classic | mobile
Follow us on:
Follow us on Facebook  Share via Twitter  Share via LinkedIn

Hi-Tech Security Solutions Business Directory

Next-generation application aware firewalls from SonicWALL
November 2011, Cyber Security

LOOPHOLD Security Distribution has introduced two high-performance, application-aware next-generation firewalls for branch offices and small medium enterprises (SMEs) from SonicWALL. The NSA 220 Series and NSA 250M Series deliver an unmatched combination of security, performance and price in this class of next-generation firewalls.

The NSA 220 and NSA 250M Series offer firewall protection with tightly integrated intrusion prevention, comprehensive gateway anti-malware services and granular application intelligence and control. Both appliances are also available as dual-band wireless models.

As well as providing extensive security for branch offices without degrading performance, the new appliances allow administrators to manage the unproductive use of network resources such as social media applications that eat away at precious network bandwidth and company resources if left unchecked. For example, a network administrator can allow the marketing team to reach out to customers via Facebook while restricting social and browser gaming during business hours.

Says Martin Tassev, MD at LOOPHOLD Security Distribution, "Branches and remote sites usually lack in the same stringent security measures that the corporate head office features, creating vulnerabilities for the entire organisation. SonicWALL's latest development ensures that these sites, as well as SME's are afforded the same protection against threats whilst providing the same control to manage bandwidth and the usage of social media."

Martin Tassev, MD, LOOPHOLD Security Distribution
Martin Tassev, MD, LOOPHOLD Security Distribution

The NSA 220 and 250M Series appliances offer advanced application traffic analytics to provide granular insight into application traffic, bandwidth utilisation and security threats for troubleshooting and forensics, both in a real-time view on the firewall and a historic view through syslog, IPFIX and NetFlow exported data. Additionally, the NSA 220 and NSA 250M tightly integrate with SonicWALL's recently announced WAN acceleration appliances, reducing network traffic and latency between remote offices.

Key features

The SonicWALL NSA 220 and 250M Series high-performance next-generation firewalls provide distributed enterprises and branch offices alike with in-depth frontline security, as well as application and user control without compromising on network performance.

The SonicWALL Reassembly-Free Deep Packet Inspection (RFDPI) engine protects against malware such as Trojans and worms, and segments out credit card transaction traffic as mandated by PCI DSS regulations. Unlike other scanning engines, the RFDPI engine is not limited by file size or the amount of concurrent traffic it can scan.

The SonicWALL Application Intelligence, Control and Visualisation enables IT to granularly view and control bandwidth-consuming and potentially dangerous application traffic over the network, even between widely distributed locations.

The SonicWALL Clean Wireless, optionally integrated into dual-band wireless models or via SonicWALL SonicPoint wireless access points, provides powerful and secure 802.11a/b/g/n 3x3 MIMO wireless, and enables scanning for rogue wireless access points in compliance with PCI DSS.

The SonicWALL Clean VPN provides integrated secure remote access via site-to-site IPSec VPN or granular, easy-to-use SSL VPN.

SonicWALL WAN Acceleration, enabled by the SonicWALL WXA Series, increases file transfer speeds between remote branch office sites and drives secure network optimisation.

The integrated modules support (on NSA 250M and NSA 250M-W Series appliances) reduced acquisition and maintenance costs through equipment consolidation, and adds deployment flexibility.

For more information contact Martin Tassev, LOOPHOLD Security Distribution, +27 (0)11 575 0004,

  Share via Twitter   Share via LinkedIn      

Further reading:

  • Multi-modal security best for registered financial service providers
    October 2016, Technews Publishing, This Week's Editor's Pick, CCTV, Surveillance & Remote Monitoring, Access Control & Identity Management, Cyber Security, Integrated Solutions, Financial (Industry)
    The financial sector faces a number of security challenges that range from outright banking hall robberies, through theft of money at ATMs, internal and external fraud, as well as phishing and similar cyber threats.
  • After the data breach
    October 2016, This Week's Editor's Pick, Cyber Security, Security Services & Risk Management, Financial (Industry)
    Lifars and Fortress Strategic Communications outline steps companies need to take after they contain the data breach and initiate the process of normalising business operations.
  • Biometric skimmers are here
    October 2016, News, Cyber Security
    According to a Kaspersky Lab investigation into underground cybercrime, there are already at least twelve sellers offering skimmers capable of stealing victims’ fingerprints.
  • Great cyber security needs great people
    October 2016, This Week's Editor's Pick, Cyber Security, IT infrastructure, Training, Conferences & Events
    Solutions are not reaching their full potential thanks to a dire shortage of cyber security professionals to harness them.
  • Tyco strengthens reader-to-panel communications
    October 2016, Tyco Security Products, Access Control & Identity Management, Cyber Security
    C•CURE 9000 v2.50 event management platform now supports Open Supervised Device Protocol (OSDP), developed by the Security Industry Association (SIA) to allow for enhanced interoperability among security devices.
  • New Milestone VMS
    October 2016, Milestone Systems, CCTV, Surveillance & Remote Monitoring, Cyber Security, Integrated Solutions, Products
    Milestone XProtect 2016 R3 Advanced VMS announced with focus on total cost of ownership, performance and cyber security – making video solutions more cost-effective through innovative new features.
  • Social media: help or hindrance?
    October 2016, ADT Security, Security Services & Risk Management, Cyber Security
    The proliferation of social media platforms must be seen as an advantage when it comes to crime prevention.
  • Are you a whale?
    October 2016, Cyber Security, IT infrastructure
    Whaling attacks, also called Business Email Compromise, is a form of elaborate spear phishing, usually targeting C-level executives, i.e. the ‘big fish’.
  • IoT: big opportunities, bigger challenges
    October 2016, Cyber Security, Integrated Solutions, IT infrastructure
    Much like cloud and mobility before it, the Internet of things (IoT) is a topic on everyone’s lips, and nowhere is this truer than in the security industry.
  • 80/20 rule for cyber crime
    October 2016, Cyber Security, Security Services & Risk Management
    Cyber criminals focus 80% of their efforts on the 20% of IT environment neglected by companies.
  • Threats businesses need to know about
    October 2016, Westcon-Comstor Southern Africa, Cyber Security
    Some of the most dangerous threats to enterprises come in the form of targeted attacks – including stealthy advanced persistent threats (APTs).
  • Understanding the Cybercrimes Bill
    October 2016, Cyber Security
    The aim of the Cybercrimes and Cybersecurity Bill (Cybercrimes Bill) is to stop cybercrime and to improve security for South African citizens.

Technews Publishing (Pty) Ltd
1st Floor, Stabilitas House
265 Kent Ave, Randburg, 2194
South Africa
Publications by Technews
Dataweek Electronics & Communications Technology
Electronic Buyers Guide (EBG)

Hi-Tech Security Solutions
Hi-Tech Security Business Directory (HSBD)

Motion Control in Southern Africa
Motion Control Buyers’ Guide (MCBG)

South African Instrumentation & Control
South African Instrumentation & Control Buyers’ Guide (IBG)
Terms & conditions of use, including privacy policy
PAIA Manual
    Mobile | Classic

Copyright © Technews Publishing (Pty) Ltd. All rights reserved.