InstaSafe® – Next-Gen Trusted AccessInstaSafe® – Next-Gen Trusted AccessInstaSafe® – Next-Gen Trusted AccessInstaSafe® – Next-Gen Trusted Access
  • Home
  • Products
    • INSTASAFE® SECURE ACCESS
      • InstaSafe® Secure Access
      • MPLS Failover
      • AD Connect +
    • INSTASAFE® CLOUD ACCESS
      • InstaSafe® Cloud Access for AWS
      • InstaSafe® Cloud Access for Microsoft Azure
      • MultiCloud Peering Solution using ICA
      • Hybrid Infrastructure Connectivity
      • Site to Site Connectivity
  • Solutions
    • SOLUTIONS BY USE CASE
      • MPLS Failover
      • AD Connect +
      • InstaSafe® Cloud Access for AWS
      • InstaSafe® Cloud Access for Microsoft Azure
      • MultiCloud Peering Solution using ICA
      • Hybrid Infrastructure Connectivity
      • Site to Site Connectivity
    • SOLUTIONS BY INDUSTRY
      • FSI
      • Bank
      • ITES
      • Logistics
      • Retail
      • Travel
      • Government
  • Resources
    • Resources
    • Blog
  • Partner
  • Company
    • About
    • Team
    • Newsroom
    • Careers
    • Contact
  • SAFEHATS
    • SafeHats Login
  • Sign In
    • EMM Login

Securely Connect Multiple Sites using ICA

InstaSafe® Cloud Access Ensures Secure Connection between Multiple Sites

Traditional VPN Solutions are Highly Unsecured

In the modern age, businesses don’t work out of just one place. They are spread across multiple site locations to help serve the customers better. In such a scenario, the easiest way to interconnect two or more site locations is to use a traditional VPN. However, little do the businesses know how unsecured such a set up is. While it does the job of connecting the places, it leaves the complete network exposed to the internet for easy exploitation. For instance, it requires Inbound firewall rules for several ports, which makes the network vulnerable.

Existing-Solutions-are-Too-Complex

InstaSafe® Cloud Access (ICA) – The Ultimate Multisite Connection Solution

InstaSafe® Cloud Access (ICA) provides a point-and-click solution for connectivity between multiple site locations. ICA not only ensures that the connectivity is established, but it also secures the data in transit using AES encryption. Further, it also takes care of the security of the network resources at each of the locations.
ICA uses a virtual gateway, to easily connect the locations via its global backbone and comes with features like granular access control, device binding, AES encrypted tunnel, etc. You can then eliminate SD-WAN branch appliances and MPLS links and dramatically simplify deployment and management.

How Does ICA Work?

  • ICA Controller (IC): The ICA Controller determines which ICA Hosts can communicate with each other. The Controller may relay information to external authentication services such as attestation, geo-location, and/or identity servers. The Controllers are connected to the appropriate optional authentication and authorization services (e.g., PKI Issuing Certificate Authority service, device attestation, geolocation, SAML, OpenID, OAuth, LDAP, Kerberos, multifactor authentication, and other such services)

  • Initiating Hosts (IH): Initiating ICA Hosts (IH), communicate with the ICA Controller to request a list of Accepting Hosts (AH) to which they can connect. The Controller may request information such as hardware or software inventory from the IH before providing any information.

  • Accepting Hosts (AH): By default, an AH rejects all communication from any of the hosts except the ISA Controller. The AH accepts connections from an IH only after instructed to do so by the Controller.

  • The ICA Controller also instructs the AHs to accept any optional policies required for encrypted communications.

  • The IH initiates a Single Packet Authentication to each authorized AH. It then creates a mutual TLS connection to those AHs.

 

Start your trial and discover why InstaSafe® is loved by our customers

START FREE TRIAL

Benefits of ICA Multisite Connection Solution

Centralized Single Pane Management

InstaSafe® provides you a single, simple, effective and intuitive web-based console to manage the provisioning of users and the access control to the applications. The ICA Controller automates the deployment and network configuration of ICA gateways in the clouds, making connectivity across public cloud services extremely easy.

Not Network, but Application Access

InstaSafe® only allows the user to access the applications that are specifically allowed in the security policy. As there is no open network for the user, unintended or malicious access to the rest of the infrastructure is blocked.

Greater Productivity

InstaSafe® is a cloud delivered service, thereby removing the need to monitor any appliances for upgrades, patches and maintenance on the organization’s part. This leads to greater productivity for the employees and IT team.

Faster Implementation

With a simple 5-step implementation process, InstaSafe® can be up and running in your cloud environment in a matter of minutes. Remote devices can be easily set up using emails, drastically simplifying the implementation process and shrinking timelines even across remote inaccessible locations

Pay-As-You-Grow

InstaSafe® is a cloud-based subscription service which does not need any up-front capital expenditure in expensive or obsolete hardware appliances. InstaSafe gives you the ability to upscale or downscale your licenses as per your requirements whenever you need them, thereby providing flexibility and agility.

The Security Benefits that Come Along

Data Encryption: 128/256-bit AES
Identity Based Granular Application Access Control
Multi-Factor Authentication - Password + OTP (Optional)
Password-Less Authentication Using InstaSafe Managed PKI Certificates
Device Binding to The User (Optional)
Host Checks to Ensure User Device is Compliant with Corporate Policies
Unified Password Complexity Management Ability
Specify Temporary or Permanent access
Make All Devices Compliant with Active Directory® Policies
Push Other Directory Services like LDAP, Radius, SAML, etc. to All Devices

Get a Demo of InstaSafe® Cloud Access

Request for a demo and understand more about our solution and how it can help your business secure.

GET A DEMO

Let's Work Together

Whether you’re a local or national business, big brand or high profile celebrity, we’ve worked with
them all – we can help you get where you want to be.

All field are required

Copyright © 2012-2019 InstaSafe® Technologies. All Rights Reserved | Privacy Policy | Security Page
  • Home
  • Products
    • INSTASAFE® SECURE ACCESS
      • InstaSafe® Secure Access
      • MPLS Failover
      • AD Connect +
    • INSTASAFE® CLOUD ACCESS
      • InstaSafe® Cloud Access for AWS
      • InstaSafe® Cloud Access for Microsoft Azure
      • MultiCloud Peering Solution using ICA
      • Hybrid Infrastructure Connectivity
      • Site to Site Connectivity
  • Solutions
    • SOLUTIONS BY USE CASE
      • MPLS Failover
      • AD Connect +
      • InstaSafe® Cloud Access for AWS
      • InstaSafe® Cloud Access for Microsoft Azure
      • MultiCloud Peering Solution using ICA
      • Hybrid Infrastructure Connectivity
      • Site to Site Connectivity
    • SOLUTIONS BY INDUSTRY
      • FSI
      • Bank
      • ITES
      • Logistics
      • Retail
      • Travel
      • Government
  • Resources
    • Resources
    • Blog
  • Partner
  • Company
    • About
    • Team
    • Newsroom
    • Careers
    • Contact
  • SAFEHATS
    • SafeHats Login
  • Sign In
    • EMM Login
InstaSafe® – Next-Gen Trusted Access
  • Contact Us

  • Free Trial

  • Social Share

    Facebook Twitter Google+