NPC Engineering Offers Enhanced VPN Solution for Android Devices
MOUNTAIN VIEW, CA: With the aim to provide secure VPN access to the employees, NPC engineering has come up with its new version of Secure Clients for Android. The Secure Clients software is linked to corporate networks remotely by using Android devices with the latest Android 6 “Marshmallow” operating system.
The revised Android IPSec VPN clients of NCP include features like support Challenge Response for 2-Factor Authentication. It also has the ability to modify that affect IKE and IPSec policies and the configuration of primary and secondary DNS servers.
“The new Marshmallow-compliant Android clients offer additional features and functionality for enterprises to deploy secure VPN access to remote IT resources,” points out Patrick Oliver Graf, CEO, NCP engineering.
In order to meet the needs of enterprises of all sizes, NPC engineering provides 4 unique Android Clients namely as- NCP Secure VPN Client, Premium Client for Android, Enterprise Android VPN Client for NCP SEM and NCP Secure Android Client Volume Edition for NCP Volume License Server.
NCP’s centrally managed Secure Enterprise Client for Android and NCP Secure Enterprise Management (SEM) system can be used in conjunction to assist network administrators to monitor complete network infrastructure from a single place. Beside Android, Search Engine Marketing is compatible with most of the major operating systems like Windows 10/8/7/Vista, OS X and Linux.
The firm’s Secure VPN Clients for Android finds compatibility with all common IPSec compatible VPN gateways, major communications and security standards including Internet Key Exchange (IKE) v1 and 2, split and full tunneling. Without having Android operating system as the rooting, VPN Clients works well with all essential business applications, including terminal-server and email clients. By blending VPN Clients and NCP’s VPN gateway, it retrieves license to Path Finder technology, ensures establishment of VPN connection in challenging firewall and proxy settings.
By Chris Tjotjos, VP, Cisco Solutions Practice, Black Box...
By Laura Jackson, Sr. Manager-Risk Management, ABS Consulting
By Jason Cradit, VP of Information Systems, Willbros Group
By Steve Garske, Ph.D., Senior Vice President & Chief...
By Roman Trakhtenberg, CEO, Luxoft
By Renee P Wynn, CIO, NASA
By Mike Morris, CIO, Legends
By Louis Carr, Jr., CIO, Clark County
By Andrew Macaulay, CTO, Topgolf Entertainment Group
By Dominic Casserley, President and Deputy CEO, Willis...
By Dave Nelson, SVP-Portfolio Lead, Avanade, Inc.
By Michael Cross, SVP & CIO, CommScope Holding Company Inc.
By Pauly Comtois, VP DevOps, Hearst Business Media
By Dan Adam, CIO, Extreme Networks
By Matt Schlabig, CIO, Worthington Industries
By David Tamayo, CIO, DCS Corporation
By Scott Cardenas, CIO, City and County of Denver
By Marc Kermisch, VP & CIO, Red Wing Shoe Co.
By Brian Drozdowicz, VP, Digital Services, Siemens...
By Les Ottolenghi, EVP and CIO, Caesars Entertainment