What a WatchGuard  SSL appliance provides for your business: INCREASED PRODUCTIVITY       
■ Remote employees have easy access to essential corporate resources including email, web conferencing, 
and CRM from any web-enabled device. 
■ Optional non-native applications, including SSH and RDP, can be delivered through a remote user’s web 
browser for maximum productivity.  
■ Time-to-value is determined in minutes. Basic con guration enables end users to simply double-click an 
icon and authenticate, and the access client automatically loads, establishing an SSL tunnel for complete 
access to the backend network.  
■  Bi-directional tunneling allows your helpdesk to connect to  a remote employee’s device to troubleshoot 
technical problems or update software.
 EASE OF USE  
■  An all-in-one appliance with con guration wizards and auto-populated default settings. Just plug and 
play – with no other software components to buy, install, or manage.
■  Users log on once and have access to everything in the portal – no need for them to waste time repeatedly 
re-authenticating themselves. 
■ You can have the appliance up and running quickly. Con gure it & forget it, with no thick client to manage.
■  Consolidated auditing collects all information about access, identity, and system events in a central repository 
for quick insight into user and system-based activities. 
 GREATER SECURITY      
■  Comprehensive endpoint integrity checking ensures network protection by allowing organizations 
to con gure and enforce endpoint compliance including checks for anti-virus, anti-spyware,  rewall 
software, and many other device attributes.
■  Session clean up removes all traces of access from the endpoint – including  le deletion and cache 
cleaning – to prevent data leakage through another user’s covert re-entry to network resources.
■   Local and third party authentication support, including strong authentication, ensures only authorized 
users can access the network, keeping intruders out.
 FLEXIBILITY 
■  Client and clientless access – including 32-bit and 64-bit  XP, Vista, and Windows 7 support.
■ Can be used for the simplest  deployment, or IT administrators can take it to the next level by taking advantage 
of  endpoint integrity checking,  optional Java-based application delivery, bi-directional tunneling, and more.
■ Uniquely capable of supporting any class of application. Administrator can choose to publish only web 
applications, create tunnels to network or speci c resources, as well as deliver optional applications to the 
desktop for more sophisticated use.
■  IT administrators can integrate solution with existing third-party authentication solution, such as Microsoft 
Active Directory, or rely on onboard LDAP server to con gure local authentication, as well as use built-in 
two-factor authentication including SMS-based tokens and web keypad for identity validation.
■  Information in audit logs can be shown in multiple graphical formats for current & historical reporting, 
and exported to third-party utilities, such as Excel or Crystal Reports, for further data mining and asset 
management.