Access "SSL VPN: Array Networks' Array SPX5000"
This article is part of the December 2005 issue of Top forensics tools for tracking down cybercriminals
Array SPX5000 Array Networks Price: Starts at $40,000 @exb Array SPX5000 @exe Array Networks' Array SPX5000 SSL VPN packs enterprise-class security and performance into a beefy appliance that takes up three slots of real estate in the rack. It carries an enterprise price tag, but features numerous security functions and the horsepower to support 64,000 concurrent users and 100,000 SSL sessions. Beyond the SSL VPN features commonly found in competitive products--such as access control, cache cleaning, endpoint security and layer 3 VPN support for IPSec traffic--SPX5000 (we reviewed software v7.3) offers firewall and filtering capabilities. Administrators can create permit/deny rules for TCP, UDP and ICMP packets, and leverage the appliance's passive and active URL filtering. SPX5000 supports 250 VLANs and up to 128 separate secured or shared virtual portals, and is enabled with full or split tunneling to facilitate IPSec. Security managers can delegate administrative rights to individual VLANs and portals. This is a rich but complex feature set. To take full ... Access >>>
Premium Content for Free.
Building A Perimeter Defense With Application-Level Firewalls
Learn how application level firewalls, when carefully deployed, can build perimeter defenses and prevent hackers from exploiting vulnerabilities, such as application code, to achieve attacks.
To Catch a Thief
Forensics tools aren't only used in high-profile cases.
On the Mend
Health care giant Novartis AG got a much-needed shot in the arm with a comprehensive risk assessment and revamped security management system.
Recent Releases: Security product briefs, December 2005
Learn about the security products released in December 2005.
Controlling the Uncontrollable
Organizations must leverage policy, and harness new protocols and technology to tame wild WLANs.
Information Security's 2006 Priorities Survey signals a transition for security managers from an operational to a more strategic stance.
- Building A Perimeter Defense With Application-Level Firewalls
Hot Pick: Citrix Systems' Citrix Access Essentials
Citrix Systems' Citrix Access Essentials
SSL VPN: Array Networks' Array SPX5000
A review of Array Networks' Array SPX5000
Configuration Management: Configuresoft's Enterprise Configuration Manager v4.7
Configuresoft's ECM v4.7
Application Security: Cenzic's Hailstorm v2.6
Cenzic's Hailstorm v2.6
Secure Reads: Mergers and Acquisitions Security
Read a review of the security book Mergers and Acquisitions Security.
- Hot Pick: Citrix Systems' Citrix Access Essentials
On The Radar: Security technology can't solve process problems
Perspectives: History teaches security lessons well
Expert Richard Bejtlich looks at the lessons learned in engineering disasters and applies them to information security.
Editor's Desk: Security for the corporate brand
Know Thy Business
Ping: Desiree Beck
- On The Radar: Security technology can't solve process problems
More Premium Content Accessible For Free
Unified threat management (UTM) long focused on small and medium-sized businesses, but now it's climbing the ladder and attempting to become ...
As more security professionals take on greater roles in global risk management, Global 2000 companies are investing in cybersecurity measures above ...
All indications show that DDoS attacks are increasing in variety, number and size. No network system is immune and information security pros can't ...