Microsoft DirectAccess vs Celestix SecureAccess; how do they compare?

Learn more
Microsoft DirectAccess vs. Celestix SecureAccess

Overview

Organizations may wonder whether an appliance provides worthwhile advantages over deploying Microsoft DirectAccess running on a generic Windows Server 201x white box. While Server 201x offers a host of connectivity features including Microsoft DirectAccess; most companies don’t have specialized or in-depth knowledge regarding best configuration practices for the features that are now included. To help IT departments handle an ever-increasing scope of services, reducing complexity while maintaining security is essential to advance organizational goals.

Celestix strives to deliver high value to our customers. Our appliances save installation time, ease configuration tasks and reduce licensing costs. They are hardened for security and undergo extensive; purpose-specific testing. Celestix also adds functionality not available in standard Server 201x deployments. Imminent product releases will provide a wealth of additional features that will continue to return on connectivity investments.

Why Celestix SecureAccess?

Deploying complex connectivity customizations without specific experience or with limited time actually increases organizational risk for information security. The Celestix SecureAccess appliance provides a more secure, cost-efficient deployment option.

DirectAccess vs. SecureAccess

Setup Simplicity

Administrators can configure the IP address, subnet mask, default gateway, and static routes in minutes, without the need for a keyboard, mouse, or monitor. The platform also features a compact appliance form factor, allowing our devices to be mounted in any standard 19” equipment rack. Hardware-integrated disaster recovery is also included.

Centralized Administration

The SecureAccess includes the new Comet 2.0 web user interface (web UI). The web UI centralizes general Windows Server administration and Remote Access (RA) configuration, so administrators can go to one place to customize the deployment. One click installation for several RA features relieves the tedious task of installing features one by one. Administrative efficiency can offset appliance costs by saving IT staff hours.

Tuned Hardware

Our hardware has undergone extensive testing, and minimizes the attack surface by engineering just the services and applications that are necessary for security and connectivity. Hardware is hardened based on expertise gained through years of experience in networking security.

Access Multiplicity

Every organization is different, there is no one size fits all scheme for remote access. The SecureAccess provides for multiple access scenarios and the supporting functions they require. Secure access strategies can include managed/unmanaged devices, application publishing, and facilitation for public and private cloud connectivity.

Expanded Functionality

The SecureAccess improves upon current Server 201x functionality with exclusive features. Reporting, alerting, and monitoring tools all simplify daily management and as a result; compliance requirements. Real-time connection management provides greater control over user access to resources.

Future Ready

Future enhancements can be added through updates to both Remote Access and the Comet platform. Examples include virtualization, SSO enhancements, and forms-based authentication. By allowing organizations to leverage new features, the SecureAccess continues to provide value for the investment.

Celestix SecureAccess and Microsoft DirectAccess Comparison

Celestix SecureAccess

Microsoft DirectAccess

Delivery PlatformPhysical and virtual applianceSoftware
Operating SystemHardened Windows Server 2012 R2/Windows Server 2016Windows Server 2012 R2/Windows Server 2016
Management ToolCelestix Comet Web UIWindows Interface
Web-based interface
Supported clientsAny Windows edition and Mac OSXWindows 7,8,10 Enterprise only
  • Windows 7,8,10 Enterprise
  • Windows 7,8.10 Professional and below
  • Mac OSX
  • iOS
Available in late 2017
Remote Access ‘Kill Switch’
Protocols SupportedDA Transition Protocol along with Traditional protocolDA Transition Protocol along with Traditional protocol
PrerequisitesDomain Join or Non-domain joined for SecureAccessDomain Join
Methods of Authentication supportedDomain Authentication / Radius / CertificateDomain Authentication / Radius / Certificate
Settings deliveryDistributed to the client via Group Policy, SecureAccess Offline or SCCMDistributed to the client via Group Policy
ReportingEnhancedLimited
Device Management
Hardened OS
Support24x7x365 support available. Simplified, Single Tier and streamlined.Limited troubleshooting documentation and phone support. Complex and multi-tiered

REQUEST A DEMO

more blogs