SonicWALL Intrusion Prevention, Application Control and Anti-Malware For E10400 (1 Yr)
Every day, malware, spyware and real-time applications become more sophisticated, and now have the ability to circle the entire globe in a matter of minutes. Many threats are blended, originating from multiple sources over many different protocols, operating at multiple layers, over multiple protocols, delivered via IM, P2P, file sharing, games or harmless-looking utility programs and bypassing traditional client-based solutions. Today’s complex threats require a solution beyond standard anti-virus technology.
SonicWALL Gateway Anti-Virus and Anti-Spyware features a deep packet inspection (DPI) engine that inspects all email, web, file transfer, and other stream-based protocols, as well as real-time applications such as IM and P2P for total application and threat control. Unlike other solutions, Dell SonicWALL DPI analyzes all files in real time – regardless of file size or compression – and generates proactive alerts that notify administrators whenever a threat is detected. DellSonicWALL prevents day-zero attacks with dynamically-updated databases and an extensive list of virus and malware signatures. Dell SonicWALL blocks spyware at the gateway with anti-spyware technology that prevents users from downloading spyware in the first place. In addition, it prevents auto-installation of ActiveX components and stops any existing spyware programs from communicating with their hosts.
Many of the most dangerous threats function at the application layer, exploiting vulnerabilities in common network applications to drain productivity and steal data. Application layer threats defy old guard technology – but Dell SonicWALL goes a step beyond by scanning for worms, Trojans, software vulnerabilities, backdoor exploits, and other types of malicious attacks. Working in conjunction with Dell SonicWALL anti-virus and anti-spyware technology, the Dell SonicWALL Intrusion Prevention Service (IPS) engine protects against an array of network-based application vulnerabilities