Many in stock
The SonicWall Network Security services platform (NSsp) 12000 series takes a modern approach to threat detection and prevention by combining cloud intelligence with appliance-based protection in a scalable, high-speed platform. Designed for large distributed enterprises, data centers and service providers, NSsp series next-generation firewalls (NGFWs) leverage innovative deep learning security technologies in the Capture Cloud Platform to deliver proven protection from the most advanced threats without slowing performance.
Security for the enterprise
The volume and sophistication of today’s network attacks continues to grow. Identifying and stopping unknown, zeroday threats and intrusions requires an approach that extends on-box protection with security intelligence in the cloud. Without that cloud intelligence, enterprise gateway security solutions are unable to stay ahead of today’s complex threats.
The SonicWall NSsp series takes threat intelligence gathered by our dedicated Capture Labs threat research team and combines it with on-box security to deliver continuously-updated protection. SonicWall’s cloud-based Capture Advanced Threat Protection (ATP) service utilizes patent-pending Real-Time Deep Memory Inspection (RTDMI™) technology to proactively detect and block mass market, zeroday threats and unknown malware by inspecting directly in memory. Because of the real-time architecture, SonicWall RTDMI technology is precise, minimizes false positives, and identifies and mitigates sophisticated attacks where the malware’s weaponry is exposed for less than 100 nanoseconds. Augmenting the cloud-based security is SonicWall’s patented* single-pass ReassemblyFree Deep Packet Inspection (RFDPI®) engine which inspects both inbound and outbound network traffic on the firewall. By leveraging the SonicWall Capture Cloud Platform in addition to on-box capabilities including intrusion prevention, antimalware and web/URL filtering, the NSsp series is able to provide the automated, real-time breach prevention enterprise organizations need.
With the increase in the number of encrypted web connections, it’s essential that NGFWs are able to inspect encrypted traffic for hidden threats. SonicWall firewalls provide complete protection by performing full decryption and inspection over hundreds of thousands of TLS/SSL and SSH encrypted connections regardless of port or protocol. The firewall looks deep inside every packet for protocol anomalies, threats, zero-days, intrusions, and even defined criteria. The deep packet inspection engine detects and prevents hidden attacks that leverage cryptography, blocks encrypted malware downloads, ceases the spread of infections, and thwarts command and control (C&C) communications and data exfiltration. Inclusion and exclusion rules allow total control to customize which traffic is subjected to decryption and inspection based on specific organizational compliance and/or legal requirements.
As organizations grow, the need for scalable security takes on greater importance. SonicWall supports growing enterprise networks with a solution that eliminates concerns around the need for adding more processing power. The NSsp 12400 includes four processor modules that can be upgraded to eight, while the NSsp 12800 comes with eight processor modules out of the box.
Activating deep packet inspection functions such as IPS, antivirus, antispyware and TLS/SSL decryption/ inspection on the firewall often slows network performance down, sometimes dramatically. NSsp series NGFWs, however, feature high-speed 40-GbE interfaces and a multi-core hardware architecture that utilizes specialized security processors. Combined with our RTDMI and RFDPI engines, this unique design eliminates the performance degradation networks experience with other firewalls.
Network control and flexibility
At the core of the NSsp series is SonicOS, SonicWall’s feature-rich operating system. SonicOS provides organizations with the network control and flexibility they require through application intelligence and control, real-time visualization, an intrusion prevention system (IPS) featuring sophisticated anti-evasion technology, high-speed virtual private networking (VPN) and additional security features.
Using application intelligence and control, network administrators can identify and categorize productive applications from those that are unproductive or potentially dangerous, and control that traffic through powerful application-level policies on both a per-user and a pergroup basis (along with schedules and exception lists).
Business-critical applications can be prioritized and allocated more bandwidth while nonessential applications are bandwidth-limited. Real-time monitoring and visualization provides a graphical representation of applications, users and bandwidth usage for granular insight into traffic across the network.
For enterprise organizations looking for advanced flexibility in their network design, SonicOS offers the tools to segment the network into zones through the use of virtual LANs (VLANs). This enables network administrators to create a virtual LAN interface that allows for network separation into one or more logical groups.
Simplified management and reporting
Ongoing management, monitoring and reporting of network activity are handled through the SonicWall Global Management System (GMS), providing administrators with an intuitive single pane of glass dashboard for managing all aspects of the network in real time. Together, the simplified deployment and setup along with the ease of management enable organizations to lower their total cost of ownership and realize a high return on investment.
Unless otherwise stated below, you have 30 days from the date your product left the warehouse (regardless of when you actually took delivery of the product) to get a valid RMA from our website and get your product to a shipper to return back to us. It does not have to be back in our warehouse within 30 days, but it does have to be in the possession of the shipper (along with the valid RMA). RMAs must be valid, unexpired, and issued for the product being returned. Only one RMA is issued per return. When it expires, you may no longer return your product. If you are ineligible for an RMA, contact the manufacturer directly or check any applicable warranty you might have. See the Manufacturer Contact List at the bottom of this page. Except as provided for verified defective products (See Special Returns Policy for Defective Products below), you will be responsible for all shipping charges for returns sent to our Returns Warehouse. All products are subject to a 15% restocking fee (except where prohibited by law) if returned opened or in a non-factory sealed box, provided that there is no restocking fee for defective products (see Special Returns Policy for Defective Products below). Upon our acceptance of the merchandise in like new condition in strict conformance with the basic criteria and basic returns policy, the purchase price will be credited to the credit card used for the original purchase. Please allow up to fourteen days from shipment for your return to arrive at our Returns Warehouse, delivery times vary based on shipper selected. Your return will be processed within 5-7 business days (excluding Saturdays, Sundays, and holidays) after receipt of the item. Many of the items we sell have Special Return Policies. See the appropriate policy below to see if items you purchase are affected. The risk of loss for the product being returned shall be with you at all times during the shipment of such product to the returns center and with respect to any shipments from the returns center back to you, the original distributor or manufacturer, or any buyer through the liquidation process. Title to the product being returned will remain with you at all times and transfer from you to the original distributor, or a third party in the case of a liquidation of the return, only upon receipt of the products by such distributors or buyers.
Defective products can only be returned in exchange for the exact same product, or at the sole discretion of Protective Data Solutions, the purchase price will be credited to the credit card used for the original purchase. Defective products may only be returned within 30 days of the date your product left the warehouse (regardless of when you actually took delivery of the product). Once your return is processed, and is verified to meet the basic criteria above and to be defective, your replacement order will be sent to fulfillment. How quickly your replacement product ships after that depends on product availability. For products that we verify to be defective, we will reimburse you for your original shipping expenses, provided that your defective return must be shipped via ground shipment only. If you return your product via a faster, more expensive shipper, you incur the expenses yourself and any request for reimbursement will be denied. Protective Data Solutions in its sole and absolute discretion shall be the sole determiner of whether a product is in fact defective.
We can ship to virtually any address in the world. Note that there are restrictions on some products, and some products cannot be shipped to international destinations.
When you place an order, we will estimate shipping and delivery dates for you based on the availability of your items and the shipping options you choose. IF THE ITEM IS A LICENSE OR RENEWAL, e-Deliveries will be processed the same business day. Depending on the shipping provider you choose, shipping date estimates may appear on the shipping quotes page.
Please also note that the shipping rates for many items we sell are weight-based. The weight of any such item can be found on its detail page. To reflect the policies of the shipping companies we use, all weights will be rounded up to the next full pound.
DiscountsBulk discounting is available, so give us a call or email us at email@example.com and we can build you a custom quote and see if we can save you even more off the advertised price.
You may also pay via Cashiers Check, Bank Wire, and more. Contact us for other payment options.