Anastasiya Novikava
Copywriter
Anastasiya believes cybersecurity should be easy to understand. She is particularly interested in studying nation-state cyber-attacks. Outside of work, she enjoys history, 1930s screwball comedies, and Eurodance music.
Summary: With NordLayer, ITC Compliance simplified remote access, strengthened security, and met compliance needs.
ITC Compliance, based in the UK, helps car dealerships and other retailers meet the standards of the UK’s Financial Services Regulator. By becoming appointed representatives of ITC Compliance, these businesses rely on the organization to handle their compliance. This way, clients stay compliant with the Financial Conduct Authority (FCA), without dealing with complex rules, allowing them to focus on their main work.
James Snell, IT Director at ITC Compliance, manages technology strategy and vision, technology teams, cybersecurity, IT infrastructure, and operations. He is also responsible for vendor and stakeholder management. He needs to secure remote access to sensitive internal systems while maintaining regulatory compliance.
The COVID-19 pandemic led ITC Compliance to shift to remote and hybrid work. This required a secure way for employees to access internal systems with sensitive data from various locations.
"COVID changed how companies work," explains James Snell. "Only ITC Compliance employees can access our systems, so we needed secure remote access to internal resources." Managing individual IP whitelisting for all remote employees was impractical.
"Using a business VPN is easier than whitelisting everyone’s individual IPs," James notes. "That would be a painstaking task to keep up to date."
As a regulated company working towards SOX compliance, ITC Compliance also needed strict access controls, which are crucial for certification.
To tackle these issues, ITC Compliance adopted NordLayer as their business VPN in 2020. Routing all employee traffic through NordLayer allowed for a consistent IP address, which simplified security.
“We use NordLayer as a VPN to whitelist IP access to our systems,” says James. “This way, everyone connects through the same IP.”
NordLayer also offered essential security tools, like multi-factor authentication (MFA). This met ITC Compliance’s security needs and supported their SOX compliance goals.
During renewal, James considered other options but decided to keep NordLayer. The solution felt reliable, and the pricing suited their needs, so switching wasn’t necessary.
NordLayer offered scalability and flexibility, with easy server setup and team routing through different IPs. From a cybersecurity standpoint, NordLayer provided essential tools, including ease of use, strong security features, and simple management with MFA options.
One key feature enabling ITC Compliance to maintain a fixed IP is NordLayer’s Dedicated IP. It ensures online traffic stays private and secure, helps control permissions, and prevents unauthorized access. With NordLayer, a fixed IP allows smooth, secure access to business data from any location. You can control who accesses resources by allowlisting specific IPs. Dedicated servers with fixed IPs cost $40/month and are available on all plans except Lite.
NordLayer helped ITC Compliance secure remote access to internal systems. Using a single IP address simplified security management and reduced workload.
"We restrict access to internal systems as an extra layer of security," explains James. "This forms a part of our compliance towards SOX."
The NordLayer rollout was smooth, and the team found it easy to use. Scaling is simple, and adding licenses is hassle-free.
"It's very easy for us to scale," says James. "If we need to increase licenses, you're just going to bill us pro rata for the incremental licenses. No issues."
Protecting sensitive information is crucial, especially for regulated businesses. James Snell shares three essential tips for enhancing security.
With NordLayer, ITC Compliance simplified remote access, strengthened security, and met compliance needs. Try NordLayer to secure your team’s access, no matter where they work.
Subscribe to our blog updates for in-depth perspectives on cybersecurity.