/GCP, SaaS providers)
- Resources (apps, websites, virtual desktops).
Each resource is designated for access only by certain group(s) or all groups.
When users are registered, they automatically receive an email instructing them to install a small app on their device(s). (It’s easy.) No other changes are necessary. When the device is opened, the user is automatically connected and authenticated via email address, password and device ID. Devices are tightly controlled by Multi-Factor Authentication.
Users can continue to access resources as they have in the past (bookmarks, etc.) or can use a simple menu of authorized resources which Remote WorkForce ZTN provides. In either case, routing to the correct network is automatic:
A software Gateway is installed on each network, behind the firewall. The Gateway automatically establishes an outbound connection through the firewall (no open port is necessary).
When the user requests a resource, Remote WorkForce ZTN checks to see if that user is authorized. If so, an end-to-end encrypted tunnel is established to that resource – and only that resource. No other corporate resources are even visible, and any unauthorized access is blocked by the Gateway.
- User on a device requests a resource on some network, such as a LAN.
- VPN server notifies the Controller that the request is being made.
- The Controller checks the rules to see if that user is authorized to access that particular resource.
- If so, the Controller notifies the Gateway of the user’s request.
- The Gateway establishes a secure, outbound connection back to the VPN server.
Sign Up for a free 30 Day Trial
$9.99 per device.
Press Releases
- Private Communications Corp. Unveils Enhanced Security Measures: Malware Filtering Integrated into Private WiFi VPN and Remote WorkForce ZTNANEW YORK, NY – JANUARY 22, 2024 – Private Communications Corp. takes a significant leap… Read More
- Private Communications Corporation Releases Survey Results on Remote Workers and Public Wifi Usage in 2023NEW YORK, NY March 27, 2023 – Private Communications Corporation recently surveyed 200 Americans about… Read More
- Private Communications Corporation Proudly Announces the Release of Remote WorkForce ZTNNEW YORK, NY – March 20th, 2023 – Private Communications Corporation is pleased to announce… Read More
- Private Communication Corp. Launches Innovative VPN Capabilities for Today’s Distributed Computing EnvironmentRemote WorkForce VPN is an affordable, easy-to-use VPN for SMBs, designed for work-from-anywhere employees using… Read More
- Private Communication Corp. to release Private Label Cloud VPN for the remote/hybrid SMB workforceRemote WorkForce VPN assures advanced private-label cloud-based VPN solution that ensures military-grade encryption to SMBs… Read More
- Private Communications Corporation Launches Software to Protect Consumer Data Transmitted over Unencrypted Public Wifi NetworksMerchants Information Solutions, Inc., a leading data breach risk management and identity theft solution provider… Read More
- Private Communications Corp. Launches Video Optimization Service to Help Mobile Customers Squeeze the Most from their Plans and to Help MVNOs Pay Less to CarriersNEW YORK, NY Private Communications Corporation (PCC), the leading provider of Internet security and mobile… Read More
- Private Communications Partners with FreedomPop’s New UNREAL Mobile Spin OffFirst mobile service to include free VPN privacy features, Data Compression And Ad Blocking Services…. Read More
- Private Communications Corporation and Trinity Mobile Networks Announce Partnership to Provide Seamless Wifi and Cellular Connectivity to Wireless Operators and ConsumersFOR IMMEDIATE RELEASE PRIVATE COMMUNICATIONS CORPORATION AND TRINITY MOBILE NETWORKS ANNOUNCE PARTNERSHIP TO PROVIDE SEAMLESS WIFI… Read More
- Private Communications Corporation Unveils DataCompress for Android, Reduces Mobile Data Consumption by up to 50%Mobile Data Compression Application Available in the Play Store Today NEW YORK, NY–(Marketwired – Mar… Read More
Articles
- Key Insights on ZTNA: An MSP’s PerspectiveManaged Service Providers (MSPs) play a critical role in helping businesses stay protected against cyber… Read More
- Moving Beyond VPNs and Firewalls: The Next Step for SMB SecurityFor years, small and medium-sized businesses (SMBs) have relied on a familiar set of tools… Read More
- The Hidden Dangers of Free VPNsIn an era where online privacy is paramount, Virtual Private Networks (VPNs) have become indispensable… Read More
- The State of Cybersecurity for Small and Medium Sized BusinessesIn today’s digital age, cybersecurity is a critical concern for businesses of all sizes. However,… Read More
- 3 Misconceptions About Protecting SMBsIn today’s digital age, small and medium-sized businesses (SMBs) face significant cybersecurity threats that can… Read More
- Man Arrested for Stealing Information from Fake WiFi HotspotsIn today’s hyper-connected world, free WiFi hotspots are everywhere, offering a convenient way to stay… Read More
- Navigating Remote Work: Best Practices for SMBs In the modern landscape of business, the paradigm of remote work has firmly established itself… Read More
- Fortifying SMBs: The Imperative of Zero Trust Network Access (ZTNA)In today’s digital landscape, where cyber threats loom large and small businesses are increasingly becoming… Read More
- Why ZTNAs Make Perfect Sense for SMBs: Securing Remote Access in Today’s WorldIn the rapidly evolving landscape of remote work, cybersecurity has become more critical than ever… Read More
- Navigating the Horizon: 2024 Trends in Remote WorkIn the ever-evolving landscape of the professional world, remote work has emerged as a transformative… Read More