AG 1000 Series. Secure Access Gateways
|
|
|
- Berenice Snow
- 10 years ago
- Views:
Transcription
1 AG 1000 Series D a t a S h e e t Secure Access Gateways Array Networks AG 1000 Series Secure Access Gateway products provides enterprise-class secure access for customers ranging from Small-to-Medium Businesses, to Telcos and Cloud Service Providers. Array s AG is the best value for mobile and non-mobile secure access when performance, scalability, fine grain user control, user group control and multi-tenant hosting are important requirements. Powered by the Array Networks award winning 64-bit SpeedCore platform, the AG Series is the best choice for enterprises and service providers seeking to lower Total Cost of Ownership (TCO) without compromising security. Highlights & Benefits Up to 3.2Gbps throughput, 128,000 concurrent users, and 500,000 users per single AG device provides scalability and performance to drive productivity and improved user experience across the organization at cloud scale while maintaining iron-clad security. Broad range of secure access solutions from a single AG device including mobile access, remote access, remote desktop access, and wireless access. Multiple virtual VPN communities and tenants on a single AG device provides employees, partners and customers a separated, secure and fully-customized experience. Fine grain per user controls provides full control of the access policy on per individual user basis. Ideal secure access component for business continuity and compliance keeping open and secure access to critical applications, services and resources in the face of un-anticipated events. Comprehensive mobile support and SDK to mobilize your applications and services without compromising security.
2 P r o d u c t D e s c r i p t i o n Enterprise and Cloud-class Performance Array Networks AG Series Secure Access Gateways were developed to provide universal access at performance and scale, while reducing Total Cost of Ownership (TCO). Powered by Array Networks award winning 64-bit multi-core SpeedCore platform these purpose-built appliances support up to 128,000 concurrent users and up to 3.2 Gbps throughput on a single system. Array s AG Series delivers the highest performing and most scalable secure access solution on the market providing unbeatable ROI for global enterprises, Telcos/carriers and cloud service providers. A single AG device can host up to 500,000 users in a local database for AAA and access controls. hardware acceleration on the AG device brings customers superb performance for both 1024-bit and 2048-bit key certificate processing. Access. Security. Performance. Anytime, anywhere, any device access increases productivity, ensures compliance and accountability, while performance enables these benefits across the enterprise and cloud cost-effectively and without compromising the end-user experience. With the Array Series of Secure Access Gateways you get it all: anytime anywhere access, security, high availability and price/performance. Moreover, the AG Series Secure Access Gateways are highly flexible, supporting multiple end-use devices, as many groups, communities or tenants as your business requires, all on a range of price/performance products. With Array s AG Series, IT managers and cloud operators can meet today s specific access and security mandates while laying a foundation for expanded functionality as the need arises. AccessDirect: Remote Access AccessDirect is a remote access VPN module available independently or in conjunction with other access modules on all AG Series products. Designed to supercede legacy secure remote access VPNs, Array AccessDirect VPN provides greater flexibility using ubiquitous Webbased access, more granular data protection through client security and identity-based access controls, and fewer deployment hassles with an architecture that requires no pre-installed clients and that is transparent to existing infrastructure. AccessDirect supports Web-based, Layer-3 and specific client-server and thin-client application access and delivers a fast, customized enduser experience unmatched by the competition. Mobile Device Support & SDK Array Networks proven DesktopDirect solution allow iphone/ipad and Android based device users to access all business critical applications at anytime without having to worry about whether the application is available for the mobile OS or the potential risk of leaving sensitive data on relatively more vulnerable mobile devices. AG Series Access Gateways provides customers with a comprehensive Mobile Application SDK. Using this SDK customers or software vendors can easily add secure access capability into their applications and service. Secure tunneling and access controls are taken care of automatically by the SDK libraries, while applications just need to focus on their core functions. The Mobile Application SDK allows applications to maintain the great experience mobile users are enjoying today without compromising security. Users just need to use their application as usual without knowing whether they need to go through a VPN or not. Everything is done transparent to the user. Not even a single more click is necessary, let alone launching separate VPN applications or going through extra pages. AG Series Access Gateways also support Network level VPN to provide secure access for any applications that run on ios or Android based mobile devices. Network level VPN provides full network access to all applications on the mobile devices by intercepting and securing the data before it leaves the device. There is no complicated installation needed and configuration is simple and easy. Array Networks is committed to provide the best and most complete mobile secure access solutions to our customers. We will continue improving AG features and functions for mobile device access. Virtualization Built-on Array Networks unique virtualization technology with a 7-year track record of servicing carrier grade customers, each AG gateway can appear as multiple virtual AGs which work together as a whole to provide cohesive secure access and controls. One AG gateway can support up to 256 Virtual Portals to serve different users, groups or tenants, without complicating the user experience, management and configuration. Each Virtual Portal has self-contained management, access policy, access methods and resources. Virtual Portals can also be associated with multiple IP addresses to provide access from multiple external or internal links. Each Virtual Portal has its own easily customizable look and feel and customization is easier than ever. All AG features and functions can be seamlessly integrated into existing web pages or fit into any customized page layout with minimum effort though AG Portal Theme technology. AG devices come with two built-in portal themes for customers to start with.
3 P r o d u c t D e s c r i p t i o n Per User Policy Engine The AG Series Access Gateways not only provide secure access but also provide full control of the access policies on per user basis. The AG device can check the user s device to make sure it s up to date on service packs and anti-virus software before allowing the user to access a protected network and resources. The AG device can validate each individual user s device hardware ID before the user can login. Administrators can assign users different roles at run time based on username, group name, source IP, login time and authentication methods so the users get access to different resources using different access methods. Different user roles will see different resources on the user portal and will be assigned different level of QoS policies. With a capacity of 500,000 users in local database, all user access policies are stored locally and can work seamlessly with external AAA servers. Users can also customize backend server SSO settings to store multiple username and password pairs for different backend application servers. The AG device provides an extremely powerful and flexible user authentication mechanism. Administrators can allow an individual user to choose an authentication method and can also force users authenticate to multiple AAA servers for added security similar to multi-factor authentication. DesktopDirect: Desktop Access DesktopDirect enables workers to seamlessly access their desktop PCs from any location as if they were in the office. Using a standard web browser, any device can remotely view and control employee PCs located in the office. DesktopDirect uniquely leverages proven technology that is simple, scalable and secure to deliver the industry s only comprehensive, enterprise-class remote desktop access solution. Array DesktopDirect is an enterprise remote desktop access module, available independently or in conjunction with other access modules on all AG Series products. Client Security A dissolvable security agent mitigates network or resource exposure by enforcing pre- and post-admission policies and adapting access rights to suit changes in the client environment. Host-checking verifies device and user identity, and ensures clients meet pre-defined security parameters (anti-virus, anti-spyware, personal firewalls, patches, service packs, etc.) and determines adaptive policies. For additional control, cache cleaning can wipe cached information from devices when a session ends; or secure virtual desktop may be enabled to store session data in an encrypted vault to prevent data leakage associated with local saving and printing. Transit & Server-Side Security All traffic between clients and the Array Universal Access Controller is encrypted over. An integrated VPN firewall, reverse proxy architecture and security-hardened OS ensure that AG Series systems are as secure as the networks and resources they protect. Layer 2-7 authorization provides granular access control based on user identity and role within the organization, while comprehensive auditing tracks all activity on a per-user, per-event, and per-resource level. telecommuters SOHO Day Extenders Mobile Users Contractors array ag Partner Customer a, B, C, etc. internet headquarters or POP un-trusted VLaNs Wireless LaN users array ag LaN users trusted VLaNs Business Critical Data, applications & Networks
4 Peer Sites End-Point Security Encrypted Transport & Multiple Access Modes High-Perform P r o d u c t D e s c r i p t i o n Secure Access Gateway Portal Customization Hub & Spoke or Mesh Connection Multiplexing AAA & SSO Efficient Virtual Proxy Portal Engine Hardened OS SpeedCoreTM QuickLink Adaptive Policies Array VPN Client Virtualization Secure Virtual Desktop Host Checking Mobile Device Support Per User Access Policy Management Cache Cleaning Hardware Acceleration Dissolvable or Pre-Installed Security Agent TM SpeedCore End-Point Security Encrypted Transport & Multiple Access Modes High-Performance, High-Availability Resource Access Control Application Acceleration Typically, layers of protection add to security at the expense of application performance; and no matter how sophisticated a VPN solution is, it won t enhance productivity unless users find it fast and friendly. To this end, Array AG Series Secure Access Gateways OPEN feature integrated application acceleration technology including hardware accelerated encryption, hardware compression and connection multiplexing for putting servers in their power band. With the purpose-built Array AG device, the compromise between security APACHE and performance is eliminated once and for all. Array Business Continuity LINUX OS Events such as hurricanes, snow days, transit disruptions and the threat of global terror or pandemics make the world and the workplace increasingly unpredictable. More than ever, organizations require OPEN MAIN CPU solutions that keep their employees up and running in the face of unanticipated or seasonal events. APACHE HARDWARE Reliability & Availability Deployed by the largest enterprises and service providers in the world, AG Series Secure Access Gateways have proven their reliability tallying up over five years of flawless performance in the most demanding of production network environments. In the event of failure, clustering ensure an unaffected, transparent experience for end users. HARDWARE SpeedCore MAIN CPU Array Secure Access Gateway is a fundamental component in business continuity architectures. Ubiquitous Web access means users have access from any device, anywhere. DesktopDirect enables users to see MAIN CPU HARDWARE their familiar work desktop and continue HARDWARE to be productive. prepaid Business Continuity licensing meets the requirements of any size organization during surges in user connections due to unplanned external events. LINUX OS General-Purpose VPN Most importantly, only Array Business Continuity licenses self-activate with no IT interaction. General-Purpose VPN SpeedCore AG MAIN CPU AG AG
5 P r o d u c t D e s c r i p t i o n Management & Reporting Array AG Series Secure Access Gateways offer both a familiar CLI and an intuitive Web user interface that can easily be customized to create streamlined, integrated management systems. Monitoring the Array AG is made simple with SNMP-based monitoring tools, and with support for XML-RPC, a range of third-party applications can be used to automate management tasks. In addition, up to 100 AG products can be supported by Array s CMX 100 centralized manager. Provide a single point of configuration management, monitoring and reporting for Array s products. Web Portals & Applications Mobile User Array AG Files Corporate Network Extranet Business Partner Remote Office Home Telecommuters Extranet Suppliers Customer Regional HQ
6 Features Access Methods Data Center & Cloud Security P r o d u c t D e s c r i p t i o n Clientless Web Portal Access 100% clientless Support HTML, JavaScript, Plug-in parameters Ensures proper function of application beyond the corporate network Masks internal DNS and IP addressing Supports all devices with a web browser Client Based Access Supports network level connectivity and application level connectivity IT can specify L3 or L4 tunnel or allow the Array VPN Client to auto select Transparent to users Auto launch upon login Supports any IP based applications (TCP,UDP, NetBIOS) e.g. Outlook, Terminal services, FTP, CRM and all CS and BS applications Different configuration defined per user or group Split tunneling and full tunneling control Create tunnel through http forward proxy Network drive mapping Automatic launch of network scripts/commands IP address assignment based on users, groups, DHCP and RADIUS Windows XP 32bit, Windows 7 (32/64-bit), Linux, MacOS Stand-alone, command line and SDK for Array VPN client re-installable client, web-delivered client through Java or ActiveX Multi-language support Detailed traffic log Mobile Device Support DesktopDirect for ios and Android Application API for ios and Android Network level VPN for ios and Android Client Security Host Checking Tests device state prior to allowing access Scans for personal firewalls, anti-virus, anti-spam and OS service packs Customized rules for a range of apps, registry checks and patches MAC address or Hardware ID validation Adaptive Policies Level of access conditional on end-point status Integrated policy management Cache Cleaning Wipes all browser stored information when the session is over Per-session with idle timeout and browser closure Secure Virtual Desktop Control access to hard drives, registry, copy/ paste buffers, external media and printers Control storage of confidential data on local hard drives and media Accesses and stores information in an encrypted vault Server-Side Security Security-hardened OS Passive and active Layer-7 content filtering Permit or deny policies DDoS prevention Reverse-proxy network separation Protocol: TLS 1.0/ 3.0, TLS 1.1/1.2* Cipher suites: AES128-SHA, AES256-SHA, DES/3DES, SHA/MD bit & 2048-bit keys session reuse Certificate filed passing to backend Online/offline CRL, OCSP Access Control (AAA) Authentication LDAP, RADIUS, AD, LocalDB, RSA SecurID,Swivel, Vasco, Custom 500,000 users in LocalDB Enable/disable LocalDB user LocalDB password policy control Back/Restore LocalDB Export LocalDB in CSV format (Excel) 1500 logins/second Certificate-based authentication Authentication server ranking (search user credential in multiple servers) RADIUS Challenge Response Mode Restrict login based on date and time, Single Sign-on, NTLM, HTTP basic authentication and HTTP POST User lock-up by login failure, inactivity or manually by admin Authorization Granular access control of resources Role-based access control Role is defined by username, group name, login time, source IP and login method Permit and deny policies Authorize user based on MAC address or hardware ID Provides high flexibility in configuration Detailed logging Auditing Full audit trail in WebTrends WELF format Logs all user activity success, failures, attacks Multi-factor authentication/ authorization client certificates, RSA SecurID, Entrust Other RADIUS-based authentication Systems Multiple AAA server authentication Cloud-class Capacity & Performance Array s SpeedCore 64-bit multi-core platform Optimized packet flow; single-digit millisecond latency Hardware key exchange and bulk encryption; performed in kernel Connection multiplexing optimizes server efficiency; reduces back-end connections N+1 clustering Up to 256 discrete virtual portals/user communities on a single system Up to 128,000 of concurrent users on a single system Up to 3.2 Gbps of throughput Virtualization 256 Virtual Portals Single page virtual site creation Concurrent user session control per Virtual Portal Delegated management Multiple IPs and host names associate with one Virtual Portal Complete security and data separation Instant DMZ on demand Strong compliance assurance Management Simplified Administration Intuitive streamlined WebUI Quick-start wizard Role-based administration Strong administrator authentication RADIUS accounting No client installation or management Configuration synchronization Full device backup and restore including: Client Security Portal Theme certificates, keys CRL LocalDB Centralized management with CMX100 Customizable End-User Portals Portal Theme allows customer to create customized Virtual Portals or include all AG features on pre-existing web pages Pure Javascript-based customization on per Virtual Portal basis No external server requirements Localized end-user GUI support for English, Japanese, simplified and traditional Chinese Multi-device Management SSH/CLI, /WebUI, SNMP, XML/RPC API Support Array centralized management appliance CMX Support NRS2 Array Networks multiple SPX/AG reporting and analyzing tool Licensing, etc. User/feature license control Business Continuity (ABC - prepaid burst license) NTP, NAT, RTS, Logging
7 P r o d u c t S p e c i f i c a t i o n s AG Features AG Models Processing (1024-bit & 2048-bit) AG 1000 AG 1100 AG 1200 AG 1500 AG 1600 SW HW HW HW HW Compression SW SW SW SW SW Ports 4x GigE Copper 4x GigE Copper 2x1GigE Fiber 4x GigE Copper 2x1GigE Fiber 4x GigE Copper 4x1GigE Fiber or 2x10GigE Fiber 4x GigE Copper 4x1GigE Fiber & 2x10GigE Fiber Max. Virtual Portals Max. Concurrent Users 300 6,000 24, , ,000 Local DB users 10, , , , ,000 Throughput (Mbps) ,600 3,200 SW HW HW HW HW Clustering Power Supply Single Single/Dual Single/Dual Dual Dual Form Factor 1U 1U 1U 2U 2U Technical Specifications Support Warranty Dimensions Weight Environmental Input Voltage Regulatory Compliance Safety Bronze, Silver and Gold levels support plans 1 year hardware, 90 days software Array AG 1000, 1100, 1200: 17 W X 15 D X 1.75 H or 1U Array AG 1500, 1600 : 17 W X 21.5 D X 3.5 H or 2U Array AG 1000, 1100, 1200: 13.6 lbs (single power supply), 17.2 lbs (dual power supplies) AG 1500, 1600 : 28 lbs Operating Temperature: 0 to 45 C, Humidity: 0% to 90%, Non-condensing AG 1000, 1100, 1200:: VAC, 6-3 A, 47-63Hz Auto-ranging, Dual: VAC, 4-2 A, 47-63Hz Auto-ranging AG 1500, 1600: VAC; 8.5A ; Hz, Full-range input, Redundant, Hot Swappable IEC , LU/CSA , EN , ICES-003, EN 55024, CISPR 22, AS/NZS 3548, FCC, 47FR part 15 Class A, VCCI-A CSA, C/US, CE Jan-2012 rev. b 1371 McCarthy Blvd. Milpitas, CA arraynetworks.net Phone: (408) Toll Free: MY-ARRAY
AccessDirect. SSL VPN Remote Access
AccessDirect D A T A S H E E T SSL VPN Remote Access AccessDirect is an enterprise-class SSL VPN remote access solution that enables anytime, anywhere secure access to business applications and resources
SECURE ACCESS GATEWAYS
JUMP IN. THE MOBILE WATERS ARE FINE. A G S E R I E S D A T A S H E E T SECURE ACCESS GATEWAYS AG Series secure access gateways provide scalable and controlled remote and mobile access to corporate networks,
AG SERIES DATASHEET SECURE ACCESS GATEWAYS
JUMP IN. THE MOBILE WATERS ARE FINE. AG SERIES DATASHEET SECURE ACCESS GATEWAYS AG Series secure access gateways provide scalable and controlled remote and mobile access to corporate networks, enterprise
AVX SERIES VIRTUALIZED APPLIANCES
MULTI-TENANT EQUALS MULTI-BENEFIT. AVX DATASHEET AVX SERIES VIRTUALIZED APPLIANCES AVX Series multi-tenant virtualized appliances support multiple independent ADC or SSL VPN instances to deliver the performance
Market Application Delivery Networking. Products ADC, WAN Optimization, Secure Access
Company snapshot Founded 2000 Headquarters Milpitas, CA, USA Employees 400+ Market Application Delivery Networking Products ADC, WAN Optimization, Secure Access Segments Enterprise, Service Provider, Public
AVX SERIES VIRTUALIZED APPLIANCES
MULTI-TENANT EQUALS MULTI-BENEFIT. AVX DATASHEET AVX SERIES VIRTUALIZED APPLIANCES AVX Series multi-tenant virtualized appliances support multiple independent ADC or SSL VPN instances to deliver the performance
CENTRAL MONITORING AND MANAGEMENT. CMX SERIES DATASHEET CENTRALIZED MANAGEMENT
CENTRAL MONITORING AND MANAGEMENT. CMX SERIES DATASHEET CENTRALIZED MANAGEMENT CMX100 centralized management appliances allow customers to monitor and manage up to 100 Array Networks APV or AG appliances
APV9650. Application Delivery Controller
APV9650 D a t a S h e e t Application Delivery Controller Array Networks APV Series of Application Delivery Controllers optimizes the availability, user experience, performance, security and scalability
APV x600 Series. Application Delivery Controller APV1600, APV2600, APV4600, APV5600, APV6600, APV8600, APV9600
APV x600 Series D a t a S h e e t Application Delivery Controller APV1600, APV2600, APV4600, APV5600, APV6600, APV8600, APV9600 Array Networks APV Series of Application Delivery Controllers optimizes the
SSL-TLS VPN 3.0 Certification Report. For: Array Networks, Inc.
SSL-TLS VPN 3.0 Certification Report For: Array Networks, Inc. Prepared by: ICSA Labs 1000 Bent Creek Blvd., Suite 200 Mechanicsburg, PA 17050 USA http://www.icsalabs.com SSL-TLS VPN 3.0 Certification
REAL-TIME WEB APPLICATION PROTECTION. AWF SERIES DATASHEET WEB APPLICATION FIREWALL
REAL-TIME WEB APPLICATION PROTECTION. AWF SERIES DATASHEET WEB APPLICATION FIREWALL AWF Series Web application firewalls provide industry-leading Web application attack protection, ensuring continuity
REAL-TIME WEB APPLICATION PROTECTION. AWF SERIES DATASHEET WEB APPLICATION FIREWALL
REAL-TIME WEB APPLICATION PROTECTION. AWF SERIES DATASHEET WEB APPLICATION FIREWALL AWF Series Web application firewalls provide industry-leading Web application attack protection, ensuring continuity
SSL VPN Evaluation Guide. Criteria for Choosing the Right SSL VPN
Evaluation Guide SSL VPN Evaluation Guide Criteria for Choosing the Right SSL VPN May 2011 SSL VPN Evaluation Guide Access. Security. Delivery. Introduction Remote connectivity is crucial for enterprise
Secure remote access to your applications and data. Secure Application Access
Secure Application Access Secure remote access to your applications and data Accops HySecure is an application access gateway that enables secure access to corporate applications, desktops and network
Proof of Concept Guide
Proof of Concept Guide Version 4.0 Published: OCT-2013 Updated: 2005-2013 Propalms Ltd. All rights reserved. The information contained in this document represents the current view of Propalms Ltd. on the
Deliver Secure and Accelerated Remote Access to Applications
DATASHEET What s Inside: 1 Key Benefits 2 Scalability to Meet Future IT Demands 2 Streamlined Access Management 5 Improved User Experience and Productivity 6 Superior Security 6 Accelerated Application
Application Delivery Networking
Application Delivery Networking Proven at over 5000 worldwide customers, Array application delivery networking (ADN) solutions are recognized by leading enterprise, service provider and public sector organizations
Professional Integrated SSL-VPN Appliance for Small and Medium-sized businesses
Professional Integrated Appliance for Small and Medium-sized businesses Benefits Clientless Secure Remote Access Seamless Integration behind the Existing Firewall Infrastructure UTM Security Integration
FileCloud Security FAQ
is currently used by many large organizations including banks, health care organizations, educational institutions and government agencies. Thousands of organizations rely on File- Cloud for their file
Array Networks & Microsoft Exchange Server 2010
Array Networks & Microsoft Exchange Server 2010 Array Networks Enables Highly Optimized Microsoft Exchange Server 2010 Services Microsoft Exchange Server is the industry leading messaging platform for
What s New in Juniper Networks Secure Access (SA) SSL VPN Version 6.4
Page 1 Product Bulletin What s New in Juniper Networks Secure Access (SA) SSL VPN Version 6.4 This document lists the new features available in Version 6.4 of the Secure Access SSL VPN product line. This
CNS-207 Implementing Citrix NetScaler 10.5 for App and Desktop Solutions
CNS-207 Implementing Citrix NetScaler 10.5 for App and Desktop Solutions The objective of Implementing Citrix NetScaler 10.5 for App and Desktop Solutions is to provide the foundational concepts and skills
Deployment Guide Sept-2014 rev. a. Array Networks Deployment Guide: AG Series and DesktopDirect with VMware Horizon View 5.2
Deployment Guide Sept-2014 rev. a Array Networks Deployment Guide: AG Series and DesktopDirect with VMware Horizon View 5.2 Table of Contents 1 Introduction... 2 1.1 Array Networks AG Series Secure Access
SA Series SSL VPN Virtual Appliances
SA Series SSL VPN Virtual Appliances Data Sheet Published Date July 2015 Product Overview The world s mobile worker population passed the 1 billion mark in 2010 and will grow to more than 1.3 billion by
PRODUCT CATEGORY BROCHURE. Juniper Networks SA Series
PRODUCT CATEGORY BROCHURE Juniper Networks SA Series SSL VPN Appliances Juniper Networks SA Series SSL VPN Appliances Lead the Market with Secure Remote Access Solutions That Meet the Needs of Organizations
A Guide to New Features in Propalms OneGate 4.0
A Guide to New Features in Propalms OneGate 4.0 Propalms Ltd. Published April 2013 Overview This document covers the new features, enhancements and changes introduced in Propalms OneGate 4.0 Server (previously
PRODUCT CATEGORY BROCHURE
PRODUCT CATEGORY BROCHURE SA Series SSL VPN Appliances Juniper Networks SA Series SSL VPN Appliances Lead the Market with Secure Remote Access Solutions That Meet the Needs of Organizations of Every Size
White Paper. SSL vs. IPSec. Streamlining Site-to-Site VPN Deployments
White Paper SSL vs. IPSec Streamlining Site-to-Site VPN Deployments May 2011 SiteDirect Access. Security. Delivery. Introduction Traditionally, corporate users rely on IPSec for site-to-site access. However,
SonicWALL Clean VPN. Protect applications with granular access control based on user identity and device identity/integrity
SSL-VPN Combined With Network Security Introducing A popular feature of the SonicWALL Aventail SSL VPN appliances is called End Point Control (EPC). This allows the administrator to define specific criteria
Securing Citrix with SSL VPN Technology
Securing Citrix with SSL VPN Technology An AEP Networks Solution Summary For years, Citrix Systems has dominated the server-based computing market as the solution of choice for application access across
Cisco VPN 3000 Concentrator Series
Cisco VPN 3000 Concentrator Series Product Overview The Cisco VPN 3000 Concentrator Series is a best-of-breed, remote-access VPN solution for enterprise-class deployment. A standards-based, easy-to-use
QuickSpecs. Models. Features and benefits Application highlights. HP 7500 SSL VPN Module with 500-user License
Overview Models JD253A Key features High performance hardware encryption Thin client and browser based access Multiple access authentication methods Remote security status checking Low Running Cost Product
SVN5800 Secure Access Gateway
The development of networks allows enterprises to provide remote access to branch offices, partners, customers, mobile employees, and home offices so that they can access application and data resources,
"Charting the Course... Implementing Citrix NetScaler 11 for App and Desktop Solutions CNS-207 Course Summary
Course Summary Description The objective of this course is to provide the foundational concepts and teach the skills necessary to implement, configure, secure and monitor a Citrix NetScaler system with
QuickSpecs. Models. Features and benefits Configuration. HP VCX x3250m2 IP Telecommuting Module. HP VCX x3250m2 IP Telecommuting Module Overview
Overview Models JE404A Key features Based on a security-hardened version of Linux Works in conjunction with existing firewalls Receives SIP signaling directly from Internet Transparently supports NAT;
Deliver Secure and Fast Remote Access to Anyone from Any Device
Gateway DATASHEET What s Inside: 2 Improved User Experience and Productivity 4 Superior Security 5 Accelerated Application Performance 6 Streamlined Access Management 8 Scalability and Flexibility to Meet
Evaluating the Cisco ASA Adaptive Security Appliance VPN Subsystem Architecture
Deploying Cisco ASA VPN Solutions Volume 1 Course Introduction Learner Skills and Knowledge Course Goal and Course Flow Additional Cisco Glossary of Terms Your Training Curriculum Evaluation of the Cisco
What s New in Juniper s SSL VPN Version 6.0
What s New in Juniper s SSL VPN Version 6.0 This application note describes the new features available in Version 6.0 of the Secure Access SSL VPN products. This document assumes familiarity with the Juniper
Extranet Access Management Web Access Control for New Business Services
Extranet Access Management Web Access Control for New Business Services An Evidian White Paper Increase your revenue and the ROI for your Web portals Summary Increase Revenue Secure Web Access Control
MANAGE SECURE ACCESS TO APPLICATIONS BASED ON USER IDENTITY. EMEA Webinar July 2013
MANAGE SECURE ACCESS TO APPLICATIONS BASED ON USER IDENTITY EMEA Webinar July 2013 Protecting the Enterprise Full Footprint Mobile user Application access management & Application security Enterprise headquarters
Novell Access Manager SSL Virtual Private Network
White Paper www.novell.com Novell Access Manager SSL Virtual Private Network Access Control Policy Enforcement Compliance Assurance 2 Contents Novell SSL VPN... 4 Product Overview... 4 Identity Server...
Network Security Firewall
DFL-210 Multi-Function Security + Network Firewall + VPN Server + Content Manager + Bandwidth Manager + Transparent Firewall Mode Ports + 1 Ethernet WAN + 4 Ethernet LAN + 1 Ethernet DMZ/WAN2 Advanced
WATCHGUARD FIREBOX VCLASS
FIREBOX VCLASS WATCHGUARD FIREBOX VCLASS ENTERPRISE-LEVEL SECURITY The Firebox Vclass brings high-speed network security to enterprise-class businesses, remote offices, service providers, and data centers.
Cisco IOS SSL VPN: Router-Based Remote Access for Employees and Partners
Cisco IOS SSL VPN: Router-Based Remote Access for Employees and Partners Product Overview Cisco IOS SSL VPN is the first router-based solution offering Secure Sockets Layer (SSL) VPN remote-access connectivity
Cisco IOS SSL VPN: Router-Based Remote Access for Employees and Partners
Cisco IOS SSL VPN: Router-Based Remote Access for Employees and Partners Product Overview Cisco IOS SSL VPN is the first router-based solution offering Secure Sockets Layer (SSL) VPN remote-access connectivity
Gigabit SSL VPN Security Router
As Internet becomes essential for business, the crucial solution to prevent your Internet connection from failure is to have more than one connection. PLANET is the ideal to help the SMBs increase the
MOVE AT THE SPEED OF BUSINESS. a CELERA DATASHEET WAN OPTIMIZATION CONTROLLERS
MOVE AT THE SPEED OF BUSINESS. a CELERA DATASHEET WAN OPTIMIZATION CONTROLLERS acelera WAN optimization controllers accelerate applications, speed data transfers and reduce bandwidth costs using a combination
Background. Industry: Challenges: Solution: Benefits: APV SERIES CASE STUDY Fuel Card Web Portal
Industry: Energy; Retail & ecommerce Challenges: Deliver an optimal user experience by balancing traffic across multiple leased links Balance user access and application operation requests among back-end
An Analysis of Propalms TSE and Microsoft Remote Desktop Services
An Analysis of TSE and Remote Desktop Services JULY 2010 This document illustrates how TSE can extend your Remote Desktop Services environment providing you with the simplified and consolidated management
SVN3000 Security Access Gateway SSL/IPSec VPN Access Gateway
With the development of across-region services and establishment of enterprise branches, remote office has seen increasing demand. Thus, interconnections between branches and secure access for employees
nexus Hybrid Access Gateway
Product Sheet nexus Hybrid Access Gateway nexus Hybrid Access Gateway nexus Hybrid Access Gateway uses the inherent simplicity of virtual appliances to create matchless security, even beyond the boundaries
The SSL device also supports the 64-bit Internet Explorer with new ActiveX loaders for Assessment, Abolishment, and the Access Client.
WatchGuard SSL v3.2 Release Notes Supported Devices SSL 100 and 560 WatchGuard SSL OS Build 355419 Revision Date January 28, 2013 Introduction WatchGuard is pleased to announce the release of WatchGuard
SonicWALL PCI 1.1 Implementation Guide
Compliance SonicWALL PCI 1.1 Implementation Guide A PCI Implementation Guide for SonicWALL SonicOS Standard In conjunction with ControlCase, LLC (PCI Council Approved Auditor) SonicWall SonicOS Standard
OVERVIEW. DIGIPASS Authentication for Office 365
OVERVIEW DIGIPASS for Office 365 Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document is provided 'as is'; VASCO Data Security assumes no responsibility
INTRODUCTION TO FIREWALL SECURITY
INTRODUCTION TO FIREWALL SECURITY SESSION 1 Agenda Introduction to Firewalls Types of Firewalls Modes and Deployments Key Features in a Firewall Emerging Trends 2 Printed in USA. What Is a Firewall DMZ
Array Purpose-Built SSL VPN
White Paper Delivering Fast, Secure, and Scalable Universal Access Array Networks, Inc. 1371 McCarthy Blvd. Milpitas, CA 95035 Phone: (408) 240-8700 Executive Summary As more organizations turn to virtual
Get Success in Passing Your Certification Exam at first attempt!
Get Success in Passing Your Certification Exam at first attempt! Exam : 920-440 Title : nncde wireless lan Version : DEMO 1. A customer wants to access the Microsoft Outlook Web Access application through
Introduction to Endpoint Security
Chapter Introduction to Endpoint Security 1 This chapter provides an overview of Endpoint Security features and concepts. Planning security policies is covered based on enterprise requirements and user
Emerson Smart Firewall
DeltaV TM Distributed Control System Product Data Sheet Emerson Smart Firewall The Emerson Smart Firewall protects the DeltaV system with an easy to use perimeter defense solution. Purpose built for easy
Reliable DNS and DHCP for Microsoft Active Directory
WHITEPAPER Reliable DNS and DHCP for Microsoft Active Directory Protecting and Extending Active Directory Infrastructure with Infoblox Appliances Microsoft Active Directory (AD) is the distributed directory
Kaseya IT Automation Framework
Kaseya Kaseya IT Automation Framework An Integrated solution designed for reducing complexity while increasing productivity for IT Professionals and Managed Service Providers. The powerful, web-based automation
Deployment Guide May-2015 rev. a. APV Oracle PeopleSoft Enterprise 9 Deployment Guide
Deployment Guide May-2015 rev. a APV Oracle PeopleSoft Enterprise 9 Deployment Guide 1 Introduction... 3 2 Prerequisites and Assumptions... 4 2.1 Oracle PeopleSoft Enterprise... 4 2.2 Array Networks APV
Enterprise Solution for Remote Desktop Services... 2. System Administration... 3. Server Management... 4. Server Management (Continued)...
CONTENTS Enterprise Solution for Remote Desktop Services... 2 System Administration... 3 Server Management... 4 Server Management (Continued)... 5 Application Management... 6 Application Management (Continued)...
Mobile Admin Security
Mobile Admin Security Introduction Mobile Admin is an enterprise-ready IT Management solution that generates significant cost savings by dramatically increasing the responsiveness of IT organizations facing
The Ultimate WLAN Management and Security Solution for Large and Distributed Deployments
The Ultimate WLAN Management and Security Solution for Large and Distributed Deployments Centralized WLAN management and auto provisioning Manages up to 0 APs with granular access control Advanced RF management
PortWise Access Management Suite
Create secure virtual access for your employees, partners and customers from any location and any device. With todays global and homogenous economy, the accuracy and responsiveness of an organization s
SSL-Based Remote-Access VPN Solution
Cisco IOS SSL VPN SSL-Based Remote-Access VPN Solution Product Overview Cisco IOS SSL VPN is the first router-based solution offering Secure Sockets Layer (SSL) VPN remote-access connectivity integrated
PULSE SECURE FOR GOOGLE ANDROID
DATASHEET PULSE SECURE FOR GOOGLE ANDROID Product Overview In addition to enabling network and resource access for corporate managed mobile devices, many enterprises are implementing a Bring Your Own Device
Cisco Easy VPN on Cisco IOS Software-Based Routers
Cisco Easy VPN on Cisco IOS Software-Based Routers Cisco Easy VPN Solution Overview The Cisco Easy VPN solution (Figure 1) offers flexibility, scalability, and ease of use for site-to-site and remoteaccess
Best Practices for Secure Remote Access. Aventail Technical White Paper
Aventail Technical White Paper Table of contents Overview 3 1. Strong, secure access policy for the corporate network 3 2. Personal firewall, anti-virus, and intrusion-prevention for all desktops 4 3.
Introduction to Mobile Access Gateway Installation
Introduction to Mobile Access Gateway Installation This document describes the installation process for the Mobile Access Gateway (MAG), which is an enterprise integration component that provides a secure
owncloud Architecture Overview
owncloud Architecture Overview Time to get control back Employees are using cloud-based services to share sensitive company data with vendors, customers, partners and each other. They are syncing data
Cisco ASA Adaptive Security Appliance Single Sign-On: Solution Brief
Guide Cisco ASA Adaptive Security Appliance Single Sign-On: Solution Brief October 2012 2012 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 1 of 21 Contents
ACCELPRO SSL VPN SERIES
ACCELPRO SSL VPN SERIES APG700, APG1400, APG2800, APG5600, APG6200 & VIRTUAL APPLIANCE 30 X FASTER, 2 SECONDS CLIENT LOGIN TIME, END TO END SECURITY WITHOUT COMPROMISING NETWORK PERFORMANCE PRODUCT OVERVIEW
安 瑞 科 技 物 聯 網 對 應 用 交 付 器 (ADC) 的 需 求 及 應 用 實 例 徐 乃 丁 博 士 研 發 副 總 裁 / 技 術 長
安 瑞 科 技 物 聯 網 對 應 用 交 付 器 (ADC) 的 需 求 及 應 用 實 例 徐 乃 丁 博 士 研 發 副 總 裁 / 技 術 長 Internet of Things needs Application Delivery Controller (ADC) But Internet of Things demands a new class of networking equipment,
Dell SonicWALL Secure Virtual Assist: Clientless remote support over SSL VPN
Dell SonicWALL Secure Virtual Assist: Clientless remote support over SSL VPN Businesses can enhance user satisfaction, productivity, profitability and security by leveraging existing infrastructure to
IPSec or SSL VPN? Copyright 2004 Juniper Networks, Inc. www.juniper.net 1
IPSec or SSL VPN? Copyright 2004 Juniper Networks, Inc. www.juniper.net 1 Copyright 2004 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net 2 The Traditional Extended Enterprise Fixed
Move over, TMG! Replacing TMG with Sophos UTM
Move over, TMG! Replacing TMG with Sophos UTM Christoph Litzbach, Pre-Sales Engineer NSG 39 Key Features of TMG HTTP Antivirus/spyware URL Filtering HTTPS forward inspection Web Caching Role based access
Astaro Gateway Software Applications
Astaro Overview Astaro Products - Astaro Security Gateway - Astaro Web Gateway - Astaro Mail Gateway - Astaro Command Center - Astaro Report Manager Astaro Gateway Software Applications - Network Security
SSL VPN Technical Primer
4500 Great America Parkway Santa Clara, CA 95054 USA 1-888-NETGEAR (638-4327) E-mail: [email protected] www.netgear.com SSL VPN Technical Primer Q U I C K G U I D E Today, small- and mid-sized businesses
Cisco Intrusion Detection System Services Module (IDSM-2)
Data Sheet Cisco Intrusion Detection System Services Module (IDSM-2) Cisco integrated network security solutions enable organizations to minimize risk and maximize business continuity. The Cisco IDSM-2
ForeScout CounterACT. Device Host and Detection Methods. Technology Brief
ForeScout CounterACT Device Host and Detection Methods Technology Brief Contents Introduction... 3 The ForeScout Approach... 3 Discovery Methodologies... 4 Passive Monitoring... 4 Passive Authentication...
Cisco Secure Access Control Server 4.2 for Windows
Cisco Secure Access Control Server 4.2 for Windows Overview Q. What is Cisco Secure Access Control Server (ACS)? A. Cisco Secure ACS is a highly scalable, high-performance access control server that operates
Game changing Technology für Ihre Kunden. Thomas Bürgis System Engineering Manager CEE
Game changing Technology für Ihre Kunden Thomas Bürgis System Engineering Manager CEE Threats have evolved traditional firewalls & IPS have not Protection centered around ports & protocols Expensive to
WHITEPAPER. SECUREAUTH 2-FACTOR AS A SERVICE 2FaaS
WHITEPAPER SECUREAUTH 2-FACTOR AS A SERVICE 2FaaS EXECUTIVE OVERVIEW 2-Factor as a Service (2FaaS) is a 100% cloud-hosted authentication solution that offers flexible security without compromising user
Security Considerations for DirectAccess Deployments. Whitepaper
Security Considerations for DirectAccess Deployments Whitepaper February 2015 This white paper discusses security planning for DirectAccess deployment. Introduction DirectAccess represents a paradigm shift
RSA SecurID Two-factor Authentication
RSA SecurID Two-factor Authentication Today, we live in an era where data is the lifeblood of a company. Now, security risks are more pressing as attackers have broadened their targets beyond financial
Meraki MX Family Cloud Managed Security Appliances
DATASHEET Meraki MX Family Cloud Managed Security Appliances Overview The Meraki MX is a complete next generation firewall and branch gateway solution, designed to make distributed networks fast, secure,
Cisco Certified Security Professional (CCSP)
529 Hahn Ave. Suite 101 Glendale CA 91203-1052 Tel 818.550.0770 Fax 818.550.8293 www.brandcollege.edu Cisco Certified Security Professional (CCSP) Program Summary This instructor- led program with a combination
Intelligent WLAN Controller with Advanced Functions
Intelligent WLAN Controller with Advanced Functions Centralized WLAN management and auto provisioning Manages up to 512 APs with granular access control ZyMESH simplifies complex, inconvenient cabling
PortWise Access Management Suite
Create secure virtual access for your employees, partners and customers from any location and any device. With todays global and homogenous economy, the accuracy and responsiveness of an organization s
Achieving PCI Compliance Using F5 Products
Achieving PCI Compliance Using F5 Products Overview In April 2000, Visa launched its Cardholder Information Security Program (CISP) -- a set of mandates designed to protect its cardholders from identity
Achieve Unified Access Control and Scale Cost-Effectively
DATASHEET What s Inside 2 Unified Global Access 3 Consolidated Infrastructure and Simplified Management 5 Dynamic and Centralized Access Control 7 Superior Security 8 Flexibility, High Performance, and
Pulse Connect Secure. Data Sheet. Published Date
Data Sheet Published Date July 2015 Service Overview Employees are more mobile than ever before, and they carry multiple company issued and personal (BYOD) computing devices. They want fast, easy yet secure
