Comprehensive Gateway Security Suite for NSA 6600 5 Year
Sale

Sonicwall

Comprehensive Gateway Security Suite for NSA 6600 5 Year

01-SSC-4214

Many in stock

$42,229.00 $30,257.08
-
+
Add to wishlist

Datasheet

Network Security Appliance Series Overview:

Industry-validated security effectiveness and performance for mid-sized networks

The SonicWall Network Security Appliance (NSA) series provides midsized networks, branch offices and distributed enterprises with advanced threat prevention in a high-performance security platform. Combining nextgeneration firewall technology with our patented* Reassembly-Free Deep Packet Inspection (RFDPI) engine on a multi-core architecture, the NSA series offers the security, performance and control organizations require.

Benefits:

Superior threat prevention and performance

  • Patented reassembly-free deep packet inspection technology
  • On-box and cloud-based threat prevention
  • SSL/TLS decryption and inspection
  • Industry-validated security effectiveness
  • Multi-core hardware architecture
  • Dedicated in-house threat research team

Network control and flexibility

  • Powerful SonicOS operating system
  • Application intelligence and control
  • Network segmentation with VLANs
  • Wireless network security

Easy deployment, setup and ongoing management

  • Tightly integrated solution
  • Centralized management
  • Scalability through multiple hardware platforms
  • Low total cost of ownership

Superior threat prevention and performance

SonicWall Live Demo Site - Experience SonicWall for yourself! Click here.NSA series next-generation firewalls (NGFWs) integrate a series of advanced security technologies to deliver a superior level of threat prevention. Our patented single-pass RFDPI threat prevention engine examines every byte of every packet, inspecting both inbound and outbound traffic simultaneously. The NSA series leverages on-box capabilities including intrusion prevention, anti-malware and web/URL filtering in addition to cloud-based services such as CloudAV and SonicWall Capture multi-engine sandboxing to block zero-day threats at the gateway. Unlike other security products that cannot inspect large files for hidden threats, NSA firewalls scan files of any size across all ports and protocols. The security architecture in SonicWall NGFWs has been validated as one of the industry’s best for security effectiveness by NSS Labs which awarded SonicWall its “Recommended” rating for the fourth consecutive year.

Going beyond intrusion prevention, anti-malware and web filtering, SonicWall NGFWs provide a further level of protection by performing full decryption and inspection of TLS/SSL and SSH encrypted traffic as well as non-proxyable applications, enabling complete protection regardless of transport or protocol. It looks deep inside every packets (the header and data part) searching for protocol non-compliance, threats, zero-days, intrusions, and even defined criteria to detect and prevent hidden attacks that leverage cryptography, block encrypted malware downloads, cease the spread of infections, and thwart command and control (C&C) communications and data exfiltration. Inclusion and exclusion rules allow total control to customize which traffic is subjected to decryption and inspection based on specific organizational compliance and/ or legal requirements.

When organizations activate deep packet inspection functions such as intrusion prevention, anti-virus, anti spyware, TLS/SSL decryption/inspection and others on their firewalls network performance often slows down, sometimes dramatically. NSA series firewalls feature a multi-core hardware architecture that utilizes specialized security microprocessors. Combined with our RFDPI engine, this unique design eliminates the performance degradation networks experience with other firewalls.

In today’s security environment, it’s not enough to rely on solely on outside parties for threat information. That’s why SonicWall formed its own in-house threat research team more than 15 years ago. This dedicated team gathers, analyzes and vets data from over one million sensors in its GRID network. SonicWall also participates in industry collaboration efforts and engages with threat research communities to gather and share samples of attacks and vulnerabilities. This shared threat intelligence is used to develop real-time countermeasures that are automatically deployed to our customers’ firewalls.

Network control and flexibility

At the core of the NSA series is SonicOS, SonicWall’s feature-rich operating system. SonicOS provides organizations with the network control and flexibility they require through application intelligence and control, real-time visualization, an intrusion prevention system (IPS) featuring sophisticated antievasion technology, high-speed virtual private networking (VPN) and other robust security features.

Using application intelligence and control, network administrators can identify and categorize productive applications from those that are unproductive or potentially dangerous, and control that traffic through powerful application-level policies on both a peruser and a per-group basis (along with schedules and exception lists). Businesscritical applications can be prioritized and allocated more bandwidth while non-essential applications are bandwidth-limited. Real-time monitoring and visualization provides a graphical representation of applications, users and bandwidth usage for granular insight into traffic across the network.

For organizations that require advanced flexibility in their network design, SonicOS offers the tools to securely segment the network through the use of virtual LANs (VLANs) which enable network administrators to create a virtual LAN interface that allows for network separation into one or more logical groups. Administrators create rules that determine the level of communication with devices on other VLANs.

Built into every NSA series firewall is a wireless access controller that enables organizations to extend the network perimeter securely through the use of wireless technology. Together, SonicWall firewalls and SonicPoint 802.11ac wireless access points create a wireless network security solution that combines industry-leading next-generation firewall technology with high-speed wireless for enterprise-class network security and performance across the wireless network.

Easy deployment, setup and ongoing management

Like all SonicWall firewalls, the NSA series tightly integrates key security, connectivity and flexibility technologies into a single, comprehensive solution. This includes SonicPoint wireless access points and the SonicWall WAN Acceleration Appliance (WXA) series, both of which are automatically detected and provisioned by the managing NSA firewall. Consolidating multiple capabilities eliminates the need to purchase and install point products that don’t always work well together. This reduces the effort it takes to deploy the solution into the network and configure it, saving both time and money.

Ongoing management and monitoring of network security are handled centrally through the firewall or through the SonicWall Global Management System (GMS), providing network administrators with a single pane of glass from which to manage all aspects of the network. Together, the simplified deployment and setup along with the ease of management enable organizations to lower their total cost of ownership and realize a high return on investment.

Network Security Appliance Features:

  • Best in-class protection
  • Multi-core architecture
  • Ultra high performance
  • Intrusion prevention
  • Network-based anti-malware
  • Secure remote access
  • Secure wireless
  • URL filtering
  • Gateway anti-spam
  • Application control
  • Centralized management

The SonicWall NSA Series next-generation firewalls (NGFWs) utilize the latest multi-core hardware design and Reassembly-Free Deep Packet Inspection to protect the network from internal and external attacks without compromising performance. The NSA Series combines intrusion prevention, content and URL inspection, application intelligence and control, high availability and other advanced networking features.

  • The SonicWall NSA 6600 is ideal for large distributed and corporate central site environments requiring high throughput capacity and performance.
  • The SonicWall NSA 5600 is ideal for distributed, branch office and corporate environments needing significant throughput.
  • The SonicWall NSA 3600/4600 is ideal for branch office and small- to medium-sized corporate environments concerned about throughput capacity and performance.
  • The SonicWall NSA 2650 delivers high-speed threat prevention over thousands of encrypted and even more unencrypted connections to mid-sized organizations and distributed enterprises.
  • The SonicWall NSA 2600 is designed to address the needs of growing small organizations, branch offices and school campuses.

*U.S. Patents 7,310,815; 7,600,257; 7,738,380; 7,835,361; 7,991,723

Returns Policy

Unless otherwise stated below, you have 30 days from the date your product left the warehouse (regardless of when you actually took delivery of the product) to get a valid RMA from our website and get your product to a shipper to return back to us. It does not have to be back in our warehouse within 30 days, but it does have to be in the possession of the shipper (along with the valid RMA). RMAs must be valid, unexpired, and issued for the product being returned. Only one RMA is issued per return. When it expires, you may no longer return your product. If you are ineligible for an RMA, contact the manufacturer directly or check any applicable warranty you might have. See the Manufacturer Contact List at the bottom of this page. Except as provided for verified defective products (See Special Returns Policy for Defective Products below), you will be responsible for all shipping charges for returns sent to our Returns Warehouse. All products are subject to a 15% restocking fee (except where prohibited by law) if returned opened or in a non-factory sealed box, provided that there is no restocking fee for defective products (see Special Returns Policy for Defective Products below). Upon our acceptance of the merchandise in like new condition in strict conformance with the basic criteria and basic returns policy, the purchase price will be credited to the credit card used for the original purchase. Please allow up to fourteen days from shipment for your return to arrive at our Returns Warehouse, delivery times vary based on shipper selected. Your return will be processed within 5-7 business days (excluding Saturdays, Sundays, and holidays) after receipt of the item. Many of the items we sell have Special Return Policies. See the appropriate policy below to see if items you purchase are affected. The risk of loss for the product being returned shall be with you at all times during the shipment of such product to the returns center and with respect to any shipments from the returns center back to you, the original distributor or manufacturer, or any buyer through the liquidation process. Title to the product being returned will remain with you at all times and transfer from you to the original distributor, or a third party in the case of a liquidation of the return, only upon receipt of the products by such distributors or buyers.

Defective Products

Defective products can only be returned in exchange for the exact same product, or at the sole discretion of Protective Data Solutions, the purchase price will be credited to the credit card used for the original purchase. Defective products may only be returned within 30 days of the date your product left the warehouse (regardless of when you actually took delivery of the product). Once your return is processed, and is verified to meet the basic criteria above and to be defective, your replacement order will be sent to fulfillment. How quickly your replacement product ships after that depends on product availability. For products that we verify to be defective, we will reimburse you for your original shipping expenses, provided that your defective return must be shipped via ground shipment only. If you return your product via a faster, more expensive shipper, you incur the expenses yourself and any request for reimbursement will be denied. Protective Data Solutions in its sole and absolute discretion shall be the sole determiner of whether a product is in fact defective.

Shipping

We can ship to virtually any address in the world. Note that there are restrictions on some products, and some products cannot be shipped to international destinations.

When you place an order, we will estimate shipping and delivery dates for you based on the availability of your items and the shipping options you choose. IF THE ITEM IS A LICENSE OR RENEWAL, e-Deliveries will be processed the same business day. Depending on the shipping provider you choose, shipping date estimates may appear on the shipping quotes page.

Please also note that the shipping rates for many items we sell are weight-based. The weight of any such item can be found on its detail page. To reflect the policies of the shipping companies we use, all weights will be rounded up to the next full pound.

Discounts

Bulk discounting is available, so give us a call or email us at sales@protectivedatasolutions.com and we can build you a custom quote and see if we can save you even more off the advertised price.

Payment Options

You may also pay via Cashiers Check, Bank Wire, and more. Contact us for other payment options.

Recently Viewed Products