Strona Producenta


Dokumenty produktowe

Opis produktu



AG Series secure access gateways provide scalable and  controlled remote and mobile access to corporate networks, enterprise applications and cloud services for any user,  anywhere on any device.

Powered by Array’s 64-bit SpeedCore™ architecture, AG Series secure access gateways are the ideal choice for enterprises and service providers seeking scalable and flexible secure access engineered to support nextgeneration mobile and cloud computing environments. Available as high-performance appliances that feature the latest in acceleration technologies and energy-efficient components or as virtual appliances that enable flexible pay-as-you-go business models, AG Series appliances are unmatched in their ability to provide remote and mobile access to large and diverse communities of interest without compromising security or the end-user experience. This solution is also available as a Virtual Machine.

Highlights & Benefits

  • Anytime, anywhere browser-based secure remote access, enables increased productivity for employees, partners, tenants, customers, contractors and guests
  • Simple, scalable and secure remote desktop that enables use of PCs and virtual desktops from any device in any location
  • Secure mobile access for individual native and Web applications for supporting Bring Your Own Device (BYOD) or secure access from managed smart phones and tablets
  • Hardware appliances supporting up to 3 Gbps throughput, 128,000 concurrent users and 500,000 user profiles for maintaining security and driving productivity at scale
  • Virtual appliances with non-disruptive upgrades up to 10,000 concurrent users and up to 500 Mbps throughput
  • 256 secure access portals, customizable to the security and usability preferences of multiple tenants and communities of interest
  • Range of access methods including Web, Layer-3, thin-client and client-server connectivity
  • SSL encryption for data in transit
  • Supports a range of AAA and dual-factor authentication schemes
  • Endpoint security including device-based identification, host-checking, cache cleaning and adaptive policies
  • Per-user policy engine for identity-based access to URLs, files, networks and applications
  • Cross-platform support for a range of operating systems and browsers
  • Array Business Continuity (ABC) contingency licenses for affordably supporting surge remote access
  • N+1 clustering and redundant power for business-critical application environments requiring 24/7 uptime
  • Compact 1RU and 2RU form factors for environments where space is at a premium
  • Familiar CLI,  intuitive WebUI and centralized management for ease of use and configuration