ProductsFeatures & BenefitsSupportPartnersAbout Us

Features & Benefits

The maXecurity products offer authentication, authorization, Single Sign-On (SSO), audit & compliance reporting, and significant cost savings, all in an easy-to-maintain hardware appliance.

  • Authentication & Authorization: maXecurity products enable flexible, controlled access to all of the web-based resources across an enterprise. By taking advantage of existing user accounts, maXecurity products eliminate the need for users to manage additional passwords. Existing roles and groups can be easily applied to web applications, offering fine-grained authorization with minimal effort.


  • Single Sign-On: According to Gartner Group, approximately 30% of all Help Desk calls are for password-related problems.1 The maXecurity products can reduce, or even eliminate, these problems by standardizing on a single login screen with a single password for all web-based applications.


  • Compliance: InfoWorld reports that “90 percent of companies fail compliance,”2 according to a recent study by the IP Policy Compliance Group. maXecurity products are turn-key solutions that are designed to control, segregate, and audit access to critical data, helping to close the compliance gap.


  • Hardware: The maXecurity products are a comprehensive solution that combine security with optimal performance for Web Access Management products. The maXecurity products' exclusive HotProcess™ architecture allows a company's infrastructure to achieve an exponential performance boost over first-generation, software-based products, freeing up data center space and reducing power costs. Unlike competitive products, maXecurity products scale linearly, offering unlimited capacity.


  • Significant Cost Savings: The maXecurity products have been specifically designed to provide a significant reduction in total cost of ownership. A recent study of a large financial institution has shown that the maXecurity products result in millions of dollars in annual cost savings compared with a competitive Web Access Management product.3

Features & Benefits Chart

Compliance   Integration
Feature Benefit Feature Benefit

Audit Reports




Auditors have access to on-demand, real-time reporting.

Data can be transmitted, in real-time, externally to a digital dashboard, allowing instantaneous notification of security breaches or policy changes

Agent-less, Proxy-based Architecture

A proxy architecture requires less installation, support and version management from the customer than competitive agent-based approaches

Self-contained, Hardened Appliance

There is no need to purchase and manage additional servers

Role-based Configuration


The maXecurity products enforce segregation of duties (a key component under Sarbanes-Oxley section 404). Duties are broken out for:

  • Security Administrators

  • Infrastructure Administrators

  • Policy Administrators

  • Auditors
Standards-based Protocols

Based on the HTTP v1.1 and LDAP v3 standards, the maXecurity products can be integrated with a diverse set of distributed and mainframe technologies from a wide variety of vendors:

  • Any web server

  • Any LDAP server

  • RACF (via z/OS LDAP) and TopSecret
For additional Compliance information, click here.
For additional Integration information, click here.


Maintenance   Cost Savings
Feature Benefit Feature Benefit
Ease of Configuration

The appliance configuration settings are stored in an external LDAP policy server. Therefore:

  • Settings take effect instantly & globally

  • New appliances can auto-configure themselves and be brought online within minutes

Hardware Savings

The maXecurity™ product design results in streamlined system deployment for lower set-up costs

The maXecurity hardware appliances eliminate the need for additional hardware


Ease of Maintenance

The maXecurity products support a delegated administration model whereby all administrative functions are performed via an intuitive web interface

Personnel Savings

The maXecurity appliances eliminate the use of Unix administrators for policy servers and OS maintenance requirements

The delegated administration eliminates the use of an operations team for policy administration because policy administration is self-serviced by web application owners

The proxy-based model reduces/eliminates the use of a dedicated engineering team because there are no web agents and no conflicts between the web server vendor, version, and OS


Identity data can be linked seamlessly and transparently across LDAP user stores without the need for complex data synchronization

For additional Maintenance information, click here.
For additional Cost Savings information, click here.


For information on how the competition compares, click here.

1 Gartner IT Security Summit, 2005        2 InfoWorld, July 16, 2007        3 Contact us for details of this study