Get secure and reliable wireless access all over the office\nSimplify your wireless networking by using Sophos UTM as a wireless controller to centralize your Wi-Fi management and security. Our access points are automatically set up and configured by the UTM. That means all your wireless clients get complete threat protection too.\n\nHighlights:\n- Centrally controlled wireless from your UTM;\n- No local configuration of access points required;\n- Complete UTM protection for wireless clients;\n- Quick voucher-based guest access customizable with your brand;\n- Choose from a range of access-point models;\n- Uses high capacity 802.11n for reliable access.\n\nInstalls fast with automatic setup and configuration\nYou can set up multiple wireless Access Points (APs) within minutes. They require no local configuration and will simply find the controller, retrieve their IP address via DHCP, and import the configuration. Devices automatically appear in the UTM interface where you can manually activate them.\n\nCreates reliable mesh networks\nOur range of access points support different deployment scenarios. They include the ceiling-mount design AP 30 and the dual-band/dual-radio AP 50. The AP 50 can acts as a repeater and/or bridge to extend coverage to hard to wire areas.\n\nProvides guest Wi-Fi and BYOD access\nWe give you secure, easy-to-manage guest access out-of-the-boxwithout extra appliances, licenses or complex configuration. And you can tailor the guest experience to suit your needs. Set bandwidth limits and content filtering as well as customizing the login page and vouchers to strengthen your company brand.\n\nSecure wireless and integrated UTM protection\nTo prevent unauthorized access we use the most advanced encryption and authentication standards available, including WPA2-Enterprise in combination with IEEE 802.1X (RADIUS authentication). And, our APs forward wireless traffic to the UTM, giving wireless clients the same level of security as if they were physically connected to the LAN. You can also choose to authenticate users based on their credentials from any back end server supported by our UTM for greater flexibility and control.
Tutti i prezzi NON sono comprensivi di IVA.
Il Listino è in EURO, salvo se diversamente indicato. Marchi e i nomi di prodotti sono registrati dai rispettivi titolari. Dati a cura del Fornitore. Non possiamo essere ritenuti responsabili per eventuali errori o refusi presenti. Prodotti, versioni, prezzi, termini e garanzie sono soggetti a cambiamenti senza preavviso. In ogni rapporto di fornitura valgono le Condizioni Generali di Vendita. Prezzi aggiornati in tempo reale.