Logo

The company

 

Access Solutions Oy was founded in 2004. As a company we are a guiding partner to our customers. With our help our customers have enhanced their business operations and made significant cost savings using our working solutions.

 

ACCS solution ”SimblityAutonomics” enhances service performance and application usability, simplifying the user experience and accessibility. “SimblityAutonomics” is Access Solutions Oy’s concept to enhance work, competitiveness and flexibility.

 

Our partners are Citrix, Microsoft, VMWare, DellWyse, Igel, Trend Micro etc. Our experts have comprehensive certifications of these products. Our employees have decades of experience in system maintenance. We are one of the oldest Citrix system developers in Finland, and our own application development has produced many different sorts of applications to enhance business and competitiveness.

 

Access Solutions brings your company SimblityGreenIT-thinking. In the Green IT-section of our website you can see how energy consumption is an essential part of the IT-infrastructures cost structure, and how your company can stand out by saving energy.  We execute our customers existing IT-environment as energy efficiently as possible, using the latest technology.

 

Our special skills are, among other things; application integration, virtual desktop solutions (VDI), access control, network edge cloud-integrations, network optimization and acceleration. Access Solutions offers expert services for companies of all sizes.

 

SERVICES

Access

Access Control

Can you access your business services from the web?

Do you know who or what is active in your network?

Have you centralized your access control solutions?

How to integrate cloud services into an access control strategy?

 

The answer to all these questions is Citrix NetScaler!

With Citrix NetScaler you can protect your network and implement an access control model just the way you want to.

 

With NetScaler access control equipment, you can give your employees and customers simple and effortless access to your business applications. Web content delivery works fast and efficiently. Immediate savings in hardware investments can be achieved using the NetScaler solution due to its versatile features.

 

NetScaler devices combine several technologies, which you can use to offer the best possible end user experience anywhere in the world.

Some of these technologies are; access control solution, SSL VPN, application firewall, load balancing, application optimization, web-based application delivery, cache, web-application acceleration, cloud service integration on different authentication levels, SSO-solutions and file services.

 

With NetScaler you can combine all access control related functionality into one Information Protect-interface, which you control centrally. You can always see what applications are used from an external network or within your business, and how.

Citrix NetScaler can be installed virtually or as hardware, and you only pay based on which features you use (Pay-As-You-Grow). You can start using the future access control solution immediately on a virtual device, and slowly expand your environment and begin using the hardware as volume grows.

 

 

ShareFile

Citrix ShareFile is a cloud service, which enables the sharing and storage of information. ShareFile enables smooth cooperation everywhere for users and covers the information requirements of the company.  Using this solution, it’s possible for your business to create a tailored and password protected zone, where you can move files and share them between customers easily and safely.

Through ShareFile you can also define the users read- and usage rights. If your business needs to send large files by email, make safe file transfers or create a space for shared files with partners, ShareFile is the solution for you. ShareFile can be used on any device, including mobile. Using ShareFile StorageZone, you can create a ShareFile cloud service into your own server room, and know exactly where your files are located.

 

App&Desktop Delivery 3D

Application and desktop delivery

On a virtual desktop you can use all applications at home, conventions, meetings and the workplace regardless of the device. Applications delivered from a virtual desktop transfer seamlessly between devices regardless of the location, so your employees can work where- and whenever.

 

In a virtual desktop solution, the user’s desktop operates in a server environment built into a server room, from where the virtual desktops screen, as well as the keyboard and mouse movements are delivered to the end user device. One user can have multiple desktops, if the user needs multiple different operating systems for example. The desktop can be used via internet connection through any browser or device.

 

A virtual desktop starts faster than a traditional workstation. Temporary files are destroyed in connection with each restart, so that they don’t slow down the virtual desktop even in the long term. The end user can install applications to their virtual desktop, if they have the rights to do so. Administration can also lock a user’s desktop and perform updates in a controlled manner. Viewing graphics and video is also possible using a virtual desktop, as the virtual desktop can take advantage of the end user devices graphics card.

 

Does your business have an upcoming operating system upgrade sometime in the future? In a virtual desktop solution, you can perform an operating system upgrade overnight. Here the user can also be shown Windows 7, Windows 8, Windows 10 and Linux desktops simultaneously, so the environment change can happen very flexibly. Desktop virtualization makes your IT-environment automatically standardized. Do you value a secure environment, where green values have been considered? You can use Thin Clients in your virtualized environment.

 

Application virtualization

We perform application virtualization on the Citrix XenApp product. We have a long experience of application virtualization. Citrix began its operation from application virtualization with Citrix MetaFrame, this is the cornerstone of Citrix’s virtualization.

 

In an application virtualized environment, the applications are always delivered centrally. The capacity required by the applications can be divided to internal and external clouds. In addition to simple applications the user can be offered demanding 3D-aplications as well. This way the maximum performance of all available devices can be utilized.

 

An application can be formed into an application package. Within the package is a confined environment, where all the special features and needed plugins of the application have been considered. This way multiple versions of the used applications can be made and updated without downtime. Multiple versions of the application can be run on the same server without separate installations. We utilize Citrix Streaming, APP-V, MSI, etc. packaging technologies.

 

Mobile device control

Mobile devices are becoming more common in IT-environments. Every IT-administrator needs to control mobile devices as well. This requires a product of its own. If your environment contains Citrix products, the only logical solution is Citrix XenMobile. This way mobile devices can be administered, and a contained operating environment produced for the company’s own applications and virtual desktops. A contained operating environment enables BYOD (Bring Your Own Device) mobile device usage. The end user can have their own tablet computer, into which the companies own applications are delivered securely.

 

XenMobile contains its own applications which your business can use to operate efficiently. WorxHome is a contained operating environment where XenApp-applications and XenDesktop-desktops can be published. WorxMail is an email client, which integrates with Exchange, for example. Emails and calendar usage can be done through WorxMail. WorxNotes is a note tool, in which notes can be attached with pictures, attachments, texts, etc. You can also forward your notes or save them as a document. WorxWeb is a protected internet-browser for a mobile environment. Through this browser, mobile devices won’t get viruses. WorxQuickEdit is a document editing tool, in which you can edit all Microsoft office documents and save them after editing into your file system.

 

ShareFile – Enterprise-level “Drop Box”. Document cloud service, which can also be placed into the customers own server room and used on any end user device. ShareFile integrates to your own document server and your files can be safely connected to XenMobile. With sharefile you can build yourself a private document service and know exactly where your files are located.

Information security is often an unknown when it comes to mobile devices. There are many elements to the information security of XenMobile. A large factor is the application specific VPN-tunnel (MicroVPN). With MicroVPN the device is generated a passageway to exactly the places where it needs access to. Native Windows applications can be converted to true mobile applications that communicate with mobile devices on XenMobile.

 

GreenIT

GreenIT – enhance maintenance and save electricity

Thin Client – an alternative to a PC

With Thin Clients you save electricity and reduce upkeep costs. A Thin Clients electricity consumption is only about 7 W. You can save tens of thousands compared to a traditional PC-environment.

A Thin Client -devices approximate lifespan is 5 years, in good conditions even up to 7-10 years. Thin clients don’t have any moving, breakable parts, like hard drives or fans. Therefor the Thin Client is also a silent option.

Through Access solutions you can get Dell Wyse and Igel Thin Clients. Alternative operating systems are ThinOS, Linux and Windows 7, 8.1, 10 embed.

 

A standardized environment brings security

Desktop virtualization makes your IT-environment automatically standardized. Do you value a secure environment, where green values have been considered? In our GreenIT solution, all connections between the device and services are protected. In case of the device breaking or disappearing, all information will be safe.

 

Desktop virtualization enables flexible work

On a virtual desktop you can use all applications at home, conventions, meetings and the workplace regardless of the device. Applications delivered from a virtual desktop transfer seamlessly between devices regardless of the location, so your employees can work where- and whenever.

 

Thin Client-solution simplifies upgrades from Windows 7-operating system to a Windows 8 / Windows 10-operating system.

Does your business have an upcoming operating system upgrade sometime in the future? In a virtual desktop solution, you can perform an operating system upgrade overnight. Here the user can also be shown Windows 7, Windows 8, Windows 10 and Linux desktops simultaneously, so the environment change can happen very flexibly.

Network Acceleration

Network Acceleration

Network acceleration is the enhancement of traffic in a network with a limited capacity. Network acceleration is performed on the OSI-model layers 4-7. Multiple different solutions are used in network acceleration depending on the service provider.

 

Principle

Network traffic is recognized, taken apart and encrypted. This way the network traffic can be prioritized, which ensures fast movement of the most important information. Often the needed unchanged information is stored in the cache, after which the information in question doesn’t need to be transferred between network points.

 

Possibilities

If your environment contains remote workstations without adequate bandwidth, you can guarantee perfect functionality of your applications with network acceleration. By doing this, the location of offices doesn’t restrict the function of your business.

 

Products

Access Solutions has delivered network acceleration solutions since 2007. Access Solutions has delivered Expand Networks, Citrix and Riverbed optimization solutions. Currently we represent Citrix and Riverbed products. Both have their own strengths, so get to know the products from the links below and choose the best option for you!

 

Darktrace

Modeled on the human immune system, Darktrace’s technology is the world’s leading, enterprise-grade AI with thousands of customers worldwide.

Protecting corporate networks, cloud and virtualized environments, IoT and industrial control systems, Darktrace autonomously detects and fights back against emerging cyber-threats across the enterprise.

Jobs

 

Are you interested in a career at Access Solutions? Send an open application and describe your expertise, strengths and work experience.

In addition, tell us why you specifically should work for the best IT-house for connecting virtualization, network optimization and network access solutions in Finland!

 

Also include your CV.

 

Contact us

Access Solutions Oy

Asemakatu 7, 2nd floor.
24100 Salo

+358(0)27337770


 

Asemakatu 7, 2nd floor.
24100 Salo

+358(0)27337770

 

Facebook Link   Like us on Facebook

© Access Solutions Oy 2019