View

Sorting

Products found: 8

logo
Offer a reference bonus
2.00

Check Point 21000 Appliances

Delivers the best performance in its class
Up to 44.5 Gbps of real-world firewall throughput
Up to 6.9 Gbps of real-world IPS throughput
Supports sub 5 micro-second low-latency transactions
Supports high availability and serviceability
Offers a variety of network options to work in any network environment
Offers Lights-Out-Management option for remote out-of-band management
Enables service without downtime thanks to hot-swap and redundant components
Reduces costs through security consolidation
Extends easily to add more security features without adding a new appliance
Available in four complete and Software Blade packages that meet any security need
Available in a low-cost, high-performance package with extended memory for maximum connection capacity
Features
Maximum security and performance
The Check Point 21000 Appliances offer maximum availability of business-critical applications and the best performance available in their class.
High port density with up to 37x1GbE ports for network segmentation
110 Gbps firewall throughput and sub-5µs latency for mission-critical applications
Comes in compact 2-rack unit chassis
Comes with acceleration and clustering technologies
Reliability and high serviceability
Meet the uncompromising high availability standards of modern data centers; the 21000 Appliances are designed to be highly serviceable, even when deployed in customer networks.
Hot-swappable redundant power supplies, hard disk drives and fans
An advanced Lights-Out-Management card provides out-of-band remote management to remotely diagnose, start, restart and manage the appliance from a remote location
Prevent unknown threats
Check Point provides complete zero-day threat prevention and alerts when under attack. Threat Extraction delivers zero-malware documents in zero seconds. Threat Emulation inspects files for malicious content in a virtual sandbox. When Threat Emulation discovers new threats, a signature is sent to the Check Point ThreatCloud database which documents and shares information on the newly identified malware with other Check Point customers — providing immediate protection against zero-day threats.
Security acceleration module for greater performance confidence
With the optional Security Acceleration Module, you can confidently increase firewall and VPN bandwidth through your 21000 Appliance without performance degradation. Check Point’s innovative, purpose-built SecurityCore™ technology uses parallel and security processing power to accelerate security performance.
Offloads security processing from the general purpose appliance CPU
Available as a bundle for significant savings right out of the box
High network capacity
Deploy the Check Point 21000 Appliances in any network environment.
Up to 37 10/100/1000Base-T ports
Up to 36 1000base-F SFP, or up to 13 10GBase-F SFP+ ports
Three front-facing expansion slots
Up to 1,024 VLANs for higher network segmentation
Pre-configured with Next Generation Software Blade packages
Pre-configured with Next Generation Software Blade packages The Check Point 21000 Appliances offer a complete and consolidated security solution available in five Next Generation Security Software Blade packages.
Next Generation Firewall—identify and control applications by user and scan content to stop threats (included Blades: IPS and Application Control)
Next Generation Secure Web Gateway—enable secure use of Web 2.0 with real-time multilayer protection against web-borne malware (included Blades: Application Control, URL Filtering, Antivirus and SmartEvent)
Next Generation Data Protection—preemptively protect sensitive information from unintentional loss, educate users on proper data-handling policies and empower them to remediate incidents in real-time (included Blades: IPS, Application Control and Data-Loss Prevention).
Next Generation Threat Prevention—apply multiple layers of protection to prevent sophisticated cyber-threats (included Blades: IPS, Application Control, Antivirus, Anti-Bot, URL Filtering and Email Security)
Next Generation Threat Extraction—(NGTX): advanced next-gen zero-day threat prevention, NGTP with Threat Emulation and Threat Extraction.
Additional Software Blade upgrades are available to further extend and customize protection options
... Learn more
ROI-calculator
Configurator
ROI-
-
0
0
logo
Offer a reference bonus
2.00

Check Point 600 Appliance

 Benefits Secures your small business with advanced security Protects against viruses, spam, dangerous applications and malicious websites Designed from the ground up for the needs of small businesses Connects securely to your office network from any laptop, smartphone or tablet Sets up in minutes with easy and intuitive web-based management Simplifies your security management with optional Check Point SMB Managed Security Services Keeps you connected with flexibility, speed and power Supports multiple Internet access options, including Ethernet, ADSL, 3G and 4G Provides integrated wireless security with guest access Delivers market-leading speeds with 100 Mbps of real-world throughput Features Enterprise-caliber firewall and threat protection Small companies shouldn’t have to settle for less security. The Check Point 600 Appliance has the industry’s highest-ranked next-generation firewall, IPS and threat prevention security technologies to deliver robust protection from modern cyber-threats. You’ll get the same level of protection enjoyed by Fortune 100 companies—at SMB prices. A comprehensive protection suite Leveraging the proven and flexible Software Blade Architecture, the 600 Appliance delivers multilayer security to the small-office environment, including: Firewall VPN Advanced Networking & Clustering Identity Awareness & User Awareness IPS Application Control URL Filtering Antivirus Anti-Bot Anti-Spam and Email Security Security managed via the cloud We can even help you manage your security appliance through the cloud. With Check Point Cloud-Managed Security Service, you’ll leverage Check Point’s technology leadership and 24/7 security expertise to ensure your network will be monitored and protected at all times. Learn more about the features and benefits of this service on our Check Point SMB Cloud-Managed Security Service page. Flexible network connections with high capacity The 600 Appliance comes standard with 10 x 1Gbps Ethernet ports. For added flexibility and convenience, Check Point offers a wireless version that includes a WiFi access point (802.11b/g/n) that supports WEP, WPA and WPA2 authentication, as well as secured guest access capabilities. Integrated ADSL modem Included USB and PCI Express card slots make it easy to create a redundant Internet link for maximum reliability Simple management, configuration and deployment The Check Point 600 Appliance can be up and ready in minutes, offering hassle-free deployment to small offices with minimal IT support staff. Simple web-based local management interface First-time set-up wizard Easy-to-understand logs and reports for hassle-free device monitoring
... Learn more
ROI-calculator
Configurator
ROI-
-
0
0
logo
Offer a reference bonus
0.00

Esdenera Networks Firewall 3

The Esdenera Firewall 3 is a professional network appliance that has been built for enterprise networks, Infrastructure-as-a-Service (IaaS), and remote access solutions. It is build upon Esdenera's TNOS network operating system, a high-secure OpenBSD-based platform. In addition to the leading packet filter and stateful firewalling capabilities, Esdenera introduces applications identities, a programmable approach to detect apps, stacks and things that turns it into a truly next generation firewall. Features: Rules The enhanced PF packet filter provides a Stateful SPI-Firewall that filters, translates and normalizes network sessions of the IPv4 and IPv6 Internet protocols. And it can do much more – with built-in redundancy and failover options. Identities Use identities to filter on more than addresses and ports. They can describe people, things, applications, services, or entire software stacks using dynamic tables or accelerated, customizable programs. Relays Relays are stream-based and application-aware network engines. They can manage your web traffic, load balance connections, assign sophisticated user policies or inspect TLS connections as a trusted machine in the middle. Why use Esdenera® Firewall 3
  • Trusted Code
  •  

  • NFV Services
  •  

  • Cloud-ready
  •  

  • Built for SDN
  •  

... Learn more
-
-
ROI-calculator
Configurator
ROI-
-
0
0
logo
Offer a reference bonus
2.00

Fortinet FortiGate NGFW

FortiGate next-generation firewalls utilize purpose-built security processors and threat intelligence security services from FortiGuard labs to deliver top-rated protection and high performance including encrypted traffic. FortiGate reduces complexity with automated visibility into applications, users and network and provides security ratings to adopt security best practices.
... Learn more
ROI-calculator
Configurator
ROI-
-
0
0
logo
Offer a reference bonus
2.40

PA-500 next-generation firewall

Key Security Features: Classifies all applications, on all ports, all the time • Identifies the application, regardless of port, encryption (SSL or SSH), or evasive technique employed. • Uses the application, not the port, as the basis for all of your safe enablement policy decisions: allow, deny, schedule, inspect and apply traffic-shaping. • Categorizes unidentified applications for policy control, threat forensics or App-ID™ development. Enforces security policies for any user, at any location • Deploys consistent policies to local and remote users running on the Windows®, Mac® OS X®, Linux®, Android®, or Apple® iOS platforms. • Enables agentless integration with Microsoft® Active Directory® and Terminal Services, LDAP, Novell® eDirectory™ and Citrix®. • Easily integrates your firewall policies with 802.1X wireless, proxies, NAC solutions, and any other source of user identity information. Prevents known and unknown threats • Blocks a range of known threats, including exploits, malware and spyware, across all ports, regardless of common threat-evasion tactics employed. • Limits the unauthorized transfer of files and sensitive data, and safely enables non-work-related web surfing. • Identifies unknown malware, analyzes it based on hundreds of malicious behaviors, and then automatically creates and delivers protection. The controlling element of the PA-500 is PAN-OS®, a security-specific operating system that natively classifies all traffic, inclusive of applications, threats and content, and then ties that traffic to the user, regardless of location or device type. The application, content, and user – in other words, the business elements that run your business –mare then used as the basis of your security policies, resulting in an improved security posture and a reduction in incident response time. 
... Learn more
ROI-calculator
Configurator
ROI-
-
0
0
logo
Offer a reference bonus
1.40

Sophos UTM

Unified Threat Management makes security simple. Sophos UTM provides the ultimate network security package with everything you need in a single modular appliance. It simplifies your IT security without the complexity of multiple-point solutions. The intuitive interface will help you quickly create policies to control security risks. And clear, detailed reports will give you the insight you need to improve your network performance and protection. Highlights Ì Every feature available  on every appliance Ì Firewall, VPN, ATP, IPS, email, web filtering and app control Ì Hardware, virtualized, software or cloudbased appliance Ì Intuitive browserbased interface Ì Built-in reporting on all models Ì Two-factor authentication with one-time password (OTP) in many areas Ì Integrated wireless controller Consolidated network security platform—no compromise Protect your network using multi-layered proven protection technologies including Advanced Threat Protection (ATP), IPS, VPN, email and web filtering combined with the industry’s simplest admin interface. We’ve engineered our software and hardware to give you the throughput speeds you need. And, you can choose the level of protection you need with modular subscriptions as every feature is available on every appliance. All the Next-Gen Firewall features you need We’ll give you complete control to block, allow, shape and prioritize applications. Our Deep Layer-7 inspection (Next-Generation Firewall) ensures true application identification and has regular automatic updates. And you’ll get feedback on unclassified applications too. Intuitive management and detailed reporting You’ll know what’s happening with your users and you’ll have complete control over all the features you need, with none of the complexity. Easily build policies while getting detailed real-time and historical data with our on-box reporting, helping you to fix problems fast. And our Free Sophos UTM Manager lets you centrally administer several appliances through a single login. Connect remote offices with easy VPN and Wi-Fi Sophos RED (Remote Ethernet Device) provides secure remote access to your off-site locations. It’s the first security gateway that requires no technical skills at the remote site. Once installed, it forwards traffic to the UTM for complete security. Sophos UTM also works as a wireless controller; access points are automatically set up and receive complete UTM protection.
... Learn more
-
ROI-calculator
Configurator
ROI-
-
0
0
logo
Offer a reference bonus
1.40

UserGate Proxy & Firewall

Control Internet Access. Protect from Advanced Threats. UserGate Proxy & Firewall is an easy to use and affordable software alternative to numerous hardware gateway security appliances. It is used by more than 40,000 small and medium sized businesses and distributed enterprises across the globe. Network Firewall, IDPS, and Router Enforce uninterrupted connectivity, network access controls, and regulate Internet traffic. Keep viruses, worms, Trojans, and spyware from infesting your network. Guarantee the bandwidth levels required to serve business-critical applications. Monitoring User Internet Activity Control access to websites and enforce any reasonable corporate policy. Link the headquarters to remote users and branch offices through a Secure VPN connection Product Overview UserGate Proxy & Firewall is an all-in-one gateway security solution combining a network firewall, router, gateway antivirus, intrusion detection and prevention (IDPS), VPN server, web filtering, reporting and statistics and other important functions. It allows you to manage network traffic, optimize bandwidth, and provide Internet access control. How does it work? UserGate Proxy & Firewall can be installed on any Windows-based machine and works as a web security gateway. It provides Internet access sharing, web security, and traffic management. UserGate works basing on user account and applicable policies. The product lets administrators control traffic flow and trace web pages visited by employees. Numerous policies can be used to grant or restrict access to specific website categories, control downloads or application use, set traffic quotas, and keep detailed statistics.
... Learn more
-
ROI-calculator
Configurator
ROI-
-
0
0
logo
Offer a reference bonus
0.00

ZenMate VPN

We believe security should be simple. ZenMate VPN gives you security, privacy, and peace of mind. Just one click will turn your device from vulnerable to protected and keep cybercriminals away! ZenMate VPN is available for:
  • Mac
  • Chrome
  • Apple TV
  • Win
  • Opera
  • Gaming
  • iOS
  • Open VPN
  • Chromebook
  • Android
  • Linux
  • Raspberry Pi
  • Firefox
  • Firestick TV
  • Smart TV
... Learn more
-
-
ROI-calculator
Configurator
ROI-
-
0
0

The ROI4CIO Product Catalog is a database of business software, hardware, and IT services. Using filters, select IT products by category, supplier or vendor, business tasks, problems, availability of ROI calculator or price calculator. Find the right business solutions by using a neural network search based on the results of deployment products in other companies.