Firewall ideale per soluzioni di Security Converged per Piccole & Medie imprese.

E' il primo firewall al mondo che integra completamente la tecnologia NGFW + WAF (Web Application Firewall) con difesa pre-evento, durante l'evento e post-evento per tutti
beni aziendali.
Una soluzione firewall veramente integrata, che offre una panoramica olistica dell'intera rete di sicurezza dell'organizzazione, con facilità di gestione per l'amministrazione,
operazione e manutenzione.


Specifiche Tecniche:
Profile:
Desktop

Network Interfaces:
3 x 10/100/1000 Bas-T
1 x Management port Rj-45
2 x USB port

RAM:
2Gb

HD Capacity:
SSD32Gb

Firewall Throughput:
1.5Gbps

IPS Throughput (HTTP):
950Gbps

IPsec VPN Throughput:
200Mbps

Max IPsec VPN Tunnels:
300

Concurrent Connections (TCP):
250.000

New Connections(TCP):
15.0000

Power[Watt] (Typical):
60Watt

Peso:
1.5Kg

Dimensioni:
275×175×44.5 mm

Caratteristiche e applicazioni:
• Networking
- Policy routing, static routing, RIP v1/2 and OSPF.
- Application policy-based forwarding, NAT, VLAN tagging.
- IPV6 & IPV4 supported.

• Firewall
- Intelligent Dos/ DDos prevention.
- ARP spoofing prevention.
- SSL VPN & IPsec VPN.

Threats Prevention
• Full SSL inspection
- SSL inspection to all security modules including IPS, WAF, ATP, Access control, etc.
• Cross-module intelligent correction
- Policy association of IPS, WAF and APT prevention modules.
- Cross-module visibility reporting analysis.
• Threats prevention
- APT (Advanced Persistent Threat), Remote Access Trojan, Botnet, malware detection.
- Cloud-based Sandbox threats analysis.
- Anti-Malware signature database, covering threats type of Trojan, AdWare, Malware, Spy, Backdoor, Worm, Exploit, Hacktool, Virus, etc.
• Anti-virus
- Scan and kill viruses infecting HTTP, FTP, SMTP and POP3 trac as well as viruses infecting compressed data packets.
- Support remove virus from detected malicious files.
• Email security
- Categorize and filter various forms of malicious emails.
- Support detection deep into email body and attachments.
- Support place warning messages into email title to avoid users from opening malicious emails.

IPS
• IPS signature database
- Prevention against vulnerability exploits towards various system, application, middleware, database, explorer, telnet, DNS, etc.
- Employ cloud-based analysis engine.
- Allow custom IPS rules.
• Certificate and partnership
- Common Vulnerabilities and Exposures (CVE) compatibility certificated.
- Microsoft Active Protections Program (MAPP) partnership.

Risk Assessment and Security Service
• Risk assessment
- Scan and identify security loopholes such as open port, system vulnerabilities,weak passwords, etc.
• Web scanner
- On-demand scanning of targeted website/URL to discover the system vulnerabilities.
• Real-time vulnerability scanner
- Discover vulnerabilities in real-time while guarantee zero aection to the protected system.
• SANGFOR threat intelligence service
- Threat intelligence to deliver the latest vulnerabilities, malware and security incidents information with advisory alerts for policy creation.

Web Application Firewall
• Web-based attack prevention
- Defend against the 10 major web-based attacks identified by the Open Web

Application Security Project (OWASP).
- Web-based attack rules database.
- Support custom WAF rules.
• Parameters protection
- Proactive protection of automatic parameter learning.
Web Application Firewall
• Application hiding
- Hide the sensitive application information to prevent hackers from mounting targeted attacks with the feedback information from the applications.
• Password protection
- Weak password detection and brute-force attack prevention.
• Privilege control
- File upload restriction of file type blacklist.
- Specify access privilege of sensitive URL such as the admin page for risk prevention.
• Buer overflow detection
- Defend against buer overflow attacks.
• Detection of HTTP anomalies
- Analyzes anomalies of the fields of the HTTP protocol via single parsing.
• Secondary authentication for server access
- Server access verification by IP address restriction and mail authentication.

Data Leakage Prevention
• Data leakage detection and prevention
- Control and detection over multiple types of sensitive information including user information, email account information, MD5 encrypted passwords, bank card numbers, identity card numbers, social insurance accounts, credit card numbers, and mobile phone numbers.
• File downloading control
- Restrict suspicious file downloading.

User Access Management
• User identity:
- Mapping by IP, MAC, IP/MAC binding, hostname and USB-Key. User account import from CSV file and LDAP Server.
- SSO integration with AD domain, proxy, POP3 and WEB.
• Internet content classfication
- Cloud-based URL/APP classification engine.
• Access control
- Policy configuration oriented toward users and applications for web filter, application control and bandwidth management.

Deployment
• Configuration Wizard
- Guideline for deployment and policy configuration.
• Deployment
- Gateway (Route mode) | Bridge mode | Bypass mode | Multiple Bridge mode (2- 4 bridges).
• High Availability
- Active-Active | Active-Passive.
• Bypass
- Hardware bypass in the event of hardware failure.
• Central Management
- Support central management of multiple NGAFs.

Garanzia:
1 anno di garanzia con Pick UP & Return