Authentication
Authentication provides affordable, strong
authentication of VPN users across the Internet to protect your organization's
valuable and confidential resources. Authentication guarantees that the right
people access the right resources. Digital certificates and public key
infrastructure (PKI) are widely accepted as the best solution for establishing
user identities with absolute confidence
Bandwidth Management
Bandwidth is the capacity of a communication
channel (cable, DSL, T1 lines, etc.) to carry signals. A larger bandwidth can
transfer more data over a channel in a given time. Bandwidth management
prioritizes critical outbound network traffic and resources, maximizing the
utilization of the existing Internet connection.
Content Filtering
Inappropriate online content can create an
uncomfortable work environment, lead to harassment lawsuits, or expose
children to pornography or racially intolerant sites. Internet Content
Filtering allows organizations to maintain Internet access policies tailored
to their specific needs, with built-in support for URL filtering, keyword
blocking and cookie, Java and ActiveX blocking.
Network Security Anti-Virus
Network Anti-Virus ensures that the entire network is
constantly protected from virus attacks. The SonicWALL Internet security
appliance enforces the use of up-to-date anti-virus software on each protected
computer to prevent users from disabling the software and risking infection.
Virtual Private Network (VPN)
VPN enables simple and cost-effective remote access for
telecommuters, branch offices, customers, suppliers and partners. SonicWALL
VPN uses the IPSec industry standard protocol to provide secure communication
over the Internet, eliminating the need for expensive leased lines between
offices, or dedicated modem banks and remote access servers for dial-up users.
Network Vulnerability Scanning
Public Web, E-mail and FTP servers provide an
important link for many organizations to the outside world, but they also make
an inviting target for hackers. While firewalls protect a company's private
network from intruders, there are other risks faced by companies. Server
operating system and application software vulnerabilities are routinely
discovered and network perimeter devices, such as routers and gateways, are
also potential points of attack. These security "holes" expose an organization
to network downtime, stolen, altered, or destroyed confidential information,
and financial losses.
High Availability Network Security
High Availability eliminates network downtime by allowing
the configuration of two appliances (one primary and one backup) as a high
availability pair. In this configuration, the backup appliance monitors the
primary appliance and takes over operation in the event of a failure. This
ensures a secure and reliable connection between the protected network and the
Internet.