DirectAccess on the Microsoft Surface Pro?

DirectAccess on the Microsoft Surface Pro?

UPDATE: Now you can use DirectAccess via Celestix SecureAccess (DirectAccess) Client on Surface Pro. For more information please visit https://www.celestix.com/products/directaccess/celestix-secureaccess/ As...

Extending the value of your TMG infrastructure

Extending the value of your TMG infrastructure

Celestix is committed to supporting Microsoft TMG 2010 until 2023, and can help you to make an orderly and strategic...

Client-Based Remote Access VPN Protocol Overview

Client-Based Remote Access VPN Protocol Overview

Introduction The new Celestix Edge E Series Security solution is a comprehensive remote access platform that includes support for both...

Introducing Web Application Proxy role on Windows Server 2012 R2

Introducing Web Application Proxy role on Windows Server 2012 R2

Web Application Proxy is one of the features in Celestix E Series Appliance. For more information on Web Application Proxy...

Introducing the Celestix Edge E Series Security Solution

Introducing the Celestix Edge E Series Security Solution

Introduction Celestix Networks recently announced availability of our new secure remote access platform, the E Series Cloud Edge Security Solution....

Forefront TMG 2010 Unique Features

Introduction Microsoft Forefront Threat Management Gateway (TMG) 2010 is an integrated edge security solution that can serve as a firewall,...

Integrate Two-Factor Authentication with your cloud services to provide simple and secure access to your apps

As the number of cloud applications grow and continue to gain popularity within the business community by giving both mobile...

Deploying DirectAccess in Virtual Environments

Deploying DirectAccess in Virtual Environments

I’m old enough to remember when virtualization technologies first came on to the scene. Initially they were strictly relegated to...

Planning your Remote Access Strategy

Many years ago, remote access was available only to a privileged few. It was commonly implemented and used by network...

1 4 5 6 7 8