Your shopping cart is empty!
Today's small- to mid-sized businesses (SMBs) depend on a mobile workforce. The "Consumerizatio n of IT" is driving "Bring Your Own Device" (BYOD) initiatives to deploy smartphones, tablets and-most commonly-Windows- based laptops and netbooks. These IT-managed and non-IT-managed devices require easily deployed secure remote access and endpoint control. Moreover, IT must support and control remote PCs, and handle spikes in remote access for disaster preparedness.The Dell™ SonicWALL™ Secure Remote Access (..
Product Name: SonicWALL 1 GbE 802.3at Gigabit PoE Injector Certifications & Standards: IEEE 802.3at compliant Input Ports: RJ-45 10/100/1000Base-T Output Ports: RJ-45 10/100/1000Base-T Product Model: 01-SSC-5545 Product Type: PoE Injector Network Technology: 10/100/1000Base-T..
Three (3) 10/100Base-T RJ-45 Ethernet Ports, One (1) DB-9 Serial Management Console, Firewall Throughput : 200Mbps, Concurrent Connections : 250,000, Power Supply Dual (2) redundant hot-swap AC power supply, Flash Size 16MB, DRAM : 128MB, 3DES (168-Bit) : 192Mbps..
Providing a secure and stylish way to rack mount the smaller appliances they enable the devices to be located along with other rack mount kit either on site, or perhaps in a data centre. This NSA 220/TZ 215 version also includes a front facing patch panel so that all connections to the SonicWALL can be made at the front, rather than the standard rear connections.Product Name: SonicWALL TZ 215, NSA 220 Rack Mount Kit Product Type: Rack Mount Compatibility: SonicWALL Network Security Appliance Series: NSA 2..
Organizations of all sizes depend on their networks to access internal and external mission-critical applications. As advances in networking continue to provide tremendous benefits, organizations are increasingly challenged by sophisticated and financially- motivated attacks designed to disrupt communication, degrade performance and compromise data. Malicious attacks penetrate outdated stateful packet inspection firewalls with advanced application layer exploits. Point products add layers of security, but a..
The SonicWALL Network Security Appliance (NSA) 220 and NSA 220 Wireless-N Series high-performance Next-Generation Firewalls offer branch offices and distributed enterprises in-depth frontline security, application and user control, network productivity and optional 802.11 dual-band wireless. The NSA 220 Series firewalls act as the first line of network defense against viruses, Trojans, key-loggers and other application layer attacks, without compromising network performance. Management is simplified by cons..
The SonicWALL Network Security Appliance (NSA) 220 and NSA 220 Wireless-N Series high-performance Next-Generation Firewalls offer branch offices and distributed enterprises in-depth frontline security, application and user control, network productivity and optional 802.11 dual-band wireless. The NSA 220 Series firewalls act as the first line of network defense against viruses, Trojans, key-loggers and other application layer attacks, without compromising network performance. Management is simplified by cons..
The SonicWALL Network Security Appliance (NSA) 220 and NSA 220 Wireless-N Series high-performance Next-Generation Firewalls offer branch offices and distributed enterprises in-depth frontline security, application and user control, network productivity and optional 802.11 dual-band wireless. The NSA 220 Series firewalls act as the first line of network defense against viruses, Trojans, key-loggers and other application layer attacks, without compromising network performance. Management is simplified by cons..
High Availability, Multi-Threat Protection, ISP Failover, Deployment Flexibility, WAN Redundancy, IMIX Performance: 225 Mbps, GAV Performance: 100 Mbps, High-performance 2-core Architecture, Automated and Dynamic Security Updates, Stateful Active/Passive Failover, Deep Packet Inspection Signature Service, Integrated Server Load Balancing Feature-set, 3DES and AES VPN Throughput: 300 Mbps, Full Unified Threat Management (UTM) Inspection: 50 MbpsProduct Name: SonicWALL NSA 2400 High Availability (HA) Unit P..
The NSA 2400 applies next-generation Unified Threat Management (UTM) against a comprehensive array of attacks, combining intrusion prevention, anti-virus and antispyware with the application-level control of SonicWALL Application Firewall.Product Name: SonicWALL NSA 2400 Multi-Core UTM Network Security Appliance Product Type: Network Security/Firewall Appliance Network Standard: 10/100/1000Base-T Green Compliant: Yes Green Compliance Certificate/Authority: RoHS, WEEE Compatible Rack Unit: 1U Wi-Fi Standar..
The NSA Series applies next-generation Unified Threat Management (UTM) against a comprehensive array of attacks, combining intrusion prevention, anti-virus and antispyware with the application-level control of SonicWALL Application Intelligence Service. With advanced routing, stateful high-availability and high-speed IPSec and SSL VPN technology, the NSA Series adds security, reliability, functionality and productivity to branch offices, central sites and distributed mid-enterprise networks, while minimizin..
The SonicWALL 4-Port GbE M1 Module expands port density by adding four 1-Gbps Ethernet networking interfaces, without incurring costs of an additional switch and reducing points of failure.Product Name: SonicWALL 4-Port GbE Module for NSA 2400MX Only Product Type: Expansion Module Compatibility: 2400MX Network Security Appliance Product Model: 01-SSC-8825 Data Transfer Rate: 10 Mbps Ethernet, 100 Mbps Fast Ethernet, 1 Gbps Gigabit Ethernet Application/Usage: Data Networking Interfaces/Ports: 4 x 10/100/10..
Organizations of all sizes depend on their networks to access internal and external mission-critical applications. As advances in networking continue to provide tremendous benefts, organizations are increasingly challenged by sophisticated and fnancially- motivated attacks designed to disrupt communication, degrade performance and compromise data. Malicious attacks penetrate outdated stateful packet inspection frewalls with advanced application layer exploits. Point products add layers of security, but are ..
Organizations of all sizes depend on their networks to access internal and external mission-critical applications. As advances in networking continue to provide tremendous benefts, organizations are increasingly challenged by sophisticated and fnancially- motivated attacks designed to disrupt communication, degrade performance and compromise data. Malicious attacks penetrate outdated stateful packet inspection frewalls with advanced application layer exploits. Point products add layers of security, but are ..
Organizations of all sizes depend on their networks to access internal and external mission-critical applications. As advances in networking continue to provide tremendous benefts, organizations are increasingly challenged by sophisticated and fnancially- motivated attacks designed to disrupt communication, degrade performance and compromise data. Malicious attacks penetrate outdated stateful packet inspection frewalls with advanced application layer exploits. Point products add layers of security, but are ..
Your organization faces unprecedented security challenges. The sophistication and volume of attacks increase exponentially, resulting in lost company, personal and customer data, stolen intellectual property, damaged reputations and lost productivity. Security is more complex. You need to clarify what is important when assessing alternatives. With the (bring your own) BYO revolution, the explosion of personal devices connecting to the network, led by smartphones and tablets, slows performance and decreases ..
Your organization faces unprecedented security challenges. The sophistication and volume of attacks increase exponentially, resulting in lost company, personal and customer data, stolen intellectual property, damaged reputations and lost productivity. Security is more complex. You need to clarify what is important when assessing alternatives. With the (bring your own) BYO revolution, the explosion of personal devices connecting to the network, led by smartphones and tablets, slows performance and decreases ..
Your organization faces unprecedented security challenges. The sophistication and volume of attacks increase exponentially, resulting in lost company, personal and customer data, stolen intellectual property, damaged reputations and lost productivity. Security is more complex. You need to clarify what is important when assessing alternatives. With the (bring your own) BYO revolution, the explosion of personal devices connecting to the network, led by smartphones and tablets, slows performance and decreases ..