Brand : Palo Alto Networks
Product Type : PAN-PA-460 – security appliance
Device Type : Security appliance
Form Factor : External
Hard Drive : 128 GB x 1
Data Link Protocol : Ethernet, Fast Ethernet, Gigabit Ethernet
Performance : Firewall throughput (HTTP): 5.2 Gbps ¦ Firewall throughput (appmix): 4.7 Gbps ¦ Threat prevention throughput (HTTP): 2.4 Gbps ¦ Threat prevention throughput (appmix): 2.6 Gbps ¦ VPN throughput (IPSec): 3.1 Gbps
Capacity : Maximum number of sessions: 400000 ¦ New sessions per second: 74000 ¦ VLAN tags per device: 4094 ¦ VLAN tags per interface: 4094
Power : AC 100-240 V (50/60 Hz)
Dimensions (WxDxH) : 8.1 in x 8.8 in x 1.7 in
Weight : 5 lbs
Warranty : 1 Year
GST @18% is applicable.
Buy Palo Alto Networks PA-460 Firewall online at best affordable price in India. Firewallbazaar sales latest Palo Alto Networks Firewall at lowest price. We offer FREE Shipping and FREE Installation Available all over India.
Palo Alto Networks PA-460, Professional Subscription Bundle (Threat Prevention, Advanced URL Filtering, Wildfire, DNS Security) with Premium support, 1 year (12 months), term.
Machine Learning Powered Next Generation Firewalls
Inserts machine learning in the center of the firewall to give inline signatureless attack prevention to record based attacks while recognizing and quickly halting never-before-seen phishing endeavors.
Use cloud-based ML cycles to push zero-delay marks and directions back to the NGFW. Utilizations conduct analysis to distinguish web of things (IoT) devices and make strategy proposals; clouddelivered and locally incorporated help on the NGFW.
Mechanizes strategy suggestions that save time and lessen the shot at human mistake.
Assesses and applies strategy to TLS/SSL-encoded traffic, both inbound and outbound, including for traffic that utilizes TLS 1.3 and HTTP/2
Offers rich visibility into TLS traffic, like measure of encoded traffic, TLS/SSL adaptations, figure suites,
Empowers authority over utilization of inheritance TLS conventions, unreliable codes, and mistakenly arranged certs to mitigate risks.
Works with simple arrangement of decryption and allows you to utilize worked in logs to investigate issues, like applications with pinned certs.
Allows you to empower or disable decryption flexibly dependent on URL classification and source and objective zone, address, client, user group, device, and port, for protection and administrative consistence purposes.
Distinguishes and sorts all applications, on all ports, constantly, with full Layer 7 assessment
Recognizes the applications navigating your organization independent of port, convention, methods, or encryption (TLS/SSL).
Offers the capacity to make custom App-IDs for restrictive applications or solicitation App-ID improvement for new applications from Palo Alto Networks.
Upholds security for clients at any area, on any gadget, while adjusting strategy because of client movement
Empowers security strategies, detailing, and crime scene investigation dependent on clients and gatherings – not simply IP addresses.
Effectively incorporates with a wide scope of storehouses to use client data: remote LAN regulators, VPNs, index servers, SIEMs and then some.