5 Tips for Effective DirectAccess Implementation and Management

  • Post author:
  • Post category:Uncategorized

A successful DirectAccess implementation and management requires careful consideration of many common Microsoft platform technologies as DirectAccess heavily relies on them. These technologies include Active Directory Domain Services (AD DS), Active Directory…

Continue Reading 5 Tips for Effective DirectAccess Implementation and Management

Microsoft DirectAccess – The New Choice of Enterprises over Traditional Virtual Private Network (VPN)

Microsoft DirectAccess is a unique solution designed specifically for managed Windows clients. It is aimed squarely at organizations that need to provide a highly secure remote access alternative to client-based…

Continue Reading Microsoft DirectAccess – The New Choice of Enterprises over Traditional Virtual Private Network (VPN)

Benefits and Use Cases of Deploying Celestix SecureAccess V Series in Virtualized Environments

  • Post author:
  • Post category:Uncategorized

Celestix Networks has been delivering turn-key, ready-to-deploy solutions on its dedicated, purpose-built appliances for nearly two decades. Today, the Celestix SecureAccess E Series is the platform of choice for organizations…

Continue Reading Benefits and Use Cases of Deploying Celestix SecureAccess V Series in Virtualized Environments

VPN or DirectAccess? Why not Both!

  • Post author:
  • Post category:Uncategorized

In my other blog post, I outlined why a DirectAccess solution often can’t completely replace a traditional VPN for secure remote access. As I discussed in that post, DirectAccess is…

Continue Reading VPN or DirectAccess? Why not Both!

Top 5 DirectAccess Implementation Fails

  • Post author:
  • Post category:Uncategorized

At Celestix Networks, we’ve been deploying DirectAccess since the technology was introduced more than 5 years ago. During these years, we’ve learned a lot about deploying DirectAccess in the most…

Continue Reading Top 5 DirectAccess Implementation Fails

Beyond Forefront TMG and UAG: Where Do We Go Now?

  • Post author:
  • Post category:Uncategorized

With the demise of Microsoft’s venerable Forefront Threat Management Gateway (TMG) 2010 and the powerful Forefront Unified Access Gateway (UAG) 2010 platforms, many organizations are looking for viable upgrade alternatives…

Continue Reading Beyond Forefront TMG and UAG: Where Do We Go Now?