Call 704.583.9973
Live Chat
Account Sign Up Checkout Log In

Featured Brands


Download App for IOS

Download Android App on Google Play

Fast Delivery: If in stock, we offer same day shipping when ordered before 3PM EST.
Document Library
Firewall Throughput: 940 Mbps
Threat Prevention Throughput: 610 Mbps
IPSec VPN Throughput: 400 Mbps
Max. Sessions: 128,000
New Sessions Per Second: 8,300
IPSec VPN Tunnels/Tunnel Intf.: 1,000
Virtual Routers: 5
Security Zones: 30
Max Number of Policies: 1,500
Give us a call at 877-449-0458
Palo Alto Networks
Palo Alto Networks PA-820 Standard Support for 1 year
Palo Alto Networks PA-820 Standard Support for 1 year 16077 Palo Alto Networks PA-820 Standard Support for 1 year PAN-SVC-STND-820
We ask that you provide as much information as possible with your request.
Request Quote 4 Hour Response

Model: PAN-SVC-STND-820

Condition: New

Overview: Palo Alto Networks PA-820 Standard Support for 1 year - Includes: Direct access to product experts, case management, online customer-support portal, documentation and FAQ, Subscription services updates, feature releases and software updates, hardware return and replacement, assisted support access. Standard Support Hours: M - F, 7 am - 6 pm PTPalo Alto Networks
Request a Demo

Palo Alto Networks PA-800 Series next-generation firewall appliances, comprised of the PA-820 and PA-850, are designed to secure enterprise branch offices and midsized businesses.

The controlling element of the Palo Alto Networks® PA-800 Series appliances is PAN-OS® security operating system, which natively classifies all traffic, inclusive of applications, threats and content, and then ties that traffic to the user, regardless of location or device type. The application, content and user – in other words, the business elements that run your business – are then used as the basis of your security policies, resulting in an improved security posture and a reduction in incident response time.

Key Security Features:

Classifies all applications, on all ports, all the time

  • Identifies the application, regardless of port, encryption (SSL or SSH), or evasive technique employed
  • Uses the application, not the port, as the basis for all of your safe enablement policy decisions: allow, deny, schedule, inspect and apply traffic-shaping
  • Categorizes unidentified applications for policy control, threat forensics or App-ID™ application identification technology development

Enforces security policies for any user, at any location

  • Deploys consistent policies to local and remote users running on the Windows®, Mac® OS X®, Linux®, Android™ or Apple® iOS platforms
  • Enables agentless integration with Microsoft® Active Directory® and Terminal Services, LDAP, Novell® eDirectory™ and Citrix®
  • Easily integrates your firewall policies with 802.1X wireless, proxies, NAC solutions, and any other source of user identity information

Prevents known and unknown threats

  • Blocks a range of known threats, including exploits, malware and spyware, across all ports, regardless of common threat-evasion tactics employed
  • Limits the unauthorized transfer of files and sensitive data, and safely enables non-work-related web surfing
  • Identifies unknown malware, analyzes it based on hundreds of malicious behaviors, and then automatically creates and delivers protection

Top of Page

best live chat