ตะกร้า 0

Palo Alto Networks รุ่นใหญ่

ดูในมุมมอง ตาราง รายการ

4 รายการ

ตั้งค่าเรียงจากน้อยไปมาก
ต่อหน้า
  1. Paloaltonetworks PA-3220

    Features:

    • 5 Gbps firewall throughput (App-ID enabled1)
    • 2.2 Gbps Threat Prevention throughput2
    • 2.5 Gbps IPsec VPN throughput
    • 1,000,000 sessions
    • 58,000 new sessions per second3
    • 4,000 IPsec VPN tunnels/tunnel interfaces
    • 1,024 SSL VPN Users
    • 10 virtual routers
    • 1/6 virtual systems (base/max4)
    • 60 security zones
    • 2,500 max number of policies
    ฿0.00
  2. Paloaltonetworks PA-3250

    Features:

    • 6.3 Gbps firewall throughput
      (App-ID enabled1)
    • 3 Gbps Threat Prevention throughput2
    • 3.2 Gbps IPsec VPN throughput
    • 2,000,000 sessions
    • 94,000 new sessions per second3
    • 6,000 IPsec VPN tunnels/tunnel interfaces
    • 2,048 SSL VPN Users
    • 10 virtual routers
    • 1/6 virtual systems (base/max4)
    • 60 security zones
    • 5,000 max number of policies
    ฿0.00
  3. Paloaltonetworks PA-3260

    Features:

    • 8.8 Gbps firewall throughput1
      (App-ID enabled1)
    • 4.7 Gbps Threat Prevention throughput2
    • 4.8 Gbps IPsec VPN throughput
    • 3,000,000 max sessions
    • 135,000 new sessions per second3
    • 6,000 IPsec VPN tunnels/tunnel interfaces
    • 2,048 SSL VPN Users
    • 10 virtual routers
    • 1/6 virtual systems (base/max4)
    • 60 security zones
    • 5,000 max number of policies
    ฿0.00
  4. Paloaltonetworks PA-5220

    Key Security Features:

    Classifies all applications, on all ports, all the time

    • Identifies the application, regardless of port, encryption (SSL or SSH), or evasive technique employed
    • Uses the application, not the port, as the basis for all of your safe enablement policy decisions: allow, deny, schedule, inspect and apply traffic-shaping
    • Categorizes unidentified applications for policy control, threat forensics or App-ID™ application identification technology development

    Enforces security policies for any user, at any location

    • Deploys consistent policies to local and remote users running on the Windows®, Mac® OS X®, Linux®, Android™ or Apple® iOS platforms
    • Enables agentless integration with Microsoft® Active Directory® and Terminal Services, LDAP, Novell® eDirectory™ and Citrix®
    • Easily integrates your firewall policies with 802.1X wireless, proxies, NAC solutions, and any other source of user identity information

    Prevents known and unknown threats

    • Blocks a range of known threats, including exploits, malware and spyware, across all ports, regardless of common threat-evasion tactics employed
    • Limits the unauthorized transfer of files and sensitive data, and safely enables non-work-related web surfing
    • Identifies unknown malware, analyzes it based on hundreds of malicious behaviors, and then automatically creates and delivers protection
    ฿0.00
ดูในมุมมอง ตาราง รายการ

4 รายการ

ตั้งค่าเรียงจากน้อยไปมาก
ต่อหน้า