iQuila Enterprise

The iQuila Enterprise server is a cutting-edge device that dramatically enhances the capabilities of iQuila Protocol between VEN clients and VEN servers. It establishes a direct, encrypted tunnel between the two points, ensuring complete data privacy and security.

iQuila Enterprise can create an overlay network in the same way as iQuila Cloud but iQuila Enterprise also allows an organisation to extend their existing network.

Additionally, the iQuila Protocol was designed to be clustered. Unlike existing VPN clustering solutions, the iQuila cluster functionality can be easily configured to support seemingly complex networks with millions of users.

What are the benefits of iQuila Enterprise?

Layer 2 Point-to-Point without a physical connection.

Until now, the only way to achieve true Layer 2 Point-to-Point was over physical networks.

There are various workarounds, such as L2TP, which tunnels L2 traffic over an IP network but this is not Layer 2 routing.

iQuila Enterprise delivers true Layer 2 Point-to-Point connections across the Internet, without the need for a physical connection, joining up your multiple server environments, allowing real-time protection and disaster recovery without the need for expensive physical connections.

In this respect iQuila Enterprise renders MPLS/Ethernet lines redundant.

Speed

iQuila Enterprise is one of the fastest remote connection solutions on the market, supporting up to 1Gbps-class high-speed throughput performance.

Clustering

The iQuila Protocol was designed to be clustered. Unlike existing WAN clustering solutions, the iQuila cluster functionality can be easily configured to support seemingly complex networks with millions of users.

Developed with organisational agility in mind, iQuila was designed to enable up to 64 high powered iQuila Enterprise servers in a single cluster that can be spread across multiple data centres, supporting up to 1024 clusters.

iQuila Enterprise gives you a reliable and robust solution that can handle millions of connections.

 

Security and control

iQuila connections are totally secure using TLS 1.2 with AES 256-bit and RSA 4096-bit encryption ensuring impenetrability to man in the middle (MITM) attacks.

iQuila Enterprise Client application allows complete connectivity control of your end point devices; the Kernel Mode Drivers allows the Client operating system to connect on boot up; enabling full Active Directory login, real time deployment of Group Policy and control of endpoint application access.

iQuila Enterprise allows for LDAP integration across all your connected sites/users.

Syslogs sending all system and user information to a 3rd party system for data processing and security auditing. Payloads can also be sent

Certificate based authorisation. Replacing the password authorisation with a certificate file to stop rogue logins in with username and password.

iQuila Enterprise server also supports older legacy protocols such as OpenVPN, IPsec, L2TP, MS-SSTP, L2TPv3 and EtherIP

 

Powerful policy management

iQuila Enterprise Policy Management enables full control of network traffic.

This means you can allow a specific system to access specific ports or protocols on the destination system.

Critical Infrastructure Protection

As access to and security of your company’s data becomes ever more important and demands on
uptime increase, it is essential that your data is protected, and that your recovery times are
short. iQuila Enterprise enables full real-time protection for your infrastructure.

iQuila delivers full Layer 2 connections across multiple locations over any type of Internet connection,
without the need for expensive MPLS lines, giving you the ability to stretch multiple single
subnets across multiple locations including data centres and Cloud providers such as Azure and AWS.

If your server should fail in Data Centre one data centre 2 can be brought online, with minimal downtime as all servers and infrastructure are on the same LAN Segment allowing the same IP subnet to be used avoiding any changes of IP address to the Operating systems.

In the event of an entire data centre going down, a backup Layer 2 link is established to head office and servers can come online on the data centre 2 giving full real-time protection

Disaster Recovery

All offices, branches and data centres can be connected with iQuila Enterprise at Layer 2, and because iQuila is an “always-on” service, which connects during kernel boot up, it is possible to have an “always-on” disaster recovery scenario running between data centres. In the event of a failure at Data Centre 1 (DC1), Data Centre 2 (DC2) can be brought online with an immediate failover and,

because both data centres are on the same IP segment, there will be no loss of critical services and virtually imperceptible down time.

If DC1 went completely offline, redundant connections to DC2 could be activated and normal service could be restored almost immediately.

Remote workers can connect to their head office network with iQuila - as if they were plugged into a LAN port in the office - and iQuila connected mobile phones can connect securely to the office network infrastructure, including a filtered Internet, all while securing a vital endpoint device.

There is a prevailing trend to allow for a more flexible, home based workforce. In many industries the data potentially being accessed can be highly sensitive and a company needs to know who is accessing that data and how. This cannot easily be achieved with legacy applications for home based working but with iQuila, and the fact it essentially stretches your LAN from head office to a device anywhere in the world, all the protections you have with your head office are extended over the VEN for remote workers.

No more data breaches due to lost laptops.

To take this scenario a step further, if a laptop is configured to emulate a dumb terminal or thin client then the iQuila Bridge can be leveraged to provide a secure connection, via the laptop, to the LAN at Head Office allowing every resource available, in line with group policy, to a specific user. If a second iQuila Bridge is installed at the worker's home it will provide the same, completely secured, connection to the company LAN.

Because iQuila connects on Layer 2, this can be configured using MAC address so that only a specified device will be allowed access to the company network when plugged in to either iQuila Bridge. No other device plugged into the iQuila bridge will be able to access the network.

And because the laptop has been configured to emulate a dumb terminal or thin client, when it is not connected to the iQuila Bridge at either end, it is completely void of data. This scenario now means that a lost device no longer constitutes a data breach, as the device itself contains no data at all.