Your SlideShare is downloading. ×
0
Revolucija varnega oddaljenega dostopa
Tehnologija nas spreminja… <ul><li>Dostopnost  š irokopasovnih povezav </li></ul><ul><li>Razmah uporabe mobilnih naprav </...
Uporabniki se vedno bolj  izmikajo vašemu nadzoru Mrežne aplikacije  in viri Notranji uporabniki Zunanji uporabniki Več......
Poslovne posledice 95%  vašega mrežnega prometa bo prihajalo izven zasebne mreže, katero poskušate zaščititi 1997:  Mrežno...
Podjetja potrebujejo novo arhitekturo
Nova arhitektura : invertna omrežja A rhitektura, ki vedno obravnava   podrejeno omrežje  kot  nevarno.   <ul><li>Zožanje ...
Odgovor je nadzor oddaljenega dostopa Naprave nadzora dostopa z SSL-om so ključ doseganja nove arhitekture Connect   users...
Produkt, zgrajen na novi arhitekturi!
Aventail platforma nadzora oddaljenega dostopa   Zaznava Poveže Zaščiti Aventail Smart Access & Smart Tunneling   je trans...
Aventail EPC  preveri upravljane in neupravljane naprave še pred vzpostavitvijo povezave, jo identificira in določi splošn...
<ul><li>Napredni EPC poenostavi nastavitev  in vzdrževanje profilov naprav </li></ul><ul><li>Podpira preverjanje prisotnos...
<ul><li>Oznake ( Watermarks ) naprav   omogoča administratorju specifikacijo certifikata kot oznake naprave, kar omogoča d...
Aventail  objektno orientirana politika nadzora zagotavlja nadzor, saj je  namestitev in upravljanje pravil dostopa enako ...
<ul><li>Obojesmerni nadzor dostopa :   Pravila in kontrola dostopa za dodatno varnost ključnih aplikacij, kot je oddaljena...
<ul><li>Omogoča vnos določenih akreditacij brez uporabe tipkovnice </li></ul><ul><li>Ponuja preprost način zaščite akredit...
Zaščita Napredna poročila <ul><li>Novo orodje za napredna poročila </li></ul><ul><ul><li>Sawmill  poročila z  predlogami, ...
WorkPlace  Access :   Enoten prehod za identično uporabniško izkušnjo ob dostopu do klientno-strežniških ali spletnih apli...
Connect Access:   Agent, enostaven za upravljanje in distribucijo, za popoln dostop za  Windows, Macintosh, Linux  in  Win...
Aventail  kontroler oddaljenega dostopa Connect Access Samo aventail ponuja celovit spekter opcij dostopa na podlagi pravi...
<ul><li>Univerzalni dostop do aplikacij ,  vključno z Web,  klientno-strežniškimi in ostalimi aplikacijami (kot VoIP)   </...
Dodatne funkcije <ul><li>Advanced Reporting:   podroben in prilagodljiv način poročanja o aktivnostih uporabnikov in druge...
Aventail SSL VPN  naprave EX-2500  EX-1600  EX-750 Za velike organizacije z več tisoč oddaljenimi uporabniki ;  podpora za...
Kako lahko Aventail pomaga  Ministrstvu za obrambo RS ?
Kako lahko Aventail pomaga  Ministrstvu za obrambo RS ? <ul><li>oddaljeni dostop:   samostojna in celovita rešitev oddalje...
<ul><li>zaposleni:   </li></ul><ul><ul><li>dostop do elektronske pošte (OWA, DWA) </li></ul></ul><ul><ul><li>dokumenti v s...
Izbrane Aventail stranke Storitve Več kot 2,5 milijona svetovnih uporabnikov se zanaša na Aventail rešitve Tehnologija Ost...
<ul><li>Vodilni na tehnološkem področju </li></ul><ul><ul><li>Ponuja VPN tehnologijo naslednje generacije danes </li></ul>...
Hvala
Upcoming SlideShare
Loading in...5
×

Predstavitev Mors

1,369

Published on

Predstavitev Aventail SSL VPN naprave na Ministrstvu za obrambo RS.

Published in: Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
1,369
On Slideshare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
4
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide
  • Key Points: - More people are accessing from more, increasingly public places than ever before. “ I’ve got executives that want access to Citrix from home.” “ My business partners need access to more systems every day.” - And they are using devices that weren’t even on your radar two years ago. - Users are harder and more expensive to manage because they don’t all use corporate-issued laptops or desktop computers
  • Object of this slide: Show how the corporate network is evolving drastically, requiring a new way to look at secure communications Key Points : An increasing number of connections using corporate resources are coming from public networks, not from inside the private LAN. And its not just employees, but connections between customers, partners, teleworkers, as well as mobile employees. Today maybe 45 percent come from outside the LAN. In the not so distant future, that number will increase to 80 or 90 percent. So, the “internal” corporate LAN as we know it today will not exist. Already, the LAN can not be protected, as laptops move in and out of the perimeter, and the most dangerous attacks on our network actually come from inside the LAN rather than outside the LAN. Rather than trying to build an ever more secure perimeter, enterprises should maintain a secure perimeter around the application data center and secure communications between the user and the network resources and applications they need to access. While the perimeter for course-grained network protection doesn’t disappear completely, a new perimeter is formed further inward around the back office systems.
  • Optional slide
  • Optional slide
  • Object of slide : Details how EPC detects device type, identity, and integrity. Key Messages: Only Aventail® End Point Control™ (EPC) lets you enforce granular access control rules for Windows, Windows Mobile, Macintosh, and Linux end-point environments—before user authentication. EPC identifies the device as IT-managed or unmanaged. EPC checks for key criteria such as mapped directories, domains membership, device certificates, or resident files, EPC combines pre-authentication interrogation to protect from keystroke loggers and other malware, as well as confirming end-point criteria like antivirus updates.
  • Object of slide : Reviews additional Detect features Key Messages: Should an end-point device be lost or stolen, Device Watermarks allow rapid and simple access revocation, based upon detection of client certificates on the end point. Aventail offers advanced data protection through Aventail® Cache Control™ and Aventail® Secure Desktop™, which creates a virtual encrypted environment that prevents sensitive information from being left behind on unmanaged devices such as kiosks. Only Aventail provides End Point Control device interrogation and Policy Zones for Windows, Macintosh, Linux, and Windows Mobile devices
  • Object of slide : Unified Policy streamlines policy management to easily protect resources Key Messages: Remote access control management is simplified with Aventail® Unified Policy™. This extensible object-based policy model consolidates control of all Web resources, file shares, and client-server resources in a single location. This lets you quickly set policy with a single rule across all objects, so that policy management can take only minutes instead of the hours it takes with other VPNs. The Aventail® Management Console™ provides a rich, centralized set of reporting and monitoring capabilities for auditing, compliance, management, and resource planning. Visual tools provide real-time information on system state, and give you direct, intuitive options for managing all system objects.
  • Object of slide : Key Messages: Smart Tunneling allows granular bidirectional access control policy for back-connect applications like VoIP and remote help desk Groups can be populated dynamically, based on RADIUS, LDAP, or Active Directory authentication repositories. Dual/stacked authentication allows administrators to combine two different authentication methods together, for added authentication security or capturing credentials for SSO to downstream applications. Offers robust authentication support and Single Sign-On (SSO) support for most applications.
  • Object of slide : Key Messages: Smart Tunneling allows granular bidirectional access control policy for back-connect applications like VoIP and remote help desk Groups can be populated dynamically, based on RADIUS, LDAP, or Active Directory authentication repositories. Dual/stacked authentication allows administrators to combine two different authentication methods together, for added authentication security or capturing credentials for SSO to downstream applications. Offers robust authentication support and Single Sign-On (SSO) support for most applications.
  • Object of slide : Key Messages: Smart Tunneling allows granular bidirectional access control policy for back-connect applications like VoIP and remote help desk Groups can be populated dynamically, based on RADIUS, LDAP, or Active Directory authentication repositories. Dual/stacked authentication allows administrators to combine two different authentication methods together, for added authentication security or capturing credentials for SSO to downstream applications. Offers robust authentication support and Single Sign-On (SSO) support for most applications.
  • Object of slide : WorkPlace Access features and benefits Key Messages: Aventail® WorkPlace™ provides out-of-the-box clientless browser access to Web and client/server applications and file shares from Windows, Windows Mobile, Macintosh, and Linux unmanaged devices, including home computers, public machines, smartphones, and PDAs. Aventail Smart Access is faster and easier because it automatically and transparently delivers the right access method Allows customers to customize their own personal bookmarks to frequently-used resources. The Aventail Secure Mobile Access Solution is the market’s first SSL VPN to provide one gateway for all access Aventail extends its everywhere access to Smart Phones and PDAs with the most complete SSL VPN for mobile devices. .
  • Object of slide : Connect Access features and benefits Key Messages: Aventail® Connect™ adds a Web-delivered thin client on the same broad range of platforms for managed devices for a complete “in-office” experience. Aventail® Connect Mobile™ provides “in-office” access for Windows Mobile PDA users.
  • Object of slide : Introduce Connect Tunnel Service Edition Key Messages: Connect Tunnel Service Edition allows scheduling of application-to-application access for Windows Servers, Windows XP desktops, and branch office applications.
  • Object of slide : Additional Connect features and benefits (see earlier Connect slides) Key Messages: Smart Tunneling allows granular bidirectional access control policy for back-connect applications like VoIP and remote help desk NAMs: Supports Citrix applications and Windows Terminal Services sessions over SSL VPN Access to server-based sessions without any additional configuration Easy seamless user experience to all Citrix applications from a single portal link Support for load-balanced Citrix farms HAMs: Integrates AttachmateWRQ Reflection for the Web terminal emulation Users can directly access host-based applications via a simple applet download Supports a wide range of host-based application platforms, including IBM® mainframe (zSeries) via TN3270; IBM AS/400® (iSeries) via TN5250; and UNIX®, OpenVMS, and Linux via Telnet or SSH
  • Object of this slide: Show how the corporate network is evolving drastically, requiring a new way to look at secure communications Key Points : An increasing number of connections using corporate resources are coming from public networks, not from inside the private LAN. And its not just employees, but connections between customers, partners, teleworkers, as well as mobile employees. Today maybe 45 percent come from outside the LAN. In the not so distant future, that number will increase to 80 or 90 percent. So, the “internal” corporate LAN as we know it today will not exist. Already, the LAN can not be protected, as laptops move in and out of the perimeter, and the most dangerous attacks on our network actually come from inside the LAN rather than outside the LAN. Rather than trying to build an ever more secure perimeter, enterprises should maintain a secure perimeter around the application data center and secure communications between the user and the network resources and applications they need to access. While the perimeter for course-grained network protection doesn’t disappear completely, a new perimeter is formed further inward around the back office systems.
  • Object of this slide: Highlight the key differences between the EX-2500, EX-1600 and the EX-750 and use information to target audiences Key messages: Aventail’s appliances are priced competitively for companies of every size, whether you have 25 users or thousands. Unlike competitors, only Aventail includes with all of its appliances the capabilities required to enable complete application access via the Web EX-2500 For enterprises with hundreds or thousands of remote access users. You need high availability to ensure anytime access to critical applications. The EX-2500 offers: Clustering and high availability (HA) support, with up to 8 nodes of externally sourced HA 2 nodes for internal HA with integrated load balancing Supports up to 2,000 concurrent users EX-1600 For growing midsize companies, an enterprise department, or a remote facility; supports 25 to 250 concurrent remote access users who need anytime access. The EX-1600 offers: Clustering and high availability (HA) support for 2 nodes, with integrated load balancing Supports up to 250 concurrent users. EX-750 For small to mid-size companies, an enterprise department, or a remote facility; supports up to 25 concurrent remote access users. The EX-750 offers: The advantages of Aventail’s proven, secure, and easy-to-manage SSL VPN platform at a lower cost. A cost-effective unit intended for standalone use. An ideal solution if your user base will not grow beyond 25 concurrent users.
  • Optional slide
  • Object of this slide: Show how the corporate network is evolving drastically, requiring a new way to look at secure communications Key Points : An increasing number of connections using corporate resources are coming from public networks, not from inside the private LAN. And its not just employees, but connections between customers, partners, teleworkers, as well as mobile employees. Today maybe 45 percent come from outside the LAN. In the not so distant future, that number will increase to 80 or 90 percent. So, the “internal” corporate LAN as we know it today will not exist. Already, the LAN can not be protected, as laptops move in and out of the perimeter, and the most dangerous attacks on our network actually come from inside the LAN rather than outside the LAN. Rather than trying to build an ever more secure perimeter, enterprises should maintain a secure perimeter around the application data center and secure communications between the user and the network resources and applications they need to access. While the perimeter for course-grained network protection doesn’t disappear completely, a new perimeter is formed further inward around the back office systems.
  • Object of this slide: Show how the corporate network is evolving drastically, requiring a new way to look at secure communications Key Points : An increasing number of connections using corporate resources are coming from public networks, not from inside the private LAN. And its not just employees, but connections between customers, partners, teleworkers, as well as mobile employees. Today maybe 45 percent come from outside the LAN. In the not so distant future, that number will increase to 80 or 90 percent. So, the “internal” corporate LAN as we know it today will not exist. Already, the LAN can not be protected, as laptops move in and out of the perimeter, and the most dangerous attacks on our network actually come from inside the LAN rather than outside the LAN. Rather than trying to build an ever more secure perimeter, enterprises should maintain a secure perimeter around the application data center and secure communications between the user and the network resources and applications they need to access. While the perimeter for course-grained network protection doesn’t disappear completely, a new perimeter is formed further inward around the back office systems.
  • Object of this slide: Demonstrate credibility, market leadership position and experience in prospect’s industry Key messages: Aventail customers include many top global companies, in a wide range of industries.
  • Object of this slide: Give credibility to Aventail’s leadership positioning and reinforce key company differentiators Key messages: Focused on SSL VPNs Aventail concentrates only on SSL VPN solutions Aventail was the pioneer of the SSL VPN, shipping the first product in 1997 Years of analyst recognition as a leading SSL VPN product company Named in the Leader Quadrant in Gartner’s Magic Quadrant report for the fifth time No other SSL VPN vendors can claim the experience at scale we’ve acquired supporting many thousands of users for every major service provider Market validation: leading service providers, customers, technology partners, and channel partners rely on Aventail The only SSL VPN widely adopted by major service providers including MCI, AT&amp;T, IBM, and Sprint Over two million users globally rely on Aventail’s appliances Sales and service operations in 75 countries
  • Optional slide
  • Transcript of "Predstavitev Mors"

    1. 1. Revolucija varnega oddaljenega dostopa
    2. 2. Tehnologija nas spreminja… <ul><li>Dostopnost š irokopasovnih povezav </li></ul><ul><li>Razmah uporabe mobilnih naprav </li></ul><ul><li>Porast IP telefonije </li></ul><ul><li>Porast dela od doma </li></ul>
    3. 3. Uporabniki se vedno bolj izmikajo vašemu nadzoru Mrežne aplikacije in viri Notranji uporabniki Zunanji uporabniki Več... <ul><li>uporabnikov </li></ul><ul><li>naprav </li></ul><ul><li>mrežnih okolij </li></ul><ul><li>mobilnosti </li></ul><ul><li>oddaljenega dostopa </li></ul>Delo od doma Potujoči managerji Podaljšan delovnik Uporabniki javnih termninalov Poslovni partnerji / zunanji uporabniki VOIP uporabniki Uporabniki WLAN Uporabniki PDA in pametnih telefonov
    4. 4. Poslovne posledice 95% vašega mrežnega prometa bo prihajalo izven zasebne mreže, katero poskušate zaščititi 1997: Mrežno območje 2008: Območje virov Interni uporabniki Potujoči managerji Podaljšan delovnik Zaposleni na javnem terminalu Stranke ali dobavitelji za požarnim zidom VOIP uporabniki Zaposleni z brezžično točko PDA uporabniki Poslovni podatkovni centri Stranke ali dobavitelji Oddaljen dostop Zunanji uporabniki Poslovni podatkovni centri
    5. 5. Podjetja potrebujejo novo arhitekturo
    6. 6. Nova arhitektura : invertna omrežja A rhitektura, ki vedno obravnava podrejeno omrežje kot nevarno. <ul><li>Zožanje območja in obravnava vseh uporabnikov kot zunanjih ali “oddaljene” </li></ul><ul><li>Obravnava vseh končnih točk kot “umazanih” </li></ul>Spletne aplikacije Klient/server aplikacije Dokumenti v skupni rabi Baze podatkov VoIP Aplikacije Direktoriji Podatkovni centri LDAP LDAP AD RADIUS Potujoči managerji VOIP uporabniki Stranke ali dobavitelji za požarnim zidom Zaposleni za kioskom Uporabnik brezžične točke Podaljšan delovnik PDA uporabnik Interni uporabniik Interni uporabniki
    7. 7. Odgovor je nadzor oddaljenega dostopa Naprave nadzora dostopa z SSL-om so ključ doseganja nove arhitekture Connect users securely and easily to applications on any device Connect Zaščita Zaščita a plikacij z postopnim nadzorom dostopa, temelječim na identiteti uporabnika in integriteti naprave Detect what is running on the end point device Detect Kontroler oddaljenega dostopa Povezava u porabnikov varno in preprosto, do aplikacij iz katerekoli naprave Povezava Zaznava , kaj teče na končni točki naprave, iz katere dostopamo Zaznava Spletne aplikacije Klient/server aplikacije Dokumenti v skupni uporabi Baze podatkov VoIP Aplikacije Direktoriji Podatkovni centri LDAP LDAP AD RADIUS Poslovni partner iz kateregakoli brskalnika Stranka ali dobavitelj za požarno pregrado Potujo či zaposleni Podaljšan delovnik Uporabniki na kiosku Uporabniki na brezžični točki PDA uporabniki VOIP uporabniki Interni uporabniki Kontroler oddaljenega dostopa
    8. 8. Produkt, zgrajen na novi arhitekturi!
    9. 9. Aventail platforma nadzora oddaljenega dostopa Zaznava Poveže Zaščiti Aventail Smart Access & Smart Tunneling je transportni mehanizem v NAC, ki omogoča preprost in varen dostop uporabnikov do mrežnih virov Aventail End Point Control zazna identiteto in varnostno stanje končne točke oziroma naprave Aventail Unified Policy je uveljavljen pogon, ki zagotavlja, da je dostop naprave nadzorovan in da uporabniki dostopajo le do dodeljenih virov Preprosto za uporabo . Preprosto za nadzor . SSL VPN lahko...
    10. 10. Aventail EPC preveri upravljane in neupravljane naprave še pred vzpostavitvijo povezave, jo identificira in določi splošni nivo zaupanja EPC preverjanje naprave Aventail End Point Control Zaznava <ul><li>Preverjanje po tipu naprave </li></ul><ul><li>IT-Managed </li></ul><ul><li>Non-Managed </li></ul><ul><li>Windows </li></ul><ul><li>Windows Mobile </li></ul><ul><li>Macintosh </li></ul><ul><li>Linux </li></ul><ul><li>identiteti naprave </li></ul><ul><li>Mapirani direktoriji </li></ul><ul><li>Windows Domain članstvo </li></ul><ul><li>Certifikat naprave </li></ul><ul><li>Prisotnost katerekoli datoteke </li></ul><ul><li>in integriteti naprave </li></ul><ul><li>Malware Scans </li></ul><ul><li>Anti-Virus </li></ul><ul><li>Registry Key </li></ul><ul><li>Windows O/S Level </li></ul><ul><li>Personal Firewall </li></ul>WorkPlace ( brezklientni Web dostop ) Connect ( dostop z nameščenim klientom ) Tradicionalne Client/Server aplikacije File Shares VoIP aplikacije Omrežje podjetja
    11. 11. <ul><li>Napredni EPC poenostavi nastavitev in vzdrževanje profilov naprav </li></ul><ul><li>Podpira preverjanje prisotnosti protivirusne zaščite, osebnih požarnih pregrad in anti-spyware produktov, do verzije natančno </li></ul><ul><li>Deluje z Windows okoljem </li></ul><ul><li>Lahko izvaja preglede datotečnega sistema znotraj določenega razpona </li></ul><ul><li>Lahko zahteva aktivnost zaščitev AV in Spyware agentov </li></ul><ul><li>Med vsemi SSL VPN napravami najhitre j še preverjanje EPC in najboljša uporabniška izkušnja </li></ul>Napredni EPC Zaznava Aventail ponuja postopen dostop, s pomo čjo katerega določi stopnjo zaupanja do posamezne končne točke.
    12. 12. <ul><li>Oznake ( Watermarks ) naprav omogoča administratorju specifikacijo certifikata kot oznake naprave, kar omogoča dodatno varnost in fleksibilnost za raznovrstne mobilne naprave </li></ul><ul><li>EPC za mobilne naprave samo Aventail ponuja nadzor končne točke (EPC), preverjanje naprav in varnostne cone za Windows, Macintosh, Linux in Windows Mobile naprave </li></ul><ul><li>Napredna zaščita podatkov zagotavlja, da za nami ne ostanejo občutljivi podatki in zahteva ponovno preverjanje za neskladne naprave </li></ul><ul><ul><li>Aventail ® Cache Control ™ : odstrani vse podatke, zbrane med potekom seje; sproži se z zaprtjem brskalnika, odjava ni obvezna </li></ul></ul><ul><ul><li>Aventail ® Secure Desktop ™ : inkripcija v realnem času za celotno sejo: vse dostopane in shranjene informacije se uničijo po končanju seje </li></ul></ul>Aventail End Point Control Zaznava
    13. 13. Aventail objektno orientirana politika nadzora zagotavlja nadzor, saj je namestitev in upravljanje pravil dostopa enako enostavna za vse naprave in uporabnike . Access Control List Zaščita Unified Policy <ul><li>En sam nabor pravil omogoča dostop do vseh aplikacij in virov preko vseh opcij dostopa, glede na identiteto uporabnika in nivo zaupanja končne točke </li></ul><ul><li>Enostavno kreiranje pravil za dovoljenja, zavrnitve in izvajanje karantene za vse vrste naprav </li></ul>Access Control List Access Control List Uporabniki/Skupine Viri Varnostne cone User/ Group Device Type Rule Type Resource Marketing Trusted Allow CRM All Any Allow OWA Sales Semi & Trusted Allow Citrix All Unknown Quarantine Remediation Links All Trusted w/ Malicious Program Deny None
    14. 14. <ul><li>Obojesmerni nadzor dostopa : Pravila in kontrola dostopa za dodatno varnost ključnih aplikacij, kot je oddaljena pomoč in VoIP </li></ul><ul><li>Dinamične skupine : D inamično polnjenje članstva skupin glede na zbrane informacije iz definiranih avtentikacijskih repozitorijev </li></ul><ul><li>Dvojna /St opnjevana avtentikacija : Omogoča združevanje dveh različnih metod avtentikacije za povečanje varnosti dostopa in zbiranje informacij za Single-Sign-On (SSO) za posamezne aplikacije </li></ul><ul><li>Avtentikacija preko obrazcev : A dministrator lahko neposredno konfigurira SSO za Web aplikacije </li></ul><ul><li>Virtualna tipkovnica: Omogoča avtentikacijo preko virtualne tipkovnice v nevarnih okoljih </li></ul>Zaščita Unified Policy
    15. 15. <ul><li>Omogoča vnos določenih akreditacij brez uporabe tipkovnice </li></ul><ul><li>Ponuja preprost način zaščite akreditacij pred keyboard sniffer -ji </li></ul><ul><li>Uporaba opcijska in nastavljiva s strani administratorja </li></ul>Zaščita Virtualna tipkovnica
    16. 16. Zaščita Napredna poročila <ul><li>Novo orodje za napredna poročila </li></ul><ul><ul><li>Sawmill poročila z predlogami, prilagojenimi Aventail napravam </li></ul></ul><ul><ul><li>Na voljo tudi kot download z Assurance portala </li></ul></ul><ul><ul><li>Teče na Windows ali Linux serverjih </li></ul></ul><ul><li>Primeri poročil : </li></ul><ul><ul><li>Podatki o tem, do katerih podatkov in kdaj je uporabnik dostopal </li></ul></ul><ul><ul><li>Informacije o sejah – kdaj je uporabnik dostopal do podatkov in na kakšen način </li></ul></ul>
    17. 17. WorkPlace Access : Enoten prehod za identično uporabniško izkušnjo ob dostopu do klientno-strežniških ali spletnih aplikacij s centraliziranim upravljanjem in varnostjo https://myhomepage.mycompany.com Povezava Pameten dostop za neupravljane naprave
    18. 18. Connect Access: Agent, enostaven za upravljanje in distribucijo, za popoln dostop za Windows, Macintosh, Linux in Windows Mobile naprave ter “pisarniško” izkušnjo za uporabnika Povezava Pameten dostop za upravljane naprave Strežniške aplikacije za tanke kliente Tradicionalne strežniške aplikacije Web aplikacije File Shares
    19. 19. Aventail kontroler oddaljenega dostopa Connect Access Samo aventail ponuja celovit spekter opcij dostopa na podlagi pravil za komunikacijo uporabnikov z aplikacijami, uporabnikov z uporabniki IN aplikacij z aplikacijami. Connect Service Access XP Desktops Windows Servers Aplikacije v dislociranih enotah <ul><li>Povezava deluje brez intervencije uporabnika </li></ul><ul><li>Popolna podpora za EPC in dvosmerno komunikacijo </li></ul><ul><li>Primerno za aplikacije dislociranih enot, ki potrebujejo redno ali občasno povezavo s centralo </li></ul>Connect Tunnel Service Edition Nadzor dostopa za aplikacije Povezava WorkPlace Access Strežniške aplikacije za tanke kliente Klasične klientno-strežniške aplikacije Web aplikacije File Shares
    20. 20. <ul><li>Univerzalni dostop do aplikacij , vključno z Web, klientno-strežniškimi in ostalimi aplikacijami (kot VoIP) </li></ul><ul><li>Aventail® Native Access Modules ™ : izviren dostop do Windows Terminal Services </li></ul><ul><ul><li>Podpora za okolja Citrix farm (load-balanced) kot alternativa dragi implementaciji Citrix nFuse </li></ul></ul><ul><ul><li>Omogočanje uporabnikom dostop do najavljenih Citrix aplikacij preko enotne povezave znotraj WorkPlace portala </li></ul></ul><ul><li>Aventail® Host Access Modules ™ : vodilna rešitev AttachmateWRQ za terminalsko emulacijo , integrirana z Aventail SSL VPN za dostop do široke palete host aplikacij v IBM, UNIX in OpenVMS okoljih </li></ul>Dostopnost aplikacij Povezava
    21. 21. Dodatne funkcije <ul><li>Advanced Reporting: podroben in prilagodljiv način poročanja o aktivnostih uporabnikov in drugega omrežnega dogajanja </li></ul><ul><li>Podpora IE7 brskalniku: Aventail je prvi podprl najnovejši Microsoftov brskalnik </li></ul><ul><li>Široka podpora mobilnim platformam: Symbian, Windows Mobile 4, 5 in 6 .x, Palm, DoCoMo in Blackberry naprave </li></ul><ul><li>Kostumiziran Web portal: različni izgledi za različne uporabnike, osebne zaznamke, prilagoditev mobilnim napravam </li></ul><ul><li>Visoka razpoložljivost: z integriranim load-balancing sistemom </li></ul>
    22. 22. Aventail SSL VPN naprave EX-2500 EX-1600 EX-750 Za velike organizacije z več tisoč oddaljenimi uporabniki ; podpora za do 2.000 sočasnih uporabnikov Za srednja in večja podjetja; podpora za do 250 sočasnih uporabnikov Manjše organizacije ali oddelke; podpora za do 50 sočasnih uporabnikov Vgrajena visoka razpoložljivost za do 2 enoti (nods) z integriranim load-balancingom; možnost uporabe zunanjega load-balancing sistema za do 8 enot Podpora visoki razpoložljivosti (do 2 enoti) z integriranim load-balancing sistemom Stroškovno učinkovita rešitev za samostojno uporabo, ki vsebuje vse prednosti Avetail SSL VPN tehnologije
    23. 23. Kako lahko Aventail pomaga Ministrstvu za obrambo RS ?
    24. 24. Kako lahko Aventail pomaga Ministrstvu za obrambo RS ? <ul><li>oddaljeni dostop: samostojna in celovita rešitev oddaljenega dostopa </li></ul><ul><li>mobilno podjetje: podpora poslovnim funkcijam (mobilnosti uporabnikov) </li></ul><ul><li>nadzor dostopa v omrežje : popoln nadzor in upravljanje dostopa v lokalno omrežje podjetja </li></ul><ul><li>brezžična omrežja : dostop do virov znotraj organizacije preko brezžične dostopne točke </li></ul><ul><li>varnostna politika : del plana obnove za primere katastrof </li></ul>
    25. 25. <ul><li>zaposleni: </li></ul><ul><ul><li>dostop do elektronske pošte (OWA, DWA) </li></ul></ul><ul><ul><li>dokumenti v skupni rabi </li></ul></ul><ul><ul><li>intranet vsebine </li></ul></ul><ul><ul><li>Web aplikacija (CRM, dokumentni sistem) </li></ul></ul><ul><ul><li>administracija </li></ul></ul><ul><li>poslovni partnerji in stranke: </li></ul><ul><ul><li>extranet (npr. vpn. mors .si) </li></ul></ul><ul><ul><li>outsourcing / outtasking </li></ul></ul>Kako lahko Aventail pomaga Ministrstvu za obrambo RS ?
    26. 26. Izbrane Aventail stranke Storitve Več kot 2,5 milijona svetovnih uporabnikov se zanaša na Aventail rešitve Tehnologija Ostale branže Zdravstvo Javni sektor Proizvodnja Finance in storitve zavarovanja
    27. 27. <ul><li>Vodilni na tehnološkem področju </li></ul><ul><ul><li>Ponuja VPN tehnologijo naslednje generacije danes </li></ul></ul><ul><ul><li>Vlaga več v razvoj SSL VPN kot katerakoli druga organizacija </li></ul></ul><ul><ul><li>SSL VPN pion i r: ponudil prvi SSL VPN produkt leta 1997 </li></ul></ul>Aventail: Vodilno podjetje na področju SSL VPN <ul><ul><li>Frost & Sullivan: Nagrada Best in Class SSL VPN for Remote Access Connectivity </li></ul></ul><ul><ul><li>Forrester: Nagrada Best Secure Remote Application Gateway; vodilni SSL VPN ponudnik in najmočnejši pure-SSL-VPN igralec </li></ul></ul><ul><li>Največkrat nagrajen SSL VPN </li></ul><ul><li>Ocena trga : vodilni ponudniki storitev, stranke, tehnološki partnerji se zanašajo na Aventail </li></ul><ul><ul><li>Vpisan kot leader v Gartnerjevem čarobnem kvadratu (6x zapored) </li></ul></ul>SSL VPN Best in Class
    28. 28. Hvala
    1. A particular slide catching your eye?

      Clipping is a handy way to collect important slides you want to go back to later.

    ×