Sonicwall
Sonicwall 02-SSC-7291 Network Security & Firewalls 3y Tz370 Wrls-ac Totalsecure - Threat Edi 02-ssc-7291 02ssc7291 758479272915

Part Number: 02-SSC-7291
Condition: New
In Stock: Out of stock   
Real time availability   

Notify Me


Regular:$2,295.00
Save:$475.68 (21%)

Your Price:
$1,819.32

As low as $167/month
Buy Now, Pay Later




Square Trade
  • Shipping Insurance
  • Price Match Guarantee
  • Terms of Service Guarantee
  • Identity Theft Protection
FREE with your purchase
Expert Name, Expert Title
Let our Specialist make your purchase easier

Product Specifications



3y Tz370 Wrls-Ac Totalsecure - Threat Edi 02-SSC-7291

3Y TZ370 WRLS-AC TOTALSECURE - THREAT EDI

Manufacturer Part Number: 02-SSC-7291



CPN:3Y TZ370 WRLS-AC TOTALSECURE - THREAT EDI
MANUFACTURER NAME: Sonicwall
MANUFACTURER PART NUMBER: 02-SSC-7291
UPC EAN CODE: 758479272915
LANGUAGE: EN
MARKET:US

General Information:

The latest SonicWall TZ series, are the first desktop form factor next-generation firewalls (NGFW) with 10 or 5 Gigabit Ethernet interfaces. The series consist of a wide range of products to suit a variety of use cases.

Designed for small, mid-sized organizations and distributed enterprise with SD-Branch locations, the 7th generation (Gen 7) TZ series delivers industry-validated security effectiveness with best-in-class priceperformance. These NGFWs address the growing trends in web encryption, connected devices and high-speed mobility by delivering a solution that meets the need for automated, real-time breach detection and prevention.

The Gen 7 TZ series are highly scalable, with high port density of up to 10 ports. It features both in-built and an expandable storage of up to 256GB, that enables various features including logging, reporting, caching, firmware backup and more. An optional second power supply provides added redundancy in case of failure on select models.

Deployment of Gen 7 TZs are further simplified by Zero-Touch Deployment, with the ability to simultaneously roll out these devices across multiple locations with minimal IT support. Built on next-gen hardware, it integrates firewalling, switching and wireless capabilities, plus provides single-pane-of-glass management for SonicWall Switches and SonicWave Access Points. It allows tight integration with Capture Client for seamless endpoint security.

SonicOS and Security Services

The SonicOS architecture is at the core of TZ NGFWs. Gen 7 TZs are powered by the feature rich SonicOS 7.0 operating system with new modern looking UX/UI, advanced security, networking and management capabilities. Gen 7 TZ features integrated SD-WAN, TLS 1.3 support, real-time visualization, high-speed virtual private networking (VPN) and other robust security features.

Unknown threats are sent to SonicWall's cloud-based Capture Advanced Threat Protection (ATP) multiengine sandbox for analysis. Enhancing Capture ATP is our patentpending Real-Time Deep Memory Inspection (RTDMI™) technology. As one of Capture ATP's engine, RTDMI detects and blocks malware and zero-day threats by inspecting directly in memory.

ManufacturerSonicWall Inc.
Manufacturer Part Number02-SSC-7291
Manufacturer Website Addresshttp://www.sonicwall.com
Brand NameSonicWall
Product SeriesTZ
Product ModelTZ370W
Product NameTZ370W Network Security/Firewall Appliance
Product TypeNetwork Security/Firewall Appliance
  Product UPC758479272915
Technical Information:
FunctionalityIntrusion Prevention
Firewall Protection SupportedStateful Packet Filtering
Reassembly-free Deep Packet Inspection
Distributed Denial of Service (DDoS)
DNS Security
TLS Decryption
SSL Decryption
SSL Inspection
Malware Protection
Gateway Antivirus
Application Control
URL Filtering
Web Content Filtering
Anti-spyware
Intrusion Prevention
Deep Inspection Firewall
Anti-spam
Zero Day Event
Dead Peer Detection
Secure IPsec VPN Connectivity
Policy Based Filtering
Data Loss Prevention
Data Theft Protection
Botnet Filtering
Cloud Sandboxing
Real-Time Deep Memory Inspection (RTDMI)
SSH Decryption
SSH Inspection
TLS Inspection
Advanced Threat Protection
Firewall Throughput3 Gbit/s
Encryption StandardAES (192-bit)
DES
MD5
AES (256-bit)
3DES
AES (128-bit)
SHA-1
Interfaces/Ports:
Total Number of Ports8
USBYes
Number of Network (RJ-45) Ports8
Media & Performance:
VPN Throughput176.64 MB/s
Network & Communication:
Ethernet TechnologyGigabit Ethernet
Network Standard1000Base-T
Wireless Specifications:
Wireless LANYes
Wireless LAN StandardIEEE 802.11ac
Management & Protocols:
ManageableYes
Power Description:
Frequency50 Hz
60 Hz
Physical Characteristics:
Form FactorDesktop
Height1.8"
Width7.5"
Depth5.3"
Weight (Approximate)1.81 lb
Miscellaneous:
Environmentally FriendlyYes
Environmental ComplianceWaste Electrical and Electronic Equipment Directive (WEEE)
Restriction of Hazardous Substances (RoHS)
Registration, Evaluation, Authorization and Restriction of Chemicals (REACH)
Country of OriginTaiwan
Warranty:
Support/Service Duration3 Year
Support/Service TypeTotalSecure Threat Edition

Date Inserted: Tuesday August 13, 2024

This product was last updated on Sunday December 1, 2024

All products are brand new and factory sealed unless otherwise stated.
 *** Disclaimer- Information is supplied by the Manufacturer. The image, including color, may differ from actual product appearance. CompSource, Inc. is not responsible for data. ***

Questions and Answers

Questions and Answers

Ask CompSource

Shipping / Returns

Shipping

Ground = FREE
(Delivery within 2-7 business days)

Two Day Air = $28.00
(Delivery within 2 business days)

Standard One Day = $49.00
(Delivery within next business day)

Priority = $75.00
(Delivery within next business morning)

U.S Mail Priority (AA,AE,AP only) = $38.50

FedEx International Economy (Canada only) = $88.00

Typically out of stock items are filled within 1 to 14 business days but can and may take longer.

Shipping dates are best estimates based on product location and may vary with holidays.

If product requires trucking, additional fees may apply.

* Some destinations are subject to Applicable State/Duty Taxes

Returns

CompSource realizes that every product may have different return guidelines. Please see the policy below regarding this item.

This Product Has Limited Exchange Privileges.

Please call for return guidelines.

For support on this product, please contact Sonicwall. 888.777.1476 WWW.SONICWALL.COM


Sonicwall Company's Information

Sonicwall  
Click Sonicwall for all products

Local #: (408)745-9600

Toll Free #: 888.777.1476

Site:  WWW.SONICWALL.COM

Accessories

Product Reviews

Overall Rating | Write a Review

    Best Sellers
    More Best Sellers

    Rebates
    More Rebates

    Recently Viewed

    Learn more about Network Security & Firewalls

    Switches, routers, and wireless access points

    Switches, routers, and wireless access points perform very different functions in a network.

    A computer network, or data network, is a digital telecommunications network which allows nodes to share resources. In computer networks, computing devices exchange data with each other using connections (data links) between nodes These data links are established over cable media such as wires or optic cables, or wireless media such as WiFi.

    Switches

    Switches are the foundation of most business networks. A switch acts as a controller, connecting computers, printers, and servers to a network in a building or a campus.

    Switches allow devices on your network to communicate with each other, as well as with other networks, creating a network of shared resources. Through information sharing and resource allocation, switches save money and increase productivity.

    There are two basic types of switches to choose from as part of your networking basics: managed and unmanaged.

    • An unmanaged switch works out of the box but can't be configured. Home-networking equipment typically offers unmanaged switches.
    • A managed switch can be configured. You can monitor and adjust a managed switch locally or remotely, giving you greater control over network traffic and access.

    Routers

    Routers connect multiple networks together. They also connect computers on those networks to the Internet. Routers enable all networked computers to share a single Internet connection, which saves money.

    A router acts a dispatcher. It analyzes data being sent across a network, chooses the best route for data to travel, and sends it on its way.

    Routers connect your business to the world, protect information from security threats, and can even decide which computers receive priority over others.

    Beyond those basic networking functions, routers come with additional features to make networking easier or more secure. Depending on your needs, for example, you can choose a router with a firewall, a virtual private network (VPN), or an Internet Protocol (IP) communications system.

    Access points

    An access point* allows devices to connect to the wireless network without cables. A wireless network makes it easy to bring new devices online and provides flexible support to mobile workers.

    An access point acts like an amplifier for your network. While a router provides the bandwidth, an access point extends that bandwidth so that the network can support many devices, and those devices can access the network from farther away.

    But an access point does more than simply extend Wi-Fi. It can also give useful data about the devices on the network, provide proactive security, and serve many other practical purposes.

    *Access points support different IEEE standards. Each standard is an amendment that was ratified over time. The standards operate on varying frequencies, deliver different bandwidth, and support different numbers of channels.

    Wireless networking

    Wireless networking is a method by which homes, telecommunications networks and business installations avoid the costly process of introducing cables into a building, or as a connection between various equipment locations.

    Firewall

    And possibly the most important aspect of networking is security and Firewall!

    What is a Firewall?
    A firewall is a network security device that monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic based on a defined set of security rules.

    Firewalls have been a first line of defense in network security for over 25 years. They establish a barrier between secured and controlled internal networks that can be trusted and untrusted outside networks, such as the Internet.

    A firewall can be hardware, software, or both.

    CompSource will educate and help make this process enjoyable and easy.

    Whether you're planning on using your network for basic home tasks or enterprise level security. You can tell our trained sales professionals your needs, and we�ll make custom recommendations to suit your specifications and budget. Our reps have extensive knowledge and love to share. We educate, not sell, CompSource makes sure you buy what you need and not waste money on what you don't. As with every decision we never push, it's up to you when, and if you make a purchase.

    CompSource has a great technical staff that can help with a solution for your exact needs.

    Chat with us or give our professionals a quick phone call (800)-413-7361.

    Hey, I got my monitor recently. Needless to say, I'm happy everyting worked out. The monitor is new, works great, and came in only a few days, on FREE shipping. I took a chance ordering from you, seeing as it was a first time. Now? Forget Amazon. Forget Circuit City. Forget eBay. If I want a componant for my computer setup, I'll go to your site first. Thanks for the item, and for helping straighten this thing out. bjor??????
    More Reviews

    eStores

    Connect With Us