NPC Engineering Offers Enhanced VPN Solution for Android Devices
MOUNTAIN VIEW, CA: With the aim to provide secure VPN access to the employees, NPC engineering has come up with its new version of Secure Clients for Android. The Secure Clients software is linked to corporate networks remotely by using Android devices with the latest Android 6 “Marshmallow” operating system.
The revised Android IPSec VPN clients of NCP include features like support Challenge Response for 2-Factor Authentication. It also has the ability to modify that affect IKE and IPSec policies and the configuration of primary and secondary DNS servers.
“The new Marshmallow-compliant Android clients offer additional features and functionality for enterprises to deploy secure VPN access to remote IT resources,” points out Patrick Oliver Graf, CEO, NCP engineering.
In order to meet the needs of enterprises of all sizes, NPC engineering provides 4 unique Android Clients namely as- NCP Secure VPN Client, Premium Client for Android, Enterprise Android VPN Client for NCP SEM and NCP Secure Android Client Volume Edition for NCP Volume License Server.
NCP’s centrally managed Secure Enterprise Client for Android and NCP Secure Enterprise Management (SEM) system can be used in conjunction to assist network administrators to monitor complete network infrastructure from a single place. Beside Android, Search Engine Marketing is compatible with most of the major operating systems like Windows 10/8/7/Vista, OS X and Linux.
The firm’s Secure VPN Clients for Android finds compatibility with all common IPSec compatible VPN gateways, major communications and security standards including Internet Key Exchange (IKE) v1 and 2, split and full tunneling. Without having Android operating system as the rooting, VPN Clients works well with all essential business applications, including terminal-server and email clients. By blending VPN Clients and NCP’s VPN gateway, it retrieves license to Path Finder technology, ensures establishment of VPN connection in challenging firewall and proxy settings.
By Michael Cockrill, CIO, State of Washington
By Brett Shockley, SVP & CIO, Avaya
By Sven Gerjets, SVP-IT, DIRECTV
By Steve Moyer, VP of Storage Software Engineering, Micron...
By Michelle R. McKenna-Doyle, SVP and CIO, National Football...
By Patrick Hale, CIO, VITAS Healthcare
By Roman Trakhtenberg, CEO, Luxoft
By Julia Davis, SVP, CIO, Aflac
By Chris Westlake, VP & GM of Service,RK
By Pauly Comtois, VP DevOps, Hearst Business Media
By Yanni Charalambous, VP & CIO, Occidental Petroleum...
By Bob Brown, VP-Production & Operations, ONE World Sports
By Arthur Hu, SVP & CIO, Lenovo
By Ron Guerrier, CIO, Farmers Insurance Group, Inc.
By Scott Cardenas, CIO, City and County of Denver
By Kevin McCarron, Vice President Collaboration, Carousel...
By Marc Kermisch, VP & CIO, Red Wing Shoe Co.
By Christopher Frenz, AVP of Information Security,...
By Brian Drozdowicz, VP, Digital Services, Siemens...
By Les Ottolenghi, EVP and CIO, Caesars Entertainment