Chinese (Simplified)EnglishIndonesianJapanese
Phone
Phone :   62 21-2205 2205 Mobile :  62 819 7716 8000
Email
sales@alvasta-tech.com

Command Secure Gateways

Command Secure Gateways

CommandCenter Secure Gateway

CommandCenter Secure Gateway

Remotely manage your virtual machines, blade systems, rack servers, networking devices, and power distribution units – your entire heterogeneous IT infrastructure located anywhere in the world – from a single Web browser-based interface.

Raritan’s CommandCenter® Secure Gateway (CC-SG) is an easy to deploy, plug-and-play appliance, that provides IT administrators and lab managers with a secure, single point of remote access and control.    

Raritan’s CC-SG consolidates multiple access technologies, including KVM-over-IP, service processors, and in-band methods such as RDP and VNC.  By simplifying remote management, expediting troubleshooting, and providing remote power control, CC-SG maximizes uptime and productivity of your physical and virtual servers, intelligent PDUs, and serial switches. 

CC-SG is a perfect compliment to our Power IQ power management solution and enables power control of devices connected to any PDU managed by Power IQ – without leaving the CC-SG GUI. Plus, data can be synchronized automatically between the two products. 

Download a free virtualized evaluation copy of CC-SG for up to 16 nodes and interfaces 
(runs on VMware, including ESX/ESXi and VMware Player). Includes a built-in license.

Download Now


CommandCenter Secure Gateway provides:

Unified Access 
By entering a single IP address into a standard web browser running on either a PC (Windows, Linux, Mac), smartphone or tablet PC, an IT or lab administrator can have:

  • Out-of-band BIOS-level access to blade and rack-mounted servers via Dominion KX II KVM-over-IP switch, serial devices, or service processors (ie. iLO, DRAC, RSA)
  • BIOS-level access to virtual servers via VMWare Viewer
  • In-band access to servers via RDP, VNC, SSH, Telnet and VMWare’s VI Client

Consolidated Security
Remote server access is more secure with centralized authentication, authorization and logging.   

  • Users are authenticated against LDAP, Active Directory®, RADIUS and TACACS+
  • Sophisticated role-based authorization determines users’ access and power control privileges.
  • Consolidated audit logs and reporting helps meet compliance requirements.
  • All data traffic, including that of video, virtual media, keyboard and mouse, is encrypted with selectable encryption mode – 128- or 256-bit AES and 128-bit SSL.

Management of Heterogeneous IT infrastructure located anywhere in the world