SlideShare a Scribd company logo
1 of 4
Download to read offline
SMALLBUSINESSES&AGENCIES
NETWORK SECURITY I ENDPOINT SECURITY I DATA SECURITY
SECURE YOUR WIRELESS NETWORK
Stormshield SN160W
BRANCHES, AGENCIES,
REMOTE OFFICES &
TRADESPERSONS
Ensure the continuity of your
business
All protection technologies needed for
responding to the most sophisticated
attacks are embedded in the entire
range.
Confidently open your wireless
network to guest users
The ideal setup for wireless networks,
the guest mode feature gives your
clients and partners WiFi connectivity
while you get to maintain control over
your users.
Connect coworkers
With the virtual private network,
(IPSec and SSL VPN), coworkers get
secure access to corporate resources
regardless of where they are and from
any terminal.
Stay in control of your internet
usage
Thanks to advanced filtering and the
management of quality of service,
you can define the way you want the
internet to be used.
SECURE WIFI
WithitsseparateWiFinetworks,theSN160Wofferssegmentation
in your wireless environment, simplifying the management of
access and associated resources. A single security solution is all
it takes to protect every single one of your mobile devices and
connected objects.
GET THE BEST UNIFIED SECURITY
AT UNBEATABLE VALUE
Without compromising on security in any way, the SN160W
embeds all the security functions needed for ensuring the
flawless protection of small IT structures. Pure technological
prowess.
GRANT ACCESS TO THE RESOURCES ON YOUR CORPORATE
NETWORK WITH TOTAL PEACE OF MIND
Sophisticated IPSec VPN features mean that your branches and
remote offices are interconnected securely and seamlessly to
the main resources of your corporation.
CONFIGURE THE KIND OF HIGH-LEVEL SECURITY
YOU WOULD EXPECT IN LARGE CORPORATIONS
IN JUST 3 MINUTES
Intuitive wizards guide you through each step of the installation
and configuration of your security device.
Stormshield SN160W
THE SECURITY SOLUTION IDEAL FOR AGENCIES,
REMOTE OFFICES & BRANCHES, SMALL BUSINESSES
AND INDEPENDENT TRADERS.
Technical
specifications
PERFORMANCE*
Firewall throughput (1518 byte UDP) 1 Gbps
IPS throughput (1518 byte UDP) 800 Mbps
IPS throughput (1 Mbyte HTTP files) 400 Mbps
Antivirus throughput 100 Mbps
VPN*
IPSec throughput - AES128/SHA1 200 Mbps
IPSec throughput - AES256/SHA2 200 Mbps
Max number of IPSec VPN tunnels 50
Number of SSL VPN clients (Portal mode) 20
Number of simultaneous SSL VPN clients 5
NETWORK CONNECTIVITY
Concurrent connections 150,000
New connections per second 6,000
Number of main gateways (max)/backup (max) 64/64
Number of interfaces
(Agg, Dialup, ethernet, loopback, VLAN, pptp, ...)
100
CONNECTIVITY
10/100/1000 interfaces 1+ 4 ports (Switch)
Number of SSID 2
Protocol 802.11 a/b/g/n
Authentication WPA/WPA2
SYSTEM
Max number of filtering rules 4,096
Max number of static routes 512
Max number of dynamic routes 1,000
REDUNDANCY
High Availability (Active/Passive) -
HARDWARE
Local storage SD Card storage**
MTBF (years) 24.2
Racking 1U (<1/2 19”)
Height x Width x Depth (mm) 45 x 176 x 150
Weight 0.55 kg (1,25 lbs)
Packaged Height x Width x Depth (mm) 78 x 320 x 200
Packaged weight 1.2 kg (2,65 lbs)
Power supply (AC) 100-240V 60-50Hz 1.5-0.8A
Power consumption 230V 50Hz 9.43W 0.13A
Noise level Fanless
Thermal dissipation (max, BTU/h) 40
Operational temperature 5° to 40°C (41° to 104°F)
Relative humidity, operating (without condensation) 20% to 90% @ 40°C
Storage temperature -30° to 65°C (-22° to 149°F)
Relative humidity, storage (without condensation) 5% to 95% @ 60°C
CERTIFICATIONS
Compliance CE/FCC/CB
USAGE CONTROL
Firewall/IPS/IDS mode, identity-based firewall,
application firewall, Microsoft Services Firewall,
detection and control of the use of mobile terminals,
applicationinventory(option),vulnerabilitydetection
(option), filtering per localisation (countries,
continents), URL filtering (cloud mode), transparent
authentication (Active Directory SSO Agent, SSL,
SPNEGO), multi-user authentication in cookie mode
(Citrix- TSE), guest mode authentication, time
scheduling per rule.
PROTECTION FROM THREATS
Intrusion prevention, protocol scan, application
inspection, protection from denial of service attacks
(DoS), protection from SQL injections, protection
from Cross-Site Scripting (XSS), protection from
malicious Web2.0 code and scripts, Trojan detection,
detection of interactive connections (botnets,
Command&Control), protection from data evasion,
Advanced management of fragmentation, automatic
quarantining in the event of an attack, antispam and
antiphishing: reputation-based analysis —heuristic
engine, embedded antivirus (HTTP, SMTP, POP3,
FTP), SSL decryption and inspection, VoIP protection
(SIP), collaborative security: adaptation of the filter
policy according to security events or detected
vulnerabilities.
CONFIDENTIALITY
Site-to-site or nomad IPSec VPN, remote SSL VPN
access in multi-OS tunnel mode (Windows, Android,
iOS, etc), SSL VPN agent configurable centrally
(Windows), Support for Android/iPhone IPSec VPN.
NETWORK - INTEGRATION
IPv6, NAT, PAT, transparent (bridge)/routed/hybrid
modes, dynamic routing (RIP, OSPF, BGP), multi-level
internal or external PKI management, multi-domain
authentication (including internal LDAP), explicit
proxy,policy-basedrouting(PBR),QoSmanagement,
DHCP client/relay/server, NTP client, DNS proxy-
cache, HTTP proxy-cache, IPFIX/NetFlow.
MANAGEMENT
Web-based management interface, object-oriented
security policy, real-time configuration help, firewall
rule counter, more than 15 installation wizards,
global/local security policy, embedded log reporting
and analysis tools, interactive and customizable
reports,sendingtosyslogserverUDP/TCP/TLS,SNMP
v1, v2, v3 agent, automated configuration backup.
Non-contractual document. The features mentioned are
those in version 3.0.
* Performance is measured in a laboratory and under condi-
tions ideal for version 3.1. Results may vary according to
test conditions and the software version.
** Option
WWW.STORMSHIELD.EU
Phone
+33 9 69 32 96 29
For security
with high added value
STORMSHIELD NETWORK
VULNERABILITY MANAGER*
Arm yourself with a simple and
powerful vulnerability detection
tool that leaves no impact on your
information system.
Vulnerability Management
Based on data passing through
the appliance, Stormshield
Network Vulnerability Manager
makes an inventory of operating
systems, applications used and
their vulnerabilities. As soon as
a vulnerability appears on your
network,youwillbekeptinformed.
Remediation
Stormshield Network Vulnerability
Manager offers a set of dedicated
reports as well as a real-time
dashboard that allow you to stay
in control of your deployment.
STORMSHIELD NETWORK
EXTENDED WEB CONTROL*
Monitor how users surf the
internetonyourcorporatenetwork
and optimize your bandwidth
consumption by deploying an
effective and high-performance
URL filtering solution.
Prevention of web-based threats
Extended Web Control analyzes
illions of requests in order to
continuously evaluate the risk
level of various websites and to
block infected or malicious sites
from being visited as soon as they
are detected.
Advanced filtering for all
The Extended Web Control solution
can be enabled on the entire range
of Stormshield Network Security
products. You can therefore
benefit from an advanced filter
solution regardless of the size of
your company.
KASPERSKY
ANTIVIRUS*
Protect yourself by getting
equipped with the best antivirus
protection solution.
Protection from threats
The Kaspersky antivirus solution
on Stormshield Network Security
appliances is not based merely on
a system of malware signatures,
but also integrates emulation
mechanisms to identify malicious
code proactively.
Peripheral protection
Applying an antivirus inspection
on the traffic of all devices
connected to the network and
relying on a behavioral analysis
technology similar to sandboxing,
it allows the detection of even
unknown attacks.
* Option
Version 1.1 - Copyright Stormshield 2017

More Related Content

What's hot

SOPHOS presentation used during the SWITCHPOINT NV/SA Quarterly Experience Da...
SOPHOS presentation used during the SWITCHPOINT NV/SA Quarterly Experience Da...SOPHOS presentation used during the SWITCHPOINT NV/SA Quarterly Experience Da...
SOPHOS presentation used during the SWITCHPOINT NV/SA Quarterly Experience Da...SWITCHPOINT NV/SA
 
Trusted Wireless Environment (TWE)
Trusted Wireless Environment (TWE)Trusted Wireless Environment (TWE)
Trusted Wireless Environment (TWE)Ryan Orsi
 
Lixodex Outdoor Grounds Security System
Lixodex Outdoor Grounds Security SystemLixodex Outdoor Grounds Security System
Lixodex Outdoor Grounds Security SystemThomas Hill
 
Is Your Network Ready for BYOD?
Is Your Network Ready for BYOD?Is Your Network Ready for BYOD?
Is Your Network Ready for BYOD?Sophos
 
Discover Synchronized Security - Sophos Day Netherlands
Discover Synchronized Security - Sophos Day Netherlands Discover Synchronized Security - Sophos Day Netherlands
Discover Synchronized Security - Sophos Day Netherlands Sophos Benelux
 
Securing with Sophos - Sophos Day Belux 2014
Securing with Sophos - Sophos Day Belux 2014Securing with Sophos - Sophos Day Belux 2014
Securing with Sophos - Sophos Day Belux 2014Sophos Benelux
 
4 Steps to Optimal Endpoint Settings
4 Steps to Optimal Endpoint Settings4 Steps to Optimal Endpoint Settings
4 Steps to Optimal Endpoint SettingsSophos
 
UTM - The Complete Security Box
UTM - The Complete Security BoxUTM - The Complete Security Box
UTM - The Complete Security BoxSophos
 
Outpost Network Security Suite 3.0
Outpost Network Security Suite 3.0Outpost Network Security Suite 3.0
Outpost Network Security Suite 3.0avgsecurity
 
Firewalls Security – Features and Benefits
Firewalls Security – Features and BenefitsFirewalls Security – Features and Benefits
Firewalls Security – Features and BenefitsAnthony Daniel
 
SafeDNS Solutions for Internet and Mobile Service Providers
SafeDNS Solutions for Internet and Mobile Service ProvidersSafeDNS Solutions for Internet and Mobile Service Providers
SafeDNS Solutions for Internet and Mobile Service ProvidersSafeDNS
 
Descripcion Tecnica del Barracuda NG Firewall
Descripcion Tecnica del Barracuda NG FirewallDescripcion Tecnica del Barracuda NG Firewall
Descripcion Tecnica del Barracuda NG Firewallrivefapy
 
Security B Sides Puerto Rico - Weaponizing your Drone
Security B Sides Puerto Rico - Weaponizing your DroneSecurity B Sides Puerto Rico - Weaponizing your Drone
Security B Sides Puerto Rico - Weaponizing your DroneJose L. Quiñones-Borrero
 
sicurit_product_overview_web
sicurit_product_overview_websicurit_product_overview_web
sicurit_product_overview_webLorenzo Beccacece
 
8 Ocak 2015 SOME Etkinligi - A10 Networks - Accelerating and Securing Applica...
8 Ocak 2015 SOME Etkinligi - A10 Networks - Accelerating and Securing Applica...8 Ocak 2015 SOME Etkinligi - A10 Networks - Accelerating and Securing Applica...
8 Ocak 2015 SOME Etkinligi - A10 Networks - Accelerating and Securing Applica...BGA Cyber Security
 
Proactive Security That Works
Proactive Security That WorksProactive Security That Works
Proactive Security That WorksBrett L. Scott
 
What's cooking at Sophos - an introduction to Synchronized Security
What's cooking at Sophos - an introduction to Synchronized SecurityWhat's cooking at Sophos - an introduction to Synchronized Security
What's cooking at Sophos - an introduction to Synchronized SecuritySophos Benelux
 

What's hot (20)

SOPHOS presentation used during the SWITCHPOINT NV/SA Quarterly Experience Da...
SOPHOS presentation used during the SWITCHPOINT NV/SA Quarterly Experience Da...SOPHOS presentation used during the SWITCHPOINT NV/SA Quarterly Experience Da...
SOPHOS presentation used during the SWITCHPOINT NV/SA Quarterly Experience Da...
 
Trusted Wireless Environment (TWE)
Trusted Wireless Environment (TWE)Trusted Wireless Environment (TWE)
Trusted Wireless Environment (TWE)
 
Lixodex Outdoor Grounds Security System
Lixodex Outdoor Grounds Security SystemLixodex Outdoor Grounds Security System
Lixodex Outdoor Grounds Security System
 
Is Your Network Ready for BYOD?
Is Your Network Ready for BYOD?Is Your Network Ready for BYOD?
Is Your Network Ready for BYOD?
 
Discover Synchronized Security - Sophos Day Netherlands
Discover Synchronized Security - Sophos Day Netherlands Discover Synchronized Security - Sophos Day Netherlands
Discover Synchronized Security - Sophos Day Netherlands
 
Securing with Sophos - Sophos Day Belux 2014
Securing with Sophos - Sophos Day Belux 2014Securing with Sophos - Sophos Day Belux 2014
Securing with Sophos - Sophos Day Belux 2014
 
4 Steps to Optimal Endpoint Settings
4 Steps to Optimal Endpoint Settings4 Steps to Optimal Endpoint Settings
4 Steps to Optimal Endpoint Settings
 
Aensis idps 1000 v ext_eng
Aensis idps 1000  v ext_engAensis idps 1000  v ext_eng
Aensis idps 1000 v ext_eng
 
UTM - The Complete Security Box
UTM - The Complete Security BoxUTM - The Complete Security Box
UTM - The Complete Security Box
 
Outpost Network Security Suite 3.0
Outpost Network Security Suite 3.0Outpost Network Security Suite 3.0
Outpost Network Security Suite 3.0
 
Firewalls Security – Features and Benefits
Firewalls Security – Features and BenefitsFirewalls Security – Features and Benefits
Firewalls Security – Features and Benefits
 
SafeDNS Solutions for Internet and Mobile Service Providers
SafeDNS Solutions for Internet and Mobile Service ProvidersSafeDNS Solutions for Internet and Mobile Service Providers
SafeDNS Solutions for Internet and Mobile Service Providers
 
XG Firewall
XG FirewallXG Firewall
XG Firewall
 
Descripcion Tecnica del Barracuda NG Firewall
Descripcion Tecnica del Barracuda NG FirewallDescripcion Tecnica del Barracuda NG Firewall
Descripcion Tecnica del Barracuda NG Firewall
 
Security B Sides Puerto Rico - Weaponizing your Drone
Security B Sides Puerto Rico - Weaponizing your DroneSecurity B Sides Puerto Rico - Weaponizing your Drone
Security B Sides Puerto Rico - Weaponizing your Drone
 
UTM Cyberoam
UTM Cyberoam UTM Cyberoam
UTM Cyberoam
 
sicurit_product_overview_web
sicurit_product_overview_websicurit_product_overview_web
sicurit_product_overview_web
 
8 Ocak 2015 SOME Etkinligi - A10 Networks - Accelerating and Securing Applica...
8 Ocak 2015 SOME Etkinligi - A10 Networks - Accelerating and Securing Applica...8 Ocak 2015 SOME Etkinligi - A10 Networks - Accelerating and Securing Applica...
8 Ocak 2015 SOME Etkinligi - A10 Networks - Accelerating and Securing Applica...
 
Proactive Security That Works
Proactive Security That WorksProactive Security That Works
Proactive Security That Works
 
What's cooking at Sophos - an introduction to Synchronized Security
What's cooking at Sophos - an introduction to Synchronized SecurityWhat's cooking at Sophos - an introduction to Synchronized Security
What's cooking at Sophos - an introduction to Synchronized Security
 

Similar to Sns en-sn160 w-datasheet-201702

Consider Sophos - Security Made Simple
Consider Sophos - Security Made SimpleConsider Sophos - Security Made Simple
Consider Sophos - Security Made SimpleDavid Fuchs
 
CHECK POINT 3100 NEXT GENERATION SECURITY GATEWAY FOR THE BRANCH AND SMALL OF...
CHECK POINT 3100 NEXT GENERATION SECURITY GATEWAY FOR THE BRANCH AND SMALL OF...CHECK POINT 3100 NEXT GENERATION SECURITY GATEWAY FOR THE BRANCH AND SMALL OF...
CHECK POINT 3100 NEXT GENERATION SECURITY GATEWAY FOR THE BRANCH AND SMALL OF...Alexander Kravchenko
 
SonicWALL - Skytek - VnPro.pptx
SonicWALL - Skytek - VnPro.pptxSonicWALL - Skytek - VnPro.pptx
SonicWALL - Skytek - VnPro.pptxssuser813dcd
 
Eximbank security presentation
Eximbank security presentationEximbank security presentation
Eximbank security presentationlaonap166
 
Light sec for service providers brochure
Light sec for service providers brochureLight sec for service providers brochure
Light sec for service providers brochureGeorge Wainblat
 
fortigate-600f-series pdf manual routeur
fortigate-600f-series pdf manual routeurfortigate-600f-series pdf manual routeur
fortigate-600f-series pdf manual routeurrezkellahhichem
 
Astaro Customer Presentation
Astaro Customer PresentationAstaro Customer Presentation
Astaro Customer Presentationtechworldvn
 
Corporate Security Issues and countering them using Unified Threat Management...
Corporate Security Issues and countering them using Unified Threat Management...Corporate Security Issues and countering them using Unified Threat Management...
Corporate Security Issues and countering them using Unified Threat Management...Rishabh Dangwal
 
Fortinet FortiGate 100D
Fortinet FortiGate 100DFortinet FortiGate 100D
Fortinet FortiGate 100DHoai Duyen
 
Cyberoam cr200ing
Cyberoam cr200ingCyberoam cr200ing
Cyberoam cr200ingHuu Hieu
 

Similar to Sns en-sn160 w-datasheet-201702 (20)

Checkpoint Overview
Checkpoint OverviewCheckpoint Overview
Checkpoint Overview
 
Consider Sophos - Security Made Simple
Consider Sophos - Security Made SimpleConsider Sophos - Security Made Simple
Consider Sophos - Security Made Simple
 
CHECK POINT 3100 NEXT GENERATION SECURITY GATEWAY FOR THE BRANCH AND SMALL OF...
CHECK POINT 3100 NEXT GENERATION SECURITY GATEWAY FOR THE BRANCH AND SMALL OF...CHECK POINT 3100 NEXT GENERATION SECURITY GATEWAY FOR THE BRANCH AND SMALL OF...
CHECK POINT 3100 NEXT GENERATION SECURITY GATEWAY FOR THE BRANCH AND SMALL OF...
 
SonicWALL - Skytek - VnPro.pptx
SonicWALL - Skytek - VnPro.pptxSonicWALL - Skytek - VnPro.pptx
SonicWALL - Skytek - VnPro.pptx
 
Eximbank security presentation
Eximbank security presentationEximbank security presentation
Eximbank security presentation
 
Sangfor SSL VPN Datasheet
Sangfor SSL VPN DatasheetSangfor SSL VPN Datasheet
Sangfor SSL VPN Datasheet
 
FortiGate-80C
FortiGate-80CFortiGate-80C
FortiGate-80C
 
Light sec for service providers brochure
Light sec for service providers brochureLight sec for service providers brochure
Light sec for service providers brochure
 
1500024 en
1500024 en1500024 en
1500024 en
 
FortiGate_600E(2).pdf
FortiGate_600E(2).pdfFortiGate_600E(2).pdf
FortiGate_600E(2).pdf
 
fortigate-600f-series pdf manual routeur
fortigate-600f-series pdf manual routeurfortigate-600f-series pdf manual routeur
fortigate-600f-series pdf manual routeur
 
NGFW Brochure 08 08
NGFW Brochure 08 08NGFW Brochure 08 08
NGFW Brochure 08 08
 
Sonic Wall Product Line Brochure
Sonic Wall Product Line BrochureSonic Wall Product Line Brochure
Sonic Wall Product Line Brochure
 
Ngfw overview
Ngfw overviewNgfw overview
Ngfw overview
 
Astaro Customer Presentation
Astaro Customer PresentationAstaro Customer Presentation
Astaro Customer Presentation
 
Sangfor SSL VPN Brochure
Sangfor SSL VPN BrochureSangfor SSL VPN Brochure
Sangfor SSL VPN Brochure
 
Corporate Security Issues and countering them using Unified Threat Management...
Corporate Security Issues and countering them using Unified Threat Management...Corporate Security Issues and countering them using Unified Threat Management...
Corporate Security Issues and countering them using Unified Threat Management...
 
Firewall ppt
Firewall pptFirewall ppt
Firewall ppt
 
Fortinet FortiGate 100D
Fortinet FortiGate 100DFortinet FortiGate 100D
Fortinet FortiGate 100D
 
Cyberoam cr200ing
Cyberoam cr200ingCyberoam cr200ing
Cyberoam cr200ing
 

More from Balázs Antók

Grey Wizard - Teljes körű weboldal, API és DDoS védelmi szolgáltatás
Grey Wizard - Teljes körű weboldal, API és DDoS védelmi szolgáltatásGrey Wizard - Teljes körű weboldal, API és DDoS védelmi szolgáltatás
Grey Wizard - Teljes körű weboldal, API és DDoS védelmi szolgáltatásBalázs Antók
 
Mailstore advisory GDPR
Mailstore advisory GDPRMailstore advisory GDPR
Mailstore advisory GDPRBalázs Antók
 
Compliance mapping GDPR vs ISO_en
Compliance mapping GDPR vs ISO_enCompliance mapping GDPR vs ISO_en
Compliance mapping GDPR vs ISO_enBalázs Antók
 
Vectra Cognito - Mesterséges intelligencia alapú automatikus támadáskezelés é...
Vectra Cognito - Mesterséges intelligencia alapú automatikus támadáskezelés é...Vectra Cognito - Mesterséges intelligencia alapú automatikus támadáskezelés é...
Vectra Cognito - Mesterséges intelligencia alapú automatikus támadáskezelés é...Balázs Antók
 
WannaCry zsarolóvírus információk
WannaCry zsarolóvírus információkWannaCry zsarolóvírus információk
WannaCry zsarolóvírus információkBalázs Antók
 
Megérkeztek a stormshield új kis irodai modelljei
Megérkeztek a stormshield új kis irodai modelljeiMegérkeztek a stormshield új kis irodai modelljei
Megérkeztek a stormshield új kis irodai modelljeiBalázs Antók
 
Fizetési garancia jutalékszámlaval
Fizetési garancia jutalékszámlavalFizetési garancia jutalékszámlaval
Fizetési garancia jutalékszámlavalBalázs Antók
 
Munkaero felugyelet-dtex-teramind
Munkaero felugyelet-dtex-teramindMunkaero felugyelet-dtex-teramind
Munkaero felugyelet-dtex-teramindBalázs Antók
 
Darktrace kiberintelligencia
Darktrace kiberintelligenciaDarktrace kiberintelligencia
Darktrace kiberintelligenciaBalázs Antók
 
Stormshield - A helyes választás
Stormshield - A helyes választásStormshield - A helyes választás
Stormshield - A helyes választásBalázs Antók
 
Mojo Certified Engineer tréning
Mojo Certified Engineer tréningMojo Certified Engineer tréning
Mojo Certified Engineer tréningBalázs Antók
 
MailStore Server vállalati email archiváló és levélkezelő rendszer Termékbemu...
MailStore Server vállalati email archiváló és levélkezelő rendszer Termékbemu...MailStore Server vállalati email archiváló és levélkezelő rendszer Termékbemu...
MailStore Server vállalati email archiváló és levélkezelő rendszer Termékbemu...Balázs Antók
 
SzerverWebáruház készlet integrátoroknak 131207
SzerverWebáruház készlet integrátoroknak 131207SzerverWebáruház készlet integrátoroknak 131207
SzerverWebáruház készlet integrátoroknak 131207Balázs Antók
 
SzerverWebáruház raktár 20130924
SzerverWebáruház raktár 20130924SzerverWebáruház raktár 20130924
SzerverWebáruház raktár 20130924Balázs Antók
 

More from Balázs Antók (15)

Grey Wizard - Teljes körű weboldal, API és DDoS védelmi szolgáltatás
Grey Wizard - Teljes körű weboldal, API és DDoS védelmi szolgáltatásGrey Wizard - Teljes körű weboldal, API és DDoS védelmi szolgáltatás
Grey Wizard - Teljes körű weboldal, API és DDoS védelmi szolgáltatás
 
Mailstore advisory GDPR
Mailstore advisory GDPRMailstore advisory GDPR
Mailstore advisory GDPR
 
Compliance mapping GDPR vs ISO_en
Compliance mapping GDPR vs ISO_enCompliance mapping GDPR vs ISO_en
Compliance mapping GDPR vs ISO_en
 
Vectra Cognito - Mesterséges intelligencia alapú automatikus támadáskezelés é...
Vectra Cognito - Mesterséges intelligencia alapú automatikus támadáskezelés é...Vectra Cognito - Mesterséges intelligencia alapú automatikus támadáskezelés é...
Vectra Cognito - Mesterséges intelligencia alapú automatikus támadáskezelés é...
 
WannaCry zsarolóvírus információk
WannaCry zsarolóvírus információkWannaCry zsarolóvírus információk
WannaCry zsarolóvírus információk
 
Megérkeztek a stormshield új kis irodai modelljei
Megérkeztek a stormshield új kis irodai modelljeiMegérkeztek a stormshield új kis irodai modelljei
Megérkeztek a stormshield új kis irodai modelljei
 
Yellow cube 2016
Yellow cube 2016Yellow cube 2016
Yellow cube 2016
 
Fizetési garancia jutalékszámlaval
Fizetési garancia jutalékszámlavalFizetési garancia jutalékszámlaval
Fizetési garancia jutalékszámlaval
 
Munkaero felugyelet-dtex-teramind
Munkaero felugyelet-dtex-teramindMunkaero felugyelet-dtex-teramind
Munkaero felugyelet-dtex-teramind
 
Darktrace kiberintelligencia
Darktrace kiberintelligenciaDarktrace kiberintelligencia
Darktrace kiberintelligencia
 
Stormshield - A helyes választás
Stormshield - A helyes választásStormshield - A helyes választás
Stormshield - A helyes választás
 
Mojo Certified Engineer tréning
Mojo Certified Engineer tréningMojo Certified Engineer tréning
Mojo Certified Engineer tréning
 
MailStore Server vállalati email archiváló és levélkezelő rendszer Termékbemu...
MailStore Server vállalati email archiváló és levélkezelő rendszer Termékbemu...MailStore Server vállalati email archiváló és levélkezelő rendszer Termékbemu...
MailStore Server vállalati email archiváló és levélkezelő rendszer Termékbemu...
 
SzerverWebáruház készlet integrátoroknak 131207
SzerverWebáruház készlet integrátoroknak 131207SzerverWebáruház készlet integrátoroknak 131207
SzerverWebáruház készlet integrátoroknak 131207
 
SzerverWebáruház raktár 20130924
SzerverWebáruház raktár 20130924SzerverWebáruház raktár 20130924
SzerverWebáruház raktár 20130924
 

Recently uploaded

VIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With RoomVIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Roomgirls4nights
 
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130  Available With RoomVIP Kolkata Call Girl Alambazar 👉 8250192130  Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Roomdivyansh0kumar0
 
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja VipCall Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja VipCall Girls Lucknow
 
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012rehmti665
 
Git and Github workshop GDSC MLRITM
Git and Github  workshop GDSC MLRITMGit and Github  workshop GDSC MLRITM
Git and Github workshop GDSC MLRITMgdsc13
 
Gram Darshan PPT cyber rural in villages of india
Gram Darshan PPT cyber rural  in villages of indiaGram Darshan PPT cyber rural  in villages of india
Gram Darshan PPT cyber rural in villages of indiaimessage0108
 
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607dollysharma2066
 
Denver Web Design brochure for public viewing
Denver Web Design brochure for public viewingDenver Web Design brochure for public viewing
Denver Web Design brochure for public viewingbigorange77
 
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls KolkataVIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Dana Luther
 
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts servicesonalikaur4
 
How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)Damian Radcliffe
 
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls KolkataLow Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
Russian Call girls in Dubai +971563133746 Dubai Call girls
Russian  Call girls in Dubai +971563133746 Dubai  Call girlsRussian  Call girls in Dubai +971563133746 Dubai  Call girls
Russian Call girls in Dubai +971563133746 Dubai Call girlsstephieert
 
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With RoomVIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Roomdivyansh0kumar0
 
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130  Available With RoomVIP Kolkata Call Girl Kestopur 👉 8250192130  Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Roomdivyansh0kumar0
 

Recently uploaded (20)

VIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With RoomVIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
 
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130  Available With RoomVIP Kolkata Call Girl Alambazar 👉 8250192130  Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
 
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja VipCall Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
 
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
 
Git and Github workshop GDSC MLRITM
Git and Github  workshop GDSC MLRITMGit and Github  workshop GDSC MLRITM
Git and Github workshop GDSC MLRITM
 
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
Gram Darshan PPT cyber rural in villages of india
Gram Darshan PPT cyber rural  in villages of indiaGram Darshan PPT cyber rural  in villages of india
Gram Darshan PPT cyber rural in villages of india
 
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
 
Call Girls Service Dwarka @9999965857 Delhi 🫦 No Advance VVIP 🍎 SERVICE
Call Girls Service Dwarka @9999965857 Delhi 🫦 No Advance  VVIP 🍎 SERVICECall Girls Service Dwarka @9999965857 Delhi 🫦 No Advance  VVIP 🍎 SERVICE
Call Girls Service Dwarka @9999965857 Delhi 🫦 No Advance VVIP 🍎 SERVICE
 
Denver Web Design brochure for public viewing
Denver Web Design brochure for public viewingDenver Web Design brochure for public viewing
Denver Web Design brochure for public viewing
 
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls KolkataVIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
 
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
 
How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)
 
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls KolkataLow Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
Russian Call girls in Dubai +971563133746 Dubai Call girls
Russian  Call girls in Dubai +971563133746 Dubai  Call girlsRussian  Call girls in Dubai +971563133746 Dubai  Call girls
Russian Call girls in Dubai +971563133746 Dubai Call girls
 
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With RoomVIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Room
 
Call Girls In South Ex 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
Call Girls In South Ex 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICECall Girls In South Ex 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
Call Girls In South Ex 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
 
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130  Available With RoomVIP Kolkata Call Girl Kestopur 👉 8250192130  Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
 
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
 

Sns en-sn160 w-datasheet-201702

  • 1. SMALLBUSINESSES&AGENCIES NETWORK SECURITY I ENDPOINT SECURITY I DATA SECURITY SECURE YOUR WIRELESS NETWORK Stormshield SN160W
  • 2. BRANCHES, AGENCIES, REMOTE OFFICES & TRADESPERSONS Ensure the continuity of your business All protection technologies needed for responding to the most sophisticated attacks are embedded in the entire range. Confidently open your wireless network to guest users The ideal setup for wireless networks, the guest mode feature gives your clients and partners WiFi connectivity while you get to maintain control over your users. Connect coworkers With the virtual private network, (IPSec and SSL VPN), coworkers get secure access to corporate resources regardless of where they are and from any terminal. Stay in control of your internet usage Thanks to advanced filtering and the management of quality of service, you can define the way you want the internet to be used. SECURE WIFI WithitsseparateWiFinetworks,theSN160Wofferssegmentation in your wireless environment, simplifying the management of access and associated resources. A single security solution is all it takes to protect every single one of your mobile devices and connected objects. GET THE BEST UNIFIED SECURITY AT UNBEATABLE VALUE Without compromising on security in any way, the SN160W embeds all the security functions needed for ensuring the flawless protection of small IT structures. Pure technological prowess. GRANT ACCESS TO THE RESOURCES ON YOUR CORPORATE NETWORK WITH TOTAL PEACE OF MIND Sophisticated IPSec VPN features mean that your branches and remote offices are interconnected securely and seamlessly to the main resources of your corporation. CONFIGURE THE KIND OF HIGH-LEVEL SECURITY YOU WOULD EXPECT IN LARGE CORPORATIONS IN JUST 3 MINUTES Intuitive wizards guide you through each step of the installation and configuration of your security device. Stormshield SN160W THE SECURITY SOLUTION IDEAL FOR AGENCIES, REMOTE OFFICES & BRANCHES, SMALL BUSINESSES AND INDEPENDENT TRADERS.
  • 3. Technical specifications PERFORMANCE* Firewall throughput (1518 byte UDP) 1 Gbps IPS throughput (1518 byte UDP) 800 Mbps IPS throughput (1 Mbyte HTTP files) 400 Mbps Antivirus throughput 100 Mbps VPN* IPSec throughput - AES128/SHA1 200 Mbps IPSec throughput - AES256/SHA2 200 Mbps Max number of IPSec VPN tunnels 50 Number of SSL VPN clients (Portal mode) 20 Number of simultaneous SSL VPN clients 5 NETWORK CONNECTIVITY Concurrent connections 150,000 New connections per second 6,000 Number of main gateways (max)/backup (max) 64/64 Number of interfaces (Agg, Dialup, ethernet, loopback, VLAN, pptp, ...) 100 CONNECTIVITY 10/100/1000 interfaces 1+ 4 ports (Switch) Number of SSID 2 Protocol 802.11 a/b/g/n Authentication WPA/WPA2 SYSTEM Max number of filtering rules 4,096 Max number of static routes 512 Max number of dynamic routes 1,000 REDUNDANCY High Availability (Active/Passive) - HARDWARE Local storage SD Card storage** MTBF (years) 24.2 Racking 1U (<1/2 19”) Height x Width x Depth (mm) 45 x 176 x 150 Weight 0.55 kg (1,25 lbs) Packaged Height x Width x Depth (mm) 78 x 320 x 200 Packaged weight 1.2 kg (2,65 lbs) Power supply (AC) 100-240V 60-50Hz 1.5-0.8A Power consumption 230V 50Hz 9.43W 0.13A Noise level Fanless Thermal dissipation (max, BTU/h) 40 Operational temperature 5° to 40°C (41° to 104°F) Relative humidity, operating (without condensation) 20% to 90% @ 40°C Storage temperature -30° to 65°C (-22° to 149°F) Relative humidity, storage (without condensation) 5% to 95% @ 60°C CERTIFICATIONS Compliance CE/FCC/CB USAGE CONTROL Firewall/IPS/IDS mode, identity-based firewall, application firewall, Microsoft Services Firewall, detection and control of the use of mobile terminals, applicationinventory(option),vulnerabilitydetection (option), filtering per localisation (countries, continents), URL filtering (cloud mode), transparent authentication (Active Directory SSO Agent, SSL, SPNEGO), multi-user authentication in cookie mode (Citrix- TSE), guest mode authentication, time scheduling per rule. PROTECTION FROM THREATS Intrusion prevention, protocol scan, application inspection, protection from denial of service attacks (DoS), protection from SQL injections, protection from Cross-Site Scripting (XSS), protection from malicious Web2.0 code and scripts, Trojan detection, detection of interactive connections (botnets, Command&Control), protection from data evasion, Advanced management of fragmentation, automatic quarantining in the event of an attack, antispam and antiphishing: reputation-based analysis —heuristic engine, embedded antivirus (HTTP, SMTP, POP3, FTP), SSL decryption and inspection, VoIP protection (SIP), collaborative security: adaptation of the filter policy according to security events or detected vulnerabilities. CONFIDENTIALITY Site-to-site or nomad IPSec VPN, remote SSL VPN access in multi-OS tunnel mode (Windows, Android, iOS, etc), SSL VPN agent configurable centrally (Windows), Support for Android/iPhone IPSec VPN. NETWORK - INTEGRATION IPv6, NAT, PAT, transparent (bridge)/routed/hybrid modes, dynamic routing (RIP, OSPF, BGP), multi-level internal or external PKI management, multi-domain authentication (including internal LDAP), explicit proxy,policy-basedrouting(PBR),QoSmanagement, DHCP client/relay/server, NTP client, DNS proxy- cache, HTTP proxy-cache, IPFIX/NetFlow. MANAGEMENT Web-based management interface, object-oriented security policy, real-time configuration help, firewall rule counter, more than 15 installation wizards, global/local security policy, embedded log reporting and analysis tools, interactive and customizable reports,sendingtosyslogserverUDP/TCP/TLS,SNMP v1, v2, v3 agent, automated configuration backup. Non-contractual document. The features mentioned are those in version 3.0. * Performance is measured in a laboratory and under condi- tions ideal for version 3.1. Results may vary according to test conditions and the software version. ** Option
  • 4. WWW.STORMSHIELD.EU Phone +33 9 69 32 96 29 For security with high added value STORMSHIELD NETWORK VULNERABILITY MANAGER* Arm yourself with a simple and powerful vulnerability detection tool that leaves no impact on your information system. Vulnerability Management Based on data passing through the appliance, Stormshield Network Vulnerability Manager makes an inventory of operating systems, applications used and their vulnerabilities. As soon as a vulnerability appears on your network,youwillbekeptinformed. Remediation Stormshield Network Vulnerability Manager offers a set of dedicated reports as well as a real-time dashboard that allow you to stay in control of your deployment. STORMSHIELD NETWORK EXTENDED WEB CONTROL* Monitor how users surf the internetonyourcorporatenetwork and optimize your bandwidth consumption by deploying an effective and high-performance URL filtering solution. Prevention of web-based threats Extended Web Control analyzes illions of requests in order to continuously evaluate the risk level of various websites and to block infected or malicious sites from being visited as soon as they are detected. Advanced filtering for all The Extended Web Control solution can be enabled on the entire range of Stormshield Network Security products. You can therefore benefit from an advanced filter solution regardless of the size of your company. KASPERSKY ANTIVIRUS* Protect yourself by getting equipped with the best antivirus protection solution. Protection from threats The Kaspersky antivirus solution on Stormshield Network Security appliances is not based merely on a system of malware signatures, but also integrates emulation mechanisms to identify malicious code proactively. Peripheral protection Applying an antivirus inspection on the traffic of all devices connected to the network and relying on a behavioral analysis technology similar to sandboxing, it allows the detection of even unknown attacks. * Option Version 1.1 - Copyright Stormshield 2017