Here you can compare the prices for hardware firewalls Astaro, get acquainted with photos and technical characteristics (for example Multicast support, Processor frequency, Active TCP connections (max), 4 Ohm/8 Ohm Switching, Firewall security, Authentication method) and buy a liked model hardware firewalls in one of the reliable online stores.
Security Gateway 220
Astaro Security Gateway integrates complete Network, Web and Mail Security through an intuitive browser-based user interface. The Astaro Unified Threat Management appliance is the most easy-to-use and cost-effective "all-in-one" solution available, working to effectively shield businesses from internet based threats everyday.
Network Security – Defends your network against a wide variety of Internet threats, including denial of service attacks, port scans, worms, trojans, botnets and application exploits. Also provides secure remote access for mobile workers via IPsec or SSL based VPN clients.
Mail Security – Filters all your email traffic in order to keep spam, viruses, phishing and other malicious mails out of your network. Furthermore, prevents unauthorized interception of email through transparent Email Encryption without requiring any client software installation.
Web Security – Controls employee web access and use of IM/P2P application for maximum productivity and minimal legal risks. Filters all web and FTP traffic in order to keep viruses, spyware and active content from entering your network.
Easy Management - An intuitive setup wizard enables you to get the system up and running within minutes. The browser based GUI features easy point-and-click system administration without requiring in-depth technical knowledge.
Astaro Up2Date Service – Automatic Internet updates of firmware and attack patterns always keep the system at a current level.
The Astaro Difference – Astaro only uses carefully selected best-of-breed applications, which compete with today’s best point solutions. All applications are tightly integrated through a graphical user interface and allow the efficient addition of new applications as quickly as new threats arise.
By clicking on the "Send" button, you agree that your data will be used to process your request. Further information and revocation instructions can be found in the data protection declaration.