May 05, 2004
- Ease of Use:
- Value for Money:
- Overall Rating:
: Superb throughput rates combined with excellent usability make the Bluesocket WG-2100 hard to beat.
: While not exactly expensive for what the box offers, some might find the price prohibitive.
: A superb wireless security product that leaves nothing to chance for the corporate network.
The product is a straightforward, browser-based management console. Once it gains an IP address, the tabbed interface allows administrators to access management and configuration options such as users, policies and VPN parameters.
Authentication methods include standard MAC address lists to LDAP or Radius databases. Once a user is authenticated, the device determines a host of credentials appropriate for the device. This includes whether the data needs to be encrypted and to what level and what bandwidth it needs. The latter point is important, because you can designate Quality of Service levels for individuals.
One of the device's ground-breaking features is Bluesocket's Secure Mobility technology, which allows users to roam between subnets of a corporate network even while using IPsec tunneling and other wireless security protocols. It is also platform-agnostic, meaning that all accredited WLAN products work seamlessly with the device.
The browser-based interface is extremely intuitive and easy to use, especially when you consider the complexity of the technologies you are using. Simply list the user and select their credentials from pull-down menus. This can be extended to group policies. Quality of Service is important when using wireless networks due to a lack of bandwidth. The WG-2100 provides a simple and effective way to overcome this.
The product is aimed at the high end of the market, and can handle an encrypted throughput rate of 150 Mbps. Bluesocket claims this makes it the fastest wireless gateway on the market. Even so, if this is not enough in today's connected world, units can be linked together to provide Gigabit speeds.
Additionally, the WG-2100 is a 2U rack-mountable unit that has also been designed to work as a standalone device.
Sign up to our newsletters
SC Magazine Articles
- Women in IT Security: 10 Power Players
- Report: Phishing costs average organization $3.7 million per year
- Scanner identifies thousands of malicious Android apps on Google Play, other markets
- Women in IT Security: Women of influence
- DARPA seeks to develop program that drastically improves DDoS defense
- DOJ issues new 'stingray' policies and begins requiring a warrant
- Outdated websites deliver TeslaCrypt via Neutrino Exploit Kit: Heimdal
- Scammers and schemers look to cash in on Ashley Madison breach
- ACLU asks DOJ to withhold funds for LAPD body cams
- A question of balance between security solutions and the people who use it