Call 877.449.0458
Live Chat
Cart(0)
Account Sign Up Checkout Log In
 

Featured Brands
Manufacturers


EMC VNXe 3200 Series

Download App for IOS

Download Android App on Google Play



Fast Delivery: If in stock, we offer same day shipping when ordered before 3PM EST.
Document Library
Specifications
Firewall Throughput: 940 Mbps
Threat Prevention Throughput: 610 Mbps
IPSec VPN Throughput: 400 Mbps
Max. Sessions: 128,000
New Sessions Per Second: 8,300
IPSec VPN Tunnels/Tunnel Intf.: 1,000
Virtual Routers: 5
Security Zones: 30
Max Number of Policies: 1,500
Give us a call at 877-449-0458
Palo Alto Networks
Palo Alto Networks PA-820 Next-Gen Firewall Bundle w/1 Year Standard Support, URL Filtering & Threat Prevention Subscription
Palo Alto Networks PA-820 Next-Gen Firewall Bundle w/1 Year Standard Support, URL Filtering & Threat Prevention Subscription 16091 Palo Alto Networks PA-820 Next-Gen Firewall Bundle w/1 Year Standard Support, URL Filtering & Threat Prevention Subscription PAN-PA-820-BDL1
We ask that you provide as much information as possible with your request.
Request Quote 4 Hour Response

Model: PAN-PA-820-BDL1

Condition: New

Overview: Palo Alto Networks PA-820 Next-Gen Firewall - 940Mbps, 400Mbps IPSec VPN Throughput - Includes Standard Support, URL Filtering Subscription & Threat Prevention Subscription for 1 YearPalo Alto Networks
Request a Demo

Palo Alto Networks PA-800 Series next-generation firewall appliances, comprised of the PA-820 and PA-850, are designed to secure enterprise branch offices and midsized businesses.

The controlling element of the Palo Alto Networks® PA-800 Series appliances is PAN-OS® security operating system, which natively classifies all traffic, inclusive of applications, threats and content, and then ties that traffic to the user, regardless of location or device type. The application, content and user – in other words, the business elements that run your business – are then used as the basis of your security policies, resulting in an improved security posture and a reduction in incident response time.

Key Security Features:

Classifies all applications, on all ports, all the time

  • Identifies the application, regardless of port, encryption (SSL or SSH), or evasive technique employed
  • Uses the application, not the port, as the basis for all of your safe enablement policy decisions: allow, deny, schedule, inspect and apply traffic-shaping
  • Categorizes unidentified applications for policy control, threat forensics or App-ID™ application identification technology development

Enforces security policies for any user, at any location

  • Deploys consistent policies to local and remote users running on the Windows®, Mac® OS X®, Linux®, Android™ or Apple® iOS platforms
  • Enables agentless integration with Microsoft® Active Directory® and Terminal Services, LDAP, Novell® eDirectory™ and Citrix®
  • Easily integrates your firewall policies with 802.1X wireless, proxies, NAC solutions, and any other source of user identity information

Prevents known and unknown threats

  • Blocks a range of known threats, including exploits, malware and spyware, across all ports, regardless of common threat-evasion tactics employed
  • Limits the unauthorized transfer of files and sensitive data, and safely enables non-work-related web surfing
  • Identifies unknown malware, analyzes it based on hundreds of malicious behaviors, and then automatically creates and delivers protection


Top of Page


best live chat