Google Translate

Sophos AP100C IEEE 802.11ac 1.71 Gbit/s Wireless Access Point - 2.40 GHz, 5 GHz - 6 x Antenna(s) - 6 x Internal Antenna(s) - MIMO Technology - 1 x Network (RJ-45) - Desktop, Ceiling Mountable A1EZTCHNI

Sophos AP100C IEEE 802.11ac 1.71 Gbit/s Wireless Access Point - 2.40 GHz, 5 GHz - 6 x Antenna(s) - 6 x Internal Antenna(s) - MIMO Technology - 1 x Network (RJ-45) - Desktop, Ceiling Mountable A1EZTCHNI
Brand: Sophos Plc
Part Number: A1EZTCHNI
MSRP: $767.99
Availability: 10 or more
Condition: New
Price: $639.63
Qty:     - OR -   Add to Wish List
Add to Compare
Sophos AP100C IEEE 802.11ac 1.71 Gbit/s Wireless Access Point - 2.40 GHz, 5 GHz - 6 x Antenna(s) - 6 x Internal Antenna(s) - MIMO Technology - 1 x Network (RJ-45) - Desktop, Ceiling Mountable

Plug & Play Deployment Deploying Sophos Access Points is easy. Automatic setup and configuration means multiple wireless access points are up and running in minutes. Simply plug the access point in and it automatically appears in the Sophos UTM user interface. Enable them from the console, and within seconds they become operational. Reliable Wireless Networking Sophos Access Points are ideal for creating multiple separate wireless zones. Configure a wireless network to provide employees access to internal network resources. On the same access point, you can offer wireless guests Internet access. Do it all without compromising the integrity of the internal network. Access points include the dual-band, dual-radio AP 50, that can act as a repeater or bridge to extend Wi-Fi coverage to hard to wire areas. Easy Guest Hotspots Set up guest hotspots for visitors or BYOD devices to control access to company resources. You get secure, easy-to-manage guest access out-of-the-box-without extra appliances, licenses or complex configuration. Fully customizable login pages and vouchers based upon templates-so you design the user experience and promote your company brand Automated mobile-device hotspot registration and authentication via SMS Set bandwidth limits and enforce inappropriate content filtering Strong Encryption Sophos UTM supports the strongest encryption and authentication standards available. Simply use your existing backend authentication, such as Active Directory, to allow quick and easy access for your employees. Know your wireless connections are completely secure. WPA2-Enterprise in combination with IEEE 802.1X (RADIUS authentication) Block-based encryption, providing the highest level of assurance that data is protected Sophos UTM monitoring easily detects failed authentication attempts Optimized Performance You get the ultimate in wireless performance with Sophos UTM and our Wireless Access Points. Support for the latest high-speed wireless standards including 802.11ac and 802.11n for up to Gigabit wireless speeds Automated channel selection and optimization for maximum performance and minimum interference under any situation Complete UTM Security Sophos Access Points send wireless traffic to the Sophos UTM appliance, where all security applications run. Wireless users get the same level of security as if they were connected physically to the LAN Add additional UTM protection modules to take full control of your network including network applications, quality-of-service, web surfing and more Simple Management At Sophos, simplicity is our mantra. You''ll have complete control over all the security features you need all in one place, with none of the complexity. We''ve invested heavily in streamlining our interface. This way you won''t have to reach for the manual every time you need to update a policy or change a setting. So you''re never more than a couple clicks from completing your task. Complete on-box reporting Our built-in reporting means you''ll know exactly what''s happening with your users. Fix problems fast and shape your policies, keeping your users secure while boosting network performance. And, you get detailed reports as standard, stored locally with no separate tools required. At-a-glance flow graphs show usage trends with predefined and customizable reports, providing key web activity. Report anonymization hides user names, requiring the four-eyes-principle to unhide them.

Write a review

Your Name:


Your Review: Note: HTML is not translated!

Rating: Bad           Good

Enter the code in the box below:



Partschase.com © 2024