Here you can compare the prices for hardware firewalls Edgewave, get acquainted with photos and technical characteristics (for example Multicast support, Processor frequency, Active TCP connections (max), 4 Ohm/8 Ohm Switching, Firewall security, Authentication method) and buy a liked model hardware firewalls in one of the reliable online stores.
iPrism 25h, Security appliance, Gigabit Ethernet, 1U, government, academic, federal government, local government, non-profit, rack-mountable
iPrism's powerful h-Series appliances are offered in models to fit a wide range of requirements. iPrism Web Security delivers comprehensive, policy-driven Web Security by combining software flexibility and scalability with the security and control of an appliance-based solution. The cost-efficient iPrism SMB h-Series appliances are designed to enhance iPrism Web Security capabilities now as well as prepare for new features and functionality in the future.
The compact, 1U, h-Series appliances are compatible with all supported versions of the iPrism Web Security operating software and deliver throughput speeds ranging from 10 to 30 Mbps depending on the model you choose. With a variety of models available to suit your requirements, the iPrism Web Security is designed to fit any size organization. The iPrism Web Security, delivered via the h-Series appliances, provides powerful, comprehensive Web Security to organizations ranging from large enterprises to small and medium-sized businesses.
The iPrism 25h is the model that comes after the 15h and includes more processing power and a 1 Gbps network failover card for added reliability. It is an ideal choice to handle the Web Security needs of small and medium-sized organizations that have greater bandwidth or access event retention requirements. If you are looking for a server-grade appliance with redundant power supplies and hard drives, consider upgrading to the 35h.
By clicking on the "Send" button, you agree that your data will be used to process your request. Further information and revocation instructions can be found in the data protection declaration.