Whether you are expanding, strengthening, or at the starting line, we provide work-from-home solutions tailored to your current environment and specific needs.
Remote Work Offerings
Our Nth Generation account team is simply customer focused. They bring a sense of urgency to the table. They inspire us to really stretch our capabilities across the organization. They are with us throughout -- to help us solve business problems.
Mac Avancena, CIO, Kern County ITS
Security for Remote Work
For more security offerings, visit:
The benefit for us is Nth Generation allows me to focus on my business, allows me to focus on my customers --
knowing they are my partner in helping me solve technology issues.
Mac Avancena, CIO, Kern County ITS
Remote Work Architectures
FULL TUNNEL
VIRTUAL PRIVATE NETWORKS
If an endpoint is infected with Ransomware / Malware it could spread and encrypt files within the corporate network as well. In contrast, a VDI instance isolates the client from the corporate environment, thus mitigating it's ability to infect the organization.
Cost: $
Deployment Time:
FAST
from 1 to a few days
PROS
-
Enables corporate network security countermeasures to inspect all traffic coming from the endpoints.
-
No shipping dependency (for virtual appliance).
-
Generally only requires a license to add additional users.
CONS
-
All traffic may cause network congestion.
-
Endpoints can directly infect the corporate network.
CAVEATS
-
If additional internet bandwidth is required, the lead time by the ISP must be taken into account.
-
Endpoint posture checking can ensure endpoint has appropriate countermeasures in place before being allowed onto the network.
ENDPOINT REQUIREMENTS:
VPN Client Software
CORPORATE REQUIREMENTS:
Next Gen Firewall or VPN Gateway
(Physical or Virtual)
SPLIT TUNNEL
VIRTUAL PRIVATE NETWORKS
If an endpoint is infected with Ransomware / Malware it could spread and encrypt files within the corporate network as well. In contrast a VDI instance isolates the client from the corporate environment thus mitigating it's ability to infect the organization.
Cost: $
Deployment Time:
FAST
from 1 to a few days
PROS
-
Minimizes bandwidth usage.
-
No shipping dependency (for virtual appliance).
-
Only requires a license generally to add additional users.
CONS
-
Does not have visibility to what the user does on the Internet.
-
Endpoints can directly infect the corporate network.
CAVEATS
-
There are incremental technologies to address security split tunnel vulnerabilities at the corporate network, such as: corporate proxies, open DNS, etc.
ENDPOINT REQUIREMENTS:
VPN Client Software
CORPORATE REQUIREMENTS:
Next Gen Firewall or VPN Gateway
(Physical or Virtual)
ON-PREMISE VDI
VDI instances isolate the client from the corporate environment thus mitigating its ability to infect the organization.
Cost: $$$
Deployment Time:
MEDIUM TO LONG
from a few days, to a few weeks
PROS
-
Isolates the potentially infected client from infecting the company.
-
Helps minimize data loss.
-
Low latency as virtual desktops and applications are in the same corporate network.
CONS
-
Requires compute, network, and storage, therefore may result in potential delays in shipping.
-
Time intensive implementation.
CAVEATS
-
Configuration in VDI can allow users to attach local disk to VDI. Without this, users may use shadow IT to conduct work.
ENDPOINT REQUIREMENTS:
VDI Client or Browser
CORPORATE REQUIREMENTS:
VDI Infrastructure (e.g.: VDI Licenses, Compute, Network, & Storage)
DESKTOP AS A SERVICE
(DaaS)
A VDI implementation hosted at a datacenter of a cloud provider such as Ntirety or AWS.
Cost: Subscription $$$
Deployment Time:
FAST TO MEDIUM
from a few days, to a few weeks
PROS
-
Quickly deployed. No requirement for hardware acquisition.
-
Isolates the potentially infected client from infecting the company.
-
Helps minimize data loss.
-
Low latency as virtual desktops and applications are in the same corporate network.
CONS
-
A secured strong connection is required between the cloud provider and the corporate network (i.e.: VPN, SDWAN or dedicated circuit).
CAVEATS
-
Configuration in VDI can allow users to attach local disk to VDI. Without this users may use shadow IT to conduct work.
Nth Generation takes the approach of wanting to help us in the areas we are asking. A lot of companies will come in and tell us about their products and try to force-fit them into what we’re doing. Nth actually listens.
Jim DiMarzio, CIO, Toyo Tires