SONICWALL SSL VPN series
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
The SonicWALL SSL VPN Series was well-received by the readers, scoring high marks across the board, most notably for its authentication support and investment ROI. The product line includes the SonicWALL Secure Remote Access (SRA) 4200 and SRA 1200 appliances, which provide easy-to-use, secure and clientless remote access for small and midsize organizations, and the SonicWALL Aventail E-Class SRA EX7000 and EX6000 appliances, which are designed to meet the needs of midsize and large enterprises.
SA Series Secure Access SSL VPN Appliance
Juniper Network SA Series SSL VPN appliances won the bronze. Readers were impressed with the products' ease-of-use and transparency, as well as their compatibility with existing platforms and authentication; the appliances received a lower grade for vendor services and support. The appliances come in a range of models to meet the cost-effective requirements of small and midsize businesses up to large enterprises that require high-volume secure access and authorization.
Check Point Software Technologies
Readers awarded Check PointSoftware Technologies' Connectra with the bronze medal, giving the product high marks for end user transparency/ease of use and ease of installation, configuration and administration. The product also scored well in the areas of authentication support, integration and compatibility with existing applications, and vendor service and support. Connectra is a secure remote access gateway that integrates SSL VPN, IPSec VPN, and intrusion prevention. It's available as a turnkey appliance, as software for installation on open servers or as a virtual appliance.
2010 READERS' CHOICE AWARDS WINNERS
Introduction and Methodology
Best Antimalware Products
Readers vote on the best business-grade desktop and server antivirus and antispyware products.
Best Authentication Products
Readers vote on the best digital identity verification products, services, and management systems, including PKI, hardware and software tokens, smart cards.
Best Data Loss Prevention Products
Readers vote on the best network, client and combined data loss prevention software and appliances for enterprise and midmarket deployments.
Best Identity and Access Management Products
Readers vote on the best identity and access management products, including user identity access privilege and authorization management, single sign-on, user identity provisioning.
Best Intrusion Detection and Prevention Products
Readers vote on the best intrusion prevention/detection products, including network-based intrusion detection and prevention appliances, using signature-, behavior-, anomaly- and rate-based detection.
Best Messaging Security Products
Readers vote on the best antispam, antiphishing, email antivirus and antimalware filtering, software and appliance products, as well as hosted "in-the-cloud" email security services.
Best Mobile Data Security Products
Readers vote on the best mobile data security products, including hardware- and software-based file and full disk laptop encryption and removable storage device protection.
Best Network Access Control Products
Readers vote for the best NAC products, including appliance, software and infrastructure user and device network access policy creation, compliance, enforcement and remediation.
Best Network Firewalls
Readers vote on the best network firewalls, including enterprise-caliber network firewall appliances and software, and stateful packet filtering firewalls with advanced application/protocol layer filtering.
Best Secure Remote Access Products
Readers vote on the best remote access products, including IPsec VPN, SSL VPN, and combined systems and products, as well as other remote access products and services.
Best Security Information and Event Management Products
Security information and event management and log management software, appliances and managed services for SMB and enterprise security monitoring, compliance and reporting.
Best Unified Threat Management Products
Readers voted on the best unified threat management products, including UTM appliances that feature firewall, VPN, gateway antivirusm URL Web filtering and antispam.
Best Vulnerability Management Products
Readers vote on the best vulnerability management products, including network vulnerability assessment scanners, vulnerability risk management, reporting, remediation and compliance, patch management and vulnerability management lifecycle products.
Best Web Security Gateway Products
Readers vote on the best Web security gateway products, including software and hardware, hosted Web services for inbound and outbound content filtering for malware activity detection and prevention.