Top of Page

Links to move inside this page.

  1. HOME
  2. Business
  3. IIJ Flex Mobility Service/ZTNA

IIJ Flex Mobility Service/ZTNA

About the Service Overview

The IIJ Flex Mobility Service/ZTNA provides VPN services. We have made the biggest problems with conventional VPN services, namely sluggish operation and constant disconnections, a thing of the past. This service provides fast access from anywhere in support of diversified working styles. This service can even support applications that require real-time connection, such as Web meetings, conference calls, and virtual desktops.

This service features NetMotion Mobility® used by over 3,500 companies worldwide as the core engine.

Service Features

Work from Anywhere with the Same Speed and Availability as Internal Workstations

Communication tools such as Microsoft Teams cannot be fully utilized with unstable, low-quality VPN networks that result in delays and packet loss.

The IIJ Flex Mobility Service/ZTNA provides VPN services that stay connected, for the optimal realtime communication. Users can enjoy the same responsive and stable connections at off-site locations as they do in the office.

Stable VPN Connections Reduce User Stress

VPN connections stay connected until the user terminates the connection. This reduces the stress of users associated with conventional VPN services.

Automatic VPN Connectivity

Active Directory can be used for authentication. This enables automatic establishment of VPN connections in the background, just like with OS logons.

No More Reconnecting

VPN connections are not lost even when signal reception is poor or during temporary periods of inactivity. Users never need to reconnect.

Connect via Optimized Routes

VPN is enabled/disabled for each application automatically without user awareness. Connections are established in accordance with policies configured by administrators.

Secure Utilization of Extensive Management Features

User Device Authentication

Various device information including the device ID is retrieved. In addition to Active Directory-based user authentication, devices themselves can be authenticated. Access to internal systems can be prevented until allowed by an administrator.

Network access control

Administrators can create policies based on network conditions. In addition to addresses and ports, administrators can define access points, interfaces, schedules, and other parameters. Connection rules for individual user groups can be centrally managed.

Split tunneling

This service also allows management of per-application VPN connection policies. The service can be configured to allow only applications specified by administrators to connect over VPN without having to modify the applications.

(Japanese text only)

End of the page.

Top of Page