Skip to content

Commit 0c29660

Browse files
author
Michał Gryczka
committed
ekseem name updated (version approved by Marc and Pierre) public
1 parent 6636c42 commit 0c29660

File tree

1 file changed

+9
-10
lines changed

1 file changed

+9
-10
lines changed

src/content/blog/eskemm-numerique-multi-tenant-remote-access.mdx

Lines changed: 9 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -7,11 +7,10 @@ author: "Michał Gryczka"
77
companyName: "Eskemm Numérique"
88
companyDescription: "French public company responsible for delivering hosted services to universities and research institutions across the Brittany region, operating a shared infrastructure platform for multiple universities and laboratories."
99
companySegment: "Research & Education / Hosted Services"
10-
companyWebsite: ""
10+
companyWebsite: "https://www.eskemm-numerique.fr/"
1111

1212
image: "/images/blog/eskemm_case_study.png"
13-
draft: true
14-
tags: []
13+
tags: ["ISO27001", "HDS", "Compliance"]
1514
---
1615

1716
![Secure multi-tenant remote access built by French MSP for research institutions with Defguard](/images/blog/eskemm_case_study.png)
@@ -64,31 +63,31 @@ Real-time client configuration synchronisation guarantees that any changes to lo
6463

6564
In the second scenario, the requirement was to securely connect multiple clients to centralized resources and guarantee that each client has access only to specific services.
6665

67-
To support this case, Eskemm deployed a **dedicated Location for shared services** accessible to all authorized customers. This setup introduces a higher risk profile, because multiple clients must access only selected infrastructure without access to all other network segments and seeing each other's workloads.
66+
To support this case, Eskemm Numérique deployed a **dedicated Location for shared services** accessible to all authorized customers. This setup introduces a higher risk profile, because multiple clients must access only selected infrastructure without access to all other network segments and seeing each other's workloads.
6867

6968
Currently, access is limited to only a few services. To enhance that, Pierre and Marc plan to leverage **granular group-based access control** (RBAC capabilities of Defguard). While User Groups currently control who can enter this shared gateway on a higher level, they will implement firewall rules using Defguard's **Access Control Lists (ACLs)** module built into Defguard to precisely define access to specific services (IPs, ports and protocols). [ACLs documentation](https://docs.defguard.net/enterprise/all-enteprise-features/access-control-list).
7069

7170
The expected result—a simple but powerful way to control access to shared resources based on user identity and organisation privileges.
7271

7372
### Authentication
7473

75-
Defguard enabled Eskemm to introduce **MFA for several VPN locations** on connection level, while providing flexibility of configuration and authentication via TOTP codes. Defguard also supports **biometric authentication** using Defguard clients on mobile devices.
74+
Defguard enabled Eskemm Numérique to introduce **MFA for several VPN locations** on connection level, while providing flexibility of configuration and authentication via TOTP codes. Defguard also supports **biometric authentication** using Defguard clients on mobile devices.
7675

7776
This was a major factor for choosing Defguard as it's the only solution that delivers **MFA authentication for WireGuard VPN** in a self-hosted environment. It guarantees full data privacy and no third-party dependencies.
7877

7978
### Security & Compliance
8079

81-
The compliance and security requirements are imposed on Eskemm through **HDS (Hébergeur de Données de Santé)**—a mandatory certification in France for any organization hosting health data on behalf of third parties, such as hospitals, clinics, or medical professionals.
80+
The compliance and security requirements are imposed on Eskemm Numérique through **HDS (Hébergeur de Données de Santé)**—a mandatory certification in France for any organization hosting health data on behalf of third parties, such as hospitals, clinics, or medical professionals.
8281

8382
Defguard's "Secure By Design" approach and **segmented architecture** that cleanly separates the Control Plane (Core) from the Data Plane fulfils those strict regulatory requirements.
8483

85-
Its design allows Eskemm to host the Core within their own secure datacenter, keeping it **completely hidden from the public internet**. As a result, all sensitive metadata remains strictly within French/EU jurisdiction, fully satisfying HDS and ISO 27001 standards.
84+
Its design allows them to host the Core within their own secure datacenter, keeping it **completely hidden from the public internet**. As a result, all sensitive metadata remains strictly within French/EU jurisdiction, fully satisfying HDS and ISO 27001 standards.
8685

87-
The fact that Defguard is a Polish company and the product is developed in the European Union makes it a preferable choice for Eskemm and companies that want to build a **sovereign technology stack**.
86+
The fact that Defguard is a Polish company and the product is developed in the European Union makes it a preferable choice for organisation and companies that want to build a **sovereign technology stack**.
8887

8988
### Automation & API
9089

91-
Managing gateways manually would slow down recovery and increase configuration errors. Eskemm therefore managed gateway deployment and Defguard configuration **through code** using **Ansible and Terraform**.
90+
Managing gateways manually would slow down recovery and increase configuration errors. The team at Eskemm Numérique therefore managed gateway deployment and Defguard configuration **through code** using **Ansible and Terraform**.
9291

9392
By integrating Defguard's **API** into these pipelines, the team established a reproducible deployment strategy, ensuring that new gateways are provisioned instantly without manual input. Furthermore, the system automatically propagates changes to user devices, making infrastructure updates almost transparent while maintaining strict consistency across all clients.
9493

@@ -100,7 +99,7 @@ For most users, the change was almost invisible—which would not have been poss
10099

101100
## Result
102101

103-
By deploying Defguard as a centralized platform integrated with their automation stack, Eskemm achieved significant gains in security, operations, and scalability:
102+
By deploying Defguard as a centralized platform integrated with their automation stack, Eskemm Numérique achieved significant gains in security, operations, and scalability:
104103

105104
- Passed penetration tests and maintained **HDS and ISO 27001 certifications**.
106105
- **Secure remote access** to several tenants.

0 commit comments

Comments
 (0)