classic | mobile
Follow us on:
Follow us on Facebook  Share via Twitter  Share via LinkedIn
 

Search...
Hi-Tech Security Solutions Business Directory
Residential Estate Security Handbook 2017


Next-generation application aware firewalls from SonicWALL
November 2011, Cyber Security

LOOPHOLD Security Distribution has introduced two high-performance, application-aware next-generation firewalls for branch offices and small medium enterprises (SMEs) from SonicWALL. The NSA 220 Series and NSA 250M Series deliver an unmatched combination of security, performance and price in this class of next-generation firewalls.

The NSA 220 and NSA 250M Series offer firewall protection with tightly integrated intrusion prevention, comprehensive gateway anti-malware services and granular application intelligence and control. Both appliances are also available as dual-band wireless models.

As well as providing extensive security for branch offices without degrading performance, the new appliances allow administrators to manage the unproductive use of network resources such as social media applications that eat away at precious network bandwidth and company resources if left unchecked. For example, a network administrator can allow the marketing team to reach out to customers via Facebook while restricting social and browser gaming during business hours.

Says Martin Tassev, MD at LOOPHOLD Security Distribution, "Branches and remote sites usually lack in the same stringent security measures that the corporate head office features, creating vulnerabilities for the entire organisation. SonicWALL's latest development ensures that these sites, as well as SME's are afforded the same protection against threats whilst providing the same control to manage bandwidth and the usage of social media."

Martin Tassev, MD, LOOPHOLD Security Distribution
Martin Tassev, MD, LOOPHOLD Security Distribution

The NSA 220 and 250M Series appliances offer advanced application traffic analytics to provide granular insight into application traffic, bandwidth utilisation and security threats for troubleshooting and forensics, both in a real-time view on the firewall and a historic view through syslog, IPFIX and NetFlow exported data. Additionally, the NSA 220 and NSA 250M tightly integrate with SonicWALL's recently announced WAN acceleration appliances, reducing network traffic and latency between remote offices.

Key features

The SonicWALL NSA 220 and 250M Series high-performance next-generation firewalls provide distributed enterprises and branch offices alike with in-depth frontline security, as well as application and user control without compromising on network performance.

The SonicWALL Reassembly-Free Deep Packet Inspection (RFDPI) engine protects against malware such as Trojans and worms, and segments out credit card transaction traffic as mandated by PCI DSS regulations. Unlike other scanning engines, the RFDPI engine is not limited by file size or the amount of concurrent traffic it can scan.

The SonicWALL Application Intelligence, Control and Visualisation enables IT to granularly view and control bandwidth-consuming and potentially dangerous application traffic over the network, even between widely distributed locations.

The SonicWALL Clean Wireless, optionally integrated into dual-band wireless models or via SonicWALL SonicPoint wireless access points, provides powerful and secure 802.11a/b/g/n 3x3 MIMO wireless, and enables scanning for rogue wireless access points in compliance with PCI DSS.

The SonicWALL Clean VPN provides integrated secure remote access via site-to-site IPSec VPN or granular, easy-to-use SSL VPN.

SonicWALL WAN Acceleration, enabled by the SonicWALL WXA Series, increases file transfer speeds between remote branch office sites and drives secure network optimisation.

The integrated modules support (on NSA 250M and NSA 250M-W Series appliances) reduced acquisition and maintenance costs through equipment consolidation, and adds deployment flexibility.

For more information contact Martin Tassev, LOOPHOLD Security Distribution, +27 (0)11 575 0004, info@loophold.com


  Share via Twitter   Share via LinkedIn      

Further reading:

  • The cybersecurity of physical ­security
    April 2018, This Week's Editor's Pick, Cyber Security
    Being aware of the dangers is one thing, but actually knowing what you need to look out for and do to secure your surveillance infrastructure, is quite another.
  • The network is the camera
    April 2018, IT infrastructure, Cyber Security
    Protecting your network is a critical step in protecting your security infrastructure as well as your business. Hi-Tech Security Solutions talks to Aruba Networks about network security.
  • The question of value
    April 2018, Technews Publishing, This Week's Editor's Pick, CCTV, Surveillance & Remote Monitoring, Cyber Security, Integrated Solutions
    How do you know your surveillance installation is delivering value? Do your service providers deliver value?
  • Beyond the hype: tomorrow’s surveillance, today’s reality
    April 2018, Technews Publishing, This Week's Editor's Pick, CCTV, Surveillance & Remote Monitoring, Cyber Security, Integrated Solutions, IT infrastructure, Conferences & Events, Training & Education
    iLegal 2017 once again lived up to its reputation and saw a host of presenters offering insights and advice into a range of aspects related to the surveillance world.
  • Securing your surveillance
    April 2018, Cyber Security, CCTV, Surveillance & Remote Monitoring, Integrated Solutions
    What are the basics your average company can do to secure its surveillance infrastructure from the various threats out there?
  • Feeling vulnerable?
    April 2018, Panasonic South Africa, Axis Communications SA, Cyber Security, CCTV, Surveillance & Remote Monitoring
    One could be forgiven for being sick and tired of hearing about cybersecurity, as it seems to be everywhere, all the time. But the threat is real.
  • End-to-end security, day after day
    April 2018, Bosch Security and Safety Systems, Cyber Security
    All it takes for a hacker is finding a single weak link in a surveillance network to gain access to and jeopardise an entire data system.
  • Protecting the nerve centre
    April 2018, CCTV, Surveillance & Remote Monitoring, Cyber Security, Integrated Solutions
    A control room is seen as a secure location that is tasked with securing other locations, but it is not unheard of in South Africa that a control room is hijacked. What can be done to secure these locations?
  • Secure communication technology
    April 2018, Panasonic South Africa, This Week's Editor's Pick, CCTV, Surveillance & Remote Monitoring, Cyber Security
    Cyber-attacks on IoT devices are on the rise, with video surveillance systems connected to the Internet also becoming a popular target.
  • Manage your devices centrally
    April 2018, Axis Communications SA, CCTV, Surveillance & Remote Monitoring, Cyber Security, Products
    Axis launches new software for easy on-site device management and proactive cybersecurity control.
  • How to maintain cybersecurity across all your devices
    April 2018, Axis Communications SA, This Week's Editor's Pick, CCTV, Surveillance & Remote Monitoring, Cyber Security, Integrated Solutions
    It is important that they have the right knowledge and tools to manage cybersecurity throughout the lifecycle of your surveillance system.
  • Strengthening IoT security
    April 2018, This Week's Editor's Pick, Cyber Security, Industrial (Industry)
    Kaspersky Lab comes together with ITU-T to strengthen IoT security through a new standard that classifies security issues for IoT.

 
 
         
Contact:
Technews Publishing (Pty) Ltd
1st Floor, Stabilitas House
265 Kent Ave, Randburg, 2194
South Africa
Publications by Technews
Dataweek Electronics & Communications Technology
Electronic Buyers Guide (EBG)

Hi-Tech Security Solutions
Hi-Tech Security Business Directory (HSBD)

Motion Control in Southern Africa
Motion Control Buyers’ Guide (MCBG)

South African Instrumentation & Control
South African Instrumentation & Control Buyers’ Guide (IBG)
Other
Terms & conditions of use, including privacy policy
PAIA Manual
         
    Mobile | Classic

Copyright © Technews Publishing (Pty) Ltd. All rights reserved.