ผลการค้นหาสำหรับ: 'LOG+FILE+แบบที่+1'[0]''
-
Forcepoint NGFW 115
Block sophisticated data breach attacks
Large data breaches continue to plague businesses and organizations across industry verticals. You can fight back with application layer exfiltration protection. This solution enables Stonesoft NGFW to selectively and automatically block network traffic originating from PCs, laptops, servers, file shares, and other endpoint devices based on highly granular endpoint contextual data. Application layer exfiltration protection is the only solution that goes beyond typical next-generation firewalls to prevent attempted ex-filtration of sensitive data from endpoints via unauthorized programs, web applications, users, and communications channels.
High scalability and availability secures your business-critical applications
Today's businesses demand fully resilient network security solutions. Forcepoint Stonesoft NGFW delivers high scalability and availability in powerful ways.
Unmatched protection keeps your business in business
Every day attackers get better at penetrating enterprise networks, applications, data centers, and endpoints. Once inside, they can steal intellectual property, customer information, and other sensitive data, causing irreparable damage to businesses and reputations.
Insight # N115-0-XX00-X-N Mfr. # N115-0-XX00-X-N UNSPSC: 43222501 ฿1.00 -
WatchGuard Firebox T45 /T45-W
WatchGuard Firebox T45 /T45-W
- Firewall (UDP 1518) 3.94 Gbps
- VPN (UDP 1518) 1.58 Gbps
- AntiVirus 874 Mbps
- IPS (FUll Scan) 716 Mbps
- UTM (Full Scan) 557 Mbps
- Interfaces 5 x 1 Gb
- I/O Interfaces 1 Serial / 2 USB
- Concurrent connections 3,850,000
- New connections per second 26,500
- VLAN Support 50
ขอใบเสนอราคาติดต่อฝ่ายขาย LINE: @monsterconnect
Call Center 02-026-6664 Email: [email protected]
฿0.00 -
WatchGuard Firebox T85
WatchGuard Firebox T85
- Firewall (UDP 1518) 4.96 Gbps
- VPN (UDP 1518) 2.04 Gbps
- AntiVirus 1.53 Gbps
- IPS (FUll Scan) 1.28 Gbps
- UTM (Full Scan) 943 Mbps
- Interfaces 8 x 1 Gb Optional x SFP+
- I/O Interfaces 1 Serial / 2 USB
- Concurrent connections 3,850,000
- New connections per second 35,500
- VLAN Support 75
ขอใบเสนอราคา ติดต่อฝ่ายขายทาง LINE: @monsterconnect
Call Center 02-026-6664 Email: [email protected]
฿0.00 -
WatchGuard Firebox T35-R*
WatchGuard Firebox T35-R*
- Firewall (UDP 1518) 940 Mbps
- VPN (UDP 1518) 560 Mbps
- AntiVirus 325 Mbps
- IPS (FUll Scan) 300 Mbps
- UTM (Full Scan) 203 Mbps
- Interfaces 5 x 1 Gb
- I/O Interfaces 1 Serial / 2 USB
- Concurrent connections 1,300,000
- New connections per second 6,800
- VLAN Support 50
ขอใบเสนอราคาติดต่อฝ่ายขาย LINE: @monsterconnect
Call Center 02-026-6664 Email: [email protected]
฿0.00 -
WatchGuard Firebox NV5
WatchGuard Firebox NV5
- Firewall (UDP 1518) N/A
- VPN (UDP 1518) 200 Mbps
- AntiVirus N/A
- IPS (FUll Scan) N/A
- UTM (Full Scan) N/A
- Interfaces 3 x 1 Gb
- I/O Interfaces 1 Serial / 1 USB
- Concurrent connections 73,000
- New connections per second 8,500
- VLAN Support 10
ขอใบเสนอราคาติดต่อฝ่ายขาย LINE: @monsterconnect
Call Center 02-026-6664 Email: [email protected]
฿0.00 -
Check Point 5900
The Check Point 5900 Next Generation Security Gateway combines the most comprehensive security protections to safeguard your mid-size enterprise. The 5900 is a 1U Next Generation Security Gateway with two I/O expansion slots for higher port capacity, redundant fans and a redundant power supply option, a 2 x 500GB (HDD) or 2x 480GB (SSD) drive array option, and Lights-Out Management (LOM) for remote management. This powerful Next Generation Security Gateway is optimized to deliver real-world threat prevention to secure your critical assets and environments.
COMPREHENSIVE THREAT PREVENTION
The rapid growth of malware, growing attacker sophistication and the rise of new unknown zero-day threats require a different approach to keep enterprise networks and data secure. Check Point delivers fully integrated, comprehensive Threat Prevention with award-winning SandBlast™ Threat Emulation and Threat Extraction for complete protection against the most sophisticated threats and zero-day vulnerabilities.
Unlike traditional solutions that are subject to evasion techniques, introduce unacceptable delays, or let potential threats through while evaluating files, Check Point SandBlast stops more malware from entering your network. With our solution your employees can work safely no matter where they are and doesn’t compromise their productivity
Product Benefits- High performance protection against the most advanced cyber attacks
- Unique “first time prevention” for the most sophisticated zero day attack
- Optimized for inspecting SSL encrypted traffic
- Future-proofed technology safeguards against tomorrow’s risks
- Centralized control and LOM improves serviceability
- Modular, expandable chassis with flexible I/O options
Product Features
- Simple deployment and management
- Virtual Systems consolidates security onto one device
- Two network expansion slots to add port density, fiber, 10 GbE, 40 GbE and fail-open IO card options
- Redundant power supplies, drives, fans and clustering technologies eliminate single point of failure
฿0.00 -
Check Point 5100
The Check Point 5100 Next Generation Security Gateway combines the most comprehensive security protections to safeguard your small enterprise and branch office deployments. The 5100 delivers high performance and port modularity for higher port capacity. This powerful Next Generation Security Gateway is optimized to deliver threat prevention for your enterprise or branch offices against present and future threats to secure your critical assets and environments.
COMPREHENSIVE THREAT PREVENTION
Check Point delivers fully integrated, comprehensive Threat Prevention with awardwinning SandBlast™ Threat Emulation and Threat Extraction for complete protection against the most sophisticated threats and zero-day vulnerabilities.
Unlike traditional solutions that are subject to evasion techniques, introduce unacceptable delays, or let potential threats through while evaluating files, Check Point SandBlast stops more malware from entering your network. Our solution enables your employees to work safely - no matter where they are and without compromising their productivity.
Product Benefits- High performance protection against the most advanced cyber attacks
- Unique “first time prevention” for the most sophisticated zero day attack
- Optimized for inspecting SSL encrypted traffic
- Future-proofed technology safeguards against tomorrow’s risks
- Centralized control and LOM improves serviceability
- Modular, expandable chassis with flexible I/O options
Product Features
- Simple deployment and management
- Secure remote access to corporate resources from a wide variety of devices
- One network expansion slot to add port density, fiber and fail-open IO card options
- Redundant clustering technologies eliminate a single point of failure
฿0.00 -
Forcepoint NGFW 3305
Block sophisticated data breach attacks
Large data breaches continue to plague businesses and organizations across industry verticals. You can fight back with application layer exfiltration protection. This solution enables Stonesoft NGFW to selectively and automatically block network traffic originating from PCs, laptops, servers, file shares, and other endpoint devices based on highly granular endpoint contextual data. Application layer exfiltration protection is the only solution that goes beyond typical next-generation firewalls to prevent attempted ex-filtration of sensitive data from endpoints via unauthorized programs, web applications, users, and communications channels.
High scalability and availability secures your business-critical applications
Today's businesses demand fully resilient network security solutions. Forcepoint Stonesoft NGFW delivers high scalability and availability in powerful ways.
Unmatched protection keeps your business in business
Every day attackers get better at penetrating enterprise networks, applications, data centers, and endpoints. Once inside, they can steal intellectual property, customer information, and other sensitive data, causing irreparable damage to businesses and reputations.
Insight # N3301-X-XX00-N Mfr. # N3301-X-XX00-N UNSPSC: 43222501 ฿1.00 -
new
Forcepoint NGFW 3301
Block sophisticated data breach attacks
Large data breaches continue to plague businesses and organizations across industry verticals. You can fight back with application layer exfiltration protection. This solution enables Stonesoft NGFW to selectively and automatically block network traffic originating from PCs, laptops, servers, file shares, and other endpoint devices based on highly granular endpoint contextual data. Application layer exfiltration protection is the only solution that goes beyond typical next-generation firewalls to prevent attempted ex-filtration of sensitive data from endpoints via unauthorized programs, web applications, users, and communications channels.
High scalability and availability secures your business-critical applications
Today's businesses demand fully resilient network security solutions. Forcepoint Stonesoft NGFW delivers high scalability and availability in powerful ways.
Unmatched protection keeps your business in business
Every day attackers get better at penetrating enterprise networks, applications, data centers, and endpoints. Once inside, they can steal intellectual property, customer information, and other sensitive data, causing irreparable damage to businesses and reputations.
Insight # N3301-X-XX00-N Mfr. # N3301-X-XX00-N UNSPSC: 43222501 ฿1.00 -
Forcepoint NGFW 2105
Overview
Marketing Description
Forcepoint NFGW 2100 Series appliances offer modular connectivity and security, as well as the performance needed for small data centers and medium-sized central networks. With the available option for 10 10-Gigabit Ethernet ports and up to 4 40-Gigabit Ethernet ports, the 2100 series can be used in mixed clusters of as many as 16 devices to deliver unrivaled high availability and fast access for IPsec VPNs. Forcepoint NGFWs provide multiple layers of security using built-in IPS with anti-evasion defenses, accelerated encrypted inspection, file scanning, exploit detection, mission-critical application proxies and more. Forcepoint's cloud-assisted advanced malware detection (sandboxing) and dynamic URL filtering can be enabled in moments. Forcepoint's CASB, Web, Email and DLP Security serve as ideal complements for the ultimate level of protection.
Key Selling Points
- 1U rack-mounted design
- Efficient use of space and power
- Gigabit Ethernet and modular interfaces
- High performance connectivity
- Active-active, mixed clustering
- High availability with higher performance and reuse of older devices
- Multi-Link network clustering of broadband & leased lines
- High availability with higher performance and lower costs
- Built-in VPN, IPS, NGFW, and encrypted traffic control
- Sidewinder mission-critical application proxies
- Robust security for highly sensitive application servers
- URL filtering and advanced malware detection options
- Consolidated security powered from the cloud
Insight # N2105-X-XX00-N Mfr. # N2105-X-XX00-N UNSPSC: 43222501 ฿1.00 -
Forcepoint NGFW 335
Overview
Marketing Description
Forcepoint NGFW 300 series appliances offer high-performance SD-WAN connectivity and security for connecting and protecting stores, branches, or home offices with true enterprise efficiency, availability, and security. Forcepoint NGFW provides multiple layers of security. It has built-in IPS with anti-evasion defenses, accelerated encrypted inspection, file scanning, exploit detection, mission-critical application proxies and more.
Key Selling Points
- Compact, desktop design
- Zero-touch configuration and updating
- All-in-one convenience for smaller locations
Insight # N335-0-XX00-X-N Mfr. # N335-0-XX00-X-N UNSPSC: 43222501 43222501 ฿1.00 -
Forcepoint NGFW 330
Overview
Forcepoint NGFW 300 Series appliances offer high-performance SD-WAN connectivity and security for connecting and protecting stores, branches, or home offices with true enterprise efficiency, availability, and security.
Forcepoint NGFW provides multiple layers of security. It has built-in IPS with anti-evasion defenses, accelerated encrypted inspection, file scanning, exploit detection, mission-critical application proxies, and more. Forcepoints cloud-assisted Advanced Malware Detection (sandboxing) and dynamic URL Filtering can be enabled in moments. Forcepoints CASB, Web, Email, and DLP Security serve as ideal complements for the ultimate level of protection.
Insight # N330-0-XX00-X-N Mfr. # N330-0-XX00-X-N UNSPSC: 43222501 ฿240,000.00 -
FortiGate 70F
ติดตั้งฟรี กรุงเทพและปริมณฑล
- IPS 1.4 Gbps
- NGFW 1 Gbps
- Threat Protection 800 Mbps
- Interface Multiple GE RJ45 | Variants with internal storage
฿46,000.00 -
Sangfor M5400 [NGAF54]
Spesifikasi detail SANGFOR Internet Access Management M5400 :
- 8 Gbps
- 1.25 Gbps
- 1.7 Gbps
- 8 GbE copper
8 Alasan kenapa beli SANGFOR Internet Access Management M5400 di ITJaringan.net :
- Alamat kantor jelas beserta no.telp nya.
- Berbadan hukum PT dan bukan perseorangan ataupun individu
- Semua Produk yang di jual bergaransi resmi dari distributor
- Free konsultasi dengan Account Manager berpengalaman dan dukungan Technical Support Bersertifikasi International
- Tersedia produk untuk Trial before Buy / Proof of Concept
- Terdaftar sebagai Anggota Asosiasi E-Commerce Indonesia (IDEA)
- Jaminan Harga Kompetitif
- Gratis Ongkos kirim untuk wilayah Pulau Jawa dan Sekitarnya
฿1.00 -
Sangfor M5500 [NGAF55]
Nowadays there are many types of security solutions available on the market,however less than 40% of enterprises are protected using Next Generation Firewalls. For these enterprises already protected by a Firewall or IPS, they often neglect to use a Web Application Firewall as it is only considered as an additional investment with few benefits. Protections offered by NGFW& IPS are too general against the increasing number of web vulnerabilities, which often can only protect against the known vulnerabilities. Not only SANGFOR NGAF is the World 1st integrated NGFW + WAF, but it is also one of the most affordable solution available on the market. Without sacrificing the quality & performance, SANGFOR is able to provide a total security solution for small & large businesses. Before making your final decision and choose the right security protection, you cannot only take into account the initial cost of your purchase but you also have to take into account the overall TCO (Total Cost of Ownership) for a period from 3 to 5 years.
฿1.00 -
Palo Alto Network PA-460
ไฟร์วอลล์ระดับพรีเมี่ยม
- Firewall throughput 4.4/4.4 Gbps
- Threat Prevention throughput 1.9/2.4 Gbps
- IPsec VPN throughput 3 Gbps
- Max concurrent sessions 400,000
- New sessions per second 67,000
- Virtual systems 1/5
฿0.00 -
Palo Alto Networks PA-410
ตอบโจทย์สำหรับองค์กรขนาดเล็กและขนาดกลาง
- Firewall throughput 1.3/1.1 Gbps
- Threat Prevention throughput 0.6/0.6 Gbps
- IPsec VPN throughput 0.92 Gbps
- Max concurrent sessions 64,000
- New sessions per second 11,000
- Virtual systems 1/1
฿0.00 -
F5 i4800
Specifications i4800 Intelligent Traffic
Processing:L7 requests per second: 1.1M
L4 connections per second: 450K
L4 HTTP requests per second: 2M
Maximum L4 concurrent connections: 28M
Throughput: 20 Gbps L4/L7Hardware Offload SSL/TLS: ECC†: 10K TPS (ECDSA P-256)
RSA: 20K TPS (2K Keys)
15 Gbps bulk encryption*FIPS SSL: N/A Hardware Compression: 10 Gbps Hardware DDoS Protection: N/A TurboFlex Performance Profiles Tier 2 Software Compression: N/A Software Architecture: 64-bit TMOS On-Demand Upgradable: N/A Virtualization (Maximum Number of vCMP Guests): N/A Processor: One 4-Core Intel Xeon processor (total 8 hyperthreaded logical processor cores) Memory: 32 GB DDR4 Hard Drive: 1x 500 GB Enterprise Class HDD Gigabit Ethernet CU Ports: Optional SFP Gigabit Fiber Ports (SFP): 8 SX or LX (sold separately) 10 Gigabit Fiber Ports (SFP+): 4 SR/LR (sold separately); optional 10G copper direct attach 40 Gigabit Fiber Ports (QSFP+): N/A Power Supply: 1x 250W Platinum AC PSU (Additional PSU optional, 2x 650W DC PSU optional) Typical Consumption: 130W (single power supply, 110V input)** Input Voltage: 100-240 VAC +/- 10% auto switching, 50/60hz Typical Heat Output: 445 BTU/hour (single power supply, 110V input)** Dimensions: 1.72″ (4.37 cm) H x 17.4″ (44.2 cm) W x 30.6″ (77.72 cm) D
1U industrial standard rack-mount chassisWeight: 20 lbs. (11.8 kg) (dual power supply) Operating Temperature: 32° to 104° F (0° to 40° C) Operational Relative Humidity: 5 to 85% at 40° C Safety Agency Approval: ANSI/UL 60950-1-2014
CSA 60950-1-07, including A1:2011+A2:2014
IEC 60950-1:2005, A1:2009+A2:2013
EN 60950-1:2006+A11:2009+A1:2010+A12:2011+A2:2013Certifications/
Susceptibility Standards:ETSI EN 300 386 V1.6.1 (2012)
EN 55032:2012 Class A; EN 61000-3-2:2014
EN 61000-3-3:2013; EN 55024:2010
FCC Class A (Part 15), IC Class A, VCCI Class A*Maximum throughput.
**Please refer to the Platform Guide: i4000 Series for the latest power ratings for your specific configurations (dual power supplies, highline input voltage, DC, etc.).
Notes: Performance-related numbers are based on local traffic management services only. Only optics provided by F5 are supported. SFP+ ports in i10800, i10600, i7800, i7600, i5800, and i5600
are compatible with F5 SFP modules.
† ECDHE-ECDSA-AES128-SHA256 cipher string tested.฿1.00 -
F5 i2800
Specifications i2800 Intelligent Traffic
Processing:L7 requests per second: 650K
L4 connections per second: 250K
L4 HTTP requests per second: 1M
Maximum L4 concurrent connections: 14M
Throughput: 10 Gbps L4/L7Hardware Offload SSL/TLS: ECC†: 3.5K TPS (ECDSA P-256)
RSA: 4.3K TPS (2K Keys)
8 Gbps bulk encryption*FIPS SSL: N/A Hardware Compression: 5 Gbps Hardware DDoS Protection: N/A TurboFlex Performance Profiles Tier 1 Software Compression: N/A Software Architecture: 64-bit TMOS On-Demand Upgradable: N/A Virtualization (Maximum Number of vCMP Guests): N/A Processor: One 2-Core Intel Xeon processor (total 4 hyperthreaded logical processor cores) Memory: 16 GB DDR4 Hard Drive: 1x 500 GB Enterprise Class HDD Gigabit Ethernet CU Ports: Optional SFP Gigabit Fiber Ports (SFP): 4 SX or LX (sold separately) 10 Gigabit Fiber Ports (SFP+): 2 SR/LR (sold separately); optional 10G copper direct attach 40 Gigabit Fiber Ports (QSFP+): N/A Power Supply: 1x 250W Platinum AC PSU (Additional PSU optional, 2x 650W DC PSU optional) Typical Consumption: 95W (single power supply, 110V input)** Input Voltage: 100-240 VAC +/- 10% auto switching, 50/60hz Typical Heat Output: 325 BTU/hour (single power supply, 110V input)** Dimensions: 1.72″ (4.37 cm) H x 17.4″ (44.2 cm) W x 30.6″ (77.72 cm) D
1U industrial standard rack-mount chassisWeight: 20 lbs. (11.8 kg) (dual power supply) Operating Temperature: 32° to 104° F (0° to 40° C) Operational Relative Humidity: 5 to 85% at 40° C Safety Agency Approval: ANSI/UL 60950-1-2014
CSA 60950-1-07, including A1:2011+A2:2014
IEC 60950-1:2005, A1:2009+A2:2013
EN 60950-1:2006+A11:2009+A1:2010+A12:2011+A2:2013Certifications/
Susceptibility Standards:ETSI EN 300 386 V1.6.1 (2012)
EN 55032:2012 Class A; EN 61000-3-2:2014
EN 61000-3-3:2013; EN 55024:2010
FCC Class A (Part 15), IC Class A, VCCI Class A*Maximum throughput.
**Please refer to the Platform Guide: i2000 Series for the latest power ratings for your specific configurations (dual power supplies, highline input voltage, DC, etc.).
Notes: Performance-related numbers are based on local traffic management services only. Only optics provided by F5 are supported. SFP+ ports in i10800, i10600, i7800, i7600, i5800, and i5600
are compatible with F5 SFP modules.
† ECDHE-ECDSA-AES128-SHA256 cipher string tested.฿1.00 -
Forcepoint DLP - Network
SECURITY DRIVEN BY THE HUMAN POINT
Data security is a never-ending challenge. On one hand, IT organizations are required to keep up with regulations and protect intellectual property from targeted attacks and accidental exposure. On the other, they must adapt to macro IT movements, such as the adoption of cloud applications, hybrid cloud environments and BYOD trends, all of which increase the ways data can leave your organization. This expanding attack surface poses the most significant challenge to protecting critical data. Data security teams take the seemingly logical approach to chase data: find it, catalogue it and control it. Yet this traditional approach to data loss prevention is no longer effective because it ignores the biggest variable in data security — your people. Instead of focusing solely on data, security should begin and end with people. The key is to gain visibility into user interactions with data and applications. Once this is achieved, you can apply a level of control based on the specific user’s risk and the sensitivity or value of the data. An organization’s data protection program must consider the human point — the intersection of users, data and networks. In addition, the enterprise must remain vigilant of data as it moves across the enterprise and highlight the people who create, touch and move data.
฿1.00 -
Forcepoint DLP - Discover
SECURITY DRIVEN BY THE HUMAN POINT
Data security is a never-ending challenge. On one hand, IT organizations are required to keep up with regulations and protect intellectual property from targeted attacks and accidental exposure. On the other, they must adapt to macro IT movements, such as the adoption of cloud applications, hybrid cloud environments and BYOD trends, all of which increase the ways data can leave your organization. This expanding attack surface poses the most significant challenge to protecting critical data. Data security teams take the seemingly logical approach to chase data: find it, catalogue it and control it. Yet this traditional approach to data loss prevention is no longer effective because it ignores the biggest variable in data security — your people. Instead of focusing solely on data, security should begin and end with people. The key is to gain visibility into user interactions with data and applications. Once this is achieved, you can apply a level of control based on the specific user’s risk and the sensitivity or value of the data. An organization’s data protection program must consider the human point — the intersection of users, data and networks. In addition, the enterprise must remain vigilant of data as it moves across the enterprise and highlight the people who create, touch and move data.
฿1.00 -
Forcepoint DLP - Cloud Applications
SECURITY DRIVEN BY THE HUMAN POINT
Data security is a never-ending challenge. On one hand, IT organizations are required to keep up with regulations and protect intellectual property from targeted attacks and accidental exposure. On the other, they must adapt to macro IT movements, such as the adoption of cloud applications, hybrid cloud environments and BYOD trends, all of which increase the ways data can leave your organization. This expanding attack surface poses the most significant challenge to protecting critical data. Data security teams take the seemingly logical approach to chase data: find it, catalogue it and control it. Yet this traditional approach to data loss prevention is no longer effective because it ignores the biggest variable in data security — your people. Instead of focusing solely on data, security should begin and end with people. The key is to gain visibility into user interactions with data and applications. Once this is achieved, you can apply a level of control based on the specific user’s risk and the sensitivity or value of the data. An organization’s data protection program must consider the human point — the intersection of users, data and networks. In addition, the enterprise must remain vigilant of data as it moves across the enterprise and highlight the people who create, touch and move data.
฿1.00 -
Forcepoint DLP - Endpoint
SECURITY DRIVEN BY THE HUMAN POINT
Data security is a never-ending challenge. On one hand, IT organizations are required to keep up with regulations and protect intellectual property from targeted attacks and accidental exposure. On the other, they must adapt to macro IT movements, such as the adoption of cloud applications, hybrid cloud environments and BYOD trends, all of which increase the ways data can leave your organization. This expanding attack surface poses the most significant challenge to protecting critical data. Data security teams take the seemingly logical approach to chase data: find it, catalogue it and control it. Yet this traditional approach to data loss prevention is no longer effective because it ignores the biggest variable in data security — your people. Instead of focusing solely on data, security should begin and end with people. The key is to gain visibility into user interactions with data and applications. Once this is achieved, you can apply a level of control based on the specific user’s risk and the sensitivity or value of the data. An organization’s data protection program must consider the human point — the intersection of users, data and networks. In addition, the enterprise must remain vigilant of data as it moves across the enterprise and highlight the people who create, touch and move data.
฿1.00 -
FireEye NX 1500
NX 1500 User Count 500 OS Support Microsoft Windows Mac OS X Performance Up to 50 Mbps Network Monitoring Ports 4x 10/100/1000 BASE-T Ports Network Ports Mode of Operation on In-line Monitor, FailClose or Tap High Availability (HA) Not Available High Availability (HA) Ports (rear panel) Not Available Management Ports (rear panel) 2x 10/100/1000 BASE- T Ports IPMI Port (rear panel) Not Available Front LCD & Keypad Not Available VGA Port Not Available Serial Port (rear panel) 115,200 bps, No Parity, 8 bits, 1 Stop Bit (RJ45 connector; RJ45-to-Dsub adapter cable is included) Drive Capacity Single 500GB 2.5 inch SATA HDD, internal, fixed Enclosure Desktop formfactor Chassis Dimension WxDxH 11in(280mm) x 6.9in(175mm) x 1.8in(45.7mm) AC Power Supply External 60 Watt 12V@5A Ouput AC Adapter, 90-264 VAC, 50-60 Hz, IEC60320-C14, inlet, FRU Power Consumption Maximum (watts) 27 watts Thermal Dissipation Maximum (BTU/h) 92 BTU/h MTBF (h) 95,400 h Appliance Alone / As Shipped Weight lb. (kg) 3.75 lb (1.7 kg) / 6.5 lb (2.95 kg) Regulatory Compliance Safety IEC 60950 EN 60950-1 UL 60950 CSA/CAN-C22.2 Security Certifications FIPS 140-2 Level 1 CC NDPP v1.1 Regulatory Compliance EMC FCC Part 15 ICES-003 Class A AS/NZS CISPR 22 CISPR 32 EN 55032 EN 55024 IEC/EN 61000-3-2 IEC/EN 61000-3-3 IEC/EN 61000-4-2 V-2/2015 &V-3/2015 Environmental Compliance RoHS Directive 2011/65/EU REACH WEEE Directive 2012/19/EU Operating Temperature 0 ~ 40°C 32 ~ 104°F Non-Operating Temperature -20 ~ 80°C -4 ~ 176°F Operating Relative Humidity 5% - 85% non-condensing Non-Operating Relative Humidity 5% - 95% non-condensing Operating Altitude 3,000 m 9,842 ft ฿1.00