WatchGuard WG560051 Fiche De Données
WatchGuard® Technologies, Inc.
Recommended for businesses with
up to 500+ concurrent remote users
up to 500+ concurrent remote users
The WatchGuard
®
SSL 100 and SSL
560 are aff ordable, easy-to-use secure
remote access appliances that provide
reliable connectivity to corporate data
and resources for anywhere, anytime
productivity.
remote access appliances that provide
reliable connectivity to corporate data
and resources for anywhere, anytime
productivity.
The beauty of these products is their
fl exibility. The SSL appliance allows a
business to make its secure remote
connectivity deployment as simple
or as sophisticated as its business
requirements dictate, and at a very
attractive price.
fl exibility. The SSL appliance allows a
business to make its secure remote
connectivity deployment as simple
or as sophisticated as its business
requirements dictate, and at a very
attractive price.
For businesses looking for extreme ease
of use, this means remote access to
standard network resources can be
maintained with virtually no management
overhead. And for end users, remote
access is a breeze.
of use, this means remote access to
standard network resources can be
maintained with virtually no management
overhead. And for end users, remote
access is a breeze.
Businesses with more complex needs
can choose to use a mix of both tunnel
and portal-based resources, provide
technical support to a remote user’s
desktop, and control access based on
a granular user/device criteria.
can choose to use a mix of both tunnel
and portal-based resources, provide
technical support to a remote user’s
desktop, and control access based on
a granular user/device criteria.
Earth-friendly technology
WatchGuard SSL
appliances allows
you to deliver the
level of remote access
you need, at a price
you can aff ord.
WatchGuard
®
SSL 100 and SSL 560
For anywhere, anytime secure remote access
Datasheet
What a WatchGuard
®
SSL appliance provides for your business:
INCREASED PRODUCTIVITY
■
Remote employees have easy access to essential corporate resources including email, web conferencing,
and CRM from any web-enabled device.
■
Optional non-native applications, including SSH and RDP, can be delivered through a remote user’s web
browser for maximum productivity.
■
Time-to-value is determined in minutes. Basic confi guration enables end users to simply double-click an
icon and authenticate, and the access client automatically loads, establishing an SSL tunnel for complete
access to the backend network.
■
Bi-directional tunneling allows your helpdesk to connect to a remote employee’s device to troubleshoot
technical problems or update software.
EASE OF USE
■
An all-in-one appliance with confi guration wizards and auto-populated default settings. Just plug and
play – with no other software components to buy, install, or manage.
■
Users log on once and have access to everything in the portal – no need for them to waste time repeatedly
re-authenticating themselves.
■
You can have the appliance up and running quickly. Confi gure it & forget it, with no thick client to manage.
■
Consolidated auditing collects all information about access, identity, and system events in a central repository
for quick insight into user and system-based activities.
GREATER SECURITY
■
Comprehensive endpoint integrity checking ensures network protection by allowing organizations
to confi gure and enforce endpoint compliance including checks for anti-virus, anti-spyware, fi rewall
software, and many other device attributes.
■
Session clean up removes all traces of access from the endpoint – including fi le deletion and cache
cleaning – to prevent data leakage through another user’s covert re-entry to network resources.
■
Local and third party authentication support, including strong authentication, ensures only authorized
users can access the network, keeping intruders out.
FLEXIBILITY
■
Client and clientless access – including 32-bit and 64-bit XP, Vista, and Windows 7 support.
■
Can be used for the simplest deployment, or IT administrators can take it to the next level by taking advantage
of endpoint integrity checking, optional Java-based application delivery, bi-directional tunneling, and more.
■
Uniquely capable of supporting any class of application. Administrator can choose to publish only web
applications, create tunnels to network or specifi c resources, as well as deliver optional applications to the
desktop for more sophisticated use.
■
IT administrators can integrate solution with existing third-party authentication solution, such as Microsoft
Active Directory, or rely on onboard LDAP server to confi gure local authentication, as well as use built-in
two-factor authentication including SMS-based tokens and web keypad for identity validation.
■
Information in audit logs can be shown in multiple graphical formats for current & historical reporting,
and exported to third-party utilities, such as Excel or Crystal Reports, for further data mining and asset
management.