Systancia, publisher of application virtualization and cybersecurity softwares and solutions A platform for accessing enterprise applications, on-premise or SaaS Systancia offers companies an access platform that secures the user in his or her work environment. The software suite provides an end-to-end chain of trust: access management, privileged access, virtual access and remote access. Systancia is the only publisher on the market to provide the end-to-end chain of trust. Systancia markets solutions for application virtualization (VDI)An access window to a remote desktop or applications. The virtualization of desktops or applications consists of displaying applications or a desktop on the user’s computer, which are installed or run on a group of machines remote and independent of the user’s computer. The user’s workstation is thus transformed into a simple access window. This group of machines (virtual or not) can be located in an internal corporate network or in the cloud. In the case of application virtualization, the user sees the virtualized applications on his own desktop like other applications. Virtualized applications are independent of the operating system on the user’s desktop. In the case of desktop virtualization (VDI Virtualisation Desktop Infrastructure), it is the user’s desktop with its applications that is virtualized. The virtualized desktop or virtualized applications are independent of the user’s operating system. The advantages of desktop virtualization include speed of execution (the user benefits from the power of remote machines), ease of use for the administrator who manages as many machines as they wish centrally, enhanced security, excellent overall cost, ease of managing updates, etc…., private network access (VPNVirtual Private Network. VPN is a technology that simulates a local area network between two trusted networks. In practice this allows two elements (workstations, servers, printers, etc.) to communicate with each other even though they are not physically located in the same computer network. Since communication between these two networks passes through a public network in most cases, VPNs incorporate security mechanisms to ensure that communication between the two networks cannot be intercepted by a third party to ensure confidentiality. This technology is very practical in the context of companies deployed in several locations that need to share computer resources, such as file sharing. For ease of use, this technology has been adopted by IT departments in cases where teleworking is used by considering the remote user’s workstation as an extension of the company’s computer network even though this workstation is not part of a trusted network…. – ZTNAZero Trust Network Access. The ZTNA is a name describing products that apply a “Zero Trust”, or lesser privilege, policy in the area of external access. The objective is to provide strictly indispensable access to an external user so that he can carry out the necessary tasks within the framework of his work without giving him superfluous rights or access that could represent a risk for the security of the information system. Access policies are defined according to : the identity of the user, possibly reinforced by two-factor authentication mechanisms, its connection conditions, such as its connection location or the health of the terminal used for the connection. The ZTNA makes it possible to give very fine and granular accesses to the information system differentiated according to the user, whether he is an internal teleworker or a service provider. This approach strongly limits the risks of intrusion or infection of the information system….), power user monitoring (PAMPrivileged Access Management. PAM is a technology for managing access and authentication of authorized users, usually information system administrators, to administrative resources or applications. The main objective is to secure the information system by removing unauthorized access to sensitive resources. This protection is based on two main axes: management of the injection and life cycle of passwords used in administered resources and administration applications, the traceability of all the actions carried out when connecting users with a power of nuisance on the information system, in the form of audit or video traces. The users with malicious power concerned by the PAM may be internal users of the information system, such as system administrators or users handling sensitive data, as well as external users such as infomanagers or remote maintenance personnel….) and identity and access management (IAM)A set of processes that manage a user’s identity on the network. Identity and Access Management (IAM) is the set of processes that manage a user’s identity on the network. It includes the following different segments: access management (AM), authentication, privilege account management (PAM), identity administration and governance (IGA). It is generally misused to refer to IGA. The functional scope of IAM is very broad. It will include functionalities allowing – to authenticate a user on the network (primary authentication), – manage its authorizations, the life cycle of its identity and the accounts associated with it, – to guarantee the traceability of his rights, as well as the actions carried out by/on him. To illustrate, the IAM makes it possible to simply assign the rights of a collaborator and to make them evolve according to his current situation. The fact that they belong to the company, and the function that determines their access authorization to certain applications, are taken into account in real time and integrated into the information system…. in different contexts of use: in the office, telecommuting, mobility and facilities management. Solutions & Use cases Regulatory compliance, GDPR and ANSSI recommendations Simplifying mobility, teleworking, outsourcing Management of work environments in a heterogeneous context Modernization and replacement Data protection and leakage prevention Find out how Systancia responds to its customers' problematics Cloud access platform Systancia Workroom The secure telecommuting solution in public cloud service (SaaS) Systancia Cleanroom PAM's public cloud service solution (SaaS) Software products :the Systancia chain of trust Virtual access (VDI) Our VDI product allows users to have a single window of access to their entire field of applications, thus reducing operating and maintenance costs. Systancia Workplace Immediate access to your virtual desktop and all your applications, on premise or cloud. Software products Privileged Access (PAM) Thanks to our PAM product, we can monitor the actions of users in power. They work confidently with their manager or security and compliance officer. Systancia Cleanroom Sterile and disposable virtual desktop for the administration of all your resources, on premise or cloud Software products Remote Access (ZTNA) With our ZTNA product, users on the go, telecommuting or managed services users can privately access their organization's applications with the additional protections required for mobility. Systancia Gate Private network access solution “zero-trust” certified by ANSSI (National Cybersecurity Agency of France). Software products Identity and Access Management (IAM) With our IAM products, we manage the identity and credentials of users and authenticate them transparently by rotating passwords behind the scenes. Systancia Identity Centralize and monitor user account and authorization management. Software products Systancia Access SSO authentication access control solution to make the access of applications simple and secure. Software products Success stories "AppliDis Fusion, now Systancia Workplace, allows us to provide access to applications both internally and externally via a web portal and with minimal impact on the client workstation, which has enabled us to deploy business applications on personal workstations". Victorien LazarusTechnical Service Manager Systancia represents years of continuous innovation and ingenuity for the benefit and service of our customers. And today, Systancia is the software publisher that wants to give a human face to the digital work environment, positioning technology in its right place. We are the only company to combine cybersecurity, virtualization and artificial intelligence to give users the control and confidence they deserve in their work environment. Because technology must always be at the service of people. Meeting the human challenge of the digital experience, our end, the end user!