ตะกร้า 0

Paloaltonetworks PA-220

พร้อมส่ง
SKU
PAN-PA-220-2020
฿102,500.00
รายละเอียดสินค้าโดยย่อ

Paloaltonetworks PA-220

จำแนกได้ทุก application, ทุก port, เเละตลอดเวลา

  • 1.  สามารถระบุ application โดยไม่คำนึงถึง port, การเข้ารหัส (SSL หรือ SSH), หรือใช้เทคนิคการหลีกเลี่ยงหลบ port
  • 2. ใช้ application, ไม่ใช้ port เป็นพื้นฐานสำหรับการตัดสินใจสำหรับ policy ให้ใช้งานง่ายๆ เเละมั่นคงปลอดภัยทั้งหมดไม่ว่าจะทำ: allow, deny, schedule, inspect หรือ traffic-shaping
  • 3. Categorizes unidentified applications for policy control, threat forensics or App-ID™ application identification technology development
  • 4. จัดหมวดหมู่ application ที่ไม่สามารถระบุได้สำหรับ control policy, threat forensics, App-ID™ หรือการพัฒนา App-ID™ เองที่ customize ตาม user

ใช้ security policies ได้ ไม่ว่าจะ user เเบบไหนก็ได้, หรืออยู่ที่ใดก็ได้ในโลก

  • 1. ติดตั้ง policy สำหรับ local user เเละ remote users ซึ่ง support ทั้ง Windows®, Mac® OS X®, Linux®, Android®, หรือ Apple® iOS platforms
  • 2. ไม่ต้องมี agentless ไปลงเครือง Microsoft® Active Directory® and Terminal Services, LDAP, Novell® eDirectory™ เเละ Citrix®
  • 3. ติดตั้งง่ายๆ ตั้ง policy ไม่ว่าจะ 802.1X wireless, proxies, NAC solutions, หรือไม่ว่าจาก source อะไรก็ได้ที่สามารถระบุ user information ได้

ป้องกัน known เเละ unknown threats

  • 1. Blocks ได้ทั้ง known threats, การ exploits ช่องโหว่, malware เเละ spyware, ครอบคลุมทุก port, ไม่ว่าจะเจอ threat ที่สามารถหลบหลีก port ก็ยังสามารถป้องกันได้
  • 2. ป้องกันไม่ให้ผู้ที่ไม่ได้รับอนุญาตส่ง files เเละ data ที่สำคัญ, เเละ เปิด web ที่ไม่เกี่ยวกับงาน
  • 3. สามารถระบุ unknown malware, โดยวิเคราะห์จาก malicious behaviors, หลังจากนั้นก็จะสร้างการ protection ได้อย่างอัตโนมัติ

Palo Alto Networks® PA-220 มี OS ชื่อว่า PAN-OS® security, ซึ่งสามารถเเยกทุก traffic ได้, รวมถึง applications, threats เเละ content, โดยพิจารณาจาก location หรือ ประเภทของ device, application, content เเละ user กล่าวอีกนัยหนึ่งองค์ประกอบทางธุรกิจที่ดำเนินธุรกิจจะถูกใช้เป็นพื้นฐานของนโยบายความปลอดภัยของคุณซึ่งจะส่งผลให้ท่าทางการรักษาความปลอดภัยดีขึ้นและลดเวลาในการตอบสนองต่อเหตุการณ์

จุดเด่น

  • 1. High availability ได้ทั้ง mode active/active เเละ active/passive
  • 2. Redundant power
  • 3. ออกเเบบ ไม่มีพัดลม (Fan-less design) เพื่อเพิ่มอายุการใช้งานอุปกรณ์
  • 4. ติดตั้งง่ายๆ โดยเอา configure จาก USB

Paloaltonetworks PA-220

Features:

Security Features

  • Application Visibility
    Port numbers, protocols, and IP addresses are useful for network devices, but they tell you nothing about what is on your network. Detailed information about the applications, users, and content traversing your network empowers you to quickly determine any risks they pose and quickly respond. Leveraging the rich context provided by Palo Alto Networks firewalls, our visualization, analysis, and reporting tools let you quickly learn more about activity on your network and analyze incidents from a current or comparative perspective.
  • User Visibility - An integral component for secure application enablement policies.
    Traditionally, security policies were applied based on IP addresses, but the increasingly dynamic nature of users and applications mean that IP addresses alone have become ineffective as a policy control element for safe application enablement. Our next-generation firewalls integrate with a wide range of enterprise directories and terminal services offerings, allowing you to:
    • See who is using the applications on your network
    • Set policy based on users
    • Perform forensic analysis and generate reports on user activities
  • AntiVirus - Network-based Malware Protection.
    The broadening use of social media, messaging and other non-work related applications introduce a variety of vectors for viruses, spyware, worms and other types of malware. Palo Alto Networks next-generation firewalls allow you to block unwanted applications with App-ID, and then scan allowed applications for malware.
  • IPS
    Today's attacks on your network use a combination of application vectors and exploits. Palo Alto Networks next-generation firewalls arm you with a two-pronged approach to stopping these attacks. Unwanted applications are blocked through App-ID, and the applications you choose to allow through are scanned for vulnerability exploits by our NSS-approved IPS engine.
  • Data Filtering & File Blocking
    The application function level control, file blocking by type, and data filtering features of our next-generation firewalls allow you to implement a range of policies that help balance permitting the use of personal or non-work related applications, with the business and security risks of unauthorized file and data transfer.
  • Modern Malware Protection - WildFire: Protection from targeted and unknown threats.
    Modern attackers are increasingly using targeted and new unknown variants of malware to sneak past traditional security solutions. To address this, Palo Alto Networks developed WildFire, which identifies new malware in minutes. By executing suspect files in a virtual environment and observing their behavior, Palo Alto Networks identifies malware quickly and accurately, even if the malware sample has never been seen before. Once a file is deemed malicious, WildFire automatically generates protections that are delivered to all WildFire subscribers within an hour of detection. A WildFire license provides your IT team with a wealth of forensics to see exactly who was targeted, the application used in the delivery, and any URLs that were part of the attack.
  • URL Filtering - Control Web Activity with URL Filtering.
    The perfect complement to the policy-based application control provided by App-ID is our on-box URL filtering database, which gives you total control over related web activity. By addressing your lack of visibility and control from both an application and web perspective, App-ID and URL Filtering together protect you from a full spectrum of legal, regulatory, productivity, and resource utilization risks.
  • Mobile Security
    Mobile computing is one of the most disruptive forces in information technology. It is revolutionizing how and where employees work, as well as the tools they use to perform their jobs. Mobile devices are not just ways to access existing applications such as corporate email, but the platform for opening up entirely new ways of doing business. Make sure that you have the proper security to extend your business applications and data to smartphones, tablets and laptops. Learn how to safely enable mobile devices by using GlobalProtect from Palo Alto Networks.

Networking Features

  • Decryption - Identify & Control Encrypted Traffic.
    Take control of your SSL and SSH encrypted traffic and ensure it is not being used to conceal unwanted activity or dangerous content. Using policy-based decryption and inspection, you can confirm that SSL and SSH are being used for business purposes only, instead of to spread threats or unauthorized data transfer.
  • IPv6 - Safely enabling applications, users and content in IPv6 environments.
    Our next-generation firewalls allow you to deploy consistent, safe application enablement policies across IPv6, IPv4 and mixed environments.
  • Networking
    Our flexible networking architecture includes dynamic routing, switching, and VPN connectivity, which enables you to easily deploy Palo Alto Networks next-generation firewalls into nearly any networking environment.
  • VPN - Standards-based VPN Connectivity.
    Secure site-to-site and remote user connectivity is a critical infrastructure component. Every Palo Alto Networks next-generation firewall platform allows you to easily and securely communicate between sites using standards-based IPSec VPN connections. Remote user communications are protected through a rich set of VPN features.
  • Virtualization Security
    The VM-Series supports the exact same next-generation firewall and advanced threat prevention features available in our physical form factor appliances, allowing you to safely enable applications flowing into, and across your private, public and hybrid cloud computing environments. Automation features and an API enable you to dynamically update security policies as your VM environment changes, eliminating potential security lag. The VM-Series supports the following hypervisors: VMWare ESXi and NSX, Citrix SDX, KVM (Centos/RHEL), Ubuntu, Amazon Web Services.

Management Features

  • Centralized Management
    The centralized management features in Panorama will minimize the administrative efforts and operational costs associated with your deployment of our next-generation firewalls in multiple locations – either internally or globally. Panorama allows your team to centrally manage all device aspects including configuration and policy deployment, visibility into applications, users and content as well as logging and reporting.
  • Device Management
    Our firewall management philosophy is to make administrative tasks such as report generation, log queries, policy creation, and ACC browsing easy to execute and consistent, no matter which mechanism - web interface, Panorama, CLI or API - you use.
  • Policy Control - Secure Application Enablement.
    The increased visibility into applications, users and content delivered by Palo Alto Networks simplifies figuring out which applications are traversing your network, who is using them, and the potential security risks. Armed with this data, you can apply secure enablement policies with a range of responses that are more finely tuned than the traditional 'allow or deny' approach.
  • Redundancy
    Palo Alto Networks next-generation firewalls support a series of redundancy and resiliency features that ensure your firewall will continue to provide the secure application enablement you need to keep your business running.
  • Virtual Systems - Scalable Firewall Services With Virtual Systems.
    Virtual systems are unique and distinct next-generation firewall instances within a single Palo Alto Networks firewall. Instead of deploying many individual firewalls, security service providers and enterprises can deploy a single pair of firewalls (high availability) and enable a series of virtual firewall instances (virtual systems). Each virtual system is an independent (virtual) firewall within your firewall that is managed separately and cannot
  • Technical Specifications:

     

    Highlights

     

    • High availability with active/active and active/passive modes
    • Redundant power input for increased reliability
    • Fan-less design
    • Simplified deployments of large numbers of firewalls through USB

     

    Performance and Capacities1 PA-220
    Firewall throughput (App-ID enabled)2, 4 500 Mbps
    Threat prevention throughput3, 4 150 Mbps
    IPsec VPN throughput2, 4 100 Mbps
    New sessions per second5 4,200
    Max sessions 64,000

     

    I/O
    (8) 10/100/1000
    Management I/O
    (1) 10/100/1000 out-of-band management port, (1) RJ-45 console port (1) USB port (1) Micro USB console port
    Storage Capacity
    32GB SSD
    Power Supply (Avg/Max Power Consumption)
    Dual redundant 40W (21W/25W)
    Max BTU/hr
    102 BTU
    Input Voltage (Input Frequency)
    100-240VAC (50-60Hz)
    Max Current Consumption
    Firewall—1.75A @ 12VDC Power supply (AC side)—0.5A @ 100VAC, 0.2A @ 240VAC
    Weight (Stand-Alone Device/As Shipped)
    3.0 lbs / 5.4 lbs
    Safety
    cCSAus, CB
    EMI
    FCC Class B, CE Class B, VCCI Class B
    Certifications
    See: https://www.paloaltonetworks.com/company/certifications.html
    Environment
    Operating temperature: 32° to 104° F, 0° to 40° C Non-operating temperature: -4° to 158° F, -20° to 70° C Passive cooling

    be accessed or viewed by other users.

Paloaltonetworks PA-220

เขียนรีวิวสินค้าของคุณเอง
คุณกำลังรีวิว:Paloaltonetworks PA-220