1. Access Control
Easily set access control policies to determine who can access and use your company network and resources.
2. Fast Installation
Clients bundled with connection profiles for quick install and connectivity.
3. Deploy Anywhere
Flexible deployment options and widespread availability on cloud marketplaces.
4. Authentication
Secure authentication methods such as PAM, RADIUS, LDAP, SAML, or a custom method. Multiple can be used in conjunction.
5. Clustering
Cluster multiple servers to get the increased availability and load capacity your business needs.
6. Automation
Save time and energy by automating tasks with CLI tools and the XML-RPC API.