on 13-Sep-2011 23:11
Good to see: http://searchsecurity.techtarget.com/magazineContent/Best-secure-remote-access-products-2011
TECHTARGET: “Administrators use the GUI-based Visual Policy Editor, included in BIG-IP Edge Gateway, to define access policies based on device types or network types. These access policies are used by the device to check, authenticate and authorize users, in compliance with their organization’s policies.”