Access "Hot Pick: F5 Networks' FirePass 4100 Series"
This article is part of the January 2005 issue of How security pros can benefit from information sharing
FirePass 4100 Series F5 Networks Price: Starts at $24,990 @exb FirePass 4100 Series @exe F5 Networks' FirePass 4100 Series SSL VPN is a true integrated enterprise access solution, delivering the broad remote access capabilities of an IPSec VPN through a Web browser interface, plus robust endpoint security features. IPSec VPNs offer full site connection, while SSL VPNs provide secure remote access to applications. However, SSL VPNs don't necessarily provide out-of-the box support, requiring customization work upfront. FirePass goes a long way toward solving this dilemma. FirePass covers most client platforms--Linux, Mac OS, Pocket PC and Windows--giving remote users a secure connection from outside the corporate firewall to inside enterprise applications using any Internet-connected device with most browsers, including WAP browsers and iMode phones. Once authenticated, users have access to applications such as e-mail, intranet, internal Web servers, client-based applications and file servers. Users can securely access Windows WorkGroup shares, SMB, Novell and... Access >>>
Access TechTarget
Premium Content for Free.
What's Inside
Features
-
-
Vulnerability Mismanagement
You're just plugging holes if you don't have the right processes and policies.
-
The Sky's the Limit
What security technology do you need that you can't get today? Here's your wish list.
-
Content Filtering: Websense Enterprise 5.5
Websense's Enterprise 5.5
-
Authentication: RSA SecurID 6.0 for Windows
RSA Security's SecurID 6.0 for Windows
-
Peer-to-Peer
Seattle CISOs Ernie Hayden and Kirk Bailey are pioneering a new level of trust and cooperation to secure their enterprises.
-
Hot Pick: F5 Networks' FirePass 4100 Series
F5 Networks' FirePass 4100 Series
-
Vulnerability Mismanagement
-
-
Antispyware: Webroot Software's Spy Sweeper Enterprise
Webroot Software's Spy Sweeper Enterprise
-
Secure Reads: Gray Hat Hacking
Gray Hat Hacking: The Ethical Hacker's Handbook
-
Recent Releases: Security product briefs, January 2005
Learn about the information security products released in January 2005.
-
E-Mail Security
Avinti's iSolation Server 1.1
-
The Myths of Security
The ancient Greeks spun myths to explain the unexplainable. Modern enterprises use commonly held myths as a foundation for security.
-
Key to the World
SAML's portable trust makes federated identity work.
-
Antispyware: Webroot Software's Spy Sweeper Enterprise
-
Columns
-
Logoff: Government tosses pennies toward information security
Death by a Thousand Cuts
-
Editor's Desk: Remembering the dearly departed
Built to Sell
-
Layer 8: The security governance myth
Governance Benefit
-
Perspectives: Walk in management's shoes
One security manager describes his experience with a management program that helped him understand how to align security with business objectives.
-
Logoff: Government tosses pennies toward information security
More Premium Content Accessible For Free
Next-generation firewalls play by new rules
E-Zine
Firewalls started their journey to the next generation at about the same time as the Star Trek TV series. While the products have advanced with ...
Developing your endpoint security management transition plan
E-Handbook
This TechGuide will help you develop your endpoint security management transition plan. Articles focus on overcoming the challenges of Web-based ...
Unlock new pathways to network security architecture
E-Zine
Network security architecture is showing its age at many organizations. With new technology, different data types, and use of multi-generations of ...
Security Management Strategies for the CIO