SOPHOS UTM UNLIMITED USERS VIRTUAL,WIRELESS PROTECTION,SUBSCRIPTION RENEWAL,24 MONTHS,26-50
This product is end of life or currently not available.
License | |
License quantity | 50 license(s) |
Software type | Renewal |
License term in months | 24 month(s) |
System requirements | |
Minimum storage drive space | 20000 MB |
Minimum processor | Intel Dual-Core |
Minimum RAM | 1024 MB |
Optical drive required | |
Recommended processor | Intel Quad-Core 2GHz |
Recommended RAM | 2048 MB |
Recommended storage drive space | 40 GB |
EAN | |
Source: Icecat.biz |
Get secure and reliable wireless access all over the office
Simplify your wireless networking by using Sophos UTM as a wireless controller to centralize your Wi-Fi management and security. Our access points are automatically set up and configured by the UTM. That means all your wireless clients get complete threat protection too.
Highlights:
- Centrally controlled wireless from your UTM;
- No local configuration of access points required;
- Complete UTM protection for wireless clients;
- Quick voucher-based guest access customizable with your brand;
- Choose from a range of access-point models;
- Uses high capacity 802.11n for reliable access.
Installs fast with automatic setup and configuration
You can set up multiple wireless Access Points (APs) within minutes. They require no local configuration and will simply find the controller, retrieve their IP address via DHCP, and import the configuration. Devices automatically appear in the UTM interface where you can manually activate them.
Creates reliable mesh networks
Our range of access points support different deployment scenarios. They include the ceiling-mount design AP 30 and the dual-band/dual-radio AP 50. The AP 50 can acts as a repeater and/or bridge to extend coverage to hard to wire areas.
Provides guest Wi-Fi and BYOD access
We give you secure, easy-to-manage guest access out-of-the-box–without extra appliances, licenses or complex configuration. And you can tailor the guest experience to suit your needs. Set bandwidth limits and content filtering as well as customizing the login page and vouchers to strengthen your company brand.
Secure wireless and integrated UTM protection
To prevent unauthorized access we use the most advanced encryption and authentication standards available, including WPA2-Enterprise in combination with IEEE 802.1X (RADIUS authentication). And, our APs forward wireless traffic to the UTM, giving wireless clients the same level of security as if they were physically connected to the LAN. You can also choose to authenticate users based on their credentials from any back end server supported by our UTM for greater flexibility and control.
Estimated delivery: Unknown
Today: 10:00 - 18:00
Estimated delivery: Unknown
Today: 09:00 - 17:00
Estimated delivery: Unknown
Today: 10:00 - 18:00
Estimated delivery: Unknown
Today: 10:00 - 17:00
Estimated delivery: Unknown
Today: 10:00 - 18:00
Estimated delivery: Unknown
Today: 10:00 - 18:00
Estimated delivery: Unknown
Today: 10:00 - 18:00