Secure Remote Access

In today’s business environment, disparate business units, project groups, partners, contractors and guests all require secure remote access. What’s more, they require different levels of remote access and often require a user experience tailored to their unique requirements. Traditional VPNs fall short of these demands and suffer from reluctance on the part of IT to issue managed devices to every employee, partner and contractor.

 

Anytime, Anywhere Secure Remote Access to Business Applications

Array secure remote access solutions provide greater levels of security, a greater range of access methods, a broader range of device support and the ability to provide differentiated, identity-based access tailored to the needs of multiple communities of interest.

Clientless, Anytime-Anywhere Access

Unlike legacy VPNs that require clients on remote devices, SSL VPNs need only a common Web browser to access productivity-enhancing files and business applications. Ubiquitous SSL and comprehensive security means employees, partners, contractors and guests can utilize any device – personal, public or managed - to gain access to authorized corporate resources. Administrators may configure Web access, network-level access or access to specific client-server or thin client applications, and may configure varying degrees of access based on device type, location, security posture and roles within the organization.

  Secure Remote Access

Click to Enlarge

End-to-End Security & Identity-Based Access

Array secure remote access solutions provide security for data at rest and data in motion. Host-checking and end-point security scan the health and posture of remote devices before and after granting access, actively adapting policies based on IT-defined parameters to prevent data leakage. 2048-bit encryption and comprehensive AAA protect data in transit, ensure that only authenticated users have access to authorized resources and provide detailed audit reports for compliance and accountability. Moreover, integrated SSL VPN firewall capability and a reverse-proxy architecture provide additional layers of separation and protection between remote devices and the corporate network.

Virtualization & Segmentation

To meet the secure remote access and security requirements of multiple business units, partners, contractors and guests, Array solutions support up 256 virtual secure remote access portals on a single system. Every virtual portal is fully separate and may be associated with fully segmented networks on the back end, ensuring total security for each community of interest. Virtual portals may also have their own resources and look and feel and be configured and managed independently.

Performance & Scalability

Applications run fast in the office, but delivering them over the Internet is a different story. Array secure remote access solutions boast the lowest possible latency for delivering files and applications to mobile users anytime, anywhere. Multiple acceleration technologies and a scalable, 64-bit multi-core architecture combine to effortlessly support from hundreds to tens of thousands of concurrent users on a single system while maintaining a premium, productivity-enhancing end-user experience.

 

Challenge

  • Reduce the number of network entry points for malicious activity
  • Achieve greater levels of consistency, efficiency and economics in managing remote access
  • Support remote and mobile access from managed and unmanaged devices
  • Limit network exposure and establish accountability for sensitive data

  • Support the remote access needs of employees, partners, guests and customers

Solution

  • Consolidate secure remote access onto a single, scalable security gateway
  • Define access policies once for all users and use cases from a centralized platform
  • Clientless access from laptops and PCs and mobile apps for tablets and smart phones
  • Application or network level connectivity with end-to-end security and auditing
  • Fully partitioned and customizable virtual portals for multi-tenant environments

 

How To Try How to Buy