WatchGuard SSL 560 & 3Y LiveSecurity WG560003 Data Sheet

Product codes
WG560003
Page of 2
WatchGuard® Technologies, Inc.
Recommended for businesses with 
up to 500+ concurrent remote users
The WatchGuard
®
 SSL 100 and SSL 
560 are aff ordable, easy-to-use secure 
remote access appliances that provide 
reliable connectivity to corporate data 
and resources for anywhere, anytime 
productivity.
The beauty of these products is their 
fl exibility. The SSL appliance allows a 
business to make its secure remote 
connectivity deployment as simple 
or as sophisticated as its business 
requirements dictate, and at a very 
attractive price.
For businesses looking for extreme ease 
of use, this means remote access to 
standard network resources can be 
maintained with virtually no management 
overhead. And for end users, remote 
access is a breeze. 
Businesses with more complex needs 
can choose to use a mix of both tunnel 
and portal-based resources, provide  
technical support to a remote user’s 
desktop, and control access based on 
a granular user/device criteria. 
Earth-friendly technology
WatchGuard SSL 
appliances allows 
you to deliver the 
level of remote access 
you need, at a price 
you can aff ord.
WatchGuard
®
 SSL 100 and SSL 560
For anywhere, anytime secure remote access 
Datasheet
  What a WatchGuard
®
 SSL appliance provides for your business:
  INCREASED PRODUCTIVITY       
   Remote employees have easy access to essential corporate resources including email, web conferencing, 
and CRM from any web-enabled device. 
   Optional non-native applications, including SSH and RDP, can be delivered through a remote user’s web 
browser for maximum productivity.  
   Time-to-value is determined in minutes. Basic confi guration enables end users to simply double-click an 
icon and authenticate, and the access client automatically loads, establishing an SSL tunnel for complete 
access to the backend network.  
   Bi-directional tunneling allows your helpdesk to connect to  a remote employee’s device to troubleshoot 
technical problems or update software.
  EASE OF USE  
  
An all-in-one appliance with confi guration wizards and auto-populated default settings. Just plug and 
play – with no other software components to buy, install, or manage. 
  
Users log on once and have access to everything in the portal – no need for them to waste time repeatedly 
re-authenticating themselves. 
 You can have the appliance up and running quickly. Confi gure it & forget it, with no thick client to manage.
   Consolidated auditing collects all information about access, identity, and system events in a central repository 
for quick insight into user and system-based activities. 
  GREATER SECURITY      
  
Comprehensive endpoint integrity checking ensures network protection by allowing organizations 
to confi gure and enforce endpoint compliance including checks for anti-virus, anti-spyware, fi rewall 
software, and many other device attributes.
  
Session clean up removes all traces of access from the endpoint – including fi le deletion and cache 
cleaning – to prevent data leakage through another user’s covert re-entry to network resources.
    Local and third party authentication support, including strong authentication, ensures only authorized 
users can access the network, keeping intruders out.
 FLEXIBILITY 
  
Client and clientless access – including 32-bit and 64-bit  XP, Vista, and Windows 7 support.
  
Can be used for the simplest  deployment, or IT administrators can take it to the next level by taking advantage 
of  endpoint integrity checking,  optional Java-based application delivery, bi-directional tunneling, and more.
  
Uniquely capable of supporting any class of application. Administrator can choose to publish only web 
applications, create tunnels to network or specifi c resources, as well as deliver optional applications to the 
desktop for more sophisticated use.
   IT administrators can integrate solution with existing third-party authentication solution, such as Microsoft 
Active Directory, or rely on onboard LDAP server to confi gure local authentication, as well as use built-in 
two-factor authentication including SMS-based tokens and web keypad for identity validation.
   Information in audit logs can be shown in multiple graphical formats for current & historical reporting, 
and exported to third-party utilities, such as Excel or Crystal Reports, for further data mining and asset 
management.