SANGFOR INTERNET ACCESS MANAGEMENT. Increased Visibility. Enhanced Management. Value-Added Marketing.
|
|
|
- MargaretMargaret Flowers
- 10 years ago
- Views:
Transcription
1 SANGFOR INTERNET ACCESS MANAGEMENT Increased Visibility Enhanced Value-Added Marketing
2 Visibility, & Value-Added Marketing SANGFOR Internet Access Solution Internet has become a vital platform for most businesses as more and more mission-critical applications have been deployed over the Internet. However with great opportunities come great challenges. IT departments are often neglected as they are only seen as a cost, rather than an investment. Improving user experience and work efficiency, blocking illegal endpoints, reducing bandwidth consumption, guarding intellectual property rights, protecting against malware and implementing internet access compliance have become the main challenges for IT managers. Moreover, with the rise of the BYOD (Bring Your Own Device) trend in work environment, superior enterprise Internet management tools are needed more urgently than ever for the overburdened IT department. SANGFOR Internet Access (IAM) is the ideal solution designed to tackle enterprise network challenges which offer simple and reliable Internet access control. With SANGFOR IAM, you can also transform your wireless network into a Marketing Tool, which can allow you to generate more revenue through advertisements and better understand your customer's behavior. Bandwidth URL Filtering & APP Control Traffic Quota Support Internet Traffic Reporting IPv6 Support Unified management for LAN + WLAN User Authentication Account Block & Detect Illegal Wi-Fi Built-in Firewall & IPsec VPN Modules INTERNET Intuitive Reporting You can't manage what you can't see describes the challenges and risks of a modern enterprise network and makes the Report Center a critical component for IT department to analyze network traffics. SANGFOR IAM is built with an Advanced Report Center which supports various customized report based on traffic statistics, queries, ranking, times and behavior of user & user groups, helping enterprises analyze the root causes of all network issues. Advanced Report Center: Accurate Traffic Reporting and Graphs Content Visibility and Auditing: IM, s and Social Networks At the same time, as information and data are becoming key assets, enterprises are paying more attention to prevent potential information leakage and disruptive network activities. SANGFOR IAM can realize refined content auditing for common IM programs (Instant Messenger such as Yahoo Messenger, Skype, Gtalk), s and social network platforms (Facebook, Twitter, etc.). - URL Filtering Engine - Applications Control - Dynamic - Endpoint - Traffic Reports - Etc. Sangfor Technologies Company Limited
3 Internet Access Advanced Report Center The above graphics are available in the Control Panel of IAM : URL Ranking, Application Ranking/Duration, Real Time WAN Throughput and Application Flow Ranking. The above graphics are available in the Control Panel of IAM : Group Stream Trend Detail, Internet Application (IM Action Trend) and Application Total Flow Ranking. IAM Advanced Report Center records, audits and counts every single network behavior of intranet users in graphical reports. With reports, curves and statistics, IT managers are provided with all the detailed information they need to know about their network, including Internet access activities, bandwidth consumption and viewed contents. Reports are self-generated by the device and automatically & regularly sent to an appointed address to effectively assist in the network design, secure it and optimize the usage of traffic. BM & User Access Control Bandwidth : Guarantee Enough Bandwidth for Critical Applications Account : Avoid Abuse by Restricting Total Number of Devices Application Control : Protect Enterprises Against Unauthorized Applications URL Filtering: Monitor & Control Evasive Activities Endpoint Control: of Mobiles Devices Internet is evolving exponentially with thousands of new websites and applications emerging daily. Some of them are non-work related and if the enterprise has not set any control policy, it will reduce employees work productivity and occupy much more bandwidth resource, which can bring network security risks and noncompliance risks. In order to solve these issues, SANGFOR IAM is built with an URL database and application database, which can help IT administrators to effectively control users online behavior by setting specific policies. At the same time, as the BYOD trend is becoming more and more popular, mobile devices should be also included in the enterprise network management policy. IAM can control mobile devices by identifying and applying specific access and control policies, according to the device OS, group and location. It unifies the management for both LAN and WLAN. SANGFOR IAM can also detect and block illegal Wi-Fi hotspots to avoid any information leakage from your laptop, smartphones or tablets. A wireless endpoints list will display which endpoint is using an illegal Wi-Fi hotspot and the IT team can decide whether to block it or not. [email protected] IAM - Internet Access Solution
4 Internet Access Value-Added Marketing Authentication & Push Advertising based on SMS Authentication & Push Advertising based on Portal Authentication & Push Advertising based on Social Media Most of the shopping centers, restaurants, hotels, etc. are now providing Free Wi-Fi to their customers. Free Wi- Fi is now the trend and it can be an important criteria when choosing a place to spend time. So why not transform your Wi-Fi into a Marketing Tool, which can bring more revenue and increase your marketing campaigns effectiveness? With the multiple authentication methods provided for Wireless access, you can also ensure that your customers are connected to a secured network environment. Authentication & Push Advertising based on SMS One of the most fastest way and common way to collect customers information is by collecting their phone number. When connecting to the Wi-Fi access point, the login page will ask the customers to insert their phone number to access the internet. Thanks to that, you can now send advertisements to your customers through SMS or by calling them. Enter your phone number to access Free Wi-Fi! Let me send a Thank You & Promotion message to our customers who used our Wi-Fi this month! Authentication & Push Advertising based on Portal Another common solution to collect customers information is to redirect them to a customized Portal page after they successfully connected to your Wi-Fi. This Portal can be customized with any kind of information such as today s promotions, new products or services, etc. Authentication & Push Advertising based on Social Media Facebook, Line, WeChat are the fastest growing social media platforms in Asia. They can now be used as a way to authenticate to your Wi-Fi and at the same time, increase your number of followers. More importantly, you can now push information and reach a larger number of people. Sangfor Technologies Company Limited
5 IAM Datasheet SANGFOR IAM Product Family Model S5000 M5000 M5100 M5400 M5500 M5600 M5900 M6000 M9000 Profile Desktop 1U 1U 1U 2U 2U 2U 2U HD Capacity 64G SSD 128G SSD 128G SSD 500GB 500GB 500GB 500GB 500GB 2U 500GB+ 4G CF FW Throughput¹ 100 Mbps 150 Mbps 250 Mbps 1.2 Gbps 2 Gbps 2.5 Gbps 3.5 Gbps 6.0 Gbps 20 Gbps Application Layer Throughput¹ 20 Mbps 60 Mbps 120 Mbps 240 Mbps 600 Mbps 1.2 Gbps 2 Gbps 4 Gbps 10 Gbps Recommended Concurrent Users 50 PCs~ 100 Mob. 100 PCs~ 100 Mob. 100~ ~ ~ ~ ~ ~ ~50000 ¹: Represents the maximum bidirectional flow (max. inbound + outbound flow). Power and Physical Specifications Dual Power Supplies Power [Watt] (Typical) 22W 25W 25W 180W YES YES YES YES 180W 212W 212W 212W 325W Temperature 0 C~40 C 0 C~40 C 0 C~40 C 0 C~40 C 0 C~40 C 0 C~40 C 0 C~40 C 0 C~40 C 0 C~40 C System Dimensions (W x L x H in mm) 275x175x x300 x x300 x x390x x x x x x600 System Weight 1.7 Kg 3.85 Kg 4.2 Kg 6.65 Kg 15.3 Kg 15.3 Kg 20.0 Kg 20.0 Kg 20.0 Kg Relative Humidity 5%~95% non-condensing Network Interfaces Bypass (copper) 1 pair 1 pair 3 pairs 3 pairs 3 pairs 2 pairs 2 pairs 2 pairs 10/100/1000 Base-T G SFP GbE SFP+ 2 Serial Port RJ45x1 RJ45x1 RJ45x1 RJ45x1 RJ45 1 RJ45 1 RJ45 1 RJ45 1 USB Port RJ Compliance and Certificates Compliance CE,FCC, IPv6 Ready 1) Products specifications described herein are subject to change without prior notification. 2) Please contact your local SANGFOR office for more information and support. 3) All performance values are up to and vary depending on the system configuration. [email protected] IAM - Internet Access Solution
6 IAM Product Features SANGFOR Internet Access (IAM) Product Features User Authentication and Mapping and Identifying Users User Accounts Importing Integration and SSO Option New User Account Attribution Wireless Auth. Methods Access Control Application Control URL Filter Search Engine Control Enhanced Control Enhanced IM Control File Filter SSL Traffic Control Illegal Wi-Fi Detection and Blocking Illegal Wi-Fi Detection and Blocking Bandwidth (BM) BM Policy BM Objects Bandwidth Guarantee & Limitation Multi-level SON Channel Dynamic Bandwidth Virtual Line Multiplexing and Intelligent Routing IP, MAC, IP/MAC binding, hostname, USB Key, SMS, QR-Code, Portal, WeChat. - Import user accounts information using CSV file, LDAP Server. - Synchronize user with LDAP, Database and H3C CAMS Server. Active Directory/POP3/Proxy/Web Server, Radius, Third-party authentication device, Database Server. - Automatically map new user to its privileged groups in local database based on its IP range, subnet or external authentication server group. - Automatically map new users to a pre-defined privileged group as temporary accounts. Public (Share user login)/ Private (Single user login) account option. Identify and control applications through application DB or port. URL DB, keyword in web-page based control. Managed by keywords. Managed by source address, destination address, keywords in , keywords in body/title, attachment, type/size/count based control. Comprehensive management to IM tools such as MSN, Yahoo!, as well as encrypted IM such as Skype, Gtalk, MSNShell, etc. Control HTTP, FTP upload and download activity based on true file type. Certificate, text content based control and filter. Traffic guarantee/limit policy for uplink and/or downlink base on bandwidth percentage of the pipe, max bandwidth per user, user/application priority, exclusion policy. Application type, website type, file type, user, schedule, destination IP, etc. Allocate bandwidth resource according to business type & guarantee bandwidth for core business applications and restrict irrelevant traffic. Match the organizational structure to achieve finegrained bandwidth management. - Bandwidth Borrowing among BM tunnel for full bandwidth utilization. Specify a network flow thresholds as effective points of BM policy. - BM based on public IP (oversea). - Average allocation/free competition among users in a single traffic pipe. Manage and control to each physical line independently vely in bridge mode. Provide link load balancing in router mode. Traffic Identification and Categorization Sangfor URL Database SMS/WeChat/QR-Code/ Portal Detect the endpoint information from every IP address. - Leverage on-the-cloud infrastructure, dynamically categorizes millions URLs into the predefine categories. - Support configurable in-box cache footprint. Sangfor Technologies Company Limited Third Party URL Database Application Database Intelligent Identification Rules File Type Identification Report Center Report Objects Graphical Reports Real-Time Report Content Log Customizable Risk Report CIO Report Web-Access Connection Quality Report Report Format Report center storage External reports storage security Flow/Duration Control Optional URL database. Independent Internet application signatures database. Identify P2P/Proxy tools/voip/ssl traffic intelligently through dynamic flow characteristics analysis. - By extension name - By file type (data pattern) Application flow, user behavior counts, online duration per user & per application, virus and security, keywords, etc. Counts, ranking, comparison, trends analysis with statistics, pie, bar, line chart, etc. Real-time monitor of CPU/hard disk/traffic/connection/ session status, online user information, traffic ranking, connection ranking, real-time utilization, visibility of bandwidth channels. Content log including IM chat (Gtalk, Skype, QQ, MSN, Yahoo! Messenger, etc.), SMTP and Web mail content and attachment (Gmail, Yahoo, etc.), BBS posts (Facebook, Twitter), etc. Employee turnover trend, disclosure, work efficiency, security risks and other risk reports. Tailored reports of overall network analysis and risk management for CIO. Used for clear evaluation of the overall network quality. Users with poor web access quality can be listed down. CSV, PDF. Control Tools for Manageability Notification (Reminder) Endpoint security compliance Audit-Free Key Audit-Log Key Hierarchical Administration Network and Deployment Centralized LAN+WLAN Security modules Deployment Stability IPv6 Integrity Optional internal (built-in) report center and external report center. - Option to protect the report center by using external authentication key for additional security. - Google Like search engine GUI for external report center. - subscription. Notify end user for online time of specific application and the flow speed of specific application. Daily/Monthly flow quota per user. Daily online duration quota per user with exception case based on specific application. Concurrent session quota per user. Operation system, process, registry, scheduled task, etc. Prevents access audits and control for users that assigned with audit-free keys. Only the user with the audit-log key can check the network logs to avoid privacy issue. Functionality of different modules can be assigned to different administrators as needed, via a hierarchical management paradigm. Administration of different functions and modules can be delegated to different administrative groups. Unified the configuration and policy for multiple devices, remote control and monitor running status. Set special control policy for mobile user based on user & location. Suitable for BYOD office environment. - Built-in Firewall. - Built-in IPsec VPN. Route, Bridge, Double bridge, Bypass. Hardware bypass, A/A, A/P. - Support deployment in IPv6 environment. - Support monitoring of IPv6 traffic. Support SNMP. *M5900-AC-I and M6000-AC-I supports Bridge, Double Bridge, and Bypass mode. Please do not hesitate to contact us by or by phone if you need more information about our IAM features.
7 Company Introduction Vision SANGFOR TECHNOLOGIES SANGFOR is the leading vendor of Application Security, Optimization and Internet Access in Asia. Founded in 2000, SANGFOR set a clear goal to build high performance, reliable and secure network devices that increase the business growth of our clients and at the same time decrease their Total Cost of Ownership (TCO). SANGFOR currently has 55 representative offices located in major cities of mainland China, Hong Kong, Singapore, Malaysia, Indonesia, Thailand, United Kingdom and United States of America, with over 2000 employees, which 40% of them are dedicated to R&D. In 2014, SANGFOR has got a record-breaking income and has continuously invested 20% of the revenue into R&D each year. So far, SANGFOR has provided solutions to over 28,000 businesses partners in various industries, among which lists a number of Fortune 500 companies, as well as hundreds of local government departments and famous education institutions. Awards & Achievements Technology Fast 500 Asia Pacific Region Award for 8 consecutive years from 2005 to 2012 by Deloitte. Best Companies to Work for in China Award from 2009 to 2011 by the Fortune Magazine. Best Practice Award in Asia-Pacific Region in 2010 by Frost & Sullivan. Action Award in 2012 by Harvard Business Review. Business Security Contribution Award in 2010 by Communication World. Sangfor SSL VPN no. 1 in Network Security market in Mainland China, Hong Kong & Taiwan according to Frost & Sullivan. No.1 for Secure Content Hardware and VPN Hardware segment in China according to IDC. Sangfor IAM listed for 5 consecutive years in the Gartner Magic Quadrant for Secure Web Gateways ( ). Sangfor WANO listed for 3 consecutive years in the Gartner Magic Quadrant for WAN Optimization ( ). Sangfor NGFW listed in the Enterprise Network Firewalls Magic Quadrant by Gartner (2015). Reviewed by NSS Labs with a Recommended rating in 2014 for SANGFOR NGFW (WAF test). Vision Mission Values Become the Global Leading Vendor of Advanced Network Solutions. Our Notable Clients Provide Network Innovation, Focus on Network Security, Optimization and Virtualization. Continuous Innovation Collective Commitment Customer & Result Oriented Caring for Employees [email protected] IAM - Internet Access Solution
8 SANGFOR HEADQUARTERS Block A1, Nanshan ipark, No.1001 Xueyuan Road, Nanshan District, Shenzhen, Guangdong Province, P. R. China SANGFOR HONG KONG Unit 1109, 11/F, Tower A, Mandarin Plaza, 14 Science Museum Road, Tsim Sha Tsui East, Kowloon, Hong Kong Tel: (+852) Fax: (+852) AVAILABLE SOLUTIONS - IAM : Take Back Control of your Network - WANO : LAN Speed on your WAN - NGAF : Best Value for Money - EasyConnect: Rapid, Secure & Simple SANGFOR SINGAPORE 8 Burn Road # 04-09, Trivex, Singapore (369977) Tel: (+65) SANGFOR INDONESIA World Trade Centre, WTC 5, 6th Floor, Jl.Jend.Sudirman Kav.29 Jakarta 12920,Indonesia. Tel: (+62) Fax: (+62) SANGFOR MALAYSIA No , Boulevard Mid Valley City, Lingkaran Syed Putra, Kuala Lumpur, Malaysia Tel: (+60) Fax: (+60) SANGFOR THAILAND 29 Vanissa Building 4th Floor, Unit 4G, Soi Chidlom, Ploenchit Road, Lumpini, Patumwan, Bangkok, Thailand Tel: (+66) Fax: (+66) SANGFOR USA 2901 Tasman Drive, Suite 107, Santa Clara, California, USA Tel: (+1) Fax: (+1) SANGFOR EMEA Unit 1, The Antler Complex, 1 Bruntcliffe Way, Morley, Leeds LS27 0JG, United Kingdom Tel: (+44) Fax: (+44) Sales : [email protected] Marketing : [email protected] Global Service Center : (or 7511) Copyright 2016 Sangfor Technologies. All Rights Reserved. IAM_BR_P_IAM-Brochure_
Sangfor Internet Access Management Solution
SANGFOR INTERNET ACCESS MANAGEMENT Simplify & Visualize User Management Total Control of Your Network Enhanced Management Value-Added Features Simplify & Visualize User Management Sangfor Internet Access
SANGFOR SSL VPN. Rapid, Secure & Simple. www.sangfor.com [email protected]
SANGFOR Rapid, Secure & Simple With the development of cloud computing and mobile devices, modern workforces have become increasingly mobilized and distributed. This trend requires business organizations
NGAF FIREWALL PLATFORM
FIREWALL PLATFORM Best Value for Money The World 1st Integrated + WAF Competitive TCO Through Technology Innovation Holistic & Self-Adaptive Security Solution Big Data Security Analytics Simplified Operation
85% of business networks identified with bot infections 63% of business networks identified to have downloaded malware files 89% of business networks
2015 07 SANGFOR NGAF FIREWALL PLATFORM 85% of business networks identified with bot infections 63% of business networks identified to have downloaded malware files 89% of business networks identified with
Wide Area Network. Remote Access. Cloud Computing. Global Connectivity. www.sangfor.com [email protected]. Data Reduction. Application Acceleration
Global Connectivity Cloud Computing Remote Access SANGFOR WAN OPTIMIZATION SANGFOR WANO (Wan Optimization) provides your company with a competitive edge by expanding your business potential. WANO lets
SANGF OR S ANGF OR S SL VPN
SSL VPN With the development of cloud computing and mobile devices, modern workforces have become increasingly mobilized and distributed. This trend requires business organizations to prepare its IT infrastructure
SVN5800 Secure Access Gateway
The development of networks allows enterprises to provide remote access to branch offices, partners, customers, mobile employees, and home offices so that they can access application and data resources,
NGAF FIREWALL PLATFORM
NGAF FIREWALL PLATFORM Your Security Guard to the Future The World First Fully Integrated NGFW + WAF Full Visibility of the Network Security Real-Time Detection & Fast Response Simple Operation & Maintenance
SANGFOR WAN OPTIMIZATION
Global Connectivity Cloud Computing WAN OPTIMIZATION WIDE AREA NETWORK Remote Access Expanding your businesses potential, Wide Area Network provides your company with a competitive edge. WAN allows for
Product Overview. www.sangfor.net. customers in the business of service provider, enterprise, financial services, and public sectors.
www.sangfor.net Cost effective WANO solutions for midsize enterprises Product Overview customers in the business of service provider, enterprise, financial services, and public sectors. infrastructure
The Ultimate WLAN Management and Security Solution for Large and Distributed Deployments
The Ultimate WLAN Management and Security Solution for Large and Distributed Deployments Centralized WLAN management and auto provisioning Manages up to 0 APs with granular access control Advanced RF management
The All-in-One, Intelligent NXC Controller
The All-in-One, Intelligent NXC Controller Centralized management for up to 24 APs ZyXEL Wireless Optimizer for easily planning, deployment and maintenance AP auto discovery and auto provisioning Visualized
Break Internet Bandwidth Limits Higher Speed. Extreme Reliability. Reduced Cost.
Break Internet Bandwidth Limits Higher Speed. Extreme Reliability. Reduced Cost. Peplink. All Rights Reserved. Unauthorized Reproduction Prohibited Presentation Agenda Peplink Balance Pepwave MAX Features
Deploy and Manage a Highly Scalable, Worry-Free WLAN
Deploy and Manage a Highly Scalable, Worry-Free WLAN Centralized WLAN management and auto provisioning Manages up to 512 APs with granular access control simplifies complex, inconvenient cabling Wi-Fi
Gigabit Multi-Homing VPN Security Router
As Internet becomes essential for business, the crucial solution to prevent your Internet connection from failure is to have more than one connection. PLANET is a ideal to help the SMBs increase the broadband
Intelligent WLAN Controller with Advanced Functions
Intelligent WLAN Controller with Advanced Functions Centralized WLAN management and auto provisioning Manages up to 512 APs with granular access control ZyMESH simplifies complex, inconvenient cabling
Public Internet Access Done the Right Way
Public Internet Access Done the Right Way Supports 500 concurrent logins by default and up to 800 via license upgrade Integrated account generator, Web-based authentication portal and billing system Supports
The All-in-one Guest Access Solution of Tomorrow, Delivered Today
The All-in-one Guest Access Solution of Tomorrow, Delivered Today (2.4 GHz and 5 GHz) design by default and up to 300 via license upgrade (UAG4100) Web-based authentication portal and billing system management
USG6600 Next-Generation Firewall
USG6600 Next-Generation Firewall With the proliferation of smart devices, such as smartphones and tablets, mobile apps, Web2.0, and social networking become integral parts of enterprise operation. The
USG6300 Next-Generation Firewall
USG6300 Next-Generation Firewall With the proliferation of smart devices, such as smartphones and tablets, mobile apps, Web2.0, and social networking become integral parts of enterprise operation. The
EasyConnect. Any application - Any device - Anywhere. Faster, Simpler & Safer Networks
EasyConnect Any application - Any device - Anywhere As cloud computing and mobile devices continue to reshape the way people work, workforces are becoming increasingly mobile. In order to remain competitive,
Network Security. Network Security. Protective and Dependable. > UTM Content Security Gateway. > VPN Security Gateway. > Multi-Homing Security Gateway
PLANET Product Guide 2011 Protective and Dependable With the growth of the Internet threats, network security becomes the fundamental concerns of family network and enterprise network. To enhance your
TECHNICAL WHITEPAPER. Author: Tom Kistner, Chief Software Architect. Table of Contents
TECHNICAL WHITEPAPER Author: Tom Kistner, Chief Software Architect Last update: 18. Dez 2014 Table of Contents Introduction... 2 Terminology... 2 Basic Concepts... 2 Appliances... 3 Hardware...3 Software...3
Professional Integrated SSL-VPN Appliance for Small and Medium-sized businesses
Professional Integrated Appliance for Small and Medium-sized businesses Benefits Clientless Secure Remote Access Seamless Integration behind the Existing Firewall Infrastructure UTM Security Integration
Network Security. Protective and Dependable. Pioneer of IP Innovation
Network Protective and Dependable Pioneer of IP Innovation Why PLANET Network Solution? With the growth of the threats, network security becomes the fundamental concerns of home and enterprise network.
The All-in-One, Intelligent WLAN Controller
The All-in-One, Intelligent WLAN Controller Centralized management for up to 64* APs mitigates complex, inconvenient cabling Wi-Fi deployments Comprehensive features for WLAN performance optimization and
Gigabit SSL VPN Security Router
As Internet becomes essential for business, the crucial solution to prevent your Internet connection from failure is to have more than one connection. PLANET is the ideal to help the SMBs increase the
The All-in-One, Intelligent WLAN Controller
The All-in-One, Intelligent WLAN Controller Centralized management for up to 64* APs ZyMESH mitigates complex, inconvenient cabling Wi-Fi deployments Client steering enhances efficiency of wireless spectrum
Move over, TMG! Replacing TMG with Sophos UTM
Move over, TMG! Replacing TMG with Sophos UTM Christoph Litzbach, Pre-Sales Engineer NSG 39 Key Features of TMG HTTP Antivirus/spyware URL Filtering HTTPS forward inspection Web Caching Role based access
Network Security. Protective and Dependable. 52 Network Security. UTM Content Security Gateway CS-2000
Network Security Protective and Dependable With the growth of the Internet threats, network security becomes the fundamental concerns of family network and enterprise network. To enhance your business
D-View 7 Network Management System
Product Highlights Comprehensive Management Manage your network effectively with useful tools and features such as Batch Configuration, SNMP, and Flexible command Line Dispatch Hassle-Free Network Management
Datasheet. Enterprise Gateway Router with Gigabit Ethernet. Models: USG, USG-PRO-4. Advanced Security, Monitoring, and Management
Enterprise Gateway Router with Gigabit Ethernet Models: USG, USG-PRO-4 Advanced Security, Monitoring, and Management Sophisticated Routing Features Integrated with UniFi Controller Software Affordable
QuickSpecs. Models. Features and benefits Application highlights. HP 7500 SSL VPN Module with 500-user License
Overview Models JD253A Key features High performance hardware encryption Thin client and browser based access Multiple access authentication methods Remote security status checking Low Running Cost Product
REAL-TIME WEB APPLICATION PROTECTION. AWF SERIES DATASHEET WEB APPLICATION FIREWALL
REAL-TIME WEB APPLICATION PROTECTION. AWF SERIES DATASHEET WEB APPLICATION FIREWALL AWF Series Web application firewalls provide industry-leading Web application attack protection, ensuring continuity
LB Intelligent Multi-WAN Router
LB Intelligent Multi-WAN Router Increases WAN reliability and availability Increases Internet Bandwidth Improves availability and response time for external requests to hosted servers Supports VPN resiliency
Sophos SG Series Appliances
Unleash the full potential of your network With bandwidth requirements constantly increasing, network security appliances need to do more than ever before. The Sophos SG Series appliances are built to
Gigabit Multi-Homing VPN Security Gateway
Gigabit Multi-Homing VPN Security Gateway Key Features Physical Port 5 x 0/00/000BASE-T RJ-45, Undefined Ethernet port (WAN / LAN / DMZ). Multi-WAN function Outbound load balancing (Supported algorithms:
Enterprise Wireless LAN. Key Features. Benefits. Hotspot/Service Gateway Series
Key Features Comprehensive Wireless Internet Access Solution Zero Configuration IP Plug and Play Unique Ticket Printer for Easy Service and Accounting Web-based User Authentication, Account Monitoring,
Gigabit Multi-Homing VPN Security Router
Gigabit Multi-Homing VPN Security Router Physical Port 1~2 x 10/100/1000 Base-T RJ-45, configurable with LAN 1 (Mirror Port) 3~4 x 10/100/1000 Base-T RJ-45, configurable with WAN 4 (WAN 4 / LAN2 / DMZ)
Next Generation Firewall
Next Generation Firewall Product Overview SANGFOR Next-Generation Firewall is designed with Application Control, Intrusion Prevention and Web Security in mind, providing deep and fine-grained visibility
Simple security is better security Or: How complexity became the biggest security threat
Simple security is better security Or: How complexity became the biggest security threat Christoph Litzbach, Pre-Sales Engineer NSG 1 What do they have in common? DATA BREACH 2 Security is HARD! Components
How To Configure A Kiwi Ip Address On A Gbk (Networking) To Be A Static Ip Address (Network) On A Ip Address From A Ipad (Netware) On An Ipad Or Ipad 2 (
UAG715 Support Note Revision 1.00 August, 2012 Written by CSO Scenario 1 - Trunk Interface (Dual WAN) Application Scenario The Internet has become an integral part of our lives; therefore, a smooth Internet
The All-in-one Guest Access Solution of Tomorrow, Delivered Today
The All-in-one Guest Access Solution of Tomorrow, Delivered Today IEEE 802.11 a/b/g/n dual-radio (2.4 GHz and 5 GHz) design Supports 200 concurrent logins by default and up to 300 via license upgrade (UAG4100)
Features of AnyShare
of AnyShare of AnyShare CONTENT Brief Introduction of AnyShare... 3 Chapter 1 Centralized Management... 5 1.1 Operation Management... 5 1.2 User Management... 5 1.3 User Authentication... 6 1.4 Roles...
The All-in-one Guest Access Solution of
The All-in-one Guest Access Solution of Redefining Networking Integration Tomorrow, Delivered Today Application Guide Series Series Application Guide Providing access in hospitality venues is not the same
BENEFITS. Capex reduction with bundling of all required features in a single appliance. Promote your brand with customized Guest Login pages.
www.prontonetworks.com Powered By Pronto s Unifi OneBox Its a complete end-to-end platform that enables the monetization of a Wi-Fi Access Point network, while minimizing ongoing management and operation
Assuring Your Business Continuity
Assuring Your Business Continuity Q-Balancer Range Offering Business Continuity, Productivity, and Security Q-Balancer is designed to offer assured network connectivity to small and medium business (SME)
Astaro Gateway Software Applications
Astaro Overview Astaro Products - Astaro Security Gateway - Astaro Web Gateway - Astaro Mail Gateway - Astaro Command Center - Astaro Report Manager Astaro Gateway Software Applications - Network Security
Barracuda Link Balancer
Barracuda Networks Technical Documentation Barracuda Link Balancer Administrator s Guide Version 2.2 RECLAIM YOUR NETWORK Copyright Notice Copyright 2004-2011, Barracuda Networks www.barracuda.com v2.2-110503-01-0503
Enterprise Mobility as a Service
Service Description: Insert Title Enterprise Mobility as a Service Multi-Service User Management for Mobility 1. Executive Summary... 2 2. Enterprise Mobility as a Service Overview... 3 3. Pricing Structure...
Load Balance Router R258V
Load Balance Router R258V Specification Hardware Interface WAN - 5 * 10/100M bps Ethernet LAN - 8 * 10/100M bps Switch Reset Switch LED Indicator Power - Push to load factory default value or back to latest
White Paper. Optimizing the video experience for XenApp and XenDesktop deployments with CloudBridge. citrix.com
Optimizing the video experience for XenApp and XenDesktop deployments with CloudBridge Video content usage within the enterprise is growing significantly. In fact, Gartner forecasted that by 2016, large
Company Facts. 1,800 employees. 150 countries. 12,000 customers and growing. 17 languages. 11 global offices
Disclaimer This presentation may contain product features that are currently under development. This overview of new technology represents no commitment from VMware to deliver these features in any generally
Gigabit Content Security Router
Gigabit Content Security Router As becomes essential for business, the crucial solution to prevent your connection from failure is to have more than one connection. PLANET is the Gigabit Content Security
Network protection and UTM Buyers Guide
Network protection and UTM Buyers Guide Using a UTM solution for your network protection used to be a compromise while you gained in resource savings and ease of use, there was a payoff in terms of protection
IREBOX X. Firebox X Family of Security Products. Comprehensive Unified Threat Management Solutions That Scale With Your Business
IREBOX X IREBOX X Firebox X Family of Security Products Comprehensive Unified Threat Management Solutions That Scale With Your Business Family of Security Products Comprehensive unified threat management
Barracuda Link Balancer Administrator s Guide
Barracuda Link Balancer Administrator s Guide Version 1.0 Barracuda Networks Inc. 3175 S. Winchester Blvd. Campbell, CA 95008 http://www.barracuda.com Copyright Notice Copyright 2008, Barracuda Networks
Sophos Roadshow. Complete Security Vision
Sophos Roadshow Complete Security Vision Reconized leader Over 25 years of experience Data protection experts Global company with local presence 100 million users trust Sophos Reputation for highest quality
Cisco Small Business ISA500 Series Integrated Security Appliances
Q & A Cisco Small Business ISA500 Series Integrated Security Appliances Q. What is the Cisco Small Business ISA500 Series Integrated Security Appliance? A. The Cisco Small Business ISA500 Series Integrated
Unified Services Routers
High-Performance VPN Protocols IPSec PPTP L2TP SSL VPN Tunnels Up to 25 (DSR-250N) Up to 35 (DSR-500/500N) Up to 70 (DSR-1000/1000N) SSL VPN tunnels Up to 5 (DSR-250N) Up to 10 (DSR-500/500N) Up to 20
1. Built-In SPI Firewall to Protect Your Enterprise Network 2. Multi-Spam-Filtering Function Providing High Spam-Filtering Accuracy
1. Built-In SPI Firewall to Protect Your Enterprise Network BroadScan UTM core design is based on its Stateful Packet Inspection ( SPI ) firewall, providing complete firewall protection. By default, the
Troubleshooting BlackBerry Enterprise Service 10 version 10.1.1 726-08745-123. Instructor Manual
Troubleshooting BlackBerry Enterprise Service 10 version 10.1.1 726-08745-123 Instructor Manual Published: 2013-07-02 SWD-20130702091645092 Contents Advance preparation...7 Required materials...7 Topics
McAfee Web Reporter Turning volumes of data into actionable intelligence
McAfee Web Reporter Turning volumes of data into actionable intelligence Business today is more Internet-dependent than ever before. From missioncritical services to productivity tools, Internet access
Boston Area Windows Server User Group April 2010
Boston Area Windows Server User Group April 2010 Hey Jack, don t you have a new job? Yes, unbelievably, my job is better than ever. After working in our outstanding Support Engineering team for the past
Systems Manager Cloud Based Mobile Device Management
Datasheet Systems Manager Systems Manager Cloud Based Mobile Device Management Overview Meraki Systems Manager provides cloud-based over-the-air centralized management, diagnostics, and monitoring of the
BRC-W14VG-BT Wireless BitTorrent Download Router
BRC-W14VG-BT Wireless BitTorrent Download Router BRC-W14VG-BT utilizes Intel (R) IXP network processor and achieves a high-speed WAN to LAN throughput that approaches 100Mbps. In addition to basic functions
How To Use A Cisco Wvvvdns4400N Wireless-N Gigabit Security Router For Small Businesses
Cisco WRVS4400N Wireless-N Gigabit Security Router Cisco Small Business Routers Highlights Secure, high-speed wireless network access for small business Gigabit Ethernet connections enable rapid transfer
Web Security Gateway Solutions
Web Security Gateway Solutions Websense Web Security Gateway Solutions 90 percent of the top 100 Web sites are classified as social networking or search and more than 47 percent of these sites support
FIREWALL. Features SECURITY OF INFORMATION TECHNOLOGIES
FIREWALL Features SECURITY OF INFORMATION TECHNOLOGIES To ensure that they stay competitive and in order to expand their activity, businesses today know it is in their best interests to open up more channels
APPENDIX 3 LOT 3: WIRELESS NETWORK
APPENDIX 3 LOT 3: WIRELESS NETWORK A. TECHNICAL SPECIFICATIONS MAIN PURPOSE The Wi-Fi system should be capable of providing Internet access directly to a user using a smart phone, tablet PC, ipad or Laptop
Cyberoam Perspective BFSI Security Guidelines. Overview
Overview The term BFSI stands for Banking, Financial Services and Insurance (BFSI). This term is widely used to address those companies which provide an array of financial products or services. Financial
Cyberoam Next-Generation Security. 11 de Setembro de 2015
Cyberoam Next-Generation Security 11 de Setembro de 2015 Network Security Appliances UTM, NGFW (Hardware & Virtual) 2 Who is Cyberoam? Leading UTM company, headquartered in Ahmedabad, India founded in
150Mbps Wireless N Mini Pocket Router
150Mbps Wireless N Mini Pocket Router Features: 150Mbps Wireless Speed 2* RJ45 ports convenient for wired connection in wireless router mode Portable design, ideal for travel and home use Built-in power
Pronto Cloud Controller The Next Generation Control
Pronto Cloud Controller The Next Generation Control www.prontonetworks.com Cloud Managed Wi-Fi Cloud at its Best The Pronto Cloud Controller (PCC) is a next generation cloud Wi-Fi network configuration,
Websense Data Security Solutions
Data Security Suite Data Discover Data Monitor Data Protect Data Endpoint Data Security Solutions What is your confidential data and where is it stored? Who is using your confidential data and how? Protecting
FatPipe Networks www.fatpipeinc.com
WARP WHITE PAPERS FatPipe WARP Reliability, Redundancy and Speed of Bi-directional IP Traffic The implementation of mission critical applications run over wide area networks as a basic communication tool
Direct or Transparent Proxy?
Direct or Transparent Proxy? Choose the right configuration for your gateway. Table of Contents Direct Proxy...3 Transparent Proxy...4 Other Considerations: Managing authentication made easier.....4 SSL
AirWatch Solution Overview
AirWatch Solution Overview Marenza Altieri-Douglas - AirWatch Massimiliano Moschini Brand Specialist Itway 2014 VMware Inc. All rights reserved. Cloud Computing 2 BYOD 3 Device aziendali? 4 From Client/Server
Enabling Secure BYOD How Fortinet Provides a Secure Environment for BYOD
Enabling Secure BYOD How Fortinet Provides a Secure Environment for BYOD FORTINET Enabling Secure BYOD PAGE 2 Executive Summary Bring Your Own Device (BYOD) is another battle in the war between security
Meraki MX Family Cloud Managed Security Appliances
DATASHEET Meraki MX Family Cloud Managed Security Appliances Overview The Meraki MX is a complete next generation firewall and branch gateway solution, designed to make distributed networks fast, secure,
Chapter 8 Router and Network Management
Chapter 8 Router and Network Management This chapter describes how to use the network management features of your ProSafe Dual WAN Gigabit Firewall with SSL & IPsec VPN. These features can be found by
UAG4100 Support Notes
2013 UAG4100 Support Notes CSO ZyXEL 2013/07/29 Table of Contents Scenario 1 Activate a Paid Access Hotspot... 2 Print ticket to access the Internet... 3 Pay with PayPal payment service to access the Internet...
N4100/ VSG-1200 V2 Hotspot/Service Gateway Series. A Complete Hospitality Solution with Wireless LAN, Internet Access and Billing System.
Comprehensive wireless Internet access solution Zero Configuration IP Plug and Play Unique ticket printer for easy service and accounting Web-based user authentication, account monitoring and billing profiles
Best Practices for Outdoor Wireless Security
Best Practices for Outdoor Wireless Security This paper describes security best practices for deploying an outdoor wireless LAN. This is standard body copy, style used is Body. Customers are encouraged
Tech Brief. Enterprise Secure and Scalable Enforcement of Microsoft s Network Access Protection in Mobile Networks
Tech Brief Enterprise Secure and Scalable Enforcement of Microsoft s Network Access Protection in Mobile Networks Introduction In today s era of increasing mobile computing, one of the greatest challenges
Sizing Guideline. Sophos UTM 9.2 - SG Series Appliances. Sophos UTM 9.2 Sizing Guide for SG Series appliances
Sizing Guideline Sophos UTM 9.2 - SG Series Appliances Three steps to specifying the right appliance model This document provides a guideline for choosing the right Sophos SG Series appliance for your
Game changing Technology für Ihre Kunden. Thomas Bürgis System Engineering Manager CEE
Game changing Technology für Ihre Kunden Thomas Bürgis System Engineering Manager CEE Threats have evolved traditional firewalls & IPS have not Protection centered around ports & protocols Expensive to
QUALITY OF SERVICE FOR CLOUD-BASED MOBILE APPS: Aruba Networks AP-135 and Cisco AP3602i
QUALITY OF SERVICE FOR CLOUD-BASED MOBILE APPS: Aruba Networks AP-135 and Cisco AP3602i Conducted at the Aruba Proof-of-Concept Lab November 2012 Statement of test result confidence Aruba makes every attempt
Truffle Broadband Bonding Network Appliance
Truffle Broadband Bonding Network Appliance Reliable high throughput data connections with low-cost & diverse transport technologies PART I Truffle in standalone installation for a single office. Executive
Scalable. Reliable. Flexible. High Performance Architecture. Fault Tolerant System Design. Expansion Options for Unique Business Needs
Protecting the Data That Drives Business SecureSphere Appliances Scalable. Reliable. Flexible. Imperva SecureSphere appliances provide superior performance and resiliency for demanding network environments.
Cover. White Paper. (nchronos 4.1)
Cover White Paper (nchronos 4.1) Copyright Copyright 2013 Colasoft LLC. All rights reserved. Information in this document is subject to change without notice. No part of this document may be reproduced
ALLNET ALL-VPN10. VPN/Firewall WLAN-N WAN Router
ALLNET ALL-VPN10 VPN/Firewall WLAN-N WAN Router 1~2x100Mbps WAN + 3~4x100Mbps Switch LAN + 2xUSB port+2xwireless Antenna Dual WAN Ports for load balancing Up to 10 IPSec VPN tunnels, VPN Throughput 100Mbps
Enterprise Wireless LAN. Key Features. Benefits. Hotspot/Service Gateway Series
Key Features Comprehensive wireless Internet access solution Zero Configuration IP plug and play Unique ticket printer for easy service and accounting Web-based user authentication, account monitoring,
DrayTek Vigor 2950. High Performance Firewall Router. - VPN - Up to 200 concurrent tunnels. - Load Balancing & Failover between WAN ports
DrayTek Vigor 2950 Â High Performance Firewall Router VPN Up to 200 concurrent tunnels Load Balancing & Failover between WAN ports DoS/DDos Protection & Stateful Packet Inspection QoS (Quality of Service)
Extreme Security Threat Protection G2 - Intrusion Prevention Integrated security, visibility, and control for next- generation network protection
DATA SHEET Extreme Security Threat Protection G2 - Intrusion Prevention Integrated security, visibility, and control for next- generation network protection HIGHLIGHTS Delivers superior zero-day threat
Log Audit Ensuring Behavior Compliance Secoway elog System
As organizations strengthen informatization construction, their application systems (service systems, operating systems, databases, and Web servers), security devices (firewalls and the UTM, IPS, IDS,
150Mbps Wireless N Mini Pocket Router
150Mbps Wireless N Mini Pocket Router Features: 150Mbps Wireless Speed 2* RJ45 ports convenient for wired connection in wireless router mode Portable design, ideal for travel and home use Built-in power
SonicWALL Clean VPN. Protect applications with granular access control based on user identity and device identity/integrity
SSL-VPN Combined With Network Security Introducing A popular feature of the SonicWALL Aventail SSL VPN appliances is called End Point Control (EPC). This allows the administrator to define specific criteria
SANGFOR SSL VPN. Quick Start Guide
SANGFOR SSL VPN Quick Start Guide This document is intended to assist users to install, debug, configure and maintain SANGFOR SSL VPN device quickly and efficiently. Please read the followings carefully
