NPC Engineering Offers Enhanced VPN Solution for Android Devices
MOUNTAIN VIEW, CA: With the aim to provide secure VPN access to the employees, NPC engineering has come up with its new version of Secure Clients for Android. The Secure Clients software is linked to corporate networks remotely by using Android devices with the latest Android 6 “Marshmallow” operating system.
The revised Android IPSec VPN clients of NCP include features like support Challenge Response for 2-Factor Authentication. It also has the ability to modify that affect IKE and IPSec policies and the configuration of primary and secondary DNS servers.
“The new Marshmallow-compliant Android clients offer additional features and functionality for enterprises to deploy secure VPN access to remote IT resources,” points out Patrick Oliver Graf, CEO, NCP engineering.
In order to meet the needs of enterprises of all sizes, NPC engineering provides 4 unique Android Clients namely as- NCP Secure VPN Client, Premium Client for Android, Enterprise Android VPN Client for NCP SEM and NCP Secure Android Client Volume Edition for NCP Volume License Server.
NCP’s centrally managed Secure Enterprise Client for Android and NCP Secure Enterprise Management (SEM) system can be used in conjunction to assist network administrators to monitor complete network infrastructure from a single place. Beside Android, Search Engine Marketing is compatible with most of the major operating systems like Windows 10/8/7/Vista, OS X and Linux.
The firm’s Secure VPN Clients for Android finds compatibility with all common IPSec compatible VPN gateways, major communications and security standards including Internet Key Exchange (IKE) v1 and 2, split and full tunneling. Without having Android operating system as the rooting, VPN Clients works well with all essential business applications, including terminal-server and email clients. By blending VPN Clients and NCP’s VPN gateway, it retrieves license to Path Finder technology, ensures establishment of VPN connection in challenging firewall and proxy settings.
By John Kamin, EVP and CIO, Old National Bancorp
By Gregg T. Martin, VP & CIO, Arnot Health
By Dave Doyle, CIO & SVP, IT, Regal Entertainment Group
By Sergey Cherkasov, CIO, PhosAgro
By Adrian Mebane, VP-Global Ethics & Compliance, The Hershey...
By Mike Fitton, Wireless Business Unit Director, Altera
By Jim Kaskade, VP and GM, Big Data & Analytics, CSC
By Thomas Musgrave, EVP & CIO, AmeriCold Logistics
By Vin Sharma, Director, Strategic Planning & Marketing, Big...
By Federico Flórez, Chief Information & Innovation Officer,...
By Barbara Adams, VP, Innovative Technology Solutions, Texas...
By John Mason, CIO, Bottomline Technologies
By Jamshid Khazenie, CTO, USA Today Network / Gannett
By Miguel Gamino, CIO & Executive Director-Department of...
By Bill Schimikowski, VP, Customer Experience, Fidelity...
By Tom Bressie, Vice President, Oracle Cloud
By John Landwehr, Public Sector CTO, Adobe
By Aaron Gette, CIO, The Bay Club Company
By Denise Zabawski, CIO, Nationwide Children's Hospital
By Amit Bahree, Executive, Global Technology and Innovation,...