Sonicwall
Sonicwall 02-SSC-7259 Network Security & Firewalls 3y Tz470 Total Secure-threat   Perp - Edi 02-ssc-7259 02ssc7259 758479272595

Part Number: 02-SSC-7259
Condition: New
In Stock: Out of stock   
Real time availability   

Notify Me


Regular:$3,155.00
Save:$678.10 (21%)

Your Price:
$2,476.90

As low as $227/month
Buy Now, Pay Later




Square Trade
  • Shipping Insurance
  • Price Match Guarantee
  • Terms of Service Guarantee
  • Identity Theft Protection
FREE with your purchase
Expert Name, Expert Title
Let our Specialist make your purchase easier

Product Specifications



3y Tz470 Total Secure-Threat Perp - Edi 02-SSC-7259

3Y TZ470 TOTAL SECURE-THREAT PERP - EDI

Manufacturer Part Number: 02-SSC-7259



CPN:3Y TZ470 TOTAL SECURE-THREAT PERP - EDI
MANUFACTURER NAME: Sonicwall
MANUFACTURER PART NUMBER: 02-SSC-7259
UPC EAN CODE: 758479272595
LANGUAGE: EN
MARKET:US

General Information:

The latest SonicWall TZ series, are the first desktop form factor next-generation firewalls (NGFW) with 10 or 5 Gigabit Ethernet interfaces. The series consist of a wide range of products to suit a variety of use cases.

Designed for small, mid-sized organizations and distributed enterprise with SD-Branch locations, the 7th generation (Gen 7) TZ series delivers industry-validated security effectiveness with best-in-class priceperformance. These NGFWs address the growing trends in web encryption, connected devices and high-speed mobility by delivering a solution that meets the need for automated, real-time breach detection and prevention.

The Gen 7 TZ series are highly scalable, with high port density of up to 10 ports. It features both in-built and an expandable storage of up to 256GB, that enables various features including logging, reporting, caching, firmware backup and more. An optional second power supply provides added redundancy in case of failure on select models.

Deployment of Gen 7 TZs are further simplified by Zero-Touch Deployment, with the ability to simultaneously roll out these devices across multiple locations with minimal IT support. Built on next-gen hardware, it integrates firewalling, switching and wireless capabilities, plus provides single-pane-of-glass management for SonicWall Switches and SonicWave Access Points. It allows tight integration with Capture Client for seamless endpoint security.

SonicOS and Security Services

The SonicOS architecture is at the core of TZ NGFWs. Gen 7 TZs are powered by the feature rich SonicOS 7.0 operating system with new modern looking UX/UI, advanced security, networking and management capabilities. Gen 7 TZ features integrated SD-WAN, TLS 1.3 support, real-time visualization, high-speed virtual private networking (VPN) and other robust security features.

Unknown threats are sent to SonicWall's cloud-based Capture Advanced Threat Protection (ATP) multiengine sandbox for analysis. Enhancing Capture ATP is our patentpending Real-Time Deep Memory Inspection (RTDMI™) technology. As one of Capture ATP's engine, RTDMI detects and blocks malware and zero-day threats by inspecting directly in memory.

ManufacturerSonicWall Inc.
Manufacturer Part Number02SSC7259
Manufacturer Website Addresshttp://www.sonicwall.com
Brand NameSonicWall
Product SeriesTZ
Product ModelTZ470
Product NameTZ470 Network Security/Firewall Appliance
Product TypeNetwork Security/Firewall Appliance
  Product UPC758479272595
Technical Information:
FunctionalityIntrusion Prevention
Firewall Protection SupportedStateful Packet Filtering
Reassembly-free Deep Packet Inspection
Distributed Denial of Service (DDoS)
DNS Security
TLS Decryption
SSL Decryption
SSL Inspection
Malware Protection
Gateway Antivirus
Application Control
URL Filtering
Web Content Filtering
Anti-spyware
Intrusion Prevention
Deep Inspection Firewall
Anti-spam
Zero Day Event
Dead Peer Detection
Secure IPsec VPN Connectivity
Policy Based Filtering
Data Loss Prevention
Data Theft Protection
Botnet Filtering
Cloud Sandboxing
Real-Time Deep Memory Inspection (RTDMI)
SSH Decryption
SSH Inspection
TLS Inspection
Advanced Threat Protection
Firewall Throughput5 Gbit/s
Encryption StandardAES (192-bit)
DES
MD5
AES (256-bit)
3DES
AES (128-bit)
SHA-1
Interfaces/Ports:
Total Number of Ports8
USBYes
Number of Network (RJ-45) Ports8
Media & Performance:
VPN Throughput192 MB/s
Network & Communication:
Ethernet Technology2.5 Gigabit Ethernet
Network Standard1000Base-T
Wireless Specifications:
Wireless LANNo
I/O Expansions:
Total Number of Expansion Slots2.0
Expansion Slot TypeSFP+
Number of SFP+ Slots2
Management & Protocols:
ManageableYes
Power Description:
Frequency50 Hz
60 Hz
Physical Characteristics:
Form FactorDesktop
Height1.8"
Width7.5"
Depth5.3"
Weight (Approximate)1.83 lb
Miscellaneous:
Environmentally FriendlyYes
Environmental ComplianceWaste Electrical and Electronic Equipment Directive (WEEE)
Restriction of Hazardous Substances (RoHS)
Registration, Evaluation, Authorization and Restriction of Chemicals (REACH)
Country of OriginTaiwan
TAA CompliantYes
Warranty:
Support/Service Duration3 Year
Support/Service TypeTotalSecure Threat Edition

Date Inserted: Tuesday August 13, 2024

This product was last updated on Friday November 22, 2024

All products are brand new and factory sealed unless otherwise stated.
 *** Disclaimer- Information is supplied by the Manufacturer. The image, including color, may differ from actual product appearance. CompSource, Inc. is not responsible for data. ***

Questions and Answers

Questions and Answers

Ask CompSource

Shipping / Returns

Shipping

Ground = FREE
(Delivery within 2-7 business days)

Two Day Air = $28.00
(Delivery within 2 business days)

Standard One Day = $49.00
(Delivery within next business day)

Priority = $75.00
(Delivery within next business morning)

U.S Mail Priority (AA,AE,AP only) = $38.50

FedEx International Economy (Canada only) = $88.00

Typically out of stock items are filled within 1 to 14 business days but can and may take longer.

Shipping dates are best estimates based on product location and may vary with holidays.

If product requires trucking, additional fees may apply.

Saturday shipping is possible, Please contact sales for more information

* Some destinations are subject to Applicable State/Duty Taxes

Returns

CompSource realizes that every product may have different return guidelines. Please see the policy below regarding this item.

This Product Has Limited Exchange Privileges.

Please call for return guidelines.

For support on this product, please contact Sonicwall. 888.777.1476 WWW.SONICWALL.COM


Sonicwall Company's Information

Sonicwall  
Click Sonicwall for all products

Local #: (408)745-9600

Toll Free #: 888.777.1476

Site:  WWW.SONICWALL.COM

Accessories

Product Reviews

Overall Rating | Write a Review

    Best Sellers
    More Best Sellers

    Rebates
    More Rebates

    Recently Viewed

    Learn more about Network Security & Firewalls

    Switches, routers, and wireless access points

    Switches, routers, and wireless access points perform very different functions in a network.

    A computer network, or data network, is a digital telecommunications network which allows nodes to share resources. In computer networks, computing devices exchange data with each other using connections (data links) between nodes These data links are established over cable media such as wires or optic cables, or wireless media such as WiFi.

    Switches

    Switches are the foundation of most business networks. A switch acts as a controller, connecting computers, printers, and servers to a network in a building or a campus.

    Switches allow devices on your network to communicate with each other, as well as with other networks, creating a network of shared resources. Through information sharing and resource allocation, switches save money and increase productivity.

    There are two basic types of switches to choose from as part of your networking basics: managed and unmanaged.

    • An unmanaged switch works out of the box but can't be configured. Home-networking equipment typically offers unmanaged switches.
    • A managed switch can be configured. You can monitor and adjust a managed switch locally or remotely, giving you greater control over network traffic and access.

    Routers

    Routers connect multiple networks together. They also connect computers on those networks to the Internet. Routers enable all networked computers to share a single Internet connection, which saves money.

    A router acts a dispatcher. It analyzes data being sent across a network, chooses the best route for data to travel, and sends it on its way.

    Routers connect your business to the world, protect information from security threats, and can even decide which computers receive priority over others.

    Beyond those basic networking functions, routers come with additional features to make networking easier or more secure. Depending on your needs, for example, you can choose a router with a firewall, a virtual private network (VPN), or an Internet Protocol (IP) communications system.

    Access points

    An access point* allows devices to connect to the wireless network without cables. A wireless network makes it easy to bring new devices online and provides flexible support to mobile workers.

    An access point acts like an amplifier for your network. While a router provides the bandwidth, an access point extends that bandwidth so that the network can support many devices, and those devices can access the network from farther away.

    But an access point does more than simply extend Wi-Fi. It can also give useful data about the devices on the network, provide proactive security, and serve many other practical purposes.

    *Access points support different IEEE standards. Each standard is an amendment that was ratified over time. The standards operate on varying frequencies, deliver different bandwidth, and support different numbers of channels.

    Wireless networking

    Wireless networking is a method by which homes, telecommunications networks and business installations avoid the costly process of introducing cables into a building, or as a connection between various equipment locations.

    Firewall

    And possibly the most important aspect of networking is security and Firewall!

    What is a Firewall?
    A firewall is a network security device that monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic based on a defined set of security rules.

    Firewalls have been a first line of defense in network security for over 25 years. They establish a barrier between secured and controlled internal networks that can be trusted and untrusted outside networks, such as the Internet.

    A firewall can be hardware, software, or both.

    CompSource will educate and help make this process enjoyable and easy.

    Whether you're planning on using your network for basic home tasks or enterprise level security. You can tell our trained sales professionals your needs, and we�ll make custom recommendations to suit your specifications and budget. Our reps have extensive knowledge and love to share. We educate, not sell, CompSource makes sure you buy what you need and not waste money on what you don't. As with every decision we never push, it's up to you when, and if you make a purchase.

    CompSource has a great technical staff that can help with a solution for your exact needs.

    Chat with us or give our professionals a quick phone call (800)-413-7361.

    Fantastic price along with prompt shipping and pay thru amazon acct...could not have asked for any better! will shop again for sure joe
    More Reviews

    eStores

    Connect With Us