Identity-Aware Access
vs. Network Extension

Why Modern Teams Choose Agilicus

Compare capabilities side-by-side.

Feature

Phoenix Contact mGuard

Granular Authorisation

How specific can access rules be?

Per URL & File

Layer 7 Precision

None

No fine-grained authorisation (e.g. no read-only VNC)

Client Requirement

What does the user need to install?

None (Browser Only)

Custom Hardware & Client required

Identity Providers

Can you use Google, Microsoft, Okta etc simultaneously?

Multiple Concurrent

Mix Okta, Google, Microsoft, etc

Custom Identity System

No per-user sign-in

Layer 3 Adjacency

Can users ping devices on the network?

No (Zero Trust)

Yes (IPsec VPN)

Threat Protection

Does it inspect traffic content?

Identity-Aware Web Application Firewall

Handle cross-site scripting, content vulnerabilities

Encrypted Tunnel

Opaque to traffic content, requires UDP 500/4500 ports

Overlapping IPs

Handle duplicate subnets on local and remote site(s)?

Native Support

No conflict, operates at layer 7

Complex

Requires NAT+port-forward, or, re-subnetting

Vendor Agnostic

Does the system work with different equipment vendors?

Yes

Yes. Any PLC, HMI, Historian, SCADA platform. Any vendor.

Complex

No.

Phoenix Contact specific.

Clientless Universal Access

Stop managing VPN clients. Agilicus AnyX works on any device with a browser—desktop, tablet, or phone.

  • Ideal for contractors & BYOD
  • No MDM required
  • Zero friction onboarding

Granular Authorisation

Don’t just grant network access. Control exactly what users can do inside the application.

  • Restrict specific URLs
  • Control file share access
  • Stop password stuffing attacks

Network Simplification

Solve the hardest networking problems without re-architecting your infrastructure.

  • Outbound-only (Starlink/CGNAT)
  • Overlapping IP support
  • Multi-IdP Single Sign-On