Use the Following Technologies
Host security
Secure individual hosts in your local network.
Cryptography
Scramble your information to make it unreadable to unauthorised people.
User authentication
Authenticate users before allowing access to your corporate network.