Paloaltonetworks PA-220
รายละเอียดสินค้าโดยย่อ
Paloaltonetworks PA-220
จำแนกได้ทุก application, ทุก port, เเละตลอดเวลา
- 1. สามารถระบุ application โดยไม่คำนึงถึง port, การเข้ารหัส (SSL หรือ SSH), หรือใช้เทคนิคการหลีกเลี่ยงหลบ port
- 2. ใช้ application, ไม่ใช้ port เป็นพื้นฐานสำหรับการตัดสินใจสำหรับ policy ให้ใช้งานง่ายๆ เเละมั่นคงปลอดภัยทั้งหมดไม่ว่าจะทำ: allow, deny, schedule, inspect หรือ traffic-shaping
- 3. Categorizes unidentified applications for policy control, threat forensics or App-ID™ application identification technology development
- 4. จัดหมวดหมู่ application ที่ไม่สามารถระบุได้สำหรับ control policy, threat forensics, App-ID™ หรือการพัฒนา App-ID™ เองที่ customize ตาม user
ใช้ security policies ได้ ไม่ว่าจะ user เเบบไหนก็ได้, หรืออยู่ที่ใดก็ได้ในโลก
- 1. ติดตั้ง policy สำหรับ local user เเละ remote users ซึ่ง support ทั้ง Windows®, Mac® OS X®, Linux®, Android®, หรือ Apple® iOS platforms
- 2. ไม่ต้องมี agentless ไปลงเครือง Microsoft® Active Directory® and Terminal Services, LDAP, Novell® eDirectory™ เเละ Citrix®
- 3. ติดตั้งง่ายๆ ตั้ง policy ไม่ว่าจะ 802.1X wireless, proxies, NAC solutions, หรือไม่ว่าจาก source อะไรก็ได้ที่สามารถระบุ user information ได้
ป้องกัน known เเละ unknown threats
- 1. Blocks ได้ทั้ง known threats, การ exploits ช่องโหว่, malware เเละ spyware, ครอบคลุมทุก port, ไม่ว่าจะเจอ threat ที่สามารถหลบหลีก port ก็ยังสามารถป้องกันได้
- 2. ป้องกันไม่ให้ผู้ที่ไม่ได้รับอนุญาตส่ง files เเละ data ที่สำคัญ, เเละ เปิด web ที่ไม่เกี่ยวกับงาน
- 3. สามารถระบุ unknown malware, โดยวิเคราะห์จาก malicious behaviors, หลังจากนั้นก็จะสร้างการ protection ได้อย่างอัตโนมัติ
Palo Alto Networks® PA-220 มี OS ชื่อว่า PAN-OS® security, ซึ่งสามารถเเยกทุก traffic ได้, รวมถึง applications, threats เเละ content, โดยพิจารณาจาก location หรือ ประเภทของ device, application, content เเละ user กล่าวอีกนัยหนึ่งองค์ประกอบทางธุรกิจที่ดำเนินธุรกิจจะถูกใช้เป็นพื้นฐานของนโยบายความปลอดภัยของคุณซึ่งจะส่งผลให้ท่าทางการรักษาความปลอดภัยดีขึ้นและลดเวลาในการตอบสนองต่อเหตุการณ์
จุดเด่น
- 1. High availability ได้ทั้ง mode active/active เเละ active/passive
- 2. Redundant power
- 3. ออกเเบบ ไม่มีพัดลม (Fan-less design) เพื่อเพิ่มอายุการใช้งานอุปกรณ์
- 4. ติดตั้งง่ายๆ โดยเอา configure จาก USB
Paloaltonetworks PA-220
Features:
Security Features
- Application Visibility
Port numbers, protocols, and IP addresses are useful for network devices, but they tell you nothing about what is on your network. Detailed information about the applications, users, and content traversing your network empowers you to quickly determine any risks they pose and quickly respond. Leveraging the rich context provided by Palo Alto Networks firewalls, our visualization, analysis, and reporting tools let you quickly learn more about activity on your network and analyze incidents from a current or comparative perspective. - User Visibility - An integral component for secure application enablement policies.
Traditionally, security policies were applied based on IP addresses, but the increasingly dynamic nature of users and applications mean that IP addresses alone have become ineffective as a policy control element for safe application enablement. Our next-generation firewalls integrate with a wide range of enterprise directories and terminal services offerings, allowing you to:- See who is using the applications on your network
- Set policy based on users
- Perform forensic analysis and generate reports on user activities
- AntiVirus - Network-based Malware Protection.
The broadening use of social media, messaging and other non-work related applications introduce a variety of vectors for viruses, spyware, worms and other types of malware. Palo Alto Networks next-generation firewalls allow you to block unwanted applications with App-ID, and then scan allowed applications for malware. - IPS
Today's attacks on your network use a combination of application vectors and exploits. Palo Alto Networks next-generation firewalls arm you with a two-pronged approach to stopping these attacks. Unwanted applications are blocked through App-ID, and the applications you choose to allow through are scanned for vulnerability exploits by our NSS-approved IPS engine. - Data Filtering & File Blocking
The application function level control, file blocking by type, and data filtering features of our next-generation firewalls allow you to implement a range of policies that help balance permitting the use of personal or non-work related applications, with the business and security risks of unauthorized file and data transfer. - Modern Malware Protection - WildFire: Protection from targeted and unknown threats.
Modern attackers are increasingly using targeted and new unknown variants of malware to sneak past traditional security solutions. To address this, Palo Alto Networks developed WildFire, which identifies new malware in minutes. By executing suspect files in a virtual environment and observing their behavior, Palo Alto Networks identifies malware quickly and accurately, even if the malware sample has never been seen before. Once a file is deemed malicious, WildFire automatically generates protections that are delivered to all WildFire subscribers within an hour of detection. A WildFire license provides your IT team with a wealth of forensics to see exactly who was targeted, the application used in the delivery, and any URLs that were part of the attack. - URL Filtering - Control Web Activity with URL Filtering.
The perfect complement to the policy-based application control provided by App-ID is our on-box URL filtering database, which gives you total control over related web activity. By addressing your lack of visibility and control from both an application and web perspective, App-ID and URL Filtering together protect you from a full spectrum of legal, regulatory, productivity, and resource utilization risks. - Mobile Security
Mobile computing is one of the most disruptive forces in information technology. It is revolutionizing how and where employees work, as well as the tools they use to perform their jobs. Mobile devices are not just ways to access existing applications such as corporate email, but the platform for opening up entirely new ways of doing business. Make sure that you have the proper security to extend your business applications and data to smartphones, tablets and laptops. Learn how to safely enable mobile devices by using GlobalProtect from Palo Alto Networks.
Networking Features
- Decryption - Identify & Control Encrypted Traffic.
Take control of your SSL and SSH encrypted traffic and ensure it is not being used to conceal unwanted activity or dangerous content. Using policy-based decryption and inspection, you can confirm that SSL and SSH are being used for business purposes only, instead of to spread threats or unauthorized data transfer. - IPv6 - Safely enabling applications, users and content in IPv6 environments.
Our next-generation firewalls allow you to deploy consistent, safe application enablement policies across IPv6, IPv4 and mixed environments. - Networking
Our flexible networking architecture includes dynamic routing, switching, and VPN connectivity, which enables you to easily deploy Palo Alto Networks next-generation firewalls into nearly any networking environment. - VPN - Standards-based VPN Connectivity.
Secure site-to-site and remote user connectivity is a critical infrastructure component. Every Palo Alto Networks next-generation firewall platform allows you to easily and securely communicate between sites using standards-based IPSec VPN connections. Remote user communications are protected through a rich set of VPN features. - Virtualization Security
The VM-Series supports the exact same next-generation firewall and advanced threat prevention features available in our physical form factor appliances, allowing you to safely enable applications flowing into, and across your private, public and hybrid cloud computing environments. Automation features and an API enable you to dynamically update security policies as your VM environment changes, eliminating potential security lag. The VM-Series supports the following hypervisors: VMWare ESXi and NSX, Citrix SDX, KVM (Centos/RHEL), Ubuntu, Amazon Web Services.
Management Features
- Centralized Management
The centralized management features in Panorama will minimize the administrative efforts and operational costs associated with your deployment of our next-generation firewalls in multiple locations – either internally or globally. Panorama allows your team to centrally manage all device aspects including configuration and policy deployment, visibility into applications, users and content as well as logging and reporting. - Device Management
Our firewall management philosophy is to make administrative tasks such as report generation, log queries, policy creation, and ACC browsing easy to execute and consistent, no matter which mechanism - web interface, Panorama, CLI or API - you use. - Policy Control - Secure Application Enablement.
The increased visibility into applications, users and content delivered by Palo Alto Networks simplifies figuring out which applications are traversing your network, who is using them, and the potential security risks. Armed with this data, you can apply secure enablement policies with a range of responses that are more finely tuned than the traditional 'allow or deny' approach. - Redundancy
Palo Alto Networks next-generation firewalls support a series of redundancy and resiliency features that ensure your firewall will continue to provide the secure application enablement you need to keep your business running. - Virtual Systems - Scalable Firewall Services With Virtual Systems.
Virtual systems are unique and distinct next-generation firewall instances within a single Palo Alto Networks firewall. Instead of deploying many individual firewalls, security service providers and enterprises can deploy a single pair of firewalls (high availability) and enable a series of virtual firewall instances (virtual systems). Each virtual system is an independent (virtual) firewall within your firewall that is managed separately and cannot -
Technical Specifications:
Highlights
- High availability with active/active and active/passive modes
- Redundant power input for increased reliability
- Fan-less design
- Simplified deployments of large numbers of firewalls through USB
Performance and Capacities1 PA-220 Firewall throughput (App-ID enabled)2, 4 500 Mbps Threat prevention throughput3, 4 150 Mbps IPsec VPN throughput2, 4 100 Mbps New sessions per second5 4,200 Max sessions 64,000 I/O (8) 10/100/1000 Management I/O (1) 10/100/1000 out-of-band management port, (1) RJ-45 console port (1) USB port (1) Micro USB console port Storage Capacity 32GB SSD Power Supply (Avg/Max Power Consumption) Dual redundant 40W (21W/25W) Max BTU/hr 102 BTU Input Voltage (Input Frequency) 100-240VAC (50-60Hz) Max Current Consumption Firewall—1.75A @ 12VDC Power supply (AC side)—0.5A @ 100VAC, 0.2A @ 240VAC Weight (Stand-Alone Device/As Shipped) 3.0 lbs / 5.4 lbs Safety cCSAus, CB EMI FCC Class B, CE Class B, VCCI Class B Certifications See: https://www.paloaltonetworks.com/company/certifications.html Environment Operating temperature: 32° to 104° F, 0° to 40° C Non-operating temperature: -4° to 158° F, -20° to 70° C Passive cooling
Paloaltonetworks PA-220
เขียนรีวิวสินค้าของคุณเอง