SlideShare a Scribd company logo
May 2013
SonicPoint Wireless Solution &
Secure Remote Access solutions
2 SonicWALLConfidential
Dell SonicWALL product line-up
services via appliance
Network security
Secure Virtual
Access
Web App
Firewall
Connect
Mobile
Spike
Access
Secure Virtual
Assist
Advanced
Reporting
Native Access
Modules
Clean wireless – SonicPoint-N Series
App Intell &
C ontrol
GAV/ASW/
IPS
C ASS Enforced
Anti- Virus
C ontent
Filtering
Global VPN
C lient
SSL VPN
C lient
Virtual
Assist
Email
Protection
Email
Anti- Virus
Email
C ompliance
Site- to- Site
Backup
Offsite
Backup
Universal System
Recovery
GMS Analyzer Scrutinizer
Mobile
C onnect
Mobile
C onnect
EPC
Local
Archiving
Recovery Manager
for Exchange
WAN acceleration
Secure remote access
Email security
Backup and recovery
Policy & management
Secure Virtual
Meeting
Hosted
3 SonicWALLConfidential
Clean wireless key requirements
• Legacy WiFi (b/g)
• Pure- N WiFi
Expanded use of
wireless- N
networks
• Manage user bandwidth
• Prioritize productive applications
• PCI rogue access requirements
• Application identification and control for wireless traffic
• Deployment and ongoing access point management
Bandwidth
management
Building air- tight
wireless access
Centralized
management of
the wireless
network
Handling of new
applications • Examples include VoIP and video
4 SonicWALLConfidential
The solution
• High performance “N” connectivity
– Act as a replacement for wired connectivity, offers a secure,
mobile work environment
– Extended range for greater wireless coverage
• Fully integrated “C lean Wireless”
– NGFW - application identification, bandwidth, and policy enforcement
– Provides threat detection and prevention scanning for all wireless traffic
– FairNet
• Simplified deployment and lowered TC O
– Centralized management and auto- provision to remove the
complexity of high speed secure wireless
– Guest Service
• Flexible wireless client support
– Support for 802.11 a/b/g/n wireless clients (2.4/5GHz)
5 SonicWALLConfidential
Dell SonicWALL wireless solution
SonicPoint-N
Series
“n”
“n”
“n”
“n”
“n”
“n”“g”
“n”
“n”
“g”
“n”
“g”
“g”
Comprehensive
Gateway
Security Suite
PoE
Switches
Clean Wireless Clients (WPA2)
Internet
6 SonicWALLConfidential
Rouge access point detection
IDP / Malware scanning
WPA2 encryption
Application control
Auto provision
Dell SonicWALL Clean Wireless
• Clean wireless
– Beyond encryption,
provides threat detection
and prevention scanning
for all wireless traffic
• High performance “N”
connectivity
– Acts as a replacement for
wired connectivity, with
speed and extended range
• Simplified deployment
and lowered TCO
– Centralized management
and auto- provisioning to
remove the complexity of
high speed secure wireless
Policy
management
Clean wireless delivers breakthrough threat inspection technology, is auto provisioned
and managed, and integrates security policy across wired and wireless networks
7 SonicWALLConfidential
Clean wireless protection
• Deep packet inspection scanning of wireless traffic
– Combat the latest threats and vulnerabilities
– Application identification and policy enforcement
• Centralized policy and management over wireless
– Centralized policy enforcement
– User management
• Centralized access point management
– Ease of initial deployment and ongoing management
• Performance and predictability
– Greater wireless performance
– Better predictability using 802.11n technology
8 SonicWALLConfidential
Dell SonicWALL Clean Wireless
SonicPoint- N Series
SonicPoint-N Dual-Radio
6 External Antennas
POE+ & AC Adapter
8 SSID (VAP)
SonicPoint-Ne
Dual-Band
3 External Antennas
POE & AC Adapter
8 SSID (VAP)
SonicPoint- Ni
Dual- Band
Internal Antennas
POE Only
8 SSID (VAP)
9 SonicWALLConfidential
Dell SonicWALL Clean Wireless
Appliance Model Max. SonicPoints Supported
TZ 105 / TZ 105w 1
TZ 205 / TZ 205w 2
TZ 215 / TZ 215w 16
NSA 220 16
NSA 250M 16
NSA 2400 32
NSA 2600 32
NSA 3600 48
NSA 4600 64
NSA 5600 96
NSA 6600 96
NSA E5500 96
NSA E6500 128
NSA E8500 128
SuperMassive 9200 128
SuperMassive 9400 128
SuperMassive 9600 128
10 SonicWALLConfidential
Secure Remote
Access
11 SonicWALLConfidential
Key drivers
• Remote access
– Give all employees access solution that is easy to use and deploy
• Extranet access
– Open access to increase collaboration, yet do it in such a way that
access control and security is not compromised
• Mobility (BYOD)
– Mobile devices are increasingly functional for both data and voice,
leading to a rise of IT managed (non- managed) mobile devices
• Securing wireless networks Many organizations treat users on the
wireless network as remote users because of concerns over access to the
wireless network
• Disaster recovery
– During a business disruption, demand for remote access could spike to
include the majority of the workforce
12 SonicWALLConfidential
• Identify the user
• Interrogate the endpoint device
• Control and limit access to application resources
• Web- based access from any web- enabled device
• Email for smartphones and tablets through ActiveSync
• Network level access for Windows, Mac, Linux, Android and iOS
• Native access modules for RDP, Citrix and VMware View
• Unified policy interface to decrease ongoing access management
• Spike licensing for temporary license needs
• Broad OS support
Granular access
control
Flexible
connectivity
Manageability
Secure Remote Access requirements
13 SonicWALLConfidential
The need for Secure Remote Access
• Who is the user?
– Proof as to who the user is without question, based on a strong
authentication method
• What’s happening on the endpoint?
– A clear understanding of what is happening on the user’s end point to
make a policy decision, then classify that device accordingly
• What are the resources the user is seeking?
– Knowledge of what applications the user wants access to, and then grant
access according to policy
14 SonicWALLConfidential
The Dell SonicWALL approach to Secure
Remote Access
Business Partner
from any Browser
Customer/Supplier
Behind a Firewall
Extranet Access
Internal Users
Internal Access
Dell SonicWALL SSL
VPN SolutionTraveling
Employee
Day
Extender
Employee
at a
Kiosk
Employee
Using a
Wireless
Hotspot
Remote Access
Employee
Smart
Phones/
Tablets
Protect applications with
granular access control based
on user identity and device
integrity
Detect what is running on
the end point device
Connect users securely and
easily to applications on any
device
Connect
Web Apps
Client/Server Apps
File Shares
Databases
VoIP
VDI Infrastructure
ApplicationsDirectories
Corporate Perimeter
LDAP
AD
RADIUS
LDAP
Detect Protect Connect
15 SonicWALLConfidential
Detect: Endpoint control device
interrogation
Connect access
(Client- installed access)
Traditional
client/server
applications
File
shares
VoIP
applications
End point control
2 1
33
WorkPlace access
(Clientless web access)
3
Device identity
• Mapped directory
• Domain membership
• Watermark/certificate
• Any resident file
• Device ID
Device integrity
• Anti- virus
• Registry key
• Windows O/S level
• Personal firewall
• Anti- spyware
• J ailbroken/rooted
Device profile
• Android
• iOS
• Windows
• Windows mobile
• Macintosh
• Linux
With data security
• Cache control
• Secure desktop
16 SonicWALLConfidential
Protect: Unified policy
Admission control
• Define trust level for users
• Define trust level for devices
Create allow, deny and quarantine
rules easily that govern access for all
users and devices based on device
identity and device integrity.
Deny
AllowQuarantineDeny Allow
Employee
community
Groups: Sales,
marketing, executive
Partner
community
Groups: Partners
Access control
J ust one rule set enforces access to all
resources across all access methods
based on who the user is and the trust
level for the device.
• Define what applications
users/devices can access
CRM app.
Allowed groups:
Sales, marketing Deny
Order entry
Allowed groups:
Sales, partners Deny
17
C onfidential Dell Mobility Solutions
Dell - Internal Use - Confidential - Privileged
WorkPlace access: Access to web- based and client/
server applications from virtually any device.
WorkPlace Portal
Easy-to-use clientless browser based access
19
C onfidential Dell Mobility Solutions
Dell - Internal Use - Confidential - Privileged
Simple, policy-enforced mobile access to
mission-critical data and applications
Mobile Connect app
• Intuitive app for iOS, Android, and Windows 8.1
• Download for free from the Apple app store
and Google play, embedded with Windows 8.1
devices
• Easy access to allowed web, client/server,
hosted, virtual desktop resources via one- click
bookmarks
• Complete “in- office” experience, layer 3 tunnel
enables network access to resources including
terminal services, Citrix, custom/advanced web
apps, VoIP
20
C onfidential Dell Mobility Solutions
Dell - Internal Use - Confidential - Privileged
Device interrogation for iOS/Android devices
For iOS
• Determine jailbreak status
• DeviceID (Based on the UDID of the
iOS device)
• Certificate enforcement
• OS version control
For Android
• Determine root status
• DeviceID (Based on the IMEI of the
Android device)
• Certificate enforcement
• OS version control
• Enforcement of anti- virus
21
C onfidential Dell Mobility Solutions
Dell - Internal Use - Confidential - Privileged
Protect from mobile threats
• Protect in- flight data from interception with encrypted SSL VPN connections
• Allow access by only authenticated users and trusted devices and only to
permitted resources with granular network access control policies
• Block malware and threats from entering your network when deployed with a
Dell next- gen firewall to scan mobile traffic
Dell SonicWALL SSL
VPN Solution
Web Apps
C lient/Server Apps
File Shares
Databases
VoIP
VDI Infrastructure
ApplicationsDirectories
Corporate Perimeter
LDAP
AD
RADIUS
LDAP
22
C onfidential Dell Mobility Solutions
Dell - Internal Use - Confidential - Privileged
Enable efficient administration with centralized
access policy management
Object- based policy management enables application control via easy to setup and
manage access rules, covering all device types and users.
Define Trust Level for
Users
Your Company
Employee
Community
Define Trust Level for
Devices
Groups: Sales,
Marketing, Executive
Partner
Community
Groups: Partners
Allow
Quarantine
Deny
Allow
Quarantine
Deny
• Create allow, deny and
quarantine rules easily
that govern access for all
users and devices based
on device identity and
device integrity
• J ust one rule set
enforces access to all
resources across all
access methods based
on who the user is and
the trust level for the
device
Application:
User Trust:
Device Trust:
Sales,
Executive
Define What
Applications
Users/Devices
can Access
Access Control List
CRM App
All in Empl.
Community
OWA
Sales,
Partners
Order Entry
AdmissionControl
23 SonicWALLConfidential
E- Class
Secure
Remote
Access
Series
Secure
Remote
Access
Series
Dell SonicWALL Secure Remote Access
SRA EX7000 SRA EX6000 Virtual ApplianceSRA EX9000
Detect –
granular end-
point control
detects identity
and security
state
Protect –
unified policy
limits user
access to
authorized
applications
only
Connect –
smart access
and tunneling
ensure easy,
secure access
to all network
resources
Secure remote access for all users, devices and applications
Spike
License
Secure Virtual
Assist
Advanced
Reporting
Native Access
Modules
Mobile
Connect
End Point
Control
SRA 1200 Virtual ApplianceSRA 4200
Secure Virtual
Access
Web App
Firewall
Secure Virtual
Assist
Spike LicenseMobile
Connect
End Point
Control
Secure Virtual
Meeting
24
C onfidential Dell Mobility Solutions
Dell - Internal Use - Confidential - Privileged
Dell SonicWALL SMB SRA Series Appliances
SRA 1600 SRA 4600 SRA VMA
Target Customer
SMB companies with up to 50
employees
Mid- enterprise companies with up
to 500 employees
SMB companies with up to
50 employees
Concurrent Users
Stackable user license options
include 5 or 10 concurrent users
Stackable user license options
include 10, 25 and 100 concurrent
users
Stackable user license
options include 5, 10 and 25
concurrent users
Additional Features Application Offload, Bookmarks
Bookmarks, Application Offload,
High Availability
Application Offload,
Bookmarks, Easy to deploy
NetExtender &
Mobile Connect
Windows, Mac OS, Linux, Android, iOS
Add-on (Paid)
Services
(Remote Support, Web
Application Security, etc.)
• Secure Virtual Assist – Remote desktop help and support tool
• Secure Virtual Access – Provides remote PC management and control
• Secure Virtual Meeting – For instant, cost- effective collaboration
• Web Application Firewall – Detects and protects web applications from web- based threats. Helps in
achieving PCI compliance (section 6.6 of PCI DSS 1.2).
• Spike Licensing – Increase the licensed user count for short usage spikes
• Dynamic Support – Options include 8x5 or 24x7 for one, two or three years
Single
Bundle
25
C onfidential Dell Mobility Solutions
Dell - Internal Use - Confidential - Privileged
Dell SonicWALL Product Overview
E-Class SRA EX7000 E-Class SRA EX9000
Target Customer Large Enterprise with over 1,000 employees Large Enterprise with over 1,000 employees
Concurrent Users Can be licensed with a 50, 100, 250, 500, 1,000,
2,000 and 5,000 concurrent user license
Can be licensed with a 100, 250, 500, 1,000,
2,000 and 5,000, 7,500, 10,000, 12,500, 15,000,
20,000 concurrent user license
Add-On Features • Spike License- Allows for the immediate
increase of the remote user count in the event
of a business disruption
• Virtual Assist- Remote desktop help and
support tool
• SonicWALL Aventail Advanced Reporting-
robust hierarchical log analysis tool
• E-Class Support- 24x7 support for E- Class
solutions
• Spike License- Allows for the immediate
increase of the remote user count in the event
of a business disruption
• Virtual Assist- Remote desktop help and
support tool
• FIPSSupport- License required for FIPS mode
• SonicWALL Aventail Advanced Reporting-
robust hierarchical log analysis tool
• E-Class Support- 24x7 support for E- Class
solutions
26
C onfidential Dell Mobility Solutions
Dell - Internal Use - Confidential - Privileged
Dell SonicWALL Product Overview
E-Class Virtual Appliance E-Class SRA EX6000
Target Customer Mid-size Enterprise with up to 5,000 employees Midsize Enterprise with 500 to 1,000 employees
Concurrent Users Can be licensed with a 25, 50, 100, 250, 500, 1,000,
2,000 or 5,000 concurrent user license
Can be licensed with a 25, 50, 100 or 250 concurrent
user license
Add-On Features • Spike License- Allows for the immediate increase of
the remote user count in the event of a business
disruption
• Native Access Modules- Optimized access for WTS,
VMware View and Citrix applications
• Advanced EPC- Granular control with easy
configuration for trusting end point devices
• Virtual Assist- Remote desktop help and support tool
• SonicWALL Aventail Advanced Reporting- robust
hierarchical log analysis tool
• E-Class Support- 24x7 support for E- Class solutions
• Spike License- Allows for the immediate increase of
the remote user count in the event of a business
disruption
• Native Access Modules- Optimized access for WTS,
VMware View and Citrix applications
• Advanced EPC- Granular control with easy
configuration for trusting end point devices
• Virtual Assist- Remote desktop help and support tool
• FIPSSupport- License required for FIPS mode
• SonicWALL Aventail Advanced Reporting- robust
hierarchical log analysis tool
• E-Class Support- 24x7 support for E- Class solutions

More Related Content

Sonicwall wireless & sra

  • 1. May 2013 SonicPoint Wireless Solution & Secure Remote Access solutions
  • 2. 2 SonicWALLConfidential Dell SonicWALL product line-up services via appliance Network security Secure Virtual Access Web App Firewall Connect Mobile Spike Access Secure Virtual Assist Advanced Reporting Native Access Modules Clean wireless – SonicPoint-N Series App Intell & C ontrol GAV/ASW/ IPS C ASS Enforced Anti- Virus C ontent Filtering Global VPN C lient SSL VPN C lient Virtual Assist Email Protection Email Anti- Virus Email C ompliance Site- to- Site Backup Offsite Backup Universal System Recovery GMS Analyzer Scrutinizer Mobile C onnect Mobile C onnect EPC Local Archiving Recovery Manager for Exchange WAN acceleration Secure remote access Email security Backup and recovery Policy & management Secure Virtual Meeting Hosted
  • 3. 3 SonicWALLConfidential Clean wireless key requirements • Legacy WiFi (b/g) • Pure- N WiFi Expanded use of wireless- N networks • Manage user bandwidth • Prioritize productive applications • PCI rogue access requirements • Application identification and control for wireless traffic • Deployment and ongoing access point management Bandwidth management Building air- tight wireless access Centralized management of the wireless network Handling of new applications • Examples include VoIP and video
  • 4. 4 SonicWALLConfidential The solution • High performance “N” connectivity – Act as a replacement for wired connectivity, offers a secure, mobile work environment – Extended range for greater wireless coverage • Fully integrated “C lean Wireless” – NGFW - application identification, bandwidth, and policy enforcement – Provides threat detection and prevention scanning for all wireless traffic – FairNet • Simplified deployment and lowered TC O – Centralized management and auto- provision to remove the complexity of high speed secure wireless – Guest Service • Flexible wireless client support – Support for 802.11 a/b/g/n wireless clients (2.4/5GHz)
  • 5. 5 SonicWALLConfidential Dell SonicWALL wireless solution SonicPoint-N Series “n” “n” “n” “n” “n” “n”“g” “n” “n” “g” “n” “g” “g” Comprehensive Gateway Security Suite PoE Switches Clean Wireless Clients (WPA2) Internet
  • 6. 6 SonicWALLConfidential Rouge access point detection IDP / Malware scanning WPA2 encryption Application control Auto provision Dell SonicWALL Clean Wireless • Clean wireless – Beyond encryption, provides threat detection and prevention scanning for all wireless traffic • High performance “N” connectivity – Acts as a replacement for wired connectivity, with speed and extended range • Simplified deployment and lowered TCO – Centralized management and auto- provisioning to remove the complexity of high speed secure wireless Policy management Clean wireless delivers breakthrough threat inspection technology, is auto provisioned and managed, and integrates security policy across wired and wireless networks
  • 7. 7 SonicWALLConfidential Clean wireless protection • Deep packet inspection scanning of wireless traffic – Combat the latest threats and vulnerabilities – Application identification and policy enforcement • Centralized policy and management over wireless – Centralized policy enforcement – User management • Centralized access point management – Ease of initial deployment and ongoing management • Performance and predictability – Greater wireless performance – Better predictability using 802.11n technology
  • 8. 8 SonicWALLConfidential Dell SonicWALL Clean Wireless SonicPoint- N Series SonicPoint-N Dual-Radio 6 External Antennas POE+ & AC Adapter 8 SSID (VAP) SonicPoint-Ne Dual-Band 3 External Antennas POE & AC Adapter 8 SSID (VAP) SonicPoint- Ni Dual- Band Internal Antennas POE Only 8 SSID (VAP)
  • 9. 9 SonicWALLConfidential Dell SonicWALL Clean Wireless Appliance Model Max. SonicPoints Supported TZ 105 / TZ 105w 1 TZ 205 / TZ 205w 2 TZ 215 / TZ 215w 16 NSA 220 16 NSA 250M 16 NSA 2400 32 NSA 2600 32 NSA 3600 48 NSA 4600 64 NSA 5600 96 NSA 6600 96 NSA E5500 96 NSA E6500 128 NSA E8500 128 SuperMassive 9200 128 SuperMassive 9400 128 SuperMassive 9600 128
  • 11. 11 SonicWALLConfidential Key drivers • Remote access – Give all employees access solution that is easy to use and deploy • Extranet access – Open access to increase collaboration, yet do it in such a way that access control and security is not compromised • Mobility (BYOD) – Mobile devices are increasingly functional for both data and voice, leading to a rise of IT managed (non- managed) mobile devices • Securing wireless networks Many organizations treat users on the wireless network as remote users because of concerns over access to the wireless network • Disaster recovery – During a business disruption, demand for remote access could spike to include the majority of the workforce
  • 12. 12 SonicWALLConfidential • Identify the user • Interrogate the endpoint device • Control and limit access to application resources • Web- based access from any web- enabled device • Email for smartphones and tablets through ActiveSync • Network level access for Windows, Mac, Linux, Android and iOS • Native access modules for RDP, Citrix and VMware View • Unified policy interface to decrease ongoing access management • Spike licensing for temporary license needs • Broad OS support Granular access control Flexible connectivity Manageability Secure Remote Access requirements
  • 13. 13 SonicWALLConfidential The need for Secure Remote Access • Who is the user? – Proof as to who the user is without question, based on a strong authentication method • What’s happening on the endpoint? – A clear understanding of what is happening on the user’s end point to make a policy decision, then classify that device accordingly • What are the resources the user is seeking? – Knowledge of what applications the user wants access to, and then grant access according to policy
  • 14. 14 SonicWALLConfidential The Dell SonicWALL approach to Secure Remote Access Business Partner from any Browser Customer/Supplier Behind a Firewall Extranet Access Internal Users Internal Access Dell SonicWALL SSL VPN SolutionTraveling Employee Day Extender Employee at a Kiosk Employee Using a Wireless Hotspot Remote Access Employee Smart Phones/ Tablets Protect applications with granular access control based on user identity and device integrity Detect what is running on the end point device Connect users securely and easily to applications on any device Connect Web Apps Client/Server Apps File Shares Databases VoIP VDI Infrastructure ApplicationsDirectories Corporate Perimeter LDAP AD RADIUS LDAP Detect Protect Connect
  • 15. 15 SonicWALLConfidential Detect: Endpoint control device interrogation Connect access (Client- installed access) Traditional client/server applications File shares VoIP applications End point control 2 1 33 WorkPlace access (Clientless web access) 3 Device identity • Mapped directory • Domain membership • Watermark/certificate • Any resident file • Device ID Device integrity • Anti- virus • Registry key • Windows O/S level • Personal firewall • Anti- spyware • J ailbroken/rooted Device profile • Android • iOS • Windows • Windows mobile • Macintosh • Linux With data security • Cache control • Secure desktop
  • 16. 16 SonicWALLConfidential Protect: Unified policy Admission control • Define trust level for users • Define trust level for devices Create allow, deny and quarantine rules easily that govern access for all users and devices based on device identity and device integrity. Deny AllowQuarantineDeny Allow Employee community Groups: Sales, marketing, executive Partner community Groups: Partners Access control J ust one rule set enforces access to all resources across all access methods based on who the user is and the trust level for the device. • Define what applications users/devices can access CRM app. Allowed groups: Sales, marketing Deny Order entry Allowed groups: Sales, partners Deny
  • 17. 17 C onfidential Dell Mobility Solutions Dell - Internal Use - Confidential - Privileged WorkPlace access: Access to web- based and client/ server applications from virtually any device. WorkPlace Portal Easy-to-use clientless browser based access
  • 18. 19 C onfidential Dell Mobility Solutions Dell - Internal Use - Confidential - Privileged Simple, policy-enforced mobile access to mission-critical data and applications Mobile Connect app • Intuitive app for iOS, Android, and Windows 8.1 • Download for free from the Apple app store and Google play, embedded with Windows 8.1 devices • Easy access to allowed web, client/server, hosted, virtual desktop resources via one- click bookmarks • Complete “in- office” experience, layer 3 tunnel enables network access to resources including terminal services, Citrix, custom/advanced web apps, VoIP
  • 19. 20 C onfidential Dell Mobility Solutions Dell - Internal Use - Confidential - Privileged Device interrogation for iOS/Android devices For iOS • Determine jailbreak status • DeviceID (Based on the UDID of the iOS device) • Certificate enforcement • OS version control For Android • Determine root status • DeviceID (Based on the IMEI of the Android device) • Certificate enforcement • OS version control • Enforcement of anti- virus
  • 20. 21 C onfidential Dell Mobility Solutions Dell - Internal Use - Confidential - Privileged Protect from mobile threats • Protect in- flight data from interception with encrypted SSL VPN connections • Allow access by only authenticated users and trusted devices and only to permitted resources with granular network access control policies • Block malware and threats from entering your network when deployed with a Dell next- gen firewall to scan mobile traffic Dell SonicWALL SSL VPN Solution Web Apps C lient/Server Apps File Shares Databases VoIP VDI Infrastructure ApplicationsDirectories Corporate Perimeter LDAP AD RADIUS LDAP
  • 21. 22 C onfidential Dell Mobility Solutions Dell - Internal Use - Confidential - Privileged Enable efficient administration with centralized access policy management Object- based policy management enables application control via easy to setup and manage access rules, covering all device types and users. Define Trust Level for Users Your Company Employee Community Define Trust Level for Devices Groups: Sales, Marketing, Executive Partner Community Groups: Partners Allow Quarantine Deny Allow Quarantine Deny • Create allow, deny and quarantine rules easily that govern access for all users and devices based on device identity and device integrity • J ust one rule set enforces access to all resources across all access methods based on who the user is and the trust level for the device Application: User Trust: Device Trust: Sales, Executive Define What Applications Users/Devices can Access Access Control List CRM App All in Empl. Community OWA Sales, Partners Order Entry AdmissionControl
  • 22. 23 SonicWALLConfidential E- Class Secure Remote Access Series Secure Remote Access Series Dell SonicWALL Secure Remote Access SRA EX7000 SRA EX6000 Virtual ApplianceSRA EX9000 Detect – granular end- point control detects identity and security state Protect – unified policy limits user access to authorized applications only Connect – smart access and tunneling ensure easy, secure access to all network resources Secure remote access for all users, devices and applications Spike License Secure Virtual Assist Advanced Reporting Native Access Modules Mobile Connect End Point Control SRA 1200 Virtual ApplianceSRA 4200 Secure Virtual Access Web App Firewall Secure Virtual Assist Spike LicenseMobile Connect End Point Control Secure Virtual Meeting
  • 23. 24 C onfidential Dell Mobility Solutions Dell - Internal Use - Confidential - Privileged Dell SonicWALL SMB SRA Series Appliances SRA 1600 SRA 4600 SRA VMA Target Customer SMB companies with up to 50 employees Mid- enterprise companies with up to 500 employees SMB companies with up to 50 employees Concurrent Users Stackable user license options include 5 or 10 concurrent users Stackable user license options include 10, 25 and 100 concurrent users Stackable user license options include 5, 10 and 25 concurrent users Additional Features Application Offload, Bookmarks Bookmarks, Application Offload, High Availability Application Offload, Bookmarks, Easy to deploy NetExtender & Mobile Connect Windows, Mac OS, Linux, Android, iOS Add-on (Paid) Services (Remote Support, Web Application Security, etc.) • Secure Virtual Assist – Remote desktop help and support tool • Secure Virtual Access – Provides remote PC management and control • Secure Virtual Meeting – For instant, cost- effective collaboration • Web Application Firewall – Detects and protects web applications from web- based threats. Helps in achieving PCI compliance (section 6.6 of PCI DSS 1.2). • Spike Licensing – Increase the licensed user count for short usage spikes • Dynamic Support – Options include 8x5 or 24x7 for one, two or three years Single Bundle
  • 24. 25 C onfidential Dell Mobility Solutions Dell - Internal Use - Confidential - Privileged Dell SonicWALL Product Overview E-Class SRA EX7000 E-Class SRA EX9000 Target Customer Large Enterprise with over 1,000 employees Large Enterprise with over 1,000 employees Concurrent Users Can be licensed with a 50, 100, 250, 500, 1,000, 2,000 and 5,000 concurrent user license Can be licensed with a 100, 250, 500, 1,000, 2,000 and 5,000, 7,500, 10,000, 12,500, 15,000, 20,000 concurrent user license Add-On Features • Spike License- Allows for the immediate increase of the remote user count in the event of a business disruption • Virtual Assist- Remote desktop help and support tool • SonicWALL Aventail Advanced Reporting- robust hierarchical log analysis tool • E-Class Support- 24x7 support for E- Class solutions • Spike License- Allows for the immediate increase of the remote user count in the event of a business disruption • Virtual Assist- Remote desktop help and support tool • FIPSSupport- License required for FIPS mode • SonicWALL Aventail Advanced Reporting- robust hierarchical log analysis tool • E-Class Support- 24x7 support for E- Class solutions
  • 25. 26 C onfidential Dell Mobility Solutions Dell - Internal Use - Confidential - Privileged Dell SonicWALL Product Overview E-Class Virtual Appliance E-Class SRA EX6000 Target Customer Mid-size Enterprise with up to 5,000 employees Midsize Enterprise with 500 to 1,000 employees Concurrent Users Can be licensed with a 25, 50, 100, 250, 500, 1,000, 2,000 or 5,000 concurrent user license Can be licensed with a 25, 50, 100 or 250 concurrent user license Add-On Features • Spike License- Allows for the immediate increase of the remote user count in the event of a business disruption • Native Access Modules- Optimized access for WTS, VMware View and Citrix applications • Advanced EPC- Granular control with easy configuration for trusting end point devices • Virtual Assist- Remote desktop help and support tool • SonicWALL Aventail Advanced Reporting- robust hierarchical log analysis tool • E-Class Support- 24x7 support for E- Class solutions • Spike License- Allows for the immediate increase of the remote user count in the event of a business disruption • Native Access Modules- Optimized access for WTS, VMware View and Citrix applications • Advanced EPC- Granular control with easy configuration for trusting end point devices • Virtual Assist- Remote desktop help and support tool • FIPSSupport- License required for FIPS mode • SonicWALL Aventail Advanced Reporting- robust hierarchical log analysis tool • E-Class Support- 24x7 support for E- Class solutions