We provides the next generation VPN gateways, which make deployment easy, no support calls and a unified approach for secure remote access.
Features
- Remote secure (encrypted) connectivity for applications
- Support Web based access, Thin Clients and PHAT clients
- Supports WAN Acceleration
- Granular access to applications as per the access rights
- Customization of Landing Page, Client etc
- Access based on IP, MAC id etc
- Prevents Data Leakage through encrypted Sandbox, disabling of external storage, commands etc
- End Point Compliance for Anti Virus/Operating System
- Clean up all Traces of Users Access and data downloaded at the end of session
- Fastest SSL Service in the Country
- High Uptime
- Anytime anywhere access to business critical applications
- End Point Security Compliance
- WAN Acceleration for remote users
| Remote Office Branch Office | Small Enterprise | Medium Enterprise | Large Enterprise | ISP/Carrier Class | |
| Product Model | 
APG  700 | 
APG  1400 | 
APG  2800 | 
APG - 5600 | 
APG  6200 | 
| Max. Concurrent Users | 
Up to 50 | 
Up to 250 | 
Up to 3000 | 
Up to 10000 | 
Up to 20000 | 
| SSL VPN Through put | 
100 Mbps | 
500 Mbps | 
1 Gbps | 
2 Gbps | 
4 Gbps | 
| Latency | 
< 10 Millie Sec | 
< 10 Millie Sec | 
< 10 Millie Sec | 
< 10 Millie Sec | 
< 10 Millie Sec | 
| Can Handle Video Traffic | 
Yes | 
Yes | 
Yes | 
Yes | 
Yes | 
| Designed for Lousy Networks | 
Yes | 
Yes | 
Yes | 
Yes | 
Yes | 
| Full Application Support | 
Yes | 
Yes | 
Yes | 
Yes | 
Yes | 
| SSL Native Operation | 
Yes | 
Yes | 
Yes | 
Yes | 
Yes | 
| Client Side HA | 
Yes | 
Yes | 
Yes | 
Yes | 
Yes | 
| Virtualization Enabled | 
No | 
No | 
No | 
Yes | 
Yes | 
| Client Login Time | 
< 5 Sec | 
< 5 Sec | 
< 5 Sec | 
< 5 Sec | 
< 5 Sec | 
| Operating System | 
AHOS | 
AHOS | 
AHOS | 
AHOS | 
AHOS | 
| Gigabit Interfaces | 
2 | 
2 | 
2 | 
2 | 
8 | 
| Dual Power Supply | 
No | 
No | 
Yes | 
Yes | 
Yes | 
| Dual Hard Disk | 
No | 
No | 
Yes | 
Yes | 
Yes | 
| End Point Compliance | 
Inbuilt | 
Inbuilt | 
Inbuilt | 
Inbuilt | 
Inbuilt | 
| Network Access Control | 
Inbuilt | 
Inbuilt | 
Inbuilt | 
Inbuilt | 
Inbuilt | 
| Data Leakage Prevention | 
Inbuilt | 
Inbuilt | 
Inbuilt | 
Inbuilt | 
Inbuilt | 
| Filtered Reports | 
Inbuilt | 
Inbuilt | 
Inbuilt | 
Inbuilt | 
Inbuilt | 
| WAN Acceleration | 
Inbuilt | 
Inbuilt | 
Inbuilt | 
Inbuilt | 
Inbuilt | 
| Integration with AD/LDAP | 
Inbuilt | 
Inbuilt | 
Inbuilt | 
Inbuilt | 
Inbuilt | 
| End to End Security | 
Yes | 
Yes | 
Yes | 
Yes | 
Yes | 
 
 
 







0 Visitor Reactions & Comments:
Post a Comment