HARGA : CALL (klik disini untuk informasi harga lebih detil)
PRODUCT CODE : N2105
With up to ten 10-Gigabit Ethernet ports and up to four 40-Gigabit Ethernet ports, Forcepoint NGFW N2105 can be used in mixed clusters of as many as 16 devices to deliver unrivaled high availability and fast access for VPNs and SD-WAN. Forcepoint NGFW N2105 provides multiple layers of security. Forcepoint NGFW N2105 has built-in IPS with anti-evasion defenses, accelerated encrypted inspection, file scanning, exploit detection, mission-critical application proxies and more. Forcepoint’s cloud-assisted Advanced Malware Detection (sandboxing) and dynamic URL Filtering can be enabled in moments. Forcepoint’s CASB, Web, Email and DLP Security serve as ideal complements for the ultimate level of protection.
Forcepoint NGFW N2105 are administered via the Forcepoint NGFW Security Management Center (SMC). Forcepoint NGFW N2105 provides centralized provisioning, rapid configuration and holistic monitoring of up to 2,000 devices in even the most distributed enterprise. SMC’s high-level “Smart Policies” map business processes into security controls faster and more accurately than low-level firewall rules and enable changes to be made throughout the network in minutes. With SMC, Forcepoint NGFW N2105 is fully customizable, interactive visualizations give administrators continuous 360° visibility to quickly identify and resolve incidents.
Forcepoint NGFW N2105 connects and protects people and the data they use throughout the enterprise network – all with the greatest efficiency, availability and security. Forcepoint NGFW N2105 are trusted by thousands of customers around the world, Forcepoint network security solutions enable businesses, government agencies and other organizations to address critical issues efficiently and economically. Not only did Forcepoint NGFW N2105 receive the top score for security in NSS Labs’ 2017 NGFW test, Forcepoint NGFW N2105 also has one of the top-rated intrusion prevention systems (IPS) built-in. There’s no need for additional licenses or using separate tools to implement powerful antiintrusion policies.