Notifications
Notifications
CDW Logo

AXIS T91A6 - security seals

Mfg # 5503-781 CDW # 2936848

Quick tech specs

  • Security seals
  • T91A62
  • T91A64 Corner Bracket
  • for AXIS T91A61
  • T91A63
  • T91A67 Pole Bracket
View All

Know your gear

This AXIS pipe seal is used to be put between mounting surface and bracket to prevent insect intrusion.

This item was discontinued on July 15, 2022

Enhance your purchase

AXIS security seals is rated 5.00 out of 5 by 4.
Rated 5 out of 5 by from You can consolidate all the various access methods one simple access point What is our primary use case? We use Axis Security to allow our team to access different pieces of infrastructure as needed across the globe. How has it helped my organization? Axis Security enabled us to centralize the way people get into our infrastructure. We replaced one-off and non-secured VPN access. Every data center structure has its own environment, and each has its own little quirk about getting into it. Axis Security consolidates them into one method, which then simplifies how you do things. At the same time, it's extremely secure. Users must now go through a multifactor authentication process where there was none before in many cases. It has consolidated our security in that sense. Axis Security has had a huge impact on our operational efficiency. Systems engineers are responsible for multiple data centers, and each had a different access method in the past. You needed to connect using the method specific to that data center with Access Security. I can now connect to the infrastructure on the servers that I have permission to access via Axis Security without having to do anything else. That part has streamlined folks' ability to work. What is most valuable? The most valuable part so far has been Axis Security's ability to create identity connections to various servers, allowing users to access them. By doing so, we've managed to replace any old or existing VPN access with Axis Security. We are slowly but surely getting rid of our traditional VPN. We integrate single sign-on providers using Okta. Without going through multifactor authentication, you can't go anywhere unless you have that, and we found that it's extremely secure. There is no inbound traffic to the infrastructure needed for Axis. It's all outbound. When we set stuff up to use it, we don't have to worry about outside sources getting into any of the Axis Security infrastructure. It supports all kinds of protocols and ports. Axis establishes trust for every access request no matter where it comes from. This is essential to us, and it works well. What needs improvement? I would like more statistics about what's going on in terms of usage. There is little-to-no usage reporting. That's one thing we've requested, and I think they're working on it. For how long have I used the solution? We've been using Axis Security for roughly two and a half years. What do I think about the stability of the solution? I rate Axis Security 8.5 out of 10 for stability. What do I think about the scalability of the solution? I rate Axis Security 10 out of 10 for scalability. How are customer service and support? I rate Axis Security nine out of 10. Their support is outstanding. When we have an issue, they jump on it right away. We have biweekly meetings with a customer success rep, and there's nothing we've asked for that they haven't at least considered. How would you rate customer service and support? Positive How was the initial setup? Axis Security is a secure method of accessing different environments, so you need to set up things upfront, such as certifications and MFA integration. It requires some admin stuff on the front end. It took a little time doing the prerequisites before we could begin to create working installs. We did everything in-house, but I wasn't the only one involved. We had a four-person team. Different parts of it required more people to be involved. It affects your firewall, networking rules, and Active Directory stuff. It requires some maintenance in the sense that we need to create application points. We create the tags and applications and provision the connectors. They are responsible for updating their connectors on their side. What other advice do I have? I rate Axis Security nine out of 10. If somebody told me they were considering Axis Security, I would probably ask what they want Axis Security to replace. Axis Security is excellent if you have remote sites that you are currently granting access to using multiple forms. In our case, we were using VPNs to provide access to different environments. With Axis Security, you can consolidate all that into one simple access point. And at the same time, you can keep it extremely secure. It might not be the best fit for a single one-off application. It may work, but it may not be suitable. We're a global enterprise that frequently acquires other companies. Part of the onboarding process is to convert their systems so we can access them via Axis security. Some of those are small, while others are extremely large. Axis Security can handle everything we throw at it. Ultimately, it depends on what a prospective client wants to do. Which deployment model are you using for this solution? Public Cloud Disclaimer: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor.
Date published: 2023-08-18T00:00:00-04:00
Rated 5 out of 5 by from Helps reduce our capital expenditure, has valuable access connectors, and saves us time What is our primary use case? We use Axis Security to provide the end user with a seamless experience while providing our company with a good security posture at the same time. How has it helped my organization? The interface provides a unified view of secure web gateways and cloud access security brokers. It provides excellent security for our applications, devices, and networks. Axis Security simplifies access which is important to our organization and it provides a lot of support for ports and protocols. Axis Security is able to establish trust for every access request no matter where it comes from. It is able to secure our organizational infrastructure from end to end so we can detect and remediate threats by providing us with detailed logs. Axis Security has helped our organization move from legacy architecture and has saved our staff time to work on other projects. Axis Security has helped us consolidate our security solutions. The consolidation of security solutions has helped reduce our organization's capital expenditures. Axis Security has had a positive impact on our operational efficiency. It provides a user-friendly experience that benefits our team. The application allows us to spend less time troubleshooting the product and more time delivering solutions. What is most valuable? The way the access connectors work is valuable. What needs improvement? I would like more detailed logging in the Axis Security interface. For how long have I used the solution? I have been using Axis Security for several years. What do I think about the stability of the solution? Axis Security is extremely stable. What do I think about the scalability of the solution? Axis Security is highly scalable. How are customer service and support? The technical support is good. How would you rate customer service and support? Positive How was the initial setup? The initial deployment was straightforward. What about the implementation team? The implementation was done in-house. Which other solutions did I evaluate? We evaluated a couple of options including Zscaler and found Axis Security to be the best fit for us. What other advice do I have? I would rate Axis Security ten out of ten. The maintenance is managed by Axis. Consider the admin upkeep cost when maintaining the ZTNA product. Disclaimer: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor.
Date published: 2023-10-15T00:00:00-04:00
Rated 5 out of 5 by from Helps provide specific access, along with specific approvals, and simplifies access management What is our primary use case? Many of the use cases I work with involve individuals in the biopharma industry who want to access internal information. A significant portion of this information is proprietary, and certain aspects of it should not be made available externally, such as PII, potentially HIPAA-related data, and potentially SOX-related data, given that we are a public company. They express a desire to download or share this data, and my role is to establish the necessary connections and collaborate with their business units to determine the specific individuals who should have access. I then obtain the required approvals for them using our various tools. We deploy Axis Security in the cloud and we really like that model because it ensures security. How has it helped my organization? Securing access to our applications and network is crucial. Axis Security is an excellent tool that effectively ensures the security of our system. With this tool, we can accurately monitor and control who has access to our information, and why they have access, and apply various controls accordingly. It is crucial for our organization that Axis Security simplifies access management, both through the agent and without the agent. It is critical that Axis Security can support a wide range of ports and protocols. It should function exactly like the VPN access that people are accustomed to. Users should not need to understand the underlying technique; they only need to know that it works effectively. Axis Security has enabled us to establish a connection between authentication and access for specific groups, specific individuals, and specific applications, whereas previously it was accessible to anyone who could access our network, providing them with a free playground. With Axis Security, we can be more precise in our approach. This way, we can determine who has access to specific applications and link it to risk assessment, gaining a better understanding of the individuals accessing a particular application rather than simply acknowledging their presence on the network. Axis Security has enabled us to transition away from some of our other security solutions and shift towards a stronger emphasis on access security and Zero Trust Network Access. It has also empowered us to be more proactive in implementing controls and monitoring activities. Axis Security enables us to move away from Cisco products and consolidate multiple security solutions into a single comprehensive package. This consolidation allows us to track user activities and access points more effectively, ensuring that we can provide the required information logs for both internal and external audits. We are currently in the intermediate stage and transitioning away from other solutions. However, it appears that using a single solution, product, and suite will result in significant cost savings for us. What is most valuable? The entire suite and the entire ZTNA process are very valuable. This is especially true when it comes to providing people with specific access, along with specific approvals, to the data, systems, machines, or applications they need to access. What needs improvement? The interface is fine. I would like it to be somewhat hidden, similar to Cisco AnyConnect, their secure mobility client. However, it has some cool features for troubleshooting. I can debug things and easily log out. It probably shouldn't be available to everyone. I believe it should be restricted and running behind the scenes for most users. The user interface provides a satisfactory digital experience. I can access the tool and identify the specific user, enabling me to troubleshoot any issues. Moreover, I can utilize the tool to debug their connections and pinpoint the exact cause of the problem. Therefore, I have a positive opinion of the tool. However, some of the technical aspects may be more suitable for individuals with technical expertise. It would be beneficial if the debug interface were slightly more user-friendly, allowing users to examine it independently. Additionally, having documentation on how to send relevant information to the administrators would be helpful, as I am essentially responsible for managing these systems. Establishing trust for every access request, regardless of its origin, is highly beneficial in building trust. Some improvements I would like to see include more thorough debugging of all users, allowing us to identify their precise source, the computer they are using, and possibly additional mobile information. However, as an administrator, I have yet to determine how to utilize certain tools or the ongoing development of logging and monitoring features. One of the things I've noticed is that we need to be more proactive. I would like to find a way to work together and establish a connection between some of our technology interfaces in TechGeek and our SIM. The SIM is a tool that collects data and generates automated alerts. These alerts can be created using our endpoint detection tools or integrated directly into the access tool. Specifically, I aim to improve the automation capabilities of Axis Security. Axis Security has not assisted in freeing up my time to engage in other projects; however, incorporating automation could potentially aid in achieving that objective. I would appreciate more automated learning capabilities or increased integration with other security tools, allowing us to establish automation. One aspect that I would like to enhance pertains to several of the solutions we have employed, which might be unique to our organization. We have frequently had to engage Axis Engineering in the implementation of these solutions, as they are somewhat novel and tailored specifically to our needs. Consequently, I aspire to develop the capability to implement them independently. However, this could potentially be attributed to the complexity inherent in some of our current tools. For how long have I used the solution? I have been using Axis Security for one year. What do I think about the stability of the solution? I have not seen any crashing or lagging with Axis Security. The solution is stable. What do I think about the scalability of the solution? Axis Security seems capable of scaling to accommodate large organizations. We are a sizable company with a global presence, and it has successfully scaled across the globe without encountering any significant problems. However, I do notice occasional delays in gaining access. How are customer service and support? I have been in contact with technical support mainly through email. That's one aspect of it. I'm unsure if it's my fault or if I simply haven't come across a phone number that I can call to speak with someone directly. They do respond fairly promptly, but at times we would prefer a more immediate solution. Perhaps a chat option would allow us to receive an immediate response instead of waiting for several hours, a day, or even two days. How would you rate customer service and support? Neutral Which solution did I use previously and why did I switch? We utilized various Cisco products, along with internal SSO and other identity tools. We made the transition to Axis Security in order to enhance the precision of our security measures. Instead of having a free and open environment, we sought to restrict access to specific individuals for certain applications. This allows for better control and prevents unauthorized individuals from accessing other areas within the company. Now, we are able to precisely identify and attribute actions to specific individuals. How was the initial setup? Our deployment is somewhat complex, but I believe that our proof of concept was highly successful and relatively seamless. Currently, I have been working on their Secure Web Gateway deployment, having conducted a POC with them. We have demonstrated its effectiveness, but we have not fully committed to it yet. We are aiming to finalize the commitment and roll it out in either the fall or spring of next year. During the proof of concept, we had approximately twenty-five individuals from our organization involved, while at Axis, we collaborated with around five different individuals and two engineers for troubleshooting and ensuring the functionality of the Secure Web Gateway. What about the implementation team? The Axis team assisted us with our implementation. I was the one responsible for setting it up and directly collaborating with the Axis team. This allowed us to explore various scenarios. We encountered some complexity that we didn't fully understand, which was also the case for some of their level one and two engineers. As a result, we had to involve developers to address and finalize certain solutions. What's my experience with pricing, setup cost, and licensing? The pricing is very competitive from what I've seen. What other advice do I have? I rate Axis Security nine out of ten. I recommend Axis Security, but one thing we really need is to understand our objectives. It is crucial to comprehend that the solution will be most effective when we have proper access management or IAM ( /products/anaqua-iam-re... Disclaimer: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor.
Date published: 2023-07-28T00:00:00-04:00
Rated 5 out of 5 by from Easy to deploy, improved reliability and performance of our connectivity, and greatly reduced costs What is our primary use case? We have two use cases. We are a subsidiary of a larger insurance company and their rulings and policies are what govern what we do and don't do. Our first use case is that, while the majority of our staff uses a standard VPN connection, all of our retail stores use Atmos for connectivity. The other use case relates to some of our developers who have latency issues if they're on VPN, so they use Atmos as well. How has it helped my organization? We have vendors doing projects for us. We build them a server on Azure that they configure for us, so they need access to it. Normally, we would have to go through the process of giving them an account and elevated rights on those servers, and then give them a VDI session so that they could log in to those servers. With Atmos, we can bypass that. We can set up a remote desktop to those servers, specifically for that vendor, and that is the only thing they can get to, using Atmos. And no VDI is required. We're saving licensing costs by doing that. Another nice part about Atmos is that it replaced other tools that we used, like NetSkope. Now we're paying for one solution, and that saves us a nice amount of money that we can use for other important things. The solution has improved the reliability of our connectivity as well as performance. And it has greatly reduced costs. We don't have to use VeloCloud or another type of product at each store and have a secure connection to another VeloCloud in the data center. Instead, we can go straight from the Meraki switch, to the ISP, to the Internet, meaning to whatever Azure on-ramp is available. It reduces the hardware requirements dramatically. In terms of security tools, it takes the VPN and CASB environments, and ZTNA and combines them all into one tool for management. It reduced the amount of software we need to license for our stores and the management work. Among the tools we have eliminated are NetSkope and Cisco's AnyConnect. That consolidation has helped reduce our capital expenditures. On one product that we no longer purchase, we are saving about $180,000. An additional benefit is that it has helped free up staff because it's easy to configure, deploy, and manage. The networking team loves it because they don't have to do nearly as much, and our help desk staff doesn't get a ton of calls about connectivity issues. As a guess, it saves us somewhere between eight and 16 hours a week. It has greatly enhanced our efficiency because users are less confused and easily connected to the environment, and the product itself was quickly and easily adopted by our organization. What is most valuable? There are several valuable features. First, it's extremely easy to deploy and configure. Second, the performance is greater than a standard VPN. In addition, it's a secure connection to where a connection is needed. All of our retail resides in Azure and because Atmos is deployed throughout the world, our stores on-ramp at the closest internet provider. That means they on-ramp at the closest AWS, Google, Oracle, or Azure site, and then they use the high speed that those providers give us to get to our Azure tenant. It's much faster than running a standard ISP and running it back to your data center and then back out to Azure. It's also quite easy to configure Atmos's interface to provide a single pane of glass for ZTNA, secure web gateway, and cloud access security brokers. Through access roles, I have networking folks do the networking they need to do, and the security people have access to it for their portion of it. For example, they determine which websites you're allowed to go to. Another great aspect is that it can be used for troubleshooting purposes. If one of our stores has issues, we can look at it and see where other iPads in the store are connecting and what their traffic is. At that point, we know the issue isn't with the store or the access, it's with that specific iPad. Or sometimes security wants to see where people are going. They may want to look at the traffic to see if there are websites that they're not blocking and that people spend a lot of time on. If those sites are not sites we would normally block, but we don't want people spending a lot of time on non-work-related sites, they can block them. It has many tools, it's quite easy to configure, and you can configure it for your different organizations. I quite like it. I would give it an A-plus for securing access to our applications, devices, and network. It does an extremely good job. Our security folks have analyzed it and tried to find loopholes, but they found none. I give it another A-plus on its ability to support a variety of ports and protocols. We have some extremely old latency-type programs that we're able to make work through Atmos. And all of our newer stuff works as well. The fact that it's flexible with both modern applications and the older stuff is a big plus. And it gets an A-plus again when it comes to establishing trust for every access request, no matter where it comes from. The tool has many ways of doing that as well; for example, certificates and trusted devices. It's beautiful that we don't have to worry about it. That's not to say that we don't monitor it, but it's very nice to look at a tool and know that it's as secure as it can get. It's more secure than a standard VPN that we would have used for our stores. The fact that Atmos simplifies access management, while it's not a 100 percent must-have, it's a very nice aspect. It reduces the learning curve for any new staff we may hire. It's a plus in that area, but it wasn't a deciding factor in our choosing to go with the tool. What needs improvement? Atmos is good for securing infrastructure from end to end, detection and remediation of threats, but there may be a few features that could be added to make it a little easier for networking and security folks to analyze the traffic. There are bad actors out there and they may or may not show up through the tool. That's something they can add. They need to improve the networking and security tools a little in the troubleshooting and "bad-actor" areas to help us analyze security threats a little better. They have some things built in, but I would like to see more advanced tools. There are major vendors out there, and if you use their VPN connection that's not going to help you without buying one of their other products. So that's a similar type of situation. However, they do give you a little more bang for the buck when it comes to monitoring. So I can see an improvement there, in Atmos, in the future. For how long have I used the solution? We have been using Axis Security for over 18 months. What do I think about the stability of the solution? It's very stable. What do I think about the scalability of the solution? The scalability is awesome. I can scale out in a matter of minutes. We have it deployed across the United States, coast to coast, in well over 700 stores. In each of those stores, there are anywhere from five to 10 devices. We also have about 50 developers in the US and India who use it as well. How are customer service and support? Their technical support is great. When we have had issues, if we couldn't figure them out ourselves, we contacted them, and they figured them out really quickly. We have a very old application where you hit a web link and it opens an application on your desktop. It's not a web app and it doesn't reside on your laptop. Their support is working with us to see if we can deploy it using their web portal option. We've never needed that, even though we have all the other apps configured that way, just in case an associate needs to use their own personal laptop because their work laptop breaks. This old app is the only one we couldn't make run, and their support has jumped in and is helping us configure things to make it work. They're very good and they're smart. How would you rate customer service and support? Positive Which solution did I use previously and why did I switch? We used Cisco AnyConnect with VeloCloud hardware at each of our stores. We switched to Axis Security because of performance, ease of maintenance, and the fact that it saved $180,000 on licensing costs. I don't know how much we saved on hardware, but we saved that amount on VeloCloud for our 700-plus sites. That's a fair amount of money. And Atmos is a more secure solution for us. How was the initial setup? It was straightforward to deploy. We deployed it into our environment and assigned some of our store iPads to it to do a PoC assessment. After I, as a solution architect, evaluated it, I involved more individuals, including our security analyst and network engineers and they evaluated the tool. Once we felt it was a good choice, we picked 10 stores out of our 700-plus stores, informed them what we were going to do, and cut them over to using the tool for their connection. We used our MDM tool to push the agent to the iPads, and then the users logged in to the Atmos agent. We then did a pilot of about 25 stores and, then, over a weekend we deployed the agent to all of our iPads. It doesn't really require any maintenance. The tool itself tells you if it's going to do a patch, and you just schedule a change during that time period. It automatically updates the agent while you're on it. There's no downtime required. We do power down the Azure connectors at night and just leave one because if a store isn't open, there's no reason to have a... Disclaimer: I am a real user, and this review is based on my own experience and opinions.
Date published: 2023-07-05T00:00:00-04:00