We provides the next generation VPN gateways, which make deployment easy, no support calls and a unified approach for secure remote access.
Features
- Remote secure (encrypted) connectivity for applications
 - Support Web based access, Thin Clients and PHAT clients
 - Supports WAN Acceleration
 - Granular access to applications as per the access rights
 - Customization of Landing Page, Client etc
 - Access based on IP, MAC id etc
 - Prevents Data Leakage through encrypted Sandbox, disabling of external storage, commands etc
 - End Point Compliance for Anti Virus/Operating System
 - Clean up all Traces of Users Access and data downloaded at the end of session
 
- Fastest SSL Service in the Country
 - High Uptime
 - Anytime anywhere access to business critical applications
 - End Point Security Compliance
 - WAN Acceleration for remote users
 
| Remote Office Branch Office | Small Enterprise | Medium Enterprise | Large Enterprise | ISP/Carrier Class | |
| Product Model | 
APG  700 
 | 
APG  1400 
 | 
APG  2800 
 | 
APG - 5600 
 | 
APG  6200 
 | 
| Max. Concurrent Users | 
Up to 50 
 | 
Up to 250 
 | 
Up to 3000 
 | 
Up to 10000 
 | 
Up to 20000 
 | 
| SSL VPN Through put | 
100 Mbps 
 | 
500 Mbps 
 | 
1 Gbps 
 | 
2 Gbps 
 | 
4 Gbps 
 | 
| Latency | 
< 10 Millie Sec 
 | 
< 10 Millie Sec 
 | 
< 10 Millie Sec 
 | 
< 10 Millie Sec 
 | 
< 10 Millie Sec 
 | 
| Can Handle Video Traffic | 
Yes 
 | 
Yes 
 | 
Yes 
 | 
Yes 
 | 
Yes 
 | 
| Designed for Lousy Networks | 
Yes 
 | 
Yes 
 | 
Yes 
 | 
Yes 
 | 
Yes 
 | 
| Full Application Support | 
Yes 
 | 
Yes 
 | 
Yes 
 | 
Yes 
 | 
Yes 
 | 
| SSL Native Operation | 
Yes 
 | 
Yes 
 | 
Yes 
 | 
Yes 
 | 
Yes 
 | 
| Client Side HA | 
Yes 
 | 
Yes 
 | 
Yes 
 | 
Yes 
 | 
Yes 
 | 
| Virtualization Enabled | 
No 
 | 
No 
 | 
No 
 | 
Yes 
 | 
Yes 
 | 
| Client Login Time | 
< 5 Sec 
 | 
< 5 Sec 
 | 
< 5 Sec 
 | 
< 5 Sec 
 | 
< 5 Sec 
 | 
| Operating System | 
AHOS 
 | 
AHOS 
 | 
AHOS 
 | 
AHOS 
 | 
AHOS 
 | 
| Gigabit Interfaces | 
2 
 | 
2 
 | 
2 
 | 
2 
 | 
8 
 | 
| Dual Power Supply | 
No 
 | 
No 
 | 
Yes 
 | 
Yes 
 | 
Yes 
 | 
| Dual Hard Disk | 
No 
 | 
No 
 | 
Yes 
 | 
Yes 
 | 
Yes 
 | 
| End Point Compliance | 
Inbuilt 
 | 
Inbuilt 
 | 
Inbuilt 
 | 
Inbuilt 
 | 
Inbuilt 
 | 
| Network Access Control | 
Inbuilt 
 | 
Inbuilt 
 | 
Inbuilt 
 | 
Inbuilt 
 | 
Inbuilt 
 | 
| Data Leakage Prevention | 
Inbuilt 
 | 
Inbuilt 
 | 
Inbuilt 
 | 
Inbuilt 
 | 
Inbuilt 
 | 
| Filtered Reports | 
Inbuilt 
 | 
Inbuilt 
 | 
Inbuilt 
 | 
Inbuilt 
 | 
Inbuilt 
 | 
| WAN Acceleration | 
Inbuilt 
 | 
Inbuilt 
 | 
Inbuilt 
 | 
Inbuilt 
 | 
Inbuilt 
 | 
| Integration with AD/LDAP | 
Inbuilt 
 | 
Inbuilt 
 | 
Inbuilt 
 | 
Inbuilt 
 | 
Inbuilt 
 | 
| End to End Security | 
Yes 
 | 
Yes 
 | 
Yes 
 | 
Yes 
 | 
Yes 
 | 







0 Visitor Reactions & Comments:
Post a Comment