Many in stock
The TZ600 offers enterprise-class features and uncompromising performance. For distributed enterprises with remote offices, TZ Series firewalls can be managed locally using the intuitive GUI in SonicOS or at the central office with SonicWall GMS.
Protect your organization with highly effective intrusion prevention, anti-malware, content/URL filtering and application control with the business-grade SonicWall TZ Series Unified Threat Management (UTM) firewalls. Eliminate network bottlenecks and increase productivity while also providing secure access to a broad range of mobile devices, including laptops, smartphones and tablets. Confidently deploy this secure, sophisticated small-business firewall appliance in a wide range of organizations, such as retail, branch/remote offices or home offices. With a SonicWall TZ Series firewall, you can be assured your wired and wireless networks are protected by a secure, sophisticated and widely deployed security platform.
Intrusion prevention, network-based anti-malware with cloud assist, content and URL filtering and anti-spam services
Take advantage of Advanced Gateway Security Suite (AGSS) to deliver a multi-engine sandbox, powerful anti‐virus, anti‐spyware, intrusion prevention, content filtering, as well as application intelligence and control services. Protect your network against known and unknown advanced persistent threats.
Traffic inspection across all ports, without compromising performance
Leverage the TZ Series' patented, Reassembly-Free Deep Packet Inspection (RFDPI) technology to examine traffic simultaneously across all ports without introducing latency to your network.
Examine suspicious files in a cloud-based isolated environment
Deploy a cloud-based, multi-engine sandbox for stopping unknown and zero-day attacks at the gateway, with automated remediation. Examine a broad range of file types, program or code in an isolated environment to detect and stop advanced threats.
Native SSL VPN secure mobile access for multiple device platforms
Provide users with easy, network-level access to corporate and academic resources over encrypted SSL VPN connections. SonicWall Mobile Connect is easily downloadable from the Apple App Store, Google Play or the Kindle Store, and is embedded with Windows 8.1 devices.
Multiple zones of controlled access for both wired and wireless users
Implement multiple zones of access for both wired and wireless users, while maintaining total control over who is accessing what on your network. Ensure secure Internet access with our Wireless Network Security solution, which combines UTM with high-speed 802.11ac wireless to encrypt and ensure the integrity of all traffic.
Intuitive ease of use
Ensure bandwidth for critical applications and block unproductive applications. Make security easy for your IT department with the industry's most advanced, object-based management operating system — SonicOS. Thanks to an intuitive interface, you don't have to sacrifice ease of use for power.
Unless otherwise stated below, you have 30 days from the date your product left the warehouse (regardless of when you actually took delivery of the product) to get a valid RMA from our website and get your product to a shipper to return back to us. It does not have to be back in our warehouse within 30 days, but it does have to be in the possession of the shipper (along with the valid RMA). RMAs must be valid, unexpired, and issued for the product being returned. Only one RMA is issued per return. When it expires, you may no longer return your product. If you are ineligible for an RMA, contact the manufacturer directly or check any applicable warranty you might have. See the Manufacturer Contact List at the bottom of this page. Except as provided for verified defective products (See Special Returns Policy for Defective Products below), you will be responsible for all shipping charges for returns sent to our Returns Warehouse. All products are subject to a 15% restocking fee (except where prohibited by law) if returned opened or in a non-factory sealed box, provided that there is no restocking fee for defective products (see Special Returns Policy for Defective Products below). Upon our acceptance of the merchandise in like new condition in strict conformance with the basic criteria and basic returns policy, the purchase price will be credited to the credit card used for the original purchase. Please allow up to fourteen days from shipment for your return to arrive at our Returns Warehouse, delivery times vary based on shipper selected. Your return will be processed within 5-7 business days (excluding Saturdays, Sundays, and holidays) after receipt of the item. Many of the items we sell have Special Return Policies. See the appropriate policy below to see if items you purchase are affected. The risk of loss for the product being returned shall be with you at all times during the shipment of such product to the returns center and with respect to any shipments from the returns center back to you, the original distributor or manufacturer, or any buyer through the liquidation process. Title to the product being returned will remain with you at all times and transfer from you to the original distributor, or a third party in the case of a liquidation of the return, only upon receipt of the products by such distributors or buyers.
Defective products can only be returned in exchange for the exact same product, or at the sole discretion of Protective Data Solutions, the purchase price will be credited to the credit card used for the original purchase. Defective products may only be returned within 30 days of the date your product left the warehouse (regardless of when you actually took delivery of the product). Once your return is processed, and is verified to meet the basic criteria above and to be defective, your replacement order will be sent to fulfillment. How quickly your replacement product ships after that depends on product availability. For products that we verify to be defective, we will reimburse you for your original shipping expenses, provided that your defective return must be shipped via ground shipment only. If you return your product via a faster, more expensive shipper, you incur the expenses yourself and any request for reimbursement will be denied. Protective Data Solutions in its sole and absolute discretion shall be the sole determiner of whether a product is in fact defective.
We can ship to virtually any address in the world. Note that there are restrictions on some products, and some products cannot be shipped to international destinations.
When you place an order, we will estimate shipping and delivery dates for you based on the availability of your items and the shipping options you choose. IF THE ITEM IS A LICENSE OR RENEWAL, e-Deliveries will be processed the same business day. Depending on the shipping provider you choose, shipping date estimates may appear on the shipping quotes page.
Please also note that the shipping rates for many items we sell are weight-based. The weight of any such item can be found on its detail page. To reflect the policies of the shipping companies we use, all weights will be rounded up to the next full pound.
DiscountsBulk discounting is available, so give us a call or email us at email@example.com and we can build you a custom quote and see if we can save you even more off the advertised price.
You may also pay via Cashiers Check, Bank Wire, and more. Contact us for other payment options.