Skip to main content

Remote access for research and education

Teachers have always done some of their work at home. Whereas in the past documents were brought home in bulky briefcases, today relevant documents are processed directly on a home PC with a remote data access.

However, this is not the only area in which third-party devices require access to the school or administrative network. Data protection and IT security play a particularly important role when dealing with personal data, research results and other sensitive data.

Workflow for research and education:

Application scenarios of research and education:

Teachers in home office

Exam questions, reports and exam results are just a part of the data requiring special protection.

A virus scanner on a private PC can no longer provide sufficient protection against Trojans. It is much safer to never store sensitive data on private devices and to access the school network remotely from an encapsulated environment over a private WLAN.

School and university students

Bring-your-own-device has become standard practice in many schools. Time and again, these devices spread malware into the school network, which, if detected at all, requires considerable effort to remove. 

It is preferable to boot these devices from an encapsulated environment that ensures 100% separation between private and educational use.

Research groups

Scientists are routinely the target of espionage attacks, especially in the area of new technologies leading to patent applications.

Scientists working at home need to take appropriate technical measures to protect their work from being accessed and read by third parties.

External training

Many companies and institutions rely on off-site facilities for training on new software products.

An installation- and configuration-free solution providing access from any PC to the applications in the facility significantly reduces expenses for external training centers.

Long-term sick leaves

Depending on the condition of course, long-term sick leaves do no longer have to prevent students from attending courses.

When installing the appropriate technical capabilities, a secure authentication must be part of the access solution.

Distance learning

Secure authentication is particularly important for students participating in distance learning courses.

Furthermore, the education carrier wants, of course, appropriate measures preventing multiple access usage. 

School management and administration

Be it overtime or tackling the issue of work-life balance, there is a growing need to access data and applications from home.

However, there are frequently not enough financial resources to purchase the required number of notebooks.

In such cases, solutions are needed that allow the use of private devices and meet the highest security requirements. A 100% separation of private and professional use of the PC is of utmost importance.

The right solution for any requirement

Secure Boot Stick CL ist übergroß vor aufgeklapptem Macbook platziert

Secure Boot Stick CL

Hardened ECOS Secure Linux operating system

All software on the stick

2-factor authentication w/ software certificate

Integrated firewall

Central management

Abbild von silbernem Secure Boot Stick HE

Secure Boot Stick HE


  Hardened ECOS Secure Linux OS

  All software on one stick

  2-factor authentication w/
     software certificate

  Integrated firewall

  Central management

  Hardware-encrypted security

  2-factor authentication w/
     hardware anchor

BSI-approved

Produkt Nahaufnahme des Secure Boot Stick FX

Secure Boot Stick SX


  BSI-approved for VS-NfD,
     EU and NATO RESTRICTED

  Highly secure VS-NfD access w/
     genua genuscreen

  Sealed stick environment

  Extra hardened ECOS Secure Linux

  Multi-factor authentication w/
     smartcard

  Keypad for PIN entry

  Central management and remote
     updating

Are you looking for more information? Do you have any questions?

We are looking forward to your message!