Sonicwall
SonicWALL TZ400 TotalSecure - Advanced Edition (1 Year)
Many in stock
Datasheet
The TZ400 offers enterprise-grade protection for retail and small business networksSecurity can be a strong differentiator. Regardless of the size of your organization, the TZ400 delivers big-business protection. For distributed enterprises with remote offices, all TZ Series firewalls can be managed locally through the intuitive GUI in SonicOS or at the central office using SonicWall GMS.
Protect your organization with highly effective intrusion prevention, anti-malware, content/URL filtering and application control with the business-grade SonicWall TZ Series Unified Threat Management (UTM) firewalls. Eliminate network bottlenecks and increase productivity while also providing secure access to a broad range of mobile devices, including laptops, smartphones and tablets. Confidently deploy this secure, sophisticated small-business firewall appliance in a wide range of organizations, such as retail, branch/remote offices or home offices. With a SonicWall TZ Series firewall, you can be assured your wired and wireless networks are protected by a secure, sophisticated and widely deployed security platform.
Intrusion prevention, network-based anti-malware with cloud assist, content and URL filtering and anti-spam services
Take advantage of Advanced Gateway Security Suite (AGSS) to deliver a multi-engine sandbox, powerful anti‐virus, anti‐spyware, intrusion prevention, content filtering, as well as application intelligence and control services. Protect your network against known and unknown advanced persistent threats.
Traffic inspection across all ports, without compromising performance
Leverage the TZ Series' patented, Reassembly-Free Deep Packet Inspection (RFDPI) technology to examine traffic simultaneously across all ports without introducing latency to your network.
Examine suspicious files in a cloud-based isolated environment
Deploy a cloud-based, multi-engine sandbox for stopping unknown and zero-day attacks at the gateway, with automated remediation. Examine a broad range of file types, program or code in an isolated environment to detect and stop advanced threats.
Native SSL VPN secure mobile access for multiple device platforms
Provide users with easy, network-level access to corporate and academic resources over encrypted SSL VPN connections. SonicWall Mobile Connect is easily downloadable from the Apple App Store, Google Play or the Kindle Store, and is embedded with Windows 8.1 devices.
Multiple zones of controlled access for both wired and wireless users
Implement multiple zones of access for both wired and wireless users, while maintaining total control over who is accessing what on your network. Ensure secure Internet access with our Wireless Network Security solution, which combines UTM with high-speed 802.11ac wireless to encrypt and ensure the integrity of all traffic.
Intuitive ease of use
Ensure bandwidth for critical applications and block unproductive applications. Make security easy for your IT department with the industry's most advanced, object-based management operating system — SonicOS. Thanks to an intuitive interface, you don't have to sacrifice ease of use for power.
Features
SonicWall TZ Series Unified Threat Management (UTM) firewalls deliver high performance and proven best-in-class protection to small businesses with integrated intrusion prevention, anti-malware and content/URL filtering capabilities.
- Full-featured, advanced security
- Deliver full-featured security that combines intrusion prevention, gateway anti-virus, anti-spyware, content filtering and anti-spam services, with intuitive, easy-to-use SonicWall TZ Series firewalls.
- Fast, reliable, enhanced performance
- Examine all wired and wireless traffic for threats, without slowing down your network, using the patented1 SonicWall Reassembly-Free Deep Packet Inspection (RFDPI) technology. TZ Series firewalls also ensure bandwidth for critical business applications, while blocking unproductive applications.
- Broad, flexible, remote access
- Provide mobile users with native VPN remote access clients for Apple® iOS, Google® Android, Windows® 8.1, Mac OS® X, Kindle Fire and Linux, via your small-business firewall. This unique client also supports the firewall's capability to decontaminate threats from VPN traffic.
- Easy to deploy, all-in-one solution
- Enjoy the convenience and affordability of deploying your TZ Series appliance as a SonicWall TotalSecure solution. This combines the hardware and all the services needed for comprehensive network protection from viruses, spyware, worms, Trojans, key loggers and more — before they enter your network — and without the complexity of building your own security package.
- Wireless network security
- Enable high-speed wireless connectivity at businesses, schools, stores and branch offices with the superior performance and signal quality of 802.11ac*. Use integrated wireless or combine a SonicPoint with an award-winning SonicWall next-generation firewall to create a wireless network security solution that protects wireless traffic from evolving threats.
- Support for a more converged infrastructure
- Ease network security deployment and management with rapidly scalable switch integration. With the integration of the Dell X-Series switch (not available on the SOHO model), more devices can connect to the TZ firewall giving granular security control. These switches support Power over Ethernet (PoE) to support SonicPoint wireless access points, as well as third party devices such as PoE surveillance cameras.
Returns Policy
Unless otherwise stated below, you have 30 days from the date your product left the warehouse (regardless of when you actually took delivery of the product) to get a valid RMA from our website and get your product to a shipper to return back to us. It does not have to be back in our warehouse within 30 days, but it does have to be in the possession of the shipper (along with the valid RMA). RMAs must be valid, unexpired, and issued for the product being returned. Only one RMA is issued per return. When it expires, you may no longer return your product. If you are ineligible for an RMA, contact the manufacturer directly or check any applicable warranty you might have. See the Manufacturer Contact List at the bottom of this page. Except as provided for verified defective products (See Special Returns Policy for Defective Products below), you will be responsible for all shipping charges for returns sent to our Returns Warehouse. All products are subject to a 15% restocking fee (except where prohibited by law) if returned opened or in a non-factory sealed box, provided that there is no restocking fee for defective products (see Special Returns Policy for Defective Products below). Upon our acceptance of the merchandise in like new condition in strict conformance with the basic criteria and basic returns policy, the purchase price will be credited to the credit card used for the original purchase. Please allow up to fourteen days from shipment for your return to arrive at our Returns Warehouse, delivery times vary based on shipper selected. Your return will be processed within 5-7 business days (excluding Saturdays, Sundays, and holidays) after receipt of the item. Many of the items we sell have Special Return Policies. See the appropriate policy below to see if items you purchase are affected. The risk of loss for the product being returned shall be with you at all times during the shipment of such product to the returns center and with respect to any shipments from the returns center back to you, the original distributor or manufacturer, or any buyer through the liquidation process. Title to the product being returned will remain with you at all times and transfer from you to the original distributor, or a third party in the case of a liquidation of the return, only upon receipt of the products by such distributors or buyers.
Defective Products
Defective products can only be returned in exchange for the exact same product, or at the sole discretion of Protective Data Solutions, the purchase price will be credited to the credit card used for the original purchase. Defective products may only be returned within 30 days of the date your product left the warehouse (regardless of when you actually took delivery of the product). Once your return is processed, and is verified to meet the basic criteria above and to be defective, your replacement order will be sent to fulfillment. How quickly your replacement product ships after that depends on product availability. For products that we verify to be defective, we will reimburse you for your original shipping expenses, provided that your defective return must be shipped via ground shipment only. If you return your product via a faster, more expensive shipper, you incur the expenses yourself and any request for reimbursement will be denied. Protective Data Solutions in its sole and absolute discretion shall be the sole determiner of whether a product is in fact defective.
Shipping
We can ship to virtually any address in the world. Note that there are restrictions on some products, and some products cannot be shipped to international destinations.
When you place an order, we will estimate shipping and delivery dates for you based on the availability of your items and the shipping options you choose. IF THE ITEM IS A LICENSE OR RENEWAL, e-Deliveries will be processed the same business day. Depending on the shipping provider you choose, shipping date estimates may appear on the shipping quotes page.
Please also note that the shipping rates for many items we sell are weight-based. The weight of any such item can be found on its detail page. To reflect the policies of the shipping companies we use, all weights will be rounded up to the next full pound.
Discounts
Bulk discounting is available, so give us a call or email us at sales@protectivedatasolutions.com and we can build you a custom quote and see if we can save you even more off the advertised price.Payment Options
You may also pay via Cashiers Check, Bank Wire, and more. Contact us for other payment options.