• 10.harddisk.jpg
  • 20.jpg
  • 30.keys.jpg
  • 40.mobile_phone.jpg
  • 50.padlock.jpg


The best network and access control security defense is off course a layered security approach with security zones that provide granular control for groups and users, defining access, authorization and strong authentication of ID Control for different information security levels. ID Control supports many VPN through Radius support, through a centralized remote dial-in strong authentication service, in the ID Control Server and for other we provide authentication agents.

ID Control supports with its’ strong affordable and easy authentication solutions and integrates out of the box with the following vendors and solutions: Astaro, Barracuda Networks, Cisco, Citrix, Fortinet, Microsoft, Palo Alto Networks, Securepoint, Web Applications (PHP, Java, .net, ColdFusion, etc.)  and Zarafa.

Go to top