Follow us on:
Follow us on Facebook  Share via Twitter  Share via LinkedIn
 

Search...
Hi-Tech Security Solutions Business Directory


Next-generation application aware firewalls from SonicWALL
November 2011, Information Security

LOOPHOLD Security Distribution has introduced two high-performance, application-aware next-generation firewalls for branch offices and small medium enterprises (SMEs) from SonicWALL. The NSA 220 Series and NSA 250M Series deliver an unmatched combination of security, performance and price in this class of next-generation firewalls.

The NSA 220 and NSA 250M Series offer firewall protection with tightly integrated intrusion prevention, comprehensive gateway anti-malware services and granular application intelligence and control. Both appliances are also available as dual-band wireless models.

As well as providing extensive security for branch offices without degrading performance, the new appliances allow administrators to manage the unproductive use of network resources such as social media applications that eat away at precious network bandwidth and company resources if left unchecked. For example, a network administrator can allow the marketing team to reach out to customers via Facebook while restricting social and browser gaming during business hours.

Says Martin Tassev, MD at LOOPHOLD Security Distribution, "Branches and remote sites usually lack in the same stringent security measures that the corporate head office features, creating vulnerabilities for the entire organisation. SonicWALL's latest development ensures that these sites, as well as SME's are afforded the same protection against threats whilst providing the same control to manage bandwidth and the usage of social media."

Martin Tassev, MD, LOOPHOLD Security Distribution
Martin Tassev, MD, LOOPHOLD Security Distribution

The NSA 220 and 250M Series appliances offer advanced application traffic analytics to provide granular insight into application traffic, bandwidth utilisation and security threats for troubleshooting and forensics, both in a real-time view on the firewall and a historic view through syslog, IPFIX and NetFlow exported data. Additionally, the NSA 220 and NSA 250M tightly integrate with SonicWALL's recently announced WAN acceleration appliances, reducing network traffic and latency between remote offices.

Key features

The SonicWALL NSA 220 and 250M Series high-performance next-generation firewalls provide distributed enterprises and branch offices alike with in-depth frontline security, as well as application and user control without compromising on network performance.

The SonicWALL Reassembly-Free Deep Packet Inspection (RFDPI) engine protects against malware such as Trojans and worms, and segments out credit card transaction traffic as mandated by PCI DSS regulations. Unlike other scanning engines, the RFDPI engine is not limited by file size or the amount of concurrent traffic it can scan.

The SonicWALL Application Intelligence, Control and Visualisation enables IT to granularly view and control bandwidth-consuming and potentially dangerous application traffic over the network, even between widely distributed locations.

The SonicWALL Clean Wireless, optionally integrated into dual-band wireless models or via SonicWALL SonicPoint wireless access points, provides powerful and secure 802.11a/b/g/n 3x3 MIMO wireless, and enables scanning for rogue wireless access points in compliance with PCI DSS.

The SonicWALL Clean VPN provides integrated secure remote access via site-to-site IPSec VPN or granular, easy-to-use SSL VPN.

SonicWALL WAN Acceleration, enabled by the SonicWALL WXA Series, increases file transfer speeds between remote branch office sites and drives secure network optimisation.

The integrated modules support (on NSA 250M and NSA 250M-W Series appliances) reduced acquisition and maintenance costs through equipment consolidation, and adds deployment flexibility.

For more information contact Martin Tassev, LOOPHOLD Security Distribution, +27 (0)11 575 0004, info@loophold.com


  Share via Twitter   Share via LinkedIn      

Further reading:

  • Stopping the leak
    May 2015, Information Security
    The damage that data loss can do to an inadequately secured enterprise extends far beyond pecuniary matters and can include reputation loss, regulatory consequences, a decrease in customer confidence, trust issues, a drop in market share, and the development of trade barriers.
  • Cyber risks severely underrated
    May 2015, Information Security, Enterprise Solutions
    South Africa is the fifth most targeted country in the world in terms of cybercrime attacks, while informal consensus within the private sector places SA third behind Russia and China.
  • Detection and response
    May 2015, Information Security
    Recent large-scale attacks move focus from blocking and detecting attacks, to detecting and responding to attacks. Gartner says by 2018, 40% of large organisations will have formal plans to address aggressive cyber-security business disruption attacks.
  • Data security is essential for Government
    May 2015, Government and Parastatal (Industry), Information Security
    Cybercrime is a burgeoning threat, not only to business but also to governments all over the world. The increasing number of highly publicised examples of cybercrime highlights this trend.
  • Understanding intelligence
    April 2015, Vision Catcher, Information Security
    Intelligence is gained from many aspects of surveillance that does not necessarily require a picture. Information only becomes intelligent when it is used with all other available information to provide the basis for a decision and perhaps a result.
  • Anticipate, adapt, activate
    April 2015, Information Security
    Annual global EY survey finds organisations are still unprepared for inevitable cyber attacks.
  • Widening gulf between perception and reality
    April 2015, Information Security
    Cisco unveils security manifesto as a foundation for organisations in South Africa to better understand and respond to today’s cybersecurity challenges.
  • Experian SA launches new fraud prevention solution
    April 2015, Information Security, Security Services & Risk Management
    Experian SA has launched the National Fraud Prevention Solution to address the significant threat of identity and credit application fraud in South Africa.
  • Safer than Sony
    March 2015, Information Security
    Carey van Vlaanderen, CEO of ESET Southern Africa, discusses three cyber security lessons learned from 2014’s most notorious hack.
  • Security in the modern age
    March 2015, Information Security
    It is now universally accepted that ever-increasing sophistication in technology, however ground-breaking it may be, brings with it a host of security challenges. The greater the innovation in how it’s ...
  • Careless employees the greatest mobile threat
    January 2015, Information Security
    Check Point’s third annual mobile security survey highlights careless employees as the greatest mobile security threat. 82% of security professionals expect the number of mobile security incidents to increase in 2015.
  • IFSEC SA 2015 focuses on retaining data securely
    November 2014, Security Services & Risk Management, Information Security
    Data storage and recovery has become big business as companies realise the true cost of losing all their strategic data to carelessness, fire or theft. Enterprise Strategy Group research indicates that ...

 
 
         
Contact:
Technews Publishing (Pty) Ltd
1st Floor, Stabilitas House
265 Kent Ave, Randburg, 2194
South Africa
Publications by Technews
Dataweek Electronics & Communications Technology
Electronic Buyers Guide (EBG)

Hi-Tech Security Solutions
Hi-Tech Security Business Directory (HSBD)

Motion Control in Southern Africa
Motion Control Buyers’ Guide (MCBG)

South African Instrumentation & Control
South African Instrumentation & Control Buyers’ Guide (IBG)
Other
Terms & conditions of use, including privacy policy
PAIA Manual
         
    Mobile | Classic

Copyright © Technews Publishing (Pty) Ltd. All rights reserved.