Call 877.449.0458
Live Chat
Cart(0)
Account Sign Up Checkout Log In
 

Featured Brands
Manufacturers


EMC VNXe 3200 Series

Download App for IOS

Download Android App on Google Play



Fast Delivery: If in stock, we offer same day shipping when ordered before 3PM EST.
Document Library
Specifications
Firewall Throughput: 1 Gbps
Threat Prevention Throughput: 500 Mbps
IPSec VPN Throughput: 300 Mbps
Max. Sessions: 250,000
New Sessions Per Second: 15,000
IPSec VPN Tunnels/Tunnel Intf.: 1,000
SSL VPN Users: 1,000
Virtual Routers: 10
Virtual Systems (Base/Max): 1/6
Security Zones: 40
Max Number of Policies: 5,000
Give us a call at 877-449-0458
Palo Alto Networks
Palo Alto Networks PA-2050 WildFire subscription for 3 years
Palo Alto Networks PA-2050 WildFire subscription for 3 years 14000 Palo Alto Networks PA-2050 WildFire subscription for 3 years PAN-PA-2050-WF-3YR
We ask that you provide as much information as possible with your request.
Request Quote 4 Hour Response

Model: PAN-PA-2050-WF-3YR

Condition: New

Overview: Palo Alto Networks PA-2050 WildFire subscription for 3 yearsPalo Alto Networks
Request a Demo

The Palo Alto Networks® PA-2000 Series is comprised of the PA-2050 and the PA-2020, both of which are targeted at high speed internet gateway deployments. The PA-2000 Series manages network traffic flows using dedicated processing and memory for networking, security, threat prevention and management.

The controlling element of the PA-2000 Series is PAN-OS™, a security-specific operating system that natively classifies all traffic, inclusive of applications, threats and content, then ties that traffic to the user, regardless of location or device type. The application, content, and user—in other words, the business elements that run your business—are then used as the basis of your security policies resulting, in an improved security posture and a reduction in incident response time.

CLASSIFY ALL APPLICATIONS, ON ALL PORTS, ALL THE TIME WITH APP-ID™.

  • Identify the application, regardless of port, encryption (SSL or SSH) or evasive technique employed.
  • Use the application, not the port, as the basis for all safe enablement policy decisions: allow, deny, schedule, inspect, apply traffic shaping.
  • Categorize unidentified applications for policy control, threat forensics, custom App-ID creation, or packet capture for App-ID development.

EXTEND SAFE APPLICATION ENABLEMENT POLICIES TO ANY USER, AT ANY LOCATION, WITH USER-ID™ AND GLOBALPROTECT™.

  • Agentless integration with Active Directory, LDAP, eDirectory Citrix and Microsoft Terminal Services.
  • Easily integrate firewall policies with NAC, 802.1X wireless, Proxies and NAC solutions. 
  • Deploy consistent policies to local and remote users running Microsoft Windows, Mac OS X, Linux, Android or iOS platforms.

PROTECT AGAINST ALL THREATS—BOTH KNOWN AND UNKNOWN—WITH CONTENT-ID™ AND WILDFIRE™. 

  • Block a range of known threats including exploits, malware and spyware, across all ports, regardless of common threat evasion tactics employed.
  • Limit unauthorized transfer of files and sensitive data, and control non work-related web surfing. 
  • Identify unknown malware, analyze it based on more than 230 malicious behaviors, then automatically create and deliver protection in the next content update.


Top of Page


best live chat