OvisGate SSL VPN
October 06, 2004
Licence costs $99.95 for five users; $549.95 for 100; $1,199.95 for 250
- Ease of Use:
- Value for Money:
- Overall Rating:
It is easy to set up and configure and the user interface is largely intuitive.
Documentation is unexceptional.
A simple system suitable for companies looking for inexpensive VPN facilities.
The OvisGate SSL VPN software can be installed on suitable Windows machines to provide SSL VPN connections to many types of client/server systems.
There is a facility to check the serviceability of the installation before configuration, while administration is carried out using a web browser, which gives access to a number of tabbed panes for system configuration. No online help is available, although the OvisGate documentation installed with the software is in HTML and can be read in another browser window, so it is possible to have this available while configuring the system.
The documentation is sufficient, but not comprehensive. It provides examples of the various configuration screens, but no examples of possible deployment scenarios. But the administration interface is easy to use and gave us few problems in practice. We had a working VPN running in minutes and were able to access websites and Terminal Services from clients.
It is possible to restrict administration access to specific ranges of IP addresses while denying it to others, which enables the system to be administered remotely while retaining tight security. A similar facility is available to restrict user IP addresses to certain ranges, providing further security. It is possible to set a maximum file size limit for file uploads, although it applies to all users and cannot be tailored to individual requirements.
Users access the VPN by pointing a Java-enabled web browser at the OvisGate system. Once logged on, a web page shows the services available. All users will see the same web page, giving access to web resources and FTP services, terminal services and network resources.
Another user login screen controls access to networked resources. Each networked machine is still subject to the Windows security system, so users must have access rights to networked resources on individual machines to be able to use them. This allows some resources to be restricted to specific users, while allowing others to be generally available.
SC Webcasts UK
Information Security Manager
Infosec People - Hammersmith, West London
Junior Penetration Tester, Hertfordshire, to £35k + benefits
Infosec People - England, Hertfordshire
Cyber Security Architect
CYBER EXECS - London (Greater)
SOC Analyst, Aldershot, £47-56k + package
Infosec People - Hampshire, England, Aldershot
Senior Security Engineer
Loveworklife Recruitment - United Kingdom
Sign up to our newsletters
SC Magazine UK Articles
- Tesco Bank allegedly ignored warnings of hack from Visa
- Investigatory Powers and Digital Economy Bills could threaten economy
- Updated: A million German routers knocked offline by failed Mirai botnet attack
- Gooligan ad fraud malware infects 1.3M Android users, installs over 2M unwanted apps
- Microsoft update left Azure Linux virtual machines open to hacking
- SC Awards Europe 2016 winners announcements!
- ISIS radicalises 'lone wolves' through strong social media presence
- Updated: How will Brexit affect the cyber-security industry in UK and Europe?
- ICYMI: CEO Sacked; MS Zero-day; Passwords dropped; Ransomware wild, charging hack
- 9.2 million medical records for sale on darkweb
- ICYMI: Tesco warned; IP Bill threatens economy; German routers offline; Azure trojan; Gooligan fraud
- Data centres are on the move - where will they end up?
- 90% of ITDMs believe IAM is crucial to digital transformation success
- Research: Hacked companies could see customer exodus if breached
- Misconfigured drive exposes locations of explosives used by oil industry