SEP – Systancia Experience Portal
  • Home
  • My Systancia
    • Library
    • Showroom
    • Salesroom
    • Communityroom
    • Subscriptionroom
    • Marketplace
    • Classroom
    • Careroom
  • Cloudroom
You are here :
  • English
    • Français
    • English
  • Apps
  • My account
    • Login
    • Contact us
  • Menu principal
  • Login
  • Signup
  • Software Products
    • Identity and Access Management (IAM)
      • Systancia Access
        • Discover the product
        • Request a trial
      • Systancia Identity
        • Discover the product
        • Request a trial
    • Privileged Access (PAM)
      • Systancia Cleanroom
        • Discover the product
        • Request a trial
    • Virtual access (VDI)
      • Systancia Workplace
        • Discover the product
        • Request a trial
    • Remote Access (ZTNA)
      • Systancia Gate
        • Discover the product
        • Request a trial
  • Cloud services
    • Systancia Workroom
      • Systancia Workroom Session Service
        • Discover the service
        • Try for free
      • Systancia Workroom Desk Service
        • Discover the service
        • Request a trial
    • Systancia Cleanroom
      • Systancia Cleanroom Session Service
        • Discover the service
        • Try for free
      • Systancia Cleanroom Desk Service
        • Discover the service
        • Request a trial
  • Solutions and use cases
    • Telework
    • Regulatory compliance
    • “SaaSifying” Applications
    • Third party access (provider, ecosystem)
    • Replacing an existing solution
    • Agility of access management
    • Desktop or application virtualization
    • Access monitoring (traceability and access audit)
    • Digital Risk and Data Protection
    • The cloud as a lever
  • Customer Success
    • Customer Success
    • Training and certifications
    • Consulting and Support
    • Support, community and knowledge base
  • Partners
    • Business partners
    • Find a business partner
    • Technology partners
  • Events
    • Events
    • Webinars
    • Replays
  • Press
  • Blog
Skip to content
  • Software Products
    • Identity and Access Management (IAM)
      • Systancia Access
        SSO authentication access control solution to make the access of applications simple and secure
        • Discover the product
        • Request a trial
      • Systancia Identity
        Centralize and monitor user account and authorization management
        • Discover the product
        • Request a trial
    • Privileged Access (PAM)

      Privileged Access Management as a Service, an Enabler for Secure Business Operations

      Access the IDC Infobrief
      • Systancia Cleanroom
        Sterile and disposable virtual desktop for the administration of all your resources, on premise or cloud
        • Discover the product
        • Request a trial
    • Virtual access (VDI)
      • Systancia Workplace
        Immediate access to your virtual desktop and all your applications, on premise or cloud
        • Discover the product
        • Request a trial
    • Remote Access (ZTNA)
      • Systancia Gate
        Private network access solution “zero-trust” certified by ANSSI (National Cybersecurity Agency of France)
        • Discover the product
        • Request a trial
  • Cloud services
    • Systancia Workroom
      • Systancia Workroom Session Service
        The secure remote access portal for all your applications in any situation (telecommuting, mobility, on-call, outsourcing, services, etc.).
        • Discover the service
        • Try for free
      • Systancia Workroom Desk Service
        The secure remote access portal to your virtual desktops and all your applications in any situation ( telecommuting), mobility, on-call, outsourcing, services, etc.).
        • Discover the service
        • Request a trial
    • Systancia Cleanroom
      • Systancia Cleanroom Session Service
        Monitoring the access of empowered users and administrators to information system resources.
        • Discover the service
        • Try for free
      • Systancia Cleanroom Desk Service
        The sterile and disposable virtual administration office for monitoring access to information system resources by empowered users and administrators.
        • Discover the service
        • Request a trial
  • Solutions and use cases
    • Telework
      Facilitation de la mobilité, du télétravail, de l’infogérance Afin de s’adapter aux
      In order to adapt to new practices in terms of mobility, teleworking or outsourcing, companies and organizations must allow employees to access the information system from outside via a transparent user experience in terms of ergonomics and performance, while guaranteeing the security of access from an uncontrolled workstation or network....

      Read the use case

    • Regulatory compliance
      Conformité réglementaire, RGPD et recommandations de l’ANSSI La conformité aux
      Compliance with multiple regulations is sometimes perceived as a constraint, but it is nevertheless necessary to ensure an effective IS security....

      Read the use case

    • “SaaSifying” Applications
      « SaaSification » d’application
      Application virtualization allows organizations to make all their business applications available in SaaS mode....

      Read the use case

    • Third party access (provider, ecosystem)
      Accès extranet sécurisé / Expérience d’accès de l’écosystème
      To guarantee the adoption of users and the IT department, any IT solution must guarantee an optimal access and use experience while enhancing IS security and not be perceived as a constraint by the user....

      Read the use case

    • Replacing an existing solution
      Modernisation et remplacement
      Regardless of whether it is a matter of guaranteeing IT security, optimizing the work experience or simplifying application management, companies and organizations may need to modernize and replace their obsolete IT solutions which no longer provide the innovations required to meet the challenges of digital inclusion....

      Read the use case

    • Agility of access management
      Agilité organisationnelle et amélioration du processus de mouvement du personnel
      Employee movements (turnover, internal rotation, outsourcing and mergers-acquisitions) require that the IT department benefits from real agility in order to facilitate these movements and increase the level of IS security....

      Read the use case

    • Desktop or application virtualization
      Gestion des environnements de travail dans un contexte hétérogène
      Provide access to applications independent of the operating systems and devices used by an organization’s employees....

      Read the use case

    • Access monitoring (traceability and access audit)
      Gestion du risque digital / Audit interne et externe
      Information system security (ISS) is mainly based on the security of its weakest link, which is also the essential element: the human being....

      Read the use case

    • Digital Risk and Data Protection
      Protection des données et prévention des fuites
      Due to the growing amount of data within companies and organizations, and the fact that these data are sometimes sensitive, it is essential to protect them against any potentially devastating risk of leakage, as we are reminded daily by the press....

      Read the use case

    • The cloud as a lever
      the cloud as a lever
      For organizations, the cloud is a vector of flexibility and transformation of digital use, both for employees and the IT department. Contact us Photo credits : https://writix.co.uk Massively migrate the operating environment Today, IT departments must manage the rapid and asynchronous evolution of the various components of technologies such as server operating systems, applications, and workstations. Thus, server OSes progress at a different speed from the OS versions of the client devices, and an even different speed from business applications... Read More >>
  • Customer Success
    • Customer Success
    • Training and certifications
    • Consulting and Support
    • Support, community and knowledge base
  • Partners
    • Business partners
    • Find a business partner
    • Technology partners
  • Events
    • Events
    • Webinars
    • Replays
  • Press
  • Blog
SystanciaServices cloudSystancia WorkroomSystancia Workroom Session Service

Systancia Workroom Session Service

The secure teleworking solution

  • Try for free
  • Subscribe

Systancia Workroom Session Service

Systancia Workroom Session is a secure remote access solution enabling staff to access their work environment in complete control, in complete confidence, and in any situation (teleworking, mobility, on-call duty, outsourcing, services, etc.).

Try Systancia Workroom Session

Provided as a cloud service and based on Systancia Gate, formerly IPdiva Secure, certified by ANSSI, Systancia Workroom Session is a “ZTNA”, “zero trust network access” solution, implementing the principle of least privilege to secure users’ network access to their workstation (real or virtualized) and their applications (real or virtualized), wherever they are and whatever terminal they use (workstation/laptop, personal computer: BYOD/BYOPC).

The solution controls the integrity of the access terminal, controls access to applications in a granular way, and provides a single window of access to applications, even if they are deployed in multiple datacenters. The solution allows users to have a user experience similar to what they would have at the office or locally. It ensures enterprise security policy compliance through a unique set of features such as: a dual barrier and privacy tunnel between the user endpoint and the application connection, with outbound only flows without opening network ports; protocol disruption and filtering of user interactions that protect against malware; a “bring your own key” and dual key mechanism that ensures that only you have access to your data; and a “bring your own key” and “dual key” mechanism that ensures that only you have access to your data, even if it is deployed in multiple datacenters.

What needs does Systancia Workroom Session meet?

– Teleworking from corporate or BYOD/BYOPC workstations
– VPNVirtual Private Network. VPN is a technology that simulates a local area network between two trusted networks. In practice this allows two elements (workstations, servers, printers, etc.) to communicate with… More Risk
– Provider access to the most critical elements of your information system
– Traceability of remote accesses (who did what from where?)
– Regulatory compliance (RGPD, LPM/NIS, etc.)
– Migration of applications to the cloud
– Business continuity in a crisis context

Why deploy Systancia Workroom Session?

– ZTNAZero Trust Network Access. The ZTNA is a name describing products that apply a “Zero Trust”, or lesser privilege, policy in the area of external access. The objective is to… More vs. VPNVirtual Private Network. VPN is a technology that simulates a local area network between two trusted networks. In practice this allows two elements (workstations, servers, printers, etc.) to communicate with… More approach (granular access to applications and resources)
– Based on Systancia Gate, formerly IPdiva Secure, certified by the ANSSIAgence Nationale de la Sécurité des Systèmes d’Information. The National Cybersecurity Agency of France (ANSSI) is a French government organisation reporting to the Secretary General for Defence and National Security… More (French National Agency for Social Security)
– Multi-protocol: SSH, VNC, RDP, Web, with protocol disruption
– Multisite and multi-VLAN, with double barrier (outgoing flows only, no network port opening)
– Multifunction: access to servers, applications, workstations, networks, etc.
– Web experience/agent free mode or agent mode
– Strong authenticationPrimary or secondary authentication Authentication allows a user to guarantee his or her identity before accessing a resource or service. Primary authentication will give user access to the workstation (Windows… More (MFA) and integrated SSO
– Terminal integrity check
– Traceability of connections and accesses
– Double key, with your own key for data confidentiality

  • Subscribe
  • Try for free
  • Contact us
  • Datasheet
  • Register to a webinar
  • Success Stories
  • Experts opinions
  • Knowledge base
  • Consulting and Support
  • Training

These articles may interest you :

Cybersecurity Act
Cybersecurity

Cybersecurity Act : What’s going to change?

Blog

Soliloquy around a consistent monitoring approach

Comment sécuriser le BYOPC
Cybersecurity

How to secure the BYOPC?

Company
  • About Systancia
  • Vision and mission
  • #ingenuity
  • News
  • Work at Systancia
  • Contact us
Learning
  • Events
  • Training and certifications
  • Product datasheets
  • Expert opinions
  • Success stories
  • Systancia TV
  • Blog
  • Glossary
My Systancia
  • My Dashboard
  • My products Agreements
  • Submit a support case
  • Marketplace
  • Community
Subscribe to our newsletter
Follow the Systancia adventure!
  • L
  • T
  • F
  • Y
SEP – Systancia Experience Portal © Systancia
  • Sitemap
  • Legal Notice
  • Personal data
  • Personal data – forms
  • English
    • Français
    • English