NetMotion Mobility and Microsoft DirectAccess Comparison

Similar documents
NetMotion Mobility and Cisco AnyConnect Comparison

Technical Overview of DirectAccess in Windows 7 and Windows Server 2008 R2. Microsoft Windows Family of Operating Systems

1100 Dexter Avenue N Seattle, WA NetMotion Mobility Architecture A Look Under the Hood

IP Mobility vs. Session Mobility

TECHNOLOGY Introduction The Difference Protection at the End Points Security made Simple

ENTERPRISE MOBILITY IN THE INSURANCE INDUSTRY

The Benefits of Wireless Infrastructure Management in the Cloud

MR Cloud Managed Wireless Access Points

High-performance. Enterprise Scale. Global Mobility.

Configuring and Troubleshooting a Windows Server 2008 Network Infrastructure

Transform your network and your customer experience. Introducing SD-WAN Concierge

Vishal Shirodkar Technology Specialist Microsoft India Session Code:

Configuring & Troubleshooting a Windows Server 2008 R2 Network Infrastructure

NetMotion Wireless Get Connected. Stay Connected

Microsoft DirectAccess

Secure Mobility. Klaus Lenssen Senior Business Development Manager Security

Portable Wireless Mesh Networks: Competitive Differentiation

Exam : Title : Security Solutions for Systems Engineers. Version : Demo

Mobility Simplifying, Strengthening, and Streamlining Mobile Security

BYOD: BRING YOUR OWN DEVICE.

RHM Presentation. Maas 360 Mobile device management

Never Drop a Call With TecInfo SIP Proxy White Paper

ENTERPRISE MOBILITY IN THE TELECOMMUNICATIONS

ForeScout Extended Module for MobileIron

TECHNOLOGY LEADER IN GLOBAL REAL-TIME TWO-FACTOR AUTHENTICATION

ipass Open Mobile Overview

Insight Basic and Premium Mobile App and Cloud Portal User Manual

The Device Has Left the Building

Designing Windows Server 2008 Network and Applications Infrastructure

Clients for Unified Communications

GLOBALPROTECT. Key Usage Scenarios and Benefits. Remote Access VPN Provides secure access to internal and cloud-based business applications

Mobility XE: deployment. requirements. Deploying. Security 15% Management. problems.

Wireless LAN Solutions

Transform your network and your customer experience. Introducing SD-WAN Concierge

Cisco Network Admission Control (NAC) Solution

Vendor: Citrix. Exam Code: 1Y Exam Name: Designing Citrix XenDesktop 7.6 Solutions. Version: Demo

Implementing, Managing, and Maintaining a Microsoft Windows Server 2003 Network Infrastructure

Columbitech Mobile VPN

PROTECTED EXTENSIBLE AUTHENTICATION PROTOCOL

Next Level Remote Access

white paper SMS Authentication: 10 Things to Know Before You Buy

User Identity Sources

Overview. Premium Data Sheet. DigitalPersona. DigitalPersona s Composite Authentication transforms the way IT

Copyright 2011 Nomadix, Inc. All Rights Reserved Agoura Road Suite 102 Agoura Hills CA USA White Paper

A Practical Step-by-Step Guide to Managing Cloud Access in your Organization

ipass Open Mobile Overview

This guide provides all of the information necessary to connect to MoFo resources from outside of the office.

SECURE, CENTRALIZED, SIMPLE

Data Sheet. NCP Secure Enterprise macos Client. Next Generation Network Access Technology

MOBILE NETWORK ACCESS CONTROL

Secure IT consumeration (BYOD), users will like you How to make secure access for smart mobile devices

Microsoft Windows Server 2008 R2 Remote Desktop Services Session Virtualization and VDI Microsoft RemoteFX

Cisco AnyConnect Secure Mobility Solution. György Ács Regional Security Consultant

Vendor: Citrix. Exam Code: 1Y Exam Name: Implementing Citrix NetScaler 10.5 for App and Desktop Solutions. Version: Demo

Secure Industrial Automation Remote Access Connectivity. Using ewon and Talk2M Pro solutions

Q-Balancer Range FAQ The Q-Balance LB Series General Sales FAQ

BlackBerry Mobile Voice System

ForeScout Extended Module for VMware AirWatch MDM

Goliath Technology Overview with MEDITECH Module

2011 Cisco and/or its affiliates. All rights reserved. Cisco Public 1

BIG-IP APM: Access Policy Manager v11. David Perodin Field Systems Engineer

Version 12 Highlights:

AT&T Global Network Client for Mac User s Guide Version 1.7.3

Rethink Remote Access

Enhancing Virtual Environments

WIT VoWiFi. Leverage Wi-Fi for voice calling. vowifi.wit-software.com

Vendor: Juniper. Exam Code: JN Exam Name: Junos Pulse Access Control, Specialist (JNCIS-AC) Version: Demo

AT&T Global Network Client for Mac User s Guide Version 2.0.0

Automating VPN Management

Custom Connect. All Area Networks. customer s guide to how it works version 1.0

Cisco ISE Features. Cisco Identity Services Engine Administrator Guide, Release 1.4 1

AMALFI Frequently Asked Questions

90 % of WAN decision makers cite their

Cato Cloud. Software-defined and cloud-based secure enterprise network. Solution Brief

ForeScout Extended Module for MaaS360

Deliver Office 365 Without Compromise

Data Sheet: Endpoint Security Symantec Network Access Control Starter Edition Simplified endpoint enforcement

Service Mesh and Microservices Networking

Opengear Technical Note

Enhancing VMware Horizon View with F5 Solutions

SOLUTION BRIEF Enterprise WAN Agility, Simplicity and Performance with Software-Defined WAN

Frequently Asked Questions Mobile Access Controller

The Changing Role of Wi-Fi Are You Ready for the Wireless. Ron Groulx Empowered Networks

Brocade Virtual Traffic Manager and Parallels Remote Application Server

Course Content of MCSA ( Microsoft Certified Solutions Associate )

Ruckus ZoneDirector 3450 WLAN Controller (up to 500 ZoneFlex Access Points)

The SAP Concur mobile app (Android / iphone / ipad)

Deployment Scenarios Microsoft TMG Standard, TMG Enterprise, TMG Branch Office series Appliances

Mobility Delivering Better: Security, Experience, Communications

ExtremeCloud. Product Overview. Simple, Flexible, and Business Aligned Cloud-Managed Wired and Wireless Networks DATA SHEET HIGHLIGHTS

User Guide. NetScaler Gateway Access

Acceleration Systems Technical Overview. September 2014, v1.4

Alepo, an expert in carrier-class WiFi, offers solutions to bring WiFi calling to the market, regardless of existing network type or business model.

Security for Mobile Instant Messaging

SAS and F5 integration at F5 Networks. Updates for Version 11.6

Making life simpler for remote and mobile workers

TFS WorkstationControl White Paper

Forescout. eyeextend for MobileIron. Configuration Guide. Version 1.9

Optimizing Pulse Secure Access Suite with Pulse Secure Virtual Application Delivery Controller solution

Mobility Optimized Access Layer

Transcription:

Product Comparison and Comparison Guidelines for Comparing and optimizes and secures all traffic to mobile devices across any network, application or operating system. It provides IT with root cause detection of any performance challenges users are facing to significantly reduce mean time to resolution. Our solution delivers an unparalleled mobile user experience, increased operational efficiency and end-user productivity. transforms mobile access for both mobile users and the IT team entrusted to manage and support them. Used by over 3,000 of the world s most respected organizations and over 1,000,000 users worldwide, is the trusted connectivity solution mobile-first organizations depend on every day. This document compares and contrast the business and technical differences between and. Although offers a mobile solution for some remote user environments, organizations that depend on always-on connectivity will find it poorly suited for the needs of their mobile workers and IT support team. Key business-value differentiators of include: Removes the burden for development to mobilize applications. maintains applications through lost connectivity, seamlessly and automatically reconnecting once network coverage is available. End-users experience resilient always-on access to the applications they depend on to do their work with no required reconfiguration or updating of applications for mobile environments., by its architectural design, cannot keep applications alive once mobile users have moved into areas of intermittent or no coverage. Once a network is available, mobile users will be required to re-login and restart crashed applications. Frees your organization from APN architecture and lets you create a best-of-breed network strategy. Providing always-on security, lets users seamlessly roam between Wi-Fi and mobile operator networks removing the need for costly APN architecture. Network design can focus on ensuring users are automatically connected to the best available and most cost-effective network as opposed to requiring ongoing cost and maintenance for a private APN. Reduces monthly data expenses. s compression technology and intelligent use of network bandwidth results in less data usage per user, ultimately driving down data expenses., in comparison, does not feature the link layer optimizations or compression capabilities built natively into. Some organizations, such as a major US airline saw a 30% reduction in data usage following their rollout. Increases productivity by controlling application access. Differing from, is intelligently aware of network conditions and can dynamically determine which applications are accessible based on a wide-array of predetermined conditions such as the user, device, network type, bandwidth, etc. enables IT Administrators to develop strategies for business vs. personal application access allowing mobile users the flexibility of using personal apps during non-working hours or when connected to Wi-Fi networks. For example, using, an IT Administrator may allow the use of BBC iplayer when connected to Wi-Fi during break times, but disallow it when connected to a mobile operator network during work hours. Additionally, when bandwidth becomes poor, non-critical applications or background processes can be paused enabling all available bandwidth used for work-related applications.

Improves the performance quality of the mobile network. s data packet reconstruction capabilities increase the efficiency of available bandwidth. Typical voice or video applications become unusable with 20% or greater packet loss. VOIP calls or video chat become unintelligible reducing the benefit these technologies offer for mobile-first organizations., in comparison to, adds forward error correction technology to intelligently correct and rebuild lost data packets when connected to high latency poor signal strength networks. The result is resilient voice and video connections that continue to be usable with even 40% packet loss. Extends the life of mobile device batteries through intelligent networking. When network conditions are poor and network access intermittent, mobile devices frequently attempt to reconnect, retransmit data acknowledgments and resend application data. These inefficiencies also negatively impact battery life as the device strains to regain and maintain connectivity, reopen applications and retransmit data. Unlike, is designed to manage application access and processes, in doing so, lets organizations define the bandwidth parameters by which specific applications are accessible. As network conditions worsen, frees the device from burdensome processes allowing the battery to be used more efficiently and extending battery life by up to 20% or nearly one additional hour per day (or per charge). Manages roaming capabilities when users travel. When users travel to mainland Europe, they will connect to mobile operator networks which may incur roaming fees and tariffs, adding significant expense for the users organization. Only, is able to maintain policy control over devices regardless of where the user roams ensures that cost-control measures can be in place allowing full access to applications on Wi-Fi, for example, but restricting access when on costly mobile operator networks. Supports all operating systems to ensure solution longevity. As mobile deployments expand and evolve, organizations require the flexibility in choices to ensure they are future-proofing their mobile deployment. A major concern for IT Administrators and users alike is device selection. offers full support for Android, ios, Mac and Windows operating systems enabling multi-platform deployments based on users preferred devices and/or organization mandates., in contrast, offers Windows-only support and as such forces users to only select from one platform for their mobile devices. Ultimately, this lack of flexibility serves as a poor BYOD/CYOD/COPE strategy. Technical Features Comparison Connectivity End-user connectivity-status ease of readability : Connectivity state displayed with a convenient taskbar icon. : Viewing connectivity status involves unintuitive navigation (Windows Settings > Network & Internet > ) Users always understand their connection state without navigation to different page. End-user connectivity troubleshooting : Centralized, native troubleshooting diagnostics tools for client and server. Extensive troubleshooting documentation and 24x7x365 support. : Numerous and complex interdependencies make troubleshooting prohibitively difficult. Lack of comprehensive documentation and cohesive support. Ensures when devices issues occur, they are dealt with quickly with fast resolution to keep mobile workers productive. One centralized troubleshooting console for simplified management over mobile deployment. Streamlined diagnostics testing and reporting to identify device, network, application, firewall, etc., issues within mobile deployment.

Connectivity Seamless roaming (Wi-Fi, mobile operator, wired network) : Transparent, seamless transitions between mobile operator, Wi-Fi and wired networks without user intervention. : Underlying IPsec connections do not support seamless network state transition. Mobile users network and application sessions automatically roam seamlessly and intelligently based on best available network. Users remain connected at all times with always-on access to data and applications. Session Persistence : Persistence through coverage gaps, areas of weak signal strength, or when users suspend their devices. : IPSec connections are unable to maintain network sessions through periods of lost connectivity. Applications survive through lost connections, intermittent coverage and suspend and resume conditions. User applications do not crash, require restart or frequent re logon. s captive portal support ensures the VPN always remains on, maintaining security regardless of the network users connect to. Hotspot Accessibility (Captive Portals) : Automatically checks for captive portal and allows authentication to the portal outside of the Tunnel without additional configuration steps. : If a user fails to log on and navigate a captive portal promptly, connections can be delayed for an extended period of time. s captive portal support ensures the VPN always remains on, maintaining security regardless of the network users connect to.

Security Control User-based Policies : Robust policy options based on device, user, group, time, network type and network conditions. : Very limited, only options available through Group Policy. Custom modification of policies outside of GPOs is not supported. can only apply policies at the device level, user based control is not supported. Policies control user experience on devices allowing or disabling applications and network traffic. Enables enforcement of IT and business-driven requirements to ensure user productivity. Policies can be created based on the over 30 conditions and actions, providing finegrained control over network and resource access. Authentication : Configurable per-device or device group, using most appropriate method for security need, workflow, or form factor; designated authentication method automatically presented to the user. Supports NTLM, RADIUS, PKI x.509 v3 certificates, RSA, etc. : Device authentication using NTLM and Kerberos. User authentication using Kerberos. No support for restricting access based on user. Most configurations require PKImanaged certificates. One-Time Password (OTP) user authentication not supported when force tunneling is enabled. Broad support for industrystandard two-factor authentication options. Increases flexibility in security options based against planned or existing architecture. Network Access Control (NAC) or Network Access Protection (NAP) : Verification that third-party security products are updated and enabled before granting connections; support for the most-used anti-malware and firewall products. : Network Access Protection (NAP) has been deprecated and is no longer supported. Further, does not support integration with any third-party Network Access Control (NAC) solutions. Provides industry-standards based NAC. Ensures device health and enables remote IT remediation of devices prior to corporate network access established.

Management Implementation : Quick Setup Wizard with a basic Small Deployment Server and local users and groups authentication, can be up and running in just a few minutes. : Can be installed quickly using Simplified Deployment, but offers limited flexibility and lacks most common features. Functional in very limited scenarios only. While both products offer setup wizard options, has limited documentation and lacks robust troubleshooting tools making remote support for larger field deployments challenging. Client Management : Device Authentication provides the same functionality to. Clients can be managed regardless of the network connection type, no additional configuration is required. : Devices are always connected to the network even if a user is logged off, much like Device Authentication. clients can only be managed from the internal network when IPv6 is deployed, either natively or with a transition technology such as ISATAP. Reporting & Analytics : Native, centralized management console for management, reporting and analytics of devices and users. : Limited visibility in native logs/reports. Vital source IP address/port information requires manual correlation of additional logs. All network access translated and appears to come from the server. Extremely difficult to identify individual client requests. s centralized console enables the management of all mobile devices and users within the deployment.

Management Load-Balancing : Simplified set up with two or more Servers. No limitation on Server locations. PKI infrastructure not required. : Requires PKI-managed certificates. Process of enabling load balancing is confusing and cumbersome. Native NLB offers limited scalability. Geographic redundancy offers limited flexibility and commonly requires external load balancer to provide reliable results. s centralized console enables the management of all mobile devices and users within the deployment. Client Support : ipad and iphone devices (ios 7.1 and later), Android devices (Android 4.0 or later), Windows Pro Tablets, laptops and other devices running Windows 7, 8 and 1 Support for all major platforms ensures can be leveraged regardless of device selection. : Supports only domain-joined Windows clients running Windows 7 Enterprise/ Ultimate or Windows 8.x/10 Enterprise or Education. No support for Windows 7/8.x/10 Professional, IOS or Android IPv6 : Application traffic is limited to IPv4 support, however IPv6 addresses for client and server is supported. : IPv6 is used exclusively for client to gateway communication. Requires complex IPv6 transition technologies to work over IPv4 networks. Client applications that make calls directly to IPv4 addresses, or use protocols that have IPv4 addresses embedded in them will not work over. +1 866.262.7626 June 2017 2017 Software, Inc. All rights reserved.