May 05, 2004
- Ease of Use:
- Value for Money:
- Overall Rating:
: Superb throughput rates combined with excellent usability make the Bluesocket WG-2100 hard to beat.
: While not exactly expensive for what the box offers, some might find the price prohibitive.
: A superb wireless security product that leaves nothing to chance for the corporate network.
The product is a straightforward, browser-based management console. Once it gains an IP address, the tabbed interface allows administrators to access management and configuration options such as users, policies and VPN parameters.
Authentication methods include standard MAC address lists to LDAP or Radius databases. Once a user is authenticated, the device determines a host of credentials appropriate for the device. This includes whether the data needs to be encrypted and to what level and what bandwidth it needs. The latter point is important, because you can designate Quality of Service levels for individuals.
One of the device's ground-breaking features is Bluesocket's Secure Mobility technology, which allows users to roam between subnets of a corporate network even while using IPsec tunneling and other wireless security protocols. It is also platform-agnostic, meaning that all accredited WLAN products work seamlessly with the device.
The browser-based interface is extremely intuitive and easy to use, especially when you consider the complexity of the technologies you are using. Simply list the user and select their credentials from pull-down menus. This can be extended to group policies. Quality of Service is important when using wireless networks due to a lack of bandwidth. The WG-2100 provides a simple and effective way to overcome this.
The product is aimed at the high end of the market, and can handle an encrypted throughput rate of 150 Mbps. Bluesocket claims this makes it the fastest wireless gateway on the market. Even so, if this is not enough in today's connected world, units can be linked together to provide Gigabit speeds.
Additionally, the WG-2100 is a 2U rack-mountable unit that has also been designed to work as a standalone device.
SC Magazine Articles
- Yahoo breach; State-sponsored actors suspected, at least 500 million accounts affected
- Education sector bullied by ransomware and can barely defend itself, report
- DetoxCrypto ransomware imitates Malwarebytes software
- Cisco warns of exploitation of new flaws linked to Shadow Brokers exploits
- Hackers crack Tesla CAN Bus, DoT issues policy for securing connected car
- Microsoft Office 365 hit with massive Cerber ransomware attack, report
- Hard Rock Hotel & Casino Las Vegas hit with POS breach
- X-ray and MRI machines among devices used as springboards for data breach attacks
- Hacker purportedly selling over 650,000 stolen medical records on dark web marketplace
- Wi-Fi warning! Study finds U.S. unaware of public Wi-fi risks
- OpenSSL patches 14 vulns, including high-severity flaw that can be exploited for DoS attacks
- IoT assault, connected devices increasingly used for DDoS attacks
- Cybercriminals already able to hack ATM biometric readers
- Cities planning transparency laws for police surveillance tech
- Malicious apps leveraging top UK brands has increased by 130%