Network Computing is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

E-Gap Remote Access Appliance

Control the Endpoint

After you set policies to limit which computers are allowed access to e-Gap, the appliance enforces those policies, checking compliance for each client computer. Policies may include the required use of specific security applications--for example, antivirus products from vendors such as Network Associates, Symantec and Trend Micro, or desktop firewalls including those from Sygate, Symantec and Zone Labs. If what you use isn't on the list of recognized products, you can ask Whale to define the application--reps told me it takes less than a week.




E-Gap Remote Access Appliance




click to enlarge

The product's application-detection feature can determine whether a product is running, which version it is and when it was last updated. You can also direct e-Gap to look for digital certificates on the client and the Attachment Wiper--an ActiveX component that clears the browser and other caches of temporary files. The Attachment Wiper, policy-compliance checker and SSL VPN client are all downloaded when the user connects to e-Gap.

I wanted to create an access policy that would let remote users request a digital certificate from our Microsoft Certificate Server. I went into e-Gap's policy editor and, using simple Boolean logic, configured the appliance to make sure the user's computer didn't have a known digital certificate, the Attachment Wiper was operating, and valid antivirus software was running.

  • 1