WatchGuard WG100070 hardware firewall

WatchGuard WG100070 hardware firewall

MPN: WG100070
🚚 Select the country of delivery:
Delivery from:
Germany
Updating price ... 📣 Send Price inquiry Не поставляется
Delivery cost & estimated delivery time:
От
days

Where to buy and prices (Advertising *)

On Top
в наличии
* Alle Preise inkl. der jeweils geltenden gesetzlichen Mehrwertsteuer, ggfs. zzgl. Versandkosten. Alle Angaben ohne Gewähr. Preisänderungen sind in der Zwischenzeit möglich.

Technical specifications

On Top

Performance

Heat dissipation 205 BTU/h

Management features

Connectivity LEDs Y

Additionally

Ethernet LAN (RJ-45) ports quantity 4
Wireless technologies Wired
SSL 100, Trade Up The WatchGuard SSL 100 is an affordable, easy-to-use, secure remote access solution providing reliable client and clientless connectivity to corporate data and resources, such as email, file shares and CRM. This all-in-one appliance offers the flexibility to provide basic access to networks with an auto-loading client, as well as more sophisticated access to web-based resources and non-native applications including SSH and RDP. The SSL 100 appliances offer advanced security features including integrated strong authentication and rich endpoint integrity checking. Desktop sharing features allow your helpdesk to fix a remote employee’s computer problems, so users stay productive from anywhere, anytime.

Productivity

- Remote employees have easy access to essential corporate resources including email, web conferencing, and CRM from any web-enabled device;

- Optional non-native applications, including SSH and RDP, can be delivered through a remote user’s web browser for maximum productivity;

- Time-to-value is determined in minutes. Basic con_ guration enables end users to simply double-click an icon and authenticate, and the access client automatically loads, establishing an SSL tunnel for complete access to the backend network;

- Bi-directional tunneling allows your helpdesk to connect to a remote employee’s device to troubleshoot technical problems or update software.

Easy of use

- An all-in-one appliance – just plug and play – with no additional software components to buy, install, or manage;

- Users log on once and have access to everything in the portal – no need for them to waste time repeatedly re-authenticating themselves;

- IT administrators can have the appliance up and running quickly;

- Consolidated auditing collects all information about access, identity, and system events in a central repository for quick insight into user and system-based activities.

Security

- Comprehensive endpoint integrity checking ensures network protection by allowing organizations to configure and enforce endpoint compliance including checks for anti-virus, anti-spyware, firewall software, and many other device attributes;

- Session clean up removes all traces of access from the endpoint – including _ le deletion and cache cleaning - to prevent data leakage through another user’s covert re-entry to network resources;

- Local and third party authentication support, including strong authentication, ensures only authorized users can access the network, keeping intruders out.

Flexibility

- Client and clientless access – including Vista 32-bit and 64-bit support;

- Can be used for the simplest deployment, or IT administrators can take it to the next level by taking advantage of endpoint integrity checking, optional Java-based application delivery, bi-directional tunneling, and more;

- Uniquely capable of supporting any class of application. Administrator can choose to publish only web applications, create tunnels to network or speci_ c resources, as well as deliver optional applications to the desktop for more sophisticated use;

- IT administrators can integrate solution with existing third-party authentication solution, such as Microsoft Active Directory, or rely on onboard LDAP server to con_ gure local authentication, as well as use built-in two-factor authentication including SMS-based tokens and web keypad for identity validation;

- All information in audit logs can be shown in multiple graphical formats for current and historical reporting, and be exported to third-party utilities, such as Excel or Crystal Reports, for further data mining and asset management.
Фотографии

    Password recovery
    To recover your password, please enter in the box below your email address with which you have registered:
    The password reset code has been sent to your Email.
    Код уже был отправлен Вам ранее.
    Вы можете ввести его в поле выше, или получить новый код через сек.
    An error has occurred. Please check your e-mail address and try again.
    Ваш новый пароль:

    Name is empty


    Выберите страну доставки

    You have not written a message

    By clicking on the "Send" button, you agree that your data will be used to process your request. Further information and revocation instructions can be found in the data protection declaration.

    Your message has been sent!

    Close

    1
    Catalog
    Cancel Close
    Бренды:
      Выберите бренды
        Show more close
          Area search
          Worldwide
          Категории
            Product