Call 704.583.9973
Live Chat
Cart(0)
Account Sign Up Checkout Log In
 

Featured Brands
Manufacturers


Meraki MR20 3 Pack

Download App for IOS

Download Android App on Google Play



Fast Delivery: If in stock, we offer same day shipping when ordered before 3PM EST.
Document Library
Specifications
Firewall Throughput: 500 Mbps
Threat Prevention Throughput: 150 Mbps
IPSec VPN Throughput: 100 Mbps
Max. Sessions: 64,000
New Sessions Per Second: 4,200
IPSec VPN Tunnels/Tunnel Intf.: 250
Virtual Routers: 3
Security Zones: 15
Max Number of Policies: 250
Give us a call at 877-449-0458
Palo Alto Networks
Palo Alto Networks PA-220 WildFire subscription for 1 year
Palo Alto Networks PA-220 WildFire subscription for 1 year 16012 Palo Alto Networks PA-220 WildFire subscription for 1 year PAN-PA-220-WF
Corporate Armor Price:
US Shipments Only
$200.00
Qty.
VeriSign® Secured

Model: PAN-PA-220-WF

Condition: New

Overview: Palo Alto Networks PA-220 WildFire subscription for 1 yearPalo Alto Networks
Request a Demo

Palo Alto Networks PA-220 brings next-generation firewall capabilities to distributed enterprise branch offices, retail locations and midsized businesses.

The controlling element of the Palo Alto Networks® PA-220 is PAN-OS® security operating system, which natively classifies all traffic, inclusive of applications, threats and content, and then ties that traffic to the user, regardless of location or device type. The application, content and user – in other words, the business elements that run your business – are then used as the basis of your security policies, resulting in an improved security posture and a reduction in incident response time.

Highlights

  • High availability with active/active and active/passive modes
  • Redundant power input for increased reliability
  • Fan-less design 
  • Simplified deployments of large numbers of firewalls through USB

Key Security Features:

Classifies all applications, on all ports, all the time

  • Identifies the application, regardless of port, encryption (SSL or SSH), or evasive technique employed
  • Uses the application, not the port, as the basis for all of your safe enablement policy decisions: allow, deny, schedule, inspect and apply traffic-shaping
  • Categorizes unidentified applications for policy control, threat forensics or App-ID™ application identification technology development

Enforces security policies for any user, at any location

  • Deploys consistent policies to local and remote users running on the Windows®, Mac® OS X®, Linux®, Android®, or Apple® iOS platforms
  • Enables agentless integration with Microsoft® Active Directory® and Terminal Services, LDAP, Novell® eDirectory™ and Citrix®
  • Easily integrates your firewall policies with 802.1X wireless, proxies, NAC solutions, and any other source of user identity information

Prevents known and unknown threats

  • Blocks a range of known threats, including exploits, malware and spyware, across all ports, regardless of common threat-evasion tactics employed
  • Limits the unauthorized transfer of files and sensitive data, and safely enables non-work-related web surfing
  • Identifies unknown malware, analyzes it based on hundreds of malicious behaviors, and then automatically creates and delivers protection


Top of Page


best live chat