Check Point 500 UTM Frequently Asked Questions
|
|
- Andra Rose
- 8 years ago
- Views:
Transcription
1 For internal use only Check Point 500 UTM Frequently Asked Questions Business Related Questions What are appliances? Designed specifically to meet the needs of small businesses, Check Point 500 Unified Threat Management (UTM) appliances deliver proven Internet security by incorporating Check Point patented technology. 500 UTM appliances can protect networks of up to 100 users from a multitude of Internet threats such as viruses, hacking attempts, denial of service attacks and phishing. Safe@Office 500 UTM Wireless (W) appliances integrate a Wireless LAN access point, delivering the same security found in Safe@Office 500 appliances together with the highest levels of security for wireless networks. The Safe@Office 500 UTM wired and wireless models are also available with an integrated ADSL2/2+ modem, thus meeting small businesses needs for connectivity and network security out-of-the-box. Who are the target customers for Safe@Office 500 UTM appliances? Safe@Office 500 UTM customers are small to medium businesses (1-100 users) that need a comprehensive, all-in-one security solution, and Managed Security Service Providers (MSSPs) who offer outsourced network and security management services to small-medium businesses. Vertical markets include: - Retail, Hospitality (hotels, restaurants, coffee shops) - Healthcare - Finance/ Investment Firms - Insurance & Law Firms - Government / Municipality entities Who are the primary decision makers? For most small businesses, the CEO/President/Owner is the primary decision maker (in many cases acting also as an IT manager). For larger businesses (~30 employees and up), a part-time/full-time IT manager may be onsite, making him/her the key decision maker. In this case, key influencers are the CEO/President/Owner. Why is integrated security so important for small businesses? Small businesses face a variety of IT related challenges, including network security threats, networking and connectivity issues and regulation compliancy. This is a challenge for most small businesses as they usually have only limited IT resources and no dedicated security expert, even though they are just as dependent on their network as large Enterprises. The lack of dedicated IT staff, limited IT budgets and a lower level of awareness regarding network security threats, makes small businesses susceptible to cyber-attacks and internet threats. For these reasons, small businesses can greatly benefit from an Check Point Software Technologies Ltd. All rights reserved. 1
2 affordable, easy-to-use, all-in-one security solution that is based on proven and tested Check Point technology. What Business Problems do Appliances solve? appliances address key security, networking and connectivity pain points: Enable employees (teleworkers, road-warriors) and business partners to securely access information from remote with IPSec VPN Reduce downtime and abuse of business resources Simplify ongoing security management and administration Facilitate compliance with industry-specific network security regulations (PCI-DSS, HIPAA etc.) Who are the main competitors in this market? SonicWall (TZ product line), Fortinet (FortiGate/FortiWifi 50/60), WatchGuard (Firebox X Edge e-series), Juniper (SSG5/20 and Netscreen 5GT), Cisco (PIX and ASA5505). What is the difference between UTM-1 Edge appliances and Safe@Office appliances? UTM-1 Edge appliances are typically employed by Enterprises in-order to secure their branch-offices and remote sites, as part of a centrally managed deployment using Check Point SMART management solutions (SmartCenter, SmartLSM, Provider-1 ). On the other hand, Safe@Office 500 UTM appliances target small businesses with one or more sites, where each site is a standalone deployment either managed locally, or centrally managed via SMP /SMP On-Demand. Safe@Office appliances cannot be managed by SmartCenter, SmartLSM, or Provider-1. UTM-1 Edge / Safe@Office Comparison UTM-1 Edge Safe@Office 500 User count 8,16,32,Unlimited 5,25,Unlimited Enhanced networking & security features Yes (built-in) Optional (Requires PowerPack upgrade) Integrated WiFi access-point and/or ADSL modem Yes (optional) Yes (optional) List Price Starts at $600 Start at $299 Complementary Products and Services Central Management Support & Software Subscription UTM-1 Edge Safe@Office 500 Check Point SMART Management SMP, SMP On-Demand (SmartCenter,SmartLSM,Provider- 1, SMP, SMP On-Demand) Purchase CES contract Purchase Safe@Office Basic Support contract or purchase services from Small-Business MSSP partners 2
3 Antivirus Updates Service Web Filtering Service Purchase Antivirus Updates Service for UTM-1 Edge Use 3rd party OPSEC web filtering server such as SurfControl Purchase AntiVirus, Support & Subscription contract or purchase services from Small- Business MSSP partners Purchase the SofaWare Web Filtering Annual Subscription or purchase services from Small-Business MSSP partners Reporting Use Check Point Eventia Monthly reports are delivered as part of the Basic Support Plan or purchase services from Small- Business MSSP partners Product Questions What is the difference between 500 and 500W? The W Series appliances integrate a Wireless LAN access point supporting the b/g/Super G standards. For additional information regarding the WLAN capabilities, please refer to the Safe@Office 500 datasheet via the following link: What types of add-on services are available for Safe@Office appliances? Customers can add the following: One of the following annual support plans: Basic Support and Services plan with: Security and firmware updates; , web and chat support; Advanced replacement and Dynamic DNS Advanced Support and Services plan with Security and firmware updates; , web and chat support; Advanced replacement; Dynamic DNS; Gateway antivirus updates and SmartDefense updates Annual category-based URL filtering services - integrated Web filtering using an extensive database of threat categories and associated URLs. A web-access policy can be defined to protect from threats such as spyware and viruses, as well as new risks from inappropriate web content, and to improve employee productivity by limiting access to specific content. License upgrades (number of users) What Safe@Office appliances and upgrades/services are available? Users Safe@Office 500 CPSB-500G Safe@Office 500 Series Safe@Office 500W CPSB-500WG Safe@Office 500 ADSL CPSB-500G-ADSL Safe@Office 500W ADSL CPSB-500WG-ADSL 5 $299 $449 $399 $ $599 $749 $699 $849 Unlimited $999 $1149 $1099 $1249 3
4 Functionality Upgrades Power Pack CPSB-500-UPG-PPACK Upgrade from 5 Users to 25 Users CPSB-500-UPG-5TO25 Upgrade from 5 Users to Unlimited Users CPSB-500-UPG-5TOU Upgrade from 25 Users to Unlimited Users CPSB-500-UPG-25TOU List Price $499 $360 $760 $520 Support plans and additional services Users Annual 500 Support Plans Basic Support Plan Advanced Support Plan ST-CPSB STAV-CPSB Annual Category-based URL filtering Web Filtering WF-CPSB 5 $79 $179 $49 25 $99 $299 $199 Unlimited $199 $449 $299 For the full features table see For up-to-date pricing and SKUs see Are all Safe@Office models based on the same hardware? The base hardware of the Safe@Office appliances is the same, with the exception of support for Wireless and ADSL capabilities, as well as availability of USB ports for the Safe@Office 500W and ADSL models. All appliance versions can run the most recent Embedded NGX firmware. What features are included with the Power Pack? The Power Pack is an upgrade option that activates the following high-end security and networking features: 4
5 25 Remote Access VPN profiles (only 5 profiles without Power Pack) Unlimited Site-to-site VPN profiles (only 2 without Power Pack) Port-based and Tag-based VLAN (only available with Power Pack) Port-based Security (802.1x) (only available with Power Pack) Secure HotSpot (Guest Access) (only available with Power Pack) Automatic Gateway Failover (High Availability) (only available with Power Pack) Dynamic Routing (OSPF) (only available with Power Pack) Wireless Distribution System (WDS) (only available with Power Pack) Multiple Access Points (only 1 access point without Power Pack) Multiple bridge support (only 1 without Power Pack) Advanced Traffic Shaper (QoS) (basic Traffic Shaper without Power Pack, including four static preconfigured classes) The Power Pack upgrade is independent of the user count, that is, it can be installed on any Safe@Office 500/500W appliance, regardless of the number of users the appliance supports. For more information on the features included in the Power Pack upgrade, please refer to the following link: What happened to the Safe@Office 100, 200 and 400W models? These models are no longer available for purchase. Embedded NGX 7.0 firmware is available for all 400W, 200, 100B and 100C appliances with a valid software subscription plan. Is there any change to the service pricing for 100/200/400W models? Yes. Subscription pricing is updated as follows: 105/ / / U/425U Annual Support and Subscription $79 $89 $99 $199 Annual Support and Subscription with Antivirus and SmartDefense updates $179 $219 $299 $449 What central management platforms are supported by Safe@Office? For multi-site deployments, Safe@Office can be centrally managed by SMP or SMP On-Demand. Check Point Small-Business MSSP partners will use these management solutions to provide out-sourced security services. Do Safe@Office 500 UTM appliances support SmartDefense? Yes. A reduced feature set of the main SmartDefense updates relevant for small businesses is periodically available for Safe@Office with firmware updates. Does Safe@Office support cellular connectivity? Yes. Safe@Office supports comprehensive connectivity capabilities include extensive support for USBbased cellular modems (2G/3G), allowing various high availability deployments and connectivity in areas where regular Internet infrastructure is unavailable. Other USB modems (56K, ISDN) are also supported. 5
6 Does support QoS management? Yes. supports QoS through Traffic Shaping, which offers weighted priorities, guarantees and limits to ensure that business-critical traffic is given priority over non-critical traffic. Note that includes basic traffic shaping capabilities with preset levels. Advanced traffic shaping is available with the Power Pack upgrade. Does support VLANs? VLAN support is available with the Power Pack upgrade. This allows for the segmentation of internal networks into several virtual networks. It enables non-intrusive deployment into an existing VLAN configuration. Port-based and tag-based VLANs are supported: Port-based VLAN allows splitting the four LAN ports into four segmented networks Tag-based VLAN allows UTM-1 Edge to be connected to a switch via a VLAN trunk, thereby expanding port density Does Safe@Office support VPN access from within the internal network? Yes. Safe@Office supports an internal VPN server to provide VPN access from internal networks, such as wireless connectivity within the internal network. It allows SecuRemote clients to connect from internal networks. It is useful for wireless deployments, independent of the client s physical location (in the wireless network or on the road). Does Safe@Office support rack mounting? Yes. End users can purchase the Safe@Office rack-mount shelf kit that can be used to mount units of all types (wired, wireless) on a 19-inch rack. Each shelf can host two units. Rack-mount shelf kit SKU: CPUTM-EDGE-XG-IND-RM-KIT. Does Safe@Office appliance support wall mounting? Yes. The Safe@Office appliance includes a wall mounting kit. Is there an option for desktop-type power supply? Yes. It is possible to purchase desktop-type power supplies (as opposed to the wall-mount type supplied with the appliance). The SKU for this item is CPWR-12V-DG. Is it possible to purchase a spare power supply unit? Yes. It is possible to purchase a spare power supply unit for UTM-1 Edge. The SKU for this item is CPWR-5V-G. For more information, contact regular distribution channels or your Check Point sales representative. Is there a way to protect the Safe@Office appliance from theft? Yes. The Safe@Office appliance features a security slot to the rear of the right panel, which enables you to secure your appliance against theft by using a standard anti-theft security device available on the market. How are Safe@Office appliances set-up and deployed at the customer premises? Small businesses can use the built-in installation wizard to easily setup a Safe@Office appliance at their office. During installation, customers will be prompted to connect to a Service Center. This is relevant if the customer purchased services for the appliance (either 6
7 via Check Point or through a Managed Security Service Provider (MSSP)). Alternatively, for mass deployments by MSSPs, it is possible to pre-configure the security and networking settings so that the appliance automatically connects to the service provider s Service Center. Further security updates are done centrally via a Service Center and additional management is done either locally via the local user interface or remotely by a MSSP. Do Safe@Office appliances support High Availability (HA)? The High Availability feature is included in the Power Pack upgrade. Customers can purchase a second appliance to create a HA cluster. There are no special SKUs or discounts for HA appliances. What kind of Antivirus is included with Safe@Office appliances? Safe@Office includes Vstream Antivirus protection, which is an embedded stream-based antivirus engine integrated with Check Point Stateful Inspection and Application Intelligence technologies. The Vstream Antivirus performs virus scanning at the kernel level. It scans files for malicious content on the fly, without downloading the files into intermediate storage. This means minimal added latency and support for unlimited file sizes; and since VStream Antivirus stores only minimal state information per connection, it can scan thousands of connections concurrently. Does Safe@Office include licenses for remote access VPN clients? Yes. Each Safe@Office license includes licenses for Check Point VPN-1 SecuRemote to be used with Safe@Office. Can VPN-1 SecureClient connect to Safe@Office? Yes. Does Safe@Office support VPN-1 SecureClient security features? VPN-1 SecureClient interoperates with Safe@Office appliances supporting the internal VPN server and OfficeMode. The Safe@Office appliance does not support the policy server functionality. Dedicated desktop security via VPN-1 SecureClient is supported with other Check Point solutions which support the policy server functionality (for example, VPN-1 Express or VPN-1 Pro gateway). Licensing, Support and Upgrades How do I order Safe@Office 500 UTM appliances? For indirect VARs: Safe@Office is available through regular distribution channels. For direct VARS and service providers: Safe@Office orders should be submitted via your regular distribution channels. Safe@Office appliances are Category III products. 7
8 End-user pricing for VARs, Distributors and E-tailers can be found in the end-user price list at How do I order Evaluation/Demo units? Evaluation units for all Safe@Office products can be ordered through the same channels as other Check Point evaluations (through VARs or Check Point). You can also purchase demo units for 200$ via the following link: Note: Demo units are intended for demonstration purposes only (including lending the unit to a potential customer for a limited period of time) and are not for resale. How is a user defined by the Safe@Office license? A user (or network node) is defined as a computing device that attempts to traverse the firewall. For example, any IP address that tries to pass through the firewall is counted. The IP address is counted even if it is blocked due to a specific rule configuration. Note: we do not differentiate between multiple users using a single machine, that is, a single IP address. In this scenario those individuals will still be counted as one user. What happens if the total user count is exceeded? Safe@Office enforces the count per license. When the count is exceeded, subsequent users will not be allowed access to the WAN. In addition, an error report will be logged and the customer will receive a warning. Is it possible to upgrade Safe@Office appliances? Yes. Additional users and features can be added to the Safe@Office appliance without the need for a hardware replacement. Customers receive a sales confirmation code, register online, and receive a permanent new product key that enables the new functionality. Please refer to the Functionality Upgrade section of the table under the What Safe@Office 500 UTM models are available? question for upgrade options. Note that user count upgrades increase the number of concurrent users and do not affect the features, while the Power Pack upgrade provides advanced features and does not affect the user count. The following calculation method is used for upgrades for the 100, 200 and 400W models: Price of the new model minus 80% of the price of the old model For example, the list price of a functionality upgrade from Safe@Office 405 to Safe@Office 410 is $400 (= $799 - $499 x 80%, where $799 is the list price of the new model). Do internal SecuRemote users count towards the remote access license limit? No. The remote access license limit relates only to external VPN connections on the WAN interface. How can a customer upgrade an existing Safe@Office appliance to an appliance with integrated ADSL modem or WiFi access-point, or to a newer hardware model? Safe@Office Wireless and ADSL models use different hardware than Safe@Office appliances without these capabilities. Upgrading an existing Safe@Office appliance to a wireless or ADSL model requires a hardware trade-in. For more information on hardware trade-ins, contact your reseller or Check Point sales representative. 8
9 What is the RMA (Return Materials Authorization) process? The Service Request and RMA processes are facilitated by the small business support team. Products that are under the initial one-year warranty or under a support plan, and which have been verified by the support team as having malfunctioned are eligible for the Returned Materials Authorization (RMA) process. To obtain an RMA number for a Safe@Office product, contact the small business support team at VARs should contact their distributors for return policy information. What are the support options for Safe@Office appliances? Safe@Office appliances include a standard one-year hardware warranty. Currently, the following annual support and service plans are available from Check Point: Support and Subscription: Security and firmware updates , Web and chat support Advanced replacement Dynamic DNS Advanced Support and Subscription: Security and firmware updates , Web and chat support Advanced replacement Dynamic DNS VStream Antivirus signature updates Application Intelligence updates Note that customers can purchase either of the two Support and Subscription plans. The Web Filtering service can be purchased as a stand-alone or together with either Support plan. How do customers contact the small business support team? The best way to contact support is to open a ticket or chat with an agent via the SofaWare small business support team portal at Who does a VAR or distributor contact for technical questions? For presales technical support, contact your supporting Check Point Sales Engineer (SE). For post-sales support, contact the SofaWare small business support team at Note: Before contacting the support team, make sure you have the customer details and MAC address of the unit in question. The MAC address is listed on the appliance's label and also appears in the Web user interface. Is there an available call-to-action item that can be used with prospective customers? The primary call-to-action is the Small Business Security 101 white paper, which can be found together with other information via the following PartnerMAP link: 9
Cisco Small Business ISA500 Series Integrated Security Appliances
Q & A Cisco Small Business ISA500 Series Integrated Security Appliances Q. What is the Cisco Small Business ISA500 Series Integrated Security Appliance? A. The Cisco Small Business ISA500 Series Integrated
More informationIREBOX X. Firebox X Family of Security Products. Comprehensive Unified Threat Management Solutions That Scale With Your Business
IREBOX X IREBOX X Firebox X Family of Security Products Comprehensive Unified Threat Management Solutions That Scale With Your Business Family of Security Products Comprehensive unified threat management
More informationConfiguring High Availability for Embedded NGX Gateways in SmartCenter
Configuring High Availability for Embedded NGX Gateways in SmartCenter February 2008 Active and Passive Gateway States Contents Introduction...1 High Availability Basics and Terminology...2 Active and
More informationCHECK POINT. Software Blade Architecture. Secure. Flexible. Simple.
CHECK POINT Software Blade Architecture Secure. Flexible. Simple. softwareblades from Check Point Today s Security Challenge Protecting networks against today s constantly evolving threat environment has
More informationThe Evolution of IPS. Intrusion Prevention (Protection) Systems aren't what they used to be
The Evolution of IPS Intrusion Prevention (Protection) Systems aren't what they used to be The Evolution of IPS Contents Background 3 Past Case for Standalone IPS 3 Organizational Control 3 Best-of-Breed
More informationSecuring the Small Business Network. Keeping up with the changing threat landscape
Securing the Small Business Network Keeping up with the changing threat landscape Table of Contents Securing the Small Business Network 1 UTM: Keeping up with the Changing 2 Threat Landscape RFDPI: Not
More informationCisco SA 500 Series Security Appliances
Cisco SA 500 Series Security Appliances An All-in-One Security Solution to Secure Your Small Business The Cisco SA 500 Series Security Appliances, part of the Cisco Small Business Pro Series, are comprehensive
More informationWho s Endian? www.cloudrouter.dk
Who s Endian? Endian was founded in 2003 at Appiano, Italy, by a team of experienced network specialists and Linux enthusiasts. Endian s goal and path of development are immediately clear: creating sophisticated
More informationWireless Services. The Top Questions to Help You Choose the Right Wireless Solution for Your Business. www.megapath.com
Wireless Services The Top Questions to Help You Choose the Right Wireless Solution for Your Business Get Started Now: 877.611.6342 to learn more. www.megapath.com Why Go Wireless? Today, it seems that
More informationCHECK POINT. Software Blade Architecture
CHECK POINT Software Blade Architecture 2 softwareblades from Check Point Today s Security Challenge Protecting enterprises against today s constantly evolving threat environment has never been more challenging.
More informationCHECK POINT TOTAL SECURITY APPLIANCES. Flexible Deployment. Centralized Management.
CHECK POINT TOTAL SECURITY APPLIANCES Flexible Deployment. Centralized Management. Check Point appliances deliver a powerful turnkey solution for deploying Check Point awardwinning software solutions to
More informationUnified Threat Management, Managed Security, and the Cloud Services Model
Unified Threat Management, Managed Security, and the Cloud Services Model Kurtis E. Minder CISSP Global Account Manager - Service Provider Group Fortinet, Inc. Introduction Kurtis E. Minder, Technical
More informationEndpoint Security VPN for Mac
Security VPN for Mac E75 Release Notes 8 April 2012 Classification: [Protected] 2012 Check Point Software Technologies Ltd. All rights reserved. This product and related documentation are protected by
More informationPortal On-Demand Cost-effective and hosted managed security
Security Management Check Point security management solutions provide unified policy management, monitoring, and analysis Security Management Portal On-Demand Cost-effective and hosted managed security
More informationCisco SA 500 Series Security Appliances
Cisco SA 500 Series Security Appliances An All-in-One Security Solution to Secure Your Small Business The Cisco SA 500 Series Security Appliances, part of the Cisco Small Business Pro Series, are comprehensive
More informationCheck Point Software Blade Architecture. Achieving the right balance between security protection and investment
Check Point Software Blade Architecture Achieving the right balance between security protection and investment Check Point Software Blade Architecture Contents Introduction 3 Check Point Software Blade
More informationSofaWare Management Architecture Basics
SofaWare Management Architecture Basics The SofaWare management architecture is made up of several software components. These components are similar to components in FW-1/NG. Some aspects of the SofaWare
More informationFirewall and UTM Solutions Guide
Firewall and UTM Solutions Guide Telephone: 0845 230 2940 e-mail: info@lsasystems.com Web: www.lsasystems.com Why do I need a Firewall? You re not the Government, Microsoft or the BBC, so why would hackers
More informationWhite Paper. ZyWALL USG Trade-In Program
White Paper ZyWALL USG Trade-In Program Table of Contents Introduction... 1 The importance of comprehensive security appliances in today s world... 1 The advantages of the new generation of zyxel usg...
More informationSolution Brief. Branch on Demand. Extending and Securing Access Across the Organization
Solution Brief Branch on Demand Extending and Securing Access Across the Organization Extending Access to Corporate Resources Across the Organization As organizations extend corporate capabilities to teleworkers
More informationCheck Point Software Blade Architecture. Achieving the right balance between security protection and investment
Check Point Software Blade Architecture Achieving the right balance between security protection and investment Contents Introduction 3 Check Point Software Blade architecture overview 3 What is a Software
More informationEndpoint Security VPN for Mac
Security VPN for Mac E80.41 Release Notes 16 January 2013 Classification: [Protected] 2013 Check Point Software Technologies Ltd. All rights reserved. This product and related documentation are protected
More informationCisco ASA 5500 Series Anti-X Edition for the Enterprise
Solution Overview Cisco ASA 5500 Series Anti-X Edition for the Enterprise Viruses and other malicious code can overwhelm your IT resources disrupting business operations and impacting business transactions.
More informationBroadScan. Security Appliances. in-one Security Solution for SMB Combining Performance, ease of use and affordability. A Breakthrough all-in
BroadScan TM Security Appliances A Breakthrough all-in in-one Security Solution for SMB Combining Performance, ease of use and affordability 1 BroadScan Security Appliances Security with superior ROI Lower
More informationSonicWALL Team Nordic Recommendations for safe Unified Threat Management (UTM) Deployments*
SonicWALL Team Nordic Recommendations for safe Unified Threat Management () Deployments* nordic@sonicwall.com tel: +46 8 410 71 700 TZ100/100W 01-SSC-8739 01-SSC-8739 01-SSC-8723 $470/$536W 128Mb RAM 5FE
More informationThe Ultimate WLAN Management and Security Solution for Large and Distributed Deployments
The Ultimate WLAN Management and Security Solution for Large and Distributed Deployments Centralized WLAN management and auto provisioning Manages up to 0 APs with granular access control Advanced RF management
More informationSolution Brief. Branch on Demand. Extending and Securing Access Across the Organization
Solution Brief Branch on Demand Extending and Securing Access Across the Organization Branch on Demand Extending Access to Corporate Resources Across the Organization As organizations extend corporate
More informationNetwork protection and UTM Buyers Guide
Network protection and UTM Buyers Guide Using a UTM solution for your network protection used to be a compromise while you gained in resource savings and ease of use, there was a payoff in terms of protection
More informationQuestion: 1 Which Cisco Small Business portfolio product is targeted to customers who leverage technology s a strategic advantage in their business?
Question: 1 Which Cisco Small Business portfolio product is targeted to customers who leverage technology s a strategic advantage in their business? A. Cisco Small Business Series B. Cisco Integrated Services
More informationRemote Access Clients for Windows
Remote Access Clients for Windows E80.60 Release Notes 3 December 2014 Classification: [Protected] 2014 Check Point Software Technologies Ltd. All rights reserved. This product and related documentation
More informationEdgewater Routers User Guide
Edgewater Routers User Guide For use with 8x8 Service May 2012 Table of Contents EdgeMarc 250w Router Overview.... 3 EdgeMarc 4550-15 Router Overview... 4 Basic Setup of the 250w, 200AE1 and 4550... 5
More informationSimple security is better security Or: How complexity became the biggest security threat
Simple security is better security Or: How complexity became the biggest security threat Christoph Litzbach, Pre-Sales Engineer NSG 1 What do they have in common? DATA BREACH 2 Security is HARD! Components
More informationSonicWALL Advantages Over WatchGuard
Competitive Analysis August 2001 WatchGuard SOHO - Product Overview WatchGuard Technologies extended its product offerings to the fast-growing broadband market through the acquisition of BeadleNet, LLC,
More informationSSL-VPN 200 Getting Started Guide
Secure Remote Access Solutions APPLIANCES SonicWALL SSL-VPN Series SSL-VPN 200 Getting Started Guide SonicWALL SSL-VPN 200 Appliance Getting Started Guide Thank you for your purchase of the SonicWALL SSL-VPN
More informationCustomer Advantage Program
Customer Advantage Program Straightforward upgrades and competitive trade-ins for Dell Security customers The Dell Security Customer Advantage Program offers an upgrade path from current Dell SonicWALL
More informationCisco ASA 5500 Series Content Security Edition for the Enterprise
Cisco ASA 5500 Series Content Security Edition for the Enterprise Viruses and other malicious code can overwhelm your IT resources, disrupting business operations and impacting business transactions. The
More informationSmall Business Network Security 101
October, 2008 Brought to you by: 2003-2007 Check Point Software Technologies Ltd. All rights reserved. 1 Introduction What you don t know about Internet security threats may hurt your business. With broadband
More informationBest Practices for Outdoor Wireless Security
Best Practices for Outdoor Wireless Security This paper describes security best practices for deploying an outdoor wireless LAN. This is standard body copy, style used is Body. Customers are encouraged
More informationSimplify Your Network Security with All-In-One Unified Threat Management
Singtel Business Product Factsheet Brochure Managed Defense Unified Services Management Simplify Your Network Security with All-In-One Unified Management Singtel Managed Unified Management (UTM) Services,
More informationCisco ASA 5500 Series Business Edition
Cisco ASA 5500 Series Business Edition Cisco ASA 5500 Series Business Edition Provides an All-in-One Security Solution The Cisco ASA 5500 Series Business Edition is an enterprise-strength comprehensive
More informationEdgewater Routers User Guide
Edgewater Routers User Guide For use with 8x8 Service Version 1.0, March 2011 Table of Contents EdgeMarc 200AE1-10 Router Overview...3 EdgeMarc 4550-15 Router Overview...4 Basic Setup of the 200AE1 and
More informationAPPENDIX 3 LOT 3: WIRELESS NETWORK
APPENDIX 3 LOT 3: WIRELESS NETWORK A. TECHNICAL SPECIFICATIONS MAIN PURPOSE The Wi-Fi system should be capable of providing Internet access directly to a user using a smart phone, tablet PC, ipad or Laptop
More informationUsing SonicWALL NetExtender to Access FTP Servers
SSL-VPN Using SonicWALL NetExtender to Access FTP Servers Problem: Using NetExtender to access an FTP Server on the LAN segment of a SonicWALL PRO 4060. Solution: Perform the following setup steps. Step
More informationProtecting the Extended Enterprise Network Security Strategies and Solutions from ProCurve Networking
ProCurve Networking by HP Protecting the Extended Enterprise Network Security Strategies and Solutions from ProCurve Networking Introduction... 2 Today s Network Security Landscape... 2 Accessibility...
More informationNext Gen Firewall and UTM Buyers Guide
Next Gen Firewall and UTM Buyers Guide Implementing and managing a network protected by point solutions is far from simple. But complete protection doesn t have to be complicated. This buyers guide explains
More informationSecure Remote Access for the Distributed Business. Challenges, trends, and considerations
Secure Remote Access for the Distributed Business Challenges, trends, and considerations Secure Remote Access for the Distributed Business Contents Overview 3 Remote access trends 3 Increasing security
More informationCisco RV220W Network Security Firewall
Cisco RV220W Network Security Firewall High-Performance, Highly Secure Connectivity for the Small Office The Cisco RV220W Network Security Firewall lets small offices enjoy secure, reliable, wired and
More informationMeraki MX Family Cloud Managed Security Appliances
DATASHEET Meraki MX Family Cloud Managed Security Appliances Overview The Meraki MX is a complete next generation firewall and branch gateway solution, designed to make distributed networks fast, secure,
More informationHow To Choose A Dell Sonicwall Firewall From Awna.Com
2014 BUYING GUIDE: DELL SONICWALL FIREWALLS Compliments of Firewalls.com. Your Source for Dell SonicWALL firewalls and professional services. A first-time buyer s guide to understanding which firewall
More informationCisco ASA 5500 Series Content Security Edition for the Enterprise
Cisco ASA 5500 Series Content Security Edition for the Enterprise Viruses and other malicious code can overwhelm your IT resources disrupting business operations and impacting business transactions. The
More informationBest Practices in Deploying a Secure Wireless Network
Best Practices in Deploying a Secure Wireless Network CONTENTS Abstract 2 Today s concerns 2 Purpose 2 Technology background 3 Today s challenges 4 Key security requirements of an integrated network 4
More informationUsing Cisco UC320W with Windows Small Business Server
Using Cisco UC320W with Windows Small Business Server This application note explains how to deploy the Cisco UC320W in a Windows Small Business Server environment. Contents This document includes the following
More informationSonicWALL Clean VPN. Protect applications with granular access control based on user identity and device identity/integrity
SSL-VPN Combined With Network Security Introducing A popular feature of the SonicWALL Aventail SSL VPN appliances is called End Point Control (EPC). This allows the administrator to define specific criteria
More informationAssessing Business Continuity Solutions
Assessing Business Continuity Solutions Ensuring the uninterrupted operation of businesses is an issue of increasing importance not just for large enterprises but for medium and small organizations as
More informationCloud Managed Security with Meraki MX
Cloud Managed Security with Meraki MX Joe Aronow Product Specialist, Meraki MX #clmel Agenda Introduction: Cloud networking Demo IWAN Product Families Q&A Cisco Meraki: who we are and what we do? Complete
More informationZscaler Internet Security Frequently Asked Questions
Zscaler Internet Security Frequently Asked Questions 1 Technical FAQ PRODUCT LICENSING & PRICING How is Zscaler Internet Security Zscaler Internet Security is licensed on number of Cradlepoint devices
More informationSecure Remote Access Solutions Balancing security and remote access Bob Hicks, Rockwell Automation
Secure Remote Access Solutions Balancing security and remote access Bob Hicks, Rockwell Automation Rev 5058-CO900C Agenda Control System Network Security Defence in Depth Secure Remote Access Examples
More informationUsing a Firewall General Configuration Guide
Using a Firewall General Configuration Guide Page 1 1 Contents There are no satellite-specific configuration issues that need to be addressed when installing a firewall and so this document looks instead
More informationHow To Use A Cisco Wvvvdns4400N Wireless-N Gigabit Security Router For Small Businesses
Cisco WRVS4400N Wireless-N Gigabit Security Router Cisco Small Business Routers Highlights Secure, high-speed wireless network access for small business Gigabit Ethernet connections enable rapid transfer
More informationWATCHGUARD FIREBOX SOHO 6TC AND SOHO 6
WATCHGUARD FIREBOX SOHO 6TC AND SOHO 6 FIREWALL AND VPN APPLIANCES FOR SMALL BUSINESSES AND BRANCH OFFICES Today, complete Internet security goes beyond a firewall. Firebox SOHO 6tc and SOHO 6 are dedicated
More informationTechGuard Firewall Products Specs/Parts/Competitive Analysis
TechGuard Firewall Products Specs/Parts/Competitive Analysis 2003 TechGuard Security, LLC TechGuard Great Walls of Fire Firewalls The Great Walls of Fire firewall is a high performance Internet gateway,
More informationPartner with the UK s leading. Managed Security Service Provider
Partner with the UK s leading Managed Security Service Provider The Talk Straight Advantage Established in 2007, Talk Straight is an ISP with a difference, and is at the forefront of a revolution in cloud
More informationALLNET ALL-VPN10. VPN/Firewall WLAN-N WAN Router
ALLNET ALL-VPN10 VPN/Firewall WLAN-N WAN Router 1~2x100Mbps WAN + 3~4x100Mbps Switch LAN + 2xUSB port+2xwireless Antenna Dual WAN Ports for load balancing Up to 10 IPSec VPN tunnels, VPN Throughput 100Mbps
More informationLICENSE GUIDE. Software Blades products. Number of Strings. SKU Prefix Name Description Additive
LICENSE GUIDE Software Blades products SKU Prefix Name Description Additive CPAP-SG5075 CPAP-SG9075 CPAP-SG11065 CPAP-SG11075 CPAP-SG11085 CPAP-IP2455 CPAP-IP1285 CPAP-IP695 CPAP-IP565 CPAP-IP395 CPAP-IP295
More informationEndpoint Security Considerations for Achieving PCI Compliance
Endpoint Security Considerations for Achieving PCI Compliance Contents PCI Requirements and Endpoint Security 3 Overview of the PCI Data Security Standard 3 Developing a PCI Compliance Plan 4 Endpoint
More informationCisco RV220W Network Security Firewall
Cisco RV220W Network Security Firewall High-Performance, Highly Secure Connectivity for the Small Office The Cisco RV220W Network Security Firewall lets small offices enjoy secure, reliable, wired and
More informationHow to Get NAC Up-and-Running in One Hour. For Check Point Firewall or Endpoint Security Administrators
How to Get NAC Up-and-Running in One Hour For Check Point Firewall or Endpoint Security Administrators Contents Introduction 3 Defining an Organization s Requirements for NAC 3 Two Paths to NAC Port vs.
More informationCisco Virtual Office Express
. Q&A Cisco Virtual Office Express Overview Q. What is Cisco Virtual Office Express? A. Cisco Virtual Office Express is a solution that provides secure, rich network services to workers at locations outside
More informationGigabit Multi-Homing VPN Security Router
As Internet becomes essential for business, the crucial solution to prevent your Internet connection from failure is to have more than one connection. PLANET is a ideal to help the SMBs increase the broadband
More informationAdvantages of Managed Security Services
Advantages of Managed Security Services Cloud services via MPLS networks for high security at low cost Get Started Now: 877.611.6342 to learn more. www.megapath.com Executive Summary Protecting Your Network
More informationIntegrated Security Solutions You Can Trust
PRODUC T LINE Integrated Security Solutions You Can Trust Secure Networking Accessible to Everyone Internet threats do not discriminate based upon the size of a network. Any system connected to the Internet
More informationCisco IOS Advanced Firewall
Cisco IOS Advanced Firewall Integrated Threat Control for Router Security Solutions http://www.cisco.com/go/iosfirewall Presentation_ID 2007 Cisco Systems, Inc. All rights reserved. 1 All-in-One Security
More informationAstaro Gateway Software Applications
Astaro Overview Astaro Products - Astaro Security Gateway - Astaro Web Gateway - Astaro Mail Gateway - Astaro Command Center - Astaro Report Manager Astaro Gateway Software Applications - Network Security
More informationLucent VPN Firewall Security in 802.11x Wireless Networks
Lucent VPN Firewall Security in 802.11x Wireless Networks Corporate Wireless Deployment is Increasing, But Security is a Major Concern The Lucent Security Products can Secure Your Networks This white paper
More informationCisco SR 520-T1 Secure Router
Secure, High-Bandwidth Connectivity for Your Small Business Part of the Cisco Small Business Pro Series Connections -- between employees, customers, partners, and suppliers -- are essential to the success
More informationUnified Threat Management Systems (UTMS), Open Source Routers and Firewalls. Tim Hooks Scott Rolf
Unified Threat Management Systems (UTMS), Open Source Routers and Firewalls Tim Hooks Scott Rolf Session Overview The Linux Kernel is particularly adept at routing IP traffic and lends itself for use as
More informationResults of Testing: Juniper Branch SRX Firewalls
Executive Summary : Juniper Branch SRX Firewalls by Joel Snyder / Opus One prepared for Juniper Networks June 2012 Copyright 2012 : Juniper Branch SRX Firewalls Table of Contents Introduction....1 Firewall
More informationWAN Traffic Management with PowerLink Pro100
Whitepaper WAN Traffic Management with PowerLink Pro100 Overview In today s Internet marketplace, optimizing online presence is crucial for business success. Wan/ISP link failover and traffic management
More informationWAN Failover Scenarios Using Digi Wireless WAN Routers
WAN Failover Scenarios Using Digi Wireless WAN Routers This document discusses several methods for using a Digi wireless WAN gateway to provide WAN failover for IP connections in conjunction with another
More informationIs Your Network Ready for VoIP?
Is Your Network Ready for VoIP? Evaluating firewalls for VoIP access, control and security. CONTENTS The Network Will Never be the Same 2 A VoIP-Ready Firewall Criteria Checklist 2 Control Considerations
More informationFEATURE OVERVIEW. FGX Series firewall. Last updated February 2012
FEATURE OVERVIEW FGX Series firewall Last updated February 2012 Celestix FGX Features Deep Packet Firewall VPN Virtual system DoD/DDoS attach defense Intrusion protection Anti-virus Anti-spam URL filtering
More informationSmall, Medium and Large Businesses
Providing Productivity and Security for Small, Medium and Large Businesses Series Series Super Fast broadband technology High Availability with Multi-WAN Load Balancing Enterprise-level Firewall security
More informationRemote Access VPN Solutions
Remote Access VPN Solutions P/N 500187 June 2000 Check Point Software Technologies Ltd. In this Document: Introduction Page 3 Remote Access VPN Defined Page 3 Business Case Page 4 Key Requirements Page
More informationIntroduction to Cloud Networking. Meraki Solution Overview
Introduction to Cloud Networking Meraki Solution Overview 1 About Meraki, part of Cisco Leader in cloud networking: 20,000+ customer networks deployed Initial technology developed at MIT - tradition of
More informationCisco RV 120W Wireless-N VPN Firewall
Cisco RV 120W Wireless-N VPN Firewall Take Basic Connectivity to a New Level The Cisco RV 120W Wireless-N VPN Firewall combines highly secure connectivity to the Internet as well as from other locations
More informationHow To - Setup Cyberoam VPN Client to connect to a Cyberoam for the remote access using preshared key
How To - Setup Cyberoam VPN Client to connect to a Cyberoam for the remote access using preshared key How To - Setup Cyberoam VPN Client to connect to a Cyberoam for the remote access using preshared key
More informationCISCO SMB CLASS MOBILITY AND WIRELESS SOLUTIONS: THE RESPONSIVE WORKFORCE
CISCO SMB CLASS MOBILITY AND WIRELESS SOLUTIONS: THE RESPONSIVE WORKFORCE BLUEPRINT Cisco Small and Medium Business Class Solutions Cisco offers small and medium-sized business customers a suite of intelligent
More informationNATIONAL GATEWAY SECURITY SURVEY
NATIONAL GATEWAY SECURITY SURVEY REPORT SUMMARY The National Gateway Security Survey 2008 was carried out for value added distributor Wick Hill, specialists in secure infrastructure solutions, and sponsored
More informationThe All-in-One, Intelligent WLAN Controller
The All-in-One, Intelligent WLAN Controller Centralized management for up to 64* APs mitigates complex, inconvenient cabling Wi-Fi deployments Comprehensive features for WLAN performance optimization and
More informationTech Brief. Enterprise Secure and Scalable Enforcement of Microsoft s Network Access Protection in Mobile Networks
Tech Brief Enterprise Secure and Scalable Enforcement of Microsoft s Network Access Protection in Mobile Networks Introduction In today s era of increasing mobile computing, one of the greatest challenges
More informationNeutralizing Spyware in the Enterprise Environment
White Paper Neutralizing Spyware in the Enterprise Environment Check Point protects every part of your network perimeter, internal, Web to keep your information resources safe, accessible, and easy to
More informationTECHNICAL WHITEPAPER. Author: Tom Kistner, Chief Software Architect. Table of Contents
TECHNICAL WHITEPAPER Author: Tom Kistner, Chief Software Architect Last update: 18. Dez 2014 Table of Contents Introduction... 2 Terminology... 2 Basic Concepts... 2 Appliances... 3 Hardware...3 Software...3
More informationThe All-in-One, Intelligent NXC Controller
The All-in-One, Intelligent NXC Controller Centralized management for up to 24 APs ZyXEL Wireless Optimizer for easily planning, deployment and maintenance AP auto discovery and auto provisioning Visualized
More informationDeploying Firewalls Throughout Your Organization
Deploying Firewalls Throughout Your Organization Avoiding break-ins requires firewall filtering at multiple external and internal network perimeters. Firewalls have long provided the first line of defense
More informationThe Attacker s Target: The Small Business
Check Point Whitepaper The Attacker s Target: The Small Business Even Small Businesses Need Enterprise-class Security to protect their Network July 2013 Contents Introduction 3 Enterprise-grade Protection
More informationCisco Meraki solution overview. 2010 Cisco and/or its affiliates. All rights reserved.
Cisco Meraki solution overview 2010 Cisco and/or its affiliates. All rights reserved. Cisco Meraki: a complete cloud-managed networking solution - Wireless, switching, security, WAN optimization, and MDM,
More informationInternet Security for Small to Medium Sized Businesses
Internet Security for Small to Medium Sized Businesses AN INTERNET SECURITY GUIDE FOR EVERY BUSINESS DOCUMENT VERSION 1.2 - OCTOBER 2002 COMPLIMENTS OF POWERWALLZ NETWORK SECURITY INC. 3 Introduction INTERNET
More informationIntelligent WLAN Controller with Advanced Functions
Intelligent WLAN Controller with Advanced Functions Centralized WLAN management and auto provisioning Manages up to 512 APs with granular access control ZyMESH simplifies complex, inconvenient cabling
More informationEnterprise Wireless LAN. Key Features. Benefits. Hotspot/Service Gateway Series
Key Features Comprehensive Wireless Internet Access Solution Zero Configuration IP Plug and Play Unique Ticket Printer for Easy Service and Accounting Web-based User Authentication, Account Monitoring,
More informationADMINISTRATION GUIDE Cisco Small Business
ADMINISTRATION GUIDE Cisco Small Business SA500 Series Security Appliances Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries.
More information