With NAT Connect Turn any part of the world into part of your local infrastructure. Our service offers an interconnection method for many sites easily and quickly with which we generate a large extended LAN among all its locations and its resources in the cloud. You can also control all types of network access, web control to your entire computer park, anti-spam, web application firewall, VPN clients, etc. If you have branches, points of sale, remote offices or similar, you need to expand your network safely, easily and affordably beyond your main facilities. For this, the authenticating devices that make up the NAT Connect service are the ideal solution: exceptionally simple and functional. NAT Connect provides an elegant solution for the construction of a secure distributed network.
The Authenticators equipment will allow the control of all the details and elements of the network for all the remote offices, in this way it will allow the communication between them, offering the option of sharing any type of resources.
It does not require facilities or technical personnel for the implementation and / or connection of our Authenticators equipment in the remote offices. It is only necessary to connect them to power and Internet, this will make all the configuration automatically and establish the MPLS connection.
By having an extended private network, centralized management is as simple as managing a single branch. From a single point you can deploy firewall policies, web control, configuration of remote accesses, perform audit of accesses and changes executed, etc. Additionally you can observe in real time the traffic used in each of the venues with a single click and take action on it.
The NAT Connect solution unites disparate networks into a single virtualized logical WAN: simple, reliable, secure and with cost savings of up to 80%.
Authenticators can balance and mix 2 or more Internet links, whatever the type. So it could have redundancy.
Network Firewall/Protection.
The strongest AES-256 bit encryption.
Automatic and programmable updates.
Detailed administration of WANs consumption.
Control of high-powered WEB applications.
Centralized administration.
Proxy layer 7.
Configuration audit.
Administration by roles and permissions.
Quality of service QOS.
Rolling of WANs.
Notifications and alerts system.
Double Antivirus engine.
Restoration and backup copies.
Included and programmable reports.
Integration with Active Directory.
Mobile network access control.
Web Application Firewall.
Integrated 2 factor authentication.
Directory, RADIUS and LDAP.
Authenticator equipment is installed in each headquarters that need to integrate to the main LAN. The only thing that is required is an Internet connection in each location, any type of link (Fiber, HFC, ADSL, Modem 4G, etc). When the Authenticators are connected to electricity and we inject them with Internet, for the first and only time they download their configuration package that was previously sent to our Cloud Node. A private connection is established where the data travels encrypted in AES-256 bits and compressed by 30% to give it greater traffic speed to its Data Center.
© 2017 All rights reserved | Kythari Company