Cisco Systems VPN Concentrator Series
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
Readers rated authentication support, integration and compatibility with existing platforms/applications and vendor service and support highest in the category. This product delivers application access, endpoint security, data integrity protection, infrastructure access, and network compliance validation controls. It is available in nonredundant and redundant configurations, allowing customers to customize their builds.
SA Series SSL VPN Appliances
Readers like Juniper's authentication support, end-user transparency/ease of use and vendor service/support. The product family includes models sized for the needs of small businesses with limited IT experience to high-capacity products for large enterprises requiring the utmost authentication, authorization, and auditing (AAA) capabilities for employee, partner (extranet) and customer access.
Citrix Access Gateway
Readers valued the extensibility, authentication support, and end-user transparency/ease of use of Citrix Access Gateway. The product is a secure application access solution that provides administrators granular application-level control while empowering users with remote access from anywhere. SmartAccess technology allows administrators to manage access control and set policies of acceptable actions based on user identity and the endpoint device.
"Five years ago, remote access began to shift towards web-based "clientless" VPNs. Today, that evolution has come full-circle, with contemporary platforms offering a range of customizable secure access methods, from "anywhere" web access to rich install-on-demand SSL VPN clients. New innovations focus more extensively on the data center and reducing TCO through streamlined, unified management tools and cloud-based Software-as-a-Service delivery models." -- Lisa Phifer, president, Core Competence
2009 READERS' CHOICE AWARDS
Introduction and Methodology
Best Antimalware Products
Best Application Security Products
Best Authentication Products
Best Data Loss Prevention Products
Best Email Security Products
Best Identity and Access Management Products
Best Intrusion Detection and Prevention Products
Best Mobile Data Security Products
Best Network Access Control Products
Best Network Firewalls
Best Risk and Policy Management Products
Best Secure Remote Access Products
Best Security Information and Event Management Products
Best Unified Threat Management Products
Best Vulnerability Management Products
Best Web Security Gateway Products
Best Wireless Security Products