The Juniper Networks Secure Access 700 (SA 700) SSL VPN appliance provides small to medium enterprises a secure, cost-effective way to deploy remote access to the corporate network. Because the SA 700 uses Secure Sockets Layer (SSL) to provide encrypted transport, it enables instant remote access from just a Web browser. This clientless architecture eliminates the high cost of installing, configuring, and maintaining client software on every device, significantly reducing the total cost of ownership versus traditional VPN solutions. SSL delivery also eliminates the Network Address Translation (NAT) and firewall traversal issues encountered with traditional remote access products, allowing your remote users reliable and ubiquitous access from external networks such as home or hotels. The SA 700 comes standard with Juniper Networks Network Connect access method, which creates a secure network-layer connection via a lightweight, cross-platform dynamic download. The SA 700 can also be upgraded to include Juniper's Core Clientless access method, which enables connections from any PC anywhere to Web-enabled applications, including those with XML and Flash content, files, standards-based e-mail, and telnet/SSH sessions. Built on Juniper's market-leading IVE platform, the Secure Access 700 delivers enterprise-strength AAA (authentication, authorization, auditing), comprehensive endpoint defense, and a core security architecture that has been audited in depth by CyberTrust and certified by ICSA labs.
Features:
-Designed for small to mid-sized companies.
--Provides secure access to remote or mobile employees
--No client-side software to install, minimal changes to servers, limited ongoing maintenance
-Lower total cost of ownership.
--Plug-n-play appliance that installs in minutes, requiring minimal IT knowledge
--No client-software deployment or maintenance
--Simple end-user and administrator interfaces, for quick and easy use
--Improved productivity for remote employees
--No network interoperability issues
-End-to-end layered security.
--Complete, secure access to LAN resources, ensuring that the endpoint device, data in transit, and internal resources are secure
--Seamless integration with a broad range of authentication methods and protocols