Datasheet: Sonicwall Supermassive Series

Total Page:16

File Type:pdf, Size:1020Kb

Datasheet: Sonicwall Supermassive Series SonicWall SuperMassive Series Uncompromising, high-performance, next-generation firewall protection for your enterprise network. The SonicWall SuperMassive Series is The RFDPI engine delivers full content SonicWall’s next-generation firewall inspection to eliminate various forms of (NGFW) platform designed for large malware before they enter the network networks to deliver scalability, reliability and provides protection against evolving and deep security at multi-gigabit threats — without file size, performance SuperMassive 9000 Series speeds with near zero latency. or latency limitations. Built to meet the needs of enterprise, The RFDPI engine also performs full Benefits: government, education, retail, healthcare decryption and inspection of TLS/SSL • Get complete breach prevention and service provider, the SuperMassive and SSH encrypted traffic as well as including high performance Series is ideal for securing distributed non-proxyable applications, enabling intrusion prevention, low latency enterprise networks, data centers and complete protection regardless of malware protection and cloud- service providers. transport or protocol. It looks deep inside based sandboxing every packets (the header and data part) The combination of SonicWall’s • Gain full granular application searching for protocol non-compliance, identification, control SonicOS operating system, patented* threats, zero-days, intrusions, and even and visualization Reassembly-Free Deep Packet defined criteria to detect and prevent ® Inspection (RFDPI) technology and attacks hidden inside encrypted traffic, • Find and block hidden threats with massively multi-core, highly scalable decryption and inspection of TLS/ cease the spread of infections, and SSL and SSH encrypted traffic, hardware architecture, the SuperMassive thwart command and control (C&C) without performance problems 9000 Series deliver industry-leading communications and data exfiltration. application control, intrusion prevention, Inclusion and exclusion rules allow total • Scale security performance for malware protection and TLS/SSL control to customize which traffic is 10/40 Gbps data centers decryption and inspection at multi- subject to decryption and inspection • Adapt to service-level increases gigabit speeds. The SuperMassive based on specific organizational and ensure network services Series is thoughtfully designed with compliance and/or legal requirements. and resources are available power, space and cooling (PSC) in mind, and protected providing the leading Gbps/watt NGFW Application traffic analytics enable in the industry for high performance the identification of productive and packet and data processing, application unproductive application traffic in real control and threat prevention. time, and traffic can then be controlled through powerful application-level The SonicWall RFDPI engine scans policies. Application control can be Partner Enabled Services every byte of every packet across all exercised on both a per-user and per- ports, delivering full content inspection group basis, along with schedules and Need help to plan, deploy of the entire stream while providing exception lists. All application, intrusion or optimize your SonicWall high performance and low latency. This prevention and malware signatures are solution? SonicWall technology is superior to proxy designs constantly updated by the SonicWall Advanced Services Partners that reassemble content using sockets Capture Labs threats research team. are trained to provide you bolted to anti-malware programs, Additionally, SonicOS, an advanced with world class professional which are plagued with inefficiencies purpose-built operating system, services. Learn more at and the overhead of socket memory provides integrated tools that allow thrashing, which leads to high latency, for custom application identification www.sonicwall.com/PES. low performance and file size limitations. and control. *U.S. Patents 7,310,815; 7,600,257; 7,738,380; 7,835,361 Series lineup The SonicWall SuperMassive 9000 Series features 4 x 10-GbE SFP+, up to 12 x 1-GbE SFP, 8 x 1-GbE copper and 1 GbE management interfaces, with an expansion port for an additional 2 x 10- GbE SFP+ interfaces (future release). The 9000 Series features hot-swappable fan modules and power supplies. SuperMassive 9000 Series LCD SD card for 2 x 80Gb 12 x 1-GbE 8 x 1-GbE LCD Dual 4 x 10-GbE 8 x 1-GbE 8 x 1-GbE controls future use SSD SFP ports ports controls USB ports SFP+ ports SFP ports ports LCD Console 1 GbE management LCD Console Dual USB 1 GbE management 4 x 10-GbE display port interface display port ports interface SFP+ ports Dual hot- Expansion bay Two hot-swappable, swappable fans for future use redundant power supplies Expansion bay Dual hot- Two hot-swappable, for future use swappable fans redundant power supplies CAPABILITY 9200 9400 9600 9800 Processing cores 24 32 32 64 Firewall throughput 15 Gbps 20 Gbps 20 Gbps 31.8 Gbps Application inspection throughput 5 Gbps 10 Gbps 11.5 Gbps 23 Gbps Intrusion prevention system (IPS) throughput 5 Gbps 10 Gbps 11.5 Gbps 21.3 Gbps Anti-malware inspection throughput 3.5 Gbps 4.5 Gbps 5 Gbps 11 Gbps Maximum DPI connections 1.5 M 1.5 M 2.0 M 8.0 M DEPLOYMENT MODES 9200 9400 9600 9800 L2 bridge mode Yes Yes Yes Yes Wire mode Yes Yes Yes Yes Gateway/NAT mode Yes Yes Yes Yes Tap mode Yes Yes Yes Yes Transparent mode Yes Yes Yes Yes 2 Reassembly-Free Deep Packet streams through extensive and repeated is then advanced to represent the Inspection engine normalization and decryption in order position of the stream relative to these to neutralize advanced obfuscation and databases until it encounters a state of RFDPI is a single-pass, low latency evasion techniques that seek to confuse attack, or other “match” event, at which inspection system that performs detection engines and sneak malicious point a preset action is taken. In most stream-based, bi-directional traffic code into the network. cases, the connection is terminated analysis at high speed without proxying and proper logging and notification or buffering to effectively uncover Once a packet undergoes the necessary events are created. However, the engine intrusion attempts, malware and identify pre-processing, including TLS/SSL can also be configured for inspection application traffic regardless of port and decryption, it is analyzed against a single only or, in the case of application protocol. This proprietary engine relies proprietary memory representation detection, to provide Layer 7 bandwidth on streaming traffic payload inspection of multiple signature databases: management services for the remainder in order to detect threats at Layers intrusion attacks, malware, botnet and of the application stream as soon as the 3-7. The RFDPI engine takes network applications. The connection state application is identified. Packet assembly-based process Reassembly-free Deep Packet Inspection (RFDPI) CPU n n=1024 Packet Proxy Scanning disassembly SSL CPU 4 SSL Traffic in Traffic out Traffic in Traffic out CPU 3 CPU 2 When proxy Inspection time becomes full or Inspection capacity Inspection time Inspection capacity content too large, CPU 1 Less More files bypass Min Max Less More Min Max scanning. Reassembly-free packet scanning eliminates proxy and content size limitations. Competitive proxy-based architecture SonicWall stream-based architecture Extensible architecture for extreme connections on any core in the system, scalability and performance providing ultimate scalability and the ability to deal with traffic spikes. This The RFDPI engine is purposely designed approach delivers extremely high new with a keen focus on providing security session establishment rates (new conn/ scanning at a high level of performance, sec) while deep packet inspection is to match both the inherently parallel enabled — a key metric that is often a and ever growing nature of network bottleneck for data center deployments. traffic. When combined with multi-core processor systems, this parallelism- centric software architecture scales up perfectly to address the demands of deep packet inspection (DPI) at high traffic loads. The SuperMassive platform relies on processors that, unlike x86, are optimized for packet, crypto and network processing while retaining flexibility and programmability in the field — a weak 12 x 1 GbE SFP SM interconnect point for ASICs systems. This flexibility is essential when new code and behavior updates are necessary to protect against new 4 x 10 GbE SFP+ attacks that require updated and more sophisticated detection techniques. Another aspect of the platform design multi-core is the unique ability to establish new 3 Capture Labs effect immediately without reboots The dedicated, in-house SonicWall or interruptions. The signatures on Capture Labs threats research the appliances protect against wide team researches and develops classes of attacks, covering up to tens countermeasures to deploy to customer of thousands of individual threats with a firewalls for up-to-date protection. The single signature. team gathers data on potential threat In addition to the countermeasures on data from several sources including our the appliance, SuperMassive firewalls award-winning network sandboxing also have access to the SonicWall Protection Collection service, Capture Advanced Threat CloudAV1, which extends the onboard Protection, as well as more than 1 million signature intelligence with tens of SonicWall sensors located around the millions of signatures, and growing LABS globe that
Recommended publications
  • Sonicwall Network Security Appliance (Nsa) Series
    SonicWall Network Security appliance (NSa) series Industry-validated security effectiveness and performance for mid-sized networks, distributed enterprises and data centers The SonicWall Network Security sophisticated attacks where the appliance (NSa) series provides malware’s weaponry is exposed for less organizations that range in scale from than 100 nanoseconds. In combination, mid-sized networks to distributed SonicWall’s patented* single-pass enterprises and data centers with Reassembly-Free Deep Packet advanced threat prevention in a high- Inspection (RFDPI) engine examines performance security platform. Utilizing every byte of every packet, inspecting Benefits: innovative deep learning technologies in both inbound and outbound traffic on • Superior threat prevention the SonicWall Capture Cloud Platform, the firewall. By leveraging the SonicWall and performance the NSa series delivers the automated Capture Cloud Platform in addition to • Patent-pending real-time deep real-time breach detection and on-box capabilities including intrusion memory inspection technology prevention organizations need. prevention, anti-malware and web/URL filtering, the NSa series blocks even the • Patented reassembly-free deep packet inspection technology Cutting-edge threat prevention with most insidious threats at the gateway. superior performance • On-box and cloud-based threat Further, SonicWall firewalls provide prevention Today’s network threats are highly complete protection by performing evasive and increasingly difficult to • TLS/SSL decryption and inspection full decryption and inspection of TLS/ identify using traditional methods of SSL and SSH encrypted connections • Industry-validated security detection. Staying ahead of sophisticated effectiveness regardless of port or protocol. The attacks requires a more modern firewall looks deep inside every packet • Multi-core hardware architecture approach that heavily leverages security (the header and data) searching for intelligence in the cloud.
    [Show full text]
  • Sonicwall TZ Series (Gen 7)
    SonicWall TZ Series (Gen 7) Integrated SD-Branch platform for next-gen SMBs & branches The latest SonicWall TZ series, are the first desktop form HIGHLIGHTS factor next-generation firewalls (NGFW) with 10 or 5 • 10/5/2.5/1 GbE interfaces in a Gigabit Ethernet interfaces. The series consist of a wide desktop form factor range of products to suit a variety of use cases. • SD-Branch ready Designed for small, mid-sized organizations and • Secure SD-WAN capability distributed enterprise with SD-Branch locations, the 7th generation (Gen 7) TZ series delivers industry-validated • SonicExpress App onboarding security effectiveness with best-in-class price- • Zero-Touch Deployment performance. These NGFWs address the growing trends • Single-pane-of-glass-management through in web encryption, connected devices and high-speed cloud or firewall mobility by delivering a solution that meets the need for automated, real-time breach detection and prevention. • SonicWall Switch, SonicWave Access Point and Capture Client integration • Built-in and expandable storage • Redundant power • High port density • Cellular failover • SonicOS 7.0 • TLS 1.3 support • Groundbreaking performance • High connection count • Fast DPI performance • Low TCO TZ Series (Gen 7) Spec Preview. View full specs » Find the right SonicWall solution for Max Threat your business: Prevention Max Ports Throughput Connections 2.5 Gbps 1.5 Million 8x1GbE, sonicwall.com/TZ 2x2.5/5/10GbE DATASHEET “The TZ570 is easy to onboard, use, and manage, and has an easy wizard and clear menus. I love to use SonicWall products, and really appreciate the support which SonicWall has extended.” — Gaurav Pandey, Head IT, Delhivery Read case study » The Gen 7 TZ series are highly scalable, with high port integrated SD-WAN, TLS 1.3 support, real-time visualization, density of up to 10 ports.
    [Show full text]
  • Dell Sonicwall Supermassive Next-Generation Firewall Series
    Dell SonicWALL SuperMassive Next-Generation Firewall Series Network security The Dell™ SonicWALL™ SuperMassive™ limitations. The RFDPI engine delivers Series is Dell’s Next-Generation Firewall full content inspection to eliminate (NGFW) platform designed for large threats before they enter the network networks to deliver scalability, reliability and provides protection against millions and deep security at multi-gigabit of unique malware variants without file speeds with near zero latency. size, performance or latency limitations. SuperMassive E10000 Series The RFDPI engine also provides full Built to meet the needs of enterprise, inspection of SSL-encrypted tra!c as government, university, and service well as non-proxyable applications provider deployments, the SuperMassive enabling complete protection Series is ideal for securing enterprise regardless of transport or protocol. networks, data centers and service SuperMassive 9000 Series providers. Application tra!c analytics allow for the identification of productive and Combining its massively multi-core unproductive application tra!c in real Ŕ$PNQMFUFUISFBUQSPUFDUJPO architecture and Dell SonicWALL’s time which can then be controlled JODMVEJOHIJHIQFSGPSNBODF patented* Reassembly-Free Deep through powerful application-level JOUSVTJPOQSFWFOUJPOBOEMPX ® Packet Inspection (RFDPI) technology, policies. Application control can be MBUFODZNBMXBSFQSPUFDUJPO the SuperMassive E10000 and 9000 exercised on both a per-user and Ŕ4VQFSJPSHSBOVMBSBQQMJDBUJPO Series deliver industry-leading application per-group basis, along with schedules JOUFMMJHFODF DPOUSPMBOE control, intrusion prevention, malware and exception lists. All application, WJTVBMJ[BUJPO protection and SSL inspection at multi- intrusion prevention, and malware gigabit speeds. The SuperMassive Series signatures are constantly updated Ŕ'VMMJOTQFDUJPOPG44-FODSZQUFE is designed with power, space, and by the Dell SonicWALL Threats Research USBťDXJUIPVUPWFSIFBE MBUFODZ cooling (PSC) in mind, providing the Team.
    [Show full text]
  • Sonicwall Network Security Appliance (NSA) Series
    SonicWALL Network Security Appliance (NSA) Series Industry-validated security effectiveness and performance for mid-sized networks The Dell SonicWALL Network Security SonicWALL NGFWs provide a further Appliance (NSA) series provides level of protection by decrypting mid-sized networks, branch offices and inspecting SSL/TLS encrypted and distributed enterprises with web traffic for hidden threats in real advanced threat prevention in a time. With the continued growth of high-performance security platform. encrypted web traffic, organizations Combining next-generation firewall are effectively blind to an estimated technology with our patented* one-third of their network traffic. Reassembly-Free Deep Packet This makes SSL/TLS decryption and Benefits: Inspection (RFDPI) engine on a inspection a critical component of any multi-core architecture, the NSA series security solution. Superior threat prevention and offers the security, performance and performance control organizations require. When organizations activate deep • Patented reassembly-free deep packet inspection functions such as packet inspection technology Superior threat prevention intrusion prevention, anti-virus, anti- • On-box and cloud-based and performance spyware, SSL decryption/inspection threat prevention and others on their firewalls network NSA series next-generation firewalls performance often slows down, • SSL/TLS decryption and inspection (NGFWs) integrate a series of advanced sometimes dramatically. NSA series security technologies to deliver a firewalls feature a multi-core hardware • Industry-validated security superior level of threat prevention. architecture that utilizes specialized effectiveness Our patented single-pass RFDPI security microprocessors. Combined • Multi-core hardware architecture threat prevention engine examines with our RFDPI engine, this unique every byte of every packet, inspecting • Dedicated in-house threat design eliminates the performance research team both inbound and outbound traffic degradation networks experience with simultaneously.
    [Show full text]
  • Sonicwall Gen 7 Nsa Series
    SonicWall Gen 7 NSa Series SonicWall Generation 7 (Gen 7) Network Security HIGHLIGHTS Appliance (NSa) next-generation firewalls (NGFWs) offers • 1 RU – Form Factor medium- to large-sized enterprises industry-leading performance at the lowest total cost of ownership • Support for 40G/25G/10G/5G/2.5G/1G ports in their class. • Multi-gigabit Threat and Malware Analysis Throughput With comprehensive security features such as intrusion prevention, VPN, application control, malware analysis, • Superior TLS performance (sessions URL filtering, DNS Security, Geo-IP and Bot-net services, and throughput) it protects the perimeter from advanced threats without • Expandable storage becoming a bottleneck. • Enterprise Internet Edge Ready • Latest Generation 7 SonicOS support • Secure SD-WAN capability • Intuitive single pane of glass management • TLS 1.3 support • Best-in-class price-performance • Fast DPI performance • Low TCO in its class • High port density for easy networking • SonicWall Switch, SonicWave Access Point and Capture Client integration • Redundant power Gen 7 NSa Series Spec Preview. View full specs » Find the right SonicWall solution for Up to Up to 40G/25G/10G/ 19 Gbps 8 Million 5G/2.5G/1G your enterprise: Threat Prevention Connections Ports Throughput sonicwall.com/products DATASHEET Featuring a high port density including multiple 40 GbE and 10 GbE ports, the solution supports network and hardware redundancy with high availability, and dual power supplies. SonicWall Generation 7 (Gen 7) Network Security Appliance (NSa) next-generation firewalls (NGFWs) offers medium- to large-sized enterprises industry-leading performance at the lowest total cost of ownership in their class. With comprehensive security features such as intrusion prevention, VPN, application control, malware analysis, URL filtering, DNS Security, Geo-IP and Bot-net services, it protects the perimeter from advanced threats without becoming a bottleneck.
    [Show full text]
  • Sonicwall Product Lines
    SonicWall product lines Overview SonicWall offers comprehensive, complementary product lines in each of the following areas: Secure your organization’s systems, users and data with a deep level of protection that won’t compromise network • Network security performance. SonicWall wired and wireless security solutions are deployed in 200 countries by more than 250,000 customers, • Access security ranging from small and mid-sized businesses, to large • Email security and encryption enterprise environments, government, retail point-of-sale, education, healthcare and service providers. • Management and reporting Network security products • Malware protection centers, carriers and service provider deployments, SuperMassive E10000 • Application intelligence, control and SonicWall is one of the leading providers firewalls set the standard for high- real-time visualization of next-generation firewalls (NGFWs). performance application control and The proven SonicOS firmware is at the • Deep packet inspection of SSL- threat prevention. core of every SonicWall NGFW. SonicOS encrypted sessions (DPI-SSL) leverages our scalable, multi-core The SuperMassive 9000 series ensures hardware architecture and our patented*, • Virtual private networking (VPN) the security, performance and scalability single-pass, low-latency, Reassembly- over SSL or IPSec demanded by today’s enterprises, Free Deep Packet Inspection® (RFDPI) government agencies and universities engine that scans all traffic regardless of • Wireless security with 10+ GB infrastructures. Offering port or protocol. • Stateful failover/failback high-core-density architecture in an efficient one-rack appliance, Our NGFWs ensure that every byte Moreover, by leveraging the unique SuperMassive 9000 firewalls save of every packet is inspected, while SonicWall Global Response Intelligent valuable rack space and reduce power maintaining the high performance and Defense (GRID) worldwide attack and cooling costs.
    [Show full text]
  • Sonicwall Secure Mobile Access (Sma)
    SONICWALL SECURE MOBILE ACCESS (SMA) Secure anywhere, anytime access to corporate resources across multi- cloud environments based on user and device identity, location and trust. SonicWall SMA is a unified secure access Managed service providers Benefits: gateway that enables organizations to For either organizations hosting their own provide anytime, anywhere and any infrastructure or for managed service • Unified access to all network and cloud resources for “any time, any device, any device access to mission critical corporate providers, SMA provides turnkey solution application” secure access resources. SMA’s granular access control to deliver a high degree of business • Control who has access to what resources policy engine, context aware device continuity and scalability. SMA can support by defining granular policies with the robust authorization, application level VPN and up to 20,000 concurrent connections access control engine advanced authentication with single on a single appliance, with the ability to • Increase productivity by delivering federated sign-on empowers organizations to scale upwards of hundreds of thousands single sign-on to any SaaS or locally hosted embrace BYOD and mobility in a multi- users through intelligent clustering. Data application with a single URL cloud environment. centers can reduce costs with active-active • Lower TCO and reduce complexity of access clustering and a built-in dynamic load management by consolidating infrastructure Mobility and BYOD balancer, which reallocates global traffic to components in a hybrid IT environment For organizations wishing to embrace the most optimized data center in real- • Gain visibility into every connecting device BYOD, flexible working or third party time based on user demand.
    [Show full text]
  • Datasheet: Sonicwall Global Management System
    SONICWALL GLOBAL MANAGEMENT SYSTEM Comprehensive security management, monitoring, reporting and analytics A winning security management strategy analytics, forensics and audit reporting. Benefits: demands deep understanding of the This forms the foundation of a security • Establishes a unified security security environment to promote better governance, compliance and risk governance, compliance and risk policy coordination and decisions. Not management strategy. The feature-rich management security program having an enterprise-wide view of the full GMS platform gives distributed security construct often leaves enterprises, service providers and other • Adopts a coherent and auditable organizations at risk to preventable organizations a fluid, holistic approach approach to security orchestration, cyber-attacks and compliance violations. to unifying all operational aspects of forensics, analytics and reporting Using numerous tools running on their security environment. With GMS, • Reduces risk and provide a fast different platforms and reporting data in security teams can easily manage response to security events different formats make security analytics SonicWall firewall, wireless access • Provides an enterprise-wide view of and reporting operationally inefficient. point, email security and secure mobile the security ecosystem This further impairs the organization’s access solutions, as well as third-party ability to quickly recognize and respond network switch solutions. This is all • Automates workflows and assures to security risks. Organizations must done via a controlled and auditable security operation compliance establish a systematic approach to work-stream process to keep networks • Operationalize firewalls at remote and governing the network security sharp, safe and compliant. GMS branch offices in four easy steps with environment to overcome includes centralized policy management Zero-Touch Deployment these challenges.
    [Show full text]
  • Your Expert Guide to Unified Threat Management
    E-guide Unified Threat Management Buyer’s Guide Your expert guide to unified threat management E-guide In this e-guide Introduction to unified threat management Introduction to UTM appliances appliances How UTM products can benefit Ed Tittel your enterprise network environment Expert Ed Tittel describes unified threat management (UTM) 6 criteria for buying UTM tools appliances and features, and explains its advantages to organizations of all sizes. Comparing the best UTM products in the industry A unified threat management (UTM) system is a type of network hardware Check Point appliance, virtual appliance or cloud service that combines and integrates several security technologies -- typically, a firewall, intrusion prevention system Cisco Meraki MX (IPS), antimalware, virtual private networking (VPN) and Web/content filtering. Dell SonicWALL NSA UTM virtual appliances and cloud services are gaining in popularity. Both types Fortinet FortiGate of UTM eliminate the need for an on-premises appliance, but still offer centralized control and ease of use. However, this article focuses on UTM Sophos SG Series appliances. WatchGuard Unified threat management appliances simplify management by granting network administrators use of an integrated interface to configure and maintain each component. Centralized control also reduces complexity and the likelihood of errors because the details of each component are clearly visible on a Page 1 of 70 E-guide dashboard. An administrator can react quickly to performance issues as they In this e-guide arise, and can monitor how changes affect other components. Plus, organizations realize lower overall costs compared to acquiring each Introduction to UTM appliances component separately, and they can produce cohesive compliance reports when required by regulations, such as Health Insurance Portability and How UTM products can benefit your enterprise network Accountability Act, Sarbanes-Oxley Act and so on.
    [Show full text]
  • Sonicwall Network Security Appliance (NSA) Series Industry-Validated Security Effectiveness and Performance for Mid-Sized Networks
    SonicWall Network Security Appliance (NSA) series Industry-validated security effectiveness and performance for mid-sized networks The SonicWall Network Security Going beyond intrusion prevention, Appliance (NSA) series provides anti-malware and web filtering, midsized networks, branch offices and SonicWall NGFWs provide a further distributed enterprises with advanced level of protection by performing full threat prevention in a high-performance decryption and inspection of TLS/SSL security platform. Combining next- and SSH encrypted traffic as well as generation firewall technology with non-proxyable applications, enabling our patented* Reassembly-Free Deep complete protection regardless of Packet Inspection (RFDPI) engine on a transport or protocol. It looks deep Benefits: multi-core architecture, the NSA series inside every packets (the header and Superior threat prevention offers the security, performance and data part) searching for protocol and performance control organizations require. non-compliance, threats, zero-days, intrusions, and even defined criteria to • Patented reassembly-free deep packet inspection technology Superior threat prevention and detect and prevent hidden attacks that performance leverage cryptography, block encrypted • On-box and cloud-based threat NSA series next-generation firewalls malware downloads, cease the spread prevention (NGFWs) integrate a series of advanced of infections, and thwart command • SSL/TLS decryption and inspection security technologies to deliver a and control (C&C) communications • Industry-validated security superior level of threat prevention. and data exfiltration. Inclusion and effectiveness Our patented single-pass RFDPI exclusion rules allow total control to threat prevention engine examines customize which traffic is subjected to • Multi-core hardware architecture decryption and inspection based on every byte of every packet, inspecting • Dedicated in-house threat both inbound and outbound traffic specific organizational compliance and/ research team simultaneously.
    [Show full text]
  • 12 Ways Unified Threat Management Firewalls Are Driving Security Consolidation UTM Devices Are Engineered T
    The FactPoint Group: 12 Ways Unified Threat Management Firewalls are Driving Security Consolidation UTM devices are engineered to reduce risk, cost and complexity, ensuring the strongest defense posture with minimal IT intervention. CONTENTS Introduction 2 What is Unified Threat Management 2 The Demise of the Security Appliance 3 The Changing Security Environment 4 What’s Driving Security Consolidation? 4 12 Ways UTM Devices Deliver… 5 - Great productivity by reducing complexity - Boost security effectiveness - Lower costs The Bottom Line on Security Consolidation 7 Tim Clark, Partner The FactPoint Group 349 First St., Suite A Los Altos, CA 94022 (650) 233 1748 [email protected] Introduction Just as virtualization has boosted server consolidation in data centers, so too are technology changes spurring consolidation of single-application security appliances on corporate networks Instead of one appliance per application, security consolidation aggregates multiple interconnected security applications on a single piece of hardware. This super-appliance goes by the name of Unified Threat Management or UTM. The point security appliance, once the paradigm for enterprise security with ease, has gone from being part of a solution to becoming part of the problem. In a simpler time, the security firewall or virtual private network (VPN) appliance was considered an elegant solution. Plug it in, configure it, and let it run. But the standalone security appliance is no longer viewed as a simple, tidy box for a specific security threat. Changes in both security threats and corporate environments have transformed thinking. Each separate security appliance requires “A lot of companies have configuration, licensing, license management, specific IT training, disparate solutions.
    [Show full text]
  • Sonicwall Mobile Connect
    SONICWALL MOBILE CONNECT Simple, identity-based and policy-enforced secure access to company resources, applications and data for iOS, MacOS, Android, Chrome OS, Kindle Fire and Windows 10 devices. Give your employees safe, easy access to Features and benefits Benefits: the data and resources they need to be Ease of use • Ease of use productive from any device, running iOS, OS X, Android™, Chrome OS, Kindle Fire iOS, OS X, Windows 10, Android, Chrome • Centralized policy management and Windows. At the same time, ensure OS and Kindle users can easily download • Verification of both user and device that the corporate network is protected and install the Mobile Connect app via • Easy access to appropriate resources from mobile security threats. the App Store™, Google Play, Chrome Web Store, Amazon App Store, or • Malware protection The SonicWall Mobile Connect™ Windows Store. application works in combination with • Mobile device registration and authorization management SonicWall Secure Mobile Access (SMA) Centralized policy management or next-generation firewall appliances. IT can provision and manage user and • Per-application VPN Mobile workers simply install and launch device accessing via SonicWall appliances • One-click secure intranet the Mobile Connect application on — including control of data, resources and file browsing and on-device their mobile device to establish a secure applications hosted on-prem or in the data protection connection to an SMA or next-generation cloud — through a single management • Auto-launch VPN firewall appliance. The encrypted SSL VPN interface. Unlike other VPN solutions, the connection will protect traffic from being SonicWall solution allows you to quickly • Easy integration intercepted and keep in-flight data secure.
    [Show full text]