Tip

2006 Products of the Year: Remote access

VPN 3000 Series Concentrators
Cisco Systems, www.cisco.com

With the proliferation of laptops, PDAs and other mobile devices requiring access to the corporate network, a VPN purchase is no longer an impulse -- it's an imperative. The offerings have mushroomed, particularly SSL VPN products, forcing IPsec-dependent market leaders to broaden their scope. Included in this wave are Cisco Systems' VPN 3000 Series Concentrators -- a smart move judging by the number of readers who raved about its endpoint security and ease of use. For this reason, the Concentrators were awarded the gold medal in remote access.

"Concentrators have proven to be the most compatible and secure, and provide the best ease-of-use out of all the remote access devices I have encountered," wrote one enthusiastic user. Others who helped make the series' six models collectively tops were especially pleased with the Concentrators' security, including their firewall capabilities through stateless packet filtering and granular access control. The majority also gave their thumbs-up approval to the wide range of features, documentation and vendor support.

"An excellent tool," said one user.

Scalability is a strong driver. Cisco VPN 3005 and 3015 are designed for

    Requires Free Membership to View

More information on remote access

Learn a five-point strategy for securing remote access.

Understand how remote access can serve as an attack vector.

Learn how to solve remote access problems with IPsec and SSL VPNs.

Check out the rest of our 2006 Product of the Year winners.

 

small- to mid-sized enterprises, promising between 100 and 200 simultaneous IPsec sessions, or 50 and 75 WebVPN sessions. The 3020 and higher are geared more toward larger companies, supporting up to 10,000 IPsec, or 500 clientless sessions running concurrently in the 3080 model.

A big plus, according to users, is the VPN series' versatility. Recognizing that SSL VPN providers were gaining market share, Cisco made sure its 3000 series offered both IPsec- and SSL-based connectivity on a single platform. This allows almost any device within the corporate network to establish an end-to-end secure connection using public networks.

In addition, customers like how easily the Concentrators can be managed through their simple Web-based interface to configure mobile devices and monitor all remote-access users. That includes pushing policies and updates through the VPN to users and then scanning for continued compliance before a machine is allowed on to a network.

Some respondents were glad to discover that the VPN 3000 Concentrators work well with other applications.

"[We] rarely have problems with these devices," one user wrote. Another summed it up this way: "[Concentrators are] just plain easy."




VPN-1
Check Point Software Technologies, www.checkpoint.com

This is the other half of the medal-winning Check Point package (with FireWall-1). One user calls it "the most compatible, secure remote access device." It wins high praise for security, performance and overall quality.










VPN Gateway
Nortel Networks, www.nortel.com

"Stable, reliable, robust. Just keeps working." VPN Gateway users particularly like its performance and give it consistent "excellent" ratings for security.








This was first published in February 2006

There are Comments. Add yours.

 
TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
Sort by: OldestNewest

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to:

Disclaimer: Our Tips Exchange is a forum for you to share technical advice and expertise with your peers and to learn from other enterprise IT professionals. TechTarget provides the infrastructure to facilitate this sharing of information. However, we cannot guarantee the accuracy or validity of the material submitted. You agree that your use of the Ask The Expert services and your reliance on any questions, answers, information or other materials received through this Web site is at your own risk.