We specialize in Secure and Efficient

We are here to help with your most immediate needs.

Our Approach

Part of my role in managing Nth Labs is taking all of the lessons learned in the lab, and applying them to our production environment.  In preparing for the work-from-home paradigm shift, we found ourselves conducting an impromptu Remote Connectivity assessment.  I wanted to share with you the key questions that we asked ourselves, which ultimately lead our efforts in preparing for this uncertain time.

After a week of hardware shuffles and reboots, I am happy to report that I am feeling much better about our capability in keeping everyone connected.  Please take a moment to reflect these questions on your own environments.  You likely already know the answers.  If you don’t know the answers, or need help resolving them, please reach out to your friends at Nth Generation.


Be Safe and Best Wishes,

Lee Solomonson


Best Practice Questions

Does your VDI environment have enough capacity to support all of the additional users who historically were not remote users?
Do you have enough capacity in your VDI environment to continue in degraded mode?
Are firmware and patch levels up to date? (or, at least, current enough?
Given that physical access may become limited, can your team manage the infrastructure remotely?
What is your contingency plan if your VDI or production environment fails?
What is the security impact of VDI vs. Desktop-as-a-Services vs. VPN?
As you make changes to support both primary and contingency plans, are you possibly exposing any new security or reliability vulnerabilities?

6 Solutions

Tailored to Your Specific Needs

Virtual Private Networks


Virtual Desktop Infrastructure | Citrix


Desktop as a Service (DaaS)


Blackberry Desktop


Zero Trust Network Access




Whether you are expanding, strengthening, or at the starting line,

we provide solutions to your challenges.






A Consultative Approach

This text is fill in for the moment. We have immediate solutions, remote work kits and other urgent/immediate solutions. Its about your particular needs. We will come up with solutions what will augment, expand, or start from scratch. End to end solutions for those who are not set up for remote work at all. or can help expand existing remote work capability and we can help drastically improve security posture across any of these solutions for remote work. Assess, identify bandwidth needs and hep expand reinforce existing infra or set up to support an increased number of remote workers as needed.

Security for Remote Work

Security Posture Check

Are your teleworkers securely accessing your environment?

Have you ensured their wireless devices and home systems are appropriately protected?

​Nth Generation can conduct a remote 1-hour session with individuals to evaluate the posture of their endpoint device, as well as their WIFI configurations to document and provide guidance should remediation be necessary.

Endpoint Protection of Non-Corporate Devices Leveraging AI for optimal endpoint protection services

Are you using next generation AV?

Especially when individuals use their own devices it is important to mitigate the opportunity for infection. Nth Generation can rapidly roll-out Cylance managed services to ensure these devices do not infect your organization.

Phishing Tests & Training

Have you trained your employees proper email hygiene?

Attackers are using emergencies as an emotional way to get users to click. Test, train and reward your users by having Nth Generation conduct a Phishing exercise.

External Vulnerability Assessment of Remote Work Corporate Perimeter

Are you making changes to your perimeter to enable the additional teleworkers?

Ensure you haven’t accidentally exposed yourself to a growing number of cyber threats with our Rapid Vulnerability Assessment service.

MSSP Services

Are you secure 24/7?

With heightened telework, many organizations are concerned about the lack of 24/7 visibility into attacks. Our MSSP services can quickly provide 24/7 coverage.


Remote Worker VPN Solutions

Cradlepoint can provide remote VPN services with their NetCloud Perimeter license and/or with hardware appliances. Cellular capabilities are also a selling point.


  • Cradlepoint can use hardware or NCP clients. Subscription services start at $36 a year per person.

  • Cradlepoint has both Virtual and Physical Routers/Firewalls. Virtual Router is hosted in Amazon cloud to support up to 100 tunnels. Good for smaller deployments.

  • Hardware Routers support POE and Wi-Fi as well as cellular connectivity.

Aruba uses their Wireless Controllers to support IPsec VPN users.


  • Aruba does require a license on the controller for to terminate VPN users.

  • Aruba has both Physical and Virtual Controllers

  • Aruba has a VPN client called VIA which requires a license. No other capabilities like AV.

  • Aruba has hardware devices called RAP (Remote AP) which are used for remote users if hardware is needed. They are access points with 4 ethernet ports on them. These are going to be hard to get right now. Also, any IAP can be converted into a RAP so we can sell them as well. They don’t have any hardwired ethernet ports. These all need licenses on the controller.

Palo Alto uses their Firewalls to provide IPsec and SSL VPN access


  • Palo Alto requires a license to terminate VPN users called GlobalProtect

  • Palo Alto has both Virtual and Physical Firewalls.

  • Palo Alto uses the GlobalProtect client to support VPN users. No other capabilities like AV unless Traps is also purchased.

  • Palo Alto has small hardware firewalls for Work at Home. Some with Wi-Fi and POE.

Meraki uses their MX Security appliance to support L2TP only.


  • Meraki does not need an additional license, capacity is built into MX appliance

  • Meraki has both Virtual and Physical Firewalls. Virtual is only for Amazon and Azure.

  • Meraki uses the standard embedded client in Windows, Mac, iOS, etc. no client to install.

  • Meraki has small hardware firewalls for Work at Home. Some with Wi-Fi and POE.

Fortinet utilizes their FortiGate Firewalls to support both IPsec and SSL VPN users.


  • Fortinet does NOT require extra licenses to support VPN features, the capacity for user limits is built in.

  • Fortinet has both Physical and Virtual firewalls.

  • Fortinet has a client (FortiClient) that if only using the VPN features is free to use. If other features are required like Anti-Virus etc. then there is a license required along with setting up an EMS server.

  • Fortinet has small firewalls that can be used for remote workers if there is a requirement. For instance, if they have a desk phone that needs to be powered with POE or a printer that needs to communicate with the corporate network.

  • Another option is to use a FortiAP which is a wireless access point that can be used to setup an IPsec tunnel back to a Central FortiGate Firewall.

Cisco uses their ASA and Firepower Firewalls for IPsec and SSL VPN users.


  • Cisco requires a license to terminate VPN users called AnyConnect

  • Cisco has both Virtual and Physical Firewalls.

  • Cisco uses the AnyConnect client to support VPN users. No other capabilities like AV unless AMP for endpoints is also purchased. CISCO IS MAKING AVAILABLE FREE ANYCONNECT EMERGENCY LICENSE TO USE TEMPORARILY UNTIL JULY 1, 2020.

  • Cisco has small hardware firewalls for Work at Home. Some with Wi-Fi and POE.

Extreme Networks uses Hardware and Cloud Management instead of VPN


  • Cloud IQ Cloud managed router and Access Points.

  • Devices create a Secure tunnel back to DC using IPsec.

© Nth Generation Computing, Inc., 2018 - 2020. All Rights Reserved. 

  • White Twitter Icon
  • White Facebook Icon
  • White LinkedIn Icon
  • White YouTube Icon