SlideShare ist ein Scribd-Unternehmen logo
1 von 28
Revolucija varnega oddaljenega dostopa
Tehnologija nas spreminja… ,[object Object],[object Object],[object Object],[object Object]
Uporabniki se vedno bolj  izmikajo vašemu nadzoru Mrežne aplikacije  in viri Notranji uporabniki Zunanji uporabniki Več... ,[object Object],[object Object],[object Object],[object Object],[object Object],Delo od doma Potujoči managerji Podaljšan delovnik Uporabniki  javnih termninalov Poslovni partnerji / zunanji uporabniki VOIP  uporabniki Uporabniki  WLAN Uporabniki  PDA in pametnih telefonov
Poslovne posledice 95%  vašega mrežnega prometa bo prihajalo izven zasebne mreže, katero poskušate zaščititi 1997:  Mrežno območje 2008:  Območje virov   Interni uporabniki Potujoči managerji Podaljšan delovnik Zaposleni na javnem terminalu Stranke ali dobavitelji za požarnim zidom VOIP  uporabniki Zaposleni z brezžično točko PDA uporabniki Poslovni podatkovni centri Stranke ali dobavitelji Oddaljen dostop Zunanji  uporabniki Poslovni podatkovni centri
Podjetja potrebujejo novo arhitekturo
Nova arhitektura : invertna omrežja A rhitektura, ki vedno obravnava   podrejeno omrežje  kot  nevarno.   ,[object Object],[object Object],Spletne aplikacije Klient/server aplikacije Dokumenti  v skupni rabi   Baze podatkov VoIP Aplikacije Direktoriji Podatkovni centri LDAP LDAP AD RADIUS Potujoči managerji VOIP  uporabniki Stranke ali dobavitelji za požarnim zidom Zaposleni za kioskom Uporabnik brezžične točke Podaljšan delovnik PDA uporabnik Interni uporabniik Interni uporabniki
Odgovor je nadzor oddaljenega dostopa Naprave nadzora dostopa z SSL-om so ključ doseganja nove arhitekture Connect   users securely and easily to applications on any device Connect Zaščita Zaščita   a plikacij z postopnim nadzorom dostopa, temelječim na identiteti uporabnika in integriteti naprave Detect   what is running on the end point device Detect Kontroler oddaljenega dostopa Povezava   u porabnikov varno in preprosto,  do aplikacij iz katerekoli naprave Povezava Zaznava , kaj teče na končni točki naprave, iz katere dostopamo Zaznava Spletne aplikacije Klient/server aplikacije Dokumenti v skupni uporabi  Baze podatkov VoIP Aplikacije Direktoriji Podatkovni centri LDAP LDAP AD RADIUS Poslovni partner iz kateregakoli brskalnika Stranka ali dobavitelj za požarno pregrado Potujo či  zaposleni Podaljšan delovnik Uporabniki na kiosku Uporabniki na brezžični točki PDA uporabniki VOIP  uporabniki Interni uporabniki Kontroler oddaljenega dostopa
Produkt, zgrajen na novi arhitekturi!
Aventail platforma nadzora oddaljenega dostopa   Zaznava Poveže Zaščiti Aventail Smart Access & Smart Tunneling   je transportni mehanizem v NAC, ki omogoča preprost in varen dostop uporabnikov do mrežnih virov Aventail  End Point Control  zazna identiteto in varnostno stanje končne točke oziroma naprave Aventail Unified Policy   je   uveljavljen pogon, ki zagotavlja, da je dostop naprave nadzorovan in da uporabniki dostopajo le do dodeljenih virov Preprosto za uporabo .  Preprosto za nadzor . SSL VPN lahko...
Aventail EPC  preveri upravljane in neupravljane naprave še pred vzpostavitvijo povezave, jo identificira in določi splošni nivo zaupanja EPC  preverjanje naprave Aventail End Point Control Zaznava ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],WorkPlace  ( brezklientni   Web  dostop ) Connect  ( dostop z nameščenim klientom ) Tradicionalne  Client/Server  aplikacije File Shares VoIP  aplikacije Omrežje podjetja
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Napredni EPC Zaznava Aventail ponuja postopen dostop,  s pomo čjo katerega določi stopnjo zaupanja do posamezne končne točke.
[object Object],[object Object],[object Object],[object Object],[object Object],Aventail End Point Control Zaznava
Aventail  objektno orientirana politika nadzora zagotavlja nadzor, saj je  namestitev in upravljanje pravil dostopa enako enostavna za vse naprave in uporabnike .  Access Control List Zaščita Unified Policy ,[object Object],[object Object],Access  Control List Access  Control List Uporabniki/Skupine Viri Varnostne cone User/ Group Device Type Rule Type Resource Marketing Trusted Allow CRM All Any Allow OWA Sales Semi & Trusted Allow Citrix All Unknown Quarantine Remediation Links All Trusted w/ Malicious Program Deny None
[object Object],[object Object],[object Object],[object Object],[object Object],Zaščita Unified Policy
[object Object],[object Object],[object Object],Zaščita Virtualna tipkovnica
Zaščita Napredna poročila ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
WorkPlace  Access :   Enoten prehod za identično uporabniško izkušnjo ob dostopu do klientno-strežniških ali spletnih aplikacij s centraliziranim upravljanjem in varnostjo  https://myhomepage.mycompany.com Povezava Pameten dostop za neupravljane naprave
Connect Access:   Agent, enostaven za upravljanje in distribucijo, za popoln dostop za  Windows, Macintosh, Linux  in  Windows Mobile  naprave ter “pisarniško” izkušnjo za uporabnika  Povezava Pameten dostop za upravljane naprave Strežniške aplikacije za tanke kliente Tradicionalne strežniške aplikacije Web aplikacije File Shares
Aventail  kontroler oddaljenega dostopa Connect Access Samo aventail ponuja celovit spekter opcij dostopa na podlagi pravil za komunikacijo uporabnikov z aplikacijami, uporabnikov z uporabniki IN aplikacij z aplikacijami.  Connect Service Access XP Desktops Windows Servers Aplikacije v dislociranih enotah ,[object Object],[object Object],[object Object],Connect Tunnel Service Edition Nadzor dostopa  za aplikacije Povezava WorkPlace Access Strežniške aplikacije za tanke kliente Klasične klientno-strežniške aplikacije Web  aplikacije File Shares
[object Object],[object Object],[object Object],[object Object],[object Object],Dostopnost aplikacij Povezava
Dodatne funkcije ,[object Object],[object Object],[object Object],[object Object],[object Object]
Aventail SSL VPN  naprave EX-2500  EX-1600  EX-750 Za velike organizacije z več tisoč oddaljenimi uporabniki ;  podpora za do 2.000 sočasnih uporabnikov Za srednja in večja podjetja; podpora za do 250 sočasnih uporabnikov Manjše organizacije ali oddelke; podpora za do 50 sočasnih uporabnikov Vgrajena visoka razpoložljivost za do  2  enoti (nods) z integriranim load-balancingom; možnost uporabe zunanjega load-balancing sistema za do 8 enot Podpora visoki razpoložljivosti (do 2 enoti) z integriranim load-balancing sistemom Stroškovno učinkovita rešitev za samostojno uporabo, ki vsebuje vse prednosti Avetail SSL VPN tehnologije
Kako lahko Aventail pomaga  Ministrstvu za obrambo RS ?
Kako lahko Aventail pomaga  Ministrstvu za obrambo RS ? ,[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Kako lahko Aventail pomaga  Ministrstvu za obrambo RS ?
Izbrane Aventail stranke Storitve Več kot 2,5 milijona svetovnih uporabnikov se zanaša na Aventail rešitve Tehnologija Ostale branže Zdravstvo Javni sektor Proizvodnja Finance in storitve zavarovanja
[object Object],[object Object],[object Object],[object Object],Aventail:  Vodilno podjetje na področju  SSL VPN ,[object Object],[object Object],[object Object],[object Object],[object Object],SSL VPN  Best in Class
Hvala

Weitere ähnliche Inhalte

Empfohlen

2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by HubspotMarius Sescu
 
Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTEverything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTExpeed Software
 
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsPixeldarts
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthThinkNow
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfmarketingartwork
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024Neil Kimberley
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)contently
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024Albert Qian
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsKurio // The Social Media Age(ncy)
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Search Engine Journal
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summarySpeakerHub
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next Tessa Mero
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentLily Ray
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best PracticesVit Horky
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project managementMindGenius
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...RachelPearson36
 

Empfohlen (20)

2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot
 
Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTEverything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPT
 
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage Engineerings
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
 
Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 

Predstavitev Mors

  • 2.
  • 3.
  • 4. Poslovne posledice 95% vašega mrežnega prometa bo prihajalo izven zasebne mreže, katero poskušate zaščititi 1997: Mrežno območje 2008: Območje virov Interni uporabniki Potujoči managerji Podaljšan delovnik Zaposleni na javnem terminalu Stranke ali dobavitelji za požarnim zidom VOIP uporabniki Zaposleni z brezžično točko PDA uporabniki Poslovni podatkovni centri Stranke ali dobavitelji Oddaljen dostop Zunanji uporabniki Poslovni podatkovni centri
  • 6.
  • 7. Odgovor je nadzor oddaljenega dostopa Naprave nadzora dostopa z SSL-om so ključ doseganja nove arhitekture Connect users securely and easily to applications on any device Connect Zaščita Zaščita a plikacij z postopnim nadzorom dostopa, temelječim na identiteti uporabnika in integriteti naprave Detect what is running on the end point device Detect Kontroler oddaljenega dostopa Povezava u porabnikov varno in preprosto, do aplikacij iz katerekoli naprave Povezava Zaznava , kaj teče na končni točki naprave, iz katere dostopamo Zaznava Spletne aplikacije Klient/server aplikacije Dokumenti v skupni uporabi Baze podatkov VoIP Aplikacije Direktoriji Podatkovni centri LDAP LDAP AD RADIUS Poslovni partner iz kateregakoli brskalnika Stranka ali dobavitelj za požarno pregrado Potujo či zaposleni Podaljšan delovnik Uporabniki na kiosku Uporabniki na brezžični točki PDA uporabniki VOIP uporabniki Interni uporabniki Kontroler oddaljenega dostopa
  • 8. Produkt, zgrajen na novi arhitekturi!
  • 9. Aventail platforma nadzora oddaljenega dostopa Zaznava Poveže Zaščiti Aventail Smart Access & Smart Tunneling je transportni mehanizem v NAC, ki omogoča preprost in varen dostop uporabnikov do mrežnih virov Aventail End Point Control zazna identiteto in varnostno stanje končne točke oziroma naprave Aventail Unified Policy je uveljavljen pogon, ki zagotavlja, da je dostop naprave nadzorovan in da uporabniki dostopajo le do dodeljenih virov Preprosto za uporabo . Preprosto za nadzor . SSL VPN lahko...
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17. WorkPlace Access : Enoten prehod za identično uporabniško izkušnjo ob dostopu do klientno-strežniških ali spletnih aplikacij s centraliziranim upravljanjem in varnostjo https://myhomepage.mycompany.com Povezava Pameten dostop za neupravljane naprave
  • 18. Connect Access: Agent, enostaven za upravljanje in distribucijo, za popoln dostop za Windows, Macintosh, Linux in Windows Mobile naprave ter “pisarniško” izkušnjo za uporabnika Povezava Pameten dostop za upravljane naprave Strežniške aplikacije za tanke kliente Tradicionalne strežniške aplikacije Web aplikacije File Shares
  • 19.
  • 20.
  • 21.
  • 22. Aventail SSL VPN naprave EX-2500 EX-1600 EX-750 Za velike organizacije z več tisoč oddaljenimi uporabniki ; podpora za do 2.000 sočasnih uporabnikov Za srednja in večja podjetja; podpora za do 250 sočasnih uporabnikov Manjše organizacije ali oddelke; podpora za do 50 sočasnih uporabnikov Vgrajena visoka razpoložljivost za do 2 enoti (nods) z integriranim load-balancingom; možnost uporabe zunanjega load-balancing sistema za do 8 enot Podpora visoki razpoložljivosti (do 2 enoti) z integriranim load-balancing sistemom Stroškovno učinkovita rešitev za samostojno uporabo, ki vsebuje vse prednosti Avetail SSL VPN tehnologije
  • 23. Kako lahko Aventail pomaga Ministrstvu za obrambo RS ?
  • 24.
  • 25.
  • 26. Izbrane Aventail stranke Storitve Več kot 2,5 milijona svetovnih uporabnikov se zanaša na Aventail rešitve Tehnologija Ostale branže Zdravstvo Javni sektor Proizvodnja Finance in storitve zavarovanja
  • 27.
  • 28. Hvala

Hinweis der Redaktion

  1. Key Points: - More people are accessing from more, increasingly public places than ever before. “ I’ve got executives that want access to Citrix from home.” “ My business partners need access to more systems every day.” - And they are using devices that weren’t even on your radar two years ago. - Users are harder and more expensive to manage because they don’t all use corporate-issued laptops or desktop computers
  2. Object of this slide: Show how the corporate network is evolving drastically, requiring a new way to look at secure communications Key Points : An increasing number of connections using corporate resources are coming from public networks, not from inside the private LAN. And its not just employees, but connections between customers, partners, teleworkers, as well as mobile employees. Today maybe 45 percent come from outside the LAN. In the not so distant future, that number will increase to 80 or 90 percent. So, the “internal” corporate LAN as we know it today will not exist. Already, the LAN can not be protected, as laptops move in and out of the perimeter, and the most dangerous attacks on our network actually come from inside the LAN rather than outside the LAN. Rather than trying to build an ever more secure perimeter, enterprises should maintain a secure perimeter around the application data center and secure communications between the user and the network resources and applications they need to access. While the perimeter for course-grained network protection doesn’t disappear completely, a new perimeter is formed further inward around the back office systems.
  3. Optional slide
  4. Optional slide
  5. Object of slide : Details how EPC detects device type, identity, and integrity. Key Messages: Only Aventail® End Point Control™ (EPC) lets you enforce granular access control rules for Windows, Windows Mobile, Macintosh, and Linux end-point environments—before user authentication. EPC identifies the device as IT-managed or unmanaged. EPC checks for key criteria such as mapped directories, domains membership, device certificates, or resident files, EPC combines pre-authentication interrogation to protect from keystroke loggers and other malware, as well as confirming end-point criteria like antivirus updates.
  6. Object of slide : Reviews additional Detect features Key Messages: Should an end-point device be lost or stolen, Device Watermarks allow rapid and simple access revocation, based upon detection of client certificates on the end point. Aventail offers advanced data protection through Aventail® Cache Control™ and Aventail® Secure Desktop™, which creates a virtual encrypted environment that prevents sensitive information from being left behind on unmanaged devices such as kiosks. Only Aventail provides End Point Control device interrogation and Policy Zones for Windows, Macintosh, Linux, and Windows Mobile devices
  7. Object of slide : Unified Policy streamlines policy management to easily protect resources Key Messages: Remote access control management is simplified with Aventail® Unified Policy™. This extensible object-based policy model consolidates control of all Web resources, file shares, and client-server resources in a single location. This lets you quickly set policy with a single rule across all objects, so that policy management can take only minutes instead of the hours it takes with other VPNs. The Aventail® Management Console™ provides a rich, centralized set of reporting and monitoring capabilities for auditing, compliance, management, and resource planning. Visual tools provide real-time information on system state, and give you direct, intuitive options for managing all system objects.
  8. Object of slide : Key Messages: Smart Tunneling allows granular bidirectional access control policy for back-connect applications like VoIP and remote help desk Groups can be populated dynamically, based on RADIUS, LDAP, or Active Directory authentication repositories. Dual/stacked authentication allows administrators to combine two different authentication methods together, for added authentication security or capturing credentials for SSO to downstream applications. Offers robust authentication support and Single Sign-On (SSO) support for most applications.
  9. Object of slide : Key Messages: Smart Tunneling allows granular bidirectional access control policy for back-connect applications like VoIP and remote help desk Groups can be populated dynamically, based on RADIUS, LDAP, or Active Directory authentication repositories. Dual/stacked authentication allows administrators to combine two different authentication methods together, for added authentication security or capturing credentials for SSO to downstream applications. Offers robust authentication support and Single Sign-On (SSO) support for most applications.
  10. Object of slide : Key Messages: Smart Tunneling allows granular bidirectional access control policy for back-connect applications like VoIP and remote help desk Groups can be populated dynamically, based on RADIUS, LDAP, or Active Directory authentication repositories. Dual/stacked authentication allows administrators to combine two different authentication methods together, for added authentication security or capturing credentials for SSO to downstream applications. Offers robust authentication support and Single Sign-On (SSO) support for most applications.
  11. Object of slide : WorkPlace Access features and benefits Key Messages: Aventail® WorkPlace™ provides out-of-the-box clientless browser access to Web and client/server applications and file shares from Windows, Windows Mobile, Macintosh, and Linux unmanaged devices, including home computers, public machines, smartphones, and PDAs. Aventail Smart Access is faster and easier because it automatically and transparently delivers the right access method Allows customers to customize their own personal bookmarks to frequently-used resources. The Aventail Secure Mobile Access Solution is the market’s first SSL VPN to provide one gateway for all access Aventail extends its everywhere access to Smart Phones and PDAs with the most complete SSL VPN for mobile devices. .
  12. Object of slide : Connect Access features and benefits Key Messages: Aventail® Connect™ adds a Web-delivered thin client on the same broad range of platforms for managed devices for a complete “in-office” experience. Aventail® Connect Mobile™ provides “in-office” access for Windows Mobile PDA users.
  13. Object of slide : Introduce Connect Tunnel Service Edition Key Messages: Connect Tunnel Service Edition allows scheduling of application-to-application access for Windows Servers, Windows XP desktops, and branch office applications.
  14. Object of slide : Additional Connect features and benefits (see earlier Connect slides) Key Messages: Smart Tunneling allows granular bidirectional access control policy for back-connect applications like VoIP and remote help desk NAMs: Supports Citrix applications and Windows Terminal Services sessions over SSL VPN Access to server-based sessions without any additional configuration Easy seamless user experience to all Citrix applications from a single portal link Support for load-balanced Citrix farms HAMs: Integrates AttachmateWRQ Reflection for the Web terminal emulation Users can directly access host-based applications via a simple applet download Supports a wide range of host-based application platforms, including IBM® mainframe (zSeries) via TN3270; IBM AS/400® (iSeries) via TN5250; and UNIX®, OpenVMS, and Linux via Telnet or SSH
  15. Object of this slide: Show how the corporate network is evolving drastically, requiring a new way to look at secure communications Key Points : An increasing number of connections using corporate resources are coming from public networks, not from inside the private LAN. And its not just employees, but connections between customers, partners, teleworkers, as well as mobile employees. Today maybe 45 percent come from outside the LAN. In the not so distant future, that number will increase to 80 or 90 percent. So, the “internal” corporate LAN as we know it today will not exist. Already, the LAN can not be protected, as laptops move in and out of the perimeter, and the most dangerous attacks on our network actually come from inside the LAN rather than outside the LAN. Rather than trying to build an ever more secure perimeter, enterprises should maintain a secure perimeter around the application data center and secure communications between the user and the network resources and applications they need to access. While the perimeter for course-grained network protection doesn’t disappear completely, a new perimeter is formed further inward around the back office systems.
  16. Object of this slide: Highlight the key differences between the EX-2500, EX-1600 and the EX-750 and use information to target audiences Key messages: Aventail’s appliances are priced competitively for companies of every size, whether you have 25 users or thousands. Unlike competitors, only Aventail includes with all of its appliances the capabilities required to enable complete application access via the Web EX-2500 For enterprises with hundreds or thousands of remote access users. You need high availability to ensure anytime access to critical applications. The EX-2500 offers: Clustering and high availability (HA) support, with up to 8 nodes of externally sourced HA 2 nodes for internal HA with integrated load balancing Supports up to 2,000 concurrent users EX-1600 For growing midsize companies, an enterprise department, or a remote facility; supports 25 to 250 concurrent remote access users who need anytime access. The EX-1600 offers: Clustering and high availability (HA) support for 2 nodes, with integrated load balancing Supports up to 250 concurrent users. EX-750 For small to mid-size companies, an enterprise department, or a remote facility; supports up to 25 concurrent remote access users. The EX-750 offers: The advantages of Aventail’s proven, secure, and easy-to-manage SSL VPN platform at a lower cost. A cost-effective unit intended for standalone use. An ideal solution if your user base will not grow beyond 25 concurrent users.
  17. Optional slide
  18. Object of this slide: Show how the corporate network is evolving drastically, requiring a new way to look at secure communications Key Points : An increasing number of connections using corporate resources are coming from public networks, not from inside the private LAN. And its not just employees, but connections between customers, partners, teleworkers, as well as mobile employees. Today maybe 45 percent come from outside the LAN. In the not so distant future, that number will increase to 80 or 90 percent. So, the “internal” corporate LAN as we know it today will not exist. Already, the LAN can not be protected, as laptops move in and out of the perimeter, and the most dangerous attacks on our network actually come from inside the LAN rather than outside the LAN. Rather than trying to build an ever more secure perimeter, enterprises should maintain a secure perimeter around the application data center and secure communications between the user and the network resources and applications they need to access. While the perimeter for course-grained network protection doesn’t disappear completely, a new perimeter is formed further inward around the back office systems.
  19. Object of this slide: Show how the corporate network is evolving drastically, requiring a new way to look at secure communications Key Points : An increasing number of connections using corporate resources are coming from public networks, not from inside the private LAN. And its not just employees, but connections between customers, partners, teleworkers, as well as mobile employees. Today maybe 45 percent come from outside the LAN. In the not so distant future, that number will increase to 80 or 90 percent. So, the “internal” corporate LAN as we know it today will not exist. Already, the LAN can not be protected, as laptops move in and out of the perimeter, and the most dangerous attacks on our network actually come from inside the LAN rather than outside the LAN. Rather than trying to build an ever more secure perimeter, enterprises should maintain a secure perimeter around the application data center and secure communications between the user and the network resources and applications they need to access. While the perimeter for course-grained network protection doesn’t disappear completely, a new perimeter is formed further inward around the back office systems.
  20. Object of this slide: Demonstrate credibility, market leadership position and experience in prospect’s industry Key messages: Aventail customers include many top global companies, in a wide range of industries.
  21. Object of this slide: Give credibility to Aventail’s leadership positioning and reinforce key company differentiators Key messages: Focused on SSL VPNs Aventail concentrates only on SSL VPN solutions Aventail was the pioneer of the SSL VPN, shipping the first product in 1997 Years of analyst recognition as a leading SSL VPN product company Named in the Leader Quadrant in Gartner’s Magic Quadrant report for the fifth time No other SSL VPN vendors can claim the experience at scale we’ve acquired supporting many thousands of users for every major service provider Market validation: leading service providers, customers, technology partners, and channel partners rely on Aventail The only SSL VPN widely adopted by major service providers including MCI, AT&T, IBM, and Sprint Over two million users globally rely on Aventail’s appliances Sales and service operations in 75 countries
  22. Optional slide