Best Remote Access

Share this article:

Overall Category Winner and Winner for Best SSL VPN: Nortel VPN Gateway

The Nortel VPN Gateway portfolio is a secure access solution that extends enterprise applications and resources. The VPN Gateway offers the industry's most convenient, flexible and cost-effective secure access solution on the market today. Nortel's SSL VPN technology offers true freedom of mobility to a broad range of applications by giving remote users more opportunities to communicate securely. Users are assured consistent, secure access to Voice/Data/Multimedia applications from their laptop computer, a PC at a customer site, a web browser-equipped PDA or smart phone, or an internet terminal in a public location.

FINALISTS:

• Aventail Corporation for Aventail

Smart SSL VPN

• Citrix Systems for Citrix Access Gateway

• Nortel for Nortel VPN Gateway

Winner for Best IPSec VPN: Check Point Integrity SecureClient

Integrity SecureClient provides advanced remote connectivity and endpoint security in a single solution. Its desktop firewall, program controls and intrusion prevention preemptively stop the newest worms, spyware and hacker attacks.

Administrators experience ease of deployment and can rest assured that information will remain protected against costly attacks. Only secure PCs gain access to network resources, enabling confidentiality and business continuity.

FINALIST:

• Check Point Software Technologies for Check Point Integrity SecureClient

Winner for Best Endpoint Security Solution: StillSecure Safe Access

Safe Access is the most flexible endpoint security solution, with three testing methods and four enforcement methods. Its open architecture allows third-party solutions to control key testing and quarantining functions.

Safe Access protects the network by testing endpoints for compliance and quarantining non-compliant machines before they cause damage. Integration within the IT environment enhances threat-response capabilities and leverages existing investments.

FINALISTS:

• Check Point Software Technologies for Check Point Integrity

• ForeScout Technologies, Inc. for CounterACT 5.0: Clientless Network Access Control

• Permeo Technologies for Permeo Base5

• PointSec Mobile Technologies for PointSec

• StillSecure for StillSecure Safe Access

Share this article:
close

Next Article in News

Sign up to our newsletters

More in News

Op Emmental spoofs bank sites, uses Android malware to maintain account access

Op Emmental spoofs bank sites, uses Android malware ...

On Tuesday, Trend Micro released a report detailing Operation Emmental, which targets victims in Austria, Switzerland, Sweden and Japan.

Goodwill investigates compromise of credit, debit card info

Credit card and debit card data may have been compromised at several Goodwill locations around the country.

Vice.com hacked, possibly The Wall Street Journal website too

Vice.com hacked, possibly The Wall Street Journal website ...

A reported Russian hacker group known as W0rm tweeted on Monday that it had hacked Vice.com and The Wall Street Journal website.