Powerful solutions for small- to midsized organizations offer you simple, easy-to-manage mobile and remote access to files, business resources and more.
|Legend: S — Standard O — Optional N — Not Available|
|Deployment||SonicWALL SRA 1600||SonicWALL SRA 4600||SonicWALL SRA Virtual Appliance|
|Deployment Environment Type and Size||Small organizations (Less than 50 employees)||Midsize organizations (With 500 or fewer employees)||Organizations of any size|
|Included/Maximum Number of Concurrent Users*||5/50||25/500||5/50|
|Virtual Assist/Virtual Access Maximum Number Connections||30-day trial/10||30-day trial/25||30-day trial/25|
|Hardware||SonicWALL SRA 1600||SonicWALL SRA 4600||SonicWALL SRA Virtual Appliance|
|Hardened Security Appliance||S||S||N|
|Interfaces||(2) Gigabit Ethernet, (2) USB, (1) Console||(4) Gigabit Ethernet, (2)USB, (1) Console||N|
|Processors||x86 main processor||x86 main processor||N|
|Max Power Consumption||47W||50W||N|
|Total Heat Dissipation||158.0 BTU||171.0 BTU||N|
|Dimensions||17.00 x 10.13 x 1.75 in.||17.00 x 10.13 x 1.75 in.||N|
|Appliance Weight||9.50 lb||9.50 lb||N|
|MTBF||18.3 years||17.8 years||N|
|Features||SonicWALL SRA 1600||SonicWALL SRA 4600||SonicWALL SRA Virtual Appliance|
|Secure Virtual Access*||O||O||O|
|Secure Virtual Assist*||O||O||O|
|Secure Virtual Meeting*||N||O||O|
|Web Application Firewall*||O||O||O|
|Web Application Firewall — Application Profiling||N||O||O|
|Mobile Connect for iOS||S||S||S|
|Mobile Connect for Android™||S||S||S|
|Mobile Connect for Windows 8.1||S||S||S|
|One Time Password (OTP) Authentication||S||S||S|
|Dell Quest Defender Two-factor Authentication||S||S||S|
|Citrix® (ICA) Support||S||S||S|
|NetExtender: Support for Multiple IP Ranges and Routes||S||S||S|
|Optional Client Certificate Support||S||S||S|
|Graphical Usage Monitoring||S||S||S|
|Option to Create System Backup||S||S||S|
|Reverse Proxy: OWA Premium Version and Lotus Domino Access||S||S||S|
|RADIUS Test Function||S||S||S|
|Geolocation Policies and Botnet Filtering||O||O||N|
|Active Directory Groups Support||S||S||S|
|Virtual Host/ Domain Name Support||S||S||S|
|Diagnostics: DNS Lookup and Traceroute||S||S||S|
|Layer-7 Load Balancing||S||S||S|
|High Availability (HA)||S||S||N|
To protect organizational networks from mobile malware and rogue access, the solutions enable administrators to configure security policies that provide best-in-class, context-aware authentication which grants access only to trusted devices and authorized users. Mobile devices are interrogated for essential security information such as jailbreak or root status, device ID, certificate status and OS versions prior to granting access. Laptops and PCs are also interrogated for the presence or absence of security software, client certificates, and device ID. Devices that do not meet policy requirements are not allowed network access and the user is notified of non-compliance. Also, for user authentication, the SRA appliances easily integrate with most back-end authentication systems, such as LDAP, Active Directory and Radius to extend preferred authentication practices to mobile workers. In addition, for increased security, organizations can enable one-time password generation and integrate with other two-factor authentication technologies.
In addition, the solution delivers the first secure access gateway that helps protect company data at rest on mobile devices. Authenticated users can securely browse and view allowed intranet file shares and files from within the Mobile Connect app. Administrators can establish and enforce mobile application management policy for the Mobile Connect app to control whether files viewed can be opened in other apps, copied to the clipboard, printed or cached securely within the Mobile Connect app. This allows administrators to isolate business data from personal data stored on the device and reduces the risk of data loss. In addition, if the user’s credentials are revoked, content stored in the Mobile Connect app is locked and can no longer be accessed or viewed.
Download printable materials to gain insight on how this product can help you simplify IT challenges.
Peruse webcasts and in-person activities near you to explore the technology behind this product.
Get the most from this product as you join your peers and Dell experts to access tools and learn best practices.