Our product should do everything you need. It terminates many encrypted
tunnels and can control which devices, protocols, and/or ports on the
network each user, or group of users, can access. Access controls can
be unique for each user or group.
Check out our Web site http://www.newoak.com for more info, or feel free
to respond to me directly.
>In general, our engineers are being blasted with requests to
>access for people who need access to data inside our firewall, but
>are also folks who cannot be authorized the capability to "browse" the
>net (i.e. competitors who are partnering with us on a specific project,
>foreign nationals, etc.). I am aware of Reverse Proxy, VPN technology,
>etc., but this is all piecemeal, or seems to be. Does anybody have a
>general architecture which they have or are migrating to that they
>be willing to share? New technology isn't coming fast enough to handle
>the need! The problem seems to be especially troublesome on mainframes
>and interactive applications (where the data can't be simply "viewed").
>I don't expect any miracles here - just fishing for ideas...
Michael Feinstein New Oak Communications
VP, Product Marketing 125 Nagog Park
Tel: 978-266-1011 x103 Acton, MA 01720
Fax: 978-266-1080 http://www.newoak.com
com Pager: 800-592-6311