Check Point 500 UTM Frequently Asked Questions

Size: px
Start display at page:

Download "Check Point Safe@Office 500 UTM Frequently Asked Questions"

Transcription

1 For internal use only Check Point 500 UTM Frequently Asked Questions Business Related Questions What are appliances? Designed specifically to meet the needs of small businesses, Check Point 500 Unified Threat Management (UTM) appliances deliver proven Internet security by incorporating Check Point patented technology. 500 UTM appliances can protect networks of up to 100 users from a multitude of Internet threats such as viruses, hacking attempts, denial of service attacks and phishing. Safe@Office 500 UTM Wireless (W) appliances integrate a Wireless LAN access point, delivering the same security found in Safe@Office 500 appliances together with the highest levels of security for wireless networks. The Safe@Office 500 UTM wired and wireless models are also available with an integrated ADSL2/2+ modem, thus meeting small businesses needs for connectivity and network security out-of-the-box. Who are the target customers for Safe@Office 500 UTM appliances? Safe@Office 500 UTM customers are small to medium businesses (1-100 users) that need a comprehensive, all-in-one security solution, and Managed Security Service Providers (MSSPs) who offer outsourced network and security management services to small-medium businesses. Vertical markets include: - Retail, Hospitality (hotels, restaurants, coffee shops) - Healthcare - Finance/ Investment Firms - Insurance & Law Firms - Government / Municipality entities Who are the primary decision makers? For most small businesses, the CEO/President/Owner is the primary decision maker (in many cases acting also as an IT manager). For larger businesses (~30 employees and up), a part-time/full-time IT manager may be onsite, making him/her the key decision maker. In this case, key influencers are the CEO/President/Owner. Why is integrated security so important for small businesses? Small businesses face a variety of IT related challenges, including network security threats, networking and connectivity issues and regulation compliancy. This is a challenge for most small businesses as they usually have only limited IT resources and no dedicated security expert, even though they are just as dependent on their network as large Enterprises. The lack of dedicated IT staff, limited IT budgets and a lower level of awareness regarding network security threats, makes small businesses susceptible to cyber-attacks and internet threats. For these reasons, small businesses can greatly benefit from an Check Point Software Technologies Ltd. All rights reserved. 1

2 affordable, easy-to-use, all-in-one security solution that is based on proven and tested Check Point technology. What Business Problems do Appliances solve? appliances address key security, networking and connectivity pain points: Enable employees (teleworkers, road-warriors) and business partners to securely access information from remote with IPSec VPN Reduce downtime and abuse of business resources Simplify ongoing security management and administration Facilitate compliance with industry-specific network security regulations (PCI-DSS, HIPAA etc.) Who are the main competitors in this market? SonicWall (TZ product line), Fortinet (FortiGate/FortiWifi 50/60), WatchGuard (Firebox X Edge e-series), Juniper (SSG5/20 and Netscreen 5GT), Cisco (PIX and ASA5505). What is the difference between UTM-1 Edge appliances and Safe@Office appliances? UTM-1 Edge appliances are typically employed by Enterprises in-order to secure their branch-offices and remote sites, as part of a centrally managed deployment using Check Point SMART management solutions (SmartCenter, SmartLSM, Provider-1 ). On the other hand, Safe@Office 500 UTM appliances target small businesses with one or more sites, where each site is a standalone deployment either managed locally, or centrally managed via SMP /SMP On-Demand. Safe@Office appliances cannot be managed by SmartCenter, SmartLSM, or Provider-1. UTM-1 Edge / Safe@Office Comparison UTM-1 Edge Safe@Office 500 User count 8,16,32,Unlimited 5,25,Unlimited Enhanced networking & security features Yes (built-in) Optional (Requires PowerPack upgrade) Integrated WiFi access-point and/or ADSL modem Yes (optional) Yes (optional) List Price Starts at $600 Start at $299 Complementary Products and Services Central Management Support & Software Subscription UTM-1 Edge Safe@Office 500 Check Point SMART Management SMP, SMP On-Demand (SmartCenter,SmartLSM,Provider- 1, SMP, SMP On-Demand) Purchase CES contract Purchase Safe@Office Basic Support contract or purchase services from Small-Business MSSP partners 2

3 Antivirus Updates Service Web Filtering Service Purchase Antivirus Updates Service for UTM-1 Edge Use 3rd party OPSEC web filtering server such as SurfControl Purchase AntiVirus, Support & Subscription contract or purchase services from Small- Business MSSP partners Purchase the SofaWare Web Filtering Annual Subscription or purchase services from Small-Business MSSP partners Reporting Use Check Point Eventia Monthly reports are delivered as part of the Basic Support Plan or purchase services from Small- Business MSSP partners Product Questions What is the difference between 500 and 500W? The W Series appliances integrate a Wireless LAN access point supporting the b/g/Super G standards. For additional information regarding the WLAN capabilities, please refer to the Safe@Office 500 datasheet via the following link: What types of add-on services are available for Safe@Office appliances? Customers can add the following: One of the following annual support plans: Basic Support and Services plan with: Security and firmware updates; , web and chat support; Advanced replacement and Dynamic DNS Advanced Support and Services plan with Security and firmware updates; , web and chat support; Advanced replacement; Dynamic DNS; Gateway antivirus updates and SmartDefense updates Annual category-based URL filtering services - integrated Web filtering using an extensive database of threat categories and associated URLs. A web-access policy can be defined to protect from threats such as spyware and viruses, as well as new risks from inappropriate web content, and to improve employee productivity by limiting access to specific content. License upgrades (number of users) What Safe@Office appliances and upgrades/services are available? Users Safe@Office 500 CPSB-500G Safe@Office 500 Series Safe@Office 500W CPSB-500WG Safe@Office 500 ADSL CPSB-500G-ADSL Safe@Office 500W ADSL CPSB-500WG-ADSL 5 $299 $449 $399 $ $599 $749 $699 $849 Unlimited $999 $1149 $1099 $1249 3

4 Functionality Upgrades Power Pack CPSB-500-UPG-PPACK Upgrade from 5 Users to 25 Users CPSB-500-UPG-5TO25 Upgrade from 5 Users to Unlimited Users CPSB-500-UPG-5TOU Upgrade from 25 Users to Unlimited Users CPSB-500-UPG-25TOU List Price $499 $360 $760 $520 Support plans and additional services Users Annual 500 Support Plans Basic Support Plan Advanced Support Plan ST-CPSB STAV-CPSB Annual Category-based URL filtering Web Filtering WF-CPSB 5 $79 $179 $49 25 $99 $299 $199 Unlimited $199 $449 $299 For the full features table see For up-to-date pricing and SKUs see Are all Safe@Office models based on the same hardware? The base hardware of the Safe@Office appliances is the same, with the exception of support for Wireless and ADSL capabilities, as well as availability of USB ports for the Safe@Office 500W and ADSL models. All appliance versions can run the most recent Embedded NGX firmware. What features are included with the Power Pack? The Power Pack is an upgrade option that activates the following high-end security and networking features: 4

5 25 Remote Access VPN profiles (only 5 profiles without Power Pack) Unlimited Site-to-site VPN profiles (only 2 without Power Pack) Port-based and Tag-based VLAN (only available with Power Pack) Port-based Security (802.1x) (only available with Power Pack) Secure HotSpot (Guest Access) (only available with Power Pack) Automatic Gateway Failover (High Availability) (only available with Power Pack) Dynamic Routing (OSPF) (only available with Power Pack) Wireless Distribution System (WDS) (only available with Power Pack) Multiple Access Points (only 1 access point without Power Pack) Multiple bridge support (only 1 without Power Pack) Advanced Traffic Shaper (QoS) (basic Traffic Shaper without Power Pack, including four static preconfigured classes) The Power Pack upgrade is independent of the user count, that is, it can be installed on any Safe@Office 500/500W appliance, regardless of the number of users the appliance supports. For more information on the features included in the Power Pack upgrade, please refer to the following link: What happened to the Safe@Office 100, 200 and 400W models? These models are no longer available for purchase. Embedded NGX 7.0 firmware is available for all 400W, 200, 100B and 100C appliances with a valid software subscription plan. Is there any change to the service pricing for 100/200/400W models? Yes. Subscription pricing is updated as follows: 105/ / / U/425U Annual Support and Subscription $79 $89 $99 $199 Annual Support and Subscription with Antivirus and SmartDefense updates $179 $219 $299 $449 What central management platforms are supported by Safe@Office? For multi-site deployments, Safe@Office can be centrally managed by SMP or SMP On-Demand. Check Point Small-Business MSSP partners will use these management solutions to provide out-sourced security services. Do Safe@Office 500 UTM appliances support SmartDefense? Yes. A reduced feature set of the main SmartDefense updates relevant for small businesses is periodically available for Safe@Office with firmware updates. Does Safe@Office support cellular connectivity? Yes. Safe@Office supports comprehensive connectivity capabilities include extensive support for USBbased cellular modems (2G/3G), allowing various high availability deployments and connectivity in areas where regular Internet infrastructure is unavailable. Other USB modems (56K, ISDN) are also supported. 5

6 Does support QoS management? Yes. supports QoS through Traffic Shaping, which offers weighted priorities, guarantees and limits to ensure that business-critical traffic is given priority over non-critical traffic. Note that includes basic traffic shaping capabilities with preset levels. Advanced traffic shaping is available with the Power Pack upgrade. Does support VLANs? VLAN support is available with the Power Pack upgrade. This allows for the segmentation of internal networks into several virtual networks. It enables non-intrusive deployment into an existing VLAN configuration. Port-based and tag-based VLANs are supported: Port-based VLAN allows splitting the four LAN ports into four segmented networks Tag-based VLAN allows UTM-1 Edge to be connected to a switch via a VLAN trunk, thereby expanding port density Does Safe@Office support VPN access from within the internal network? Yes. Safe@Office supports an internal VPN server to provide VPN access from internal networks, such as wireless connectivity within the internal network. It allows SecuRemote clients to connect from internal networks. It is useful for wireless deployments, independent of the client s physical location (in the wireless network or on the road). Does Safe@Office support rack mounting? Yes. End users can purchase the Safe@Office rack-mount shelf kit that can be used to mount units of all types (wired, wireless) on a 19-inch rack. Each shelf can host two units. Rack-mount shelf kit SKU: CPUTM-EDGE-XG-IND-RM-KIT. Does Safe@Office appliance support wall mounting? Yes. The Safe@Office appliance includes a wall mounting kit. Is there an option for desktop-type power supply? Yes. It is possible to purchase desktop-type power supplies (as opposed to the wall-mount type supplied with the appliance). The SKU for this item is CPWR-12V-DG. Is it possible to purchase a spare power supply unit? Yes. It is possible to purchase a spare power supply unit for UTM-1 Edge. The SKU for this item is CPWR-5V-G. For more information, contact regular distribution channels or your Check Point sales representative. Is there a way to protect the Safe@Office appliance from theft? Yes. The Safe@Office appliance features a security slot to the rear of the right panel, which enables you to secure your appliance against theft by using a standard anti-theft security device available on the market. How are Safe@Office appliances set-up and deployed at the customer premises? Small businesses can use the built-in installation wizard to easily setup a Safe@Office appliance at their office. During installation, customers will be prompted to connect to a Service Center. This is relevant if the customer purchased services for the appliance (either 6

7 via Check Point or through a Managed Security Service Provider (MSSP)). Alternatively, for mass deployments by MSSPs, it is possible to pre-configure the security and networking settings so that the appliance automatically connects to the service provider s Service Center. Further security updates are done centrally via a Service Center and additional management is done either locally via the local user interface or remotely by a MSSP. Do Safe@Office appliances support High Availability (HA)? The High Availability feature is included in the Power Pack upgrade. Customers can purchase a second appliance to create a HA cluster. There are no special SKUs or discounts for HA appliances. What kind of Antivirus is included with Safe@Office appliances? Safe@Office includes Vstream Antivirus protection, which is an embedded stream-based antivirus engine integrated with Check Point Stateful Inspection and Application Intelligence technologies. The Vstream Antivirus performs virus scanning at the kernel level. It scans files for malicious content on the fly, without downloading the files into intermediate storage. This means minimal added latency and support for unlimited file sizes; and since VStream Antivirus stores only minimal state information per connection, it can scan thousands of connections concurrently. Does Safe@Office include licenses for remote access VPN clients? Yes. Each Safe@Office license includes licenses for Check Point VPN-1 SecuRemote to be used with Safe@Office. Can VPN-1 SecureClient connect to Safe@Office? Yes. Does Safe@Office support VPN-1 SecureClient security features? VPN-1 SecureClient interoperates with Safe@Office appliances supporting the internal VPN server and OfficeMode. The Safe@Office appliance does not support the policy server functionality. Dedicated desktop security via VPN-1 SecureClient is supported with other Check Point solutions which support the policy server functionality (for example, VPN-1 Express or VPN-1 Pro gateway). Licensing, Support and Upgrades How do I order Safe@Office 500 UTM appliances? For indirect VARs: Safe@Office is available through regular distribution channels. For direct VARS and service providers: Safe@Office orders should be submitted via your regular distribution channels. Safe@Office appliances are Category III products. 7

8 End-user pricing for VARs, Distributors and E-tailers can be found in the end-user price list at How do I order Evaluation/Demo units? Evaluation units for all Safe@Office products can be ordered through the same channels as other Check Point evaluations (through VARs or Check Point). You can also purchase demo units for 200$ via the following link: Note: Demo units are intended for demonstration purposes only (including lending the unit to a potential customer for a limited period of time) and are not for resale. How is a user defined by the Safe@Office license? A user (or network node) is defined as a computing device that attempts to traverse the firewall. For example, any IP address that tries to pass through the firewall is counted. The IP address is counted even if it is blocked due to a specific rule configuration. Note: we do not differentiate between multiple users using a single machine, that is, a single IP address. In this scenario those individuals will still be counted as one user. What happens if the total user count is exceeded? Safe@Office enforces the count per license. When the count is exceeded, subsequent users will not be allowed access to the WAN. In addition, an error report will be logged and the customer will receive a warning. Is it possible to upgrade Safe@Office appliances? Yes. Additional users and features can be added to the Safe@Office appliance without the need for a hardware replacement. Customers receive a sales confirmation code, register online, and receive a permanent new product key that enables the new functionality. Please refer to the Functionality Upgrade section of the table under the What Safe@Office 500 UTM models are available? question for upgrade options. Note that user count upgrades increase the number of concurrent users and do not affect the features, while the Power Pack upgrade provides advanced features and does not affect the user count. The following calculation method is used for upgrades for the 100, 200 and 400W models: Price of the new model minus 80% of the price of the old model For example, the list price of a functionality upgrade from Safe@Office 405 to Safe@Office 410 is $400 (= $799 - $499 x 80%, where $799 is the list price of the new model). Do internal SecuRemote users count towards the remote access license limit? No. The remote access license limit relates only to external VPN connections on the WAN interface. How can a customer upgrade an existing Safe@Office appliance to an appliance with integrated ADSL modem or WiFi access-point, or to a newer hardware model? Safe@Office Wireless and ADSL models use different hardware than Safe@Office appliances without these capabilities. Upgrading an existing Safe@Office appliance to a wireless or ADSL model requires a hardware trade-in. For more information on hardware trade-ins, contact your reseller or Check Point sales representative. 8

9 What is the RMA (Return Materials Authorization) process? The Service Request and RMA processes are facilitated by the small business support team. Products that are under the initial one-year warranty or under a support plan, and which have been verified by the support team as having malfunctioned are eligible for the Returned Materials Authorization (RMA) process. To obtain an RMA number for a Safe@Office product, contact the small business support team at VARs should contact their distributors for return policy information. What are the support options for Safe@Office appliances? Safe@Office appliances include a standard one-year hardware warranty. Currently, the following annual support and service plans are available from Check Point: Support and Subscription: Security and firmware updates , Web and chat support Advanced replacement Dynamic DNS Advanced Support and Subscription: Security and firmware updates , Web and chat support Advanced replacement Dynamic DNS VStream Antivirus signature updates Application Intelligence updates Note that customers can purchase either of the two Support and Subscription plans. The Web Filtering service can be purchased as a stand-alone or together with either Support plan. How do customers contact the small business support team? The best way to contact support is to open a ticket or chat with an agent via the SofaWare small business support team portal at Who does a VAR or distributor contact for technical questions? For presales technical support, contact your supporting Check Point Sales Engineer (SE). For post-sales support, contact the SofaWare small business support team at Note: Before contacting the support team, make sure you have the customer details and MAC address of the unit in question. The MAC address is listed on the appliance's label and also appears in the Web user interface. Is there an available call-to-action item that can be used with prospective customers? The primary call-to-action is the Small Business Security 101 white paper, which can be found together with other information via the following PartnerMAP link: 9

Cisco Small Business ISA500 Series Integrated Security Appliances

Cisco Small Business ISA500 Series Integrated Security Appliances Q & A Cisco Small Business ISA500 Series Integrated Security Appliances Q. What is the Cisco Small Business ISA500 Series Integrated Security Appliance? A. The Cisco Small Business ISA500 Series Integrated

More information

IREBOX X. Firebox X Family of Security Products. Comprehensive Unified Threat Management Solutions That Scale With Your Business

IREBOX X. Firebox X Family of Security Products. Comprehensive Unified Threat Management Solutions That Scale With Your Business IREBOX X IREBOX X Firebox X Family of Security Products Comprehensive Unified Threat Management Solutions That Scale With Your Business Family of Security Products Comprehensive unified threat management

More information

Configuring High Availability for Embedded NGX Gateways in SmartCenter

Configuring High Availability for Embedded NGX Gateways in SmartCenter Configuring High Availability for Embedded NGX Gateways in SmartCenter February 2008 Active and Passive Gateway States Contents Introduction...1 High Availability Basics and Terminology...2 Active and

More information

CHECK POINT. Software Blade Architecture. Secure. Flexible. Simple.

CHECK POINT. Software Blade Architecture. Secure. Flexible. Simple. CHECK POINT Software Blade Architecture Secure. Flexible. Simple. softwareblades from Check Point Today s Security Challenge Protecting networks against today s constantly evolving threat environment has

More information

The Evolution of IPS. Intrusion Prevention (Protection) Systems aren't what they used to be

The Evolution of IPS. Intrusion Prevention (Protection) Systems aren't what they used to be The Evolution of IPS Intrusion Prevention (Protection) Systems aren't what they used to be The Evolution of IPS Contents Background 3 Past Case for Standalone IPS 3 Organizational Control 3 Best-of-Breed

More information

Securing the Small Business Network. Keeping up with the changing threat landscape

Securing the Small Business Network. Keeping up with the changing threat landscape Securing the Small Business Network Keeping up with the changing threat landscape Table of Contents Securing the Small Business Network 1 UTM: Keeping up with the Changing 2 Threat Landscape RFDPI: Not

More information

Cisco SA 500 Series Security Appliances

Cisco SA 500 Series Security Appliances Cisco SA 500 Series Security Appliances An All-in-One Security Solution to Secure Your Small Business The Cisco SA 500 Series Security Appliances, part of the Cisco Small Business Pro Series, are comprehensive

More information

Who s Endian? www.cloudrouter.dk

Who s Endian? www.cloudrouter.dk Who s Endian? Endian was founded in 2003 at Appiano, Italy, by a team of experienced network specialists and Linux enthusiasts. Endian s goal and path of development are immediately clear: creating sophisticated

More information

Wireless Services. The Top Questions to Help You Choose the Right Wireless Solution for Your Business. www.megapath.com

Wireless Services. The Top Questions to Help You Choose the Right Wireless Solution for Your Business. www.megapath.com Wireless Services The Top Questions to Help You Choose the Right Wireless Solution for Your Business Get Started Now: 877.611.6342 to learn more. www.megapath.com Why Go Wireless? Today, it seems that

More information

CHECK POINT. Software Blade Architecture

CHECK POINT. Software Blade Architecture CHECK POINT Software Blade Architecture 2 softwareblades from Check Point Today s Security Challenge Protecting enterprises against today s constantly evolving threat environment has never been more challenging.

More information

CHECK POINT TOTAL SECURITY APPLIANCES. Flexible Deployment. Centralized Management.

CHECK POINT TOTAL SECURITY APPLIANCES. Flexible Deployment. Centralized Management. CHECK POINT TOTAL SECURITY APPLIANCES Flexible Deployment. Centralized Management. Check Point appliances deliver a powerful turnkey solution for deploying Check Point awardwinning software solutions to

More information

Unified Threat Management, Managed Security, and the Cloud Services Model

Unified Threat Management, Managed Security, and the Cloud Services Model Unified Threat Management, Managed Security, and the Cloud Services Model Kurtis E. Minder CISSP Global Account Manager - Service Provider Group Fortinet, Inc. Introduction Kurtis E. Minder, Technical

More information

Endpoint Security VPN for Mac

Endpoint Security VPN for Mac Security VPN for Mac E75 Release Notes 8 April 2012 Classification: [Protected] 2012 Check Point Software Technologies Ltd. All rights reserved. This product and related documentation are protected by

More information

Portal On-Demand Cost-effective and hosted managed security

Portal On-Demand Cost-effective and hosted managed security Security Management Check Point security management solutions provide unified policy management, monitoring, and analysis Security Management Portal On-Demand Cost-effective and hosted managed security

More information

Cisco SA 500 Series Security Appliances

Cisco SA 500 Series Security Appliances Cisco SA 500 Series Security Appliances An All-in-One Security Solution to Secure Your Small Business The Cisco SA 500 Series Security Appliances, part of the Cisco Small Business Pro Series, are comprehensive

More information

Check Point Software Blade Architecture. Achieving the right balance between security protection and investment

Check Point Software Blade Architecture. Achieving the right balance between security protection and investment Check Point Software Blade Architecture Achieving the right balance between security protection and investment Check Point Software Blade Architecture Contents Introduction 3 Check Point Software Blade

More information

SofaWare Management Architecture Basics

SofaWare Management Architecture Basics SofaWare Management Architecture Basics The SofaWare management architecture is made up of several software components. These components are similar to components in FW-1/NG. Some aspects of the SofaWare

More information

Firewall and UTM Solutions Guide

Firewall and UTM Solutions Guide Firewall and UTM Solutions Guide Telephone: 0845 230 2940 e-mail: info@lsasystems.com Web: www.lsasystems.com Why do I need a Firewall? You re not the Government, Microsoft or the BBC, so why would hackers

More information

White Paper. ZyWALL USG Trade-In Program

White Paper. ZyWALL USG Trade-In Program White Paper ZyWALL USG Trade-In Program Table of Contents Introduction... 1 The importance of comprehensive security appliances in today s world... 1 The advantages of the new generation of zyxel usg...

More information

Solution Brief. Branch on Demand. Extending and Securing Access Across the Organization

Solution Brief. Branch on Demand. Extending and Securing Access Across the Organization Solution Brief Branch on Demand Extending and Securing Access Across the Organization Extending Access to Corporate Resources Across the Organization As organizations extend corporate capabilities to teleworkers

More information

Check Point Software Blade Architecture. Achieving the right balance between security protection and investment

Check Point Software Blade Architecture. Achieving the right balance between security protection and investment Check Point Software Blade Architecture Achieving the right balance between security protection and investment Contents Introduction 3 Check Point Software Blade architecture overview 3 What is a Software

More information

Endpoint Security VPN for Mac

Endpoint Security VPN for Mac Security VPN for Mac E80.41 Release Notes 16 January 2013 Classification: [Protected] 2013 Check Point Software Technologies Ltd. All rights reserved. This product and related documentation are protected

More information

Cisco ASA 5500 Series Anti-X Edition for the Enterprise

Cisco ASA 5500 Series Anti-X Edition for the Enterprise Solution Overview Cisco ASA 5500 Series Anti-X Edition for the Enterprise Viruses and other malicious code can overwhelm your IT resources disrupting business operations and impacting business transactions.

More information

BroadScan. Security Appliances. in-one Security Solution for SMB Combining Performance, ease of use and affordability. A Breakthrough all-in

BroadScan. Security Appliances. in-one Security Solution for SMB Combining Performance, ease of use and affordability. A Breakthrough all-in BroadScan TM Security Appliances A Breakthrough all-in in-one Security Solution for SMB Combining Performance, ease of use and affordability 1 BroadScan Security Appliances Security with superior ROI Lower

More information

SonicWALL Team Nordic Recommendations for safe Unified Threat Management (UTM) Deployments*

SonicWALL Team Nordic Recommendations for safe Unified Threat Management (UTM) Deployments* SonicWALL Team Nordic Recommendations for safe Unified Threat Management () Deployments* nordic@sonicwall.com tel: +46 8 410 71 700 TZ100/100W 01-SSC-8739 01-SSC-8739 01-SSC-8723 $470/$536W 128Mb RAM 5FE

More information

The Ultimate WLAN Management and Security Solution for Large and Distributed Deployments

The Ultimate WLAN Management and Security Solution for Large and Distributed Deployments The Ultimate WLAN Management and Security Solution for Large and Distributed Deployments Centralized WLAN management and auto provisioning Manages up to 0 APs with granular access control Advanced RF management

More information

Solution Brief. Branch on Demand. Extending and Securing Access Across the Organization

Solution Brief. Branch on Demand. Extending and Securing Access Across the Organization Solution Brief Branch on Demand Extending and Securing Access Across the Organization Branch on Demand Extending Access to Corporate Resources Across the Organization As organizations extend corporate

More information

Network protection and UTM Buyers Guide

Network protection and UTM Buyers Guide Network protection and UTM Buyers Guide Using a UTM solution for your network protection used to be a compromise while you gained in resource savings and ease of use, there was a payoff in terms of protection

More information

Question: 1 Which Cisco Small Business portfolio product is targeted to customers who leverage technology s a strategic advantage in their business?

Question: 1 Which Cisco Small Business portfolio product is targeted to customers who leverage technology s a strategic advantage in their business? Question: 1 Which Cisco Small Business portfolio product is targeted to customers who leverage technology s a strategic advantage in their business? A. Cisco Small Business Series B. Cisco Integrated Services

More information

Remote Access Clients for Windows

Remote Access Clients for Windows Remote Access Clients for Windows E80.60 Release Notes 3 December 2014 Classification: [Protected] 2014 Check Point Software Technologies Ltd. All rights reserved. This product and related documentation

More information

Edgewater Routers User Guide

Edgewater Routers User Guide Edgewater Routers User Guide For use with 8x8 Service May 2012 Table of Contents EdgeMarc 250w Router Overview.... 3 EdgeMarc 4550-15 Router Overview... 4 Basic Setup of the 250w, 200AE1 and 4550... 5

More information

Simple security is better security Or: How complexity became the biggest security threat

Simple security is better security Or: How complexity became the biggest security threat Simple security is better security Or: How complexity became the biggest security threat Christoph Litzbach, Pre-Sales Engineer NSG 1 What do they have in common? DATA BREACH 2 Security is HARD! Components

More information

SonicWALL Advantages Over WatchGuard

SonicWALL Advantages Over WatchGuard Competitive Analysis August 2001 WatchGuard SOHO - Product Overview WatchGuard Technologies extended its product offerings to the fast-growing broadband market through the acquisition of BeadleNet, LLC,

More information

SSL-VPN 200 Getting Started Guide

SSL-VPN 200 Getting Started Guide Secure Remote Access Solutions APPLIANCES SonicWALL SSL-VPN Series SSL-VPN 200 Getting Started Guide SonicWALL SSL-VPN 200 Appliance Getting Started Guide Thank you for your purchase of the SonicWALL SSL-VPN

More information

Customer Advantage Program

Customer Advantage Program Customer Advantage Program Straightforward upgrades and competitive trade-ins for Dell Security customers The Dell Security Customer Advantage Program offers an upgrade path from current Dell SonicWALL

More information

Cisco ASA 5500 Series Content Security Edition for the Enterprise

Cisco ASA 5500 Series Content Security Edition for the Enterprise Cisco ASA 5500 Series Content Security Edition for the Enterprise Viruses and other malicious code can overwhelm your IT resources, disrupting business operations and impacting business transactions. The

More information

Small Business Network Security 101

Small Business Network Security 101 October, 2008 Brought to you by: 2003-2007 Check Point Software Technologies Ltd. All rights reserved. 1 Introduction What you don t know about Internet security threats may hurt your business. With broadband

More information

Best Practices for Outdoor Wireless Security

Best Practices for Outdoor Wireless Security Best Practices for Outdoor Wireless Security This paper describes security best practices for deploying an outdoor wireless LAN. This is standard body copy, style used is Body. Customers are encouraged

More information

Simplify Your Network Security with All-In-One Unified Threat Management

Simplify Your Network Security with All-In-One Unified Threat Management Singtel Business Product Factsheet Brochure Managed Defense Unified Services Management Simplify Your Network Security with All-In-One Unified Management Singtel Managed Unified Management (UTM) Services,

More information

Cisco ASA 5500 Series Business Edition

Cisco ASA 5500 Series Business Edition Cisco ASA 5500 Series Business Edition Cisco ASA 5500 Series Business Edition Provides an All-in-One Security Solution The Cisco ASA 5500 Series Business Edition is an enterprise-strength comprehensive

More information

Edgewater Routers User Guide

Edgewater Routers User Guide Edgewater Routers User Guide For use with 8x8 Service Version 1.0, March 2011 Table of Contents EdgeMarc 200AE1-10 Router Overview...3 EdgeMarc 4550-15 Router Overview...4 Basic Setup of the 200AE1 and

More information

APPENDIX 3 LOT 3: WIRELESS NETWORK

APPENDIX 3 LOT 3: WIRELESS NETWORK APPENDIX 3 LOT 3: WIRELESS NETWORK A. TECHNICAL SPECIFICATIONS MAIN PURPOSE The Wi-Fi system should be capable of providing Internet access directly to a user using a smart phone, tablet PC, ipad or Laptop

More information

Using SonicWALL NetExtender to Access FTP Servers

Using SonicWALL NetExtender to Access FTP Servers SSL-VPN Using SonicWALL NetExtender to Access FTP Servers Problem: Using NetExtender to access an FTP Server on the LAN segment of a SonicWALL PRO 4060. Solution: Perform the following setup steps. Step

More information

Protecting the Extended Enterprise Network Security Strategies and Solutions from ProCurve Networking

Protecting the Extended Enterprise Network Security Strategies and Solutions from ProCurve Networking ProCurve Networking by HP Protecting the Extended Enterprise Network Security Strategies and Solutions from ProCurve Networking Introduction... 2 Today s Network Security Landscape... 2 Accessibility...

More information

Next Gen Firewall and UTM Buyers Guide

Next Gen Firewall and UTM Buyers Guide Next Gen Firewall and UTM Buyers Guide Implementing and managing a network protected by point solutions is far from simple. But complete protection doesn t have to be complicated. This buyers guide explains

More information

Secure Remote Access for the Distributed Business. Challenges, trends, and considerations

Secure Remote Access for the Distributed Business. Challenges, trends, and considerations Secure Remote Access for the Distributed Business Challenges, trends, and considerations Secure Remote Access for the Distributed Business Contents Overview 3 Remote access trends 3 Increasing security

More information

Cisco RV220W Network Security Firewall

Cisco RV220W Network Security Firewall Cisco RV220W Network Security Firewall High-Performance, Highly Secure Connectivity for the Small Office The Cisco RV220W Network Security Firewall lets small offices enjoy secure, reliable, wired and

More information

Meraki MX Family Cloud Managed Security Appliances

Meraki MX Family Cloud Managed Security Appliances DATASHEET Meraki MX Family Cloud Managed Security Appliances Overview The Meraki MX is a complete next generation firewall and branch gateway solution, designed to make distributed networks fast, secure,

More information

How To Choose A Dell Sonicwall Firewall From Awna.Com

How To Choose A Dell Sonicwall Firewall From Awna.Com 2014 BUYING GUIDE: DELL SONICWALL FIREWALLS Compliments of Firewalls.com. Your Source for Dell SonicWALL firewalls and professional services. A first-time buyer s guide to understanding which firewall

More information

Cisco ASA 5500 Series Content Security Edition for the Enterprise

Cisco ASA 5500 Series Content Security Edition for the Enterprise Cisco ASA 5500 Series Content Security Edition for the Enterprise Viruses and other malicious code can overwhelm your IT resources disrupting business operations and impacting business transactions. The

More information

Best Practices in Deploying a Secure Wireless Network

Best Practices in Deploying a Secure Wireless Network Best Practices in Deploying a Secure Wireless Network CONTENTS Abstract 2 Today s concerns 2 Purpose 2 Technology background 3 Today s challenges 4 Key security requirements of an integrated network 4

More information

Using Cisco UC320W with Windows Small Business Server

Using Cisco UC320W with Windows Small Business Server Using Cisco UC320W with Windows Small Business Server This application note explains how to deploy the Cisco UC320W in a Windows Small Business Server environment. Contents This document includes the following

More information

SonicWALL Clean VPN. Protect applications with granular access control based on user identity and device identity/integrity

SonicWALL Clean VPN. Protect applications with granular access control based on user identity and device identity/integrity SSL-VPN Combined With Network Security Introducing A popular feature of the SonicWALL Aventail SSL VPN appliances is called End Point Control (EPC). This allows the administrator to define specific criteria

More information

Assessing Business Continuity Solutions

Assessing Business Continuity Solutions Assessing Business Continuity Solutions Ensuring the uninterrupted operation of businesses is an issue of increasing importance not just for large enterprises but for medium and small organizations as

More information

Cloud Managed Security with Meraki MX

Cloud Managed Security with Meraki MX Cloud Managed Security with Meraki MX Joe Aronow Product Specialist, Meraki MX #clmel Agenda Introduction: Cloud networking Demo IWAN Product Families Q&A Cisco Meraki: who we are and what we do? Complete

More information

Zscaler Internet Security Frequently Asked Questions

Zscaler Internet Security Frequently Asked Questions Zscaler Internet Security Frequently Asked Questions 1 Technical FAQ PRODUCT LICENSING & PRICING How is Zscaler Internet Security Zscaler Internet Security is licensed on number of Cradlepoint devices

More information

Secure Remote Access Solutions Balancing security and remote access Bob Hicks, Rockwell Automation

Secure Remote Access Solutions Balancing security and remote access Bob Hicks, Rockwell Automation Secure Remote Access Solutions Balancing security and remote access Bob Hicks, Rockwell Automation Rev 5058-CO900C Agenda Control System Network Security Defence in Depth Secure Remote Access Examples

More information

Using a Firewall General Configuration Guide

Using a Firewall General Configuration Guide Using a Firewall General Configuration Guide Page 1 1 Contents There are no satellite-specific configuration issues that need to be addressed when installing a firewall and so this document looks instead

More information

How To Use A Cisco Wvvvdns4400N Wireless-N Gigabit Security Router For Small Businesses

How To Use A Cisco Wvvvdns4400N Wireless-N Gigabit Security Router For Small Businesses Cisco WRVS4400N Wireless-N Gigabit Security Router Cisco Small Business Routers Highlights Secure, high-speed wireless network access for small business Gigabit Ethernet connections enable rapid transfer

More information

WATCHGUARD FIREBOX SOHO 6TC AND SOHO 6

WATCHGUARD FIREBOX SOHO 6TC AND SOHO 6 WATCHGUARD FIREBOX SOHO 6TC AND SOHO 6 FIREWALL AND VPN APPLIANCES FOR SMALL BUSINESSES AND BRANCH OFFICES Today, complete Internet security goes beyond a firewall. Firebox SOHO 6tc and SOHO 6 are dedicated

More information

TechGuard Firewall Products Specs/Parts/Competitive Analysis

TechGuard Firewall Products Specs/Parts/Competitive Analysis TechGuard Firewall Products Specs/Parts/Competitive Analysis 2003 TechGuard Security, LLC TechGuard Great Walls of Fire Firewalls The Great Walls of Fire firewall is a high performance Internet gateway,

More information

Partner with the UK s leading. Managed Security Service Provider

Partner with the UK s leading. Managed Security Service Provider Partner with the UK s leading Managed Security Service Provider The Talk Straight Advantage Established in 2007, Talk Straight is an ISP with a difference, and is at the forefront of a revolution in cloud

More information

ALLNET ALL-VPN10. VPN/Firewall WLAN-N WAN Router

ALLNET ALL-VPN10. VPN/Firewall WLAN-N WAN Router ALLNET ALL-VPN10 VPN/Firewall WLAN-N WAN Router 1~2x100Mbps WAN + 3~4x100Mbps Switch LAN + 2xUSB port+2xwireless Antenna Dual WAN Ports for load balancing Up to 10 IPSec VPN tunnels, VPN Throughput 100Mbps

More information

LICENSE GUIDE. Software Blades products. Number of Strings. SKU Prefix Name Description Additive

LICENSE GUIDE. Software Blades products. Number of Strings. SKU Prefix Name Description Additive LICENSE GUIDE Software Blades products SKU Prefix Name Description Additive CPAP-SG5075 CPAP-SG9075 CPAP-SG11065 CPAP-SG11075 CPAP-SG11085 CPAP-IP2455 CPAP-IP1285 CPAP-IP695 CPAP-IP565 CPAP-IP395 CPAP-IP295

More information

Endpoint Security Considerations for Achieving PCI Compliance

Endpoint Security Considerations for Achieving PCI Compliance Endpoint Security Considerations for Achieving PCI Compliance Contents PCI Requirements and Endpoint Security 3 Overview of the PCI Data Security Standard 3 Developing a PCI Compliance Plan 4 Endpoint

More information

Cisco RV220W Network Security Firewall

Cisco RV220W Network Security Firewall Cisco RV220W Network Security Firewall High-Performance, Highly Secure Connectivity for the Small Office The Cisco RV220W Network Security Firewall lets small offices enjoy secure, reliable, wired and

More information

How to Get NAC Up-and-Running in One Hour. For Check Point Firewall or Endpoint Security Administrators

How to Get NAC Up-and-Running in One Hour. For Check Point Firewall or Endpoint Security Administrators How to Get NAC Up-and-Running in One Hour For Check Point Firewall or Endpoint Security Administrators Contents Introduction 3 Defining an Organization s Requirements for NAC 3 Two Paths to NAC Port vs.

More information

Cisco Virtual Office Express

Cisco Virtual Office Express . Q&A Cisco Virtual Office Express Overview Q. What is Cisco Virtual Office Express? A. Cisco Virtual Office Express is a solution that provides secure, rich network services to workers at locations outside

More information

Gigabit Multi-Homing VPN Security Router

Gigabit Multi-Homing VPN Security Router As Internet becomes essential for business, the crucial solution to prevent your Internet connection from failure is to have more than one connection. PLANET is a ideal to help the SMBs increase the broadband

More information

Advantages of Managed Security Services

Advantages of Managed Security Services Advantages of Managed Security Services Cloud services via MPLS networks for high security at low cost Get Started Now: 877.611.6342 to learn more. www.megapath.com Executive Summary Protecting Your Network

More information

Integrated Security Solutions You Can Trust

Integrated Security Solutions You Can Trust PRODUC T LINE Integrated Security Solutions You Can Trust Secure Networking Accessible to Everyone Internet threats do not discriminate based upon the size of a network. Any system connected to the Internet

More information

Cisco IOS Advanced Firewall

Cisco IOS Advanced Firewall Cisco IOS Advanced Firewall Integrated Threat Control for Router Security Solutions http://www.cisco.com/go/iosfirewall Presentation_ID 2007 Cisco Systems, Inc. All rights reserved. 1 All-in-One Security

More information

Astaro Gateway Software Applications

Astaro Gateway Software Applications Astaro Overview Astaro Products - Astaro Security Gateway - Astaro Web Gateway - Astaro Mail Gateway - Astaro Command Center - Astaro Report Manager Astaro Gateway Software Applications - Network Security

More information

Lucent VPN Firewall Security in 802.11x Wireless Networks

Lucent VPN Firewall Security in 802.11x Wireless Networks Lucent VPN Firewall Security in 802.11x Wireless Networks Corporate Wireless Deployment is Increasing, But Security is a Major Concern The Lucent Security Products can Secure Your Networks This white paper

More information

Cisco SR 520-T1 Secure Router

Cisco SR 520-T1 Secure Router Secure, High-Bandwidth Connectivity for Your Small Business Part of the Cisco Small Business Pro Series Connections -- between employees, customers, partners, and suppliers -- are essential to the success

More information

Unified Threat Management Systems (UTMS), Open Source Routers and Firewalls. Tim Hooks Scott Rolf

Unified Threat Management Systems (UTMS), Open Source Routers and Firewalls. Tim Hooks Scott Rolf Unified Threat Management Systems (UTMS), Open Source Routers and Firewalls Tim Hooks Scott Rolf Session Overview The Linux Kernel is particularly adept at routing IP traffic and lends itself for use as

More information

Results of Testing: Juniper Branch SRX Firewalls

Results of Testing: Juniper Branch SRX Firewalls Executive Summary : Juniper Branch SRX Firewalls by Joel Snyder / Opus One prepared for Juniper Networks June 2012 Copyright 2012 : Juniper Branch SRX Firewalls Table of Contents Introduction....1 Firewall

More information

WAN Traffic Management with PowerLink Pro100

WAN Traffic Management with PowerLink Pro100 Whitepaper WAN Traffic Management with PowerLink Pro100 Overview In today s Internet marketplace, optimizing online presence is crucial for business success. Wan/ISP link failover and traffic management

More information

WAN Failover Scenarios Using Digi Wireless WAN Routers

WAN Failover Scenarios Using Digi Wireless WAN Routers WAN Failover Scenarios Using Digi Wireless WAN Routers This document discusses several methods for using a Digi wireless WAN gateway to provide WAN failover for IP connections in conjunction with another

More information

Is Your Network Ready for VoIP?

Is Your Network Ready for VoIP? Is Your Network Ready for VoIP? Evaluating firewalls for VoIP access, control and security. CONTENTS The Network Will Never be the Same 2 A VoIP-Ready Firewall Criteria Checklist 2 Control Considerations

More information

FEATURE OVERVIEW. FGX Series firewall. Last updated February 2012

FEATURE OVERVIEW. FGX Series firewall. Last updated February 2012 FEATURE OVERVIEW FGX Series firewall Last updated February 2012 Celestix FGX Features Deep Packet Firewall VPN Virtual system DoD/DDoS attach defense Intrusion protection Anti-virus Anti-spam URL filtering

More information

Small, Medium and Large Businesses

Small, Medium and Large Businesses Providing Productivity and Security for Small, Medium and Large Businesses Series Series Super Fast broadband technology High Availability with Multi-WAN Load Balancing Enterprise-level Firewall security

More information

Remote Access VPN Solutions

Remote Access VPN Solutions Remote Access VPN Solutions P/N 500187 June 2000 Check Point Software Technologies Ltd. In this Document: Introduction Page 3 Remote Access VPN Defined Page 3 Business Case Page 4 Key Requirements Page

More information

Introduction to Cloud Networking. Meraki Solution Overview

Introduction to Cloud Networking. Meraki Solution Overview Introduction to Cloud Networking Meraki Solution Overview 1 About Meraki, part of Cisco Leader in cloud networking: 20,000+ customer networks deployed Initial technology developed at MIT - tradition of

More information

Cisco RV 120W Wireless-N VPN Firewall

Cisco RV 120W Wireless-N VPN Firewall Cisco RV 120W Wireless-N VPN Firewall Take Basic Connectivity to a New Level The Cisco RV 120W Wireless-N VPN Firewall combines highly secure connectivity to the Internet as well as from other locations

More information

How To - Setup Cyberoam VPN Client to connect to a Cyberoam for the remote access using preshared key

How To - Setup Cyberoam VPN Client to connect to a Cyberoam for the remote access using preshared key How To - Setup Cyberoam VPN Client to connect to a Cyberoam for the remote access using preshared key How To - Setup Cyberoam VPN Client to connect to a Cyberoam for the remote access using preshared key

More information

CISCO SMB CLASS MOBILITY AND WIRELESS SOLUTIONS: THE RESPONSIVE WORKFORCE

CISCO SMB CLASS MOBILITY AND WIRELESS SOLUTIONS: THE RESPONSIVE WORKFORCE CISCO SMB CLASS MOBILITY AND WIRELESS SOLUTIONS: THE RESPONSIVE WORKFORCE BLUEPRINT Cisco Small and Medium Business Class Solutions Cisco offers small and medium-sized business customers a suite of intelligent

More information

NATIONAL GATEWAY SECURITY SURVEY

NATIONAL GATEWAY SECURITY SURVEY NATIONAL GATEWAY SECURITY SURVEY REPORT SUMMARY The National Gateway Security Survey 2008 was carried out for value added distributor Wick Hill, specialists in secure infrastructure solutions, and sponsored

More information

The All-in-One, Intelligent WLAN Controller

The All-in-One, Intelligent WLAN Controller The All-in-One, Intelligent WLAN Controller Centralized management for up to 64* APs mitigates complex, inconvenient cabling Wi-Fi deployments Comprehensive features for WLAN performance optimization and

More information

Tech Brief. Enterprise Secure and Scalable Enforcement of Microsoft s Network Access Protection in Mobile Networks

Tech Brief. Enterprise Secure and Scalable Enforcement of Microsoft s Network Access Protection in Mobile Networks Tech Brief Enterprise Secure and Scalable Enforcement of Microsoft s Network Access Protection in Mobile Networks Introduction In today s era of increasing mobile computing, one of the greatest challenges

More information

Neutralizing Spyware in the Enterprise Environment

Neutralizing Spyware in the Enterprise Environment White Paper Neutralizing Spyware in the Enterprise Environment Check Point protects every part of your network perimeter, internal, Web to keep your information resources safe, accessible, and easy to

More information

TECHNICAL WHITEPAPER. Author: Tom Kistner, Chief Software Architect. Table of Contents

TECHNICAL WHITEPAPER. Author: Tom Kistner, Chief Software Architect. Table of Contents TECHNICAL WHITEPAPER Author: Tom Kistner, Chief Software Architect Last update: 18. Dez 2014 Table of Contents Introduction... 2 Terminology... 2 Basic Concepts... 2 Appliances... 3 Hardware...3 Software...3

More information

The All-in-One, Intelligent NXC Controller

The All-in-One, Intelligent NXC Controller The All-in-One, Intelligent NXC Controller Centralized management for up to 24 APs ZyXEL Wireless Optimizer for easily planning, deployment and maintenance AP auto discovery and auto provisioning Visualized

More information

Deploying Firewalls Throughout Your Organization

Deploying Firewalls Throughout Your Organization Deploying Firewalls Throughout Your Organization Avoiding break-ins requires firewall filtering at multiple external and internal network perimeters. Firewalls have long provided the first line of defense

More information

The Attacker s Target: The Small Business

The Attacker s Target: The Small Business Check Point Whitepaper The Attacker s Target: The Small Business Even Small Businesses Need Enterprise-class Security to protect their Network July 2013 Contents Introduction 3 Enterprise-grade Protection

More information

Cisco Meraki solution overview. 2010 Cisco and/or its affiliates. All rights reserved.

Cisco Meraki solution overview. 2010 Cisco and/or its affiliates. All rights reserved. Cisco Meraki solution overview 2010 Cisco and/or its affiliates. All rights reserved. Cisco Meraki: a complete cloud-managed networking solution - Wireless, switching, security, WAN optimization, and MDM,

More information

Internet Security for Small to Medium Sized Businesses

Internet Security for Small to Medium Sized Businesses Internet Security for Small to Medium Sized Businesses AN INTERNET SECURITY GUIDE FOR EVERY BUSINESS DOCUMENT VERSION 1.2 - OCTOBER 2002 COMPLIMENTS OF POWERWALLZ NETWORK SECURITY INC. 3 Introduction INTERNET

More information

Intelligent WLAN Controller with Advanced Functions

Intelligent WLAN Controller with Advanced Functions Intelligent WLAN Controller with Advanced Functions Centralized WLAN management and auto provisioning Manages up to 512 APs with granular access control ZyMESH simplifies complex, inconvenient cabling

More information

Enterprise Wireless LAN. Key Features. Benefits. Hotspot/Service Gateway Series

Enterprise Wireless LAN. Key Features. Benefits. Hotspot/Service Gateway Series Key Features Comprehensive Wireless Internet Access Solution Zero Configuration IP Plug and Play Unique Ticket Printer for Easy Service and Accounting Web-based User Authentication, Account Monitoring,

More information

ADMINISTRATION GUIDE Cisco Small Business

ADMINISTRATION GUIDE Cisco Small Business ADMINISTRATION GUIDE Cisco Small Business SA500 Series Security Appliances Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries.

More information